arxiv_id,text 2312.00001v1,"ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY. JEAN-PIERRE MAGNOT Abstract. We describe a framework for random pairwise comparisons matrices, inspired by selected constructions releted to the so called inconsistency reduction of pairwise comparisons (PC) matrices. In to build up structures on random pairwise comparisons matrices, the set up for (deterministic) PC matrices for non-reciprocal PC matrices is completed. The extension of basic concepts such as inconsistency indexes and geometric mean method are extended to random pairwise comparisons matrices and completed by new notions which seem useful to us. Two procedures for (random) inconsistency reduction are sketched, based on well-known existing objects, and a fiber bundle-like decomposition of random pairwise comparisons is proposed. Keywords: Pairwise comparisons, stochastic models, Abelian Yang-Mills theory, inconsitency, reciprocity. MSC (2020): 90B50, 81T13, 91B06 Contents Introduction 2 1. A not-so-short introduction to pairwise comparisons as a class of abelian Yang-Mills theory 2. A theory of non reciprocal pairwise comparisons and weights: deterministic settings 6 2.1. Preliminary settings on M n (R ∗ + ) and its remarkable subsets 6 2.2. Weights as projective coordinates 7 2.3. (Reciprocal) pairwise comparisons 8 2.4. Non-reciprocal pairwise comparisons and related indicators 9 10 2.5. On the geometry of the tower CP C n ⊂ P C n ⊂ M n (R ∗ + ). 12 2.6. Inconsistency on M n (R ∗ + ) 3. Random pairwise comparisons 14 3.1. The settings 14 3.2. Stochastic analogs to deterministic constructions 15 3.3. Minimizing inconsitency: a sketch of two methods 16 4. A formal geometric picture for random pairwise comparisons and geometric concerns 18 5. Outlook 19 Appendix: One motivating example on exchange rates 19 References 20 1 3" 2312.00002v1,"The Discontinuity Group of a Locally Bounded Homomorphism of a Lie Group into a Lie Group Is Commutative A. I. Shtern ∗,∗∗,∗∗∗,1 ∗ Moscow Center for Fundamental and Applied Mathematics, Moscow, 119991 Russia ∗∗ Department of Mechanics and Mathematics, Moscow State University, Moscow, 119991 Russia ∗∗∗ Scientific Research Institute for System Analysis of the Russian Academy of Sciences (FGU FNTs NIISI RAN), Moscow, 117312 Russia E-mail: 1 aishtern@mtu-net.ru July 20, 2023 Abstract We prove that the discontinuity group of every locally bounded homomorphism of a Lie group into a Lie group is not only compact and connected, which is known, but is also commutative. 1 Introduction Recall that a (not necessarily continuous) homomorphism π of a topological group G into a topological group H is said to be relatively compact if there is a neighborhood U = U e G of the identity element e G in G whose image π(U ) has compact closure in H. Obviously, a homomorphism into a locally compact group is relatively compact if and only if it is locally bounded, i.e., there is a neighborhood U e G whose image is contained in some element of the filter H of neighborhoods of e H in H having compact closure. Let us also recall the notion of discontinuity group of a homomorphism π of a topological group G into a topological group H, which was introduced in [1] and used in [2, 3]. Definition 1 Let G and H be topological groups, and let U = U G be the filter of neighborhoods of e G in G. For every (not necessarily continuous) T locally relatively compact homomorphism π of G into H, the set DG(π) = U∈U π(U ) is called the discontinuity group of π. 1" 2312.00003v1,"Transport Equation based Physics Informed Neural Network to predict the Yield Strength of Architected Materials Akshansh Mishra School of Industrial and Information Engineering, Politecnico Di Milano, Milan, Italy akshansh.mishra@mail.polimi.it macroscopic scale. It is possible to span a variety of material properties, including stiffness, strength, torsion resistance, density, permeability, and thermal conductivity, among others, by varying the geometry of the unit cell while maintaining the base material [6-11]. The term ""metamaterials"" is now used to refer to all architected cellular materials because of this special capacity to customize the effective material properties. Abstract— In this research, the application of the Physics- Informed Neural Network (PINN) model is explored to solve transport equation-based Partial Differential Equations (PDEs). The primary objective is to analyze the impact of different activation functions incorporated within the PINN model on its predictive performance, specifically assessing the Mean Squared Error (MSE) and Mean Absolute Error (MAE). The dataset used in the study consists of a varied set of input parameters related to strut diameter, unit cell size, and the corresponding yield stress values. Through this investigation the aim is to understand the effectiveness of the PINN model and the significance of choosing appropriate activation functions for solving complex PDEs in real-world applications. The outcomes suggest that the choice of activation function may have minimal influence on the model's predictive accuracy for this particular problem. The PINN model showcases exceptional generalization capabilities, indicating its capacity to avoid overfitting with the provided dataset. The research underscores the importance of striking a balance between performance and computational efficiency while selecting an activation function for specific realworld applications. These valuable findings contribute to advancing the understanding and potential adoption of PINN as an effective tool for solving challenging PDEs in diverse scientific and engineering domains. A paradigm change in the creation of architected materials may be possible thanks to Physics-Informed Neural Networks (PINNs), which have special qualities. PINNs provide an effective and data-driven method to investigate the enormous material design space by utilizing the capabilities of neural networks and combining physics-based equations. As a result, architects' constructions can be quickly and precisely optimized without the need for time-consuming trial. With the help of complex interactions and behaviors revealed by PINNs, materials can be tailored to have the necessary qualities while still performing at their best for a variety of applications. The capability of PINNs to manage multiphysics interactions further increases their adaptability in many engineering contexts. This is the first research work to implement the PINN model to evaluate the mechanical property of the BCC lattice based architected material. The primary goal of this research is to explore the utilization of the Physics-Informed Neural Network (PINN) model in tackling transport equation-based Partial Differential Equations (PDEs). The specific focus lies in evaluating the impact of various activation functions incorporated into the PINN model on its predictive capabilities, with a keen emphasis on assessing the Mean Squared Error (MSE) and Mean Absolute Error (MAE). To conduct this analysis, a diverse dataset comprising input parameters such as strut diameter, unit cell size, and corresponding yield stress values is utilized. Through this investigation, the study aims to gain valuable insights into the effectiveness of the PINN model and the significance of selecting appropriate activation functions for optimizing predictive performance in solving complex PDEs. Keywords—Physics Informed Neural Network; Transport Equation; Architected Materials; BCC Lattice Structure I. I NTRODUCTION Architected cellular materials are composed of interconnecting struts and nodes, and are also referred to as lattice structures or lattices. Another variety of these materials is minimum surfaces, which include continuous curved structures or sheets of curvature without clear nodes. Beyond the choice of base material (metallic, ceramic, polymeric, or composites) and the macroscopic part's shape (such as a femoral stem), the micro-architecture of these cellular materials gives designers an extra degree of customization [1- 5]. Cellular materials function as structures on a microscopic level, while on a macroscopic level, they show traits of homogeneous materials. This indicates that the lattice and macroscopic scales are clearly separated by length scales. Since its behavior depends on the base material and the unit cell's design parameters, effective homogenous qualities, like an effective elastic modulus, can be used to describe it on a 1" 2312.00005v1,"NumCalc: An open source BEM code for solving acoustic scattering problems W. Kreuzer a,∗ , K. Pollack a , F. Brinkmann b , P. Majdak a a Austrian Academy of Sciences, Acoustics Research Institute, Wohllebengasse 12-14, 1040, Vienna, Austria b Audio Communication Group, Technical University of Berlin, Straße des 17. Juni 135, 10623, Berlin, Germany Abstract The calculation of the acoustic field in or around objects is an important task in acoustic engineering. To numerically solve this task, the boundary element method (BEM) is a commonly used method especially for infinite domains. The open source tool Mesh2HRTF and its BEM core NumCalc provide users with a collection of free software for acoustic simulations without the need of having an in-depth knowledge into numerical methods. However, we feel that users should have a basic understanding with respect to the methods behind the software they are using. We are convinced that this basic understanding helps in avoiding common mistakes and also helps to understand the requirements to use the software. To provide this background is the first motivation for this paper. A second motivation for this paper is to demonstrate the accuracy of NumCalc when solving benchmark problems. Thus, users can get an idea about the accuracy they can expect when using NumCalc as well as the memory and CPU requirements of NumCalc. A third motivation for this paper is to give users detailed information about some parts of the actual implementation that are usually not mentioned in literature, e.g., the specific version of the fast multipole method and its clustering process or how to use frequency-dependent admittance boundary conditions. Keywords: BEM, Software, Fast Multipole Method 1. Introduction The boundary element method (BEM, [1, 2]) has a long tradition for numerically solving the Helmholtz equation in 3D that models acoustic wave propagation in the frequency domain. Compared to other meth- ods such as the finite element method [3] (FEM), the BEM has the advantage that only the surface of the scattering object needs to be considered and that for external problems the decay of the acoustic wave to- wards infinity is already included in the formulation. This renders the BEM an attractive tool for calculating sound-wave propagation. However, the BEM has the drawback that the generated linear system of equations ∗ Corresponding author. Email addresses: wolfgang.kreuzer@oeaw.ac.at (W. Kreuzer), katharina.pollack@oeaw.ac.at (K. Pollack), fabian.brinkmann@tu-berlin.de (F. Brinkmann), piotr.majdak@oeaw.ac.at (P. Majdak) Preprint submitted to Applied Acoustics December 4, 2023" 2312.00006v1,"Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis Evans Owusu Mohamed Rahouti D. Frank Hsu Kaiqi Xiong Yufeng Xin Fordham Univ, NY USA Fordham Univ., NY USA Fordham Univ., NY USA Cyber Florida, FL USA RENCI, NC USA yxin@renci.org xiongk@usf.edu hsu@fordham.edu eowusu3@fordham.edu mrahouti@fordham.edu Abstract—Mitigating Denial-of-Service (DoS) attacks is vital for online service security and availability. While machine learning (ML) models are used for DoS attack detection, new strategies are needed to enhance their performance. We suggest an innovative method, combinatorial fusion, which combines multiple ML models using advanced algorithms. This includes score and rank combinations, weighted techniques, and diversity strength of scoring systems. Through rigorous evaluations, we demonstrate the effectiveness of this fusion approach, considering metrics like precision, recall, and F1-score. We address the challenge of low-profiled attack classification by fusing models to create a comprehensive solution. Our findings emphasize the potential of this approach to improve DoS attack detection and contribute to stronger defense mechanisms. Index Terms—Cognitive diversity (CD), combinatorial fusion analysis (CFA), Denial of Services (DoS), machine learning (ML), rank function, rank-score characteristic (RSC) function, and score function I. I NTRODUCTION DoS attacks threaten online service availability and stability, making server protection crucial [1]. With evolving digital threats, more sophisticated and frequent attacks require strong countermeasures to secure networked infrastructure [2]. While many ML models have been used, there’s a need for innovative approaches to enhance detection and performance. While ML has shown promise in various cybersecurity applications, including denial DoS detection, it is important to recognize its limitations [3]. Among these limitations, with regard to DoS detection, is the interpretability and explainability. Specifically, some ML algorithms, especially deep learning models, are considered black boxes, making it difficult to interpret their decision-making process. This lack of interpretability and explainability can hinder trust and make it challenging to understand why a particular decision or prediction (e.g., whether a networking flow is malicious or benign) was made. To overcome such limitations, a holistic approach combining ML with other techniques, network-level mitigations, anomaly detection, and expert knowledge can be employed to enhance the accuracy and robustness of DoS detection systems. In this paper, we introduce a novel methodology based on leveraging the cutting-edge approach of combinatorial fusion, which harnesses recently developed algorithms and techniques for model fusion. Our objective is to combine multiple ML models using combinatorial fusion analysis to achieve superior DoS attack detection performance and interpretability. The key contributions of this paper are summarized as follows. • Examine the key ML models commonly used for DoS attack detection. Such an examination serves as the ground truth for integrating the combinatorial fusion analysis (CFA) approach into our ML-based DoS detection. • CFA approach: Develop an innovative approach based on CFA for combining multiple ML models in DoS attack detection. Our methodology encompasses various techniques, including advanced score combination, rank combination, weighted combination, and the consideration of diversity strength across multiple scoring systems. • Conduct performance evaluations to assess the effectiveness of our CFA. Through comparative analyses, we showcase the significant improvements achieved in terms of detection accuracy, false positive rates, and overall precision. By leveraging the power of the recently developed combinatorial fusion approach and its associated algorithms, our study aims to push the boundaries of DoS attack detection. We anticipate that our findings will contribute to the advancement of more robust and effective defense mechanisms against DoS attacks, bolstering the uninterrupted availability and security of critical online services. II. R ELATED W ORK DoS attack detection continuously gains attention in cybersecurity, with diverse methods proposed to enhance accuracy [4]. Escalating DoS attacks prompted increased focus by researchers [5]. Many studies employ ML algorithms for DoS attack detection, using models like SVMs, Random Forests, and Naive Bayes. These models analyze network patterns, using features like packet rates, sizes, and volume to differentiate normal and attack traffic [6]. Further, CNNs, RNNs, and variants extract intricate patterns and temporal dependencies from network traffic [3], showing promise in accurate attack identification. Ensemble methods like Bagging, Boosting, and Stacking also gained traction, combining models to enhance prediction [7]. These approaches counter individual model limitations, boosting accuracy and robustness. In recent years, model fusion techniques, such as combinatorial fusion analysis (CFA), have emerged as practical means of combining multiple ML models’ performance [8]," 2312.00007v1,"Noname manuscript No. (will be inserted by the editor) Space-Time Decomposition of Kalman Filter Luisa D’Amore, Rosalba Cacciapuoti the date of receipt and acceptance should be inserted later Abstract We present an innovative interpretation of Kalman Filter (KF, for short) combining the ideas of Schwarz Domain Decomposition (DD) and Parallel in Time (PinT) approaches. Thereafter we call it DD-KF. In contrast to standard DD approaches which are already incorporated in KF and other state estimation models, implementing a straightforward data parallelism inside the loop over time, DD-KF ab-initio partitions the whole model, including filter equations and dynamic model along both space and time directions/steps. As a consequence, we get local KFs reproducing the original filter at smaller dimensions on local domains. Also, sub problems could be solved in parallel. In order to enforce the matching of local solutions on overlapping regions, and then to achieve the same global solution of KF, local KFs are slightly modified by adding a correction term keeping track of contributions of adjacent subdomains to overlapping regions. Such a correction term balances localization errors along overlapping regions, acting as a regularization constraint on local solutions. Furthermore, such a localization excludes remote observations from each analyzed location improving the conditioning of the error covariance matrices. As dynamic model we consider Shallow Water equations which can be regarded a consistent tool to get a proof of concept of the reliability assessment of DD-KF in monitoring and forecasting of weather systems and ocean currents. Keywords: Data Assimilation, Kalman Filter, Domain Decomposition, Filter Localization, Model Reduction, Numerical Algorithm. AMS:35Q93,49M27, 49M41, 65K15, 65M32 1 Introduction In the present paper we focus on Kalman Filter (KF) which is one of the most important and common state estimation algorithms solving Data Assimilation (DA) Luisa D’Amore · Rosalba Cacciapuoti University of Naples Federico II, Naples, Italy E-mail: (luisa.damore,rosalba.cacciapuoti)@unina.it ORCID: https://orcid.org/0000-0002- 3379-0569" 2312.00018v1,"Security Challenges in Autonomous Systems Design Mohammad Hamad 1[0000−0002−9049−7254] and Sebastian Steinhorst 1[0000−0002−4096−2584] Technical University of Munich, Munich, Germany firstname.lastname@tum.de Abstract. Autonomous systems are emerging in many application domains. With the recent advancements in artificial intelligence and machine learning, sensor technology, perception algorithms and robotics, scenarios previously requiring strong human involvement can be handled by autonomous systems. With the independence from human control, cybersecurity of such systems becomes even more critical as no human intervention in case of undesired behavior is possible. In this context, this paper discusses emerging security challenges in autonomous systems design which arise in many domains such as autonomous incident response, risk assessment, data availability, systems interaction, trustworthiness, updatability, access control, as well as the reliability and explainability of machine learning methods. In all these areas, this paper thoroughly discusses the state of the art, identifies emerging security challenges and proposes research directions to address these challenges for developing secure autonomous systems. Keywords: Security · Autonomous System Design · Autonomous Vehicles. 1 Introduction Autonomous Cyber-Physical Systems (CPSs) are a special type of CPS where human intervention is minimal or absent. These systems are emerging in numerous application domains, including autonomous vehicles, Industry 5.0 production systems, and many others. Autonomous CPSs bring forth numerous benefits, enabling tasks that were formerly reliant on human intervention to be automated, enhanced adaptability in control systems, and increased safety when appropriately designed. Designing such systems faces many challenges [35], including system complexity, heterogeneity, limited interpretability, and unpredictability due to Machine Learning (ML) methods. Among all challenges, security is probably the most critical as any security issue immediately may lead to safety problems [41] [20]. This is of particular importance in autonomous CPS, as there is a physical interaction with the environment, which can directly harm humans. While general information security" 2312.00026v1,"A Quality-of-Service Compliance System using Federated Learning and Optimistic Rollups João Paulo de Brito Gonçalves Federal Institute of Espirito Santo (Ifes) Cachoeiro de Itapemirim - ES, Brazil jpaulo@ifes.edu.br Guilherme Emerick Sathler FACIG Manhuaçu – MG, Brazil, emericksathler@gmail.com Rodolfo da Silva Villaca Federal University of Espirito Santo (Ufes) Vitoria - ES, Brazil Abstract. Edge computing brings a new paradigm in which the sharing of computing, storage, and bandwidth resources as close as possible to the mobile devices or sensors generating a large amount of data. A parallel trend is the rise of phones and tablets as primary computing devices for many people. The powerful sensors present on these devices combined with the fact that they are mobile, mean they have access to data of an unprecedentedly diverse and private nature. Models learned on such data hold the promise of greatly improving usability by powering more intelligent applications, but the sensitive nature of the data means there are risks and responsibilities to storing it in a centralized location. To address the data privacy required for some data in these devices we propose the use of Federated Learning (FL) so that specific data about services performed by clients do not leave the source machines. Instead of sharing data, users collaboratively train a model by only sending weight updates to a server. However, the naive use of FL in those scenarios exposes it to a risk of corruption, whether intentional or not, during the training phase. To improve the security of the FL structure, we propose a decentralized Blockchain-based FL in an edge computing scenario. We also apply blockchain to create a reward mechanism in FL to enable incentive strategy for trainers. Keywords: machine learning, federated learning, blockchain 1 Introduction Federated Learning (FL) is an emerging distributed learning framework that allows multiple devices to distributively train a shared model without the need of collecting and aggregating all data from all the nodes in the network, thereby protecting the data privacy and reducing the communication overhead. FL preserves user privacy and data security by design since no data transfer is required, what it is interesting for network operators who have in their possession sensitive data about organizations and users that don’t want to share or publish data from their edge devices. FL also enables several parties to collaboratively train a ML model so that each of the parties can enjoy a better model than what it can achieve alone. However, there are several main concerns about the current FL systems:" 2312.00029v1,"Bergeron: Combating Adversarial Attacks through a Conscience-Based Alignment Framework Matthew Pisano Rensselaer Polytechnic Institute pisanm2@rpi.edu Bingsheng Yao Northeastern University b.yao@northeastern.edu Peter Ly Rensselaer Polytechnic Institute lyp2@rpi.edu Abraham Sanders Rensselaer Polytechnic Institute sandea5@rpi.edu Dakuo Wang Tomek Strzalkowski Northeastern University Rensselaer Polytechnic Institute d.wang@northeastern.edu tomek@rpi.edu Mei Si Rensselaer Polytechnic Institute sim@rpi.edu Abstract Modern Large language models (LLMs) can still generate responses that may not be aligned with human expectations or values. While many weight-based alignment methods have been proposed, many of them still leave models vulnerable to attacks when used on their own. To help mitigate this issue, we introduce Bergeron, a framework designed to improve the robustness of LLMs against adversarial attacks. Bergeron employs a two-tiered architecture. Here, a secondary LLM serves as simulated conscience that safeguards a primary LLM. We do this by monitoring for and correcting potentially harmful text within both the prompt inputs and the generated outputs of the primary LLM. Empirical evaluation shows that Bergeron can improve the alignment and robustness of several popular LLMs without costly fine-tuning. It aids both open-source and black-box LLMs by complementing and reinforcing their existing alignment training. 1 Introduction The challenge of aligning the responses of LLMs with human preferences is at the forefront of modern artificial intelligence development. These models, while advanced, are known to harbor potentially hazardous knowledge, such as methods for uranium enrichment or the production of controlled substances. Typically, this issue is tackled through an alignment process aimed at preventing the dissemination or use of such perilous information. Within this paper, we define alignment as a process that modifies an LLM or its output so that the output is better aligned with human preferences. We also define an alignment failure or misalignment as when a model produces an unsafe response after being given a prompt. Unfortunately, a downside to many common alignment processes, like RLHF or red-teaming, is that they are both expensive and even incomplete (Casper et al., 2023) (Perez et al., 2022) (Wolf et al., 2023). Additionally, the RLHF process may degrade the performance of the model if applied too aggressively (Bekbayev et al., 2023). As a result, many models still exhibit bias in their answers and can be jailbroken by bad actors to produce dangerous responses (Wei et al., 2023) (Deng et al., 2023). Worryingly, the high upfront costs of proper alignment and its persistent vulnerabilities can cause models to undergo minimal alignment training (Smith, 2023) or overly aggressive training. Neither of these approaches are ideal and each comes with unique shortcomings. 1.1 Problems with Traditional Alignment This paper addresses a critical concern: despite recent advancements in alignment methods, contemporary approaches are still unable to completely block the generation of dangerous information by state-of-the-art models. Even the most secure models exhibit significant vulnerabilities in their alignment training, so much so that effective adversarial prompts capable of exploiting these weaknesses can be manually crafted in under an hour. Figure 1 is one example from September 23, 2023, of one such hand-designed prompt that we used on GPT-4. Alarmingly, this also works on many other safetyfocused models like GPT-3.5, Llama2-70B, or even models like Bard or Claude-Instant (see appendix B.1 for further examples). Further examples of successful attacks can be found in appendix B." 2312.00034v1,"Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning Mounia Hamidouche Eugeny Popko Bassem Ouni Technology Innovation Institute Abu Dhabi, UAE mounia.hamidouche@tii.ae Unikie Tampere, Finland eugeny.popko@unikie.com Technology Innovation Institute Abu Dhabi, UAE bassem.ouni@tii.ae ABSTRACT 1 This work provides a comparative analysis illustrating how Deep Learning (DL) surpasses Machine Learning (ML) in addressing tasks within Internet of Things (IoT), such as attack classification and device-type identification. Our approach involves training and evaluating a DL model using a range of diverse IoT-related datasets, allowing us to gain valuable insights into how adaptable and practical these models can be when confronted with various IoT configurations. We initially convert the unstructured network traffic data from IoT networks, stored in PCAP files, into images by processing the packet data. This conversion process adapts the data to meet the criteria of DL classification methods. The experiments showcase the ability of DL to surpass the constraints tied to manually engineered features, achieving superior results in attack detection and maintaining comparable outcomes in device-type identification. Additionally, a notable feature extraction time difference becomes evident in the experiments: traditional methods require around 29 milliseconds per data packet, while DL accomplishes the same task in just 2.9 milliseconds. The significant time gap, DL’s superior performance, and the recognized limitations of manually engineered features, presents a compelling call to action within the IoT community. This encourages us to shift from exploring new IoT features for each dataset to addressing the challenges of integrating DL into IoT, making it a more efficient solution for real-world IoT scenarios. The proliferation of Internet of Things (IoT) applications has increased the importance of evaluating and analyzing IoT data, primarily to ensure the safety of IoT systems, which holds the utmost significance [42]. Typically, security concerns related to IoT, including tasks like identifying intrusions, detecting anomalies, and determining device-types, are addressed through three fundamental phases: i) Extracting Features: In this phase, we identify local characteristics or relevant information from IoT data to represent the data effectively. ii) Selecting Features: We choose the most relevant features from the extracted features during this phase. The goal is to select features that contribute the most to the desired task while reducing redundancy or irrelevant information. iii) Classifying Data: This final phase utilizes the selected features to classify IoT data into different classes. One commonly employed technique for the feature extraction phase in the IoT domain involves domain specialists’ meticulous engineering of features. We craft these features with the specific aim of effectively addressing classification challenges. While this traditional approach is still frequently used due to its interpretability, it possesses inherent limitations: i) Laborious work: Obtaining manually designed features from the data can be time-consuming, involving iterative stages such as experimentation, evaluation, and refinement. This process is repeated for each new dataset and target task because each dataset can showcase distinct characteristics arising from the specificity of the network configuration it originates from (device-type, protocols, and network topologies), as depicted in the first and third panel of Figure 1. ii) Limited Generalization Evaluation: As per the first limitation, we understand that it becomes difficult to determine how well a Machine Learning (ML) model can extend its classification abilities to different datasets when using a specific set of hand-crafted features. As a result, accurately assessing the model’s effectiveness in real-world scenarios, where feature sets may vary, becomes problematic [32]. iii) Challenges of handling large-scale IoT Datasets: As discussed in [16], manually built features may need help to capture the intricate interactions in large-scale IoT datasets as handling extensive data volumes can make feature extraction unmanageable and processing computationally impossible. We aim to go beyond the traditional approach and leverage the potential of end-to-end learning from the Deep Learning (DL) domain to IoT problems, which integrates feature extraction and classification phases into one system, eliminating the need for human intervention, as shown in panel two from Figure 1. This approach draws inspiration from the successes achieved in computer vision [13] and Natural Language Processing (NLP) [26], [27] domains, where Deep Neural Netwok (DNN) models replaced hand-crafted KEYWORDS IoT network, End-to-end learning, Hand-crafted features, Deep learning, CyberSecurity. ACM Reference Format: Mounia Hamidouche, Eugeny Popko, and Bassem Ouni. 2023. Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning. In The International Conference on the Internet of Things (IoT 2023), November 7–10, 2023, Nagoya, Japan. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3627050.3627053 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. IoT 2023, November 7–10, 2023, Nagoya, Japan © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0854-1/23/11. . . $15.00 https://doi.org/10.1145/3627050.3627053 INTRODUCTION" 2312.00035v1,"1 FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication Yang Li, Chunhe Xia, Wei Liu, Weidong Zhou, Chen Chen and Tianbo Wang, Member, IEEE, Abstract—Privacy and security in the parameter transmission process of federated learning are currently among the most prominent concerns. However, there are two thorny problems caused by unprotected communication methods: “parameterleakage” and “inefficient-communication”. This article proposes Blockchain-based Federated Learning (FBChain) model for federated learning parameter communication to overcome the above two problems. First, we utilize the immutability of blockchain to store the global model and hash value of local model parameters in case of tampering during the communication process, protect data privacy by encrypting parameters, and verify data consistency by comparing the hash values of local parameters, thus addressing the “parameter-leakage” problem. Second, the Proof of Weighted Link Speed (PoWLS) consensus algorithm comprehensively selects nodes with the higher weighted link speed to aggregate global model and package blocks, thereby solving the “inefficient-communication” problem. Experimental results demonstrate the effectiveness of our proposed FBChain model and its ability to improve model communication efficiency in federated learning. I. I NTRODUCTION With the increasing privacy awareness of people and the enactment of relevant privacy laws, federated learning (FL) is emerging as a viable solution to train machine learning models with decentralized datasets while protecting privacy. In vanilla FL, clients train local model utilizing local dataset. Then, they communicate with a parameter server, accept all the updated local models to aggregate global model each round until model converges. However, FL is a double-edged sword. On the positive side, FL protects training dataset privacy and security, a large amount of data exists in the form of a data island, FL make them can be used for training models in a Yang Li is with the Key Laboratory of Beijing Network Technology, Beihang University, Beijing 100191, China (e-mail: johnli@buaa.edu.cn). Chunhe Xia is with the Key Laboratory of Beijing Network Technology, Beihang University, Beijing 100191, China, and also with the Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing, Guangxi Normal University, Guilin 541004, China (email: xch@buaa.edu.cn). Wei Liu is with the School of Software, Zhengzhou University, Zhengzhou, 450000, China, and also with the Henan Collaborative Innovation Center for Internet Medical and Health Services, Zhengzhou University, Zhengzhou, 450000, China, and also with the Hanwei Internet of Things Research Institute, Zhengzhou University, Zhengzhou, 450000, China(e-mail: wliu@zzu.edu.cn). Weidong Zhou is with the Key Laboratory of Beijing Network Technology, Beihang University, Beijing 100191, China (e-mail: zhouwd@buaa.edu.cn). Chen Chen is with the Key Laboratory of Beijing Network Technology, Beihang University, Beijing 100191, China (e-mail: chenchenl@buaa.edu.cn). Tianbo Wang is with the School of Cyber Science and Technology, Beihang University, Beijing 100191, China, and also with the Shanghai Key Laboratory of Computer Software Evaluating and Testing, Shanghai 201112, China (email: wangtb@buaa.edu.cn). (Corresponding author:Tianbo Wang.) Manuscript received April 19, 2005; revised August 26, 2015. safe environment. On the negative side, because the training dataset is decentralized and the global model is aggregated by different local models, the communication of local model between clients and server is frequent, but the communication efficiency and security cannot be guaranteed. [3] Given the local model parameter, research on communication security and efficiency focuses on model encryption and lower communication rounds. [9] Especially, our research domain helps to protect local model parameters against malicious attacks that may result in data tampering or leakage, while concurrently enhancing communication efficiency. However, there are two inevitable problems in federated learning communication: “parameter-leakage” and “inefficient-communication”. The local model parameters transmission from clients and server via network, thus getting aggregated global model. Nevertheless, the network may be under malicious attack, and the link speed of different clients and server may be difference. “Parameter-leakage” refers to the local model parameter being tampered or leakage because of unsafety communication method, attackers may get private data from leaked parameters. “Inefficient-communication” refers to the parameter transmission speed that may be slow. These two problems indicate it is thorny for the FL to achieve efficient and secure communication. Benefiting from the great success of FL in privacy protection, most researchers consider privacy during FL communication and use compression or combine it with blockchain to improve security and efficiency. Compression local model parameters can lower transmission data size, according to compress origin data to low-rank or a random mask. Blockchain can provide a reliable way to transmit combination with encryption mechanism, store local model and global model parameters in blocks to ensure the security of model parameters. Unfortunately, these two mainstreams are inadequate to address the problem of FL communication efficiency and security. First, the compression of parameters has differences from origin local model, makes it challenging to perceive better performance on model training. Second, the blockchain combined method has limitations on block size, and every block will be stored in each node, which will occupy a significant amount of storage space. To tackle the obstacles above, we propose the blockchainbased federated learning (FBChain) model, which consists of two main components: the model and Proof of Weighted Link Speed consensus algorithm(PoWLS) in the blockchain. The former integrates asymmetric encryption, symmetric encryption and hash computation, thus solving the problem of “parameter-leakage”. It considers the parameter tampered with" 2312.00036v1,"Privacy-Preserving Load Forecasting via Personalized Model Obfuscation Shourya Bose, Yu Zhang Kibaek Kim Department of Electrical & Computer Engineering University of California, Santa Cruz, CA {shbose,zhangy}@ucsc.edu Mathematics and Computer Science Division Argonne National Laboratory, Lemont, IL kimk@anl.gov Abstract—The widespread adoption of smart meters provides access to detailed and localized load consumption data, suitable for training building-level load forecasting models. To mitigate privacy concerns stemming from model-induced data leakage, federated learning (FL) has been proposed. This paper addresses the performance challenges of short-term load forecasting models trained with FL on heterogeneous data, emphasizing privacy preservation through model obfuscation. Our proposed algorithm, Privacy Preserving Federated Learning (PPFL), incorporates personalization layers for localized training at each smart meter. Additionally, we employ a differentially private mechanism to safeguard against data leakage from shared layers. Simulations on the NREL ComStock dataset corroborate the effectiveness of our approach. I. I NTRODUCTION Efficient and reliable operations of smart power grids rely on accurately forecasting load demand by different consumers [1]. Yet, the acquisition of detailed load data from smart meters raises privacy concerns for occupants of serviced buildings or residences [2]. To address this, recent research has focused on finding a balance between privacy and accuracy in load forecasting models, particularly those utilizing deep learning architectures. A promising approach is federated learning (FL) [3], [4], where data stays local to edge devices (referred to as ”clients”), such as smart meters. Meanwhile, model parameters are distributed between the clients and a central server during the training process. For clients with highly diverse data, the performance of federated learning (FL) algorithms tends to decline [5]. Additionally, FL alone may not offer robust privacy guarantees, particularly when models trained through FL exhibit bias toward a single or a group of clients [6]. As shown in our prior work [7], the inclusion of personalization layers (PLs) effectively mitigates performance degradation with heterogeneous clients. PLs denote model layers specific to each client, offering an additional layer of privacy protection. This paper delves into the application of PLs in conjunction with a privacy-preserving technique. This material is based upon work supported by the U.S. Department of Energy, Office of Science, under contract number DE-AC02-06CH11357. This work was partially supported by the 2023 CITRIS Interdisciplinary Innovation Program (I2P). We gratefully acknowledge the computing resources provided on Swing, a high-performance computing cluster operated by the Laboratory Computing Resource Center at Argonne National Laboratory, and the Hummingbird cluster at UC Santa Cruz. In FL training, client model parameters are aggregated at the server, distributed back to clients for local updates on their data. Personalization layers (PL) mark specific model layers for individual clients, not participating in communication. This allows personalized client models, leveraging a shared representation from non-personalized layers [8]. PL parameter localization facilitates client model obfuscation during FL training for privacy, with inherent obfuscation for PL parameters and differential privacy (DP) applied to shared layers to prevent data leakages [9], [10]. Contribution: We introduce a privacy-preserving approach for training short-term load forecasting (STLF) models using heterogeneous clients’ load data.The proposed method PPFL (Privacy Preserving Federated Learning) allows for the implementation of PLs while protecting shared layer parameters through DP. It is applicable for training any STLF model. We employ a dual-stage attention-based recurrent neural network (DARNN) [11] as our chosen learning model in this paper. DARNN belongs to attention-based encoder-decoder RNNs, a category that has demonstrated state-of-the-art performance on various load forecasting datasets [12]–[14]. Simulations reveal that without DP, PPFL-trained models surpass classical FL and local training but exhibit a gradual performance decline with increasing DP levels. Notation: The set of real numbers is denoted by R. Vectors are represented in boldface and scalars in standard font. For vectors a and b, a/b and a ⊙ b denote elementwise √ division and Hadamard product, respectively. a (2) and a denote elementwise square and square root of a while ∥a∥ 1 is the ℓ 1 -norm. |S| represents the cardinality of a finite set S. For a positive integer K, [K] denotes the set {1, · · · , K}. Pr [X ∈ A] is the probability that random variable X belongs to set A. A Laplace random variable (µ, b) has  X ∼ Laplace  |x−µ| 1 . the density function f (x) = 2b exp − b II. L OAD F ORECASTING M ODEL A RCHITECTURE We consider the STLF setup as follows. Given T previous exogenous inputs {x t } Tt=1 with x t = [x t,1 , . . . , x t,n ] ⊤ ∈ R n and loads [y 1 , . . . , y T ] ∈ R T , we aim to generate a forecast ŷ T +L for some horizon length L. The exogenous inputs may contain quantities such as date/time indices, building characteristics, and weather data. In this setting, the LSTM" 2312.00042v1,"DeepTreeGANv2: Iterative Pooling of Point Clouds Moritz A.W. Scham ∗ Deutsches Elektronen-Synchrotron DESY, Germany moritz.scham@desy.de Dirk Krücker Deutsches Elektronen-Synchrotron DESY, Germany dirk.kruecker@desy.de Kerstin Borras † Deutsches Elektronen-Synchrotron DESY, Germany kerstin.borras@desy.de Abstract In High Energy Physics, detailed and time-consuming simulations are used for particle interactions with detectors. To bypass these simulations with a generative model, the generation of large point clouds in a short time is required, while the complex dependencies between the particles must be correctly modelled. Particle showers are inherently tree-based processes, as each particle is produced by the decay or detector interaction of a particle of the previous generation. In this work, we present a significant extension to DeepTreeGAN [1], featuring a critic, that is able to aggregate such point clouds iteratively in a tree-based manner. We show that this model can reproduce complex distributions, and we evaluate its performance on the public JetNet 150 dataset. 1 Introduction In particle physics, detailed, near-perfect simulations of the underlying physical processes, the measurements, and the details of the experimental apparatus are state-of-the-art. However, accurate simulations of large and complex detectors, especially calorimeters, using current Monte Carlo-based tools such as those implemented in the Geant4 [2] toolkit are computationally intensive. Currently, more than half of the worldwide Large Hadron Collider (LHC) grid resources are used for the generation and processing of simulated data [3]. For the future High-Luminosity upgrade of the LHC (HL-LHC [4]), the computational requirements will exceed the computational resources without significant speedups, e.g., for the CMS experiment by 2028 [5] projecting the current technologies. This will become even more demanding for future high-granularity calorimeters, e.g., the CMS HGCAL [6] with its complex geometry and extremely large number of channels. To address these challenges, fast simulation approaches based on Deep Learning, including Generative Adversarial Networks (GAN) [7] and Variational Autoencoders (VAE) [8], have been explored early [9–14] and deployed recently [15]. ∗ Also at Jülich Supercomputing Centre, Institute for Advanced Simulation, Germany and RWTH Aachen University, III. Physikalisches Institut A, Germany † Also at RWTH Aachen University, III. Physikalisches Institut A, Germany Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.00045v1,"AI-driven E-Liability Knowledge Graphs: A Comprehensive Framework for Supply Chain Carbon Accounting and Emissions Liability Management Olamide Oladeji 1,2 , Seyed Shahabeddin Mousavi 1,2 , Marc Roston 2 1 2 Department of Management Science & Engineering, Stanford University, Stanford, CA, USA Sustainable Finance Initiative, Precourt Institute for Energy, Stanford University, Stanford, CA, USA oladeji@stanford.edu, ssmousav@cs.stanford.edu, marc.roston@stanford.edu Abstract While carbon accounting plays a fundamental role in our fight against climate change, it is not without its challenges. We begin the paper with a critique of the conventional carbon accounting practices, after which we proceed to introduce the E-liability carbon accounting methodology and Emissions Liability Management (ELM) originally proposed by Kaplan and Ramanna in (Kaplan and Ramanna 2021), highlighting their strengths. Recognizing the immense value of this novel approach for real-world carbon accounting improvement, we introduce a novel data-driven integrative framework that leverages AI and computation - the E-Liability Knowledge Graph framework - to achieve real-world implementation of the E-liability carbon accounting methodology. In addition to providing a path-to-implementation, our proposed framework brings clarity to the complex environmental interactions within supply chains, thus enabling better informed and more responsible decision-making. We analyze the implementation aspects of this framework and conclude with a discourse on the role of this AI-aided knowledge graph in ensuring the transparency and decarbonization of global supply chains. Introduction Robust carbon accounting is very vital to the goal of cutting carbon emissions by providing a clearer picture of the sources and magnitude of emissions. Among other uses, rigorous carbon accounting can enable us to identify the most effective areas for climate change mitigation and also aid in the monitoring of progress of global mitigation efforts. Despite the increasing adoption of various carbon accounting methodology such as the GHG Protocol’s Corporate Accounting Standards, by organizations and governments around the world, a number of issues have necessitated that we rethink modern carbon accounting methodology in order to realize its true potential. We highlight below, some of the limitations of current carbon accounting practices: • Complexity of emissions sources: Carbon accounting can be very complex due to the vast range of emission sources that exit. Such emitting sources can include Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. everything from large-scale industrial processes to the burning of fossil fuels for electricity and transportation, deforestation, and even natural events such wildfires. With each source having distinct characteristics and requiring different methodologies to accurately measure its emissions, robustly accounting for emissions may sometimes be a daunting challenge. Another aspect that affects this is the interwoven nature of most supply chains(Jiang et al. 2019). Manufacturing a single product or providing a service will typically require complex interactions and exchange of goods and services, all guided by complex technological processes. Robust carbon accounting methodology must sufficiently capture these complexities however they present in the supply chain. • Disparate, unavailable data: Another major limitation associated with current carbon accounting practices is that the data necessary for carbon accounting is often scattered across various repositories, or in some cases, not available. This necessitates significant efforts to gather, verify, and standardize the data. Beyond data gathering, data often needs to be updated regularly to accurately reflect evolving realities. Several research studies have described this data limitation challenge. For example, the authors of (Ducoulombier 2021) review the data limitations associated with carbon accounting in significant detail. • High uncertainty: One of the biggest challenges is the inherent uncertainty in the measurement of greenhouse gas emissions. It is often not possible to directly measure emissions, especially at large scales. Instead, researchers, organizations and policymakers often have to rely on estimates and indirect measurements which are subject to varying degrees of uncertainty. Such uncertainty is an inherent part of carbon accounting and needs to be adequately managed to ensure the reliability of the results. Examining the literature, we can see that many criticisms have been made on current practices not properly addressing uncertainty issues (Brander et al. 2021). For example, Williamson et. al in (Williamson and Gattuso 2022) criticize the integration of uncertainty in carbon accounting for coastal ecosystems. (He et al. 2022) also presents a systematic review of corporate carbon accounting research, highlighting insufficient management of uncertainty as a significant issue." 2312.00048v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Tokenized Model: A Blockchain-Empowered Decentralized Model Ownership Verification Platform Yihao Li, Yanyi Lai, Tianchi Liao, Chuan Chen*, Member, IEEE, and Zibin Zheng, Fellow, IEEE Abstract—With the development of practical deep learning models like generative AI, their excellent performance has brought huge economic value. For instance, ChatGPT has attracted more than 100 million users in three months. Since the model training requires a lot of data and computing power, a well-performing deep learning model is behind a huge effort and cost. Facing various model attacks, unauthorized use and abuse from the network that threaten the interests of model owners, in addition to considering legal and other administrative measures, it is equally important to protect the model’s copyright from the technical means. By using the model watermarking technology, we point out the possibility of building a unified platform for model ownership verification. Given the application history of blockchain in copyright verification and the drawbacks of a centralized third-party, this paper considers combining model watermarking technology and blockchain to build a unified model copyright protection platform. By a new solution we called Tokenized Model, it protects the model’s copyright by reliable ownership record and verification mechanism. It also promotes the financial value of model by constructing the model’s transaction process and contribution shares of a model. In the typical case study, we also study the various performance under usual scenario to verify the effectiveness of this platform. Index Terms—Blockchain, Federated learning, Model Watermark, Ownership I. I NTRODUCTION A. Background In recent years, Artificial Intelligence Generated Content (AIGC) has experienced rapid development and demonstrated strong performance in various domains such as text, speech, and image generation. Applications like ChatGPT and Stable Diffusion have attracted considerable attention since released. Given the powerful capabilities of AIGC models, they can be employed to generate diverse types of content and generate revenue. Therefore, AIGC models hold significant commercial value in many application areas such as advertising, gaming, news, and artistic creation. Model owners who legitimately operate AIGC models stand to gain substantial financial returns. Correspondingly, the training of generative models typically requires substantial computational resources, often accessible only to large enterprises or institutions capable of bearing the costs. This circumstance increases the likelihood of model stealing. Malicious attackers can employ various techniques to Yihao Li, Yanyi Lai and Chuan Chen are with the Department of School of Computer Science, Sun-Yat sen University, Guangdong, 510275, China. Tianchi Liao and Zibin Zheng are with the Department of School of Software Engineering, Sun-Yat sen University, Guangdong, 519000, China. Corresponding author E-mail: chenchuan@mail.sysu.edu.cn Fig. 1: Comparison between NFT and Tokenized Model. steal a well-trained generative model at a low cost, exploiting it for their own profit, thereby infringing upon the rights of model owners and giving rise to copyright disputes. Hu et al. [1] have explored the feasibility of stealing generative models, providing evidence that the aforementioned concerns are not unfounded. Without a reliable model authentication mechanism, the model cannot serve as an asset for financial institutions or investors, thereby restricting the circulation and transaction of the model, making it difficult to conduct financial applications. In order to address the issue of model copyright, model watermarking technology has become increasingly important. Model watermarking technology is a technique that embeds specific identifying information into the model. By incorporating watermarks into the model, it can be uniquely identified, and the generated content can be tracked to determine its source and the model ownership." 2312.00055v1,"LEAP: LLM-Generation of Egocentric Action Programs Eadom Dessalene, Michael Maynord, Cornelia Fermüller, Yiannis Aloimonos University of Maryland, College Park {edessale,maynord@umd.edu} fer@cfar.umd.edu jyaloimo@umd.edu Abstract We introduce LEAP (illustrated in Figure 1), a novel method for generating video-grounded action programs through use of a Large Language Model (LLM). These action programs represent the motoric, perceptual, and structural aspects of action, and consist of sub-actions, pre- and post-conditions, and control flows. LEAP’s action programs are centered on egocentric video and employ recent developments in LLMs both as a source for program knowledge and as an aggregator and assessor of multimodal video information. We apply LEAP over a majority (87%) of the training set of the EPIC Kitchens dataset, and release the resulting action programs as a publicly available dataset here. We employ LEAP as a secondary source of supervision, using its action programs in a loss term applied to action recognition and anticipation networks. We demonstrate sizable improvements in performance in both tasks due to training with the LEAP dataset. Our method achieves 1st place on the EPIC Kitchens Action Recognition leaderboard as of November 17 among the networks restricted to RGB-input (see Supplementary Materials). 1. Introduction There is long thought to exist an underlying structure used in the generation of complex actions akin to natural language syntax operating over tokens of language (words) [1]. One popular interpretation of this is a structuring that is hierarchical and compositional in nature, in that action can be represented as a series of steps, where each step either yields a sub-routine consisting of a series of sub-actions or yields a single terminal atomic sub-action. Existing work proposing hierarchical representations of action addresses some of the requirements for capturing this underlying structure (e.g., the ordering of multiple sub-actions into an executable sequence). Representing actions as programs opens up an array of benefits for the interpretation and generation of complex action: 1) Action programs themselves offer robustness, explainability, and allow for efficiency analysis. 2) Action Figure 1. Illustration of the generation of egocentric action programs in LEAP. Two inputs are fed to an LLM: a pre-compiled action program library (H), and a textual representation of an input clip (H IC ). From this the LLM generates action program Ĥ for the input clip. Because the LLM does not take video input, 5 components compile different aspects of the input video into text. programs offer an intermediary language of action between robots and humans, allowing for robots to learn from human demonstration videos by extracting action program routines which are in turn compiled and made executable by a robot. 3) Action programs are conducive to action planning and the anticipation of future action. This is because representations of action at the sensory level are less conducive than 1" 2312.00057v1,"Probabilistic Copyright Protection Can Fail for Text-to-Image Generative Models Xiang Li * Qianli Shen * Kenji Kawaguchi National University of Singapore {xiangli,qianli,kenji}@comp.nus.edu.sg Accept Reject Benign prompt x T2I 100% a black and white zebra standing next to a star Adversarial prompt x adv SAFE 100% 100% Reject Accept 100% T2I 1% zebra weet unex! meet musica ansoldschool Infringe Copyright 99% Image y C Attacker A(x t adv | < x s adv , y s > t−1 s=1 ) Sample x t adv zebra weet unex! meet musica ansoldschool y t 1% 99% Accept 1% 1% y* Amplification T2I 1% 1% 1% 1% 99% Infringe Infringe ⋯ 99% Figure 1. Given a copyrighted image y C and a Text-to-Image (T2I) generative model with probabilistic copyright protection, our proposed virtually assured amplification attack (VA3) significantly amplifies the probability of producing infringing generations with persistent interactions of online adversarial prompt selection. Abstract Code is available at https://github.com/South7X/VA3. The booming use of text-to-image generative models has raised concerns about their high risk of producing copyright-infringing content. While probabilistic copyright protection methods provide a probabilistic guarantee against such infringement, in this paper, we introduce Virtually Assured Amplification Attack (VA3), a novel online attack framework that exposes the vulnerabilities of these protection mechanisms. The proposed framework significantly amplifies the probability of generating infringing content on the sustained interactions with generative models and a lower-bounded success probability of each engagement. Our theoretical and experimental results demonstrate the effectiveness of our approach and highlight the potential risk of implementing probabilistic copyright protection in practical applications of text-to-image generative models. 1. Introduction In recent years, the advancement of large generative models [17, 47, 50] has revolutionized high-quality image synthesis [34, 37, 40], paving the way for commercial applications that enable the public to effortlessly craft their own artworks and designs [2, 13, 20, 27, 38, 39]. Nevertheless, these models exhibit notable memorization capabilities to produce generations highly similar to the training data [3]. This resemblance raises growing concerns about copyright infringement, especially when copyrighted data is used for training [12, 16, 49, 52]. To address these concerns, there has been a surge in research focused on protecting copyrighted data from potential infringement by outputs of generative models [14, 21, 24, 43, 45, 52, 58]. Among these studies, a pivotal concept * Equal contribution 1" 2312.00058v1,"Uniform estimates for a fully discrete scheme integrating the linear heat equation on a bounded interval with pure Neumann boundary conditions Guillaume Dujardin 1 and Pauline Lafitte 2 1 Inria EPI PARADYSE, Univ. Lille, CNRS, UMR 8524 - Laboratoire Paul Painlevé F-59000 guillaume.dujardin@inria.fr 2 Fédération de Mathématiques FR3487, Laboratoire MICS, CentraleSupélec, 3 rue Joliot-Curie, 91190 Gif-sur-Yvette pauline.lafitte@centralesupelec.fr December 4, 2023 Abstract This manuscript deals with the analysis of numerical methods for the full discretization (in time and space) of the linear heat equation with Neumann boundary conditions, and it provides the reader with error estimates that are uniform in time. First, we consider the homogeneous equation with homogeneous Neumann boundary conditions over a finite interval. Using finite differences in space and the Euler method in time, we prove that our method is of order 1 in space, uniformly in time, under a classical CFL condition, and despite its lack of consistency at the boundaries. Second, we consider the nonhomogeneous equation with nonhomogeneous Neumann boundary conditions over a finite interval. Using a tailored similar scheme, we prove that our method is also of order 1 in space, uniformly in time, under a classical CFL condition. We indicate how this numerical method allows for a new way to compute steady states of such equations when they exist. We conclude by several numerical experiments to illustrate the sharpness and relevance of our theoretical results, as well as to examine situations that do not meet the hypotheses of our theoretical results, and to illustrate how our results extend to higher dimensions. 1 Introduction This article deals with the numerical integration of the classical linear heat equation in dimension 1, over a finite interval with homogeneous Neumann boundary conditions, and is concerned with proving uniform in time order estimates. The use of homogeneous Neumann boundary conditions is usual, for example when one wants to truncate an infinite domain (say, R) to a finite one (say, a bounded interval) and one wants to “allow the solution to get out” (see for example [9] for the transport equation and references therein). Precisely, this article deals with methods using finite differences in space. This approach of using finite differences in space for solving linear PDEs in long time on bounded domains is simple and hence popular (see [11] for the wave equation and [9] for the transport equation), even though the treatment of the boundary condition raises delicate questions and sometimes unexpected behaviors. For example, it is well-known that, for the heat equation, the most naive classical finitedifference approach in space lacks consistency at the boundary of the domain [12]. Note however that, in this case, the associated matrix is symmetric and hence allows to carry out spectral analysis. A possible approach to circumvent this inconsistency issue is to use a modified finite-difference matrix on the first or last lines (as in [12] pages 21-23). This solution produces an order 1 scheme in space for 1" 2312.00059v1,"Photo-induced charge carrier dynamics in a semiconductor-based ion trap investigated via motion-sensitive qubit transitions Woojun Lee, 1, 2, 3, ∗ Daun Chung, 1, 2, ∗ Honggi Jeon, 1, 2 Beomgeun Cho, 1, 2 KwangYeul Choi, 1, 2, 4 SeungWoo Yoo, 1, 2, 4 Changhyun Jung, 2, 4, 5 Junho Jeong, 2, 4, 5 Changsoon Kim, 4, 6 Dong-Il “Dan” Cho, 2, 4, 5 and Taehyun Kim 1, 2, 3, 4, 7, † 1 Dept. of Computer Science and Engineering, Seoul National University, Seoul 08826, South Korea Automation and Systems Research Institute, Seoul National University, Seoul 08826, South Korea 3 Institute of Computer Technology, Seoul National University, Seoul 08826, South Korea 4 Inter-University Semiconductor Research Center, Seoul National University, Seoul 08826, South Korea 5 Dept. of Electrical and Computer Engineering, Seoul National University, Seoul 08826, South Korea 6 Dept. of Intelligence and Information, Seoul National University, Seoul 08826, South Korea 7 Institute of Applied Physics, Seoul National University, Seoul 08826, South Korea 2 Ion trap systems built upon microfabricated chips have emerged as a promising platform for quantum computing to achieve reproducible and scalable structures. However, photo-induced charging of materials in such chips can generate undesired stray electric fields that disrupt the quantum state of the ion, limiting high-fidelity quantum control essential for practical quantum computing. While crude understanding of the phenomena has been gained heuristically over the past years, explanations for the microscopic mechanism of photo-generated charge carrier dynamics remains largely elusive. Here, we present a photo-induced charging model for semiconductors, whose verification is enabled by a systematic interaction between trapped ions and photo-induced stray fields from exposed silicon surfaces in our chip. We use motion-sensitive qubit transitions to directly characterize the stray field and analyze its effect on the quantum dynamics of the trapped ion. In contrast to incoherent errors arising from the thermal motion of the ion, coherent errors are induced by the stray field, whose effect is significantly imprinted during the quantum control of the ion. These errors are investigated in depth and methods to mitigate them are discussed. Finally, we extend the implications of our study to other photo-induced charging mechanisms prevalent in ion traps. I. INTRODUCTION Ion trap systems are rapidly scaling up as platforms for universal quantum computing by incorporating semiconductor fabrication technologies [1–5]. Compact, miniaturized chips enable greater ion densities, increased flexibility in ion configurations via ion transport [6], and serve as test-beds for on-chip integrated optics [7–9]. However, the proximity of the ions with surrounding materials causes the ions to be significantly susceptible to stray electric fields. Stray fields can be primarily categorized based on their underlying sources. First, there is field noise originating from thermal fluctuation and dissipation of charges on the material surface, which primarily causes ion heating and motional dephasing [10–15]. On the other hand, stray fields may arise from the excitation and subsequent dynamics of unpaired/excess charge carriers in the material, for instance, through photogeneration by scattered light. These fields cause ion displacement, leading to phase-modulated interactions with lasers due to excess micromotion [16], drifts in secular frequencies [9], and fluctuations in the Rabi frequency attributed to motion within finite beam widths, which are all detrimental to the motion-sensitive quantum operations. ∗ These authors contributed equally to this work. † taehyun@snu.ac.kr Describing photo-induced charging processes at the microscopic level is a non-trivial task. It requires understanding the optical excitation channel and subsequent carrier dynamics in the chip’s constituent materials, which can be crudely categorized as conductors, insulators, and semiconductors. Among these, the most frequently observed form of charging, commonly termed as dielectric charging, typically occurs in insulators or insulator/conductor structures [9, 17–22]. Boundaries defined by the surfaces and interfaces between materials, along with inhomogeneities within a single material, both complicate the dynamics and contribute significantly to the overall process [17, 23]. Moreover, since ions can experience stray fields from merely 10 – 1000 elementary charges on the chip surface [17, 22], numerous processes can occur simultaneously, making it challenging to identify the dominant mechanism. Due to such difficulties, the primary emphasis has been on mitigating these effects based on phenomenological observations rather than fully comprehending the carrier dynamics. Approaches include selecting materials with lower charging properties [24] or shielding materials prone to charging with metal coatings [21, 25–27]. To scale up ion trap chips with increasingly sophisticated features, however, a deeper understanding of these effects is essential as they require integration of heterogeneous materials into more intricate structures. Among the least understood phenomena is the carrier dynamics in semiconductors, particularly silicon [27–29], which is" 2312.00063v1,"MoMask: Generative Masked Modeling of 3D Human Motions Chuan Guo ∗ Yuxuan Mu ∗ Muhammad Gohar Javed ∗ Li Cheng University of Alberta Sen Wang {cguo2, ymu3, javed4, lcheng5}@ualberta.ca https://ericguo5513.github.io/momask/ A person performs a standing back kick. Walking forward and steps over an object, and then continue walking. Taking two strides forward, pivot swiftly on left foot, and then walk the other way. Figure 1. Our MoMask, when provided with a text input, generates high-quality 3D human motion with diversity and precise control over subtleties such as ”two strides forward”, ”pivot on left foot”, and ”pivot swiftly”. Abstract of-art methods on the text-to-motion generation task, with an FID of 0.045 (vs e.g. 0.141 of T2M-GPT) on the HumanML3D dataset, and 0.228 (vs 0.514) on KIT-ML, respectively. MoMask can also be seamlessly applied in related tasks without further model fine-tuning, such as textguided temporal inpainting. We introduce MoMask, a novel masked modeling framework for text-driven 3D human motion generation. In Mo- Mask, a hierarchical quantization scheme is employed to represent human motion as multi-layer discrete motion tokens with high-fidelity details. Starting at the base layer, with a sequence of motion tokens obtained by vector quantization, the residual tokens of increasing orders are derived and stored at the subsequent layers of the hierarchy. This is consequently followed by two distinct bidirectional transformers. For the base-layer motion tokens, a Masked Transformer is designated to predict randomly masked motion tokens conditioned on text input at training stage. During generation (i.e. inference) stage, starting from an empty sequence, our Masked Transformer iteratively fills up the missing tokens; Subsequently, a Residual Transformer learns to progressively predict the next-layer tokens based on the results from current layer. Extensive experiments demonstrate that MoMask outperforms the state- 1. Introduction Generating 3D human motions from textual descriptions, aka text-to-motion generation, is a relatively new task that may play an important role in a broad range of applications such as video games, metaverse, and virtual reality & augmented reality. In the past few years, it has generated intensive research interests [9, 15, 16, 21, 23, 36, 42, 49, 50]. Among them, it has become popular to engage generative transformers in modeling human motions [13, 16, 21, 49]. In this pipeline, motions are transformed into discrete tokens through vector quantization (VQ), then fed into e.g. an autoregressive model to generate the sequence of motion tokens in an unidirectional order. Though achieving impres- * These authors contributed equally to this work. 1" 2312.00069v1,"SICKLE: A Multi-Sensor Satellite Imagery Dataset Annotated with Multiple Key Cropping Parameters Depanshu Sani 1 , Sandeep Mahato 2 , Sourabh Saini 1 , Harsh Kumar Agarwal 1 , Charu Chandra Devshali 2 , Saket Anand 1 , Gaurav Arora 1 , Thiagarajan Jayaraman 2 1 Indraprastha Institute of Information Technology, Delhi, India 2 MS Swaminathan Research Foundation, Chennai, India https://sites.google.com/iiitd.ac.in/sickle/home Abstract The availability of well-curated datasets has driven the success of Machine Learning (ML) models. Despite greater access to earth observation data in agriculture, there is a scarcity of curated and labelled datasets, which limits the potential of its use in training ML models for remote sensing (RS) in agriculture. To this end, we introduce a first-of-its-kind dataset called SICKLE, which constitutes a time-series of multi-resolution imagery from 3 distinct satellites: Landsat-8, Sentinel-1 and Sentinel-2. Our dataset constitutes multi-spectral, thermal and microwave sensors during January 2018 − March 2021 period. We construct each temporal sequence by considering the cropping practices followed by farmers primarily engaged in paddy cultivation in the Cauvery Delta region of Tamil Nadu, India; and annotate the corresponding imagery with key cropping parameters at multiple resolutions (i.e. 3m, 10m and 30m). Our dataset comprises 2, 370 season-wise samples from 388 unique plots, having an average size of 0.38 acres, for classifying 21 crop types across 4 districts in the Delta, which amounts to approximately 209, 000 satellite images. Out of the 2, 370 samples, 351 paddy samples from 145 plots are annotated with multiple crop parameters; such as the variety of paddy, its growing season and productivity in terms of per-acre yields. Ours is also one among the first studies that consider the growing season activities pertinent to crop phenology (spans sowing, transplanting and harvesting dates) as parameters of interest. We benchmark SICKLE on three tasks: crop type, crop phenology (sowing, transplanting, harvesting), and yield prediction. 1. Introduction Satellite imagery has emerged as a widely applicable RS tool for researchers across domains like wildlife conservation, climate science, and economics among others; due to Dams/Anicut River Taluks Sample Taluks Figure 1. Schematic diagram of the complete study region in Tamil Nadu, India. Field data was collected from the highlighted blocks. its ability to generate policy-relevant data for large and inaccessible areas in a cost-effective manner. Despite the abundance of satellite data, there is a lack of curated datasets that are annotated with field data, thereby limiting its potential applicability for training and evaluating ML models. Agriculture is also one such domain where collecting field data involves conducting ground-based surveys, which is expensive and laborious. There exist publicly available datasets that target specific tasks, such as crop identification [5, 26, 31], land cover classification [5, 31] and yield estimation [31] among others. These datasets provide value when researchers are interested in singular line of inquiry that requires one dataset at a time. For instance, a crop yield prediction model can be trained using S USTAIN B ENCH ’s crop yield dataset [31] and a transfer learning approach can then be adopted. However, the dataset only has county-level annotations, which precludes a high-resolution, plot-level analysis. Furthermore, most available datasets have different characteristics and cover different geographies; for instance, the PASTIS [19] has multi-spectral information for crop type mapping within the French metropolitan territory; whereas Agriculture-Vision [2] has only Red, Green, Blue" 2312.00078v1,"Enhancing Cross-domain Click-Through Rate Prediction via Explicit Feature Augmentation Xu Chen, Zida Cheng, Jiangchao Yao, Chen Ju, Weilin Huang, Jinsong Lan, Xiaoyi Zeng, Shuai Xiao ∗ {huaisong.cx,chengzida.czd,weilin.hwl,jinsonglan.ljs,yuanhan,shuai.xsh}@taobao.com,{sunarker,ju_chen}@sjtu.edu.cn Alibaba Group and Shanghai Jiao Tong University China ABSTRACT KEYWORDS Cross-domain CTR (CDCTR) prediction is an important research topic that studies how to leverage meaningful data from a related domain to help CTR prediction in target domain. Most existing CDCTR works design implicit ways to transfer knowledge across domains such as parameter-sharing that regularizes the model training in target domain. More effectively, recent researchers propose explicit techniques to extract user interest knowledge and transfer this knowledge to target domain. However, the proposed method mainly faces two issues: 1) it usually requires a super domain, i.e. an extremely large source domain, to cover most users or items of target domain, and 2) the extracted user interest knowledge is static no matter what the context is in target domain. These limitations motivate us to develop a more flexible and efficient technique to explicitly transfer knowledge. In this work, we propose a cross-domain augmentation network (CDAnet) being able to perform explicit knowledge transfer between two domains. Specifically, CDAnet contains a designed translation network and an augmentation network which are trained sequentially. The translation network computes latent features from two domains and learns meaningful cross-domain knowledge of each input in target domain by using a designed cross-supervised feature translator. Later the augmentation network employs the explicit cross-domain knowledge as augmented information to boost the target domain CTR prediction. Through extensive experiments on two public benchmarks and one industrial production dataset, we show CDAnet can learn meaningful translated features and largely improve the performance of CTR prediction. CDAnet has been conducted online A/B test in image2product retrieval at Taobao app, bringing an absolute 0.11 point CTR improvement, a relative 0.64% deal growth and a relative 1.26% GMV increase. feature translation, cross-domain CTR prediction,explicit feature augmentation CCS CONCEPTS • Information systems → Retrieval models and ranking. ∗ corresponding author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Xu Chen, Zida Cheng, Jiangchao Yao, Chen Ju, Weilin Huang, Jinsong Lan, Xiaoyi Zeng, Shuai Xiao. 2018. Enhancing Cross-domain Click-Through Rate Prediction via Explicit Feature Augmentation. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 10 pages. https://doi. org/XXXXXXX.XXXXXXX 1 INTRODUCTION Click-through rate (CTR) prediction which estimates the probability of a user clicking on a candidate item, has a vital role in online services like recommendation, retrieval, and advertising [3, 16, 37]. It has been pointed out that data sparsity is a key issue that significantly limits the improvement of single-domain CTR models [10], and recent effort has been devoted to improving the target domain CTR models by leveraging data from other related domains [10, 12, 17, 22, 35]. Various cross-domain CTR prediction (CDCTR) methods have recently been developed, which can be roughly categorized into two groups: joint training and pre-training & fine-tuning. The joint training approach is developed by combining multiple CTR objectives from different domains into a single optimization process. It usually has shared parameters to build connections, and transfer the learned knowledge across different domains like MiNet [17], DDTCDR [11] and STAR [22]. However, since two domains usually have different objectives in optimization, these methods usually suffer from an optimization conflict problem, which might lead to a negative transfer result [21, 24]. To deal with this issue, a number of recent approaches study more advanced mixture-of-expert [15, 33] parameter-sharing technique for jointly optimizing CDCTR objectives [14, 23, 23]. Further, researchers believe that the knowledge are encoded in the network parameters and they propose many pre-training & fine-tuning models for CDCTR. The pre-training & fine-tuning method [12, 35] often has two stages, by training a CTR model sequentially in a source domain and then in a target domain, where the performance in the target domain can be generally improved by leveraging model parameters pre-trained from the source domain. This two-stage learning style enables the model to have only one objective at each training stage, which significantly reduces the impact of negative transfer. It is also parameter-efficient and has been widely applied at Taobao platform. Especially for KEEP [35], it first extracts user interest knowledge from super domain which is an extremely large domain that covers most users or items in target domain. Then, with the knowledge extraction" 2312.00083v1,"BAM-DETR: Boundary-Aligned Moment Detection Transformer for Temporal Sentence Grounding in Videos Pilhyeon Lee * Hyeran Byun Department of Computer Science, Yonsei University Sentence: “ Abstract Temporal sentence grounding aims to localize moments relevant to a language description. Recently, DETR-like approaches have shown notable progress by decoding the center and length of a target moment from learnable queries. However, they suffer from the issue of center misalignment raised by the inherent ambiguity of moment centers, leading to inaccurate predictions. To remedy this problem, we introduce a novel boundary-oriented moment formulation. In our paradigm, the model no longer needs to find the precise center but instead suffices to predict any anchor point within the interval, from which the onset and offset are directly estimated. Based on this idea, we design a Boundary-Aligned Moment Detection Transformer (BAM-DETR), equipped with a dual-pathway decoding process. Specifically, it refines the anchor and boundaries within parallel pathways using global and boundary-focused attention, respectively. This separate design allows the model to focus on desirable regions, enabling precise refinement of moment predictions. Further, we propose a quality-based ranking method, ensuring that proposals with high localization qualities are prioritized over incomplete ones. Extensive experiments verify the advantages of our methods, where our model records new state-of-the-art results on three benchmarks. Code is at https://github.com/Pilhyeon/BAM-DETR. ” Saliency Labels 𝑐 − 0.5𝑙 𝑐 𝑐 + 0.5𝑙 (a) Conventional moment modeling 𝑝 − 𝑑 𝑠 𝑝 𝑝 + 𝑑 𝑒 (b) Boundary-oriented moment modeling (Ours) Figure 1. Comparison of moment modeling approaches under the scenario of an ambiguous center from QVHighlights [22]. (a) The conventional method formulates the moment with a tuple of (c, l). (b) In contrast, we propose to model it with a triplet of (p, d s , d e ). summarization [50, 71]. Within this context, we particularly tackle temporal sentence grounding [1], aiming to retrieve moments corresponding to free-form language descriptions. To address temporal sentence grounding, numerous efforts have been undertaken in the last decade [9, 11, 32, 49, 63, 73]. Especially, taking inspiration from DETR [3], query-based approaches have become a promising research direction owing to the architectural simplicity [17, 22, 26, 37, 41]. By decoding temporal spans from a small set of learnable queries, they achieve promising grounding performance while maintaining high inference speed. Existing query-based models typically predict a moment using its center and width, i.e., (c, l), under the assumption that the boundaries are equidistant from the center. However, such a formulation can be problematic as the center of a moment might be ambiguous. An illustrative example is presented in Fig. 1 (top), where the frame at the center of the ground-truth moment primarily shows the audience, which is less relevant to the given sentence. This ambiguity can challenge the model’s ability to precisely locate the centers, resulting in low-quality predictions (Fig. 1a). To probe the impact of center misalignment on performance, we conducted a diagnostic experiment in Table 1. The results reveal that existing methods struggle with detecting accurate center points and suffer from significant performance drops when the predicted centers deviate from the ground truths. 1. Introduction Recent years have witnessed a notable surge in the popularity of short-form video content on social media platforms like YouTube Shorts, Instagram Reels, and TikTok. In the same vein, users prefer to selectively engage with short moments of interest rather than passively watch an entire long video. This trend highlights the importance of localizing desired moments. As a result, moment localization tasks have emerged as pivotal research topics in the field of video understanding, encompassing temporal action detection [20, 29, 75], highlight detection [22, 48, 58], and video * Correspondence to: Pilhyeon Lee 1" 2312.00085v1,"X-Dreamer: Creating High-quality 3D Content by Bridging the Domain Gap Between Text-to-2D and Text-to-3D Generation Yiwei Ma 1‡ Yijun Fan 1‡ Jiayi Ji 1 Haowei Wang 1 Xiaoshuai Sun 1 * Guannan Jiang 2 Annan Shu 2 Rongrong Ji 1 1 Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, 361005, P.R. China. 2 Contemporary Amperex Technology Co., Limited (CATL), Fujian, China Abstract In recent times, automatic text-to-3D content creation has made significant progress, driven by the development of pretrained 2D diffusion models. Existing text-to-3D methods typically optimize the 3D representation to ensure that the rendered image aligns well with the given text, as evaluated by the pretrained 2D diffusion model. Nevertheless, a substantial domain gap exists between 2D images and 3D assets, primarily attributed to variations in camera-related attributes and the exclusive presence of foreground objects. Consequently, employing 2D diffusion models directly for optimizing 3D representations may lead to suboptimal outcomes. To address this issue, we present X-Dreamer, a novel approach for high-quality text-to-3D content creation that effectively bridges the gap between text-to-2D and textto-3D synthesis. The key components of X-Dreamer are two innovative designs: Camera-Guided Low-Rank Adaptation (CG-LoRA) and Attention-Mask Alignment (AMA) Loss. CG-LoRA dynamically incorporates camera information into the pretrained diffusion models by employing cameradependent generation for trainable parameters. This integration enhances the alignment between the generated 3D assets and the camera’s perspective. AMA loss guides the attention map of the pretrained diffusion model using the binary mask of the 3D object, prioritizing the creation of the foreground object. This module ensures that the model focuses on generating accurate and detailed foreground objects. Extensive evaluations demonstrate the effectiveness of our proposed method compared to existing text-to- 3D approaches. Our project webpage: https://xmuxiaoma666.github.io/Projects/X-Dreamer. * Corresponding author; ‡ Equal contributions. Consider Camera Parameters Concentrate on the 3D Asset Cameraindependent Focus on the Entire Image Text-to-2D generation Cameradependent Focus on the Foreground Object Text-to-3D generation Figure 1. The outputs of the text-to-2D generation model (left) and the text-to-3D generation model (right) under the same text prompt, i.e., “A statue of Leonardo DiCaprio’s head”. 1. Introduction The field of text-to-3D synthesis, which seeks to generate superior 3D content predicated on input textual descriptions, has shown significant potential to impact a diverse range of applications. These applications extend beyond traditional areas such as architecture, animation, and gaming, and encompass contemporary domains like virtual and augmented reality. In recent years, extensive research has demonstrated significant performance improvement in the text-to-2D generation task [2, 24–26] by leveraging pretrained diffusion models [6, 30, 31] on a large-scale text-image dataset [27]. Building on these advancements, DreamFusion [22] introduces an effective approach that utilizes a pretrained 2D diffusion model [26] to autonomously generate 3D assets from text, eliminating the need for a dedicated 3D asset dataset. A key innovation introduced by DreamFusion is the Score Distillation Sampling (SDS) algorithm. This algorithm aims to optimize a single 3D representation, such as" 2312.00087v1,"Generative Artificial Intelligence in Learning Analytics: Contextualising Opportunities and Challenges through the Learning Analytics Cycle LIXIANG YAN, Monash University, Australia ROBERTO MARTINEZ-MALDONADO, Monash University, Australia DRAGAN GAŠEVIĆ, Monash University, Australia Generative artificial intelligence (GenAI), exemplified by ChatGPT, Midjourney, and other state-of-the-art large language models and diffusion models, holds significant potential for transforming education and enhancing human productivity. While the prevalence of GenAI in education has motivated numerous research initiatives, integrating these technologies within the learning analytics (LA) cycle and their implications for practical interventions remain underexplored. This paper delves into the prospective opportunities and challenges GenAI poses for advancing LA. We present a concise overview of the current GenAI landscape and contextualise its potential roles within Clow’s generic framework of the LA cycle. We posit that GenAI can play pivotal roles in analysing unstructured data, generating synthetic learner data, enriching multimodal learner interactions, advancing interactive and explanatory analytics, and facilitating personalisation and adaptive interventions. As the lines blur between learners and GenAI tools, a renewed understanding of learners is needed. Future research can delve deep into frameworks and methodologies that advocate for human-AI collaboration. The LA community can play a pivotal role in capturing data about human and AI contributions and exploring how they can collaborate most effectively. As LA advances, it is essential to consider the pedagogical implications and broader socioeconomic impact of GenAI for ensuring an inclusive future. CCS Concepts: • Applied computing → Collaborative learning; Computer-assisted instruction; Learning management systems. Additional Key Words and Phrases: learning analytics, human-AI collaboration, generative artificial intelligence, ChatGPT, Midjourney, educational technology ACM Reference Format: Lixiang Yan, Roberto Martinez-Maldonado, and Dragan Gašević. 2024. Generative Artificial Intelligence in Learning Analytics: Contextualising Opportunities and Challenges through the Learning Analytics Cycle. 1, 1 (December 2024), 17 pages. https://doi.org/ XXXXXXX.XXXXXXX 1 INTRODUCTION Generative artificial intelligence (GenAI), catalysed by the public release of ChatGPT in November 2022, has sparked a new era of innovation and productivity, particularly in the educational sector. Tools like ChatGPT, powered by state-of-the-art large language models (LLMs), have illustrated their potential in reshaping the educational landscape, fostering enhanced engagement and interactive learning experiences [47, 101]. A comprehensive scoping review has identified 53 different applications of LLMs in automating educational tasks [114]. Subsequent studies delving into ChatGPT and other LLM tools illustrated their capabilities in delivering comprehensive feedback, surpassing the efficacy Authors’ addresses: Lixiang Yan, Monash University, Australia; Roberto Martinez-Maldonado, Monash University, Australia; Dragan Gašević, Monash University, Australia. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2312.00088v1,"IEEE SENSORS JOURNAL, VOL. XX, NO. XX, XXXX 2024 Anomaly Detection via Learning-Based Sequential Controlled Sensing Abstract— In this paper, we address the problem of Environment detecting anomalies among a given set of binary processes via learning-based controlled sensing. Each pro- Process 1 cess is parameterized by a binary random variable in- Dynamic dicating whether the process is anomalous. To identify Process 2 the anomalies, the decision-making agent is allowed to sensor selection Our learning observe a subset of the processes at each time instant. .. . algorithm Also, probing each process has an associated cost. Our Noisy sensor objective is to design a sequential selection policy that Process N measurements dynamically determines which processes to observe at Output each time with the goal to minimize the delay in making the decision and the total sensing cost. We cast Anomalous this problem as a sequential hypothesis testing problem processes’ indices within the framework of Markov decision processes. This formulation utilizes both a Bayesian log-likelihood ratio-based reward and an entropy-based reward. The problem is then solved using two approaches: 1) a deep reinforcement learning-based approach where we design both deep Q-learning and policy gradient actor-critic algorithms; and 2) a deep active inference-based approach. Using numerical experiments, we demonstrate the efficacy of our algorithms and show that our algorithms adapt to any unknown statistical dependence pattern of the processes. Joint distribution Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, and Pramod K. Varshney Life Fellow, IEEE Index Terms— Active hypothesis testing, anomaly detection, active inference, quickest state estimation, sequential decision-making, sequential sensing. I. I NTRODUCTION Sequential controlled sensing refers to a stochastic framework in which an agent sequentially controls the process of acquiring observations. The goal here is to minimize the cost of making observations while satisfying the inference objectives. We consider a sequential controlled sensing problem in the context of anomaly detection wherein there are N processes, each of which can be in either a normal or an anomalous condition. Our goal is to identify the anomalies among the given processes. To this end, the decisionmaking agent sequentially chooses a subset of processes (or equivalently sensors monitoring these processes) at every time instant, probes them, and obtain estimates of their conditions. The agent generally obtains noisy observations, i.e., the ob- This work was supported in part by the National Science Foundation under grants ENG 60064237. The material in this paper was presented in part at the IEEE International Workshop on Signal Processing Advances in Wireless Communications, May 2020, Atlanta, GA, USA, and the IEEE Global Communications Conference, December 2020, Taipei, Taiwan. G. Joseph is with the faculty of Electrical Engineering, Mathematics, and Computer Science, Delft Technical University, 2628 XE, Netherlands (email: g.joseph@tudelft.nl). C. Zhong, M. C. Gursoy, S. Velipasalar, and P. K.Varshney are with the Department of Electrical and Computer Engineering, Syracuse University, New York, 13244, USA (emails:{czhong03,mcgursoy,svelipas,varshney}@syr.edu.) served condition may get flipped from the actual condition with a certain probability. This paradigm is encountered in many practical applications such as remote health monitoring, assembly lines, structural health monitoring and Internet of Things (IoT). In such applications, the objective is to identify the anomalies among a given set of different (not necessarily independent) functionalities of a system [1], [2]. Each sensor monitors a different functionality and sends observations to the agent over a communication link. The received observation may be distorted due to the unreliable nature of the sensor hardware and/or the noisy link (e.g., a wireless channel) between the sensor and the agent. Hence, the agent needs to probe each process multiple times before declaring one or more of the processes anomalous with the desired confidence. Repeatedly probing all the processes allows the agent to find any potential system malfunction or anomaly quickly, but this incurs a higher energy consumption that reduces the life span of the network. Therefore, we address the question of how the agent must sequentially choose the subset of processes to accurately detect the anomalies while minimizing the delay and cost of making observations. We start with a brief literature review. A classical approach to solve the sequential process selection problem for anomaly detection is based on the active hypothesis testing framework [3], [4]. Here, the decision-making agent constructs a 1" 2312.00094v1,"Fast ODE-based Sampling for Diffusion Models in Around 5 Steps Zhenyu Zhou Defang Chen * Can Wang Zhejiang University Chun Chen {zhyzhou, defchern, wcan, chenc}@zju.edu.cn Abstract Sampling from diffusion models can be treated as solving the corresponding ordinary differential equations (ODEs), with the aim of obtaining an accurate solution with as few number of function evaluations (NFE) as possible. Recently, various fast samplers utilizing higher-order ODE solvers have emerged and achieved better performance than the initial first-order one. However, these numerical methods inherently result in certain approximation errors, which significantly degrades sample quality with extremely small NFE (e.g., around 5). In contrast, based on the geometric observation that each sampling trajectory almost lies in a two-dimensional subspace embedded in the ambient space, we propose Approximate MEan-Direction Solver (AMED- Solver) that eliminates truncation errors by directly learning the mean direction for fast diffusion sampling. Besides, our method can be easily used as a plugin to further improve existing ODE-based samplers. Extensive experiments on image synthesis with the resolution ranging from 32 to 256 demonstrate the effectiveness of our method. With only 5 NFE, we achieve 7.14 FID on CIFAR-10, 13.75 FID on ImageNet 64×64, and 12.79 FID on LSUN Bedroom. Our code is available at https://github.com/zhyzhouu/ amed-solver. Figure 1. Synthesized images by Stable-Diffusion [31] with a default classifier-free guidance scale 7.5 and a text prompt “A Corgi on the grass surrounded by a cluster of colorful balloons”. Our method improves DPM-Solver++(2M) [25] in sample quality. training, but suffer from slow sampling speed, which poses a great challenge to their applications. Existing methods for accelerating diffusion sampling fall into two main streams. One is designing faster numerical solvers to increase step size while maintaining small truncation errors [10, 18, 22, 24, 40, 47]. They can be further categorized as single-step solvers and multi-step solvers [2]. The former computes the next step solution only using information from the current time step, while the latter uses multiple past time steps. These methods have successfully reduced the number of function evaluations (NFE) from 1000 to less than 20, almost without affecting the sample quality. Another kind of methods aim to build a one-to-one mapping between the data distribution and the pre-specified noise distribution [4, 23, 26, 36, 43], based on the idea of knowledge distillation. With a well-trained student model in hand, high-quality generation can be achieved with only one NFE. However, training such a student model either requires pre-generation of millions of images [23, 26], or huge training cost with carefully modified training proce- 1. Introduction Diffusion models have been attracting growing attentions in recent years due to their impressive generative capability [9, 31, 33, 35]. Given a noise input, they are able to generate a realistic output by performing iterative denoising steps with the score function [15, 39, 42]. This process can be interpreted as applying a certain numerical discretization on a stochastic differential equation (SDE), or more commonly, its corresponding probability flow ordinary differential equation (PF-ODE) [42]. Comparing to other generative models such as GANs [12] and VAEs [19], diffusion models have the advantages in high sample quality and stable * Corresponding author 1" 2312.00097v1,"SparseDC: Depth Completion from sparse and non-uniform inputs Chen Long 1 * Wenxiao Zhang 2 * Zhe Chen 1 Haiping Wang 1 Yuan Liu 3 Zhen Cao 1 Zhen Dong 1† Bisheng Yang 1† 1 2 Wuhan University Singapore University of Technology and Design 3 The University of Hong Kong 5 Points 500 Points wenxxiao.zhang@gmail.com,yuanly@connect.hku.hk Struct From Motion {chenlong107,ChenZhe WHU,hpwang,zhen.cao,dongzhenwhu,bshyang}@whu.edu.cn (a) RGB + Depth (b) NLSPN (c) CompletionFormer (e) Ours (d) Ground Truth Figure 1. Depth Completion from sparse and non-uniform inputs. From top to bottom, we show the completed depth of state-of-theart methods and ours using 500 depth points, 5 depth points, and non-uniform depth points obtained by SFM, respectively. Unlike the degradation of comparison methods, our framework can achieve reliable prediction under the above settings. Abstract tures in regions with no depth. The key of the embedder is an uncertainty-based fusion module called UFFM to balance the local and long-term information extracted by CNNs and ViTs. Extensive indoor and outdoor experiments demonstrate the robustness of our framework when facing sparse and non-uniform input depths. The pre-trained model and code are available at https://github.com/WHU- USI3DV/SparseDC. We propose SparseDC, a model for Depth Completion of Sparse and non-uniform depth inputs. Unlike previous methods focusing on completing fixed distributions on benchmark datasets (e.g., NYU with 500 points, KITTI with 64 lines), SparseDC is specifically designed to handle depth maps with poor quality in real usage. The key contributions of SparseDC are two-fold. First, we design a simple strategy, called SFFM, to improve the robustness under sparse input by explicitly filling the unstable depth features with stable image features. Second, we propose a two-branch feature embedder to predict both the precise local geometry of regions with available depth values and accurate struc- 1. Introduction Acquiring dense and accurate depth is crucial in various fields, such as autonomous driving[29, 55], 3D reconstruction[8, 26, 33], scene understanding[7, 21], AR/VR[35, 54]. Although the commonly used depth sensors, such as Microsoft Kinect[56], Intel RealSense[19], * These authors contribute equally to this work. † Corresponding authors. 1" 2312.00099v1,"Online Influence Maximization: Concept and Algorithm Jianxiong Guo Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai 519087, China jianxiongguo@bnu.edu.cn 1 Introduction Influence Maximization (IM) is a fundamental problem in the field of network analysis, particularly relevant in the domains of social networks, marketing, and information dissemination. At its core, the problem revolves around identifying the most influential nodes (individuals, entities, or elements) within a network to maximize the spread of information, behavior, or trends. Kempe et al. [1] first defined the IM problem as a combinatorial problem that selects a small subset of nodes such that maximizes the expected number of activated nodes (influence spread). This concept has gained significant attention with the rise of online social networks, where the spread of information can have far-reaching impacts. The influence spread is often modeled using various diffusion models, such as Independent Cascade (IC) and Linear Threshold (LT) models, which simulate how information or influence propagates through the network. Thus, the IM problem is usually characterized by a directed graph and a diffusion model together with model parameters (graph weights), which has been widely used in many real-world applications [2]. Diffusion models, such as IC and LT models, rely on parameters that define how influence propagates from one node to another in a network. These parameters might include the probability of a node influencing its neighbor, the threshold of influence required for a node to be activated, or the overall strength of influence between nodes. However, in real-world applications, these parameters are rarely directly observable and can be highly complex, which are usually unknown. A heuristic method to overcome this issue is to estimate the unknown parameters with high confidence and low error from the collected past observations, which is usually called the “Network Inference” problem [3][4][5][6][7][8][9][10]. However, they may face the difficulties of insufficient data logs, biases in data logs, and inability to adapt to changes. Here, we summarize the challenges posed by unknown parameters in the IM problem as follows: (1) Complex Social Dynamics: Social networks are characterized by complex and dynamic interactions. The factors influencing how information spreads can vary widely depending on the context, the nature of the information, and the characteristics of individuals involved. (2) Data Scarcity and Quality: Obtaining accurate and comprehensive data to estimate these parameters is challenging. Data might be incomplete, noisy, or biased, leading to inaccurate estimations of diffusion probabilities. (3) Adaptive Behaviors: Individuals in a network may change their behavior over time, influenced by external factors or their interactions within the network. This adaptive behavior makes it difficult to maintain a consistent set of parameters for influence diffusion. (4) Diversity of Influence: Different nodes may have different levels and types of influence. A one-size-fits-all approach to parameter estimation often fails to capture the nuances of individual nodes’ influence. Instead of network inference, the Online IM problem [11] represents a strategic shift in addressing the challenges of IM in dynamic and uncertain environments, like social networks. Unlike traditional IM approaches that rely on pre-existing models with fixed parameters, Online IM adopts an iterative, learning-based approach. This method allows for the progressive refinement of diffusion models and the identification of optimal seed sets based on real-time interactions with the network. The Online IM problem can be characterized by the following six points: (1) Iterative Learning: It operates through a series of rounds. In each round, a set of seed nodes is selected based on the current understanding of the network’s influence dynamics. The outcomes of these selections (i.e., how far and effectively the influence spreads from these 1" 2312.00103v1,"DeepEn2023: Energy Datasets for Edge Artificial Intelligence Xiaolong Tu Department of Computer Science Georgia State University Atlanta, GA 30302 xtu1@student.gsu.edu Anik Mallik Department of Electrical and Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223 amallik@uncc.edu Haoxin Wang Department of Computer Science Georgia State University Atlanta, GA 30302 haoxinwang@gsu.edu Jiang Xie Department of Electrical and Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223 linda.xie@uncc.edu Abstract Climate change poses one of the most significant challenges to humanity. As a result of these climatic changes, the frequency of weather, climate, and water-related disasters has multiplied fivefold over the past 50 years, resulting in over 2 million deaths and losses exceeding $3.64 trillion USD. Leveraging AI-powered technologies for sustainable development and combating climate change is a promising avenue. Numerous significant publications are dedicated to using AI to improve renewable energy forecasting, enhance waste management, and monitor environmental changes in real time. However, very few research studies focus on making AI itself environmentally sustainable. This oversight regarding the sustainability of AI within the field might be attributed to a mindset gap and the absence of comprehensive energy datasets. In addition, with the ubiquity of edge AI systems and applications, especially on-device learning, there is a pressing need to measure, analyze, and optimize their environmental sustainability, such as energy efficiency. To this end, in this paper, we propose large-scale energy datasets for edge AI, named DeepEn2023, covering a wide range of kernels, state-of-the-art deep neural network models, and popular edge AI applications. We anticipate that DeepEn2023 will improve transparency in sustainability in on-device deep learning across a range of edge AI systems and applications. For more information, including access to the dataset and code, please visit https://amai-gsu.github.io/DeepEn2023. 1 Introduction Environmentally-sustainable AI refers to the design and use of artificial intelligence (AI) and machine learning (ML) technologies to tackle environmental issues and advance sustainability [1], which is a two-sided research area: AI for sustainability and sustainability of AI [2, 3]. While there is growing interest in using AI to achieve the Sustainable Development Goals (SDGs) [4] related to climate change, research addressing the environmental impact of AI itself remains limited [5] [6] [7] [8]. For instance, a sophisticated AI-empowered Internet of Things (IoT) system can be deployed to monitor and predict the total carbon emissions of a building or factory, aligning with the objective of AI for sustainability. However, this raises new questions: How much carbon does this AI system emit? How sustainable is the AI system itself? Tackling Climate Change with Machine Learning: workshop at NeurIPS 2023." 2312.00125v1,"RASTI 000, 1–21 (2023) Preprint 4 December 2023 Compiled using rasti L A TEX style file v3.0 Scalable Bayesian uncertainty quantification with data-driven priors for radio interferometric imaging Tobías I. Liaudat 1,2,3★ , Matthijs Mars 2 , Matthew A. Price 2 , Marcelo Pereyra 4,5 , Marta M. Betcke 1 , and Jason D. McEwen 2,6 † 1 Department of Computer Science, University College London (UCL), London WC1E 6BT, UK 2 Mullard Space Science Laboratory (MSSL), University College London (UCL), Holmbury St Mary, Dorking, Surrey RH5 6NT, UK 3 IRFU, CEA, Université Paris-Saclay, F-91191 Gif-sur-Yvette, France 4 School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh, EH14 4AS, Scotland, UK 5 Maxwell Institute for Mathematical Sciences, Bayes Centre, 47 Potterrow, Edinburgh, Scotland, UK 6 Alan Turing Institute, Euston Road, London NW1 2DB, UK Accepted —. Received —; in original form — ABSTRACT Next-generation radio interferometers like the Square Kilometer Array have the potential to unlock scientific discoveries thanks to their unprecedented angular resolution and sensitivity. One key to unlocking their potential resides in handling the deluge and complexity of incoming data. This challenge requires building radio interferometric imaging methods that can cope with the massive data sizes and provide high-quality image reconstructions with uncertainty quantification (UQ). This work proposes a method coined QuantifAI to address UQ in radio-interferometric imaging with data-driven (learned) priors for high-dimensional settings. Our model, rooted in the Bayesian framework, uses a physically motivated model for the likelihood. The model exploits a data-driven convex prior, which can encode complex information learned implicitly from simulations and guarantee the logconcavity of the posterior. We leverage probability concentration phenomena of high-dimensional log-concave posteriors that let us obtain information about the posterior, avoiding MCMC sampling techniques. We rely on convex optimisation methods to compute the MAP estimation, which is known to be faster and better scale with dimension than MCMC sampling strategies. Our method allows us to compute local credible intervals, i.e., Bayesian error bars, and perform hypothesis testing of structure on the reconstructed image. In addition, we propose a novel blazing-fast method to compute pixel-wise uncertainties at different scales. We demonstrate our method by reconstructing radio-interferometric images in a simulated setting and carrying out fast and scalable UQ, which we validate with MCMC sampling. Our method shows an improved image quality and more meaningful uncertainties than the benchmark method based on a sparsity-promoting prior. QuantifAI’s source code and scripts for the numerical experiment of this paper are available from github.com/astro-informatics/QuantifAI. Key words: Machine Learning – Algorithms – Data methods 1 INTRODUCTION Radio astronomy plays a crucial role in expanding our understanding of the Universe, offering a unique perspective on astrophysical and cosmological phenomena. Among the transformative tools in an astronomer’s toolkit, radio interferometric (RI) imaging stands out as an indispensable technique. Aperture synthesis and radio interferometry (Thompson et al. 2017) allow us to achieve high angular resolutions providing immense power to resolve objects. Furthermore, radio frequency signals are only weakly attenuated by our atmosphere, allowing for observations at the Earth’s surface. The unparalleled angular resolution, high sensitivity and the different phenomena emitting in the radio wavelength regime make RI an ideal candidate to reshape our understanding of the Universe and push the boundaries of science. ★ E-mail: tobiasliaudat@gmail.com † E-mail: jason.mcewen@ucl.ac.uk © 2023 The Authors The advent of the Square Kilometre Array (SKA, Dewdney et al. 2009) heralds a new era in radio astronomy (Braun et al. 2015) spanning the study from the epoch of reionisation and fast radio bursts to galaxy evolution and dark energy. SKA’s vast collecting area and sensitivity promise to revolutionise our observational capabilities, opening doors to discoveries we can barely imagine today. However, this transformative potential comes with the formidable computational challenge of processing and making sense of the unprecedented volume of SKA-generated data. Developing and implementing algorithms that can efficiently handle SKA’s data deluge is a challenge. In addition, achieving the high reconstruction performance required to unlock SKA’s full potential is a significant obstacle in the SKA’s data processing requirements. The aperture synthesis techniques in RI probe the sky by acquiring specific Fourier measurements, which results in incomplete coverage of the Fourier domain of the sky’s image of interest. Adding observational noise to the incomplete Fourier coverage makes the problem of estimating the underlying sky image an ill-posed inverse" 2312.00146v1,"Characterisation of the laminar pulsatile flow in toroidal pipes Valerio Lupi, 1, ∗ J. Simon Kern, 2 and Philipp Schlatter 1, 3 1 SimEx/FLOW, Engineering Mechanics, KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden 2 FLOW Turbulence Lab., Engineering Mechanics, KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden 3 Institute of Fluid Mechanics (LSTM), Friedrich–Alexander–Universität Erlangen–Nürnberg (FAU), DE-91058 Erlangen, Germany This study analyses the main characteristics of the fully developed laminar pulsatile flow in a toroidal pipe as the governing parameters vary. A novel computational technique is developed to obtain time-periodic solutions of the Navier–Stokes equations. They are computed as fixed points of the system in the frequency domain via a Newton–Raphson method. Advantages and drawbacks of the adopted methodology with respect to a time-stepping technique are discussed. The unsteady component of the driving pressure gradient is found to change linearly with the pulsation amplitude, with a proportionality coefficient dependent on the pulsation frequency. Although the time-averaged streamwise wall shear stress is very close to the value in the steady case, significant fluctuations are observed within the period. Flow reversal occurs during certain time intervals in the period for high pulsation amplitudes. The analysis of the spatial structure of the unsteady component of the velocity field shows that three different flow regimes can be identified, depending on the pulsation frequency, termed quasi-steady, intermediate and plug-flow regimes. I. INTRODUCTION The flow in curved pipes is characterised by a secondary motion of Prandtl’s first kind [1] which increases, for instance, the heat transfer and the mixing. These effects are exploited in many industrial applications, e.g. in cooling systems of nuclear reactors and food processing (see Vashisth et al. [2] for an extensive review on the topic). There are two main dimensionless parameters that govern this family of flows: the Reynolds number Re, based on the bulk velocity U b , the pipe radius R p , and the fluid kinematic viscosity ν, i.e. Re = U b R p /ν, and the curvature δ, defined as the ratio between the radius of the cross-section of the pipe and the radius of curvature at the pipe centreline, i.e. δ = R p /R c . The flow in curved pipes has drawn the attention of the scientific community since the beginning of the 19 th century. In his pioneering works, Eustice [3, 4] investigated how the curvature affects the transition to turbulence and showed experimentally that secondary flow occurs in curved pipes. Later, Dean [5, 6] derived an asymptotic solution of the incompressible Navier–Stokes equations in the limit of small curvatures and mathematically proved the existence of a secondary √ motion consisting of two symmetric, counter-rotating vortices, named after him. The Dean number De = 2 Re δ was found to be the only non-dimensional governing parameter in the solution. This result was later confirmed in the experiments of Itō [7], who measured the friction factor in curved pipes and derived an empirical relation based on the Dean number. The Dean-number similarity has been considered to hold to even higher curvatures of order 0.1 until the recent paper by Canton et al. [8], who pointed out that it is valid only for δ < 10 −6 and De < 10. The aforementioned studies investigated laminar steady or statistically steady turbulent flows. On the other hand, several flows of biological interest are unsteady, one of the most prominent examples being the blood flow through the main arteries [9]. Even industrial processes often deal with unsteady flows, as in the case of reciprocating engines [10]. These unsteady flows can be divided into two main categories: purely oscillatory flows (also named sinusoidal in the literature), i.e. with zero mean velocity, and pulsatile flows, which have a non-vanishing mean flow rate. For the time-periodic flow in a straight pipe, a general closed-form solution can be derived in both cases [11, 12] since the problem becomes linear. However, the non-linearity of the Navier–Stokes equations remains in the case of curved geometries, making the analytical treatment of the problem considerably more challenging. To the best of the authors’ knowledge, Lyne [13] was the first to compute a solution for the oscillatory flow in a curved pipe by means of matched asymptotic expansions, valid for small curvatures and a thin Stokes layer, i.e. high pulsation frequency. The analysis revealed the occurrence of a secondary flow in the Stokes layer, surrounding a steady, two-vortex motion in the core of the pipe, which has an opposite direction compared to that predicted by Dean [5, 6] in the steady case. Hankel transforms were instead used by Zalosh and Nelson [14] to derive a solution in the infinitely small curvature limit but without any restriction on the pulsation frequency. Smith [15] conducted an ∗ lupi@mech.kth.se" 2312.00154v1,"The general Dabrowski-Sitarz-Zalecki type theorem for odd dimensional manifolds with boundary II Hongfeng Li, Yong Wang ∗ School of Mathematics and Statistics, Northeast Normal University, Changchun, 130024, China Abstract In [19], a general Dabrowski-Sitarz-Zalecki type theorem for odd dimensional manifolds with boundary was proved. In this paper, we give the proof of the another general Dabrowski-Sitarz-Zalecki type theorem for the spectral Einstein functional associated with the Dirac operator on odd dimensional manifolds with boundary. Keywords: Dirac operators; the spectral Einstein functional; the Dabrowski-Sitarz-Zalecki type theorem 1. Introduction The noncommutative residue found in [7, 10] plays a prominent role in noncommutative geometry. For one-dimensional manifolds, the noncommutative residue was discovered by Adler [1] in connection with geometric aspects of nonlinear partial differential equations. For arbitrary closed compact n-dimensional manifolds, the noncommutative residue was introduced by Wodzicki in [10] using the theory of zeta functions of elliptic pseudo-differential operators. In [3], Connes used the noncommutative residue to derive a conformal 4-dimensional Polyakov action analogy. Connes showed us that the noncommutative residue on a compact manifold M coincided with the Dixmier’s trace on pseudo-differential operators of order −dimM in [4]. And Connes claimed that the noncommutative residue of the square of the inverse of the Dirac operator was proportioned to the Einstein-Hilbert action. Kastler [9] gave a brute-force proof of this theorem. Kalau and Walze proved this theorem in the normal coordinates system simultaneously in [8] . Ackermann proved that the Wodzicki residue of the square of the inverse of the Dirac operator Wres(D −2 ) in turn is essentially the second coefficient of the heat kernel expansion of D 2 in [2]. On the other hand, Wang generalized the Connes’ results to the case of manifolds with boundary in [14, 15], and proved the Kastler-Kalau-Walze type theorem for the Dirac operator and the signature operator ] + D −1 ◦ π + D −1 ] and on lower-dimensional manifolds with boundary [16]. In [16, 17], Wang computed Wres[π ] + D −2 ◦ π + D −2 ], where the two operators are symmetric, in these cases the boundary term vanished. Wres[π ] + D −1 ◦π + D −3 ], the authors got a nonvanishing boundary term [12], and give a theoretical ex- But for Wres[π planation for gravitational action on boundary. In [5], the authors defined bilinear functionals of vector fields and differential forms, the densities of which yielded the metric and Einstein tensors on even dimensional Rie- ] + (c(X)D −1 ) ◦ mannian manifolds. The authors computed the generalized noncommutative residue Wres[π S(T M) S(T M) ] + (∇ ] + (∇ D −2 ) ◦ π + (D −(2m−2) )] on D −1 ) ◦ π + (D −(2m−1) )] and Wres[π π + (D −(2m−2) )], Wres[π X X odd dimensional manifolds with boundary [19]. In [20], the authors defined the spectral Einstein functional associated with the Dirac operator for manifolds with boundary, and computed the noncommutative ] + (∇ S(T M) ∇ S(T M) D −2 ) ◦ π + (D −(n−2) )] and Wres[π ] + (∇ S(T M) ∇ S(T M) D −1 ) ◦ π + (D −(n−1) )] residue Wres[π X Y X Y on even and odd dimensional compact manifolds. The motivation of this paper is to prove the ∗ Corresponding author. Email addresses: lihf728@nenu.edu.cn (Hongfeng Li), wangy581@nenu.edu.cn (Yong Wang) Preprint submitted to Springer December 4, 2023" 2312.00155v1,"A Threshold Greedy Algorithm for Noisy Submodular Maximization Wenjing Chen 1 , Shuo Xing 1 , and Victoria G. Crawford 1 1 Department of Computer Science & Engineering, Texas A&M University Abstract We consider the optimization problem of cardinality constrained maximization of a monotone submodular set function f : 2 U → R ≥0 (SM) with noisy evaluations of f . In particular, it is assumed that we do not have value oracle access to f , but instead for any X ⊆ U and u ∈ U we can take samples from a noisy distribution with expected value f (X ∪ {u}) − f (X). Our goal is to develop algorithms in this setting that take as few samples as possible, and return a solution with an approximation guarantee relative to the optimal with high probability. We propose the algorithm Confident Threshold Greedy (CTG), which is based on the threshold greedy algorithm of Badanidiyuru and Vondrák [1] and samples adaptively in order to produce an approximate solution with high probability. We prove that CTG achieves an approximation ratio arbitrarily close to 1 − 1/e, depending on input parameters. We provide an experimental evaluation on real instances of SM and demonstrate the sample efficiency of CTG. 1 Introduction Submodularity is a property of set functions that arises in many applications such as cut functions in graphs [2], coverage functions [3], data summarization objectives [4], information theoretic quantities such as mutual information [5], and viral marketing in social networks [6]. A function f : 2 U → R ≥0 defined over subsets of the universe U of size n is submodular if for all X ⊆ Y ⊆ U and u ∈ / Y , f (Y ∪ {u}) − f (Y ) ≤ f (X ∪ {u}) − f (X). In addition, in many applications of submodular functions f is monotone [4, 5, 6], meaning that for all X ⊆ Y ⊆ U , f (X) ≤ f (Y ). Approximation algorithms for the NP-hard problem of maximization of a monotone submodular function subject to a cardinality constraint (SM) has received a wealth of attention [7, 1, 8, 9]. SM is defined as follows: Given a cardinality constraint (or “budget”) κ, and a monotone submodular function f : 2 U → R ≥0 where |U | = n, SM is to find the set argmax{f (X) : X ⊆ U, |X| ≤ κ}. Proposed algorithms typically are assumed to have value oracle access to f . That is, f is a black box that can be queried for any X ⊆ U and the value of f (X) is returned. It is well-known that the standard greedy algorithm achieves the optimal (1 − 1/e)-approximation guarantee for SM and makes O(nκ) queries to f [7]. However, in some applications querying the exact value of f is unrealistic, and instead a more realistic assumption is that we can query f subject to some noise. Therefore there has been an effort to develop and analyze approximation algorithms for SM under this more challenging setting [10, 11, 12, 13, 14, 15]. In particular, one setting for SM is that we are not able to query the exact value of f , but instead, for any X ⊆ U and u ∈ U , we are able to take noisy samples from a distribution D(S, u) whose expected value is the marginal gain ∆f (S, u) = f (S ∪ {u}) − f (S). 1" 2312.00158v1,"Fibered 3-manifolds with unique incompressible surfaces T OMMASO C REMASCHI A NDREW Y ARMOLA Abstract: We present a family M g of fibered hyperbolic 3-manifolds whose fibre F g is the unique connected incompressible surface and the genus g ≥ 2 of F g can be arbitrary. This answers a question of Agol. 1 Introduction In [1], Agol asks whether there exists fibered 3-manifolds, of arbitrarily high genus, whose fibre F is the unique incompressible surface. In the present note, we construct closed (hyperbolic) fibered 3-manifolds with this property for every genus g ≥ 2. Our construction is based on the well known work of Hatcher and Thurston [4], where the incompressible and ∂ -incompressible surfaces in two-bridge knots are classified. We also make use of the work of Curtis-Franczak-Leiser-Manheimer [2] to understand when two such surfaces have the same boundary slope. Theorem 1 For every g ≥ 2, there exists a closed 3-manifold M g fibered over S 1 where the fibre F g has genus g and is the unique connected incompressible surface. Our family {M g } g≥2 is given by 0-surgery on a family of fibered 2-bridge knots that have a unique essential surface with slope 0, namely the fibre. The construction presented here is potentially known to experts, but we were unable to find a published reference. We did find two examples with g = 2 posted on MathOverflow by Hatcher [5] that are also constructed as 0-surgery fibered 2-bridge knots." 2312.00163v1,"Just add WATER: WebAssembly-based Circumvention Transports Erik Chi University of Michigan ziyunchi@umich.edu Gaukas Wang Eric Wustrow University of Michigan jhalderm@umich.edu Jack Wampler University of Colorado Boulder ewust@colorado.edu University of Colorado Boulder Jack.Wampler@colorado.edu which encrypts all of its traffic including protocol headers in an attempt to evade protocol fingerprinting attacks [16, 20]. While successful in the short term, this was again insufficient as in censors like China deployed active probing attacks to detect early versions of the protocol [10, 35], which prompted circumventors to develop probe-resistant proxies [29, 36]. Censors then found and exploited other side-channels and vulnerabilities to differentiate circumvention traffic [1, 15]. Once these problems were addressed, censors began using other features to detect and block fully-encrypted proxies such as entropy measurements [37], and circumventors responded by using prefixes that fool these measurements [13, 37]. Discovering, implementing, and operationalizing circumvention techniques like these can be burdensome, requiring new code and configurations to be written, packaged, approved for distribution by app stores, and pushed to users. Furthermore, each circumvention tool may need to write and maintain their own version specific to their environment, potentially built using an entirely different programming language, adding to the cost. ABSTRACT As Internet censors rapidly evolve new blocking techniques, circumvention tools must also adapt and roll out new strategies to remain unblocked. But new strategies can be time consuming for circumventors to develop and deploy, and usually an update to one tool often requires significant additional effort to be ported to others. Moreover, distributing the updated application across different platforms poses its own set of challenges. In this paper, we introduce WATER (WebAssembly Transport Executables Runtime), a novel design that enables applications to use a WebAssembly-based application-layer to wrap network transports (e.g., TLS). Deploying a new circumvention technique with WATER only requires distributing the WebAssembly Transport Module(WATM) binary and any transport-specific configuration, allowing dynamic transport updates without any change to the application itself. WATMs are also designed to be generic such that different applications using WATER can use the same WATM to rapidly deploy successful circumvention techniques to their own users, facilitating rapid interoperability between independent circumvention tools. obfs4 KEYWORDS .wasm Transport Specs censorship, circumvention, transport, network, WebAssembly ACM Reference Format: Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, and Jack Wampler. YYYY. Just add WATER: WebAssembly-based Circumvention Transports. In Proceedings of Proceedings on Privacy Enhancing Technologies. ACM, New York, NY, USA, 7 pages. https://doi.org/XXXXXXX.XXXXXXX 1 J. Alex Halderman University of Colorado Boulder Gaukas.Wang@colorado.edu Application built w/ WATERAppData Application built w/ WATERAppData Application built w/ WATERAppData ? INTRODUCTION The arms race between censors and circumventors continues to evolve with new tools and tactics emerging from both sides: Censors deploy new mechanisms that block proxies, and in response circumventors develop new techniques that get around the blocking [1, 31, 37, 38]. Because of it’s dynamic nature, successful circumvention tools must continually develop and deploy new strategies and techniques to get around emerging censorship. For instance, in 2012, Iran blocked several proxies, including Tor, by using an early form of SSL fingerprinting [23]. In response, Tor developed obfsproxy [24], W.A.T.E.R. Censor Remote Peer Figure 1: The overview of WATER’s role in action. With transport specs defined by .wasm files distributed out-of-band, WA- TER can efficiently switch between transports to use. In this paper, we introduce an approach to ease the burden of developing and deploying new circumvention techniques in the ongoing censorship arms race. Our technique, WATER (WebAssembly Transport Executables Runtime), uses WebAssembly, a binary instruction format that has runtime support across several platforms including web browsers and mobile devices. WebAssembly applications can be written in high-level languages like C or Rust, and compiled to a cross-platform binary. These binaries can make low-level system calls to make network connections, thanks to standards like the WebAssembly System Interface (WASI) [5]. We extend these tools and standards to make WATER, a library that This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license visit https://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Proceedings on Privacy Enhancing Technologies YYYY(X), 1–7 © YYYY Copyright held by the owner/author(s). https://doi.org/XXXXXXX.XXXXXXX 1" 2312.00166v1,"Causes and consequences of dispersal in biodiverse spatially structured systems: what is old and what is new? Emanuel A. Fronhofer 1,∗ , Dries Bonte 2 , Elvire Bestion 3 , Julien Cote 4 , Jhelam N. Deshpande 1 , Alison B. Duncan 1 , Thomas Hovestadt 5 , Oliver Kaltz 1 , Sally Keith 6 , Hanna Kokko 7 , Delphine Legrand 3 , Sarthak P. Malusare 1 , Thomas Parmentier 2,8 , Camille Saade 1 , Nicolas Schtickzelle 9 , Giacomo Zilio 1 and François Massol 10 1. ISEM, University of Montpellier, CNRS, IRD, EPHE, Montpellier, France 2. Terrestrial Ecology Unit (TEREC), Department of Biology, Ghent University, K.L. Ledeganckstraat 35, B-9000 Ghent, Belgium 3. Station d’Ecologie Théorique et Expérimentale, CNRS, UAR 2029, F-09200 Moulis, France 4. Laboratoire Évolution & Diversité Biologique, CNRS, Université Toulouse III Paul Sabatier, IRD; UMR5174, 118 route de Narbonne, F-31062 Toulouse, France 5. Department Animal Ecology and Tropical Biology, Biozentrum, University of Würzburg, Würzburg, Germany 6. Lancaster Environment Centre, Lancaster University, Lancaster, LA1 4YQ, UK 7. Institute of Organismic and Molecular Evolution, Johannes Gutenberg University, 55128 Mainz, Germany 8. Research Unit of Environmental and Evolutionary Biology, Namur Institute of Complex Systems, and Institute of Life, Earth, and the Environment, University of Namur, Rue de Bruxelles 61, 5000 Namur, Belgium 9. Earth and Life Institute, UCLouvain, B-1348 Louvain-la-Neuve, Belgium 10. Institut Pasteur de Lille, Univ. Lille, CNRS, Inserm, CHU Lille, U1019 - UMR 9017 - CIIL - Center for Infection and Immunity of Lille, Lille, France Keywords: Metapopulation, Metacommunity, Migration, Food web, Species interactions, Plasticity Correspondence Details Emanuel A. Fronhofer Institut des Sciences de l’Evolution de Montpellier, UMR5554 Université de Montpellier, CC065, Place E. Bataillon, 34095 Montpellier Cedex 5, France phone: +33 (0) 4 67 14 31 82 email: emanuel.fronhofer@umontpellier.fr" 2312.00169v1,"Integration of Swin UNETR and statistical shape modeling for a semiautomated segmentation of the knee and biomechanical modeling of articular cartilage Reza Kakavand 1 , Mehrdad Palizi 2 , Peyman Tahghighi 1 , Reza Ahmadi 1 , Neha Gianchandani 1 , Samer Adeeb 2 , Roberto Souza 3,4 , W. Brent Edwards 1 , Amin Komeili 1* 1 Department of Biomedical Engineering, Schulich School of Engineering, University of Calgary 2 Civil and Environmental Engineering Department, Faculty of Engineering, University of Alberta 3 Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary 4 Hotchkiss Brain Institute, Cumming School of Medicine, University of Calgary Corresponding author: Amin Komeili * amin.komeili@ucalgary.ca Address: ICT243, 2500 University Drive NW, Calgary, AB, T2N 1N4" 2312.00171v1,"1 @article{JonesBurns-23b, author = {Jones, Cliff B. and Burns, Alan}, doi = {10.1007/s10703-023-00441-y}, journal = {Formal Methods in System Design}, title = {Extending rely-guarantee thinking to handle real-time scheduling}, url = {https://link.springer.com/article/10.1007/s10703-023-00441-y}, year = {2023}}" 2312.00174v1,"Compression of end-to-end non-autoregressive image-to-speech system for lowresourced devices Gokul Srinivasagan 1,2 , Michael Deisher 2 , Munir Georges 3,4 1 Saarland University, Saarbrucken, Germany 2 Intel Corporation, Hillsboro, Oregon, USA 3 Intel Labs, Munich, Germany 4 Technische Hochschule Ingolstadt gokulsrinivasagan@gmail.com,{michael.deisher,munir.georges}@intel.com Abstract People with visual impairments have difficulty accessing touchscreen-enabled personal computing devices like mobile phones and laptops. The image-to-speech (ITS) systems can assist them in mitigating this problem, but their huge model size makes it extremely hard to be deployed on low-resourced embedded devices. In this paper, we aim to overcome this challenge by developing an efficient endto-end neural architecture for generating audio from tiny segments of display content on low-resource devices. We introduced a vision transformers-based image encoder and utilized knowledge distillation to compress the model from 6.1 million to 2.46 million parameters. Human and automatic evaluation results show that our approach leads to a very minimal drop in performance and can speed up the inference time by 22%. Index Terms: Optical character recognition (OCR), Text-to-speech (TTS), Image-to-speech (ITS), Knowledge distillation (KD) 1 Introduction In recent years, several advancements have been made in touchscreen-enabled personal computing devices such as cell phones, tablets, and laptops. Despite these advancements, people with visual impairments continue to have difficulty accessing these devices. Screen readers can help users to some extent. But they are OS-dependent and do not function on the blue screen of death (BSOD) or preboot environments. They also have limitations on legacy applications and dealing with text embedded in images. One solution to overcome this problem is having an optical character recognition (OCR) or image-to-text module for extracting text and a text-to-speech (TTS) module for generating audio from the text. But having the two independent modules in the pipeline leads to the propagation of errors from one module to another. Moreover, optimizing the modules individually makes the system sub-optimal. Also, auto-regressive text-to-speech models incur a delay that adds to the total inference time. A non-autoregressive end-to-end image-to-speech (ITS) addresses both inference time and accuracy challenges. Earlier work [1] introduced the first end-to-end non-auto-regressive neural ITS model. It was designed to be deployed on an independent embedded subsystem, thereby making it robust to OS failures. But the model was not compact and there is an opportunity to significantly reduce power and die size (cost) by further reducing the size of the model. In order to achieve this, in this work, we try to reduce the memory footprint of the models without a major impact on the accuracy. We employ knowledge distillation to reduce the size of the ITS model. We also incorporate the latest vision transformer-based scene text recognition model for improving the accuracy of the ITS system. Having a smaller model also leads to reduced inference time, thereby decreasing the delay between the user touching a word on the screen and generation of the corresponding audio by the system. 2 Background and Related Work Optical character recognition (OCR) and text-to-speech (TTS) are two domains of research, which have seen ground-breaking developments in recent years. There is a rise in the development of small non-autoregressive TTS models [2–4], which can generate high-quality audio in a few milliseconds. But, the image-to-speech domain is still under-explored. We follow the approach suggested by Chen et al. [1] for developing an efficient nonautoregressive end-to-end ITS system. Transformer-based models have produced state-of-theart results not only in natural language processing but also in computer vision tasks. The vision transformer [5] has proven to perform better than advanced CNN-based models with significantly lower computational resource requirements during training. This motivated researchers to adapt transformer-based models to other computer vision tasks [6]. Since vision transformer-based scene text recognition (ViTSTR) models have shown better performance than other similar-sized CNN models on OCR tasks [7], we utilize these models as an image encoder. Several model compression approaches are used specifically for the compression of large-scale transformerbased models. Some of the popular approaches include i) knowledge distillation, ii) quantization, and iii) pruning. Knowledge distillation [8] involves the transfer of knowledge from a large teacher model to a small student model to mimic the functioning of the teacher. The knowledge distillation can be performed with the model’s intermediate outputs, final outputs, or both. Knowledge distillation from output logits forces the student to replicate the teacher models’ output, whereas intermediate knowledge distillation forces the student model to replicate the individual layer of the teacher. Quantization [9] involves representing the model weights with a reduced number of bits. It can also reduce the model size and inference time if the underlying computation device is optimized for low-precision operations. Pruning [10] is another popular model compression approach, which focuses on identifying and removing the less important components or weights from the model to improve performance. We wanted our ITS system to be as small as possible with comparative performance, which can be aided by knowledge distillation. Several works have proven the effectiveness of the knowl-" 2312.00176v1,"Ellora: Exploring Low-Power OFDM-based Radar Processors using Approximate Computing Rajat Bhattacharjya ∗ , Alish Kanani † , A Anil Kumar ‡ , Manoj Nambiar ‡ , M Girish Chandra ‡ , and Rekha Singhal § ∗ University of California, Irvine † University of Wisconsin-Madison ‡ TCS Research, India § TCS Research, USA rajatb1@uci.edu, ahkanani@wisc.edu, {achannaanil.kumar, m.nambiar, m.gchandra, rekha.singhal}@tcs.com Abstract—In recent times, orthogonal frequency-division multiplexing (OFDM)-based radar has gained wide acceptance given its applicability in joint radar-communication systems. However, realizing such a system on hardware poses a huge area and power bottleneck given its complexity. Therefore it has become ever-important to explore low-power OFDM-based radar processors in order to realize energy-efficient joint radar-communication systems targeting edge devices. This paper aims to address the aforementioned challenges by exploiting approximations on hardware for early design space exploration (DSE) of trade-offs between accuracy, area and power. We present Ellora, a DSE framework for incorporating approximations in an OFDM radar processing pipeline. Ellora uses pairs of approximate adders and multipliers to explore design points realizing energy-efficient radar processors. Particularly, we incorporate approximations into the block involving periodogram based estimation and report area, power and accuracy levels. Experimental results show that at an average accuracy loss of 0.063% in the positive SNR region, we save 22.9% of on-chip area and 26.2% of power. Towards achieving the area and power statistics, we design a fully parallel Inverse Fast Fourier Transform (IFFT) core which acts as a part of periodogram based estimation and approximate the addition and multiplication operations in it. The aforementioned results show that Ellora can be used in an integrated way with various other optimization methods for generating low-power and energy-efficient radar processors. Index Terms—OFDM radar, Approximate computing, Low-power design, Periodogram based estimation, IFFT. Target Transmit Data Modulation Transmit Signal Range Profile Periodogram Based Estimation Received Signal Channel Simulation Fig. 1: OFDM Radar processing pipeline. Approximated block highlighted in red. power-constrained edge devices, it becomes important to achieve solutions targeting low-power and energy-efficient hardware. There have been some works targeting efficient hardware in JRC. One work focused on introducing zero-padding in OFDM-based radar as opposed to the usual cyclic prefix [5]. Another work focused on introducing hybrid precoding and dynamic selection of optimal RF chains [6]. Kaushik et al. proposed an energy-efficient RF chain and DAC bit selection procedure [7]. However studies focusing on low-power and energy-efficient systems in particular for JRC are limited and thus in this paper, we focus on addressing this problem. In this paper, we propose a design space exploration (DSE) framework, Ellora for generating low-power radar processors pertaining to OFDM waveforms using approximate computing [8]. Approximate computing is a computing paradigm that aims at achieving energy efficiency at the expense of tolerable inexactness I. I NTRODUCTION in applications [8]–[10]. Arithmetic units such as adders and multipliers form the basic building blocks in all such approximate Systems involving sensing and communication have been systems [11]–[14]. Ellora helps find out the approximation target historically separate [1]. However, recently the domain of joint in the application pipeline and incorporates pairs of approximate radar-communication (JRC) has emerged, where a radar and adders and multipliers in the targeted block to achieve area a communication system are co-located in a single system. and power savings with just a marginal loss of accuracy. The Such a system helps in optimal utilization of spectral resources approximation target is found to be the block involving periand benefits both sensing and signalling via cooperation odogram based estimation (shown in Fig. 1) since it involves the between them [2]. JRC systems find applications in vehicle- computationally-intensive Inverse Fast Fourier Transform (IFFT) to-vehicle (V2V) communication scenarios for enabling various and shows error-resilience. Though there have been some works safety functions, smart traffic applications and developing focusing on approximate FFT [15], [16], we showcase a DSE autonomous vehicles [3]. However such systems suffer from framework across an end-to-end application pipeline (OFDM- great complexity and hardware overheads given the complex radar for JRC) along with a fully parallel hardware design. Ellora digital signal processing techniques employed in them [4]. explores optimal accuracy-power-area design points in order to Systems involving orthogonal frequency-division multiplexing generate low-power radar processors. Experiments show that at (OFDM) waveforms offer great interoperability between both an average accuracy loss of 0.063% in the positive SNR region, radar and communication system [1]. However, in order to target Ellora helps save 22.9% of on-chip area and 26.2% of power. Paper accepted at IEEE-LASCAS 2024. Authors’ version of the work posted for personal use and not for redistribution. The definitive version will be available in the Proceedings of the IEEE-LASCAS 2024. II. M ETHODOLOGY Fig. 1 outlines the complete radar processing pipeline and highlights the block of approximation, i.e, the block involving" 2312.00179v1,"Duality between the Maxwell-Chern-Simons and self-dual models in very special relativity Fernando M. Belchior 1, ∗ and Roberto V. Maluf 1, 2, † 1 Universidade Federal do Ceará (UFC), Departamento de Fı́sica, Campus do Pici, Fortaleza - CE, C.P. 6030, 60455-760 - Brazil. 2 Departamento de Fı́sica Teórica and IFIC, Centro Mixto Universidad de Valencia - CSIC. Universidad de Valencia, Burjassot-46100, Valencia, Spain. Abstract This work aims to investigate the classical-level duality between the SIM (1)-Maxwell-Chern- Simons (MCS) model and its self-dual counterpart. Initially, our focus is on free-field cases to establish equivalence through two distinct approaches: comparing the equations of motion and utilizing the master Lagrangian method. In both instances, the classical correspondence between the self-dual field and the MCS dual field undergoes modifications due to very special relativity (VSR). Specifically, duality is established only when the associated VSR-mass parameters are the same. Furthermore, we analyze the duality when the self-dual model is minimally coupled to fermions. As a result, we show that Thirring-like interactions, corrected for non-local VSR contributions, are included in the MCS model. Additionally, we demonstrate the equivalence of the fermion sectors in both models, thereby concluding the proof of classical-level duality. Keywords: Duality, Very special relativity, Maxwell–Chern–Simons theory ∗ Electronic address: belchior@fisica.ufc.br † Electronic address: r.v.maluf@fisica.ufc.br 1" 2312.00183v1,"RNA-KG: An ontology-based knowledge graph for representing interactions involving RNA molecules Emanuele Cavalleri 1 , Alberto Cabri 1 , Mauricio Soto-Gomez 1 , Sara Bonfitto 1 , Paolo Perlasca 1 , Jessica Gliozzo 1 , Tiffany J. Callahan 2 , Justin Reese 3 , Peter N Robinson 4 , Elena Casiraghi 1 , Giorgio Valentini 1 , and Marco Mesiti 1,* 1 AnacletoLab, Computer Science Department, University of Milan, 20122, Italy 2 Department of Biomedical Informatics, Columbia University Irving Medical Center, New York, NY 10032, USA 3 Environmental Genomics and Systems Biology Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA 4 Berlin Institute of Health - Charité, Universitätsmedizin, Berlin, 13353, Germany * corresponding author(s): Marco Mesiti (marco.mesiti@unimi.it) ABSTRACT The ""RNA world"" represents a novel frontier for the study of fundamental biological processes and human diseases and is paving the way for the development of new drugs tailored to the patient’s biomolecular characteristics. Although scientific data about coding and non-coding RNA molecules are continuously produced and available from public repositories, they are scattered across different databases and a centralized, uniform, and semantically consistent representation of the ""RNA world"" is still lacking. We propose RNA-KG, a knowledge graph encompassing biological knowledge about RNAs gathered from more than 50 public databases, integrating functional relationships with genes, proteins, and chemicals and ontologically grounded biomedical concepts. To develop RNA-KG, we first identified, pre-processed, and characterized each data source; next, we built a meta-graph that provides an ontological description of the KG by representing all the bio-molecular entities and medical concepts of interest in this domain, as well as the types of interactions connecting them. Finally, we leveraged an instance-based semantically abstracted knowledge model to specify the ontological alignment according to which RNA-KG was generated. RNA-KG can be downloaded in different formats and also queried by a SPARQL endpoint. A thorough topological analysis of the resulting heterogeneous graph provides further insights into the characteristics of the ""RNA world"". RNA-KG can be both directly explored and visualized, and/or analyzed by applying computational methods to infer bio-medical knowledge from its heterogeneous nodes and edges. The resource can be easily updated with new experimental data, and specific views of the overall KG can be extracted according to the bio-medical problem to be studied. Background & Summary The involvement of RNAs in various physiological processes has been ascertained by several studies 1–3 that have revealed the pervasive transcription of an unexpected variety of RNA molecules 4 that can lead to a significant breakthrough in the treatment of cancer, genetic, and neurodegenerative disorders, cardiovascular and infectious diseases 5 . The study of RNA is also one of the most promising avenue of research in therapeutics, as evidenced by the recent success of mRNA-based vaccines for the COVID-19 pandemic 6 , for the treatment of melanoma 7 , for the development of new drugs that can target both proteins and mRNA, as well as other non-coding RNA, and for encoding missing or defective proteins, regulating the transcriptome, and mediating DNA or RNA editing 8 . Thus, RNA technology significantly broadens the set of druggable targets, and is also less expensive than other technologies (e.g., drug synthesis based on recombinant proteins), due to the relatively simple structure of RNA molecules that facilitate their biochemical synthesis and chemical modifications 9 . Non coding RNAs (ncRNAs) comprise a large range of RNA species, and a large set of scientific data representing different kinds of interactions among them and with other bio-entities (e.g., genes, proteins, chemicals, diseases, and phenotypes) are made publicly available by several genomics laboratories. The possibility of integrating the interactions that they made available would be of great relevance for knowledge discovery and also for the development of new RNA-based drugs. However, these sources adopt different data models, formats, and conventions for the representation of the bio-entities, and different semantics can be assigned to the proposed interactions. The extraction and integration of information from even two data sources for conducting knowledge discovery activity would require a lot of effort from researchers. To address these issues, KGs 10 have emerged as a compelling abstraction for organizing interrelated knowledge in different domains and a way for integrating heterogeneous information extracted from multiple data sources with the aim of highlighting complex interdependencies and uncovering hidden relationships. KGs can be 1" 2312.00188v1,"REACT: Recognize Every Action Everywhere All At Once Naga VS Raviteja Chappa 1 , Pha Nguyen 1 , Page Daniel Dobbs 1 ,Khoa Luu 1 1 University of Arkansas {nchappa, panguyen, pdobbs, khoaluu}@uark.edu, Abstract Group Activity Recognition (GAR) is a fundamental problem in computer vision, with diverse applications in sports video analysis, video surveillance, and social scene understanding. Unlike conventional action recognition, GAR aims to classify the actions of a group of individuals as a whole, requiring a deep understanding of their interactions and spatiotemporal relationships. To address the challenges in GAR, we present REACT (Recognize Every Action Everywhere All At Once), a novel architecture inspired by the transformer encoder-decoder model explicitly designed to model complex contextual relationships within videos, including multi-modality and spatio-temporal features. Our architecture features a cutting-edge Vision-Language Encoder block for integrated temporal, spatial, and multi-modal interaction modeling. This component efficiently encodes spatiotemporal interactions, even with sparsely sampled frames, and recovers essential local information. Our Action Decoder Block refines the joint understanding of text and video data, allowing us to precisely retrieve bounding boxes, enhancing the link between semantics and visual reality. At the core, our Actor Fusion Block orchestrates a fusion of actor-specific data and textual features, striking a balance between specificity and context. Our method outperforms state-of-the-art GAR approaches in extensive experiments, demonstrating superior accuracy in recognizing and understanding group activities. Our architecture’s potential extends to diverse real-world applications, offering empirical evidence of its performance gains. This work significantly advances the field of group activity recognition, providing a robust framework for nuanced scene comprehension. Figure 1. An example of the response of REACT model to the user’s input query. The user provides a video sequence and an action prompt. Then, the model outputs all the requested actions in the scene by localizing the corresponding actors and provides the overall group activity. Best viewed in color and zoom in. actions of a group of individuals within a video segment, necessitating a deeper understanding of the intricate interactions between these actors [11, 37, 45, 47]. This complexity poses significant challenges that hinder the development of practical GAR solutions. Current GAR methods typically rely on ground-truth bounding box annotations and action class labels for training and evaluation [16, 19, 23, 25, 31, 35, 49, 52, 55]. These methods extract actor features and their spatio-temporal relationships from bounding box annotations, and then aggregate these features to form a group-level video representation for classification [16, 19, 23, 25, 31, 35, 49, 52, 55]. However, this reliance on annotations significantly restricts the scalability and applicability of GAR methods. To overcome these limitations, some approaches combine person detection and GAR tasks, simultaneously training on bounding 1. Introduction Group activity recognition (GAR) has emerged as a pivotal challenge in the realm of computer vision, with diverse applications spanning sports video analysis, surveillance systems, and social scene understanding [11, 37, 45, 47]. Unlike conventional action recognition techniques that focus on individual actions, GAR aims to identify and classify the collective 1" 2312.00191v1,"Enhancing Ligand Pose Sampling for Molecular Docking Patricia Suriana, Ron O. Dror Department of Computer Science Stanford University psuriana@stanford.edu, rondror@cs.stanford.edu Abstract Deep learning promises to dramatically improve scoring functions for molecular docking, leading to substantial advances in binding pose prediction and virtual screening. To train scoring functions—and to perform molecular docking—one must generate a set of candidate ligand binding poses. Unfortunately, the sampling protocols currently used to generate candidate poses frequently fail to produce any poses close to the correct, experimentally determined pose, unless information about the correct pose is provided. This limits the accuracy of learned scoring functions and molecular docking. Here, we describe two improved protocols for pose sampling: GLOW (auGmented sampLing with sOftened vdW potential) and a novel technique named IVES (IteratiVe Ensemble Sampling). Our benchmarking results demonstrate the effectiveness of our methods in improving the likelihood of sampling accurate poses, especially for binding pockets whose shape changes substantially when different ligands bind. This improvement is observed across both experimentally determined and AlphaFold-generated protein structures. Additionally, we present datasets of candidate ligand poses generated using our methods for each of around 5,000 protein-ligand cross-docking pairs, for training and testing scoring functions. To benefit the research community, we provide these crossdocking datasets and an open-source Python implementation of GLOW and IVES at https://github.com/drorlab/GLOW_IVES. 1 Introduction Protein-ligand molecular docking, which is crucial in drug discovery and molecular modeling [Kitchen et al., 2004, Ferreira et al., 2015], predicts the three-dimensional arrangement of ligands within target protein binding sites—a task known as ""ligand pose prediction."" This computational method is vital for drug candidate exploration and understanding molecular interactions. Conventional docking software relies on sampling algorithms that generate candidate ligand poses based on a given protein structure. This task is inherently difficult due to the multitude of internal conformations the ligand can adopt and the numerous possible ways it can be placed within the protein binding site. Furthermore, a good sampling algorithm must ensure that at least one generated pose closely resembles the experimentally determined ""correct pose,"" which is unknown to the sampling algorithm. Scoring functions then evaluate these poses, selecting candidates predicted to closely match the correct pose. While molecular docking has traditionally relied on physics-based scoring functions, recent advances in deep learning, as indicated by studies such as [Shen et al., 2020, Francoeur et al., 2020, Shen et al., 2022, Suriana et al., 2023], have the potential to revolutionize scoring accuracy. However, the efficacy of deep learning hinges on a crucial factor: generating suitable sets of candidate ligand binding poses. Existing sampling methods often struggle in this regard, frequently failing to produce any Machine Learning for Structural Biology Workshop, NeurIPS 2023." 2312.00206v1,"SparseGS: Real-Time 360° Sparse View Synthesis using Gaussian Splatting Haolin Xiong ⋆ Sairisheek Muttukuru ⋆ Rishi Upadhyay Achuta Kadambi University of California, Los Angeles Pradyumna Chari {xiongh, sairisheekm, rishiu, pradyumnac}@ucla.edu, achuta@ee.ucla.edu (a) Ground Truth (b) SparseNeRF (c) Mip-NeRF 360 (d) 3DGS (e) Ours Figure 1. We propose a new technique for few shot view synthesis that outperforms all prior methods on quality and runtime. Our method is built on top of 3D Gaussian Splatting which allows for novel explicit constraints and real-time rendering of novel views. Abstract difficult challenge due to the inherent ambiguities in lifting data to higher dimensions. Neural Radiance Fields (NeRFs) [1, 2, 17] tackle this problem by training a neural network using 2D posed images to predict the color and density of points in 3D space. The simplicity and quality of NeRFs enabled significant advances in novel view synthesis and led to a flurry of follow-up work. 3D Gaussian Splatting [11], a more recent technique, builds off of the ideas of NeRFs but replaces the implicit neural network with with an explicit representation based on 3D gaussians. These gaussians are rendered using point-based splatting, which allows for high rendering speeds, but requires fine-grained hyperparameter tuning. While NeRFs and 3D gaussian splatting both perform well at the task of novel view synthesis, they tend to require large sets of training views, which can be difficult due to reasons such as variable lighting conditions, weather-dependent constraints, and logistical complexities. As a result, interest in techniques for few-shot novel view synthesis has grown. The problem of novel view synthesis has grown significantly in popularity recently with the introduction of Neural Radiance Fields (NeRFs) and other implicit scene representation methods. A recent advance, 3D Gaussian Splatting (3DGS), leverages an explicit representation to achieve real-time rendering with high-quality results. However, 3DGS still requires an abundance of training views to generate a coherent scene representation. In few shot settings, similar to NeRF, 3DGS tends to overfit to training views, causing background collapse and excessive floaters, especially as the number of training views are reduced. We propose a method to enable training coherent 3DGS-based radiance fields of 360 scenes from sparse training views. We find that using naive depth priors is not sufficient and integrate depth priors with generative and explicit constraints to reduce background collapse, remove floaters, and enhance consistency from unseen viewpoints. Experiments show that our method outperforms base 3DGS by up to 30.5% and NeRF-based methods by up to 15.6% in LPIPS on the MipNeRF-360 dataset with substantially less training and inference cost. Our project webpage: https://formycat.github.io/SparseGS- Real-Time-360-Sparse-View-Synthesis-using-Gaussian- Splatting/ The few-shot view synthesis problem is especially difficult because the inherent ambiguity in learning 3D structure from 2D images is significantly exacerbated: with fewviews, many regions of scene have little to no coverage. Therefore, there are many possible incorrect 3D representations that can represent the 2D training views correctly but will have poor results when rendering novel views due to artifacts such as ”floaters” [2], floating regions of high density irregularly positioned through the scene, ”background collapse”, when the background is represented by similar looking artifacts closer to cameras, or holes in the representation. Previous works have tackled this problem through the introduction of constraints that regularize the variation 1. Introduction The problem of learning 3D representations from 2D images has long been of interest, but has always been a ⋆ Indicates equal contribution. 1" 2312.00214v1,"Relevance-guided Neural Machine Translation Isidora Chara Tourni Boston University isidora@bu.edu Abstract 1 Derry Wijaya Boston University wijaya@bu.edu output. We propose a method, based on Layer-wise Relevance Propagation (LRP), which leverages the contribution of the input tokens to the output, to boost NMT performance. Our results show LRP may be beneficial during model training for NMT output improvement, particularly in low-resource conditions and for specific well defined model setups. With the advent of the Transformer architecture, Neural Machine Translation (NMT) results have shown great improvement lately. However, results in low-resource conditions still lag behind in both bilingual and multilingual setups, due to the limited amount of available monolingual and/or parallel data; hence, the need for methods addressing data scarcity in an efficient, and explainable way, is eminent. We propose an explainability-based training approach for NMT, applied in Unsupervised and Supervised model training, for translation of three languages of varying resources, French, Gujarati, Kazakh, to and from English. Our results show our method can be promising, particularly when training in low-resource conditions, outperforming simple training baselines; though the improvement is marginal, it sets the ground for further exploration of the approach and the parameters, and its extension to other languages. LRP was introduced by Bach et al. (2015), measuring the contribution of the input components, or the neurons of a network, to the next layer’s output. Due to its nature, it is directly applicable to layer-wise architectures, and we extend its usage to the Transformer architecture, measuring the relevance of source and target sentences’ tokens to the NMT output during training. Introduction Explanations & Explanation-guided training Unsupervised Neural Machine Translation (UNMT) has seen remarkable progress in recent years, with a very large number of methods proposed aiming to NMT when parallel data are few or non-existent for certain language pairs (Artetxe et al., 2017; Lample et al., 2018; Conneau et al., 2017; Wang and Zhao, 2021; Lample and Conneau, 2019; Song et al., 2019; Liu et al., 2020; Marchisio et al., 2020; Kim et al., 2020; Lample et al., 2017; Artetxe et al., 2019; Garcia et al., 2020; Su et al., 2019; Nguyen et al., 2022). Training techniques such as Back-Translation (Sennrich et al., 2015) and Auto-Encoding have been widely studied, in order to efficiently train NMT models under those data scarcity conditions to obtain high quality translation results. However, there is little work in enhancing Neural Machine Translation (NMT) models with utilizing explainability of the model in order to improve quality of the 2 Related Work Layer-wise Relevance Propagation (LRP) Several previous works outline and summarize the findings of explainability and interpetabilityrelated research in NLP (Belinkov et al., 2020; Sun et al., 2021b; Tenney et al., 2020; Madsen et al., 2021; Danilevsky et al., 2020; Qian et al., 2021). Weber et al. (2022) provide a systematic review of explainable AI methods employed in improving various properties of Machine Learning models, such as performance, convergence, robustness, reasoning, efficiency and equality. Of these, of particular interest, and the focus of our work, are those that along with measuring feature importance and distinguishing relevant from irrelevant features, are utilized to augment the intermediate learned features, and improve model performance or reasoning (Anders et al., 2022; Sun et al., 2021a; Zunino et al., 2021a; Fukui et al., 2019; Zhou et al., 2016; Mitsuhara et al., 2019; Schiller et al., 2019; Zunino et al., 2021b)." 2312.00216v1,"www.nature.com/npjdigitalmed REVIEW ARTICLE OPEN Medication abortion via digital health in the United States: a systematic scoping review 1234567890():,; Fekede Asefa Kumsa 1 ✉ , Rameshwari Prasad 1 and Arash Shaban-Nejad 1 ✉ Digital health, including telemedicine, has increased access to abortion care. The convenience, flexibility of appointment times, and ensured privacy to abortion users may make abortion services via telemedicine preferable. This scoping review systematically mapped studies conducted on abortion services via telemedicine, including their effectiveness and acceptability for abortion users and providers. All published papers included abortion services via telemedicine in the United States were considered. Articles were searched in PubMed, CINAHL, and Google Scholar databases in September 2022. The findings were synthesized narratively, and the PRISMA-ScR guidelines were used to report this study. Out of 757 retrieved articles, 33 articles were selected based on the inclusion criteria. These studies were published between 2011 and 2022, with 24 published in the last 3 years. The study found that telemedicine increased access to abortion care in the United States, especially for people in remote areas or those worried about stigma from in-person visits. The effectiveness of abortion services via telemedicine was comparable to in-clinic visits, with 6% or fewer abortions requiring surgical intervention. Both care providers and abortion seekers expressed positive perceptions of telemedicine-based abortion services. However, abortion users reported mixed emotions, with some preferring in-person visits. The most common reasons for choosing telemedicine included the distance to the abortion clinic, convenience, privacy, cost, flexibility of appointment times, and state laws imposing waiting periods or restrictive policies. Telemedicine offered a preferable option for abortion seekers and providers. The feasibility of accessing abortion services via telemedicine in low-resource settings needs further investigation. npj Digital Medicine (2023) 6:128 ; https://doi.org/10.1038/s41746-023-00871-2 INTRODUCTION In recent years, the availability of intelligent digital health solutions has transformed the population and personalized healthcare 1 . The U.S. Food and Drug Administration (FDA) states that digital health is comprised of categories that include health information management (HIM) technology, mobile health (mHealth), personalized medicine, telehealth and telemedicine, and the use of wearable medical devices 2 . Telehealth and telemedicine allow the delivery of healthcare services such as counseling, assessment, and clinical guidance from a distance through electronic means of communication 3 . They also facilitate a personalized and targeted approach to improve patients’ experience 4 . Regarding medication abortion services provided outside of inpatient healthcare settings before 12 weeks of gestational age, telemedicine and telehealth technologies present an alternative to in-clinic abortion services 5 . Previous studies have reported that the effectiveness of abortion services through telemedicine is comparable to that of in-person provision of abortion services 5–7 . The demand for medication and abortion services via telemedicine increased in the United States, particularly following the COVID-19 pandemic 8,9 . As the availability of telemedicine has increased, the ability of health providers to offer abortion services using this technology has varied widely. In some locations, only a limited number of abortion services, such as counseling or consenting, were available via telemedicine, while others were offered a wider range of services that included medication abortion 10–12 . The dispensing of the oral abortifacient mifepristone via telemedicine was originally permitted under an FDA investigational new drug application (INDA) protocol given the FDA restricted its provision via telemedicine and permitted its administration only under the supervision of certified clinicians at a health facility 13 . This restriction was suspended temporarily in July 2020 during the public health emergency presented by the COVID-19 pandemic 14–16 and was lifted permanently on December 16, 2021 17 . This opened the door for more people to access medication abortion and other relevant health services via telemedicine, ultimately resulting in increased access to fully remote abortion services via telemedicine in some states, including California 18 . However, some states have now blocked the use of telemedicine for abortion services 19 . According to the Guttmacher Institute, 14 states no longer allow the provision of abortion services. During 2021 and 2022, different states adopted a total of 158 abortion restrictions, 108 in 2021 and 50 in 2022 20 , and the attempt for further restrictions has continued to increase during 2023. Despite the adoption of various abortion-related restrictions in recent years and the removal of federal protection for abortion services by the Supreme Court, abortion remains a common practice in many states. In 2020, a total of 930,160 abortions were performed in the United States, which represents an increase of 8% increase from those performed in 2017 21 . This scoping review systematically mapped studies conducted on abortion services through digital healthcare and telemedicine services, including e-counseling, e-consenting, e-prescribing, and evaluated their effectiveness, success rate, acceptability for potential abortion users and the perspectives of both abortion users and providers on abortion services offered via telemedicine. 1 The University of Tennessee Health Science Center (UTHSC) - Oak Ridge National Laboratory (ORNL) Center for Biomedical Informatics, Department of Pediatrics, College of Medicine, Memphis, TN 38103, USA. ✉ email: fkumsa@uthsc.edu; ashabann@uthsc.edu Published in partnership with Seoul National University Bundang Hospital" 2312.00237v1,"N EGOTIATED R EPRESENTATIONS TO P REVENT F ORGETTING IN M ACHINE L EARNING A PPLICATIONS ∗ Nuri Korhan Istanbul Technical University Maslak, Istanbul, Turkey korhan@itu.edu.tr 1 Ceren Öner Istanbul Technical University Maslak, Istanbul, Turkey csalkin@itu.edu.tr Abstract Catastrophic forgetting is a significant challenge in the field of machine learning, particularly in neural networks. When a neural network learns to perform well on a new task, it often forgets its previously acquired knowledge or experiences. This phenomenon occurs because the network adjusts its weights and connections to minimize the loss on the new task, which can inadvertently overwrite or disrupt the representations that were crucial for the previous tasks. As a result, the network’s performance on earlier tasks deteriorates, limiting its ability to learn and adapt to a sequence of tasks. In this paper, we propose a novel method for preventing catastrophic forgetting in machine learning applications, specifically focusing on neural networks. Our approach aims to preserve the network’s knowledge across multiple tasks while still allowing it to learn new information effectively. We demonstrate the effectiveness of our method by conducting experiments on various benchmark datasets, including Split MNIST, Split CIFAR-10, Split Fashion MNIST, and Split CIFAR-100. These datasets are created by dividing the original datasets into separate, non-overlapping tasks, simulating a continual learning scenario where the model needs to learn multiple tasks sequentially without forgetting the previous ones. Our proposed method tackles the catastrophic forgetting problem by incorporating negotiated representations into the learning process, which allows the model to maintain a balance between retaining past experiences and adapting to new tasks. By evaluating our method on these challenging datasets, we aim to showcase its potential for addressing catastrophic forgetting and improving the performance of neural networks in continual learning settings. 2 Introduction The problem of catastrophic forgetting (the loss or disruption of previously learned information when new information is learned) in neural networks is commonly faced in deep learning tasks due to selected optimizers that are relied on Gradient Descent algorithm. [1, 2, 3]. Decreasing the number of epochs and exploring rehearsal mechanisms (the retraining of some of the previously learned information as the new information is added) is critical for extraction of a potential solution.This point comes from the idea of the “stability / plasticity dilemma” [4, 5], and emphasis on the representations developed by neural networks should be plastic enough to change to adapt to changing environments and learn new things, but stable enough so that important information is preserved over time. The dilemma is that while both are desirable properties, the requirements of stability and plasticity are in conflict. Stability depends on preserving the structure of representations, plasticity depends on altering it. An appropriate balance is difficult to achieve. While stability / plasticity issues are very general, the term “catastrophic forgetting” has tended to be associated with a specific class of networks, namely static networks employing supervised learning. This broad class includes probably the majority of commonly used and applied networks (such as the very influential back-propagation family and Hopfield nets). Other types of network – for example dynamic / “constructive” networks and unsupervised networks – are not necessarily prone to catastrophic forgetting as it is typically described in this context. Dynamic networks are those that use learning mechanisms where the number of units and connections in the network grows or shrinks in response to the ∗ Citation: GitHub Link https://github.com/nurikorhan/Negotiated-Representations-for-Continual-Learning" 2312.00245v1,"SPAM: Secure & Private Aircraft Management Yaman Jandali*, Nojan Sheybani*, Farinaz Koushanfar University of California, San Diego {yeljanda, nsheybani, farinaz}@ucsd.edu ABSTRACT With the rising use of aircrafts for operations ranging from disasterrelief to warfare, there is a growing risk of adversarial attacks. Malicious entities often only require the location of the aircraft for these attacks. Current satellite-aircraft communication and tracking protocols put aircrafts at risk if the satellite is compromised, due to computation being done in plaintext. In this work, we present SPAM 1 , a private, secure, and accurate system that allows satellites to efficiently manage and maintain tracking angles for aircraft fleets without learning aircrafts’ locations. SPAM is built upon multiparty computation and zero-knowledge proofs to guarantee privacy and high efficiency. While catered towards aircrafts, SPAM’s zeroknowledge fleet management can be easily extended to the IoT, with very little overhead. CCS CONCEPTS • Security and privacy → Cryptography; • Computer systems organization → Embedded and cyber-physical systems; Real-time systems. KEYWORDS Privacy-Preserving Computation, Zero-Knowledge Proofs, Aircraft Privacy, Multi-Party Computation, Two-Party computation ACM Reference Format: Yaman Jandali*, Nojan Sheybani*, Farinaz Koushanfar, University of California, San Diego, {yeljanda, nsheybani, farinaz}@ucsd.edu. 2018. SPAM: Secure & Private Aircraft Management. In Proceedings of (Arxiv). ACM, New York, NY, USA, 6 pages. https://doi.org/XXXXXXX. XXXXXXX 1 INTRODUCTION Over the past decade, the use of piloted aircrafts, as well as Unmanned Aerial Vehicles (UAVs), has significantly grown. Fleets of remotely controlled vehicles are increasingly used in disaster relief, search and rescue, warfare, and more [18, 21]. The Federal Aviation 1 The name SPAM (Secure & Private Aircraft Management) is crafted with a dual mean- ing in mind: signifying the management system’s assurance of rendering externally observable aircraft data unintelligible, resembling typical “spam” content. *Equal contribution. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Arxiv, Nov. 2023, Preprint © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Figure 1: SPAM is an end-to-end aircraft management system that guarantees location privacy to both the aircraft and satellite via scalable Boolean synthesis for secure 2PC and ZKP. Administration (FAA) of the United States of America (USA) handles approximately 16.5 million flights each year. In addition to the aircrafts, the USA’s Department of Defense operates over 11,000 Unmanned Aircraft Systems (UAS) [1]. This includes UAVs, commonly known as ""drones"". With the increasing number of aircrafts, not just in the USA, but globally, there is also an increased risk of one of these aircrafts becoming the target of an adversarial attack or of “going rogue” (i.e. falling into the hands of enemy forces [6]), and there have already been cases where this is suspected to have happened [13]. Many types of adversarial attacks, such as those using automated weaponry based on GPS tracking, GPS spoofing, jamming attacks, and more, rely on knowledge of an aircraft’s location [19]. In addition, satellite-based control systems that require an antenna to be aimed at a remotely controlled aircraft, as well as satellites that provide other types of aircrafts with communication capabilities, can have their transmissions be intercepted [33], thereby revealing the location of the tracked vehicle. For this reason, it is imperative that the computations used to determine the direction that a satellite’s antenna faces be done without ultimately revealing the location of the aircraft. This can be accomplished by taking advantage of scalable methods for privacy preserving computation based on synthesis of Boolean logic [24]. Works such as [8, 27] offer solutions aiming to protect the privacy of a drone’s location. However, this is done either by simply communicating a temporary location through a secure channel or by obfuscating the location through differential privacy, which would make it infeasible to accurately compute the trajectory from one party to the other. Akkaya et al. [2] focus on private communication of data from an aircraft to a server for machine learning inference" 2312.00249v1,"A COUSTIC P ROMPT T UNING : E MPOWERING L ARGE L ANGUAGE M ODELS WITH A UDITION C APABILITIES Jinhua Liang 1 , Xubo Liu 2 , Wenwu Wang 2 , Mark D. Plumbley 2 , Huy Phan 3,* , Emmanouil Benetos 1,4 Centre for Digital Music (C4DM), Queen Mary University of London, UK 2 Centre for Vision, Speech and Signal Processing (CVSSP), University of Surrey, UK 3 Amazon, Cambridge, MA, USA 4 The Alan Turing Institute, UK jinhua.liang@qmul.ac.uk 1 A BSTRACT The auditory system plays a substantial role in shaping the overall human perceptual experience. While prevailing large language models (LLMs) and visual language models (VLMs) have shown their promise in solving a wide variety of vision and language understanding tasks, only a few of them can be generalised to the audio domain without compromising their domain-specific capacity. In this work, we introduce Acoustic Prompt Turning (APT), a new adapter extending LLMs and VLMs to the audio domain by soft prompting only. Specifically, APT applies an instruction-aware audio aligner to generate soft prompts, conditioned on both input text and sounds, as language model inputs. To mitigate the data scarcity in the audio domain, a multi-task learning strategy is proposed by formulating diverse audio tasks in a sequence-to-sequence manner. Moreover, we improve the framework of audio language model by using interleaved audio-text embeddings as the input sequence. This improved framework imposes zero constraints on the input format and thus is capable of tackling more understanding tasks, such as few-shot audio classification and audio reasoning. To further evaluate the reasoning ability of audio networks, we propose natural language audio reasoning (NLAR), a new task that analyses across two audio clips by comparison and summarization. Experiments show that APT-enhanced LLMs (namely APT-LLMs) achieve competitive results compared to the expert models (i.e., the networks trained on the targeted datasets) across various tasks. We finally demonstrate the APT’s ability in extending frozen VLMs to the audio domain without finetuning, achieving promising results in the audio-visual question and answering task. Our code and model weights are released at https://github.com/JinhuaLiang/APT. 1 I NTRODUCTION Auditory stimuli contribute to shaping the overall human perception experience. While visual language models (VLMs) (Li et al., 2023; Liu et al., 2023; Dai et al., 2023; Shukor et al., 2023; Han et al., 2023) that are capable of solving diverse down-streaming tasks have emerged driven by the advent of large language models (LLMs) and massive visual-text pretraining, only few of them (Shukor et al., 2023; Han et al., 2023) can be adapted to the audio domain while maintaining their performance in the image/video domain. To embrace more than two modalities, few works recently attempted to explore the diversity and heterogeneity of tasks and modalities. UniVAL (Shukor et al., 2023) unified input/output format, model architecture, and training objective, and therefore, learned a shared encoder-decoder LLM with multi-modal curriculum learning. ImageBind-LLM (Han et al., 2023) adopted ImageBind, a cross-modal encoder bundling six modalities (including images) to a shared embedding space, and adapted the LLM with a frozen image encoder. While both works extended visual LLMs to other domains, in addition to the considerable amount of training data, they are bundled to a specific architecture, hindering the ability to adapt them to a new modality. * The work does not relate to H.P.’s position at Amazon. 1" 2312.00254v1,"Short Review of the main achievements of the Scalar Field, Fuzzy, Ultralight, Wave, BEC Dark Matter model Tonatiuh Matos, 1, ∗ Luis A. Ureña-López, 2, † and Jae-Weon Lee 3, ‡ 1 Departamento de Fı́sica, Centro de Investigación y de Estudios Avanzados del IPN, A.P. 14-740, 07000 México D.F., México. 2 Departamento de Fı́sica, DCI, Campus León, Universidad de Guanajuato, 37150, León, Guanajuato, México. 3 Department of Electrical and Electronic Engineering, Jungwon University, 85 Munmu-ro, Goesan-eup, Goesan-gun, Chungcheongbuk-do, 28024, Korea. The Scalar Field Dark Matter model has been known in various ways throughout its history; Fuzzy, BEC, Wave, Ultralight, Axion-like Dark Matter, etc. All of them consist in proposing that the dark matter of the universe is a spinless field Φ that follows the Klein-Gordon (KG) equation of motion ✷Φ − dV /dΦ = 0, for a given scalar field potential V . The difference between different models is sometimes the choice of the scalar field potential V . In the literature we find that people usually work in the nonrelativistic, weak-field limit of the KG equation where it transforms into the Schrödinger equation and the Einstein equations into the Poisson equation, reducing the KG- Einstein system, to the Schrödinger-Poisson system. In this paper, we review some of the most interesting achievements of this model from the historical point of view and its comparison with observations, showing that this model could be the last answer to the question about the nature of dark matter in the universe. PACS numbers: I. INTRODUCTION The Scalar Field Dark Matter (SFDM) model proposes that the dark matter of the universe is a spinless particle Φ fulfilling the Klein-Gordon equation ✷Φ − dV =0 dΦ (1) where ✷ is the D’Alambertian operator in a curved spacetime, whose source of Einstein’s equations is the Scalar Field (SF), where the SF can be neutral (real) or charged (complex). Therefore, strictly speaking, we have to solve the Einstein-KG system. However, in galaxies and in general in the universe, systems are non-relativistic, and gravitation is weak enough so that the Einstein-KG system can be reduced to the Schrödinger-Poisson system, which in general is much easier to solve. The origin of SF is unknown since we do not have a definitive unifying theory of all interactions. The easiest way to understand its origin is to add an SF term to the Standard Model (SM) of particles as we do with the rest of the terms of this model. There are other proposals, such as that the SF comes from superstring theory or that it has a QCD-type origin but with ultralight mass, etc. We will treat it here in a generic way, and we will focus only on the results as a dark matter candidate, leaving its origin for future work. Dark matter behaves in a way similar to dust, as in the case of Cold Dark Matter (CDM), and SF mimics dust when it oscillates at the minimum of a potential [1]. ∗ Electronic address: tonatiuh.matos@cinvestav.mx † Electronic address: lurena@ugto.mx ‡ Electronic address: scikid@jwu.ac.kr Therefore, the most popular SF potentials are those in which the SF potential V has a minimum. It is convenient to expand the SF potential into an even series of Φ as λ 1 (2) V = V 0 + m 2 Φ 2 + Φ 4 + · · · 2 4 where we can interpret V 0 as the expectation value of the SF vacuum, m is the mass and λ the self-interaction parameter, where for complex SF the Φ 2 changes by |Φ| 2 . This expansion is generic as long as we do not know the correct form of V . However, there are some proposals for V coming from some theories such as QCD axions, with the SF potential V = f sin(bΦ) or V = A(cosh(bΦ) − 1) [2], [3], derived from the superstring theory. To the best of our knowledge, the idea that an SF could be dark matter of the universe began in 1983 by Baldeschi et al. [4], where they fit the rotation curves of galaxies using boson and fermion particles. In 1990 the authors in [5] presented a model in which a quartic potential V = V 0 (1 − λ|Φ| 2 ) 2 can explain the large-scale structure of the universe; this SF covers the missing mass of the universe. The first comparison of the model with real galaxies was made in 1992 [6, 7], where the authors proposed a Bose gas to fit the rotation curves of galaxies, with a mass of the SFDM of the order of 10 −23 eV. The first numerical simulations with SF to form galaxies were presented in 1993 in [8], where they obtained the shape of a galaxy using the Schödiger-Poisson system. In 1995 [9] suggests that repulsive quartic self- √ interaction increases the length scale to O( λm P /m 2 ) even for a tiny λ, where m P is the Planck mass. An approximate analytic solution for the ground state was obtained for the Thomas-Fermi limit. Based on the theory of boson stars, the maximum stable central density and the maximum halo mass for the λ = 0 case yielded a bound of 10 −28 ≤ m ≤ 10 −22 eV ." 2312.00255v1,"Restructuring a passive colloidal suspension using a rotationally driven particle Shih-Yuan Chen 1† , Hector Lopez-Rios 2† , Monica Olvera de la Cruz 1,2∗ , Michelle M. Driscoll 1∗ 1 2 Department of Physics & Astronomy, Northwestern University, Department of Materials Science & Engineering, Northwestern University, Evanston, IL 60208, USA †These authors contributed equally. ∗ To whom correspondence should be addressed; E-mail: m-olvera@northwestern.edu, michelle.driscoll@northwestern.edu. The interactions between passive and active/driven particles have been ex- plored as a means to modify structures in solutions. Often times hydrodynam- ics plays a significant role in explaining emergent patterns in such mixtures. In this study, we demonstrate that strong advective flows generated by a single driven rotating particle near a surface can induce large-scale structural rear- rangements in a passive suspension. The resulting emergent pattern exhibits an accumulation area in front of the driven particle and a wake along its tra- jectory. Notably, the center of the accumulation is found at a distance from the driven particle. Through experiments and Stokesian dynamics simulations, we show that the driven-passive interaction is solely determined by the heights of 1" 2312.00259v1,"Scalable Cellular V2X Solutions: Large-Scale Deployment Challenges of Connected Vehicle Safety Networks Ghayoor Shah 1* , Mahdi Zaman 1 , Md Saifuddin 1 , Behrad Toghi 1 and Yaser Fallah 1 1 Connected and Autonomous Vehicle Research Lab, University of Central Florida, Orlando, Florida, USA. *Corresponding author(s). E-mail(s): gshah8@knights.ucf.edu; Contributing authors: mahdizaman@knights.ucf.edu; md.saif@knights.ucf.edu; toghi@knights.ucf.edu; yaser.fallah@ucf.edu; Abstract Vehicle-to-Everything (V2X) communication is expected to accomplish a long-standing goal of the Connected and Autonomous Vehicle (CAV) community to bring connected vehicles to roads on a large scale. A major challenge, and perhaps the biggest hurdle on the path towards this goal is the scalability issues associated with it, especially when vehicular safety is concerned. As a major stakeholder, 3rd Generation Partnership Project (3GPP) based Cellular V2X (C-V2X) community has long been trying to research on whether vehicular networks are able to support the safety-critical applications in highdensity vehicular scenarios. This paper attempts to answer this by first presenting an overview on the scalability challenges faced by 3GPP Release 14 Long Term Evolution C-V2X (LTE-V2X) using the PC5 sidelink interface for low and heavy-density traffic scenarios. Next, it demonstrates a series of solutions that address network congestion, packet losses and other scalability issues associated with LTE- V2X to enable this communication technology for commercial deployment. In addition, a brief survey is provided into 3GPP Release 16 5G New Radio V2X (NR-V2X) that utilizes the NR sidelink interface and works as an evolution of C-V2X towards better performance for V2X communications including new enhanced V2X (eV2X) scenarios that possess ultra-low-latency and high-reliability requirements. Keywords: C-V2X, Congestion Control, LTE-V2X, NR-V2X, One-Shot, Vehicular Networks, Vehicle-to-Everything, V2X, 5G NR 1 Introduction The adoption of Vehicle-to-Everything (V2X) communication is expected to accomplish a longstanding target of Connected and Autonomous Vehicle (CAV) community to assist in the safety and efficiency of Intelligent Transportation Systems (ITS) [1]. Significant time and effort have been spent on designing robust and reliable V2X 1 communication technologies and a wide variety of Cooperative Vehicle Safety (CVS) applications relying on Vehicular Ad-Hoc Networks (VANETs) have been conceptualized [2]. However, the main challenge towards the potential commercial deployment of V2X communication has been the scalability issues associated with it. Cellular Vehicle-to-everything (C-V2X) [3] developed by 3rd Generation Partnership Project (3GPP) is the leading V2X communication technology in" 2312.00262v1,"Augmented Kinesthetic Teaching: Enhancing Task Execution Efficiency through Intuitive Human Instructions Cheng Tang 1 , Jiaming Zhong 2 , Yue Hu 2 Abstract—In this paper, we present a complete and efficient implementation of a knowledge-sharing augmented kinesthetic teaching approach for efficient task execution in robotics. Our augmented kinesthetic teaching method integrates intuitive human feedback, including verbal, gesture, gaze, and physical guidance, to facilitate the extraction of multiple layers of task information including control type, attention direction, input and output type, action state change trigger, etc., enhancing the adaptability and autonomy of robots during task execution. We propose an efficient Programming by Demonstration (PbD) framework for users with limited technical experience to teach the robot in an intuitive manner. The proposed framework provides an interface for such users to teach customized tasks using high-level commands, with the goal of achieving a smoother teaching experience and task execution. This is demonstrated with the sample task of pouring water. Index Terms—Augmented kinesthetic teaching, human-robot interaction, robot learning, interactive feedback I. I NTRODUCTION As industries continue to embrace automation and robotics to streamline processes and amplify productivity, the need for robots that can genuinely collaborate with humans becomes increasingly pronounced. Despite the considerable advancements made in robotics, the realm of human-robot interaction remains a significant challenge. Several studies have explored frameworks that enable robots to learn from human demonstrations through kinesthetic teaching or by segmenting observations. Frameworks that optimize planning time by simplifying tasks into a rooted tree structure and identifying steps from human narration, utilizing hierarchical structures have been proposed by Saveriano et al. [1] and Moheseni-Kabir et al. [2]. Meanwhile, the focus of Willibald et al. [3], [4] has been on collaborative robot programming techniques, emphasizing anomaly detection for user adjustments and segmenting demonstrations into simpler skills in a task graph. Cruz et al. [5] and Caccavale et al. [6], [7] have ventured into the realm of adaptive robot systems, with Cruz exploring dynamic adjustments using Reconfigurable Behavior Trees (RBTs) and Caccavale emphasizing adaptive attention mechanisms combined with physical human-robot interaction. Agostini et al. 1 Department of Electrical and Computer Engineering, University of Waterloo, Canada cheng.tang@uwaterloo.ca 2 Department of Mechanical and Mechatronics Engineering, University of Waterloo, Canada We acknowledge the support of the Natural Sciences and Engineering Research Council of Canada (NSERC), funding reference number RGPIN- 2022-03857. [8] tackled the challenges of geometric and symbolic reasoning in robot movements, emphasizing motion dependencies across actions. Finally, advanced robot learning skills have made significant strides in recent research, where Zanchettin et al. [9] emphasized broader skill generalizations and Kormushev et al. [10] focused on tasks involving both position and force. Gopika et al.’s [11] study has done preliminary exploration on the incorporation of human feedback for kinesthetic teaching. They highlighted the potential benefits of incorporating multimodal cues, such as gaze and verbal descriptions, into kinesthetic teaching. Their results suggest that multimodal cues can provide deeper insights into a programmer’s intent, challenges faced during teaching, and a more holistic understanding of the task being demonstrated. Such an approach, which fuses multimodal cues like speech and gaze with traditional Program by Demonstration (PbD), promises a richer robot learning experience and can possibly lead to improved robot-human collaborative outcomes [11]. While the study provided valuable insights into human feedback and its impact on robot learning, there remains a need to explore the efficient means of implementation for augmented kinesthetic teaching to reach an integrated and intuitive solution. The functional object-oriented network (FOON) developed by David Paulius et al. (2021) [12], was a bipartite graph representation designed to represent a robot’s understanding of its environment and tasks. This work proposed a roadmap for developing a generalizable structured task planning framework, enhancing effective robot knowledge acquisition from human demonstrations. In this paper, we propose the implementation of an augmented kinesthetic teaching pipeline that integrates multimodal intuitive human feedback during the task execution process which allows Learning by Demonstration from very few examples by utilizing knowledge-sharing control 1 . Where with intuitive we refer to an interaction pipeline that is similar to the ones that occur between humans. Through semantic-based subspace selection and regression reasoning, the collected prior knowledge can be efficiently transferred to new tasks to achieve adaptable and scalable interactions. By incorporating an object-oriented approach and leveraging automating the labeling process in machine learning from classical classification, regression tasks to deep learning applied in Computer Vision (CV), and Natural Language Processing 1 Available at https://github.com/hushrilab/augmented-kinesthetic-teaching" 2312.00269v1,"Adaptability of Computer Vision at the Tactical Edge: Addressing Environmental Uncertainty Hayden Moore Carnegie Mellon University, Software Engineering Institute, AI Division hmmoore@sei.cmu.edu Abstract Computer Vision (CV) systems are increasingly being adopted into Command and Control (C2) systems to improve intelligence analysis on the battlefield, the tactical edge. CV systems leverage Artificial Intelligence (AI) algorithms to help visualize and interpret the environment, enhancing situational awareness. However, the adaptability of CV systems at the tactical edge remains challenging due to rapidly changing environments and objects which can confuse the deployed models. A CV model leveraged in this environment can become uncertain in its predictions, as the environment and the objects existing in the environment begin to change. Additionally, mission objectives can rapidly change leading to adjustments in technology, camera angles, and image resolutions. All of which can negatively affect the performance of and potentially introduce uncertainty into the system. When the training environment and/or technology differs from the deployment environment, CV models can perform unexpectedly. Unfortunately, most scenarios at the tactical edge do not incorporate Uncertainty Quantification (UQ) into their deployed C2 and CV systems. This concept paper explores the idea of synchronizing robust data operations and model fine-tuning driven by UQ all at the tactical edge. Specifically, curating datasets and training child models based on the residuals of predictions, using these child models to calculate prediction intervals (PI), and then using these PI to calibrate the deployed models. By incorporating UQ into the core operations surrounding C2 and CV systems at the tactical edge, we can help drive purposeful adaptability on the battlefield. 1 I NTRODUCTION Environmental uncertainty, defined as “the degree to which future states of the world cannot be anticipated and accurately predicted” [1], can limit a Command and Control (C2) system's ability to help battle commands plan, prepare, and perform different objectives in a rapid and organized fashion. The tactical edge can be defined as “The platforms, sites, and personnel operating at lethal risk in a battle space with a strong dependency on information systems and operational readiness” [2]. Here the environments, missions, and objectives can all quickly change, and potentially introduce uncertainty into the warfighter's C2 systems. C2 systems leverage computer vision (CV) to provide a more holistic view of the changing environments at the tactical edge. Unfortunately, CV models are data-driven and may suffer from large extrapolation errors when applied to changing objects and environmental conditions [3]. In other words, as the environments and objects existing in these environments begin to change (even slightly) the C2 and ICCRTS 2023 1 cascading CV systems may become miscalibrated and inaccurate. CV systems classify, predict, and localize different mission-specific objects and agents with some degree of confidence. Warfighters having confidence and accuracy versus unpredictability in their systems at the tactical edge can be the difference between life and death. Uncertainty quantification (UQ) is used to ensure model trustworthiness and improve warfighter's understanding of data limits and model deficiencies. This paper explores the idea of warfighters using UQ to influence the C2 and cascading CV systems. Specifically, calculating confidences and prediction intervals (PI), detecting data that is out-of-distribution (OOD), and curating relevant datasets to recalibrate the deployed model. Ultimately, warfighters can use UQ to help drive adaptability and promote robust and informative AI systems [4]. According to the Defense Advanced Research Projects Agency (DARPA), complex physical systems, devices, and processes important to the Department of Defense (DoD)" 2312.00274v1,"O N -D EMAND S INGLE -E LECTRON S OURCE VIA S INGLE -C YCLE A COUSTIC P ULSES A P REPRINT Shunsuke Ota 1,2 , Junliang Wang 3 , Hermann Edlbauer 3 , Yuma Okazaki 2 , Shuji Nakamura 2 , Takehiko Oe 2 , Arne Ludwig 4 , Andreas D. Wieck 4 , Hermann Sellier 3 , Christopher Bäuerle 3 , Nobu-Hisa Kaneko 2 , Tetsuo Kodera 1 , and Shintaro Takada 2,5 1 Department of Electrical and Electronic Engineering, Tokyo Institute of Technology, Tokyo 152-8550, Japan National Institute of Advanced Industrial Science and Technology (AIST), National Metrology Institute of Japan (NMIJ), 1-1-1 Umezono, Tsukuba, Ibaraki 305-8563, Japan 3 Univ. Grenoble Alpes, CNRS, Grenoble INP, Institut Néel, 38000 Grenoble, France 4 Lehrstuhl für Angewandte Festkörperphysik, Ruhr-Universität Bochum, Universitätsstraße 150, 44780 Bochum, Germany 5 Persent address: Department of Physics, Graduate School of Science, Osaka University, Toyonaka, Osaka 560-0043, Japan Corresponding author: takada@phys.sci.osaka-u.ac.jp 2 December 4, 2023 A BSTRACT Surface acoustic waves (SAWs) are a reliable solution to transport single electrons with precision in piezoelectric semiconductor devices. Recently, highly efficient single-electron transport with a strongly compressed single-cycle acoustic pulse has been demonstrated. This approach, however, requires surface gates constituting the quantum dots, their wiring, and multiple gate movements to load and unload the electrons, which is very time-consuming. Here, on the contrary, we employ such a single-cycle acoustic pulse in a much simpler way – without any quantum dot at the entrance or exit of a transport channel - to perform single-electron transport between distant electron reservoirs. We observe the transport of a solitary electron in a single-cycle acoustic pulse via the appearance of the quantized acousto-electric current. The simplicity of our approach allows for on-demand electron emission with arbitrary delays on a ns time scale. We anticipate that enhanced synthesis of the SAWs will facilitate electron-quantum-optics experiments with multiple electron flying qubits. 1 INTRODUCTION Surface acoustic waves (SAWs) are mechanical waves that propagate along a material surface and accompany electric field modulation in piezoelectric materials. This property allows for exquisite spatial and temporal control of the local environment of electrons in solid systems. This control makes SAWs an interesting and promising method for electron transport in electron-quantum optics Hermelin et al. [2011], McNeil et al. [2011], Stotz et al. [2005], Bertrand et al. [2016], Takada et al. [2019], Delsing et al. [2019], Jadot et al. [2021], Ito et al. [2021], Wang et al. [2023]. Recently, research has been conducted towards the realization of electron flying qubits as quantum information processing devices Edlbauer et al. [2022]. In electron-quantum optics, single electrons are controlled using basic tools such as a single-electron source and a single-electron detector. These tools have been realized in several different systems Fève et al. [2007], Dubois et al. [2013], Jullien et al. [2014], Bisognin et al. [2019], including the SAW system. In the SAW system by combining these tools, single-electron transport over micrometers has been demonstrated Hermelin et al. [2011], McNeil et al. [2011], Takada et al. [2019], and coherent transport of electron spin has also been demonstrated Bertrand et al. [2016], Jadot et al. [2021]." 2312.00276v1,"Preprint A UTOMATING C ONTINUAL L EARNING Kazuki Irie 1† Róbert Csordás 2 Jürgen Schmidhuber 2,3 Center for Brain Science, Harvard University, Cambridge, MA, USA 2 The Swiss AI Lab, IDSIA, USI & SUPSI, Lugano, Switzerland 3 AI Initiative, KAUST, Thuwal, Saudi Arabia kirie@fas.harvard.edu, {robert, juergen}@idsia.ch 1 A BSTRACT General-purpose learning systems should improve themselves in open-ended fashion in ever-changing environments. Conventional learning algorithms for neural networks, however, suffer from catastrophic forgetting (CF)—previously acquired skills are forgotten when a new task is learned. Instead of hand-crafting new algorithms for avoiding CF, we propose Automated Continual Learning (ACL) to train self-referential neural networks to meta-learn their own in-context continual (meta-)learning algorithms. ACL encodes all desiderata—good performance on both old and new tasks—into its meta-learning objectives. Our experiments demonstrate that ACL effectively solves “in-context catastrophic forgetting”; our ACL-learned algorithms outperform hand-crafted ones, e.g., on the Split-MNIST benchmark in the replay-free setting, and enables continual learning of diverse tasks consisting of multiple few-shot and standard image classification datasets. 1 1 I NTRODUCTION Enemies of memories are other memories (Eagleman, 2020). Continually-learning artificial neural networks (NNs) are memory systems in which their weights store memories of task-solving skills or programs, and their learning algorithm is responsible for memory read/write operations. Conventional learning algorithms—used to train NNs in the standard scenarios where all training data is available at once—are known to be inadequate for continual learning (CL) of multiple tasks where data for each task is available sequentially and exclusively, one at a time. They suffer from “catastrophic forgetting” (CF; McCloskey & Cohen (1989); Ratcliff (1990); French (1999); McClelland et al. (1995)); the NNs forget, or rather, the learning algorithm erases, previously acquired skills, in exchange of learning to solve a new task. Naturally, a certain degree of forgetting is unavoidable when the memory capacity is limited, and the amount of things to remember exceeds such an upper bound. In general, however, capacity is not the fundamental cause of CF; typically, the same NNs, suffering from CF when trained on two tasks sequentially, can perform well on both tasks when they are jointly trained on the two tasks at once instead (see, e.g., Irie et al. (2022a)). The real root of CF lies in the learning algorithm as a memory mechanism. A “good” CL algorithm should preserve previously acquired knowledge while also leveraging previous learning experiences to improve future learning, by maximally exploiting the limited memory space of model parameters. All of this is the decision-making problem of learning algorithms. In fact, we can not blame the conventional learning algorithms for causing CF, since they are not aware of such a problem. They are designed to train NNs for a given task at hand; they treat each learning experience independently (they are stationary up to certain momentum parameters in certain optimizers), and ignore any potential influence of current learning on past or future learning experiences. Effectively, more sophisticated algorithms previously proposed against CF (Kortge, 1990; French, 1991), such as elastic weight consolidation (Kirkpatrick et al., 2017; Schwarz et al., 2018) or synaptic intelligence (Zenke et al., 2017), often introduce manually-designed constraints as regularization terms to explicitly penalize current learning for deteriorating knowledge acquired in past learning. Here, instead of hand-crafting learning algorithms for continual learning, we train self-referential neural networks (Schmidhuber, 1992a; 1987) to meta-learn their own “in-context” continual learning algorithms. We train them through gradient descent on learning objectives that reflect desiderata 1 Our code is public: https://github.com/IDSIA/automated-cl. † Work done at IDSIA. 1" 2312.00281v1,"A Scale-out Decentralized Blockchain Ledger System for Web3.0 Lide Xue Wei Yang University of Science and Technology of China Hefei, China xldxld@mail.ustc.edu.cn University of Science and Technology of China Hefei, China qubit@ustc.edu.cn Wei Li University of Science and Technology of China Hefei, China wei123@mail.ustc.edu.cn Abstract—The development of underlying technologies in blockchain mostly revolves around a difficult problem: how to enhance the performance of the system and reduce various costs of nodes (such as communication, storage and verification) without compromising the system’s security and decentralization. Various layer-1 and layer-2 protocols have provided excellent solutions for this challenge. However, they cannot yet be considered as a “silver bullet”. This paper proposes EZchain—a novel decentralized “scale-out” ledger system designed for web3.0, aiming to enable blockchain technology to truly support ledger applications in large-scale fully decentralized networks. Without compromising security and decentralization, EZchain successfully accomplishes the following milestones: 1) Scalability: The theoretical throughput of EZchain can be infinitely expanded, nearly unaffected by bandwidth and other resource constraints. 2) Consumer-Grade Hardware Compatibility: EZchain is designed to be compatible with consumer-grade hardware, supporting storage, computation, and verification requirements. 3) Efficient Transaction Confirmation: EZchain strives to maintain transaction confirmation delays within one minute. Our prototype experiment demonstrates that under typical daily bandwidth network conditions, EZchain’s performance in all aspects approaches that of the accounts in centralized payment systems. This provides a solid infrastructure for realizing mobile payments in web3.0. Index Terms—Blockchain, Web3.0, Distributed ledger, Scaleout I. I NTRODUCTION In blockchain applications, achieving the same central server-level performance of web2.0 without sacrificing decentralization and security has always been a key bottleneck, also known as the blockchain impossible triangle. Given a blockchain system with n nodes, global consensus requirements inherently involve at least O(n) message and storage complexity, with some BFT-like algorithms even demanding O(n 3 ) in specific scenarios. This complexity induces numerous system bottlenecks, as depicted in Figure 1. For instance, in distributed ledgers, transaction validation and double-spending checks necessitate tracing the entire blockchain history for confirmation 1 . Furthermore, incorporating a transaction into a new block requires broadcasting it to all consensus nodes for validation. From a storage perspective, each full-consensus node essentially mirrors a central server, redundantly storing the world state and transaction history backups. To overcome these challenges, various approaches like sharding, off-chain, and cross-chain solutions have been explored, often trading off a degree of security and decentralization for enhanced system efficiency. Addressing the impossible triangle and these multifaceted bottlenecks is crucial for developing a robust infrastructure for the future web3.0. Network transmission bottleneck 10Mbps bandwidth: i.e., 3000~6000 TPS Consensus algorithm bottleneck Bitcoin & Ethereum: Less than 100 TPS Verification rate bottleneck Single-core CPU verification efficiency : 4000~8000 TPS Storage performance bottleneck I/O efficiency and storage space limitations: 2000~10000 TPS Fig. 1. The “barrel effect” of various bottlenecks faced by blockchain and web3.0 applications. Concerning the above challenges, in this paper we introduce EZchain, a blockchain solution characterized by its highperformance, decentralization, and robust security. Distinct from pseudo-decentralization, layer-2, and off-chain concepts, EZchain adheres strictly to the principles of decentralization, achieving layer-1 performance breakthroughs. EZchain theoretically offers: 1 An alternative involves utilizing a “world state” snapshot for verification; however, this still depends on the validity confirmation of the“world state”, either self-validated or by other nodes. In a truly decentralized context,“world state” validation also entails tracing the complete blockchain history." 2312.00284v1,"Design of auxetic cellular structures for in-plane response through out-of-plane actuation of stimuli-responsive bridge films Anirudh Chandramouli a,∗ , Sri Datta Rapaka b,∗ , Ratna Kumar Annabattula a,∗∗ a Department of Mechanical Engineering, Indian Institute of Technology Madras, Chennai, 600036, Tamil Nadu, India b Haas Formula One, Banbury, OX16 4PN, UK Abstract In this work, we propose novel designs of cellular structures exhibiting unconventional in-plane actuation responses to external stimuli. We strategically introduce stimuli-responsive bilayer bridge films within conventional honeycombs to achieve the desired actuation. The films are incorporated such that, in response to an external field (thermal, electric, chemical, etc.), the bridge film bends out-of-plane, activating the honeycomb in the plane. The conventional out-of-plane deformation of the bridge film can lead to interesting and unconventional actuation in the plane. An analytical model of this coupled unit cell behaviour is developed using curved beam theory, and the model is validated against finite element simulations. Several applications of such designs are presented. Unit cell architectures exhibiting both positive and negative macroscopic actuation are proposed, and the criterion for achieving such actuation is derived analytically. Furthermore, we demonstrate that by altering the topology, unidirectional and bidirectional negative actuation can be achieved. We also propose designs that result in the negative actuation of the structure with both monotonically increasing and monotonically decreasing stimuli. Finally, by combining two macroscopic structures with positive and negative actuation, we design efficient actuators/sensors that bend in the plane in response to a stimulus. Keywords: Metamaterials, Reversed stimuli-response, Auxetics, Thermal shrinkage 1. Introduction Metamaterials are a class of materials that are engineered to exhibit unusual mechanical or physical properties not found in traditional materials [1–3]. These materials can be designed to have specific properties that are desirable for various applications [4–7]. One area of particular interest in the study of metamaterials is the development of materials with negative parameters of mechanical properties, which are not found in nature. Negative parameters of mechanical properties refer to values opposite in sign to what is typically observed in conventional materials. For example, negative thermal expansion (NTE) refers to a material contracting rather than expanding upon heating. While such behaviour is rare in nature, recent developments in lattice metamaterials have focused on optimizing mesoscale architecture to engineer materials which exhibit unusual macroscopic behaviour such as near zero expansion [8–10] and negative thermal expansion [11–21]. This counterintuitive behaviour has found applications in various fields, including the development of temperature-stable components for aerospace and electronics applications [22–26]. Similarly, metamaterials have been designed to obtain negative swelling behaviour [27–32] and negative hygroscopic expansion [33–37], ∗ Equal contribution ∗∗ Corresponding author Email addresses: chandramoulianirudh@gmail.com (Anirudh Chandramouli), datta5284@gmail.com (Sri Datta Rapaka), ratna@iitm.ac.in (Ratna Kumar Annabattula) which have applications in the development of humidity-sensitive devices and materials. Previous studies have achieved a negative (or reversed stimuli) response using one of two mechanisms. The first involves incorporating active components and clever kinematics to convert local axial expansions into macroscopic shrinkage. Examples of such designs include both two and three-dimensional structures formed using dual-material triangles [38–41] and dualmaterial tetrahedrons [42, 43] respectively. The second mechanism involves introducing bi-material strips to replace certain members of the structure, resulting in bending and a negative response [18, 44–46]. While the former design offers high relative stiffness, it provides a limited range of negative expansion, whereas the latter offers a larger negative expansion but a lower stiffness. To address the limitations of the two approaches mentioned above, we propose a novel design strategy that leverages out-ofplane deformation by strategically introducing stimuli-responsive bi-material bridge films into conventional lattice structures. This design allows for a greater macroscopic in-plane negative expansion range while maintaining high relative stiffness. Moreover, the actuation mechanism is out-of-plane, and only its projection into the plane governs the in-plane response, expanding the design space significantly. As such, our proposed design offers the capability to exhibit curious and unconventional behaviour, such as negative responses to both positive and negative changes in the stimulus, unidirectional or bidirectional negative expansion, etc. Moreover, we can achieve forward and reverse responses with a simple orientation change of the bridge December 4, 2023" 2312.00288v1,"Mist Generation Behavior in Ultrasonic Atomizer for Aerosol Jet ® Printing James Q. Feng a , James D. Klett b , and Michael J Renn a a Optomec, Inc., 2575 University Avenue, #135, St. Paul, MN 55114, USA b PAR Associates, Las Cruces, New Mexico, USA james.q.feng@gmail.com Abstract Continuous ultrasonic atomization in a closed chamber is expected to generate a mist with an equilibrium droplet concentration and size distribution. Such a mist of microdroplets with controllable mist density has been used for Aerosol Jet ® printing in the fabrication of a variety of additively manufactured microscale devices. Despite many unique capabilities demonstrated with the Aerosol Jet ® printing technology, its ultrasonic atomization behavior appears to be rather sensitive to the ink properties with gaps in our understanding of the fundamental physics underlying its operation. In this work, we investigate some basic mechanisms in the Aerosol Jet ® ultrasonic atomizer with a lumped-parameter kinetic coagulation model for highly concentrated mist. To mitigate the difficulty with unavailable knowledge about the complex turbulent flow inside the atomizer chamber, we present results for several orders of magnitude of the turbulent energy dissipation rates in order to examine a range of possibilities. The same approach is taken for analyzing the scavenging effect of the swirling bulk liquid. Our results also demonstrate the theoretical possibility for achieving a mist saturation condition where the mist output from the atomizer can become insensitive to process variables. As observed in experiments, such a saturated mist is highly desirable for Aerosol Jet ® printing with maximized and well-controlled throughput in additive manufacturing. Keywords: ultrasonic atomization, aerosol generation, Aerosol Jet ® printing, aerosol coagulation model, mist density 1 Introduction In Aerosol Jet ® (AJ) printing, functional ink materials are deposited to the substrate in the form of a high-speed mist stream with an impinging jet flow, based on the mechanism of inertial impaction of microdroplets with diameters typically ranging from 1 to 5 m (Renn et al. 2002; Binder et al. 2014; Feng and Renn 2019). It enables effective additive manufacturing of microscale devices for various industrial applications (cf. Zollmer et al. 2006; Hedges et al. 2007; Kahn 2007; Christenson et al. 2011; Paulsen et al. 2012; Renn et al. 2017; Wilkinson et al. 2019; Feng et al. 2019; Germann et al. 2023). Any liquid material that can be atomized (or aerosolized) into a mist of microdroplets (e.g., with diameters ranging from 1 to 5 m) can be printed with AJ. Performance of the atomizer plays a key role in AJ operation. One of the atomizers—called the “ultrasonic atomizer”—in the current AJ system—utilizes an ultrasonic 1" 2312.00292v1,"S E P S I S speculation lies of omission opinion black lies distortion bias SEPSIS: I Can Catch Your Lies – A New Paradigm for Deception Detection Anku Rani 1 Dwip Dalal 2 Shreya Gautam 3 Pankaj Gupta 4 Vinija Jain† 5,6 Aman Chadha† 5,6 Amit Sheth 1 Amitava Das 1 1 University of South Carolina, USA 2 IIT Gandhinagar, India 3 BIT Mesra, India 4 DTU, India 5 Stanford University, USA 6 Amazon AI, USA arani@mailbox.sc.edu amitava@mailbox.sc.edu Abstract topic aspects of deceptive content. Finally, our Deception is the intentional practice of twisting information. It is a nuanced societal practice deeply intertwined with human societal evolution, characterized by a multitude of facets. This research explores the problem of deception through the lens of psychology, employing a framework that categorizes deception into three forms: lies of omission, lies of commission, and lies of influence. The primary focus of this study is specifically on investigating only lies of omission. We propose a novel framework for deception detection leveraging NLP techniques. We curated an annotated dataset of 876, 784 samples by amalgamating a popular large-scale fake news dataset and scraped news headlines from the Twitter handle of ""Times of India"", a well-known Indian news media house. Each sample has been labeled with four layers, namely: (i) the type of omission (speculation, bias, distortion, sounds factual, and opinion), (ii) colors of lies (black, white, grey, and red), and (iii) the intention of such lies (to influence, gain social prestige, etc) (iv) topic of lies (political, educational, religious, racial, and ethnicity). We present a novel multi-task learning [MTL] pipeline that leverages the dataless merging of fine-tuned language models to address the deception detection task mentioned earlier. Our proposed model achieved an impressive F1 score of 0.87, demonstrating strong performance across all layers including the type, color, intent, and † Work does not relate to the position at Amazon. research aims to explore the relationship between lies of omission and propaganda techniques. To accomplish this, we conducted an in-depth analysis, uncovering compelling findings. For instance, our analysis revealed a significant correlation between loaded language and opinion, shedding light on their interconnectedness. To encourage further research in this field, we will be making our SEPSIS models and dataset available with the MIT License, making it favorable for open-source research and commercial use. 1 Defining Deception – Inspiration from Psychology According to (Schuiling, 2004), deception is a behavior observed in various species and is considered an evolutionary adaptive trait. (DePaulo and Kashy, 1998) assert that deception is an integral part of social interactions, with the majority of humans engaging in deceptive acts at least once or twice a day. While most instances of deception are relatively minor, there is a frequent association between deception and egregious norm violations, such as theft, murder, and attempts to evade punishment for such crimes. Consequently, researchers have long been interested in identifying behaviors that can differentiate between truthful and deceitful communications. Numerous studies have delved into describing the behavioral indicators of deceit. However, no single behavior or combination of behaviors has" 2312.00293v1,"PsyAttention: Psychological Attention Model for Personality Detection Baohua Zhang, Yongyi Huang, Wenyao Cui, Huaping Zhang ∗ and Jianyun Shang Beijing Institute of Technology, China kevinzhang@bit.edu.cn Abstract John, 1992; Schmitt et al., 2008) and MBTI (Boyle, 1995; Hong, 2022; Celli and Lepri, 2018). The Big- Five model divides personality features into five factors(Digman, 1990): Openness (OPN), Conscientiousness (CON), Extraversion (EXT), Agreeableness (AGR), and Neuroticism (NEU). These are usually assessed through questionnaires in which people reflect on their typical patterns of thinking and behavior. The MBTI model describes personality by 16 types that result from the combination of binary categories in four dimensions 1 : (1) Extraversion (E) vs Introversion (I); (2) Thinking (T) vs Feeling (F); (3) Sensing (S) vs Intuition (N); and (4) Judging (J) vs Perceiving (P). Previous work saw a person’s use of language as a distillation of underlying drives, emotions, and thought patterns (Tausczik and Pennebaker, 2010; Boyd and Pennebaker, 2017). There are many theories and tools for extracting psychological features from texts, such as ARTE (Automatic Readability Tool For English) (Crossley et al., 2019), which has 55 psychological features); SEANCE (Sentiment Analysis And Cognition Engine) (Crossley et al., 2017), with 271 features; TAACO (Tool For The Automatic Analysis Of Cohesion) (Crossley et al., 2016), with 168 features; and TAALES (Tool For The Automatic Analysis Of Lexical Sophistication (Kyle and Crossley, 2015), with 491 features. These tools use multiple theories to obtain psychological features from text. For example, SEANCE uses eight theories, TAACO use fifteen theories. However, the application of different calculation standards among these features may result in interference between features calculated using distinct systems, thereby introducing noise and reducing performance. For example, when analyzing sentiment or emotion features, SEANCE uses more than 10 lexicons. A word’s meaning may vary according to the lexicon, which leads to inconsistencies Work on personality detection has tended to incorporate psychological features from different personality models, such as BigFive and MBTI. There are more than 900 psychological features, each of which is helpful for personality detection. However, when used in combination, the application of different calculation standards among these features may result in interference between features calculated using distinct systems, thereby introducing noise and reducing performance. This paper adapts different psychological models in the proposed PsyAttention for personality detection, which can effectively encode psychological features, reducing their number by 85%. In experiments on the BigFive and MBTI models, PysAttention achieved average accuracy of 65.66% and 86.30%, respectively, outperforming state-ofthe-art methods, indicating that it is effective at encoding psychological features. 1 Introduction Personality detection helps people to manage themselves and understand themselves, and has been involved in job screening, personal assistants, recommendation systems, specialized health care, counseling psychotherapy, and political forecasting (Mehta et al., 2020b). Personality measures originated from psychology (Pervin and John, 1999; Matthews et al., 2003), and psychologists judge their patients’ personality features through a series of tests. The content that users post on social media can give valuable insights into their personalities (Christian et al., 2021). Personality detection can identify personality features from this, and often requires a combination of psychology, linguistics, and computer science. There are many psychological models of individual personality, the most famous being the Big- Five (McCrae and Costa Jr, 1989; McCrae and 1 https://www.simplypsychology.org/the-myers-briggstype-indicator.html * ∗ Corresponding author 1" 2312.00296v1,"Towards Aligned Canonical Correlation Analysis: Preliminary Formulation and Proof-of-Concept Results Biqian Cheng Evangelos E. Papalexakis Jia Chen UC Riverside Riverside, CA, USA bchen158@ucr.edu UC Riverside Riverside, CA, USA epapalex@cs.ucr.edu UC Riverside Riverside, CA, USA jiac@ucr.edu ABSTRACT Canonical Correlation Analysis (CCA) has been widely applied to jointly embed multiple views of data in a maximally correlated latent space. However, the alignment between various data perspectives, which is required by traditional approaches, is unclear in many practical cases. In this work we propose a new framework Aligned Canonical Correlation Analysis (ACCA), to address this challenge by iteratively solving the alignment and multi-view embedding. KEYWORDS Canonical Correlation Analysis, Alignment, Matching, Data Integration ACM Reference Format: Biqian Cheng, Evangelos E. Papalexakis, and Jia Chen. 2023. Towards Aligned Canonical Correlation Analysis: Preliminary Formulation and Proofof-Concept Results. In Proceedings of 19th International Workshop on Mining and Learning with Graphs (MLG ’23). ACM, New York, NY, USA, 4 pages. https://doi.org/XXXXXXX.XXXXXXX 1 alignment of those records from the same patient is unknown. In such cases, to preserve the performance of the CCA analysis, a proper estimation of multi-view alignment is necessary. To address this problem, inspired by recent work [Wu et al. 2022] in the related problem of misaligned joint tensor factorization, we proposed a new formulation, Aligned Canonical Correlation Analysis (ACCA), which seeks to iteratively identify the best entity alignment and latent embedding for multiple views of one dataset. We derive an Alternating Optimization algorithm and present preliminary results to demonstrate the feasibility of our framework The closest formulation to our proposed model is found in [Sahbi 2018] where the author is considering linear transformation of the two views in CCA, however, is not seeking to recover the precise alignment matrix as our formulation does. In our on-going work we will consider scenarios where we can fairly compare the two formulations and understand pros and cons for either one. The list of contributions in this preliminary work are: • Novel Formulation: We propose the Aligned Canonical Correlation Analysis (ACCA) model, which seeks to jointly identify the best entity alingment and latent embedding for the dataset views. • Proof of Concept: We derive an Alternating Optimization algorithm and show preliminary results for solving the problem, demonstrating the feasibility of our effort. INTRODUCTION Canonical Correlation Analysis [Harold 1936; Kettenring 1971] is a classical model which, given two different views of the same set of entities, e.g., two different bipartite graphs of (user, product) and (user, video) interactions or different feature representations for those entities in general, seeks to project those entities (users) in a low-dimensional space where the different projected views are maximally correlated. In traditional CCA-style analysis, we assume that entities across multiple views have one-to-one correspondence , and there is a wealth of algorithms that study different formulations for solving the problem of projecting those views in that desired maximally correlated space, both linearly and non-linearly [Andrew et al. 2013]. However, in many real-world applications, the data of different views are generated by different resources, respectively, which potentially causes the imperfect alignment of multiple views corresponding to the same entity, e.g, the multiple medical information always be recorded by different hospitals correspondingly that the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MLG ’23, August XX, 2023, Long Beach, CA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX 2 BACKGROUND Canonical correlation analysis (CCA) is a powerful tool to learn the shared latent components of two datasets by projecting them to the same space and enforcing the similarity of the projected data. Given two centered and aligned datasets X ∈ R 𝐷 𝑥 ×𝑁 and Y ∈ R 𝐷𝑦×𝑁 where 𝑁 is the number of samples, 𝐷 𝑥 and 𝐷 𝑦 represent the dimensions of X and Y, respectively, one popular CCA formulation is seeking for the two projection matrices U ∈ R 𝑑 ×𝐷 𝑥 and V ∈ R 𝑑 ×𝐷 𝑦 with 𝑑 ≪ min(𝐷 𝑥 , 𝐷 𝑦 ), and shared representation/embedding S ∈ R 𝑑 ×𝑁 by solving the following problem min U,V,S ||UX − S|| 2 𝐹 + ||VY − S|| 2 𝐹 (1) under the constraint that SS ⊤ = I which avoids the trivial solution, i.e., U = 0, V = 0, and S = 0, and ensures the 𝑑 latent components assembled in the rows of S are uncorrelated to each other. Here, the symbols ⊤ and ∥ · ∥ 𝐹 respectively stand for matrix transpose and Frobenius norm operators, and I is identity matrix with the suitable size. The minimization problem in Eq. (1) admits global optimal solution: the rows of S are the 𝑑 eigenvectors corresponding to the top-𝑑 eigenvalues of X ⊤ (XX ⊤ ) −1 X + Y ⊤ (YY ⊤ ) −1 Y with (·) −1 denoting the matrix inverse operator, U = SX ⊤ (XX ⊤ ) −1 , and V = SY ⊤ (YY ⊤ ) −1 , e.g., [Harold 1936]." 2312.00306v1,"Publications of the Astronomical Society of Australia (2020), 1–17 doi: RESEARCH PAPER RadioGalaxyNET: Dataset and Novel Computer Vision Algorithms for the Detection of Extended Radio Galaxies and Infrared Hosts Nikhel Gupta 1 , Zeeshan Hayder 2 , Ray P. Norris 3,4 , Minh Huynh 1,5 , and Lars Petersson 2 1 CSIRO Space & Astronomy, PO Box 1130, Bentley WA 6102, Australia 2 CSIRO Data61, Black Mountain ACT 2601, Australia 3 Western Sydney University, Locked Bag 1797, Penrith, NSW 2751, Australia 4 CSIRO Space & Astronomy, P.O. Box 76, Epping, NSW 1710, Australia 5 International Centre for Radio Astronomy Research (ICRAR), M468, The University of Western Australia, 35 Stirling Highway, Crawley, WA 6009, Australia Author for correspondence: Nikhel Gupta, Email: Nikhel.Gupta@csiro.au. (Received dd Mmm YYYY; revised dd Mmm YYYY; accepted dd Mmm YYYY; first published online dd Mmm YYYY) Abstract Creating radio galaxy catalogues from next-generation deep surveys requires automated identification of associated components of extended sources and their corresponding infrared hosts. In this paper, we introduce RadioGalaxyNET, a multimodal dataset, and a suite of novel computer vision algorithms designed to automate the detection and localization of multi-component extended radio galaxies and their corresponding infrared hosts. The dataset comprises 4,155 instances of galaxies in 2,800 images with both radio and infrared channels. Each instance provides information about the extended radio galaxy class, its corresponding bounding box encompassing all components, the pixel-level segmentation mask, and the keypoint position of its corresponding infrared host galaxy. RadioGalaxyNET is the first dataset to include images from the highly sensitive Australian Square Kilometre Array Pathfinder (ASKAP) radio telescope, corresponding infrared images, and instance-level annotations for galaxy detection. We benchmark several object detection algorithms on the dataset and propose a novel multimodal approach to simultaneously detect radio galaxies and the positions of infrared hosts. Keywords: galaxies: active; galaxies: peculiar; radio continuum: galaxies; Galaxy: evolution; methods: data analysis 1. Introduction Recent advancements in radio astronomy have enabled us to scan large areas of the sky in a short timescale while generating incredibly sensitive continuum images of the Universe. This has created new possibilities for detecting millions of galaxies at radio wavelengths. For example, the ongoing Evolutionary Map of the Universe (EMU; Norris et al., 2021b) survey, conducted using the Australian Square Kilometre Array Pathfinder (ASKAP; Johnston et al., 2007; DeBoer et al., 2009; Hotan et al., 2021) telescope, is projected to discover more than 40 million compact and extended galaxies in the next five years (Norris et al., 2021b). Similarly, the Low-Frequency Array (LOFAR; van Haarlem et al., 2013) survey of the entire northern sky is expected to detect more than 10 million galaxies. Other advanced radio telescopes include Murchison Widefield Array (MWA; Wayth et al., 2018), MeerKAT (Jonas & MeerKAT Team, 2016) and the Karl G. Jansky Very Large Array (JVLA Perley et al., 2011). With the advent of the Square Kilometre Array (SKA a ) radio telescope, which is expected to become operational in the coming years, the number of galaxy detections is expected to increase further, potentially reaching hundreds of millions. Such an enormous dataset will significantly impact our understanding of the physics of galaxy evolution. This is set to significantly impact our understanding of the evolu- a https://www.skatelescope.org/the-ska-project/ tion of the universe. However, to optimize the outcomes of these surveys, there is a need to innovate and develop new technologies for handling large datasets. Radio galaxies are characterized by giant radio emission regions that extend well beyond their host galaxy structure at visible and infrared wavelengths. While most radio galaxies typically appear as simple, compact circular sources, increasing the sensitivity of radio telescopes results in the detection of more radio galaxies with complex extended structures. These structures typically consist of multiple components with distinct peak radio emissions. Based on the Fanaroff-Riley classifications (Fanaroff & Riley, 1974), radio galaxies exhibit two distinct morphologies, namely, Fanaroff-Riley Class I (FR-I) and Class II (FR-II) Active Galactic Nuclei (AGN) sources. FR- I sources have dark edges, causing the collimated jets from the central black holes at the center of the host galaxy to exhibit lower luminosity at the edges. FR-II sources, on the other hand, have brighter edges compared to the central host galaxies and sometimes lack a visible connection to the host galaxy. Constructing catalogues of radio galaxies necessitates the grouping of associated components within extended radio galaxies and the identification of their corresponding infrared host galaxies. Grouping these components is essential for estimating the real number density and overall integrated flux of radio galaxies. This process is crucial for modelling galaxy evolution and the expansion of the Universe. Failure to properly group associated" 2312.00313v1,"Improving Normalization with the James-Stein Estimator Seyedalireza Khoshsirat Chandra Kambhamettu Video/Image Modeling and Synthesis (VIMS) Lab, University of Delaware {alireza, chandrak}@udel.edu Abstract Stein’s paradox holds considerable sway in highdimensional statistics, highlighting that the sample mean, traditionally considered the de facto estimator, might not be the most efficacious in higher dimensions. To address this, the James-Stein estimator proposes an enhancement by steering the sample means toward a more centralized mean vector. In this paper, first, we establish that normalization layers in deep learning use inadmissible estimators for mean and variance. Next, we introduce a novel method to employ the James-Stein estimator to improve the estimation of mean and variance within normalization layers. We evaluate our method on different computer vision tasks: image classification, semantic segmentation, and 3D object classification. Through these evaluations, it is evident that our improved normalization layers consistently yield superior accuracy across all tasks without extra computational burden. Moreover, recognizing that a plethora of shrinkage estimators surpass the traditional estimator in performance, we study two other prominent shrinkage estimators: Ridge and LASSO. Additionally, we provide visual representations to intuitively demonstrate the impact of shrinkage on the estimated layer statistics. Finally, we study the effect of regularization and batch size on our modified batch normalization. The studies show that our method is less sensitive to batch size and regularization, improving accuracy under various setups. 1. Introduction Deep neural networks have an influential role in many applications, especially computer vision. One milestone improvement in these networks was the addition of normalization layers [21,29,34]. Since then, a plethora of research has tried to improve normalization layers through various means, including better estimating the layer statistics. In this paper, we take a statistical approach to estimate layer statistics and introduce an improved way of estimating the mean and variance in normalization layers. The rest of this section is devoted to introducing prerequisite statistical con- cepts and normalization layers. Estimators. An estimator refers to a method used to calculate an approximation of a specific value from the data observed. Therefore, one should differentiate between the estimator itself, the targeted value of interest, and the resulting approximation [37]. Shrinkage. In statistics, shrinkage is the reduction of the effects of sampling noise. In regression analysis, a fitted relationship appears to perform worse on a new dataset than on the dataset used for fitting [11,56]. More specifically, the value of the coefficient of determination ‘shrinks.’ Shrinkage Estimators. A shrinkage estimator is an estimator that explicitly or implicitly uses the effects of shrinkage. In loose terms, a naive or basic estimate is improved by combining it with other information. This term refers to the notion that the improved estimate is pushed closer to the value provided by the ‘other information’ than the basic estimate [24, 56]. In this sense, shrinkage is used to regularize the estimation process. In terms of mean squared error (MSE), many standard estimators can be improved by shrinking them towards zero or some other value. In other words, the improvement in the estimate from the corresponding reduction in the width of the confidence interval is likely to outweigh the worsening of the estimate instructed by biasing the estimate towards zero [23]. Admissibility. Assume x is distributed according to p(x|θ), with θ being a member of the set Θ. Consider θ̂ as an estimator for θ and let R( θ̂, θ) represent the risk of using θ̂, which is calculated based on a specific loss function. The risk is defined by R( θ̂, θ) = E[ℓ( θ̂, θ)], where ℓ signifies the loss function and the expectation is taken over x drawn from p(x|θ), with θ̂ being a derived function of x. An estimator is deemed ’inadmissible’ if there is another estimator, θ̃, which performs better; that is, R( θ̃, θ) ≤ R( θ̂, θ) for all θ within Θ, and there’s at least one θ for which the inequality is strict. If no such dominating estimator exists, then θ̂ is considered ’admissible’ [6]. James-Stein. Calculating the mean of a multivariate normal distribution stands as a key issue in the field of statistics. Typically, the sample mean is used, which also happens to be the maximum-likelihood estimator. However, the" 2312.00332v1,"Matching Weak Informative Ontologies Peng Wang a a School of Computer Science and Engineering, Southeast University, Nanjing 210096, China Abstract Most existing ontology matching methods utilize the literal information to discover alignments. However, some literal information in ontologies may be opaque and some ontologies may not have sufficient literal information. In this paper, these ontologies are named as weak informative ontologies (WIOs) and it is challenging for existing methods to matching WIOs. On one hand, string-based and linguistic-based matching methods cannot work well for WIOs. On the other hand, some matching methods use external resources to improve their performance, but collecting and processing external resources is still time-consuming. To address this issue, this paper proposes a practical method for matching WIOs by employing the ontology structure information to discover alignments. First, the semantic subgraphs are extracted from the ontology graph to capture the precise meanings of ontology elements. Then, a new similarity propagation model is designed for matching WIOs. Meanwhile, in order to avoid meaningless propagation, the similarity propagation is constrained by semantic subgraphs and other conditions. Consequently, the similarity propagation model ensures a balance between efficiency and quality during matching. Finally, the similarity propagation model uses a few credible alignments as seeds to find more alignments, and some useful strategies are adopted to improve the performance. This matching method for WIOs has been implemented in the ontology matching system Lily. Experimental results on public OAEI benchmark datasets demonstrate that Lily significantly outperforms most of the state-of-the-art works in both WIO matching tasks and general ontology matching tasks. In particular, Lily increases the recall by a large margin, while it still obtains high precision of matching results. Keywords: ontology matching, weak informative ontology, similarity propagation, semantic subgraph 1. Introduction More and more ontologies are created and used distributively by different communities in the past few decades. Ontology users or engineers would integrate or process multiple ontologies in practical applications. However, ontologies themselves could be heterogeneous. Email address: pwang@seu.edu.cn (Peng Wang) Preprint submitted to SCIENCE CHINA: Information Sciences December 4, 2023" 2312.00334v1,"1 UAV-Aided Lifelong Learning for AoI and Energy Optimization in Non-Stationary IoT Networks Zhenzhen Gong , Omar Hashash , Graduate Student Member, IEEE, Yingze Wang , Qimei Cui , Senior Member, IEEE, Wei Ni , Senior Member, IEEE, Walid Saad , Fellow, IEEE, and Kei Sakaguchi , Senior Member, IEEE Abstract—In this paper, a novel joint energy and age of information (AoI) optimization framework for IoT devices in a non-stationary environment is presented. In particular, IoT devices that are distributed in the real-world are required to efficiently utilize their computing resources so as to balance the freshness of their data and their energy consumption. To optimize the performance of IoT devices in such a dynamic setting, a novel lifelong reinforcement learning (RL) solution that enables IoT devices to continuously adapt their policies to each newly encountered environment is proposed. Given that IoT devices have limited energy and computing resources, an unmanned aerial vehicle (UAV) is leveraged to visit the IoT devices and update the policy of each device sequentially. As such, the UAV is exploited as a mobile learning agent that can learn a shared knowledge base with a feature base in its training phase, and feature sets of a zero-shot learning method in its testing phase, to generalize between the environments. To optimize the trajectory and flying velocity of the UAV, an actor-critic network is leveraged so as to minimize the UAV energy consumption. Simulation results show that the proposed lifelong RL solution can outperform the state-of-art benchmarks by enhancing the balanced cost of IoT devices by 8.3% when incorporating warmstart policies for unseen environments. In addition, our solution achieves up to 49.38% reduction in terms of energy consumption by the UAV in comparison to the random flying strategy. Index Terms—Internet of Things (IoT), Unmanned Aerial Vehicle (UAV), Age of Information (AoI), Lifelong Learning. I. I NTRODUCTION HE Internet of Things (IoT) [1] represents a technological breakthrough that brings forth numerous opportunities for new applications at the intersection of wireless communications and intelligent industries, e.g., Industry 4.0 [2]. In fact, IoT devices can provide increased levels of autonomy to physical systems by harnessing their immense capabilities to sense and collect data from their surroundings [3]. In essence, capturing the performance of IoT devices in such use cases has been an active area of research and recent interest [4]. Essentially, this requires adopting novel metrics such as the age of information (AoI) to reflect the timeliness and freshness of the underlying physical systems being monitored [5]. Here, the AoI is defined as the time elapsed since the last successfully received update packet at the IoT device was generated T Zhenzhen Gong, Yingze Wang and Qimei Cui are with the National Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing 100876, China (email: {gzz0822, wang_ying_ze1993, cuiqimei}@bupt.edu.cn). Omar Hashash and Walid Saad are with Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Arlington, VA, 22203, USA (email: {omarnh, walids}@vt.edu). Wei Ni is with Data61, CSIRO, Marsfield, NSW 2122, Australia (email: Wei.Ni@data61.csiro.au) Kei Sakaguchi is with Department of Electrical and Electronic Engineering, Tokyo Institute of Technology, Tokyo, 152-8550, Japan (email: sakaguchi@mobile.ee.titech.ac.jp). by the physical source [6]. Nevertheless, IoT devices often lack sufficient computing capabilities and have limited energy resources to offload their collected data to remote base stations (BSs). Hence, it is challenging for IoT devices to operate in areas with poor connectivity and provide reliable services for mission-critical physical systems. To alleviate such challenges, one can integrate IoT networks with unmanned aerial vehicles (UAVs) [7]–[9] to improve wireless connectivity and enhance computing abilities. Thus, UAVs can be deployed as flying BSs that can communicate with IoT devices in a cost-efficient way. Hence, UAVs assist IoT networks in many applications such as rescue services [7] and smart farming [8]. Evidently, UAVs can enhance the performance of IoT networks by providing versatile wireless and computing services to aid autonomous decision making at the IoT level, and simultaneously, reduce the energy cost of IoT devices. Despite the surge on IoT in literature [4], [10], [11]remarkably, the physical environment associated with IoT networks remains to be considered stationary – an ideal assumption that rarely holds true in practice [12]. As such, this assumption normally considers that the generation of data from the physical system follows a fixed distribution [13] Consequently, the optimal strategies and policies that govern the operation of IoT devices are then considered to be time-invariant [14]. On the contrary, due to changes in the environment affecting the physical system (e.g., thermal drifts) or on the system level itself (e.g., aging effects), non-stationary conditions for IoT devices arise accordingly [15]. Thus, it remains challenging for IoT devices to optimize their performance and reduce their AoI and energy costs in such real-world scenarios [16]. Noticeably, relying on conventional methods such as reinforcement learning (RL) to do so by optimizing the operating policies of these devices drastically fails to address the challenges posed by non-stationary environments. This stems from the fact that such solutions are theoretically developed and tailored towards operating in stationary environments, whereby any variabilities in the environment can lead to suboptimal performance and degradation in the system reliability levels. Henceforth, a robust RL solution that can continuously adapt the policies of IoT devices to unprecedented non-stationary developments in the environment is ultimately required. A. Prior Works Minimizing the AoI has been extensively addressed in various IoT network scenarios [17]–[19] with the aid of UAVs [20], [21]. In particular, the works in [20] and [21] investigate minimizing the AoI for IoT scheduling updates, while optimizing the trajectory [20] and velocity [21] of the" 2312.00343v1,"OpenStereo: A Comprehensive Benchmark for Stereo Matching and Strong Baseline † † Xianda Guo 1, * , Juntao Lu 1, , Chenming Zhang 1, , Yiqi Wang 1 , Yiqun Duan 1 , ‡ Tian Yang 2 , Zheng Zhu 2 , Long Chen 1,3, 1 Waytous 2 GigaAI 3 Institute of Automation, Chinese Academy of Sciences Abstract Traditional stereo matching algorithms typically rely on matching corresponding image regions between the left and right views based on their similarity measures. Several techniques have been proposed, including methods based on gray-level information [5–7], region-based approaches [8, 9], and energy optimization methods [10, 11]. Gray-levelbased methods [5–7] compute disparities by matching pixels or groups of pixels with similar intensities in the left and right images. Region-based approaches [8, 9] group pixels into larger regions and then compute correspondences between these regions. Energy optimization methods [10, 11] involve minimizing an energy function that represents the disparity between image pairs to improve the accuracy of 3D reconstruction from stereo images. While these approaches have made noteworthy progress, they suffer from certain limitations and challenges, such as occlusions, textureless regions, and computational complexity. Recently, bolstered by extensive synthetic datasets [12– 16], CNNs-based stereo matching methods [17–24] has achieved impressive results. These methods have shown remarkable performance particularly in aspects of accuracy and efficiency. Unlike traditional methods, CNN-based stereo matching methods take left and right images as input and directly predict the disparity between them, which are end-to-end frameworks. In addition to the accuracy and efficiency benefits, CNN-based stereo matching methods have shown the potential for generalization to new environments and scenes beyond the training data. This is mainly due to the ability of CNNs to learn feature representations from raw data that are invariant to scale, rotation, and illumination changes. Furthermore, the emergence of large-scale datasets has paved the way for the integration of deep learning in stereo matching, allowing for more complex and sophisticated models to be trained. Despite the considerable advancements made in CNN- based methods, the existing methods still face challenges in achieving both high accuracy and time efficiency. Encoderdecoder networks using 2D CNN methods [12, 24–28] offer efficiency but fall short in achieving extremely high precision, while the cost volume matching with 3D convolu- Stereo matching, a pivotal technique in computer vision, plays a crucial role in robotics, autonomous navigation, and augmented reality. Despite the development of numerous impressive methods in recent years, replicating their results and determining the most suitable architecture for practical application remains challenging. Addressing this gap, our paper introduces a comprehensive benchmark focusing on practical applicability rather than solely on performance enhancement. Specifically, we develop a flexible and efficient stereo matching codebase, called OpenStereo. OpenStereo includes training and inference codes of more than 12 network models, making it, to our knowledge, the most complete stereo matching toolbox available. Based on OpenStereo, we conducted experiments on the Scene- Flow dataset and have achieved or surpassed the performance metrics reported in the original paper. Additionally, we conduct an in-depth revisitation of recent developments in stereo matching through ablative experiments. These investigations inspired the creation of StereoBase, a simple yet strong baseline model. Our extensive comparative analyses of StereoBase against numerous contemporary stereo matching methods on the SceneFlow dataset demonstrate its remarkably strong performance. The source code is available at https://github.com/XiandaGuo/ OpenStereo. 1. Introduction Stereo matching, a core subject in computer vision, focuses on calculating the disparity between the left and right images. It is vital in a wide array of applications such as robotics [1], autonomous driving [2, 3], and augmented reality [4], as it enables depth perception and 3D reconstruction of the observed scene. * First author: xianda guo@163.com † These authors contributed equally to this work. ‡ Corresponding Author:long.chen@ia.ac.cn 1" 2312.00347v1,"RTQ: Rethinking Video-language Understanding Based on Image-text Model Xiao Wang Yaoyu Li Tian Gan ∗ scz.wangxiao@gmail.com Harbin Institute of Technology, Shenzhen & JD.com Inc. liyaoyu2014@gmail.com JD.com Inc. gantian@sdu.edu.cn Shandong University Zheng Zhang Jingjing Lv Liqiang Nie zhangzheng11@jd.com JD.com Inc. lvjinghit@163.com JD.com Inc. nieliqiang@gmail.com Harbin Institute of Technology, Shenzhen   ABSTRACT Recent advancements in video-language understanding have been established on the foundation of image-text models, resulting in promising outcomes due to the shared knowledge between images and videos. However, video-language understanding presents unique challenges due to the inclusion of highly complex semantic details, which result in information redundancy, temporal dependency, and scene complexity. Current techniques have only partially tackled these issues, and our quantitative analysis indicates that some of these methods are complementary. In light of this, we propose a novel framework called RTQ (Refine, Temporal model, and Query), which addresses these challenges simultaneously. The approach involves refining redundant information within frames, modeling temporal relations among frames, and querying taskspecific information from the videos. Remarkably, our model demonstrates outstanding performance even in the absence of videolanguage pre-training, and the results are comparable with or superior to those achieved by state-of-the-art pre-training methods. CCS CONCEPTS • Information systems → Multimedia and multimodal retrieval; • Computing methodologies → Computer vision. KEYWORDS Video Retrieval; Video Caption; Video Question Answering ACM Reference Format: Xiao Wang, Yaoyu Li, Tian Gan, Zheng Zhang, Jingjing Lv, and Liqiang Nie. 2023. RTQ: Rethinking Video-language Understanding Based on Imagetext Model. In Proceedings of the 30th ACM International Conference on Multimedia (MM ’23), October 29-November 3, 2023, Ottawa, Canada. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn ∗ Corresponding author: Tian Gan Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MM’23, October 29-November 3, 2023, Ottawa, Canada © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Caption: A person is pulling on a parachute.    Question: What did the dog do after the girl puts her palm out? Candidates: A1: place paw on her palm, A2: kiss her.  Text query: The woman first spreads butter on one side of the bread slices, then places the bread butter onto a hot pan. Figure 1: Video language understanding requires dynamic perception and interpretation of complex semantics, which can be further decomposed into three challenges. 1 INTRODUCTION Video-language understanding ability can reflect the proficiency of intelligent agents in perceiving and interpreting visual and textual cues in the real world. This ability is evaluated through a range of tasks, including text-to-video retrieval, video captioning, and video question answering, etc. Recent approaches in this area generally modify pre-trained image-text models for video-language understanding, owing to the transferable knowledge acquired by these models [12, 17, 46]. Since image-text models have learned a lot of transferable vision-language knowledge, these approaches generally perform better and are becoming the de facto paradigm. However, such an approach has limitations in handling situations beyond the shared knowledge between images and videos. Video-language understanding involves dynamic perception and interpretation of complex semantics. This can be further decomposed into three challenges as depicted in Fig. 1. The first challenge is Information redundancy which arises due to the presence of information that is duplicated or lacks semantic meaning. It hinders the model’s ability to accurately recognize essential cues. For example, frames in Fig. 1(a) are quite similar, some of which can be removed without affecting the interpretation. The second" 2312.00351v1,"Manipulating the Label Space for In-Context Classification Haokun Chen, Xu Yang, Yuhang Huang, Zihan Wu, Jing Wang, Xin Geng School of Computer Science & Engineering, Key Lab of New Generation Artificial Intelligence Technology & Its Interdisciplinary Applications (Ministry of Education) Southeast University chenhaokun@seu.edu.cn, xuyang palm@seu.edu.cn, HuangYH723@outlook.com zihanwu seu@outlook.com, wangjing91@seu.edu.cn, xgeng@seu.edu.cn Abstract After pre-training by generating the next word conditional on previous words, the Language Model (LM) acquires the ability of In-Context Learning (ICL) that can learn a new task conditional on the context of the given in-context examples (ICEs). Similarly, visually-conditioned Language Modelling is also used to train Vision-Language Models (VLMs) with ICL ability. However, such VLMs typically exhibit weaker classification abilities compared to contrastive learning-based models like CLIP, since the Language Modelling objective does not directly contrast whether an object is paired with a text. To improve the ICL of classification, using more ICEs to provide more knowledge is a straightforward way. However, this may largely increase the selection time, and more importantly, the inclusion of additional in-context images tends to extend the length of the in-context sequence beyond the processing capacity of a VLM. To alleviate these limitations, we propose to manipulate the label space of each ICE to increase its knowledge density, allowing for fewer ICEs to convey as much information as a larger set would. Specifically, we propose two strategies which are Label Distribution Enhancement and Visual Descriptions Enhancement to improve In-context classification performance on diverse datasets, including the classic ImageNet and more finegrained datasets like CUB-200. Specifically, using our approach on ImageNet, we increase accuracy from 74.70% in a 4-shot setting to 76.21% with just 2 shots. surpassing CLIP by 0.67%. On CUB-200, our method raises 1-shot accuracy from 48.86% to 69.05%, 12.15% higher than CLIP. The code is given in https://anonymous.4open. science/r/MLS_ICC. 1. Introduction Image classification stands as a cornerstone in computer vision and attracts significant research attention due to its Output: Blue Grosbeak Output: VLM Blue Jay × (a) In-context Learning by Single Label. Output: Blue Grosbeak, but may be a Indigo Bunting. Output: VLM Blue √ Grosbeak (b) In-context Learning by LDE. Output: Blue Grosbeak, which has the blue upperparts and the blue long tail. Output: VLM Blue √ Grosbeak (c) In-context Learning by VDE. Label Distribution Enhancement GT Label Label Space Blue Grosbeak Indigo Bunting Visual Description Enhancement the blue upperparts and the blue long tail (d) Manipulation of Label Space. Figure 1. (a) Traditional in-context learning with single labels may fail to capture the correct ground truth label. (b) Our Label Distribution Enhancement (LDE) addresses this by considering a broader label distribution. (c) Visual Description Enhancement (VDE) further refines the accurate representation by incorporating detailed visual descriptors. (d) The combined manipulation of the label space with LDE and VDE enables a more precise and comprehensive classification. critical importance, not only forms the basis for various visual tasks but also serves as a crucial benchmark for diverse network architectures and learning settings, and insights gained from classification studies are instrumental in addressing other vision tasks in these settings. In the early stages, classification networks predominantly learned from large datasets with human-annotated labels under supervised settings, with ImageNet [5] being" 2312.00352v1,"Quantum Kernel t-Distributed Stochastic Neighbor Embedding Yoshiaki Kawase ∗ Graduate School of Information Science and Technology, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan and Graduate School of Engineering Science, Osaka University 1-3 Machikaneyama, Toyonaka, Osaka 560-8531, Japan Kosuke Mitarai † Graduate School of Engineering Science, Osaka University 1-3 Machikaneyama, Toyonaka, Osaka 560-8531, Japan and Center for Quantum Information and Quantum Biology, Osaka University 560-0043, Japan. Keisuke Fujii ‡ Graduate School of Engineering Science, Osaka University 1-3 Machikaneyama, Toyonaka, Osaka 560-8531, Japan Center for Quantum Information and Quantum Biology, Osaka University 560-0043, Japan. RIKEN Center for Quantum Computing, Wako Saitama 351-0198, Japan. (Dated: December 4, 2023) and Data visualization is important in understanding the characteristics of data that are difficult to see directly. It is used to visualize loss landscapes and optimization trajectories to analyze optimization performance. Popular optimization analysis is performed by visualizing a loss landscape around the reached local or global minimum using principal component analysis. However, this visualization depends on the variational parameters of a quantum circuit rather than quantum states, which makes it difficult to understand the mechanism of optimization process through the property of quantum states. Here, we propose a quantum data visualization method using quantum kernels, which enables us to offer fast and highly accurate visualization of quantum states. In our numerical experiments, we visualize hand-written digits dataset and apply k-nearest neighbor algorithm to the low-dimensional data to quantitatively evaluate our proposed method compared with a classical kernel method. As a result, our proposed method achieves comparable accuracy to the state-of-the-art classical kernel method, meaning that the proposed visualization method based on quantum machine learning does not degrade the separability of the input higher dimensional data. Furthermore, we visualize the optimization trajectories of finding the ground states of transverse field Ising model and successfully find the trajectory characteristics. Since quantum states are higher dimensional objects that can only be seen via observables, our visualization method, which inherits the similarity of quantum data, would be useful in understanding the behavior of quantum circuits and algorithms. I. INTRODUCTION Data visualization is a popular and important application of dimensionality reduction, such as principal component analysis (PCA), autoencoder [1], and variational autoencoder [2]. Data visualization is performed by mapping high-dimensional data into two-dimensional space. The visualized data are useful in finding trends and understanding the characteristics of data that are difficult to see directly from the raw high-dimensional data. PCA and t-distributed stochastic neighbor embedding (t-SNE) [3] are popular choices for data visualization in classical machine learning. For example, they are used to visualize loss landscapes [4] and optimization processes [5, 6] to gain intuitive insights into the complex optimization processes. In quantum computing, there is a similar demand to ∗ ykawase@g.ecc.u-tokyo.ac.jp † mitarai@qc.ee.es.osaka-u.ac.jp ‡ fujii@qc.ee.es.osaka-u.ac.jp obtain an intuitive insight into the optimization of quantum circuit architecture design or variational quantum algorithms. More concretely, variational quantum algorithms [7], such as variational quantum eigensolver [8, 9], quantum approximate optimization algorithm [10], and quantum neural networks [11–13], are promising routes to use noisy intermediate-scale quantum devices for practically important problems. However, it is difficult to design a parameterized quantum circuit for a variational ansatz because different tasks require different expressibility [14, 15]. Furthermore, once a parameterized quantum circuit is fixed, there exist challenges in parameter optimization, such as vanishing gradient problem [16–18] and being trapped in local minima [19]. Quantum data visualization [20, 21] can be used to address these issues in variational quantum algorithms. Indeed, visualizing loss landscapes and optimization trajectories by principal component analysis have been performed in quantum machine learning [20]. However, this approach only visualizes changes in variational parameters and does not reflect direct information about quantum states during optimization process." 2312.00353v1,"On Exploring the Reasoning Capability of Large Language Models with Knowledge Graphs Pei-Chi Lo Yi-Hang Tsai pclo.2017@phdcs.smu.edu.sg Singapore Management University Singapore d094020002@nsysu.edu.tw National Sun Yat-sen University Taiwan Ee-Peng Lim San-Yih Hwang eplim@smu.edu.sg Singapore Management University Singapore syhwang@mis.nsysu.edu.tw National Sun Yat-sen University Taiwan ABSTRACT This paper examines the capacity of LLMs to reason with knowledge graphs using their internal knowledge graph, i.e., the knowledge graph they learned during pre-training. Two research questions are formulated to investigate the accuracy of LLMs in recalling information from pre-training knowledge graphs and their ability to infer knowledge graph relations from context. To address these questions, we employ LLMs to perform four distinct knowledge graph reasoning tasks. Furthermore, we identify two types of hallucinations that may occur during knowledge reasoning with LLMs: content and ontology hallucination. Our experimental results demonstrate that LLMs can successfully tackle both simple and complex knowledge graph reasoning tasks from their own memory, as well as infer from input context. 1 INTRODUCTION Large Language Models (LLMs), with the ability to in-context learning and Chain-of-Thought (CoT), have shown to outperform previous state-of-the-art models in many information retrieval (IR) tasks [2, 5, 7, 8, 11, 18, 21, 22], e.g., question answering [3, 4, 6, 12, 13] and common sense reasoning [15, 17]. In this work, we explore LLMs’ ability in addressing knowledge graph reasoning with its own knowledge capacity. To the best of our knowledge, no examination has been conducted on the ability of LLMs to deduce knowledge from its internal Knowledge Graphs (KGs). As the training process and training data are both undisclosed for mainstream LLMs such as text-davinci-003 and ChatGPT, it is unknown whether LLMs are pre-training on knowledge graph data. In this study, we therefore investigate the capacity of LLMs to recall information from their internal KGs, i.e., the knowledge graph they learned during pre-training. Specifically, we examine their ability to deduce direct relations, which refer to one-hop connections in the KG. We then proceed to explore their capability to infer multi-hop relations, which is a more challenging task that requires not only relation inference but also the formation Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). Gen-IR@SIGIR2023, July 27, 2023, Taipei, Taiwan © 2023 Copyright held by the owner/author(s). of paths in the KG. In the area of information retrieval, contextual information plays a crucial role in disambiguating words that have multiple meanings. As such, we investigate whether LLMs have the ability to retrieve contextual information from a given text. In this study, our first focus is to investigate the capacity of LLMs to retrieve information related to knowledge graphs from their own memory. To address this issue, our first research question is formulated as follows: RQ1: To what extent can LLMs accurately recall information from KG? To address this research question, we employ LLMs to perform two non-contextual relation generation tasks, namely tail entity prediction and relation prediction. During the experiment, we observe how LLMs suffer from hallucination when addressing these tasks. This raises concerns of deploying LLMs in practice and compromises result accuracy as hallucinations result in nonfactual statements and can potentially be harmful [8, 11]. We define hallucination in knowledge graph reasoning into two types: content and ontology hallucination. Previous works address the hallucination issue by introducing an additional retrieval step that retrieves external information such as Wikipedia pages [1, 10, 20] and condition the LLM’s generation on both the query input and retrieved external information. This results in a more controlled result generation with less hallucination. An essential aspect of reasoning with knowledge graphs is the capacity to deduce relations within the graph based on contextual information. This ability is critical, and it leads us to our second research question: RQ2: To what extent can LLMs infer knowledge graph relations from context? To address this question, we undertake two tasks that involve generating contextual relations using LLMs: Relation Extraction (RE) and Contextual Path Generation (CPG). In the following sections, we present our contributions as follows: (1) we investigate two research questions that explore the LLMs’ ability to reason with their internal knowledge graph, (2) we distinguish content and ontology hallucination that occur in knowledge reasoning tasks, and (3) experiment results indicate that the LLMs can retrieve knowledge graph information from memory and infer knowledge graph relations from given context." 2312.00363v1,"Searching for discrete series representations at the late-time boundary of de Sitter Gizem Şengör Abstract The group SO(d + 1, 1) makes an appearance both as the conformal group of Euclidean space in d dimensions and as the isometry group of de Sitter spacetime in d + 1 dimensions. While this common feature can be taken as a hint towards holography on de Sitter space, understanding the representation theory has importance for cosmological applications where de Sitter spacetime is relevant. Among the categories of SO(d + 1, 1) unitary irreducible representations, discrete series is important in physical applications because they are expected to capture gauge fields. However, they are also the most difficult ones to recognize in field theoretical examples compared to representations from the other categories. Here we point towards some examples where we are able to recognize discrete series representations from fields on de Sitter and highlight some of the properties of these representations. 1 Introduction The group SO(d + 1, 1) is a group that lies at the intersection of multiple disciplines. Being the conformal group of Euclidean space in d dimensions it is of interest to Euclidean Conformal Field Theory (CFT) [1]. Yet being the isometry group of de Sitter spacetime in d + 1 dimensions it is the group to address when discussing quantum field theory (QFT) on de Sitter [4, 5, 6, 7]. Having both a CFT and a curved spacetime side to it, makes SO(d + 1, 1) also appear in Holography [8]. In short SO(d + 1, 1) is a group about both Euclidean space and de Sitter spacetime. de Sitter spacetime itself is one of the three maximally symmetric vacuum solutions to the Einstein equations with a cosmological constant. This makes Gizem Şengör Physics Department, Boğaziçi University 34342 Bebek, İstanbul Turkey, e-mail: gizem.sengor@boun.edu.tr 1" 2312.00372v1,"Event-driven Real-time Retrieval in Web Search Nan Yang Yannan Zhang Xiaoling Bai Tencent PCG Beijing, China marinyang@tencent.com Tencent PCG Beijing, China yananzhang@tencent.com Tencent PCG Beijing, China devinbai@tencent.com Hualong Deng Tianhua Zhou Jin Ma Tencent PCG Beijing, China tonnydeng@tencent.com Tencent PCG Beijing, China kivizhou@tencent.com University of Science and Technology of China Hefei, China majin01@mail.ustc.edu.cn ABSTRACT Information retrieval in real-time search presents unique challenges distinct from those encountered in classical web search. These challenges are particularly pronounced due to the rapid change of user search intent, which is influenced by the occurrence and evolution of breaking news events, such as earthquakes, elections, and wars. Previous dense retrieval methods, which primarily focused on static semantic representation, lack the capacity to capture immediate search intent, leading to inferior performance in retrieving the most recent event-related documents in time-sensitive scenarios. To address this issue, this paper expands the query with event information that represents real-time search intent. The Event information is then integrated with the query through a cross-attention mechanism, resulting in a time-context query representation. We further enhance the model’s capacity for event representation through multi-task training. Since publicly available datasets such as MS- MARCO do not contain any event information on the query side and have few time-sensitive queries, we design an automatic data collection and annotation pipeline to address this issue, which includes ModelZoo-based Coarse Annotation and LLM-driven Fine Annotation processes. In addition, we share the training tricks such as two-stage training and hard negative sampling. Finally, we conduct a set of offline experiments on a million-scale production dataset to evaluate our approach and deploy an A/B testing in a real online system to verify the performance. Extensive experimental results demonstrate that our proposed approach significantly outperforms existing state-of-the-art baseline methods. CCS CONCEPTS • Information systems → Retrieval models and ranking. KEYWORDS Information retrieval, Real-time search, Large Language Model 1 INTRODUCTION Over the past decades, news search has become an increasingly important portal for people to access information. As an important component of news search, real-time retrieval [27] has emerged as a critical requirement, as it places greater emphasis on the timeliness of retrieved documents compared to traditional dense retrieval methods. The fundamental challenge in information retrieval lies in calculating the similarity between a query and a document, which can be achieved through literal matching or semantic matching. User Search Query: Green ( user intent is ambiguous ) Latest Hot Event: Green Poole Conflict ( query-related user intent ) Breaking News: Sources said there was a physical conflict in the Warriors' training today when Green's fierce interaction with Poole escalated, Green forcibly attacked Poole. query-relevant and event-relevant Out of Date News: Green said he invited Durant and planned to arrange bands from other countries for him, but Durant didn't come. query-relevant but event-irrelevant Other News: The first game of the new season is just around the corner, Phoenix Suns says hello to everyone in Chinese! query-irrelevant and event-irrelevant Figure 1: In the realm of time-sensitive search scenarios, given a user search query, the most likely query intent is defined as the latest trending event related to the query. Consequently, we can categorize documents into three tiers, ranging from high to low quality: 1) Breaking news that is both query-relevant and event-relevant; 2) The out-of-date news that is query-relevant but event-irrelevant; 3) Other news that is neither query-relevant nor event-relevant. While traditional methods like BM25[30] are effective for literal matching, they fall short in semantic matching. To address this issue, large-scale pre-trained models have been successfully employed for semantic retrieval [8, 10, 12, 17, 19, 20]. However, real-time retrieval poses unique challenges and characteristics in our specific context: On the one hand, real search intent changes rapidly with the occurrence and evolution of breaking news. The query representation encoded by pre-trained language models (PTMs) is a static vector that does not contain any requirements corresponding to the current event. Due to the lack of real-time context, event-aware documents can not be adopted, especially for short and long-tail queries. As shown in Figure 1, in news search, when users enter the query “Green”, they are highly likely trying to find the breaking news, e.g. “Green Poole Conflict”. Unfortunately, the intent of the original query is ambiguous and there are no differences in the semantic scores between event-relevant and event-irrelevant documents. Therefore, the event-relevant documents may be ranked lower or truncated, making it difficult to meet the user intent. On the other hand, existing retrieval benchmarks, such as MS- MARCO [21], predominantly concentrate on general search scenarios, which have a different data distribution from time-sensitive" 2312.00387v1,"Partition-based K-space Synthesis for Multi-contrast Parallel Imaging Yuxia Huang, Zhonghui Wu, Xiaoling Xu, Minghui Zhang, Shanshan Wang, Senior Member, IEEE, Qiegen Liu, Senior Member, IEEE Abstract—Multi-contrast magnetic resonance imaging is a significant and essential medical imaging technique. However, multi-contrast imaging has longer acquisition time and is easy to cause motion artifacts. In particular, the acquisition time for a T2-weighted image is prolonged due to its longer repetition time (TR). On the contrary, T1-weighted image has a shorter TR. Therefore, utilizing complementary information across T1 and T2- weighted image is a way to decrease the overall imaging time. Previous T1-assisted T2 reconstruction methods have mostly focused on image domain using whole-based image fusion approaches. The image domain reconstruction method has the defects of high computational complexity and limited flexibility. To address this issue, we propose a novel multi-contrast imaging method called partition-based k-space synthesis (PKS) which can achieve super reconstruction quality of T2-weighted image by feature fusion. Concretely, we first decompose fully-sampled T1 k-space data and under-sampled T2 kspace data into two sub-data, separately. Then two new objects are constructed by combining the two sub-T1/T2 data. After that, the two new objects as the whole data to realize the reconstruction of T2-weighted image. Finally, the objective T2 is synthesized by extracting the sub-T2 data of each part. Experimental results showed that our combined technique can achieve comparable or better results than using traditional k-space parallel imaging (SAKE) that processes each contrast independently. Index Terms—Multi-contrast MRI, parallel imaging, feature fusion, k-space synthesis. I. I NTRODUCTION agnetic Resonance Imaging (MRI) is extensively employed in the clinic to diagnose various diseases and injuries and offers advantages such as non-ionizing radiation and soft tissue resolution [1, 2]. 1 However, in clinical applications, it is often necessary to obtain images of the same anatomical structure with different contrasts, such as Proton Density-weighted image (PDWI), T1-weighted image and T2-weighted image (i.e., T1WI and T2WI) [3, 4]. Multicontrast MRI can provide more structural and functional information, enabling accurate diagnosis and evaluation of different diseases. Each contrast image is used to examine the different physical properties of the same tissues [5, 6]. The T1WI highlights the tissue structure, which has a shorter TR. The T2WI prioritizes capturing fine details, but this M This work was supported in part by National Natural Science Foundation of China under 62122033 and Key Research and Development Program of Jiangxi Province under 20212BBE53001. (Y. Huang and Z. Wu are co-first authors.) (Corresponding authors: S. Wang and Q. Liu) Y. Huang, Z. Wu, X. Xu, M. Zhang, Q. Liu are with School of Information Engineering, Nanchang University, Nanchang 330031, China. ({huangyuxia, wuzhonghui}@email.ncu.edu.cn, {xuxiaoling, zhangminghui, liuqiegen}@ncu.edu.cn) S. Wang is with Paul C. Lauterbur Research Center for Biomedical Imaging, SIAT, Chinese Academy of Sciences, Shenzhen 518055, China. (sophiasswang@hotmail.com) comes at the expense of a slower image acquisition speed. Therefore, we can consider performing k-space undersampling [7, 8] to obtain faster T2WI reconstruction. Parallel imaging (PI) is based on the simultaneous acquisition of signals from multiple receiver coils to speed up scanning. Traditional PI reconstruction methods can be broadly categorized into two types. One in which the reconstruction method is performed in image space and the other type is performed in k-space. An image domain reconstruction example is sensitivity encoding (SENSE) [9], where SENSE required the estimation of the sensitivity distribution pattern of each receiver coil, and used coil sensitivity contours to recover the image from under-sampled data. Moreover, there are various k-space domain reconstruction methods available, such as generalized self-calibrating PI acquisition (GRAPPA) [10], iterative self-consistent PI reconstruction (SPIRiT) [11], efficient eigenvector-based SPIRiT (ESPIRiT) [12], simultaneous auto-calibration and k-space estimation (SAKE) [13], and PI low-rank matrix modeling in local k-space neighborhoods (P-LORAKS) [14]. In PI, both GRAPPA [10] and ESPIRiT [12] methods employ calibration data to estimate and restore missing k-space information. Unlike the above two imaging methods that require additional auto-calibration signal (ACS) lines for estimating reconstruction kernels or sensitivity maps, SAKE [13] avoided this step by integrating auto-calibration and kspace estimation within a unified framework. It employs a projection-set algorithm with singular value thresholding to recover the missing k-space data by alternately enforcing data consistency and low-rank Hankel matrix structure without any fully-sampled calibration region. While PI methods improve image quality and reduce data acquisition time, most of the methods reported in the literature focus on reconstructing MR images using under-sampled data from the same contrast. There has been a lack of emphasis on investigating the relationship between different MR sequences and fully leveraging the redundant information available in multi-contrast datasets [15-18]. Therefore, for the problem of T1/T2WI, we show that further exploiting the complementarity between different T1/T2WI can reconstruct more accurate images. Leveraging the high-quality images obtained from the auxiliary mode (T1WI) to assist the target mode (T2WI) is essentially an accelerated imaging process, which has been confirmed by previous work. For example, Kim et al. [19] generated MR images by combining anatomical information from different contrast images, which improved the reconstruction performance. Alkan et al. [20] proposed a 9-layer two-dimensional convolutional neural network using T1WI and eight tissue masks as inputs to generate the corresponding T2WI. Vemulapalli et al. [21] solved the problem of cross-modal medical image synthesis in an unsupervised environment, generating T1-MRI scans from T2-MRI scans and vice versa. A similar work in [22], reconstructed highquality T2WI based on the Dense-Unet deep learning method combining fully-sampled T1WI and under-sampled T2WI. However, these multi-contrast deep learning methods" 2312.00398v1,"LEARNING TO ESTIMATE CRITICAL GAIT PARAMETERS FROM SINGLE-VIEW RGB VIDEOS WITH TRANSFORMER-BASED ATTENTION NETWORK Hung Le, Hieu Pham † College of Engineering & Computer Science, VinUni-Illinois Smart Health Center, VinUniversity † Corresponding author: hieu.ph@vinuni.edu.vn ABSTRACT Musculoskeletal diseases and cognitive impairments in patients lead to difficulties in movement as well as negative effects on their psychological health. Clinical gait analysis, a vital tool for early diagnosis and treatment, traditionally relies on expensive optical motion capture systems. Recent advances in computer vision and deep learning have opened the door to more accessible and cost-effective alternatives. This paper introduces a novel spatio-temporal Transformer network to estimate critical gait parameters from RGB videos captured by a single-view camera. Empirical evaluations on a public dataset of cerebral palsy patients indicate that the proposed framework surpasses current state-of-the-art approaches and show significant improvements in predicting general gait parameters (including Walking Speed, Gait Deviation Index - GDI, and Knee Flexion Angle at Maximum Extension), while utilizing fewer parameters and alleviating the need for manual feature extraction. Index Terms— Gait analysis, Transformer, RGB videos. 1. INTRODUCTION Approximately 1.7 billion individuals worldwide are currently affected by movement-related diseases [1]. These conditions encompass a wide range of diseases that negatively impact the muscles, bones, and joints. The cognitive function of a person is also shown to be associated with their manner of movement [2]. As a result, human gait analysis has become a crucial tool for early diagnosis of musculoskeletal conditions. In clinical gait analysis, quantitatively measuring general gait parameters, such as walking speed, cadence, or gait deviation index (GDI) is essential in determining the overall health and function of a patient’s gait [3, 4, 5]. The current workflow of human motion analysis typically relies on optical motion capture systems (Mocap) [6]. These systems require the use of multiple specialized cameras and sensors to track the patient’s movements. The two-dimensional (2D) videos from these cameras are then constructed into three-dimensional (3D) motion data [7], which then can be used to compute various gait parameters. Unfortunately, Mocap systems require expensive equipment and well-trained personnel while also demanding careful calibration and positioning of the system for optimal performance [8]. Alternatives include wearable inertial sensors or depth cameras [9, 10] but their accessibility is limited due to their cost and the specialized skills required for operation. Recently, 2D markerless video sequences captured from single-camera videos have emerged as a convenient and economical option [11] by minimizing the needs for expensive equipment. In particular, deep neural networks (DNNs) become a powerful tool to automatically learn and extract 2D skeletal data [12] for human gait assessment [13]. However, estimating gait parameters directly from these skeletal data is prone to errors due to the lack of robustness and precision from pose tracking algorithms [14]. As a result, the expressiveness and resilience to noise of DNNs help them stand out as a more efficient and precise method for estimating general gait parameters [15]. In this study, we propose a novel spatio-temporal Transformer architecture for gait analysis using single-camera RGB videos, which could effectively learn intricate spatio-temporal dynamics in human gait, a challenge for most traditional methods. The first stage of this architecture aims to extract the keypoints of 2D human pose captured from a video using OpenPose [12]. The second stage uses a spatio-temporal Transformer network to predict gait parameters, including Gait Deviation Index, knee flexion angle at maximum extension, speed, and cadence. The main contributions of this work are summarized as follows: • We are the first to introduce a spatio-temporal Transformer network for quantitatively estimating gait parameters for gait analysis from single-view RGB videos. Our network design allows us to both extract spatial and temporal features effectively the anatomical keypoints from single-camera RGB videos. • The flexibility inherent in the proposed network help to achieve superior performance in predicting gait parameters compared to current state-of-the-art methods, meanwhile reducing number of parameters and obviating the need for manually crafted time series. • Our codes, and trained deep learning models are made publicly available: https://github.com/vinun i-vishc/transformer-gait-analysis." 2312.00401v1,"VIoTGPT: Learning to Schedule Vision Tools towards Intelligent Video Internet of Things Yaoyao Zhong, Mengshi Qi, Rui Wang, Yuhan Qiu, Yang Zhang, Huadong Ma Beijing University of Posts and Telecommunications (BUPT) {zhongyaoyao, qms, wr, qiuyuhan, zy2023, mhd}@bupt.edu.cn Abstract Video Internet of Things (VIoT) has shown full potential in collecting an unprecedented volume of video data. Learning to schedule perceiving models and analyzing the collected videos intelligently will be potential sparks for VIoT. In this paper, to address the challenges posed by the fine-grained and interrelated vision tool usage of VIoT, we build VIoTGPT, the framework based on LLMs to correctly interact with humans, query knowledge videos, and invoke vision models to accomplish complicated tasks. To support VIoTGPT and related future works, we meticulously crafted the training dataset and established benchmarks involving 11 representative vision models across three categories based on semi-automatic annotations. To guide LLM to act as the intelligent agent towards intelligent VIoT, we resort to ReAct instruction tuning based on the collected VIoT dataset to learn the tool capability. Quantitative and qualitative experimental results and analyses demonstrate the effectiveness of VIoTGPT. 1. Introduction The ubiquitous visual sensors, contemporary communication technologies, and high-capacity networking have enabled the potential of Video Internet of Things (VIoT), i.e., internetworking of large-scale visual sensors, in collecting the unprecedented volume of video data and therefore offering a full ambient environment monitoring [6, 41]. Leveraging the power of perceiving techniques driven by deep learning [13, 23, 26, 31, 48], the acquired video data is eagerly expected to help with various VIoT applications, such as large geographical area monitoring for smart transportation [61, 68] and public safety [36, 37, 71]. As summarized by previous works [6, 69], perceiving techniques are highly varied and wide, from biometric recognition [12, 20, 38, 51, 79], human performance analysis [3, 27, 70], to generic scene understanding [19], etc. Therefore, how to schedule these domain-specific perceiv- ing models and analyze the collected videos uniformly, efficiently, and especially intelligently is a main technique challenge. Although the all-for-one unified visual models [30, 73] are compelling, they may not possess the domain-specific knowledge needed to replace certain perceiving models, especially the fine-grained ones like biometric recognition. Additionally, they are still too heavy to deal with a large volume of video data. Some recent works [22, 29, 44, 46, 62, 65, 67] discover the potential ability of the large language models (LLMs) to act as an intelligent agent to use tools, which motivates us to investigate the power of LLMs invoking and scheduling a variety of lightweight visual models to analyze the diverse surveillance videos. One possible approach is to directly guide powerful LLMs to use the tool by offering concise explanations and demonstrations through in-context prompts, such as Visual Programming [21] and Visual ChatGPT [62]. However, these works must rely heavily on strong LLMs like ChatGPT. Alternatively, another approach is to fine-tune LLMs to become proficient in particular tools, such as Toolformer [46] and GPT4Tools [65], requiring deep acquaintance with the application domains and tool usages. Compared with previous tools like calculators, search engines, and usual vision models, etc., the visual algorithms for intelligent surveillance can be more “unusual” for LLMs to distinguish, plan, and execute. These algorithms fall under three broad categories: human-centric, vehicle-centric, and event-related. On one hand, LLMs necessitate distinguishing some fine-grained visual tools, e.g., decide to invoke face recognition [12], person re-identification [78] or gait recognition [16] algorithm when they are asked to recognize the person in the video. On the other hand, it is required to invoke multiple interrelated algorithms successively and decide whether to execute the next visual algorithms, e.g., whether to evaluate the impact of behavior after the action recognition [78]. To address the above challenges, we meticulously crafted a training dataset of VIoT involving 11 representative vision models across three categories. In addition, we" 2312.00407v1,"CoLLiE: Collaborative Training of Large Language Models in an Efficient Way Kai Lv 1∗† , Shuo Zhang 1∗† , Tianle Gu 2 , Shuhao Xing 1 , Jiawei Hong 1 , Keyu Chen 1 Xiaoran Liu 1 , Yuqing Yang 1 , Honglin Guo 1 , Tengxiao Liu 1 , Yu Sun 1 Qipeng Guo 1 , Hang Yan 2‡ , Xipeng Qiu 1‡ 1 School of Computer Science, Fudan University, 2 Shanghai AI Laboratory 1 {klv21, szhang22, hongjw21, kychen22, liuxr22}@m.fudan.edu.cn 1 {shxing, hlguo20, qpguo16, xpqiu}@fudan.edu.cn, 2 {gutianle, yanhang}@pjlab.org.cn Abstract Pre-trained LLMs Chinese LLMs AI Chatbot LLaMA Large language models (LLMs) are increasingly pivotal in a wide range of natural language processing tasks. Access to pre-trained models, courtesy of the open-source community, has made it possible to adapt these models to specific applications for enhanced performance. However, the substantial resources required for training these models necessitate efficient solutions. This paper introduces CoL- LiE, an efficient library that facilitates collaborative training of large language models using 3D parallelism, parameter-efficient fine-tuning (PEFT) methods, and optimizers such as Lion, Adan, Sophia, LOMO and AdaLomo. With its modular design and comprehensive functionality, CoLLiE offers a balanced blend of efficiency, ease of use, and customization. CoLLiE has proven superior training efficiency in comparison with prevalent solutions in pre-training and fine-tuning scenarios. Furthermore, we provide an empirical evaluation of the correlation between model size and GPU memory consumption under different optimization methods, as well as an analysis of the throughput. Lastly, we carry out a comprehensive comparison of various optimizers and PEFT methods within the instruction-tuning context. CoLLiE is available at https://github.com/OpenLMLab/collie. 1 Introduction Large language models (LLMs) have demonstrated remarkable abilities across various natural language processing tasks and showcased potential as intelligent assistants. Thanks to the vibrant opensource community, multiple excellent large language models’ weights are accessible, including OPT (Zhang et al., 2022), BLOOM (Scao et al., 2022), LLaMA (Touvron et al., 2023), etc. Despite the impressive general capabilities of pre-trained LLMs, training for particular application scenarios ∗ Equal contribution. Work done during internship at Shanghai AI Lab. ‡ Corresponding authors. † GLM InternLM ··· Further Pre-training Medical LLMs Instruction Tuning AI Doctor Financial LLMs AI Analyst ··· ··· Figure 1: The two stages of training pre-trained language models, during which CoLLiE exhibits efficiency. can lead to even more outstanding performance. As shown in Figure 1, the training process can be divided into two stages: 1. Further pre-training, which supplements specific domain knowledge and expands the vocabulary to enhance tokenization efficiency; 2. Instruction-tuning, which adapts the model to downstream tasks and improves its instruction-following ability. With the scaling of language models, the resources required for training have increased substantially, making it infeasible to train the entire model on a single GPU. Model parallelism addresses this issue by partitioning the model across different GPUs, distributing the training workload among these GPUs. This can be achieved through three methods: tensor parallelism (TP, Shoeybi et al. (2019)), pipeline parallelism (PP, Huang et al. (2019); Narayanan et al. (2019)), and stage 3 of zero redundancy optimizer (ZeRO-3, Rajbhandari et al. (2020)). In addition, during the instruction-tuning stage, there are resourceefficiency and training-effectiveness trade-off approaches (Sun et al., 2023b): parameter-efficient fine-tuning (PEFT) methods (Ding et al., 2023). These methods selectively choose or add a few parameters for training, effectively reducing the GPU memory required to train large language models. In this context, we introduce CoLLiE, an easyto-use library for Collaborative training of Large Language models in an Efficient way. The library not only integrates the previously mentioned three parallelism strategies and PEFT methods," 2312.00413v1,"1 Abstract Syntax Tree for Programming Language Understanding and Representation: How Far Are We? WEISONG SUN, State Key Laboratory for Novel Software Technology, Nanjing University, China and School of Computer Science and Engineering, Nanyang Technological University, Singapore CHUNRONG FANG ∗ , State Key Laboratory for Novel Software Technology, Nanjing University, China YUN MIAO, State Key Laboratory for Novel Software Technology, Nanjing University, China YUDU YOU, State Key Laboratory for Novel Software Technology, Nanjing University, China MENGZHE YUAN, State Key Laboratory for Novel Software Technology, Nanjing University, China YUCHEN CHEN, State Key Laboratory for Novel Software Technology, Nanjing University, China QUANJUN ZHANG, State Key Laboratory for Novel Software Technology, Nanjing University, China AN GUO, State Key Laboratory for Novel Software Technology, Nanjing University, China XIANG CHEN, Nantong University, China YANG LIU, School of Computer Science and Engineering, Nanyang Technological University, Singapore ZHENYU CHEN, State Key Laboratory for Novel Software Technology, Nanjing University, China Programming language understanding and representation (a.k.a code representation learning) has always been a hot and challenging task in the field of software engineering. It aims to apply deep learning techniques to produce numerical representations of the source code features while preserving its semantics. These representations can be used for facilitating subsequent code-related tasks, e.g., code summarization. The abstract syntax tree (AST), a fundamental code feature, illustrates the syntactic information of the source code and has been widely used in code representation learning. It is commonly acknowledged that AST-based code representation is critical to solving code-related tasks. However, there is still a lack of systematic and quantitative evaluation of how well AST-based code representation facilitates subsequent code-related tasks. Additionally, learning an AST-based code representation is an extremely complex endeavor involving three intertwining stages, including, AST parsing, AST preprocessing, and AST encoding. The solutions available in ∗ Chunrong Fang is the corresponding author. Authors’ addresses: Weisong Sun, weisongsun@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093 and School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore, 639798; Chunrong Fang, fangchunrong@nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Yun Miao, miaoyun001my@gmail.com, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Yudu You, nju_yyd@163.com, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Mengzhe Yuan, shiroha123321@gmail.com, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Yuchen Chen, yuc.chen@outlook.com, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Quanjun Zhang, quanjun.zhang@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; An Guo, guoan218@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Xiang Chen, xchencs@ntu.edu.cn, Nantong University, Nantong, Jiangsu, China, 226019; Yang Liu, yangliu@ntu.edu.sg, School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore, 639798; Zhenyu Chen, zychen@nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. 1049-331X/2023/0-ART1 $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Trans. Softw. Eng. Methodol., Vol. 0, No. 0, Article 1. Publication date: 2023." 2312.00418v1,"On 2-bisections and monochromatic edges in claw-free cubic multigraphs Federico Romaniello Dipartimento di Matematica “Giuseppe Peano” Università di Torino Via Carlo Alberto 10, 10123, Turin, Italy Abstract A k-bisection of a multigraph G is a partition of its vertex set into two parts of the same cardinality such that every component of each part has at most k vertices. Cui and Liu shown that every claw-free cubic multigraph contains a 2-bisection, while Eom and Ozeki constructed specific 2-bisections with bounded number of monochromatic edges. Their bound is the best possible for claw-free cubic simple graphs. In this note, we extend the latter result to the larger family of claw-free cubic multigraphs. Keywords: 2-bisections; claw–free graphs; cubic graphs, multigraphs. Math. Subj. Class.: 05C15, 05C70. 1 Introduction In this short note, we will mostly use multigraphs, i.e. graphs that may contain multiple edges but no loops are allowed. A graph that does not contain multiple edges is said to be simple. A bisection (B, W ) of a graph G is a partition of its vertex set V (G) in two sets, say B and W , such that |B| = |W |. A k-bisection of G is a bisection (B, W ) such that every component of G[B] and G[W ] has at most k vertices, where G[X] denotes the subgraph of G induced by the subset X ⊆ V (G). A monochromatic edge is an edge connecting two vertices of the same part of a given bisection. A claw is the complete bipartite graph K 1,3 . If a graph does not contain induced claws it is said to be claw-free. For basic notation on graphs not defined here, we refer the reader to [3]. Bisections of cubic simple graphs and multigraphs have been intensively studied by many researchers. The following is an important open conjecture, due to Ban and Linial [2]: Conjecture 1.1 ([2]). Every bridgeless cubic simple graph G admits a 2-bisection, unless G is the Petersen graph. This conjecture has been proved true for bridgeless claw-free cubic simple graphs in [1]; however, in [4] a stronger result has been proved by Cui and Liu: Theorem 1.2 ([4]). Every claw-free cubic multigraph contains a 2-bisection. E-mail address: fed.romaniello@gmail.com (Federico Romaniello)" 2312.00423v1,"Unravelling spontaneous Bloch-type skyrmion in centrosymmetric two-dimensional magnets Jingman Pang 2 , Xiaohang Niu 1 , Hong Jian Zhao 3 , Yun Zhang 1* , Laurent Bellaiche 4 1 College of Physics and Optoelectronic Technology, Collaborative Innovation Center of Rare-Earth Functional Materials and Devices Development, Baoji University of Arts and Sciences, Baoji 721016, China 2 Faculty of Chemistry and Chemical Engineering, Baoji University of Arts and Sciences, 1 Hi-Tech Avenue, Baoji, Shaanxi, P. R. China 3 Key Laboratory of Material Simulation Methods and Software of Ministry of Education, College of Physics, Jilin University, Changchun 130012, China 4 Physics Department and Institute for Nanoscience and Engineering, University of Arkansas, Fayetteville, Arkansas 72701, USA * E-mail: zhangyun_xtu@163.com Keywords: two-dimensional magnets, magnetic skyrmions, first-principle calculation Abstract: The realization of magnetic skyrmions in two-dimensional (2D) magnets holds great promise for both fundamental research and device applications. Despite recent progress, two-dimensional skyrmions hosts are still limited, due to the fact that most 2D magnets are centrosymmetric and thus lack Dzyaloshinskii−Moriya interaction (DMI). We show here, using a general analysis based on symmetry, that Bloch-type skyrmions can, in fact, be stabilized in 2D magnets, due to the interplay between in-plane component (d x ) of second nearest-neighbor DMI and magnetic anisotropy. Its validity is demonstrated in Cr 2 Ge 2 Te 6 monolayer, which is also verified by recent experiments. Our work gives a clear direction for experimental studies of 2D magnetic materials to stabilize skyrmions and should greatly enrich the research on magnetic skyrmions in 2D lattices." 2312.00434v1,"PEFTDebias : Capturing debiasing information using PEFTs Sumit Agarwal ∗ Aditya Srikanth Veerubhotla ∗ Srijan Bansal ∗ Language Technologies Institute, Carnegie Mellon University, Pittsburgh, PA {sumita, adityasv, srijanb}@andrew.cmu.edu Abstract The increasing use of foundation models highlights the urgent need to address and eliminate implicit biases present in them that arise during pretraining. In this paper, we introduce PEFTDebias, a novel approach that employs parameter-efficient fine-tuning (PEFT) to mitigate the biases within foundation models. PEFTDebias consists of two main phases: an upstream phase for acquiring debiasing parameters along a specific bias axis, and a downstream phase where these parameters are incorporated into the model and frozen during the fine-tuning process. By evaluating on four datasets across two bias axes namely gender and race, we find that downstream biases can be effectively reduced with PEFTs. In addition, we show that these parameters possess axis-specific debiasing characteristics, enabling their effective transferability in mitigating biases in various downstream tasks. To ensure reproducibility, we release the code to do our experiments 1 . 1 Introduction In recent years, it has become evident that foundation models such as BERT or GPT-3 (Devlin et al., 2019; Brown et al., 2020) are susceptible to a range of stereotypical societal biases (Jentzsch and Turan, 2022) such as sexism (gender) (Kurita et al., 2019) and racism (race) (Ahn and Oh, 2021), that are present in the training data. Such bias axes can lead to unfair or discriminatory outcomes (Webster et al., 2021; Barikeri et al., 2021) in various socio-technical scenarios. Recent research (Ladhak et al., 2023) suggests that biases acquired during pre-training can propagate to downstream models, resulting in superficial text dependencies and potential implicit bias, and a ∗ 1 Equal contribution, names ordered randomly. https://github.com/sumit-agrwl/peft-debias Figure 1: The figure illustrates our proposed PEFT- Debias method to debias the fine-tuned model, which consists of two main phases - upstream phase where debiasing parameters are acquired through CDA-based PEFT training on axis corpora, evaluated using intrinsic metrics, downstream phase, where the debiased PEFT is injected into a trainable model and kept frozen during the fine-tuning process on a task corpora. Bias is measured using extrinsic metrics along the same axis. higher likelihood of subsequent harmful effects, a concept known as bias transfer hypothesis (Bolukbasi et al., 2016; Caliskan et al., 2017). However, most approaches for bias mitigation are primarily applied during fine-tuning to reduce bias in specific downstream tasks or datasets (Park et al., 2018; Zhang et al., 2018). It involves incorporating auxiliary training objectives (Jin et al., 2021), annotation of bias attributes (Liang et al., 2020) and task-specific fairness metrics (Zhang et al., 2020), which poses a challenge for the expanding community of fine-tuning language models. Previous studies have attempted to address this" 2312.00441v1,"Research in Astron. Astrophys. Vol.0 (20xx) No.0, 000–000 http://www.raa-journal.org http://www.iop.org/journals/raa (L A TEX: M31.tex; printed on December 4, 2023; 1:49) R esearch in A stronomy and A strophysics New continuum observations of the Andromeda galaxy M 31 with FAST Wenjun Zhang 1 , Xiaohui Sun 1 , Jie Wang 2 1 School of Physics and Astronomy, Yunnan University, Kunming 650500, China; zhangwenjun@mail.ynu.edu.cn, xhsun@ynu.edu.cn 2 National Astronomical Observatories, Chinese Academy of Sciences, Beijing 100101, China Received 20XX Month Day; accepted 20XX Month Day Abstract We present a new total intensity image of M 31 at 1.248 GHz, observed with the Five-hundred-meter Aperture Spherical radio telescope (FAST) with an angular resolution of 4 ′ and a sensitivity of about 16 mK. The new FAST image clearly reveals weak emission outside the ring due to its high sensitivity on large-scale structures. We derive a scale length of 2.7 kpc for the cosmic ray electrons and find that the cosmic ray electrons propagate mainly through diffusion by comparing the scale length at 4.8 GHz. The spectral index of the total intensity varies along the ring, which can be attributed to the variation of the spectra of synchrotron emission. This variation is likely caused by the change of star formation rates along the ring. We find that the azimuthal profile of the non-thermal emission can be interpreted by an axisymmetric large-scale magnetic field with varying pitch angle along the ring, indicating a complicated magnetic field configuration in M 31. Key words: galaxies: individual: M 31 – galaxies: ISM – radiation mechanisms: nonthermal, thermal – ISM: cosmic rays – radio continuum: ISM 1 INTRODUCTION The Andromeda galaxy (M 31) is a prominent spiral galaxy that is the nearest to the Milky Way (Beck et al. 1998). Due to its proximity and outstanding “ring” of star formation, M 31 has been widely studied in various bands, such as X-ray (Pietsch et al. 2005), UV (Gil de Paz et al. 2007), near-IR (Jarrett et al. 2003), far-IR (Rice et al. 1988), and optical (Sarkisyan et al. 2020). These observations have improved our understanding of the formation and evolution of M 31. The radio total intensity of M 31 is concentrated in a ring about 7–13 kpc from the center (Beck et al. 1998). In this ring, there are also concentrations of cold molecular gas (Nieten et al. 2006), warm neutral gas (Chemin et al. 2009), warm ionized gas (Devereux et al. 1994), and dust (Smith et al. 2012). All these indicate that the M 31 ring is an important star-forming region and contributes most of the brightness of the galaxy. There have been many studies based on the radio observations of M 31. The first radio observation of M 31 was conducted with the Cambridge one-mile radio telescope at 408 and 1407 MHz with resolutions of 80 ′ × 120 ′ and 23 ′ × 35 ′ , respectively (Pooley 1969). With the continuing improvement of angular resolution and sensitivity, the follow-up observations of M 31 reveals more detailed emission structures, such as the observations by the Effelsberg 100-m telescope at 4850 MHz with a resolution of 2. ′ 6 (Berkhuijsen et al. 1983). In addition, the combination of interferometric observations from the Very Large Array and the single-dish observations from the Effelsberg radio telescope at 1.5 GHz yielded an image with a high resolution of 45 ′′ covering all the spatial scales (Beck et al. 1998)." 2312.00447v1,"Jet quenching parameter in QCD kinetic theory K. Boguslavski, 1 A. Kurkela, 2 T. Lappi, 3, 4 F. Lindenbauer, 1, ∗ and J. Peuron 3, 4, 5 1 Institute for Theoretical Physics, Technische Universität Wien, 1040 Vienna, Austria Faculty of Science and Technology, University of Stavanger, 4036 Stavanger, Norway 3 Department of Physics, University of Jyväskylä, P.O. Box 35, 40014 University of Jyväskylä, Finland 4 Helsinki Institute of Physics, P.O. Box 64, 00014 University of Helsinki, Finland 5 Dept. of Astronomy and Theoretical Physics, Sölvegatan 14A, S-223 62 Lund, Sweden 2 We study the jet quenching parameter q̂ in a non-equilibrium plasma using the QCD effective kinetic theory. We discuss subleading terms at large jet momentum p, show that our expression for q̂ reproduces thermal results at small and large transverse momentum cutoffs for infinite p and construct an interpolation between these limits to be used in phenomenological applications. Using simple non-equilibrium distributions that model pertinent features of the bottom-up thermalization scenario, we analytically assess how anisotropy, under- or overoccupation affect the jet quenching parameter. Our work provides more details on the q̂ formula used in our preceding work [arXiv:2303.12595] and sets the stage for further numerical studies of jet momentum broadening in the initial stages of heavy-ion collisions from QCD kinetic theory. B. Isotropic HTL matrix element 1. Sum rule CONTENTS I. Introduction 1 II. Theoretical background and kinetic theory 3 III. Kinetic theory formula for q̂ 3 A. Derivation of q̂(p) from the scattering rate 4 B. Coordinate systems 5 C. Formula for q̂(p) 6 D. Symmetries of q̂ ij 7 E. Matrix elements 7 F. Screening using HTL 7 G. Towards the limit p → ∞: NLO terms in 1/p 10 H. Limit p → ∞ with a momentum cutoff 10 I. Limiting behavior for large cutoff 11 J. Interpreting the momentum cutoff 12 K. Numerical implementation 12 IV. Evaluation of q̂ in special cases A. Thermal distribution 1. Small momentum cutoff 2. Large momentum cutoff 3. Comparison with numerical results 4. Interpolation formula for q̂ in thermal equilibrium B. Toy models for bottom-up thermalization 1. Effectively two-dimensional distribution 2. Scaled thermal distribution 13 13 13 14 16 V. Summary and conclusions 22 Acknowledgments A. Boundaries of the phase-space integration ∗ florian.lindenbauer@tuwien.ac.at 16 17 18 19 23 23 24 25 C. Behavior of q̂ for large jet momenta 26 1. The integrand of q̂ for large p 26 a. The limit of v pq 26 b. Matrix element for large |ω| 26 2. Integral over a more generic integrand 26 3. Behavior of q̂ for large p 27 4. Large p behavior combined with a momentum cutoff q ⊥ < Λ ⊥ 28 5. Large momentum cutoff Λ ⊥ behavior 28 D. Monte-Carlo sampling 29 E. Details on q̂ calculations in toy models 1. Extremely anisotropic distribution 2. Evaluating q̂ for the scaled thermal distribution 30 30 References 30 31 I. INTRODUCTION The goal of relativistic heavy-ion collisions performed at RHIC and the LHC is to achieve a better understanding of the quark-gluon plasma (QGP) that is created in the collisions. In particular, much attention has been directed to the non-equilibrium initial stages of this state of matter. While in general the theoretical description of the early stages requires a solution to non-perturbative non-equilibrium quantum field theory, a description based on weak-coupling methods becomes appropriate in the limit of (asymptotically) high collision energies. In this limit, the initial stages of central heavy-ion collisions follow the bottom-up scenario of [1]. The time-evolution of the bottom-up scenario can be described through a set of different effective descriptions" 2312.00459v1,"A continuous-wave and pulsed X-band electron spin resonance spectrometer operating in ultra-high vacuum for the study of low dimensional spin ensembles Franklin H. Cho, 1, 2 Juyoung Park, 1, 3 Soyoung Oh, 1, 3 Jisoo Yu, 1, 3 Yejin Jeong, 1, 3 Luciano Colazzo, 1, 2 Lukas Spree, 1, 2 Caroline Hommel, 1, 2 Arzhang Ardavan, 4 Giovanni Boero, 5 and Fabio Donati 1, 3, a) 1) Center for Quantum Nanoscience, Institute for Basic Science, Seoul 03760, South Korea 2) Ewha Womans University, Seoul 03760, South Korea 3) Department of Physics, Ewha Womans University, Seoul 03760, South Korea 4) Clarendon Laboratory, Department of Physics, University of Oxford, Oxford OX1 3PU, United Kingdom 5) Microsystems Laboratory, Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne 1015, Switzerland (Dated: 4 December 2023) We report the development of a continuous-wave and pulsed X-band electron spin resonance (ESR) spectrometer for the study of spins on ordered surfaces down to cryogenic temperatures. The spectrometer operates in ultra-high vacuum and utilizes a half-wavelength microstrip line resonator realized using epitaxially grown copper films on single crystal Al 2 O 3 substrates. The one-dimensional microstrip line resonator exhibits a quality factor of more than 200 at room temperature, close to the upper limit determined by radiation losses. The surface characterizations of the copper strip of the resonator by atomic force microscope, low-energy electron diffraction, and scanning tunneling microscope show that the surface is atomically clean, flat, and single crystalline. Measuring the ESR spectrum at 15 K from a few nm thick molecular film of YPc 2 , we find a continuous-wave ESR sensitivity of 6.5 · 10 10 spins/G · Hz 1/2 indicating that a signal-to-noise ratio of 7.7 G · Hz 1/2 is expected from a monolayer of YPc 2 molecules. Advanced pulsed ESR experimental capabilities including dynamical decoupling and electron-nuclear double resonance are demonstrated using free radicals diluted in a glassy matrix. I. INTRODUCTION In recent years, a burgeoning interest has emerged in the investigation of individual magnetic atoms and molecules adsorbed on surfaces, to explore their potential as a new platform for coherently controlled spin systems for quantum operations and quantum sensing. 1 Such studies of single and coupled atomic and molecular spins on surfaces has predominantly been conducted through a technique that combines electron spin resonance with scanning tunneling microscopy, known as ESR-STM. 2–9 So far, only few combinations of atoms/molecules and substrates have proven to to be addressable with this technique, and the search for new suitable surface spin systems is often hindered by the complexity and extreme conditions of ESR-STM measurements, typically requiring long experiment times. Moreover, the spins on surfaces have shown relatively short spin coherence times, 6–9 mostly due to the spins experiencing noisy environments from the inherent nature of tunneling current measurements, scattering electrons from the metallic substrates, and magnetic tips of ESR-STM. 10 As an alternative to ESR-STM, ensemble-averaging inductive measurements of electron spin resonance (ESR) detecting the absorption and emission of electromagnetic signals by and from ensembles of spins can be used to address surface systems. Ensemble ESR spectroscopy is conventionally conducted on paramagnetic solids (e.g., point defects in crystals/powders), and free radicals in solutions and glassy matrices. 11 Conversely, very few studies have been performed on a) donati.fabio@qns.science ensembles of spins on surfaces as their characterization requires combining additional experimental conditions such as ultra-high vacuum (UHV), metallic substrate in a microwave cavity/resonator, and single crystal surface preparation to a conventional ensemble ESR spectrometer. The earliest experimental efforts of ensemble ESR of spins on surfaces in UHV investigated in-situ cleaved silicon surfaces, 12,13 and paramagnetic molecules on metals and inert gases. 14–18 From the early 90s to mid 2000s, studies of chemisorbed and physisorbed molecules on metals and oxides, 19–21 , defects and adatoms on insulators and oxides, 22–26 and hydrogenation and oxidation processes on Si surfaces 27–29 were conducted using commercial X-band continuous-wave (CW) ESR spectrometers with the additional installations of custom UHV chambers. Most recently, the modification of a commercial W- band CW ESR spectrometer for the study of surface spins was reported. 30,31 Although the spectrometers used in these studies reached the required signal sensitivity in exploring various spins on surfaces, design limitations from utilizing commercial spectrometers, in particular having three-dimensional metallic cavity resonators and no radiation shield, 19,22,27,28,30 resulted in limited cooling efficiencies (Ref. 19,22 and Ref. 30 report the base sample temperatures of 30 K and 50 K, respectively) and distortions of resonator microwave fields by introducing the metallic substrates. 19,22 Moreover, all of the spectrometers operated only in CW mode and could not probe dynamic properties such as the response to coherent manipulations and decoherence of spins on surfaces. Here, we describe the development of a custom X-band ESR spectrometer operating in UHV and at cryogenic temperatures which has both continuous-wave (CW) as well as more sophisticated pulsed ESR experimental capabilities such as dynamical decoupling and electron-nuclear double reso-" 2312.00476v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Self-Supervised Learning of Spatial Acoustic Representation with Cross-Channel Signal Reconstruction and Multi-Channel Conformer Bing Yang and Xiaofei Li Abstract—Supervised learning methods have shown effectiveness in estimating spatial acoustic parameters such as time difference of arrival, direct-to-reverberant ratio and reverberation time. However, they still suffer from the simulation-to-reality generalization problem due to the mismatch between simulated and real-world acoustic characteristics and the deficiency of annotated real-world data. To this end, this work proposes a selfsupervised method that takes full advantage of unlabeled data for spatial acoustic parameter estimation. First, a new pretext task, i.e. cross-channel signal reconstruction (CCSR), is designed to learn a universal spatial acoustic representation from unlabeled multi-channel microphone signals. We mask partial signals of one channel and ask the model to reconstruct them, which makes it possible to learn spatial acoustic information from unmasked signals and extract source information from the other microphone channel. An encoder-decoder structure is used to disentangle the two kinds of information. By fine-tuning the pre-trained spatial encoder with a small annotated dataset, this encoder can be used to estimate spatial acoustic parameters. Second, a novel multi-channel audio Conformer (MC-Conformer) is adopted as the encoder model architecture, which is suitable for both the pretext and downstream tasks. It is carefully designed to be able to capture the local and global characteristics of spatial acoustics exhibited in the time-frequency domain. Experimental results of five acoustic parameter estimation tasks on both simulated and real-world data show the effectiveness of the proposed method. To the best of our knowledge, this is the first self-supervised learning method in the field of spatial acoustic representation learning and multi-channel audio signal processing. 1 Index Terms—Multi-channel audio signal processing, selfsupervised learning, spatial acoustic parameter estimation. I. I NTRODUCTION PATIAL acoustic representation learning aims to extract a low-dimension representation of the spatial propagation characteristics of sound from microphone recordings. It can be used in a variety of audio tasks, such as estimating the acoustic parameters [1] or the geometrical information [2] related to source, microphone and environment. Related audio tasks have been widely applied in augmented reality [3] and hearing aids [4] where generating perceptually acceptable sound for the target environment is required to guarantee a good immersive experience, and also in intelligent robots [5] where perceiving surrounding acoustic properties serves as a priori for robot interaction with humans and environments. S Bing Yang and Xiaofei Li are with Westlake University & Westlake Institute for Advanced Study, Hangzhou 310030, China (e-mail: yangbing@westlake.edu.cn; lixiaofei@westlake.edu.cn). 1 Codes and models will be available at https://github.com/BingYang-20/ SAR-SSL. Room impulse responses (RIRs) characterize the sound propagation from sound source to microphone constrained in a room environment. The physically relevant parameters that determine RIR include the positions of sound source and microphone array, the room geometry, and the absorption coefficients of walls. RIR is composed of direct-path propagation, early reflections, and late reverberation. The relative position between the source and the microphone array determines the direct-path propagation. All the three physical parameters affect the arrival times and the strengths of reflective pulses including early reflections and late reverberation. Some acoustic parameters of the spatial environment can be directly estimated from RIR without supervision, like positiondependent parameters including time difference of arrival (TDOA), direct-to-reverberant ratio (DRR) and clarity index C 50 , or position-independent parameters including reverberation time T 60 . The physical parameters including absorption coefficient, surface area, and room volume are difficult to estimate by conventional signal processing techniques since the RIR can not be formulated as an analytical function of them. Some researchers try to estimate these parameters from RIRs with deep neural networks (DNNs) [2], [6]. However, the RIR is normally unavailable without intrusive measurement in practical applications, in which case some works predict RIR [7], [8] or spatial acoustic embedding [9], [10] blindly from microphone recordings. As environmental acoustic parameters and geometrical information are heavily relevant to RIRs, a good blind pre-predictor of RIR or spatial acoustic representation will definitely benefit further spatial acoustic parameter estimation and geometrical information analysis. With the development of deep learning techniques, lots of works directly estimate spatial acoustic parameters from microphone signals in a supervised manner. These supervised works have achieved superior performance than conventional methods, owing to the strong modeling ability of deep neural networks. Since these works are data-driven, the diversity and quantity of training data are crucial to their performance. To this end, DNN models are usually trained with abundant diverse simulated data, and then transferred to real-world data. Some researchers show that the trained model does not perform well when directly transferred to real-world data [11] due to the mismatch between simulated and real-world RIRs. In [11], the mismatch is analyzed mainly in terms of the directivity of source and microphone, and the wall absorption coefficient. Moreover, there are many other aspects of mismatch, for example: 1) The acoustic response of real-" 2312.00507v1,"V EX IR2V EC : An Architecture-Neutral Embedding Framework for Binary Similarity S. VenkataKeerthy ∗ , Yashas Andaluri † , Sayan Dey ‡ , Soumya Banerjee § and Ramakrishna Upadrasta ¶ Department of Computer Science and Engineering, IIT Hyderabad Email: { ∗ cs17m20p100001, † cs17b21m000001, ‡ cs22mtech02005, § cs22mtech12011 } @iith.ac.in, ¶ ramakrishna@cse.iith.ac.in Abstract—We propose V EX IR2V EC , a code embedding framework for finding similar functions in binaries. Our representations rely on VEX IR, the intermediate representation used by binary analysis tools like Valgrind and angr. Our proposed embeddings encode both syntactic and semantic information to represent a function, and is both application and architecture independent. We also propose POV, a custom Peephole Optimization engine that normalizes the VEX-IR for effective similarity analysis. We design several optimizations like copy/- constant propagation, constant folding, common subexpression elimination and load-store elimination in POV. We evaluate our framework on two experiments—diffing and searching—involving binaries targeting different architectures, compiled using different compilers and versions, optimization sequences, and obfuscations. We show results on several standard projects and on real-world vulnerabilities. Our results show that V EX IR2V EC achieves superior precision and recall values compared to the state-of-the-art works. Our framework is highly scalable and is built as a multi-threaded, parallel library by only using open-source tools. V EX IR2V EC achieves about 3.2× speedup on the closest competitor, and orders-of-magnitude speedup on other tools. 1. Introduction With the increase in the availability of software, it has become necessary to design and develop methods for better maintenance. This includes determining code similarity, summarization, and suggestions. The codesimilarity problem manifests in several flavors and operations. Some common forms and operations include diffing, classification, search, and retrieval. At the source code level, several approaches have been proposed for determining code clones [BOL14], [BA19], algorithm classification [MLZ + 16], [YZV + 20], searching, and retrieval [KBL + 17], [CLK + 19]. Such operations on binaries, broadly referred to as binary code similarity, have applications in the areas of systems security research, plagiarism detection [MZW + 16], copyright violations [TCL18] etc. Important applications in security research include the detection of vulnerable [GYF + 18], [LDT + 20] and malicious codes [FFCD14]. Identifying (dis-)similar regions (basic blocks, functions, etc.) between two given binaries form the core of the diffing problem. Finding/retrieving a similar binary among a pool of binaries forms the core of the searching problem. Performing these operations at the binary level involves several challenges. Two binaries compiled from the same source exhibit several differences in terms of the structure and organization depending on (1) the compiler used, (2) the compiler optimization level used, and (3) the target architecture. Additionally, there can be other deliberate code manipulations that involve strategies for code obfuscation [JRWM15]. Any binary code similarity approach would involve disassembling the binary to assembly [DFC19], [MLP + 19], [PXY + 20], or to an Intermediate Representation [CXX + 16], [DPY17], or other Abstract Syntax Tree like representations [YCZ + 21] derived from the assembly. Once the binary is lifted to the desired representation, either heuristic-based traditional approaches like graph matching [Zyn], hashingbased techniques [PGG + 15], [DPY17] are used or, machine learning (ML) based modeling is used to solve the underlying binary similarity problem. In recent times, ML-based approaches have become widely prevalent for addressing problems in binary similarity [XLF + 17], [ZLY + 18], [DFC19], [DLWY20], [MLP + 19], [PXY + 20], [YCT + 20] owing to their high success in recognizing patterns and generalizing them. In ML-based approaches, the binary has to be represented in a numerical form as vectors so that it can be used as input to the underlying models. So, there exist featurebased and embeddings-based approaches. Feature-based approaches [FZX + 16a], [EYGP + 16] use predetermined features like the number of arithmetic instructions, loads/stores, basic blocks, etc., for representing binary snippets. While, embedding-based approaches [DFC19], [DLWY20], [MLP + 19], [WMW + 23] rely on learning a distributed representation in a vector space for representing programs. It is important that these approaches are generic enough and scalable to cover different application scenarios. Such embeddings are expected to capture the syntax and semantics of the underlying binary in an architecture-independent manner, to be practically useful for diverse applications. Towards this goal, in this work, we propose V EX IR2V EC , an embedding-based approach to represent functions in the binary as continuous, n -d numerical vectors." 2312.00512v1,"Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders SULTHANA SHAMS, Trinity College Dublin, Ireland DOUGLAS LEITH, Trinity College Dublin, Ireland This paper proposes a novel method for detecting shilling attacks in Matrix Factorization (MF)-based Recommender Systems (RS), in which attackers use false user-item feedback to promote a specific item. Unlike existing methods that use either use supervised learning to distinguish between attack and genuine profiles or analyse target item rating distributions to detect false ratings, our method uses an unsupervised technique to detect false ratings by examining shifts in item preference vectors that exploit rating deviations and user characteristics, making it a promising new direction. The experimental results demonstrate the effectiveness of our approach in various attack scenarios, including those involving obfuscation techniques. CCS Concepts: • Information Systems → Recommender systems. Additional Key Words and Phrases: Data Poisoning Attacks, Matrix Factorisation, Recommender Systems, Attack Detection ACM Reference Format: Sulthana Shams and Douglas Leith. 2023. Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders. 1, 1 (December 2023), 16 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION In Recommender Systems (RS), users are grouped based on their interests which motivates many advertising strategies [10, 13, 35]. Recent research proposes exploiting such clustering of users in RS for their ’hiding in the crowd’ privacy benefits [5, 15, 28]. Unfortunately, despite privacy benefits, user clusters in RS are also susceptible to data poisoning attacks [24, 30]. For example, social media platforms have received attention for discriminatory and predatory targeting of user communities [1, 8]. Further, adversaries have been known to use RS to influence users by introducing false product reviews [16] to promote misinformation. The vulnerability of RS to potential manipulation by malicious users was initially investigated by [19, 24, 27]. These attacks involve injecting false profiles to either promote or demote specific items and are called Data Poisoning/Shilling Attacks in RS. Push attacks elevate targeted items, while nuke attacks seek to demote them. Such fraudulent ratings and profiles can severely undermine the RS robustness. We assume that the attacker can only inject a limited number of fake users. Each fake user rates a limited number of items (including the target item and other non-target items called filler items) to evade suspicion. To detect these attacks, various approaches have been explored over the years. For example, exploiting features of attack profiles to distinguish “attack” profiles from “regular” profiles [7, 33], assigning reputation scores to users in RS [29] and analysing rating distributions of items in time [12, 37] are some of the approaches explored to make RS robust. Authors’ addresses: Sulthana Shams, Trinity College Dublin, Ireland, sshams@tcd.ie; Douglas Leith, Trinity College Dublin, Ireland, Doug.Leith@tcd.ie. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2312.00513v1,"Summarization-based Data Augmentation for Document Classification Yueguan Wang The University of Tokyo etsurin@iis.u-tokyo.ac.jp Naoki Yoshinaga Institute of Industrial Science, The University of Tokyo ynaga@iis.u-tokyo.ac.jp Curriculum Fine-tuning Abstract Summarizer Documents Despite the prevalence of pretrained language models in natural language understanding tasks, understanding lengthy text such as document is still challenging due to the data sparseness problem. Inspired by that humans develop their ability of understanding lengthy text from reading shorter text, we propose a simple yet effective summarization-based data augmentation, SUMMaug, for document classification. We first obtain easy-to-learn examples for the target document classification task by summarizing the input of the original training examples, while optionally merging the original labels to conform to the summarized input. We then use the generated pseudo examples to perform curriculum learning. Experimental results on two datasets confirmed the advantage of our method compared to existing baseline methods in terms of robustness and accuracy. We release our code and data at https://github.com/etsurin/summaug. 1 Introduction Although the pretrained language models (Devlin et al., 2019; Liu et al., 2019; He et al., 2020) have boosted the accuracy of various natural language understanding tasks, the accuracy is still limited for complex tasks with lengthy input (Lin et al., 2023) and fine-grained output (Liu et al., 2021), such as document classification. These tasks require models to find a mapping between diverse input and output, which models are more likely to suffer from the data sparseness problem. To address the data sparseness problem, researchers have studied data augmentation for text classification tasks. A basic approach is to generate pseudo training examples from gold examples by perturbing the inputs; those perturbation include back-and-forth translation (Shleifer, 2019) and minor editing of input text (Wei and Zou, 2019; Karimi et al., 2021) or its hidden representations (Chen et al., 2020, 2022; Wu et al., 2022). Summaries Initialized Model Pseudo Fine-tuning Training Data Label Coarsening (As needed) Label Set Pseudo Label Set Fine-tuning Original Training Data Document Classifier Figure 1: Curriculum fine-tuning for document classification using SUMMaug data augmentation: prior to the normal finetuning, it fine-tunes a model with easyto-learn examples obtained by summarizing the original training examples. These methods basically echo the information in the original training data, which will not help much the model learn to read lengthy inputs. In this study, to effectively develop the model’s ability to comprehend the content in document classification, we propose a simple yet effective summarization-based data augmentation, SUM- Maug, to generate pseudo, abstractive training examples for document classification. Specifically, we apply text summarization to the input of gold examples in document classification task to obtain abstractive, easy-to-read examples, and merge finegrained target labels as needed so that the labels conforms to the summarized input. Motivated by that we humans gradually develop the ability of understanding lengthy text from reading shorter text, we use the generated examples in the context of curriculum learning (surveyed in (Soviany et al., 2022)), namely, curriculum fine-tuning. We compare our method to a baseline data augmentation (Karimi et al., 2021) on two versions of IMDb dataset with a different number of target labels. Experimental results confirm that curriculum fine-tuning with SUMMaug outperforms baseline methods on both accuracy and robustness." 2312.00516v1,"Spatio-Temporal-Decoupled Masked Pre-training for Traffic Forecasting Haotian Gao 1 , Renhe Jiang 2 * , Zheng Dong 1 , Jinliang Deng 3 , Xuan Song 1,2 Southern University of Science and Technology, 2 The University of Tokyo, 3 University of Technology Sydney gaoht6@outlook.com, jiangrh@csis.u-tokyo.ac.jp, zhengdong00@outlook.com, jinliang.deng@student.uts.edu.au, songx@sustech.edu.cn 1 Abstract Accurate forecasting of multivariate traffic flow time series remains challenging due to substantial spatio-temporal heterogeneity and complex long-range correlative patterns. To address this, we propose Spatio-Temporal-Decoupled Masked Pre-training (STD-MAE), a novel framework that employs masked autoencoders to learn and encode complex spatio-temporal dependencies via pre-training. Specifically, we use two decoupled masked autoencoders to reconstruct the traffic data along spatial and temporal axes using a selfsupervised pre-training approach. These mask reconstruction mechanisms capture the long-range correlations in space and time separately. The learned hidden representations are then used to augment the downstream spatio-temporal traffic predictor. A series of quantitative and qualitative evaluations on four widely-used traffic benchmarks (PEMS03, PEMS04, PEMS07, and PEMS08) are conducted to verify the state-ofthe-art performance, with STD-MAE explicitly enhancing the downstream spatio-temporal models’ ability to capture longrange intricate spatial and temporal patterns. Codes are available at https://github.com/Jimmy-7664/STD MAE. Introduction Spatio-temporal data collected by sensor networks has become a vital area of research with many real-world applications. One key application is traffic forecasting, which has garnered significant interest in recent years. While traffic forecasting resembles multivariate time series forecasting, it benefits from extra spatial context like sensor locations and road networks that reveal dependencies between sensor signals. As a result, a key distinction from ordinary multivariate time series is that traffic data exhibits spatio-temporal heterogeneity. While traffic conditions vary across different road types (local, highway, interchange) and times (weekday versus weekend), they demonstrate consistent, predictable patterns within similar contexts. Effectively modeling the heterogeneity while identifying key patterns is crucial for accurate traffic forecasting. 1 Figure 1 provides an example of spatio-temporal heterogeneity in traffic data. The traffic flow of sensor 7 in the * Corresponding author. 1 Our codes are available at https://github.com/Jimmy-7664/ STD MAE (a) Temporal Heterogeneity (b) Spatial Heterogeneity Figure 1: Spatio-Temporal Heterogeneity in Traffic Data PEMS04 dataset is plotted to illustrate the temporal dimension. As shown in Figure 1a, the traffic flow trends on Tuesday and Wednesday and on Saturday and Sunday are similar, but distinct patterns emerge on weekdays versus weekends, especially during peak hours. On weekdays, there is a morning rush hour peak, while the traffic flow on weekends is more evenly distributed throughout the day without dramatic peaks. This demonstrates temporal heterogeneity in traffic patterns over a week. On the other hand, the patterns within the same context exhibit temporal redundancy (He et al. 2022). To demonstrate spatial heterogeneity, the traffic flow of sensor 5, 86, 155, and 177 is plotted. Sensors 5 and 177 are located on main roads, while sensors 86 and 155 are on minor roads. As illustrated in Figure 1b, the flow trends on the main roads are similar, which reach higher volumes than the minor roads during daytime, indicating spatial redundancy between similar road types. The minor road sensors follow comparable stationary patterns without dramatic peaks and valleys. This highlights the spatial heterogeneity between main arterial roads that experience relatively high traffic volumes and secondary roads with more consistent moderate flows. Commonly used GCN-based mod-" 2312.00525v1,"SurreyAI 2023 Submission for the Quality Estimation Shared Task Archchana Sindhujan *1 , Diptesh Kanojia 1 , Constantin Orasan 2 and Tharindu Ranasinghe 3 1 Institute for People-Centred AI, University Of Surrey , UK 2 Centre for Translation Studies, University of Surrey, UK 3 School of Computer Science and Digital Technologies, Aston University, UK {a.sindhujan,d.kanojia,c.orasan}@surrey.ac.uk, t.ranasinghe@aston.ac.uk Abstract Quality Estimation (QE) systems are important in situations where it is necessary to assess the quality of translations, but there is no reference available. This paper describes the approach adopted by the SurreyAI team for addressing the Sentence-Level Direct Assessment shared task in WMT23. The proposed approach builds upon the TransQuest framework, exploring various autoencoder pre-trained language models within the MonoTransQuest architecture using single and ensemble settings. The autoencoder pretrained language models employed in the proposed systems are XLMV, InfoXLM-large, and XLMR-large. The evaluation utilizes Spearman and Pearson correlation coefficients, assessing the relationship between machinepredicted quality scores and human judgments for 5 language pairs (English-Gujarati, English- Hindi, English-Marathi, English-Tamil and English-Telugu). The MonoTQ-InfoXLM- large approach emerges as a robust strategy, surpassing all other individual models proposed in this study by significantly improving over the baseline for the majority of the language pairs. 1 Introduction The primary objective of quality estimation (QE) systems is to assess the quality of a translation without relying on a reference translation. This make QE valuable within translation processes, as it enables the determination of whether an automatically generated translation is sufficiently accurate for a specific purpose. This aids in deciding whether the translation can be used as is, requires human intervention for full translation, or necessitates post-editing by a human translator (Kepler et al., 2019b). Quality estimation can be conducted across various levels: word/phrase level, sentence level and document level. This paper considers only the sentence-level QE and presents our participation in the WMT23 Sentencelevel direct assessment (DA) shared task. In the context of this task, participating systems are required to predict the DA score for a given (source, target) pair. This score serves as a measure of the translation quality. Building upon the ideas presented in TransQuest by Ranasinghe et al. (2020b), our investigation explores the use of various pre-trained models within the MonoTransQuest architecture for the sentence-level quality estimation shared task. The architecture employs autoencoder pre-trained language models to fine-tune the QE data to predict a score which indicates the quality of translation. Using the MonoTransQuest architecture as the base we employ the pre-trained transformers separately to implement the systems MonoTQ- XLMV, MonoTQ-InfoXLM-large and MonoTQ- XLMR-large. In addition, we propose ensembleTQ which combines the output of MonoTransQuest when using different pre-trained models. All the proposed systems achieve a significantly higher Spearman correlation score compared to the baseline. The paper is structured as follows. Section 2 briefly presents related work on quality estimation. Section 3 provides a concise overview of the dataset used in the sentence-level QE shared task. Moving on to Section 4, we introduce the autoencoder pre-trained language models and proposed systems and detail the training methodology. Section 5 is dedicated to the evaluation and Section 6 comprises the result and discussion. The paper concludes by summarizing findings, highlighting conclusions, and suggesting potential avenues for future research in the final section. 2 Related work Quality estimation in machine translation has evolved significantly throughout the years. Initially, it relied on feature engineering and conventional machine learning techniques like SVM and basic" 2312.00526v1,"Automated design space exploration for poultry processing systems using discrete-event simulation N. Paape*, J.A.W.M. van Eekelen, M.A. Reniers Eindhoven University of Technology PO Box 513 Eindhoven, 5600 MB, the Netherlands * Email address corresponding author: n.paape@tue.nl Preprint version December 4, 2023 Abstract The poultry processing industry struggles to keep up with new developments in meat consumption and livestock breeding. Designing poultry processing systems is becoming increasingly more complex, and an increasing number of iterations of (re)design are required to optimize the product flow in these systems. To address this issue, this study presents a discrete-event simulation-based method for design space exploration of production systems. This method is mostly automated, greatly reducing the time and effort required in the design process. The steps that are automated are iterating on the design, model construction, performing simulation experiments, and interpreting the simulation results. An industrial case study in which a poultry processing system is redesigned is used to validate the effectiveness of the proposed method. A detailed description of this case study is given to showcase the different ways in which this design space exploration method can be used. 1 Introduction 1.1 Problem statement The meat processing industry is undergoing rapid changes. One example is the growing mismatch between providers and consumers in the poultry industry. On the one hand, broilers (chickens bred for meat consumption) are being bred increasingly heavier [1]. On the other hand, consumer purchasing habits are shifting [2]; lighter chicken fillets are preferred, as they are perceived as more sustainable. Dealing with these developments requires new methods for designing meat processing systems. The above mismatch introduces extra complexity in the design process of a poultry fillet processing system. The fillet processing system must match the incoming flow of predominantly heavy fillets to production orders, which require mostly light fillets. This problem can be partially alleviated by optimizing the product flow in the layout of the fillet processing system. Another more recent solution is the introduction of new ‘trimming’ machines, which can trim down heavy fillets into lighter fillets, and a by-product that can be used in minced (ground) poultry products. However, the introduction of these machines also leads to new design questions, such as how many of these machines are to be used in a layout and where in the layout should these machines be placed. More design choices lead to a larger number of feasible designs, and new methods are needed to help a designer explore the ever-growing solution space. The solution space of feasible designs can be referred to as a system’s design space [3]. The design process for poultry processing systems, as well as production systems in general, is frequently a difficult task requiring numerous iterations of design and redesign. What further complicates the design process, is that these systems generally have multiple performance objectives. Identifying which designs are optimal requires multi-objective optimization [4]. In this work, a ‘design’ is regarded as the functional architecture of the system, which means that a design describes the machines of the system and the connections between them. Integrating simulation in the design process allows for design alternatives to be compared, such as shown for 1" 2312.00527v1,"An investigation of information flux between turbulent boundary layer and porous medium Xu Chu 1 , Wenkang Wang 2 , and Bernhard Weigand 3 Abstract The interaction between boundary layer turbulence and a porous layer is the cornerstone to the interface engineering. In this study, the spatial resolved transfer entropy is used to assess the asymmetry of the causal interaction next to a permeable wall. The analysis was based on pore-resolved direct numerical simulation of turbulent channel flow over a cylinder array. The spatial map of transfer entropy reveals the information flux between the porous medium and arbitrary nearby position. 1 Introduction Turbulent flow over permeable interfaces is ubiquitous in nature and engineering applications, from sediment transport to the transpiration cooling in gas turbines. Porous media are generally featured with complex topology in space [Chu et al, 2018]. A wide range of properties has been identified to have a significant effect on the mass and momentum transport across the porous medium-free flow interface. However, understanding and optimizing macro/micro-scale characteristics of porous media remains a challenge. This is due to both the difficulty of experimental measurements at the pore scale Terzis et al [2019] as well as the high costs of numerical simulations to resolve the full spectrum of scales. Early studies of turbulent flow over permeable beds have addressed the effect of varying permeability on surface flows. The turbulent surface flow is similar to that of a canonical boundary layer when the interfacial permeability is low, as the nearwall structures are less disrupted. However, as the permeability increases, largescale vortical structures emerge in the surface flow. This is attributed to Kelvin- Helmholtz (KH) type instabilities from inflection points of the mean velocity profile. More recently, the application of porous media for drag reduction inspired a series of in-depth studies on anisotropic permeability. Direct Numerical Simulation (DNS) exhibits an edge of observing and analyzing turbulent physics in a confined small space, not only for the canonical cases as channel flows and pipe flows Chu et al [2016b, 2020a]; McEligot et al [2018, 2020]; Pandey et al [2017b]. Suga et al. Suga et al [2020] investigated the influence of the anisotropic permeability tensor of porous media at a higher permeable regime. It was found that streamwise and spanwise permeabilities enhance turbulence whilst vertical permeability itself does not. 1 Cluster of Excellence SimTech, University of Stuttgart, Pfaffenwaldring 5a, 70569 Stuttgart, Germany, e-mail: xu.chu@simtech.uni-stuttgart.de · 2 Max Planck Institute for Intelligent Systems, Heisenbergstraße 3, 70569 Stuttgart, Germany · 3 Institute of Aerospace Thermodynamics (ITLR), Pfaffenwaldring 31, 70569 Stuttgart, Germany 1" 2312.00552v1,"Improving Unsupervised Relation Extraction by Augmenting Diverse Sentence Pairs Qing Wang, Kang Zhou, Qiao Qiao, Yuepei Li, Qi Li Department of Computer Science, Iowa State University, Ames, Iowa, USA {qingwang, kangzhou, qqiao1, liyp0095, qli}@iastate.edu Abstract Unsupervised relation extraction (URE) aims to extract relations between named entities from raw text without requiring manual annotations or pre-existing knowledge bases. In recent studies of URE, researchers put a notable emphasis on contrastive learning strategies for acquiring relation representations. However, these studies often overlook two important aspects: the inclusion of diverse positive pairs for contrastive learning and the exploration of appropriate loss functions. In this paper, we propose AugURE with both within-sentence pairs augmentation and augmentation through crosssentence pairs extraction to increase the diversity of positive pairs and strengthen the discriminative power of contrastive learning. We also identify the limitation of noise-contrastive estimation (NCE) loss for relation representation learning and propose to apply margin loss for sentence pairs. Experiments on NYT-FB and TACRED datasets demonstrate that the proposed relation representation learning and a simple K-Means clustering achieves state-ofthe-art performance. Source code is available 1 . 1 Introduction Unsupervised Relation Extraction (URE) aims to extract relations between named entities from the raw text in an unsupervised manner without relying on annotated relations from human experts. URE tasks are proposed to overcome the limitations of traditional Relation Extraction (RE) tasks, which target to extract pre-defined relations and require a time-consuming and labor-intensive data annotation process. To discover relational facts without any predefined relation types, URE tasks are often formulated as semantics clustering tasks, where the entity pairs with the same relations should be clustered together. Therefore, effectively learning the relation representations is an essential step toward 1 https://github.com/qingwang-isu/AugURE solving URE tasks. Recent studies on relation representation learning (Liu et al., 2021; Zhang et al., 2021; Liu et al., 2022) adopt a contrastive learning process. Contrastive learning aims to bring similar-relation sentences (positive pairs) closer while separating different-relation sentences (negative pairs). There are several ideas for constructing positive pairs, a key step in the contrastive learning process. Some methods propose to augment the entity pairs and relation context of the original sentences as positive examples (Liu et al., 2021, 2022). To avoid similar sentences being pushed apart in the contrastive learning process, Liu et al. (2022) further propose to utilize cluster centroids to generate positive pairs within the clusters. However, these approaches often fail to provide diverse positive pairs for contrastive learning to obtain more effective relation representations. Another challenge arises from the loss function perspective. The most recent URE work (Liu et al., 2022) directly transfers the Noise- Contrastive Estimation (NCE) loss function from computer vision tasks (He et al., 2020; Caron et al., 2020; Li et al., 2021) and achieves good performance. However, the negative examples used by the NCE loss function are randomly sampled sentences from the same minibatch, which may result in high false negatives, especially when the total number of relational clusters is not large. Moreover, relation semantics should not be regarded as “same/different” in many cases but rather as a similarity spectrum. For example, the relation org:top_members/employees is semantically closer to org:members than org:founded_by. Therefore, we argue that the binary NCE loss function may suit poorly for relation representation learning in URE tasks, whereas a margin-based loss may fit better. In this paper, we propose several techniques to augment positive pairs to increase their diversity and strengthen the discriminative power of con-" 2312.00567v1,"Explanatory Argument Extraction of Correct Answers in Resident Medical Exams Iakes Goenaga, Aitziber Atutxa, Koldo Gojenola, Maite Oronoz, Rodrigo Agerri HiTZ Center - Ixa, University of the Basque Country UPV/EHU {iakes.goenaga, aitziber.atucha, koldo.gojenola, maite.oronoz,rodrigo.agerri}@ehu.eus Abstract Developing the required technology to assist medical experts in their everyday activities is currently a hot topic in the Artificial Intelligence research field. Thus, a number of large language models (LLMs) and automated benchmarks have recently been proposed with the aim of facilitating information extraction in Evidence-Based Medicine (EBM) using natural language as a tool for mediating in human-AI interaction. The most representative benchmarks are based on a question answering setting, where the objective is for the models to provide answers to medical questions. Although interesting, these benchmarks are limited to either multiple-choice or long-form answers and are available only in English. In order to address these shortcomings, in this paper we present a new dataset which, unlike previous work: (i) includes not only explanatory arguments for the correct answer, but also arguments to reason why the incorrect answers are not correct; (ii) the explanations are written originally by medical doctors to answer questions from the Spanish Residency Medical Exams. Furthermore, this new benchmark allows us to setup a novel extractive task which consists of identifying the explanation of the correct answer written by medical doctors. An additional benefit of our setting is that we can leverage the extractive QA paradigm to automatically evaluate performance of LLMs without resorting to costly manual evaluation by medical experts. Comprehensive experimentation with language models for Spanish shows that sometimes multilingual models fare better than monolingual ones, even outperforming models which have been adapted to the medical domain. Furthermore, results across the monolingual models are mixed, with supposedly smaller and inferior models performing competitively. In any case, the obtained results show that our novel dataset and approach can be an effective technique to help medical practitioners in identifying relevant evidence-based explanations for medical questions. Keywords: Explainable Artificial Intelligence, Argumentation, Question Answering, Resident Medical Exams, Natural Language Processing, Deep Learning Preprint submitted to Artificial Intelligence in Medicine December 4, 2023" 2312.00569v1,"KILLING VECTOR FIELDS ON SEMI-RIEMANNIAN PRODUCT MANIFOLDS FEDERICO COSTANZA AND THOMAS LEISTNER Dedicated to the memory of Joseph A. Wolf Abstract. Hano’s theorem states that the space of Killing vector fields of a complete simply connected Riemannian manifold is isomorphic to the direct sum of the Killing vector fields of the factors in its de Rham decomposition. We prove a generalisation of this theorem to manifolds with indefinite metrics that requires an assumption on the factors, and show by example why this assumption is needed. 1. Introduction If a semi-Riemannian manifold pM, gq is isometric to a product of semi-Riemannian manifolds, many of its geometric properties can be analysed by studying the geometry of the factors. One of the geometric properties that can be analysed in this way is the existence of infinitesimal symmetries, or more precisely, of Killing vector fields. A classical theorem by Hano [8] states that for a simply connected and complete Riemannian manifold pM, gq that is decomposed according to its de Rham decomposition [6], the space of Killing vector fields of pM, gq is given by the sum of the Killing vector fields of the factors. In the present article we will show to which extent Hano’s theorem can be generalised to semi-Riemanniann manifolds, i.e. manifolds where the metric is not necessarily positive definite. Our result in Theorem 1 requires an assumption that prevents the existence of parallel vector fields on (one of) the factors. We will also show by an example that this assumption is indeed needed. The proof of Theorem 1 uses the notion of the Killing connection, which arises from the natural prolongation of the Killing equation. It was first considered in [10], and was recently studied systematically in [3, 4, 5], where it turned out to be a useful tool to study the Killing operator. Our proof is based on the integrability condition for the existence of a Killing vector field that arises from the curvature of the Killing connection. Acknowledgements. The result of this paper is an extension of Theorem 2.1.6 in the first author’s PhD thesis [3] which was written under supervision of the second author. We would like to thank Michael Eastwood for taking the role of co-supervisor, Ben McMillan for participating in weekly meetings, and both for helpful discussions and invaluable inspiration. We would like to thank the organisers of the workshop Spectrum and Symmetry for Group Actions in Differential Geometry II and everyone at the MATRIX Mathematics Research Institute in Creswick for their hospitality. During the two weeks of this workshop we enjoyed Joe Wolf’s company, his wisdom, and his wit, shortly before his passing. At the workshop, Joe gave the last talk, and, as always, he inspired everyone. (Thomas Leistner, corresponding author) School of Mathematical Sciences, University of Adelaide, SA 5005, Australia E-mail addresses: efcostanza@gmail.com, thomas.leistner@adelaide.edu.au . 2010 Mathematics Subject Classification. Primary 53C50; Secondary 53C29, 53C30. Key words and phrases. Semi-Riemannian manifolds, Killing vector fields, holonomy algebras. This work was supported by the Australian Research Council (Discovery Program DP190102360). 1" 2312.00584v1,"The Ethics of Automating Legal Actors Josef Valvoda Alec Thompson Ryan Cotterell Simone Teufel University of Cambridge ETH Zürich {jv406, at808, sht25}@cam.ac.uk ryan.cotterell@inf.ethz.ch Abstract The introduction of large public legal datasets has brought about a renaissance in legal NLP. Many of these datasets are comprised of legal judgements – the product of judges deciding cases. This fact, together with the way machine learning works, means that several legal NLP models are models of judges. While some have argued for the automation of judges, in this position piece, we argue that automating the role of the judge raises difficult ethical challenges, in particular for common law legal systems. Our argument follows from the social role of the judge in actively shaping the law, rather than merely applying it. Since current NLP models come nowhere close to having the facilities necessary for this task, they should not be used to automate judges. Furthermore, even in the case the models could achieve human-level capabilities, there would still be remaining ethical concerns inherent in the automation of the legal process. 1 Introduction This paper discusses the ethical aspects of using natural language processing (NLP) research to augment or replace the work of legal experts. It considers common law legal systems and demonstrates that many proposals for automation in the legal domain concentrate on the judiciary. Reflecting on this sentiment, we find that a number of popular legal datasets are focused on the text produced by judges. Whilst we agree that there are potential benefits to the practical application of NLP to the legal domain, these applications face several ethical challenges. Some of these challenges are resolvable with technical advances, others, however, appear to be intrinsic to using any kind of automation. We consider the two main legal actors, the judge and the lawyer and find that while automation of either can be beneficial, lawyer automation presents fewer challenges. We begin by giving a brief legal background in §2, where we explore the role of judges and lawyers in common law legal systems and their distinct functions. We then introduce the ideas of the rule of law and substantive justice – the pillars on which the judicial system is built and which connect law and morality. In §3, we explore practical proposals of legal NLP research. In our view, these proposals can be broken into two groups; (1) Replacement with AI; advocates a complete replacement of legal professionals with technology. (2) Augmentation of judges or lawyers; suggest only partial automation or supplementation of legal tasks with NLP. Concluding our background sections, in §4, we turn to legal NLP and discuss the impact of the shift from symbolic to sub-symbolic AI on the field. We then proceed in three stages. In the first stage, §5, we begin by outlining the risks and benefits of legal NLP. We suggest that current proposals for implementing legal NLP face three technical challenges (1) lack of contextual and social intuition at the trial stage; (2) inability to make controversial moral and political decisions to develop the law; and, (3) inability to justify the decisions to the public. Further, even if these technical challenges are resolved, existing proposals pose unavoidable ethical risks. They have the potential to (1) centralise power; (2) produce a more brittle legal system and (3) undermine the accountability of policymakers. In the second stage §6, we turn to the main legal actors, the judge and the lawyer, to evaluate their exposure to the risks and benefits. We suggest the role of lawyers is a more promising domain for legal NLP by showing how the various concerns affect lawyers differently. In a nutshell, lawyers are not burdened with the task of being lawmakers. Instead, their role has more easily measured metrics: whether or not they can convince judges and other lawyers of the quality of their arguments. We recommend research paths towards resolving the technical limitations of automating legal actors –" 2312.00586v1,"Explainable Fraud Detection with Deep Symbolic Classification Samantha Visbeek Erman Acar ∗ Floris den Hengst ∗ SamanthaVisbeek@hotmail.com RiskQuest Amsterdam, the Netherlands e.acar@uva.nl Universiteit van Amsterdam Amsterdam, the Netherlands f.den.hengst@vu.nl Vrije Universiteit Amsterdam Amsterdam, the Netherlands ABSTRACT There is a growing demand for explainable, transparent, and datadriven models within the domain of fraud detection. Decisions made by the fraud detection model need to be explainable in the event of a customer dispute. Additionally, the decision-making process in the model must be transparent to win the trust of regulators, analysts, and business stakeholders. At the same time, fraud detection solutions can benefit from data due to the noisy and dynamic nature of fraud detection and the availability of large historical data sets. Finally, fraud detection is notorious for its class imbalance: there are typically several orders of magnitude more legitimate transactions than fraudulent ones. In this paper, we present Deep Symbolic Classification (DSC), an extension of the Deep Symbolic Regression framework to classification problems. DSC casts classification as a search problem in the space of all analytic functions composed of a vocabulary of variables, constants, and operations and optimizes for an arbitrary evaluation metric directly. The search is guided by a deep neural network trained with reinforcement learning. Because the functions are mathematical expressions that are in closed-form and concise, the model is inherently explainable both at the level of a single classification decision and at the model’s decision process level. Furthermore, the class imbalance problem is successfully addressed by optimizing for metrics that are robust to class imbalance such as the F1 score. This eliminates the need for problematic oversampling and undersampling techniques that plague traditional approaches. Finally, the model allows to explicitly balance between the prediction accuracy and the explainability. An evaluation on the PaySim data set demonstrates competitive predictive performance with state-of-the-art models, while surpassing them in terms of explainability. This establishes DSC as a promising model for fraud detection systems. KEYWORDS Fraud Detection, Classification, Deep Symbolic Regression, Deep Reinforcement Learning 1 Deep learning has shown remarkable results in many application domains, including fraud detection [1, 15, 27]. However, a major drawback of these models is their lack of transparency. Their blackbox nature makes it difficult to justify a single decision, let alone explain their overall decision-making processes. Understanding these is necessary because (i) frauds need not only be detected, but the opportunity for fraud needs to be mitigated with, e.g., more stringent security measures, and (ii) the nature of fraud detection changes daily: new types of fraud are developed, whereas existing types fall out of favor or become impossible due to novel security measures. Furthermore, according to the European Union’s 2018 General Data Protection Regulation [11], financial institutions are required to justify their decisions to legal authorities and customers. These requirements highlight the need for inherently transparent and explainable models. Explainable AI has been gaining attention in recent years, with one area of research being Symbolic Regression (SR). SR aims to find analytical (concise, closed-form) expressions that describe functional dependencies in a data set. Since an expression can be understood simply by inspection, SR can be used to create a model that is transparent and explainable. Recently, Petersen et al. [26] proposed Deep Symbolic Regression (DSR), an approach to SR based on deep reinforcement learning. In DSR, a recurrent neural network (RNN) is trained with deep reinforcement learning on a task-specific reward function to generate expressions with high predictive power and low complexity. DSR effectively leverages gradient-based deep learning to capture complex relationships in large data sets that are nevertheless easily described with an analytical function. In this paper, we propose extensions to the DSR framework for the fraud detection problem. The resulting Deep Symbolic Classification (DSC) approach extends DSR with: the addition of a sigmoid layer to the output of the expressions to turn regression into binary classification, the incorporation of a threshold-based decision mechanism, and a reward function based on an accuracy metric for class-imbalanced problems. Our approach results in a novel framework for fraud detection, characterized by the following strengths: INTRODUCTION In recent years, the number of mobile payments has increased dramatically due to the popularity of e-Commerce, the widespread use of mobile devices, and the COVID-19 pandemic. A corresponding increase in mobile transaction fraud has been observed [5]. Transaction fraud is a major challenge for the financial industry and results in monetary losses for financial institutions, account holders, and business owners. To address this issue, banks use fraud detection systems (FDS) to identify fraudulent transactions automatically and make real-time decisions on accepting or blocking a transaction. ∗ Authors contributed equally to this research. (1) robust predictive performance from large-scale, high-dimensional data with the use of deep reinforcement learning, (2) analytical expressions that can be transformed into a concise set of rules and with explanations at both the decision- and the model levels, (3) intrinsically robust to highly imbalanced data without the need for problematic techniques like over- or undersampling, (4) explicitly trading off predictive power and explainability, (5) expressive power to capture non-monotonic and non-linear relationships without an excessive number of polynomial terms or complex neural network architectures." 2312.00596v1,"BCN: Batch Channel Normalization for Image Classification Afifa Khaled Chao Li Jia Ning afifakhaied@tju.edu.cn D201880880@hust.edu.cn ninja@hust.edu.cn Kun He brooklet60@hust.edu.cn School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China Abstract Normalization techniques have been widely used in the field of deep learning due to their capability of enabling higher learning rates and are less careful in initialization. However, the effectiveness of popular normalization technologies is typically limited to specific areas. Unlike the standard Batch Normalization (BN) and Layer Normalization (LN), where BN computes the mean and variance along the (N,H,W) dimensions and LN computes the mean and variance along the (C,H,W) dimensions (N, C, H and W are the batch, channel, spatial height and width dimension, respectively), this paper presents a novel normalization technique called Batch Channel Normalization (BCN). To exploit both the channel and batch dependence and adaptively and combine the advantages of BN and LN based on specific datasets or tasks, BCN separately normalizes inputs along the (N, H, W) and (C, H, W) axes, then combines the normalized outputs based on adaptive parameters. As a basic block, BCN can be easily integrated into existing models for various applications in the field of computer vision. Empirical results show that the proposed technique can be seamlessly applied to various versions of CNN or Vision Transformer architecture. The code is publicly available at https://github.com/AfifaKhaled/Batch- Channel-Normalization. 1. Introduction In the past decades, machine learning (ML) has become the most widely used technique in the field of artificial intelligence, and more recently, deep learning (DL) has become a prevalent topic, and deep neural networks (DNNs) are widely applied in various domains, including natural language processing, computer vision, and graph mining. Typically, DNNs comprise stacked layers with learnable parameters and non-linear activation functions. While the deep and complex structure enables them to learn intricate features, it also poses challenges during training due to the randomness in parameter initialization and changes in input data, known as internal covariate shift [11]. This problem becomes more pronounced in deeper networks, where slight modifications in deeper hidden layers are amplified as they propagate through the network, resulting in significant shifts in these layers. To address the above issue, several normalization methods have been introduced. Specifically, Batch Normalization (BN) [11], Layer Normalization (LN) [3], and Group Normalization (GN) [22] et al. have achieved remarkable success with deep learning models. Among them, BN is widely used for deep neural networks. Despite the great success in many applications, the popular normalization methods still have some weaknesses. For example, BN requires large batch sizes [22], can not be used for online learning tasks, and can not be used for large distributed models because the mini-batches have to be small. To address these issues, LN is proposed to avoid exploiting batch dimension so as to not impose any restriction on the size of each mini-batch [3]. However, LN does not work as well as BN on convolutional layers. To overcome the limitations of BN and LN as well as to fully embody the advantages of the two techniques, we develop a new normalization technique called Batch Channel Normalization (BCN). In contrast to previous techniques, we aim to normalize along the (C, N, H, W) axes. However, computing the average and variance along (N, C, H, W) directly ignores the different importance between batch dimension and channel dimension. Consequently, as shown in Figure 1, BCN first computes the µ 1 and σ 1 2 of the layer inputs along the (C, H, W) axes. Then, it computes the µ 2 and σ 2 2 along the (L, H, W) axes. Finally, the normalized outputs are combined based on adaptive parameters. To check the effectiveness of the proposed method, we apply BCN to several popular models, ResNet [7], DenseNet [9], Vi-" 2312.00617v1,"SEMILINEAR WAVE INEQUALITIES WITH DOUBLE DAMPING AND POTENTIAL TERMS ON RIEMANNIAN MANIFOLDS MOHAMED JLELI, MICHAEL RUZHANSKY, BESSEM SAMET, AND BERIKBOL T. TOREBEK Abstract. We study a semilinear wave inequality with double damping on a complete noncompact Riemannian manifold. The considered problem involves a potential function V depending on the space variable in front of the power nonlinearity and an inhomogeneous term W depending on both time and space variables. Namely, we establish sufficient conditions for the nonexistence of weak solutions in both cases: W ≡ 0 and W 6≡ 0. The obtained conditions depend on the parameters of the problem as well as the geometry of the manifold. Some special cases of manifolds, and of V and W are discussed in detail. Contents 1. Introduction 2. Preliminaries on Riemannian geometry 3. Statement of the results and discussions 4. Proofs of the main results 4.1. Preliminary estimates 4.2. The homogeneous case (W ≡ 0) 4.3. The inhomogeneous case (W 6≡ 0) Declaration of competing interest Data Availability Statements Acknowledgments References 1 4 6 12 12 15 17 18 19 19 19 1. Introduction Let M be a complete noncompact Riemannian manifold of dimension N equipped with a metric g = (·, ·) and a Riemannian distance d(·, ·). Our purpose is to investigate the nonexistence of a weak solution to the double damping semilinear wave inequality ( u tt − ∆u + u t − ∆u t ≥ V (x)|u| p + W (t, x), t > 0, x ∈ M, (u(0, x), u t (0, x)) = (u 0 (x), u 1 (x)), x ∈ M, (1.1) where u = u(t, x), ∆ is the Laplace-Beltrami operator, p > 1, V is a measurable function, V > 0 a.e. (almost everywhere) in M, W ∈ L 1loc ([0, ∞) × M), W ≥ 0 a.e. in (0, ∞) × M and u i ∈ L 1loc (M), i = 0, 1. The cases W ≡ 0 and W 6≡ 0 are studied separately. 2010 Mathematics Subject Classification. 58J45; 35A01; 35B44; 35B33. Key words and phrases. Semilinear wave inequality; Riemannian manifold; Ricci curvature; nonexistence; critical exponent. 1" 2312.00629v1,"The Ecosystem of Trust (EoT): Enabling effective deployment of autonomous systems through collaborative and trusted ecosystems Authors: Jon Arne Glomsrud 1 , Tita Alissa Bach 1,2 (ORCID: 0000-0001-8536-6826) 1 Group Research and Development, DNV, Høvik, Norway 2 Tita.Alissa.Bach@dnv.com Keywords: autonomy, artificial intelligence, sustainability, complex systems, trustworthiness, adoption Acknowledgment We would like to thank Dr. Øyvind Smogeli for his critical review of the earlier version of this manuscript. Statements and Declarations Authors have declared no conflict of interest. Funding This work is partly sponsored by the Research Council of Norway through the project TRUSST with project number 313921. Author contributions JAG contributed to the conception of the work. TAB matured the idea. Both authors drafted and critically revised the article in an iterative process. Both authors approved the final version. Abstract Ecosystems are ubiquitous, but trust within them is not guaranteed. Trust is paramount because stakeholders within an ecosystem must collaborate to achieve their objectives. With the twin transitions (digital transformation to go in parallel with green transition) accelerating the deployment of autonomous systems, trust has become even more critical to ensure that the deployed technology creates value. To address this need, we propose an ecosystem of trust (EoT) approach to support deployment of technology by enabling trust among and between stakeholders, technologies and infrastructures, institutions and governance, and the artificial and natural environments in an ecosystem. The approach can help the ecosystem’s stakeholders to create, deliver, and receive value by addressing their concerns and aligning their objectives. We present an autonomous, zero-emission ferry as a real-world use case to demonstrate the approach from a stakeholder perspective. We argue that assurance (grounds for justified confidence originated from evidence and knowledge) is a prerequisite to enable the approach. Assurance provides evidence and knowledge that are collected, analysed, and communicated in a systematic, targeted, and meaningful way. Assurance can enable the approach to help successfully deploy technology by ensuring that risk is managed, trust is shared, and value is created." 2312.00631v1,"Qubits, entangled states, and quantum gates realized on a set of classical pendulums A. V. Nenashev, 1, ∗ F. Gebhard, 1 K. Meerholz, 2 and S. D. Baranovskii 1, 2, † 1 Department of Physics and Material Sciences Center, Philipps-Universität Marburg, D-35032 Marburg, Germany 2 Department für Chemie, Universität zu Köln, Luxemburger Straße 116, 50939 Köln, Germany Here we show that the concepts behind such terms as entanglement, qubits, quantum gates, quantum error corrections, unitary time evolution etc., which are usually ascribed to quantum systems, can be adequately realized on a set of coupled classical pendulums. INTRODUCTION Describing the basic concepts of quantum computing and quantum information, such as qubits, entanglement, quantum gates, quantum error corrections, unitary time evolution, Berry phase, etc., one usually addresses quantum systems, for instance, electrons, photons, atomic nuclei and so on [1–3]. However, it is known that at least some of these basic concepts can be realized on classical systems. For instance, the Bloch sphere, which usually serves to illustrate qubit states, and the Berry phase is a representation of the classical Foucault pendulum [4–6]. The quantum-classical connection has been recently demonstrated for entangled photon anticorrelations, when analyzed via classical electromagnetic theory [7]. The Bell inequality violations, often considered as the essence of quantum behaviour, were further demonstrated in some classical optics effects [8–10]. The analogy between quantum and classical concepts has been mostly discussed with respect to the classical analogs of quantum entanglement. One of such analogs was constructed using classical light beams mentioning that the analogy with quantum entanglement does not include nonlocality, the latter being considered of exclusive quantum nature [11]. Nonlocality is the key feature of the entanglement concept [12]. If this feature lacks in classical realizations, the quantum-classical analogy is significantly limited. In this work, we show that a classical system of coupled pendulums contains all above-mentioned features, including the feature of nonlocality. This calls for rethinking the limits of the quantum-classical analogy. ONE QUBIT — TWO PENDULUMS A qubit is a two-level system. In an attempt to visualize what a qubit is, we start from looking at a single energy level that has an energy E and, therefore, a frequency ω = E/ℏ. The complex amplitude A of the probability that the system resides on this level is ∗ On leave of absence from Rzhanov Institute of Semiconductor Physics and the Novosibirsk State University, Russia; E-mail: alexey.nenashev24@gmail.com † E-mail: sergei.baranovski@physik.uni-marburg.de A = |A| exp (iφ), where φ is a phase. This phase changes in time t as φ(t) = φ(0) + ωt, where φ(0) is the initial phase. The occupation probability of this level is |A| 2 . Let us represent this level as a classical oscillator with the frequency ω. Henceforth, we use a pendulum to illustrate this oscillator. If we swing a pendulum to amplitude |A|, with the initial phase φ(0), then its oscillations will symbolize the quantum state with the probability amplitude A = |A| exp (i[φ(0) + ωt]) of residing on the given energy level. The energy of the pendulum oscillations is proportional to |A| 2 , symbolizing the occupation probability of the given level. Now we consider a qubit — a system with two basis states |↓⟩ and |↑⟩. If we want the qubit not to change its state in the course of time, we must set the energies of these states equal (i. e., have a twofold degenerate energy level). Hence, in our pendulum model, a qubit is represented as two equal pendulums, oscillating with the same frequency ω. Notably, the amplitudes and the initial phases of their oscillations can be different. This defines the full variety of a qubit’s states. Since the equations of motion of the pendulums are linear, the principle of superposition applies, i.e., if we sum up two different oscillations of the two-pendulum system, the resulting oscillation will also obey the equations of motion. In just the same way, one can sum up different states of a qubit, i. e., construct superpositions of states. Clearly, the analog of quantum superposition in our model is the summing up of such oscillations. The Bloch sphere The sum of probabilities that the qubit is in state |↓⟩ and in state |↑⟩ is equal to unity. In our model, this means that the total energy of oscillations of two pendulums adds up to unity, |A ↓ | 2 + |A ↑ | 2 = 1, where A ↓ and A ↑ are the complex amplitudes of the two pendulums. Various modes of oscillations of the two-pendulum system differ from each other in two parameters: (1) how the energy is distributed among the pendulums, and (2) the difference between phases of the pendulum oscillations. It is convenient to represent these parameters as two coordinates on a sphere (a globe) — the latitude and the longitude. This is how we arrive at the Bloch sphere illustrated in Fig. 1a. The south pole of this sphere, state |↑⟩, represents the situation where the whole energy is" 2312.00653v1,"Area Selective Chemical Vapor Deposition of Gold by Electron Beam Seeding Aleksei Tsarapkin, [a] Krzysztof Maćkosz, [b] Chinmai Sai Jureddy, [b] Ivo Utke, [b] Katja Höflich* [a] All of the aforementioned approaches require sophisticated lithography methods to define the growth surfaces, which can restrict the selection of substrate materials, ultimately constraining the degrees of freedom in device design [3,6] . Consequently, an area selective deposition technique that operates without the need for lithography, and is independent of the substrate type, would be highly advantageous. One option is to provide a localized energy input for CVD, which is frequently accomplished through laser irradiation [7,8] . However, the spatial resolution achievable through this method is typically restricted by the wavelength of the laser light employed. Although there has been recent evidence that this issue can be addressed in thermally decoupled 3D gold structures [9] , the range of achievable structure geometries remains restricted. This is also applicable to local energy input through resistive heating [10] . An alternative approach uses beams of charged particles, often electrons [11,12] . Instead of supplying additional energy during the CVD process, electrons can also be used to activate a specific surface [13,14] or to deposit a seed layer for preferential decomposition of precursor molecules either by CVD [12,15] or by atomic layer deposition (ALD) [16,17] . Seeding using a focused electron beam possesses significant potential, as direct electron beam writing is capable of operating on any surface topography that is even weakly conductive [18] . Additionally, it provides the possibility for unparalleled spatial resolution [19] . If the seeds previously deposited exhibit autocatalytic activity [12,15,20,21] , the temperature necessary for decomposition decreases considerably. This technique efficiently limits the CVD metal growth to a specific area, while also reducing the thermal load on the substrate. However, there is currently no proof of electron beam seeding resulting in autocatalytic growth for gold. In this study, area selective CVD of gold by electron beam seeding is demonstrated for the first time. The process employs a focused electron beam for the non-thermal electrontriggered decomposition of Au(acac)Me 2 which results in autocatalytically active gold nuclei. Subsequently, the same precursor is thermally decomposed at the gold seeds. This autocatalytic CVD of gold is observed at relatively low substrate temperatures of about 80 °C and requires only high vacuum conditions. Electron beam seeding is highly versatile, as demonstrated by the deposition of high aspect ratio pillars using the same precursor. The temperature-dependent autocatalytic CVD in this case provides the first quantitative measurement of the temperature change induced by the electron beam during the direct writing of 3D structures. Chemical vapour deposition (CVD) is an established method for producing high-purity thin films, but it typically necessitates the pre- and post-processing of a mask to produce structures. This paper presents a novel maskless patterning technique that enables area selective CVD of gold. A focused electron beam is used to decompose the metal-organic precursor Au(acac)Me 2 locally, thereby creating an autocatalytically active seed layer for subsequent CVD with the same precursor. The procedure can be included in the same CVD cycle without the need for clean room lithographic processing. Moreover, it operates at low temperatures of 80 °C, over 200 K lower than standard CVD temperatures for this precursor, reducing thermal load on the specimen. Given that electron beam seeding operates on any even moderately conductive surface, the process does not constrain device design. This is demonstrated by the example of vertical nanostructures with high aspect ratios of around 40:1 and more. Written using a focused electron beam and the same precursor, these nanopillars exhibit catalytically active nuclei on their surface. Furthermore, they allow for the first time the precise determination of the local temperature increase caused by the writing of nanostructures with an electron beam. Introduction Gold is a key metal in microelectronics due to its low resistivity, resistance to electromigration and chemical inertness. These properties make it an excellent choice for stable and reliable electrical contacts even under challenging environmental conditions [1] . Chemical vapour deposition (CVD) is a technologically significant option for fabricating gold contacts or other metallic functional structures. CVD utilises the thermal decomposition of precursor molecules in a gaseous state [2] . Molecules reaching the surface are thermally decomposed, leaving the central metal atom on the surface. If the decomposition is favored kinetically or thermodynamically on certain surfaces compared to others, the ensuing variation in reaction rates can be exploited for area selective deposition [2] . This has been shown for various metals, e.g. Au on W [3] , Au on Cr [4] , or Cu on Pt [5] . [a] A. Tsarapkin, K. Höflich Ferdinand-Braun-Institut gGmbH Leibniz-Institut für Höchstfrequenztechnik, Gustav-Kirchhoff-Str. 4, D-12489 Berlin, Germany E-mail: katja.hoeflich@fbh-berlin.de [b] K. Maćkosz, C. S. Jureddy, I. Utke Empa - Swiss Federal Laboratories for Materials Science and Technology, Feuerwerkerstrasse 39, CH-3602 Thun, Switzerland 1" 2312.00659v1,"New physics at the Intensity Frontier: how much can we learn and how? Oleksii Mikulenko, 1, ∗ Kyrylo Bondarenko, 2 Alexey Boyarsky, 1 and Oleg Ruchayskiy 3 1 Instituut-Lorentz, Leiden University, Niels Bohrweg 2, 2333 CA Leiden, The Netherlands 2 Nordita, KTH Royal Institute of Technology and Stockholm University, Hannes Alfvéns väg 12, 10691 Stockholm, Sweden 3 Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, DK-2010, Copenhagen, Denmark (Dated: 1 December 2023) Intensity Frontier experiments are often evaluated by the smallest coupling it can probe, irrespective of what particle can be found or the scientific significance of its detection. In this work we propose a new framework that determines the number of events required to characterize new particle properties. For example, we show that Heavy Neutral Leptons require 100 events to establish the neutrino mass hierarchy, and 1000 events to reveal the Majorana phase of active neutrinos. Ultimately, this framework presents a more objective way to connect experiments to their scientific outcomes. The Standard Model of Particle Physics (SM) has achieved remarkable success but falls short in providing a complete explanation for all observable phenomena in the universe. Several unresolved questions remain, including the nature of dark matter, the origin of neutrino masses, the mechanism matter-antimatter asymmetry of the Universe generation, etc. This strongly suggests the existence of some new physics beyond the SM. One of the possible solutions to the SM puzzles could be feebly interacting particles (FIPs) [1– 4]. Such particles can be searched at colliders, but only for sufficiently large masses and short decay lengths [5]. Dedicated experiments are necessary to efficiently explore long-lived light FIPs, and this has influenced the further development of the Intensity Frontier (IF) program at CERN [2, 6–9] and globally [10]. The assessment of the potential of the Intensity Frontier projects is often based on their capacity to exclude part of the parameter space, if new particles are not discovered, quantified by the minimal coupling constant necessary for a detectable signal. Yet, another important question is what we can learn if new particles are discovered, to what extent do they help to address the challenges in the Standard Model? Although the answer depends on the specific problem, the potential of an experiment in this regard is generally characterized by the maximum signal count that can be achieved within the space of unconstrained parameters. In this Letter, we present an approach to assessing the potential of a given experiment based on ∗ mikulenko@lorentz.leidenuniv.nl its ability to probe physically interesting properties of Feebly Interacting Particles following their detection. We describe a systematic framework designed for this approach and, as an example, apply it to the model of Heavy Neutral Leptons (HNLs), focusing on their role in explaining the origin of neutrino masses. Method. In the following, we provide a brief summary of the proposed framework. The details and code [11] that implements such analyses are discussed in the companion paper [12]. Consider the extension of the SM with a FIP. Such an extension incorporates: (i) a coupling constant α ≪ 1, dictating the number of observable events in an experiment and (ii) a set of couplings g a ∼ 1, shaping the model’s internal structure and defining its phenomenology for a given α. For each point in the parameter space g a we aim to compute the number of events, N t (α), sufficient to conclude if the corresponding model can explain one of the BSM phenomena (i.e., is consistent with a given set of external data at a certain confidence level). This number is used to determine the value of the minimal coupling constant α for a given experiment. The average number of events in each observable channel is λ i = N t (α) × Br i (g a ) × ϵ det,i + b i . (1) Here Br i is the branching ratio of the i-th visible channel, ϵ det,i is the mean detection efficiency, and b i is the average background count. Then, given a set of observed counts, s i , we define the CL for the “tested” model, given the data, CL = 1 − P A × [1 − cdf(χ 2 |λ)]. It takes into account the prior of the model P A as defined by external exper-" 2312.00662v1,"Nonparametric Variational Regularisation of Pretrained Transformers Fabio Fehr fabio.fehr@idiap.ch Idiap Research Institute Ecole Polytechnique Fédérale de Lausanne Switzerland James Henderson james.henderson@idiap.ch Idiap Research Institute Switzerland Abstract The current paradigm of large-scale pre-training and fine-tuning Transformer large language models has lead to significant improvements across the board in natural language processing. However, such large models are susceptible to overfitting to their training data, and as a result the models perform poorly when the domain changes. Also, due to the model’s scale, the cost of fine-tuning the model to the new domain is large. Nonparametric Variational Information Bottleneck (NVIB) has been proposed as a regulariser for training cross-attention in Transformers, potentially addressing the overfitting problem. We extend the NVIB framework to replace all types of attention functions in Transformers, and show that existing pretrained Transformers can be reinterpreted as Nonparametric Variational (NV) models using a proposed identity initialisation. We then show that changing the initialisation introduces a novel, information-theoretic post-training regularisation in the attention mechanism, which improves out-of-domain generalisation without any training. This success supports the hypothesis that pretrained Transformers are implicitly NV Bayesian models. 1 Introduction Self-supervised pretraining of Transformer models (Devlin et al., 2019; Lewis et al., 2020; Raffel et al., 2020; Zhang et al., 2022) has been hugely successful, improving performance in virtually every NLP task. This indicates that the inductive bias of attention-based representations is extremely effective for language, but it is not clear which characteristics of Transformers are essential to this inductive bias and which are implementation details. We shed light on this issue by developing a variational Bayesian reinterpretation of pretrained Transformers, which more explicitly characterises how information about the real data distribution is represented. In previous work, Henderson and Fehr (2023) derive a variational Bayesian generalisation of the cross-attention layer of Transformers, called Nonparametric Variational Information Bottleneck (NVIB). NVIB provides an information-theoretic sparsity-inducing regulariser over attention-based representations when used to train an attention-based model. In this paper, we investigate the possibility that NVIB also provides an accurate theoretical model of existing attention-based models which have been pretrained without NVIB regularisation. We extend NVIB to all the uses of attention in Transformers (multi-head, cross- and self- © Fabio Fehr and James Henderson." 2312.00676v1,"Minimal rank factorizations of polynomial matrices Andrii Dmytryshyn a,1 , Froilán Dopico b,2 , Paul Van Dooren c a School of Science and Technology, Örebro University, 701 82, Örebro, Sweden. Departamento de Matemáticas, Universidad Carlos III de Madrid, Avda. Universidad 30, 28911 Leganés, Spain. c Department of Mathematical Engineering, Université catholique de Louvain, Avenue Georges Lemaı̂tre 4, B-1348 Louvain-la-Neuve, Belgium. b Abstract We investigate rank revealing factorizations of rank deficient m × n polynomial matrices P (λ) into products of three, P (λ) = L(λ)E(λ)R(λ), or two, P (λ) = L(λ)R(λ), polynomial matrices. Among all possible factorizations of these types, we focus on those for which L(λ) and/or R(λ) is a minimal basis, since they allow us to relate easily the degree of P (λ) with some degree properties of the factors. We call these factorizations minimal rank factorizations. Motivated by the well-known fact that, generically, rank deficient polynomial matrices over the complex field do not have eigenvalues, we pay particular attention to the properties of the minimal rank factorizations of polynomial matrices without eigenvalues. We carefully analyze the degree properties of generic minimal rank factorizations in the set of complex m × n polynomial matrices with normal rank at most r and degree at most d, and we prove that they are of the form L(λ)R(λ), where the degrees of the r columns of L(λ) differ at most by one, the degrees of the r rows of R(λ) differ at most by one, and, for each i = 1, . . . , r, the sum of the degrees of the ith column of L(λ) and of the ith row of R(λ) is equal to d. Finally, we show how these sets of polynomial matrices with generic factorizations are related to the sets of polynomial matrices with generic eigenstructures. Keywords: polynomial matrix, factorization, complete eigenstructure, genericity, minimal bases, normal rank AMS subject classifications: 15A18, 15A22, 15A23, 15A54 1. Introduction Given an m × n matrix A with complex entries and rank r < min{m, n}, it is often useful to express A as the product of three factors A = LER of sizes m × r, r × r and r × n, respectively, or as the product of two factors A = LR of sizes m × r and r × n, respectively. Email addresses: andrii.dmytryshyn@oru.se (Andrii Dmytryshyn), dopico@math.uc3m.es (Froilán Dopico), paul.vandooren@uclouvain.be (Paul Van Dooren) 1 Supported by the Vetenskapsrådet (Swedish Research Council) [grant 2021-05393]. 2 Supported by grant PID2019-106362GB-I00 funded by MCIN/AEI/ 10.13039/501100011033 and by the Madrid Government (Comunidad de Madrid-Spain) under the Multiannual Agreement with UC3M in the line of Excellence of University Professors (EPUC3M23), and in the context of the V PRICIT (Regional Programme of Research and Technological Innovation)." 2312.00704v1,"Moments of the Poisson distribution of order k S. R. Mane a a Convergent Computing Inc., P. O. Box 561, Shoreham, NY 11786, USA Abstract The factorial moments of the standard Poisson distribution are well known and are simple, but the raw moments are considered to be more complicated (Touchard polynomials). The present note presents a recurrence relation and an explicit combinatorial sum for the raw moments of the Poisson distribution of order k. Unlike the standard Poisson distribution (the case k = 1), for k > 1 the structure of the raw and factorial moments have many similarities and the raw moments are not more complicated (formally, at least) than the factorial moments. We remark briefly on the central moments (i.e. moments centered on the mean) of the Poisson distribution of order k. Keywords: Poisson distribution of order k, moments, factorial moments, Compound Poisson distribution, discrete distribution 2020 MSC: 60E05, 39B05, 11B37, 05-08 Email address: srmane001@gmail.com (S. R. Mane) Preprint submitted to (internal report CC23-12) December 4, 2023" 2312.00709v1,"Computing 1-Periodic Persistent Homology with Finite Windows Adam Onus ∗ and Primoz Skraba † School of Mathematical Sciences Queen Mary University of London London, United Kingdom Abstract Let K be a periodic cell complex endowed with a covering q : K → G where G is a finite quotient space of equivalence classes under translations acting on K. We assume G is embedded in a space whose homotopy type is a d-torus for some d, which introduces “toroidal cycles” in G which do not lift to cycles in K by q . We study the behaviour of toroidal and non-toroidal cycles for the case K is 1-periodic, i.e. G = K/Z for some free action of Z on K. We show that toroidal cycles can be entirely classified by endomorphisms on the homology of unit cells of K, and moreover that toroidal cycles have a sense of unimodality when studying the persistent homology of G. 1 Introduction Spatially periodic topological spaces arise out of necessity when simulating or modelling large (possibly infinite) structures on comparably small finite domains without introducing irregular boundary effects. The first periodic structure one naturally considers arises from the d-dimensional integer lattice, i.e. Z d . One can then study the resulting structure by embedding it into a flat d-dimensional torus, which equivalently represents a single unit cell of translations on R d with periodic boundary conditions. In this paper, we study 1-periodic cellular complexes. A d-periodic cellular complex K ⊆ R n is one which is endowed with a translation group, T ≤ Aut(K), of symmetries. T represents a free action of Z d on K. We further define the quotient space G = K/T which is equipped with a natural covering q : K → G ⊆ T d ×R n−d . K may or may not be a filtered complex, and in application is initially defined over a point cloud Q, which may represent atoms in a crystal model or molecular dynamics simulation, or more generally any large spatially homogeneous structure. For example, Q may instead represent pixels or voxels in the digital image analysis of a large material structure with many cavities. For a given periodic complex K, neither T nor q : K → G will be unique, and there may not even exist a canonical choice for T . Therefore, we are led to several natural questions: are there algorithms or invariants on G which can classify quotient spaces for a fixed K? What information about K can be recovered from G without additional information? What is the minimum information we can endow to G to recover all topological information of K? If K is filtered, do we have a well-defined notion of persistent homology which is independent of the choice of translation group or unit cell? In this paper, we begin addressing these questions. The question of classification has been well-studied in the realm of topological crystallography for the case of periodic graphs [6, 19, 9]. This includes recent work by [7] which has been implemented to find previously unknown degeneracy’s in the classification of crystal structures. The question of retrieving the (persistent) homology and topology of K is, conversely, not very well studied and is surprisingly subtle and ∗ a.onus@qmul.ac.uk † p.skraba@qmul.ac.uk 1" 2312.00713v1,"Nonlinear-manifold reduced order models with domain decomposition Alejandro N. Diaz Rice University Houston, TX 77005 and5@rice.edu Youngsoo Choi Lawrence Livermore National Laboratory Livermore, CA 94550 choi15@llnl.gov Matthias Heinkenschloss Rice University Houston, TX 77005 heinken@rice.edu Abstract A nonlinear-manifold reduced order model (NM-ROM) is a great way of incorporating underlying physics principles into a neural network-based data-driven approach. We combine NM-ROMs with domain decomposition (DD) for efficient computation. NM-ROMs offer benefits over linear-subspace ROMs (LS-ROMs) but can be costly to train due to parameter scaling with the full-order model (FOM) size. To address this, we employ DD on the FOM, compute subdomain NM- ROMs, and then merge them into a global NM-ROM. This approach has multiple advantages: parallel training of subdomain NM-ROMs, fewer parameters than global NM-ROMs, and adaptability to subdomain-specific FOM features. Each subdomain NM-ROM uses a shallow, sparse autoencoder, enabling hyper-reduction (HR) for improved computational speed. In this paper, we detail an algebraic DD formulation for the FOM, train HR-equipped NM-ROMs for subdomains, and numerically compare them to DD LS-ROMs with HR. Results show a significant accuracy boost, on the order of magnitude, for the proposed DD NM-ROMs over DD LS-ROMs in solving the 2D steady-state Burgers’ equation. 1 Introduction In science and engineering, complex tasks often involve repeatedly simulating a large-scale, parameterized, nonlinear system referred to as the full-order model (FOM). Ensuring high fidelity requires a high-dimensional model, leading to significant computational costs and lengthy simulations. As a result, tasks like design optimization become impractical for large-scale problems. Model reduction offers a solution by replacing the FOM with a computationally efficient, low-dimensional model called a reduced-order model (ROM). This ROM approximates the FOM’s behavior with adjustable accuracy, making it suitable for many-query applications. However, construction of accurate and computationally efficient ROMs poses challenges. To address them, we integrate the nonlinear-manifold ROM (NM-ROM) approach with an algebraic domain-decomposition (DD) framework. Various model reduction methods have been integrated with DD, like reduced basis elements (RBE) [1, 17, 18, 26, 27, 27, 37, 38], and the alternating Schwarz method [5, 9, 28, 43]. However, they are often specialized to specific problems, dealing with the physical domain at the PDE level. In contrast, the authors in [25] take an algebraic approach by decomposing the FOM at the discrete level and computing linear-subspace ROMs (LS-ROMs) for each subdomain. While LS-ROMs work well in many cases [2–4, 7, 8, 10, 12–15, 19–22, 24, 31, 39, 42], it is well known that advection-dominated problems and problems with sharp gradients cannot be well-approximated using low-dimensional linear subspaces. These problems are said to have slowly decaying Kolmogorov n-width [40]. Recent approaches, such as nonlinear-manifold ROMs (NM-ROMs), address these problems by nonlinearly approximating the FOM in a low-dimensional nonlinear manifold. This is typically achieved through training an autoencoder on FOM snapshot data (e.g., [23, 29, 30, 32, 33]). However, training of Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.00714v1,"Zipr: A High-Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson {hiser,jwd,an7s}@virginia.edu University of Virginia Charlottesvile, Virginia, USA ABSTRACT Zipr is a tool for static binary rewriting, first published in 2016. Zipr was engineered to support arbitrary program modification with an emphasis on low overhead, robustness, and flexibility to perform security enhancements and instrumentation. Originally targeted to Linux x86-32 binaries, Zipr now supports 32- and 64-bit binaries for X86, ARM, and MIPS architectures, as well as preliminary support for Windows programs. These features have helped Zipr make a dramatic impact on research. It was first used in the DARPA Cyber Grand Challenge to take second place overall, with the best security score of any participant, Zipr has now been used in a variety of research areas by both the original authors as well as third parties. Zipr has also led to publications in artificial diversity, program instrumentation, program repair, fuzzing, autonomous vehicle security, research computing security, as well as directly contributing to two student dissertations. The open-source repository has accepted accepted patches from several external authors, demonstrating the impact of Zipr beyond the original authors. CCS CONCEPTS • Software and its engineering → Software maintenance tools; Translator writing systems and compiler generators; • Security and privacy → Software reverse engineering. KEYWORDS Binary Rewriting, Retargetable Binary Analysis, Reverse Engineering ACM Reference Format: Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson. 2023. Zipr: A High- Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter. In Proceedings of Cybersecurity Artifacts Competition and Impact Award (AC- SACARTCOMP ’23). ACM, New York, NY, USA, 5 pages. 1 INTRODUCTION The impetus for creating Zipr was the need to apply many patches to arbitrary binaries efficiently. We had a static analysis system for binaries that could identify potential buffer overflows and recommend patches, and we needed to determine the runtime costs of applying the patches. While we had access to dynamic binary translators, runtime and memory overheads were not appropriate for the embedded systems we were targeting. [21, 43, 44] At the time, there were two flavors of static binary rewriters: Ones that ACSACARTCOMP ’23, December 04–08, 2023, Austin, TX © 2023 Copyright held by the owner/author(s). kept a copy of the original program text to deal with disassembly errors and ones that overwrote the code to be instrumented with a trampoline to an unused address to execute the instrumented code snippet, then return to the original code to continue execution. Keeping a full second copy of the program was untenable for embedded systems. Further, we knew that our static analyzer likely had many false positives (as static analyzers tend to do), so we did not want our instrumentation to suffer from the cache, branch predictor, and memory penalty overheads of frequent trampolining inside time-critical kernel loops. We needed a rewriting system suitable for embedded systems, and nothing available met the requirements: 1) low overhead (in terms of memory and performance), 2) robust for a large range of common programs, and 3) the ability to cheaply invoke arbitrary instrumentation for any instruction in the program. Of course, these features are desirable in most environments but absolutely necessary for embedded systems. We realized that instead of trampolining for patched instructions, we could trampoline only the (comparatively infrequent) indirect branch instruction targets. This approach allows instrumentation of any instruction. Zipr works by putting a trampoline at each indirect branch target, and then places the remaining code blocks around these trampolines. To save space, Zipr lays out blocks between trampolines with a best-fit algorithm, and often simply replaces the trampoline with the correct code, avoiding any overhead at all. The primary publications describing Zipr were published in 2016 and 2017 [7, 12, 15, 20]. The open source release [32] occurred in 2019 after a dependency on a commercial software package, IDA Pro [8], was eliminated. Zipr has since been extended for multiple platforms and demonstrated effective, robust binary rewriting. Section 2 discusses the Zipr artifact’s current release, while Section 3 describes the impacts that Zipr has made in artificial diversity, program instrumentation, program repair, fuzzing, autonomous vehicle security, research computing security, as well as directly contributing to two student dissertations and numerous papers in key areas of security and privacy. 2 THE ZIPR ARTIFACT Zipr Architecture. The Zipr architecture includes a front end that parses binary programs and lifts it into a low-level Zipr intermediate representation (IR). This IR is stored in a database we call the IRDB. The front end detects instructions, functions, data objects, indirect branch targets, and stack unwinding information (also called exception handling (EH) tables) and deposits this information in the IRDB. The IRDB contains information about control transfers, data object locations, and whether the IR is complete enough to unpin a data object or instruction, etc. One key feature of the IRDB storage mechanism is that it allows for uncertain and" 2312.00733v1,"Provable bounds for noise-free expectation values computed from noisy samples Samantha V. Barron, 1 Daniel J. Egger, 2 Elijah Pelofske, 3 Andreas Bärtschi, 3 Stephan Eidenbenz, 3 Matthis Lehmkuehler, 4 and Stefan Woerner 2, ∗ 1 IBM Quantum, IBM T.J. Watson Research Center 2 IBM Quantum, IBM Research Europe - Zurich 3 Los Alamos National Laboratory 4 University of Basel (Dated: December 4, 2023) In this paper, we explore the impact of noise on quantum computing, particularly focusing on the challenges when sampling bit strings from noisy quantum computers as well as the implications for optimization and machine learning applications. We formally quantify the sampling overhead to extract good samples from noisy quantum computers and relate it to the layer fidelity, a metric to determine the performance of noisy quantum processors. Further, we show how this allows us to use the Conditional Value at Risk of noisy samples to determine provable bounds on noisefree expectation values. We discuss how to leverage these bounds for different algorithms and demonstrate our findings through experiments on a real quantum computer involving up to 127 qubits. The results show a strong alignment with theoretical predictions. I. INTRODUCTION Quantum computing is a new computational paradigm which promises to impact many disciplines, ranging from quantum chemistry [1, 2], quantum physics [3], and material sciences [4], to machine learning [5–7], optimization [8–11], and finance [12–14]. However, leveraging nearterm quantum computers is difficult due to the noise present in the systems. Ultimately, this needs to be addressed by quantum error correction, which exponentially suppresses errors by encoding logical qubits in multiple physical qubits [15, 16]. In near-term devices, implementing error correction is infeasible. We must find other ways to handle the noise. A promising approach to bridge the gap between noisy and error-corrected quantum computing is error mitigation. Here, we leverage multiple noisy estimates to construct a better approximation of the noise-free result. The most prominent examples are Probabilistic Error Cancellation (PEC) [17, 18] and Zero Noise Extrapolation (ZNE) [19]. While error mitigation in general scales exponentially [20], a combination of PEC and ZNE has been impressively demonstrated recently in a 127-qubit experiment at a circuit depth beyond the reach of exact classical methods [21, 22]. The rate of the exponential cost of error mitigation directly relates to the errors in the quantum devices. It is expected that these errors can be reduced to a level that noisy devices with error mitigation can already perform practically relevant tasks even before error correction [23]. PEC and ZNE mitigate the errors in expectation values. While this finds many applications, e.g., in quantum chemistry and physics, most quantum optimization [8, 10, 24] and many quantum machine learning algorithms [6, 25] build directly on top of measured samples from a quantum computer. In opti- ∗ wor@zurich.ibm.com mization, having access to an objective value but not the samples corresponds to knowing the value of an optimal solution but not how to realize it. Getting these samples is thus a key problem to scale sample-based algorithms on noisy hardware. In this paper, we discuss the impact of noise on sampling bit strings from a noisy quantum computer and quantify the sampling overhead required to extract good solutions from noisy devices, e.g., in the context of optimization. Furthermore, we connect our findings to the Conditional Value at Risk (CVaR, also known as Expected Shortfall), an alternative loss function introduced in Ref. [26]. We show that CVaR is robust against noise and can generate meaningful results from noisy samples also for expectation values. This feature was already conjectured in Ref. [26] but has not been shown formally. Our work closes this gap and shows that CVaR evaluated on noisy samples achieves provable bounds on noise-free observables. We demonstrate these bounds on up to 127- qubits on a real quantum computer applied to optimization problems, where we find close agreement between the experiments and theory. In particular, this allows us to apply the known noise-free performance bounds for the Quantum Approximate Optimization Algorithm (QAOA) for MAXCUT on 3-regular graphs [8, 27]. Thus, our work thus results in provable performance guarantees for a variational algorithm even on noisy hardware. The remainder of this paper is organized as follows. First, Sec. II discusses the impact of noise on sampling and how to quantify it. Then, Sec. III formally defines the CVaR and shows that it can provide provable bounds to noise-free expectation values from noisy samples. Afterwards, Sec. IV discuses the implications of the presented results in the context of applications in optimization, machine learning, and quantum time evolution. Sec. V demonstrates the results on a real quantum computer up to 127-qubits where we find close agreement with the theory. Last, Sec. VI concludes the paper and we discuss open questions for further research." 2312.00738v1,"SeaLLMs - Large Language Models for Southeast Asia Xuan-Phi Nguyen ∗ , Wenxuan Zhang ∗ , Xin Li ∗ , Mahani Aljunied ∗ , Qingyu Tan, Liying Cheng, Guanzheng Chen, Yue Deng, Sen Yang, Chaoqun Liu, Hang Zhang, Lidong Bing † DAMO Academy, Alibaba Group Hupan Lab, 310023, Hangzhou, China https://github.com/DAMO-NLP-SG/SeaLLMs Abstract Despite the remarkable achievements of large language models (LLMs) in various tasks, there remains a linguistic bias that favors high-resource languages, such as English, often at the expense of low-resource and regional languages. To address this imbalance, we introduce SeaLLMs, an innovative series of language models that specifically focuses on Southeast Asian (SEA) languages. SeaLLMs are built upon the Llama-2 model and further advanced through continued pre-training with an extended vocabulary, specialized instruction and alignment tuning to better capture the intricacies of regional languages. This allows them to respect and reflect local cultural norms, customs, stylistic preferences, and legal considerations. Our comprehensive evaluation demonstrates that SeaLLM-13b models exhibit superior performance across a wide spectrum of linguistic tasks and assistantstyle instruction-following capabilities relative to comparable open-source models. Moreover, they outperform ChatGPT-3.5 in non-Latin languages, such as Thai, Khmer, Lao, and Burmese, by large margins while remaining lightweight and cost-effective to operate. 1 Introduction The advent of large-scale language models (LLMs) has radically transformed the field of natural language processing, demonstrating remarkable abilities in text generation, comprehension, and decision-making tasks [5, 21, 22, 32, 33, 31, 11, 36, 3]. While the proficiencies of these models are extraordinary, the majority of existing LLMs embody a linguistic hierarchy overwhelmingly dominated by English [1, 13, 37]. This dominance undermines the multilingual capability of such models, with particularly prejudicial outcomes for lower-resource and regional languages, where data scarcity and tokenization challenges lead to disproportionately poor model performance. This linguistic disparity not only impedes access to state-of-the-art AI technologies for non-Englishspeaking populations but also risks cultural homogenization and the loss of linguistic diversity. While hyper-polyglot models exist [26, 18, 36], they may pay high cost at high-resource language performance and lack multilingual instruction-following abilities. Recognizing the urgent need to democratize AI and empower linguistically diverse regions, we introduce SeaLLMs, a suite of specialized language models optimized for Southeast Asian languages 1 . These languages, while rich and diverse, often lack the extensive dataset support available for more widely spoken languages, resulting in a stark performance gap in existing LLM applications. ∗ Equal contributions. Corresponding author: l.bing@alibaba-inc.com 1 English (Eng), Chinese (Zho), Indonesian (Ind), Vietnamese (Vie), Thai (Tha), Khmer (Khm), Lao, Malay (Msa), Burmese (Mya) and Tagalog (Tgl) † Technical Report." 2312.00744v1,"Effects of three-dimensional slit geometry on flashback of premixed hydrogen flames in perforated burners Filippo Fruzza a , Hongchao Chu b , Rachele Lamioni a , Temistocle Grenga c , Chiara Galletti a , Heinz Pitsch b a Dipartimento di Ingegneria Civile e Industriale, Università di Pisa, 56122 Pisa, Italy b Institute for Combustion Technology, RWTH Aachen University, Aachen 52056, Germany c Faculty of Engineering and Physical Sciences, University of Southampton, Southampton SO17 1BJ, UK Abstract Given the growing interest in hydrogen as a clean fuel for residential and commercial heating, there is an increasing need for the development of new designs for end-user devices, which must ensure both efficiency and safety. In this study, 3D simulations are used for the first time to investigate how the length of slits impacts the flashback limits for hydrogen-premixed flames in perforated burners, commonly employed in end-user devices such as con- densing boilers. Flashback limits are computed for hydrogen flames at three equivalence ratios (ϕ = 0.6, 0.8, and 1.0), investigating a circular hole and slits with increasing lengths up to 8 mm. Both transient and steady-state simulations are conducted to comprehensively capture the flashback dynam- ics and investigate a broad range of parameter variations. The results are compared with 2D simulations, which are found to underestimate consider- ably the flashback velocities. For sufficiently long slits, it is observed that ∗ Corresponding author Email address: rachele.lamioni@unipi.it (Rachele Lamioni) Preprint submitted to ... December 4, 2023" 2312.00747v1,"REDUCTION FROM SPARSE LPN TO LPN, DUAL ATTACK 3.0 KÉVIN CARRIER 1 , THOMAS DEBRIS–ALAZARD 2,3 , CHARLES MEYER-HILFIGER 4 , AND JEAN-PIERRE TILLICH 4 Abstract. The security of code-based cryptography relies primarily on the hardness of decoding generic linear codes. Until very recently, all the best algorithms for solving the decoding problem were information set decoders (ISD). However, recently a new algorithm called RLPN- decoding which relies on a completely different approach was introduced and it has been shown that RLPN outperforms significantly ISD decoders for a rather large range of rates. This RLPN decoder relies on two ingredients, first reducing decoding to some underlying LPN problem, and then computing efficiently many parity-checks of small weight when restricted to some positions. We revisit RLPN-decoding by noticing that, in this algorithm, decoding is in fact reduced to a sparse-LPN problem, namely with a secret whose Hamming weight is small. Our new approach consists this time in making an additional reduction from sparse-LPN to plain-LPN with a coding approach inspired by coded-BKW. It outperforms significantly the ISD’s and RLPN for code rates smaller than 0.42. This algorithm can be viewed as the code-based cryptography cousin of recent dual attacks in lattice-based cryptography. We depart completely from the traditional analysis of this kind of algorithm which uses a certain number of independence assumptions that have been strongly questioned recently in the latter domain. We give instead a formula for the LPN noise relying on duality which allows to analyze the behavior of the algorithm by relying only on the analysis of a certain weight distribution. By using only a minimal assumption whose validity has been verified experimentally we are able to justify the correctness of our algorithm. This key tool, namely the duality formula, can be readily adapted to the lattice setting and is shown to give a simple explanation for some phenomena observed on dual attacks in lattices in [DP23b]. 1. Introduction 1.1. Background. Code-based Cryptography: Decoding and LPN Problems. Code-based cryptography relies on the hardness of decoding generic linear codes or sometimes also on a closely related problem, namely the LPN problem. The first one corresponds in the binary case to Problem 1 (decoding a fixed error weight in a linear code). Let C be a binary linear code over F 2 of dimension k and length n, i.e. a subspace of F n 2 of dimension k. We are given y ∈ F n 2 , an integer t and we want to find a codeword c ∈ C and an error vector e ∈ F n 2 of Hamming weight |e| = t for which y = c + e. Generally the linear code is specified by a generator matrix, namely a k × n binary matrix G whose rows span the vector space C, in other words C = {uG : u ∈ F k 2 }. 1 Laboratoire ETIS, UMR 8051, CY Cergy-Paris Université, ENSEA, CNRS 2 Project GRACE, Inria Saclay 3 Laboratoire LIX, École Polytechnique, Institut Polytechnique de Paris, 1 rue Honoré d’Estienne d’Orves, 91120 Palaiseau Cedex 4 Project COSMIQ, Inria de Paris E-mail addresses: kevin.carrier@ensea.fr, thomas.debris@inria.fr, charles.meyer-hilfiger@inria.fr, jean-pierre.tillich@inria.fr. The work of KC, TDA and JPT was funded by the French Agence Nationale de la Recherche through ANR JCJC DECODE (ANR-22-CE39-0004-01) for KC, ANR JCJC COLA (ANR-21-CE39-0011) for TDA and ANR-22- PETQ-0008 PQ-TLS for JPT. The work of CMH was funded by the French Agence de l’innovation de défense and by Inria. 1" 2312.00752v1,"Mamba: Linear-Time Sequence Modeling with Selective State Spaces 1 Albert Gu * and Tri Dao * 1 2 Machine Learning Department, Carnegie Mellon University 2 Department of Computer Science, Princeton University agu@cs.cmu.edu, tri@tridao.me Abstract Foundation models, now powering most of the exciting applications in deep learning, are almost universally based on the Transformer architecture and its core attention module. Many subquadratic-time architectures such as linear attention, gated convolution and recurrent models, and structured state space models (SSMs) have been developed to address Transformers’ computational inefficiency on long sequences, but they have not performed as well as attention on important modalities such as language. We identify that a key weakness of such models is their inability to perform content-based reasoning, and make several improvements. First, simply letting the SSM parameters be functions of the input addresses their weakness with discrete modalities, allowing the model to selectively propagate or forget information along the sequence length dimension depending on the current token. Second, even though this change prevents the use of efficient convolutions, we design a hardware-aware parallel algorithm in recurrent mode. We integrate these selective SSMs into a simplified end-to-end neural network architecture without attention or even MLP blocks (Mamba). Mamba enjoys fast inference (5× higher throughput than Transformers) and linear scaling in sequence length, and its performance improves on real data up to million-length sequences. As a general sequence model backbone, Mamba achieves state-of-the-art performance across several modalities such as language, audio, and genomics. On language modeling, our Mamba-3B model outperforms Transformers of the same size and matches Transformers twice its size, both in pretraining and downstream evaluation. 1 Introduction Foundation models (FMs), or large models pretrained on massive data then adapted for downstream tasks, have emerged as an effective paradigm in modern machine learning. The backbone of these FMs are often sequence models, operating on arbitrary sequences of inputs from a wide variety of domains such as language, images, speech, audio, time series, and genomics (Brown et al. 2020; Dosovitskiy et al. 2020; Ismail Fawaz et al. 2019; Oord et al. 2016; Poli et al. 2023; Sutskever, Vinyals, and Quoc V Le 2014). While this concept is agnostic to a particular choice of model architecture, modern FMs are predominantly based on a single type of sequence model: the Transformer (Vaswani et al. 2017) and its core attention layer (Bahdanau, Cho, and Bengio 2015) The efficacy of self-attention is attributed to its ability to route information densely within a context window, allowing it to model complex data. However, this property brings fundamental drawbacks: an inability to model anything outside of a finite window, and quadratic scaling with respect to the window length. An enormous body of research has appeared on more efficient variants of attention to overcome these drawbacks (Tay, Dehghani, Bahri, et al. 2022), but often at the expense of the very properties that makes it effective. As of yet, none of these variants have been shown to be empirically effective at scale across domains. Recently, structured state space sequence models (SSMs) (Gu, Goel, and Ré 2022; Gu, Johnson, Goel, et al. 2021) have emerged as a promising class of architectures for sequence modeling. These models can be interpreted as a combination of recurrent neural networks (RNNs) and convolutional neural networks (CNNs), with inspiration from classical state space models (Kalman 1960). This class of models can be computed very efficiently as either a recurrence or convolution, with linear or near-linear scaling in sequence length. Additionally, they have principled * Equal contribution. 1" 2312.00757v1,"Letter 1 Giant microwave-optical Kerr nonlinearity via Rydberg excitons in cuprous oxide J ON D. P RITCHETT 1,† , L IAM A. P. G ALLAGHER 1,† , A LISTAIR B REWIN 1 , H ORATIO Q. X. W ONG 1 , W OLFGANG L ANGBEIN 2 , S TEPHEN A. L YNCH 2 , C. S TUART A DAMS 1 , AND M ATTHEW P. A. J ONES 1,* 1 Department of Physics, Durham University, Durham DH1 3LE, United Kingdom 2 School of Physics and Astronomy, Cardiff University, Cardiff CF24 3AA, United Kingdom † These authors contributed equally to this work. * m.p.a.jones@durham.ac.uk Compiled December 4, 2023 Microwave-optical conversion is key to future networks of quantum devices, such as those based on superconducting technology. Conversion at the single quantum level requires strong nonlinearity, high bandwidth, and compatibility with a millikelvin environment. A large nonlinearity is observed in Rydberg atoms, but combining atomic gases with dilution refrigerators is technically challenging. Here we demonstrate that a strong microwave-optical nonlinearity in a cryogenic, solidstate system by exploiting Rydberg states of excitons in Cu 2 O. We measure a microwave-optical cross-Kerr coefficient of B 0 = 0.022 ± 0.008 m V − 2 at 4 K, which is several orders of magnitude larger than other solid-state systems. Our results highlight the potential of Rydberg excitons for nonlinear optics, and form the basis for a microwave-optical frequency converter based on Cu 2 O. http://dx.doi.org/10.1364/ao.XX.XXXXXX Superconducting microwave devices play a key role in quantum computation [1]. To eliminate thermal noise, these devices must be cooled to T ≈ 10 mK, a requirement which makes direct quantum networking impractical over distances larger than ∼ 1 m [2]. Microwave-optical (MO) conversion is therefore a critical enabling technology [3–5], with current approaches including electro-optics [6], rare-earth ions [7], optomechanical systems [8] and quantum dot molecules [9]. Very strong nonlinearity can be achieved by exploiting the large microwave dipole moment associated with highly excited atomic Rydberg states [10], leading to the largest observed cross-Kerr effect of any material [11]. However interfacing Rydberg atoms with planar superconducting quantum devices in a millikelvin environment is an outstanding challenge, and coupling has so far been achieved only at much higher temperature [12–15]. In this Letter we combine the advantages of atomic Rydberg states (giant nonlinearity) and the solid state (milliKelvin compatibility [16, 17]) by using Rydberg states of excitons in the bulk semiconductor Cu 2 O [18] (Fig. 1). Excitons are optically excited bound states of an electron and a hole, with an internal structure that resembles a hydrogen atom. In Cu 2 O, the resulting Rydberg series of excitonic states has been measured up to principal quantum number n = 30 at T ≈ 40 mK [17]. Transitions between neighbouring states of opposite parity are located in the microwave spectral region. The associated dipole moment scales as d ∝ n 2 , reaching 180 e nm at n = 11, which is more than thirty times larger than in quantum dot molecules [9]. Thus Rydberg excitons in Cu 2 O provide a unique platform for MO coupling in the solid-state [19], with recent experiments demonstrating microwave control of the linear and nonlinear optical response [20]. Here we extend this work to a measurement of the optical phase shift induced by the presence of a microwave field, characterised by the microwave-optical Kerr coefficient B 0 B 0 = ∆ϕ 2πL |E MW | 2 , (1) where ∆ϕ is the optical phase shift induced by the microwave field, L is the length of the material and E MW is the amplitude of the applied microwave field. A schematic of the experiment is shown in Fig. 1. A thin slab of Cu 2 O (55 ± 10 µm) is mounted between the conductors of a microwave stripline and cooled to T = 4 K. Excitons in a quantum state nP (where P denotes orbital angular momentum l = 1) were excited from the ground state (valence band) using a single-frequency laser at wavelength λ ≈ 571 nm. A microwave field at angular frequency ω MW = 2π × 7 GHz couples nP states to nearby states of opposite parity (e.g. n ′ S, n ′ D, where S and D indicate l = 0 and l = 2). The spectrum of the transmitted laser light was resolved using a scanning Fabry-Perot etalon. Further experimental details are provided in Appendix A. Applying the microwave field leads to a change in transmission at the laser frequency ω L = 2πc/λ, and the appearance of sidebands at frequencies ω L ± 2ω MW on the light transmitted through the sample (Fig. 1(c)) that are indicative of a cross-Kerr nonlinearity. The optical absorption spectrum close to the bandgap is shown in Fig. 2(a). Peaks corresponding to nP excitonic states are visible up to n = 16, limited by a combination of temperature and sample quality. As Cu 2 O is centrosymmetric, the MO coupling absent from the ground-state symmetry but is created by the Rydberg excitons, as shown in Fig. 2(b), which plots the spectrum of the microwave-induced change in absorption ∆α. Each exciton resonance shows decreased absorption on-resonance," 2312.00761v1,"Preprint. Under review. D EEP U NLEARNING : F AST AND E FFICIENT T RAINING - FREE A PPROACH TO C ONTROLLED F ORGETTING Sangamesh Kodge, Gobinda Saha & Kaushik Roy Elmore Family School of Electrical and Computer Engineering Purdue University West Lafayette, IN, USA {skodge,gsaha,kaushik}@purdue.edu A BSTRACT Machine unlearning has emerged as a prominent and challenging area of interest, driven in large part by the rising regulatory demands for industries to delete user data upon request and the heightened awareness of privacy. Existing approaches either retrain models from scratch or use several finetuning steps for every deletion request, often constrained by computational resource limitations and restricted access to the original training data. In this work, we introduce a novel class unlearning algorithm designed to strategically eliminate an entire class or a group of classes from the learned model. To that end, our algorithm first estimates the Retain Space and the Forget Space, representing the feature or activation spaces for samples from classes to be retained and unlearned, respectively. To obtain these spaces, we propose a novel singular value decomposition-based technique that requires layer wise collection of network activations from a few forward passes through the network. We then compute the shared information between these spaces and remove it from the forget space to isolate class-discriminatory feature space for unlearning. Finally, we project the model weights in the orthogonal direction of the class-discriminatory space to obtain the unlearned model. We demonstrate our algorithm’s efficacy on ImageNet using a Vision Transformer with only ∼ 1.5% drop in retain accuracy compared to the original model while maintaining under 1% accuracy on the unlearned class samples. Further, our algorithm consistently performs well when subject to Membership Inference Attacks showing 7.8% improvement on average across a variety of image classification datasets and network architectures, as compared to other baselines while being ∼ 6× more computationally efficient. Additionally, we investigate the impact of unlearning on network decision boundaries and conduct saliency-based analysis to illustrate that the post-unlearning model struggles to identify class-discriminatory features from the forgotten classes. 1 1 I NTRODUCTION Machine learning has automated numerous applications in various domains, including image processing, language processing, and many others, often surpassing human performance. Nevertheless, the inherent strength of these algorithms, which lies in their extensive reliance on training data, paradoxically presents potential limitations. The literature has shed light on how these models behave as highly efficient data compressors (Tishby & Zaslavsky, 2015; Schelter, 2020), often exhibiting tendencies toward the memorization of full or partial training samples (Arpit, 2017; Bai et al., 2021). Such characteristics of these algorithms raise significant concerns about the privacy and safety of the general population. This is particularly concerning given that the vast training data, typically collected through various means like web scraping, crowdsourcing, user data collection through apps and services, and more, is not immune to personal and sensitive information. The growing awareness of these privacy concerns and the increasing need for safe deployment of these models have ignited discussions within the community and, ultimately, led to some regulations on data privacy, such as Voigt & Von dem Bussche (2017); Goldman (2020). These regulations allow the use of the data with the mandate to delete personal information pertaining to a user if they choose to opt-out 1 Our code is available at https://github.com/sangamesh-kodge/class_forgetting. 1" 2312.00763v1,"Beyond ChatBots: ExploreLLM for Structured Thoughts and Personalized Model Responses XIAO MA ∗ , Google, USA SWAROOP MISHRA † , Google Deepmind, USA ARIEL LIU, Google, USA SOPHIE SU, Google, USA JILIN CHEN, Google, USA CHINMAY KULKARNI, Emory University, USA HENG-TZE CHENG, Google Deepmind, USA QUOC LE, Google Deepmind, USA ED CHI, Google Deepmind, USA Fig. 1. ExploreLLM introduces a new interaction pattern with large language models (LLMs) by automatically decomposing complex tasks into sub-tasks, and allowing users greater task control and personalization. Large language model (LLM) powered chatbots are primarily text-based today, and impose a large interactional cognitive load, especially for exploratory or sensemaking tasks such as planning a trip or learning about a new city. Because the interaction is textual, users have little scaffolding in the way of structure, informational “scent”, or ability to specify high-level preferences or goals. We introduce ExploreLLM that allows users to structure thoughts, help explore different options, navigate through the choices and recommendations, and to more easily steer models to generate more personalized responses. We conduct a user study and show that users find it helpful to use ExploreLLM for exploratory or planning tasks, because it provides a useful ∗ Author list is by descending order of contribution. † Developed initial idea of prompt decomposition and tree-based design and interaction. Authors’ addresses: Xiao Ma, xmaa@google.com, Google, USA; Swaroop Mishra, swaroopmishra@google.com, Google Deepmind, USA; Ariel Liu, arielliu@google.com, Google, USA; Sophie Su, sophiesu@google.com, Google, USA; Jilin Chen, jilinc@google.com, Google, USA; Chinmay Kulkarni, chinmay.kulkarni@emory.edu, Emory University, USA; Heng- Tze Cheng, hengtze@google.com, Google Deepmind, USA; Quoc Le, qvl@google.com, Google Deepmind, USA; Ed Chi, edchi@google.com, Google Deepmind, USA." 2312.00766v1,"Automated Material Properties Extraction For Enhanced Beauty Product Discovery and Makeup Virtual Try-on FATEMEH TAHERI DEZAKI, HIMANSHU ARORA, RAHUL SURESH, and AMIN BANITALEBI- DEHKORDI, BeautyTech, Amazon, Canada The multitude of makeup products available can make it challenging to find the ideal match for desired attributes. An intelligent approach for product discovery is required to enhance the makeup shopping experience to make it more convenient and satisfying. However, enabling accurate and efficient product discovery requires extracting detailed attributes like color and finish type. Our work introduces an automated pipeline that utilizes multiple customized machine learning models to extract essential material attributes from makeup product images. Our pipeline is versatile and capable of handling various makeup products. To showcase the efficacy of our pipeline, we conduct extensive experiments on eyeshadow products (both single and multi-shade ones), a challenging makeup product known for its diverse range of shapes, colors, and finish types. Furthermore, we demonstrate the applicability of our approach by successfully extending it to other makeup categories like lipstick and foundation, showcasing its adaptability and effectiveness across different beauty products. Additionally, we conduct ablation experiments to demonstrate the superiority of our machine learning pipeline over human labeling methods in terms of reliability. Our proposed method showcases its effectiveness in cross-category product discovery, specifically in recommending makeup products that perfectly match a specified outfit. Lastly, we also demonstrate the application of these material attributes in enabling virtual-try-on experiences which makes makeup shopping experience significantly more engaging. CCS Concepts: • Computing methodologies → Visual content-based indexing and retrieval. Additional Key Words and Phrases: material property extraction, outfit and makeup matching, recommendation, virtual try-on ACM Reference Format: Fatemeh Taheri Dezaki, Himanshu Arora, Rahul Suresh, and Amin Banitalebi-Dehkordi. 2023. Automated Material Properties Extraction For Enhanced Beauty Product Discovery and Makeup Virtual Try-on. In . ACM, New York, NY, USA, 17 pages. https://doi.org/XXXXXXX. XXXXXXX 1 INTRODUCTION The makeup industry has grown exponentially, with an abundance of products catering to various preferences and skin types. However, this extensive selection poses a challenge for consumers as they navigate through countless options to find the right products that align with their specific requirements. Furthermore, customers often face the frustration of not accurately perceiving the visual attributes of makeup products solely through online catalog images. This lack of certainty necessitates waiting for the product to arrive, leading to a less-than-ideal experience. Traditionally, e-commerce websites have relied on various sources of information, such as brands, titles, product descriptions, reviews, and recommendations, to guide the purchasing decisions of customers. While these sources can enable ranking of products in a relevant manner but they often fall short in providing a comprehensive understanding of the underlying material properties of the makeup products. Material properties, such as color, finish type and glitter Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM 1" 2312.00771v1,"Band alignment of grafted monocrystalline Si (001)/β-Ga 2 O 3 (010) p-n heterojunction determined by X-ray photoelectron spectroscopy Jiarui Gong 1,a) , Jie Zhou 1,a) , Ashok Dheenan 2 , Moheb Sheikhi 1 , Fikadu Alema 3 , Tien Khee Ng 4 , Shubhra S. Pasayat 1 , Qiaoqiang Gan 4 , Andrei Osinsky 3 , Vincent Gambin 5 , Chirag Gupta 1 , Siddharth Rajan 2,b) , Boon S. Ooi 4,b) , and Zhenqiang Ma 1,b) 1 Department of Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, Wisconsin, 53706, USA 2 Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH 43210, USA 3 Agnitron Technology Incorporated, Chanhassen, MN 55317, USA 4 Department of Electrical and Computer Engineering, King Abdullah University of Science and Technology, Thuwal 23955-6900, Saudi Arabia 5 Northrop Grumman Corporation, Redondo Beach, CA 90278, USA a) b) Jiarui Gong and Jie Zhou contributed equally to this work. Author to whom correspondence should be addressed. Electronic mail: mazq@engr.wisc.edu, boon.ooi@kaust.edu.sa, rajan.21@osu.edu 1" 2312.00774v1,"Context Retrieval via Normalized Contextual Latent Interaction for Conversational Agent Junfeng Liu 1,2 , Zhuocheng Mei 1 , Kewen Peng 1 , and Ranga Raju Vatsavai 1,3 1 Department of Computer Science, North Carolina State University, Raleigh, NC, USA 2 Lirio AI Research, Lirio LLC, Knoxville, TN, USA 3 Behavior Reinforcement Learning Lab, Lirio LLC, Knoxville, TN, USA {jliu85, zmei5, kpeng, rrvatsav}@ncsu.edu Abstract—Conversational agents leveraging AI, particularly deep learning, are emerging in both academic research and real-world applications. However, these applications still face challenges, including disrespecting knowledge and facts, not personalizing to user preferences, and enormous demand for computational resources during training and inference. Recent research efforts have been focused on addressing these challenges from various aspects, including supplementing various types of auxiliary information to the conversational agents. However, existing methods are still not able to effectively and efficiently exploit relevant information from these auxiliary supplements to further unleash the power of the conversational agents and the language models they use. In this paper, we present a novel method, PK-NCLI, that is able to accurately and efficiently identify relevant auxiliary information to improve the quality of conversational responses by learning the relevance among persona, chat history, and knowledge background through lowlevel normalized contextual latent interaction. Our experimental results indicate that PK-NCLI outperforms the state-of-theart method, PK-FoCus, by 47.80%/30.61%/24.14% in terms of perplexity, knowledge grounding, and training efficiency, respectively, and maintained the same level of persona grounding performance. We also provide a detailed analysis of how different factors, including language model choices and trade-offs on training weights, would affect the performance of PK-NCLI. I. I NTRODUCTION Recent advances in machine learning and deep learning have enabled a tremendous amount of applications in natural language processing, particularly in conversational AI. Many dialogue agents are driven by conversational data. While they can deliver a reasonable answer, many existing methods fail to address important auxiliary information that is relevant to the conversation, leading to an answer irrelevant to the topic. For instance, in a question-answering system, when an agent is processing a query from a human without external knowledge related to the topic, it is nearly impossible to construct an ideal answer based on facts. Hence, to provide accurate and relevant answers it is critical that an AI agent should leverage external knowledge and respect such knowledge in the generated responses. Another emerging need in conversational AI applications is to seek personalized answers so that these answers could help improve user experience and engagement during the conversation. Many existing research efforts have been focused on leveraging the speakers’ persona information to understand the user’s intent and tailor the responses to the specific user. In this paper, we focus on incorporating both external knowledge and user persona to improve the quality of answers generated by conversational models. While knowledge provides background information about discussion topics and other ground truth information, it is not guaranteed to generate the response that the user seeks. Without capturing the user’s intention or preference, it is a challenge for a model to satisfy the user’s need. By learning the user’s persona, a model can decide which knowledge a user is looking for. Therefore, learning the user’s persona is critical for a human-like conversation. We propose a novel framework, PK-NCLI, with knowledge and persona grounding based on normalized contextual latent interaction that helps identify relevant knowledge and persona entries to improve the quality of responses generated by two benchmark language models. Our experiments demonstrate that PK-NCLI is able to outperform the state-ofthe-art persona/knowledge-grounding method, PK-FoCus [1], by 47.80% in terms of language quality, 30.61% in terms of knowledge grounding, and maintain the same persona grounding performance. In addition, our method PK-NCLI improved training efficiency over the baseline by 24.14%. II. R ELATED W ORK With the increasing computational capability of deep neural networks (DNNs), many researchers endeavor to develop AI agents for automated dialog generation for various applications, such as question answering and machine translation. However, one of the major challenges is to generate informative yet diverse conversations that are suitable in a specific context. One approach is to utilize personalized information (e.g., demographics, hobbies, preferences) to train chatbots that can generate customized conversations. Li et al. [2] proposed a persona-based dialog generation model, which is capable of generating responses that are consistent with a particular persona. Similarly, Humeau et al. [3] proposed an approach in which the neural network is trained on a personality-capturing loss function such that the generated conversation is more likely to align with certain given personality traits. Other recent works also work toward similar directions in designing persona-inclusive dialog models [4], [5]. Recently, Jang et al. [1] created a conversation dataset that is supported by both speaker personas and external knowledge base and proposed a" 2312.00778v1,". .. . .. MorpheuS: Neural Dynamic 360 ◦ Surface Reconstruction from Monocular RGB-D Video Casual real-world capture NDR reconstruction Ours reconstruction Hengyi Wang Jingwen Wang Lourdes Agapito Department of Computer Science, University College London {hengyi.wang.21, jingwen.wang.17, l.agapito}@ucl.ac.uk . .. . .. Casual Real-world Capture MorpheuS NDR Figure 1. We propose MorpheuS, a dynamic scene reconstruction method that leverages neural implicit representations and diffusion priors for achieving 360 ◦ reconstruction of a moving object from a monocular RGB-D video. Our approach can achieve both metrically accurate reconstruction of the observed regions and photo-realistic completion of unobserved regions of a dynamic scene. Abstract 1. Introduction The challenge of reconstructing the dense 3D geometry, appearance, and motion of dynamic scenes from videos has persisted for decades, offering a wide range of applications in virtual reality and augmented reality. Due to the inherent ambiguities of the problem, traditional dense nonrigid reconstruction approaches often assume strong priors on the object’s shape and motion. Model-based approaches [1, 11, 25, 26, 65, 75] require 3D parametric models [2, 6, 28, 36, 42, 84] of specific object categories such as humans [2, 36], faces [6, 28], or animals [84]. While these methods achieve promising reconstruction results, they fall short of generalizing to arbitrary object categories. In this paper, we focus on model-agnostic approaches that could generalize to generic non-rigid objects. This task is often approached by jointly fusing a canonical shape and a per-frame deformation field from an RGB-D video sequence [7, 8, 24, 41, 59, 60]. Due to the inherent constraints of physical sensors and the use of traditional voxel-grid representations, they often struggle to produce high-fidelity surface details and can only reconstruct observed regions. Recent attention has shifted towards leveraging neural representations for scene reconstruction. Neural Radiance Fields (NeRF) [39] represent scene density and color in the Neural rendering has demonstrated remarkable success in dynamic scene reconstruction. Thanks to the expressiveness of neural representations, prior works can accurately capture the motion and achieve high-fidelity reconstruction of the target object. Despite this, real-world video scenarios often feature large unobserved regions where neural representations struggle to achieve realistic completion. To tackle this challenge, we introduce MorpheuS, a framework for dynamic 360 ◦ surface reconstruction from a casually captured RGB-D video. Our approach models the target scene as a canonical field that encodes its geometry and appearance, in conjunction with a deformation field that warps points from the current frame to the canonical space. We leverage a view-dependent diffusion prior and distill knowledge from it to achieve realistic completion of unobserved regions. Experimental results on various real-world and synthetic datasets show that our method can achieve high-fidelity 360 ◦ surface reconstruction of a deformable object from a monocular RGB-D video. Project page: https://hengyiwang.github.io/ projects/morpheus. 1" 2312.00791v1,"Replicator-mutator dynamics of Rock-Paper-Scissors game: Learning through mistakes Suman Chakraborty, 1, ∗ Ishita Agarwal, 1, † and Sagar Chakraborty 1, ‡ 1 Department of Physics, Indian Institute of Technology Kanpur, Uttar Pradesh 208016, India (Dated: December 5, 2023) We generalize the Bush–Mosteller learning, the Roth–Erev learning, and the social learning to include mistakes such that the nonlinear replicator-mutator equation with either additive or multiplicative mutation is generated in an asymptotic limit. Subsequently, we exhaustively investigate the ubiquitous Rock-Paper-Scissors game for some analytically tractable motifs of mutation pattern. We consider both symmetric and asymmetric game interactions, and reveal that mistakes can sometimes help the players learn. While the replicator-mutator flow exhibits rich dynamics that include limit cycles and chaotic orbits, it can control chaos as well to lead to rational Nash equilibrium outcome. Moreover, we also report an instance of hitherto unknown Hamiltonian structure of the replicator-mutator equation. I. INTRODUCTION It is well-known that while attending to a task, actions that lead to positive outcome are repeated more often (law of effect [1]) and the time taken to accomplish the task reduces over repeated trials (law of practice [2]): In other words, the doer learns. Learning is important not only for human beings but also for animals [3], insects [4], birds [5], bacteria [6], and other living organisms. In a game-theoretic setup where two players interact, the complete learning process involves for each player a choice of strategy—based on a belief about the opponent—that leads to some outcome that in turn leads to updated belief (through a learning rule [7]); the strategy adopted in the subsequent round of play is based, via a decision rule, on the updated belief, and this cycle repeats until the optimal strategy is learnt. When the step of belief updating is bypassed, i.e., when the strategy update is directly based on the outcome, the learning process is termed as reinforcement learning. Some of the well-known reinforcement learning mechanisms— like the Roth–Erev learning [8, 9], the Bush–Mosteller learning [10], and social learning [11, 12]—approach the paradigmatic replicator equation [13] under certain limits [14–16]. The replicator equation is one of the cornerstones of the deterministic frequency-dependent models of microevolution studied as part of evolutionary game theory [17, 18]. Interestingly, the replicator equation transcends the boundary between the biological evolution and reinforcement learning process to find application in both the fields. In fact, the time-discrete form of the replicator equation can directly be interpreted as a Bayes’ update rule [19]. Furthermore, mutations in evolution may be seen analogous to mistakes made in a learning process. ∗ Electronic address: suman@iitk.ac.in † Electronic address: ishitaa20@iitk.ac.in ‡ Electronic address: sagarc@iitk.ac.in Making a few mistakes during learning is practically inevitable and it usually has a negative connotation attached to it. But in many real-life situations, we can find mistakes facilitating new opportunity to handle a situation more comfortably. This is analogous to the case of biological evolution where mutations—mistakes in DNA replication—help organisms to evolve and adapt to ever changing environment. Experimental studies showed that foraging errors play a positive role in resource exploration by bumblebees [20]. In the context of education and industry, learning through mistakes takes an significant role [21–23]: Recent studies showed that to get the optimal performance in high-stakes situations students should be encouraged to commit and correct errors when they are in low-risk learning situations [24]. Furthermore, the Japanese active learning approach [25] where students first try to solve problems on their own— a process that is likely to be filled with false starts—is based on the idea of learning-from-errors. It is capable of rendering better performance as compared to the teaching methodology based on avoidance of errors. Mistakes can be easily modelled into the replicator equation which modifies to replicator-mutator equation [26–33]. At the very least, there are two ways in which the change in the probability of playing a strategy in a subsequent round can be effected: additive and multiplicative mutations. While the multiplicative mutation is more biological in nature—the error in DNA replication directly effected the offsprings’ type [34], the additive mutation has been advocated to be more social in nature—it occurs directly in the adults [28, 30]. However, the former has been used in social settings like in the evolution of language [26], whereas the latter has been used in biological settings [35]. An important feature of the replicator equation (also, the replicator mutator equation) is that it not only leads to convergent outcomes, but also predicts non-convergent oscillatory (periodic and chaotic) solutions. The omnipresent game of Rock-Paper-Scissors (RPS) [36, 37] does exhibit oscillatory outcomes by virtue of nontransitive dominance relation between the pure strate-" 2312.00792v1,"Visualization and Characterization of Agricultural Sprays Using Machine Learning based Digital Inline Holography Shyam Kumar M 1 , Christopher J. Hogan 1 , Steven A. Fredericks 3 , Jiarong Hong 1,2 1 Department of Mechanical Engineering, University of Minnesota, Minneapolis, MN, USA 2 Saint Anthony Falls Laboratory, University of Minnesota, Minneapolis, Minnesota, USA 3 Winfield United, River Falls, Wisconsin, USA Corresponding author: Jiarong Hong, PhD Professor Department of Mechanical Engineering University of Minnesota Phone: 612-626-4562 Email: jhong@umn.edu Keywords: Agriculture spray; Digital Inline Holography; 3D visualization; Machine learning; Spray characteristics Abstract Accurate characterization of agricultural sprays is crucial to predict in field performance of liquid applied crop protection products. In this paper, we introduce a robust and efficient machine learning (ML) based Digital In-line Holography (DIH) algorithm to accurately characterize the droplet field for a wide range of commonly used agricultural spray nozzles. Compared to non-ML based DIH processing, the ML-based algorithm enhances accuracy, generalizability, and processing speed. The ML-based approach employs two neural networks: a modified U-Net to obtain the 3D droplet field from the numerically reconstructed optical field, followed by a VGG16 classifier to reduce false positives from the U-Net prediction. The modified U- Net is trained using holograms generated using a single spray nozzle (XR11003) at three different spray locations; center, half-span, and the spray edge to create training data with different number densities and droplet size ranges. VGG16 is trained using the minimum intensity projection of the droplet 3D point spread function (PSF). Data augmentation is used to increase the efficiency of classification and make the algorithm generalizable for different measurement settings. The model is validated using National Institute of Standards and Technology (NIST) traceable glass beads and six different agricultural spray nozzles representing various spray characteristics. The principal results demonstrate a high accuracy rate, with over 90% droplet extraction and less than 5% false positives, regardless of droplet number density and size. Compared to traditional spray measurement techniques, the new ML-based DIH methodology offers a significant leap forward in spatial resolution and generalizability. We show that the proposed ML-based algorithm can extract the real cumulative volume distribution of the NIST beads, where the LD system measurements are biased towards droplets moving at slower speeds. Additionally, the ML-based DIH approach enables the estimation of mass and momentum flux at different locations and the calculation of relative velocities of droplet pairs, which are difficult to obtain using conventional spray characterization techniques. 1" 2312.00796v1,"(technical note) Multiple Protein Profiler 1.0 (MPP): A webserver for predicting and visualizing physiochemical properties of proteins at the proteome level. Authors Gustavo Sganzerla Martinez 1,2,3 , Mansi Dutt 1,2,3 , Anuj Kumar 1,2,3 , David J Kelvin 1,2,3* Affiliations 1 Department of Microbiology and Immunology, Dalhousie University, Halifax, Nova Scotia, Canada, B3H4H7. 2 Department of Pediatrics, Izaak Walton Killam (IWK) Health Center, Canadian Center for Vaccinology (CCfV), Halifax, Nova Scotia, Canada. B3H4H7. 3 BioForge Canada Limited. Halifax, NS, Canada. *Correspondence: David J Kelvin (David.Kelvin@dal.ca) Abstract Determining the physicochemical properties of a protein can reveal important insights in their structure, biological functions, stability, and interactions with other molecules. Although tools for computing properties of proteins already existed, we could not find a comprehensive tool that enables the calculations of multiple properties for multiple input proteins on the proteome level at once. Facing this limitation, we have developed Multiple Protein Profiler (MPP) 1.0 as an integrated tool that allows the profiling of 12 individual properties of multiple proteins in a significant manner. MPP provides a tabular and graphic visualization of properties of multiple proteins. The tool is freely accessible at https://mproteinprofiler.microbiologyandimmunology.dal.ca/ Introduction Proteins are the ubiquitous biological macromolecules that play principal roles in living organisms. These large and complex molecules have been well studied for their involvement in the structure, function, and regulation of tissues and organs [1]. In addition, these molecules are important structural components that carry out a plethora of biological functions, from replicating DNA and transporting/storing molecules to catalyzing metabolic pathways and much more [2]. Twenty different amino acids significantly contribute to the formation of proteins in the body. Antibodies, enzymes, hormones, messengers, structural components, and transport/storage molecules are" 2312.00824v1,"V ARIATIONAL S ELF -S UPERVISED C ONTRASTIVE L EARNING U SING B ETA D IVERGENCE Mehmet Can Yavuz, Berrin Yanikoglu Sabanci University, 34956, Istanbul Türkiye {berrin, mehmetyavuz}@sabanciuniv.edu A BSTRACT Learning a discriminative semantic space using unlabelled and noisy data remains unaddressed in a multi-label setting. We present a contrastive self-supervised learning method which is robust to data noise, grounded in the domain of variational methods. The method (VCL) utilizes variational contrastive learning with beta-divergence to learn robustly from unlabelled datasets, including uncurated and noisy datasets. We demonstrate the effectiveness of the proposed method through rigorous experiments including linear evaluation and fine-tuning scenarios with multi-label datasets in the face understanding domain. In almost all tested scenarios, VCL surpasses the performance of state-of-the-art self-supervised methods, achieving a noteworthy increase in accuracy. Keywords Self-supervised Learning · Face Recognition · Web collected set 1 Introduction Supervised deep learning approaches require large amounts of labelled data. While transfer learning with pretrained models is commonly used for addressing the labelled data shortage, the recent research focus has been on unsupervised and especially self-supervised methods trained with unlabelled or weakly labelled data that may be collected from the web [1, 2, 3, 4]. Even though it is easy to have access to uncurated data sets collected from the web, these data sets often lack useful labels, making it necessary to develop robust learning algorithms to enhance the performance of a visual classifier [5, 6]. Self-supervised learning utilizes supervisory signals that are generated internally from the data, eliminating the need for external labels. A significant part of self-supervised learning research involves using pretext tasks to learn embedding representations that are helpful in downstream tasks. Pretext tasks may involve patch context prediction [7]; solving jigsaw puzzles from the same [8]; colorizing images [9, 10]; predicting noise [11]; counting [12]; inpainting patches [13]; spotting artifacts [14]; generating images [15]; predictive coding [16]; or instance discrimination [17]. Self-supervised learning methods aim to learn embedding vectors that effectively represent the underlying semantic relationships among the data. State-of-the-art self-supervised literature also includes approaches that have been proposed for highly curated sets such as the Imagenet [18], namely SimCLR [19], BYOL [20], NNCLR [21], VICReg [22], Barlow Twins [23], MoCo [24] and TiCo [25]. A significant number of these approaches uses the contrastive learning paradigm that aims to minimize the distance between embeddings of similar (positive) samples generated from various random transformations or augmentations of the input image, while simultaneously increasing the distance between non-similar (negative) samples. The variational contrastive representation learning has only recently been studied in semi-supervised fashion [26]. In the realm of noisy data, there is a limited amount of research. Some approaches utilize standard clustering algorithms capable of handling outlier noise in semantic space [27, 1], while others enforce neighbor consistency to address the issue [28]." 2312.00825v1,"Probing and Mitigating Intersectional Social Biases in Vision-Language Models with Counterfactual Examples Phillip Howard 1 Avinash Madasu 1 Tiep Le 1 Gustavo Lujan Moreno 1 1 Anahita Bhiwandiwalla Vasudev Lal 1 1 Cognitive AI, Intel Labs {phillip.r.howard, avinash.madasu, tiep.le, gustavo.lujan.moreno}@intel.com {anahita.bhiwandiwalla, vasudev.lal}@intel.com Abstract While vision-language models (VLMs) have achieved remarkable performance improvements recently, there is growing evidence that these models also posses harmful biases with respect to social attributes such as gender and race. Prior studies have primarily focused on probing such bias attributes individually while ignoring biases associated with intersections between social attributes. This could be due to the difficulty of collecting an exhaustive set of image-text pairs for various combinations of social attributes. To address this challenge, we employ text-to-image diffusion models to produce counterfactual examples for probing intserctional social biases at scale. Our approach utilizes Stable Diffusion with cross attention control to produce sets of counterfactual image-text pairs that are highly similar in their depiction of a subject (e.g., a given occupation) while differing only in their depiction of intersectional social attributes (e.g., race & gender). Through our over-generate-then-filter methodology, we produce SocialCounterfactuals, a highquality dataset containing over 171k image-text pairs for probing intersectional biases related to gender, race, and physical characteristics. We conduct extensive experiments to demonstrate the usefulness of our generated dataset for probing and mitigating intersectional social biases in stateof-the-art VLMs. 1. Introduction Counterfactual examples, which study the impact on a response variable following a change to a causal feature, have proven valuable in natural language processing (NLP) for probing model biases and improving robustness to spurious correlation [16, 18, 26, 30, 51, 54, 57]. While counterfactual examples for VLMs have been relatively unexplored, recent work [32] has shown that text-to-image diffusion models with cross attention control can effectively produce multimodal counterfactual examples for VLM training, data augmentation and evaluation. This suggests that synthetic counterfactual examples generated by diffusion models could be an effective tool for probing and mitigating biases in VLMs. Bias in pre-trained models can be viewed as spurious correlations, which are often attributed to the co-occurrence of non-causal (i.e., spurious) features with labels in datasets. During pre-training, models learn to exploit such correlations as shortcuts to achieving high in-domain performance on the training dataset [19]. Consequently, models which learn to rely on spurious correlations are more brittle and have worse out-of-domain (OOD) generalization [46, 55]. Social biases are a particularly concerning type of spurious correlation learned by VLMs. Due to a lack of proportional representation for people of various races, genders, and other social attributes in image-text datasets [5, 17, 60], VLMs learn biased associations between these attributes and various subjects (e.g., occupations). For example, given a gender- and race-neutral query such as “A photo of an attorney”, a VLM may retrieve a disproportionate number of images of one particular race due to learned spurious correlations between this specific occupation and race. Prior studies on probing social biases in VLMs [22– 24, 28, 62] have primarily utilized real image-text pairs collected from existing datasets by identifying the cooccurrence of certain attributes with a target subject. However, this approach is limited by the availability of existing image-text pairs for various combinations of social attributes and subject types. Consequently, these prior studies have focused exclusively on investigating biases associated with a single social attribute at a time while ignoring the potential role of intersectional bias (e.g., particular race-gender combinations) [39], which could be attributed to the difficultly of collecting an exhaustive set of image-text examples for various combinations of social attributes. Additionally, the" 2312.00826v1,"DEVIAS: Learning Disentangled Video Representations of Action and Scene for Holistic Video Understanding Kyungho Bae 1∗ Geo Ahn 1∗ Youngrae Kim 2∗ Jinwoo Choi 1† 2 KAIST {kyungho.bae,ahngeo11,jinwoochoi}@khu.ac.kr , youngrae.kim@kaist.ac.kr 1 Kyung Hee University Scene Biased Representation Scene Biased Representation Action ? Action ? Dancing Scene Debiased Representation Scene Debiased Representation Action ? Dancing Action ? Dancing ❓ Where ? ❓ Where ? Disentangled Representation Disentangled Representation t Playing football Action ? Dancing Where ? Stage (a) In-context video: dancing on a stage. t Action ? Dancing Where ? Football field (b) Out-of-context video: dancing on a football field. Figure 1. Why do we need disentangled video representations? Video recognition models often learn scene-biased representations due to the spurious correlation [11, 43] between action and scene in the dataset. Although such models might work well on in-context videos (a), they would fail on out-of-context videos (b). In contrast, scene debiased video models [19, 67] may work well in terms of action recognition regardless of context. However, they fail to identify the scene as they are learned to disregard scene presentation but action representation. In this work, we propose to learn disentangled action and scene representations. The disentangled model is able to understand both action and scene well regardless of in-context and out-of-context scenarios, e.g. it correctly predicts dancing on a stage (a) and dancing in a football field (b). Abstract When watching a video, humans can naturally extract human actions from the surrounding scene context, even when action-scene combinations are unusual. However, unlike humans, video action recognition models often learn scene-biased action representations from the spurious correlation in training data, leading to poor performance in out-of-context scenarios. While scene-debiased models achieve improved performance in out-of-context scenarios, they often overlook valuable scene information in the data. Addressing this challenge, we propose Disentangled VIdeo representations of Action and Scene (DEVIAS), which aims to achieve holistic video understanding. Disentangled action and scene representations could be beneficial for both in-context and out-of-context video understanding. To this end, we employ slot attention to learn disentangled action and scene representations with a single model, along with ∗ Equally contributed first authors. † Corresponding author. auxiliary tasks that further guide slot attention. We validate the proposed method on both in-context datasets: UCF-101 and Kinetics-400, and out-of-context datasets: SCUBA and HAT. Our proposed method shows favorable performance across different datasets compared to the baselines, demonstrating its effectiveness in diverse video understanding scenarios. 1. Introduction When watching a video, humans can decompose human actions from the surrounding scene context, naturally understanding the content. Even when a certain action-scene combination is rare, e.g. in Figure 1 (b), humans easily recognize both the action and the scene, i.e. the girls are dancing on a football field. Unlike humans, many video action recognition models learn scene-biased action representations due to the spurious correlation between action and scene in training data. These scene-biased action recognition models often predict" 2312.00827v1,"A Unified Framework for Connecting Noise Modeling to Boost Noise Detection Siqi Wang Chau Pham Bryan A. Plummer Boston University (a) Prior Work: Noise Modeling Abstract Noisy label Noise Modeling Corrected label P(true label | noisy label) Cat Noisy labels can impair model performance, making the study of learning with noisy labels an important topic. Two conventional approaches are noise modeling and noise detection. However, these two methods are typically studied independently, and there has been limited work on their collaboration. In this work, we explore the integration of these two approaches, proposing an interconnected structure with three crucial blocks: noise modeling, source knowledge identification, and enhanced noise detection using noise source-knowledge-integration methods. This collaboration structure offers advantages such as discriminating hard negatives and preserving genuinely clean labels that might be suspiciously noisy. Our experiments on four datasets, featuring three types of noise and different combinations of each block, demonstrate the efficacy of these components’ collaboration. Our collaborative structure methods achieve up to a 10% increase in top-1 classification accuracy in synthesized noise datasets and 3-5% in real-world noisy datasets. The results also suggest that these components make distinct contributions to overall performance across various noise scenarios. These findings provide valuable insights for designing noisy label learning methods customized for specific noise scenarios in the future. Our code is accessible to the public. 1 Input image network Tiger Logits Cat Tiger Dog … (b) Prior Work: Noise Detection Noisy label Noise detector Tiger Noisy Label Input image network Is Tiger correct? Clean Label (c) Combined Noise Modeling and Noise Detection: COMBO (ours) Noise Source Knowledge Noise modeling Noisy label Tiger Correct Label Candidates Tiger P(true label | noisy label) Cat Noise detector Input image network {siqiwang, chaupham, bplum}@bu.edu Tiger > Dog > … Noisy Label or Cat ? Clean Label Figure 1. A Unified Framework for Connecting Noise Modeling. In prior work, two distinct methodologies have been utilized for learning with noisy labels: noise modeling and noise detection. (a) Noise modeling involves using a noise transition matrix to align the training loss on noisy data with that of clean data, thereby predicting true labels while training with noisy labels; (b) noise detection concentrates on differentiating between clean and noisy samples, and subsequently training the network using the identified clean labels; (c) COMBO (ours) leverages the noise source information inferred from the noise transition matrix, commonly used in noise modeling, to augment the effectiveness of noise detection methods. 1. Introduction Automated data collection methods have led to increased dataset generation with minimal human effort. However, these techniques often introduce noise, particularly in label data from sources like web crawling [18, 49], which is costly and challenging to deal with. Learning with Noisy Labels (LNL) [33] offers an effective and efficient alternative. It allows the training of models with strong resistance to noise, resulting in enhanced generalization and mitigating the adverse effects of noisy labels [2]. Prior work can be separated into two main approaches: Noise modeling and noise detection, as shown in Fig. 1. Noise modeling methods (Fig. 1a) train the consistent classifier with estimated noise transitions [7, 20, 28, 36, 46, 52, 56]. In contrast, noise detection methods (Fig. 1b) estimate the probability of the label being clean for each sample, and employ different training strategies for clean and noisy samples [9, 13, 15, 17, 22, 26, 32, 44]. Noise modeling 1 Available at https://github.com/SunnySiqi/COMBO 1" 2312.00833v1,"Dina Bashkirova 1 Arijit Ray 1 Rupayan Mallick 2 Sarah Adel Bargal 2 dbash@bu.edu array@bu.edu rm2083@georgetown.edu sb2122@georgetown.edu Jianming Zhang 4 Ranjay Krishna 3 Kate Saenko 1,5 jianmzha@adobe.com ranjay@cs.washington.edu saenko@bu.edu Input Abstract Professional artists, photographers, and other visual content creators use object relighting to establish their photo’s desired effect. Unfortunately, manual tools that allow relighting have a steep learning curve and are difficult to master; Although generative editing methods now enable some forms of image editing, relighting is still beyond today’s capabilities; existing methods struggle to keep other aspects of the image—colors, shapes, and textures—consistent after the edit. We propose Lasagna, a method that enables intuitive text-guided relighting control. Lasagna learns a lighting prior by using score distillation sampling to distill the prior of a diffusion model, which has been finetuned on synthetic relighting data. To train Lasagna, we curate a new synthetic dataset ReliT, which contains 3D object assets re-lit from multiple light source locations. Despite training on synthetic images, quantitative results show that Lasagna relights real-world images while preserving other aspects of the input image, outperforming state-of-the-art text-guided image editing methods. Lasagna enables realistic and controlled results on natural images and digital art pieces and is preferred by humans over other methods in over 91% of cases. Finally, we demonstrate the versatility of our learning objective by extending it to allow colorization, another form of image editing. The code for Lasagna can be found at https://github.com/dbash/lasagna. “A photo of {x} with {direction} lighting” Lasagna ControlNet InstructPix2Pix “Add dramatic light from top left” Lasagna Lasagna: Layered Score Distillation for Disentangled Object Relighting Figure 1. Given a single input image (top row) and a text prompt specifying a lighting condition (e.g. light pointing from the left or the right) Lasagna performs geometry-aware relighting of images of various levels of realism, from natural photos to minimalist digital art, and allows text-guided light conditioning (fourth and fifth rows). State-of-the-art InstructPix2Pix [7] (second row), given the prompt that works best in our experiments, struggles to perform realistic relighting, while ControlNet [49] (third row) trained on relighting data often alters crucial aspects of the image. 1. Introduction Professional visual artists spend hours editing their photos. Editing requires a wealth of knowledge about the 3D scene: the geometry of objects, their position, and how the direction of the light source affects their appearance [5, 17]. Manual editing tools like Photoshop [1] and Procreate [22] can be tedious and time-consuming for novices and professionals alike. While specialized methods for relighting and shading exist [21, 48, 50], they require supervised training to estimate object intrinsics and therefore lack generalization. 1 Boston University 2 Georgetown University Recent diffusion-based editing methods [7, 19, 26] promise to offer a more user-friendly editing experience through language interactions and generalize to a variety 3 University of Washington 4 Adobe Reaearch 5 Facebook AI Research 1" 2312.00836v1,"Heteroscedastic Uncertainty Estimation for Probabilistic Unsupervised Registration of Noisy Medical Images Xiaoran Zhang * Yale University Daniel H. Pak * Yale University Shawn S. Ahn Yale University xiaoran.zhang@yale.edu daniel.pak@yale.edu shawn.ahn@yale.edu Xiaoxiao Li University of British Columbia Chenyu You Yale University Lawrence Staib Yale University xiaoxiao.li@ece.ubc.ca chenyu.you@yale.edu lawrence.staib@yale.edu Albert J. Sinusas Yale University Alex Wong Yale Vision Lab James S. Duncan Yale University albert.sinusas@yale.edu alex.wong@yale.edu james.duncan@yale.edu 1. Introduction Abstract Deformable image registration aims to learn a dense pixelwise displacement map that shows the alignment between the moving and the fixed image. It is often a crucial step in medical image analysis that can help with screening disease progression and providing surgical guidance [12, 24]. Due to the practical difficulty of obtaining ground truth displacement, a number of classical methods propose iterative pair-wise optimization schemes using elastic-type models [10, 18], free-form deformation with b-splines [28], and diffeomorphic models [1, 2]. However, such methods are computationally expensive and impractical when facing large-scale real-world data. This paper proposes a heteroscedastic uncertainty estimation framework for unsupervised medical image registration. Existing methods rely on objectives (e.g. mean-squared error) that assume a uniform noise level across the image, disregarding the heteroscedastic and input-dependent characteristics of noise distribution in real-world medical images. This further introduces noisy gradients due to undesired penalization on outliers, causing unnatural deformation and performance degradation. To mitigate this, we propose an adaptive weighting scheme with a relative γ-exponentiated signal-to-noise ratio (SNR) for the displacement estimator after modeling the heteroscedastic noise using a separate variance estimator to prevent the model from being driven away by spurious gradients from error residuals, leading to more accurate displacement estimation. To illustrate the versatility and effectiveness of the proposed method, we tested our framework on two representative registration architectures across three medical image datasets. Our proposed framework consistently outperforms other baselines both quantitatively and qualitatively while also providing accurate and sensible uncertainty measures. Paired t-tests show that our improvements in registration accuracy are statistically significant. The code will be publicly available at https://voldemort108x.github.io/hetero_ uncertainty/. With the recent advances in deep learning, a number of works formulate the problem in an unsupervised way by training a neural network to predict displacements between input image pairs without ground truth [4, 7, 8, 13, 16, 30, 37]. Such frameworks commonly utilize an unsupervised objective by minimizing the mean-square error (MSE) between the moved image (warped from the moving image using estimated displacement) and the fixed image. By using this objective, the existing frameworks assume additive white homoscedastic (uniform) Gaussian noise, i.e. ϵ ∼ N (0, σ 2 ) with a constant noise variance across the image space. However, this assumption is especially problematic for medical images, where the noise is known to be often intrinsically heteroscedastic and input-dependent (e.g. MRI [11, 33] or ultrasound [23, 25, 31, 36]). The noise variance σ I 2 (x) usually fluctuates non-uniformly across the image space as shown in Fig. 1 due to complicated factors such as changes in anatomical structures or patient motion during image ac- * Equal contribution 1" 2312.00837v1,"An Adaptive Correspondence Scoring Framework for Unsupervised Image Registration of Medical Images Xiaoran Zhang Yale University John C. Stendahl Yale University Lawrence Staib Yale University xiaoran.zhang@yale.edu john.stendahl@yale.edu lawrence.staib@yale.edu Albert J. Sinusas Yale University Alex Wong Yale Vision Lab James S. Duncan Yale University albert.sinusas@yale.edu alex.wong@yale.edu james.duncan@yale.edu Abstract obtaining ground truth displacement, it has been a longstanding problem and is extensively studied in the past decades [1, 4, 7, 20, 21, 28, 34]. Classical methods approach this challenge by solving an iterative pair-wise optimization problem between source and target images using elastic-type models [10, 21], free-form deformations with b-splines [28], and topology-preserving diffeomorphic models [1, 2]. However, these approaches are computationally expensive and time-consuming, limiting their practical utility in large-scale real-world data. Recently, learning-based approaches have been extensively studied to address this challenge with state-of-the-art performance [4, 7, 8, 20, 30, 34]. These approaches formulate displacement estimation as a generative modeling process from query source-target pair and operate under an unsupervised setting or a weakly supervised setting with segmentation masks due to the lack of ground truth displacement. To train these approaches via gradient-based optimization, image reconstruction from a source to a target serves as a data fidelity term. The supervision signal comes from minimizing the reconstruction error between warped source and target. The feasibility in minimizing this term relies on intensity constancy between the two images during imaging, along with a regularization term based on the assumption that the object imaged is locally smooth and connected. However, assuming such intensity constancy uniformly across the entire image domain neglects the fact of motion ambiguity and non-uniform noise corruption in medical images. Assuming sufficiently exciting local regions, only a subset of pixels of one image can be uniquely matched or corresponded to another based on the image intensity profiles. As shown in Fig. 1, despite a displacement estimator model predicting largely correct corresponding pixels between the two images, the error residuals between the warped source and target images are still non-zero. In fact, they are dominated by regions with no correspondence; when We propose an adaptive training scheme for unsupervised medical image registration. Existing methods rely on image reconstruction as the primary supervision signal. However, nuisance variables (e.g. noise and covisibility) often cause the loss of correspondence between medical images, violating the Lambertian assumption in physical waves (e.g. ultrasound) and consistent imaging acquisition. As the unsupervised learning scheme relies on intensity constancy to establish correspondence between images for reconstruction, this introduces spurious error residuals that are not modeled by the typical training objective. To mitigate this, we propose an adaptive framework that reweights the error residuals with a correspondence scoring map during training, preventing the parametric displacement estimator from drifting away due to noisy gradients, which leads to performance degradations. To illustrate the versatility and effectiveness of our method, we tested our framework on three representative registration architectures across three medical image datasets along with other baselines. Our proposed adaptive framework consistently outperforms other methods both quantitatively and qualitatively. Paired t-tests show that our improvements are statistically significant. The code will be publicly available at https://voldemort108x.github.io/AdaCS/. 1. Introduction Deformable medical image registration aims to accurately determine non-rigid correspondences through dense displacement vectors between a source image and a target image. This process is a crucial step for medical image analysis, such as tracking disease progression for diagnosis and treatment [12, 26]. Due to the impracticality of 1" 2312.00846v1,"NeuSG: Neural Implicit Surface Reconstruction with 3D Gaussian Splatting Guidance Hanlin Chen Chen Li Gim Hee Lee Department of Computer Science, National University of Singapore {hanlin.chen, gimhee.lee}@comp.nus.edu.sg Abstract |𝐧 "" ! ∇𝑓(𝐩)|=1 Existing neural implicit surface reconstruction methods have achieved impressive performance in multi-view 3D reconstruction by leveraging explicit geometry priors such as depth maps or point clouds as regularization. However, the reconstruction results still lack fine details because of the over-smoothed depth map or sparse point cloud. In this work, we propose a neural implicit surface reconstruction pipeline with guidance from 3D Gaussian Splatting to recover highly detailed surfaces. The advantage of 3D Gaussian Splatting is that it can generate dense point clouds with detailed structure. Nonetheless, a naive adoption of 3D Gaussian Splatting can fail since the generated points are the centers of 3D Gaussians that do not necessarily lie on the surface. We thus introduce a scale regularizer to pull the centers close to the surface by enforcing the 3D Gaussians to be extremely thin. Moreover, we propose to refine the point cloud from 3D Gaussians Splatting with the normal priors from the surface predicted by neural implicit models instead of using a fixed set of points as guidance. Consequently, the quality of surface reconstruction improves from the guidance of the more accurate 3D Gaussian splatting. By jointly optimizing the 3D Gaussian Splatting and the neural implicit model, our approach benefits from both representations and generates complete surfaces with intricate details. Experiments on Tanks and Temples verify the effectiveness of our proposed method. 3D Reconstruction 𝑓 𝑝 =0 Gaussian Splatting Figure 1. An illustration of joint optimization of implicit surface reconstruction and 3D Gaussian Splatting. non-Lambertian properties. These methods use multi-layer perceptrons (MLP) or hash encoding [29] to assign geometrical properties such as density [28], occupancy [30], or the signed distance to the nearest surface point [23, 47, 49] to spatial coordinates. The application of signed distance functions (SDF) in neural surface reconstruction is particularly noteworthy. It involves the use of an SDF-induced density function, allowing for volume rendering to learn an implicit SDF representation. While current neural implicit-based methods using rendering supervision alone yield impressive results for simple scenes, they face challenges with larger scenes, especially those containing extensive textureless areas [9, 57, 60]. Previous works have attempted to address this by integrating structural priors into the optimization process, such as depth prior [31], normal regularization [57], point clouds regularization [9, 60], surface smoothness [32, 62], or semantic regularization [12, 16]. While these methods succeed in generating complete surface reconstructions, they often result in over-smoothed surfaces lacking in fine details. Particularly, works such as those by [9, 60] leverage sparse or dense point clouds from MVS to improve the fidelity of surface reconstruction. Nevertheless, point clouds predicted from MVS are uniformly distributed and sometimes incomplete and hence fails to provide geometry prior for some regions, especially regions with in- 1. Introduction Surface reconstruction from multiple calibrated views is a fundamental task in 3D computer vision. The conventional approach involves estimating a point cloud from images through multi-view stereo (MVS) techniques [4, 7, 21, 39, 40], followed by the extraction of a triangular mesh from the point cloud [17, 26]. More recently, neural implicit surface reconstruction has emerged as a competitive alternative, particularly effective for surfaces with limited texture and 1" 2312.00852v1,"Beyond First-Order Tweedie: Solving Inverse Problems using Latent Diffusion Litu Rout 1,2,∗ , Yujia Chen 1 , Abhishek Kumar 3 , Constantine Caramanis 2 , Sanjay Shakkottai 2 , Wen-Sheng Chu 1 1 Google Research, 2 UT Austin, 3 Google DeepMind {litu.rout,constantine,sanjay.shakkottai}@utexas.edu {yujiachen,abhishk,wschu}@google.com Figure 1. Image inversion and editing with latent diffusion: Our method, termed STSL, provides efficient inversion while enhancing quality of reconstructed images, even when addressing corruptions (e.g., blurriness, low resolution, noise). We show its versatility in various inversion tasks (left figure): motion deblurring, super-resolution, gaussian deblurring, and inpainting. In addition, STSL extends to text-guided image editing with corrupted images (right), surpassing the performance of NTI [34], a prominent method in this domain. Abstract is the first work to offer an efficient second-order approximation in solving inverse problems using latent diffusion and editing real-world images with corruptions. Sampling from the posterior distribution poses a major computational challenge in solving inverse problems using latent diffusion models. Common methods rely on Tweedie’s first-order moments, which are known to induce a qualitylimiting bias [31]. Existing second-order approximations are impractical due to prohibitive computational costs, making standard reverse diffusion processes intractable for posterior sampling. This paper introduces Second-order Tweedie sampler from Surrogate Loss (STSL), a novel sampler that offers efficiency comparable to first-order Tweedie with a tractable reverse process using second-order approximation. Our theoretical results reveal that the secondorder approximation is lower bounded by our surrogate loss that only requires O(1) compute using the trace of the Hessian, and by the lower bound we derive a new drift term to make the reverse process tractable. Our method surpasses SoTA solvers PSLD [42] and P2L [10], achieving 4X and 8X reduction in neural function evaluations, respectively, while notably enhancing sampling quality on FFHQ, ImageNet, and COCO benchmarks. In addition, we show STSL extends to text-guided image editing and addresses residual distortions present from corrupted images in leading textguided image editing methods. To our best knowledge, this 1. Introduction This paper focuses on solving inverse problems using pretrained latent diffusion models. The goal of inverse problem solvers is to find an image  x ∈ R d that satisfies y = Ax + n, n ∼ N 0, σ y 2 I d 1 , where A ∈ R k×d is a measurement operator and y ∈ R k is a noisy observation. This gives rise to a sampling challenge, where the objective is to sample the posterior p(X|Y = y). Diffusion models are gaining popularity as priors (p t (X t )) for solving inverse problems [7, 8, 10, 42, 48]. However, the likelihood term (p t (y|X t )) is only available for t = 0, but not for t > 0, making posterior sampling inconsistent with the Bayesian posterior. One way to address this issue is training a noise conditional likelihood model, yet this is limited by training costs and the need for re-training 1 Notations. Bold capital letter X, bold small letter x, normal capital letter X, and normal small letter x denote a matrix, a vector, a vectorvalued random variable, and a scalar respectively. The dimension of the identity matrix I should be apparent from the context. ∗ This work was done during an internship at Google. 1" 2312.00892v1,"Black-Litterman Portfolio Optimization with Noisy Intermediate-Scale Quantum Computers Chi-Chun Chen 1,2,3,* , San-Lin Chung 4,5 , and Hsi-Sheng Goan 1,3,6,† 1 Department of Physics, National Taiwan University, Taipei 106319, Taiwan 2 MediaTek, Hsinchu 30078, Taiwan 3 Physics Division, National Center for Theoretical Sciences, Taipei 106319, Taiwan 4 Department of Finance, National Taiwan University, Taipei 106319, Taiwan 5 Department of Digital Financial Technology, Chang Gung University, Taoyuan City 33302, Taiwan 6 Center for Quantum Science and Engineering, National Taiwan University, Taipei 106319, Taiwan Abstract— In this work, we demonstrate a practical application of noisy intermediate-scale quantum (NISQ) algorithms to enhance subroutines in the Black-Litterman (BL) portfolio optimization model. As a proof of concept, we implement a 12-qubit example for selecting 6 assets out of a 12-asset pool. Our approach involves predicting investor views with quantum machine learning (QML) and addressing the subsequent optimization problem using the variational quantum eigensolver (VQE). The solutions obtained from VQE exhibit a high approximation ratio behavior, and consistently outperform several common portfolio models in backtesting over a long period of time. A unique aspect of our VQE scheme is that after the quantum circuit is optimized, only a minimal number of samplings is required to give a high approximation ratio result since the probability distribution should be concentrated on high-quality solutions. We further emphasize the importance of employing only a small number of final samplings in our scheme by comparing the cost with those obtained from an exhaustive search and random sampling. The power of quantum computing can be anticipated when dealing with a larger-size problem due to the linear growth of the required qubit resources with the problem size. This is in contrast to classical computing where the search space grows exponentially with the problem size and would quickly reach the limit of classical computers. Index Terms— Quantum computing, Quantum machine learning, Variational quantum eigensolver, Portfolio optimization, Black-Litterman problems, exploration of quantum computing as a potential solution[3], [4], [5] is prompted. Recently, quantum computers with larger scale and better fidelity have came into existence. Several studies have shown potential capability for hybrid quantum-classical methods, which is a strong candidate for application of NISQ computers, to solve portfolio optimization. The most well known model for portfolio optimization is the modern portfolio theory (MPT) model, introduced in 1952 by Harry Markowitz[1]. MPT is also called the mean-variance model since it quantifies return and risk as mean and (co)variance of daily return, respectively. For a total N assets pool, a portfolio is represented by a vector x ∈ {0, 1} N , where 1/0 denotes buying/not buying an asset. The return of a portfolio can be written as µx, where µ is the return vector that represents the expectation value of returns of each asset based on historical mean. On the other hand, risk is defined as the covariance of daily returns, and can be written as x T Σx, where Σ is the covariance matrix of the returns. The goal is to maximizes the return while minimizing the risk, and it can be achieved by minimizing the quadratic function I. INTRODUCTION γ is the risk aversion coefficient that specifies the importance between minimizing risk and maximizing return. B is the budget constraint that indicates the total number of asset one should buy, and can be implement by adding a penalty term to the objective function, i.e. γ T x Σx − µ T x, 2 Portfolio optimization is a combinatorial optimization (CO) problem in finance that seeks to identify a set of assets from a pool to maximize returns while minimizing risk[1], [2]. For a continuous capital allocation case, this problem boils down to inversion of a positive semidefinite matrix (the covariance matrix), and is solvable in polynomial time. However, for a discrete case (i.e. the capital is divided into blocks), this problem becomes a combinatorial optimization (CO) problem, whose search space grows exponentially with problem size, and belongs to category of NP-hard in complexity theory. Since efficient classical algorithms are lacking for this type of sub j ec t to 1 T x = B. γ T x Σx − µ T x − λ(1 T x − B ) 2 . 2 (1) (2) The problem is thus a quadratic unconstrained binary optimization (QUBO). Several studies in the realm of quantum computing have focused on solving discrete portfolio optimization with MPT using VQEs[6], [7], and quantum annealing (QA)[4]. However, despite making significant contributions to the framework of quantifying return and risk for mathematically optimizing the portfolio, MPT has shown limitations in practical cases. The MPT solution * r08222060@ntu.edu.tw † goan@phys.ntu.edu.tw 1" 2312.00894v1,"Leveraging Large Language Models to Improve REST API Testing Myeongsoo Kim Tyler Stennett Dhruv Shah Georgia Institute of Technology Atlanta, Georgia, USA mkim754@gatech.edu Georgia Institute of Technology Atlanta, Georgia, USA tstennett3@gatech.edu Georgia Institute of Technology Atlanta, Georgia, USA dshah374@gatech.edu Saurabh Sinha Alessandro Orso IBM Research Yorktown Heights, New York, USA sinhas@us.ibm.com Georgia Institute of Technology Atlanta, Georgia, USA orso@cc.gatech.edu ABSTRACT The widespread adoption of REST APIs, coupled with their growing complexity and size, has led to the need for automated REST API testing tools. Current testing tools focus on the structured data in REST API specifications but often neglect valuable insights available in unstructured natural-language descriptions in the specifications, which leads to suboptimal test coverage. Recently, to address this gap, researchers have developed techniques that extract rules from these human-readable descriptions and query knowledge bases to derive meaningful input values. However, these techniques are limited in the types of rules they can extract and can produce inaccurate results. This paper presents RESTGPT, an innovative approach that leverages the power and intrinsic context-awareness of Large Language Models (LLMs) to improve REST API testing. RESTGPT takes as input an API specification, extracts machine-interpretable rules, and generates example parameter values from natural-language descriptions in the specification. It then augments the original specification with these rules and values. Our preliminary evaluation suggests that RESTGPT outperforms existing techniques in both rule extraction and value generation. Given these encouraging results, we outline future research directions for leveraging LLMs more broadly for improving REST API testing. CCS CONCEPTS • Information systems → RESTful web services; • Software and its engineering → Software testing and debugging. KEYWORDS Large Language Models for Testing, OpenAPI Specification Analysis 1 INTRODUCTION In today’s digital era, web applications and cloud-based systems have become ubiquitous, making REpresentational State Transfer (REST) Application Programming Interfaces (APIs) pivotal elements in software development [30]. REST APIs enable disparate systems to communicate and exchange data seamlessly, facilitating the integration of a wide range of services and functionalities [11]. As their intricacy and prevalence grow, ensuring the reliability and robustness of these APIs becomes more important. Consequently, effective testing of REST APIs has emerged as a pressing challenge for the software-engineering community [12, 18]. Automated REST API testing tools [4, 6, 9, 14–16, 20, 36] primarily derive test cases from API specifications [2, 21, 24, 32]. Their struggle to achieve high code coverage [18, 37] often stems from difficulties in comprehending the semantics and constraints present in parameter names and descriptions [1, 17, 18]. To address these issues, assistant tools have been developed. These tools leverage Natural Language Processing (NLP) to extract constraints from parameter descriptions [17] and query parameter names against databases [1], such as DBPedia [7]. However, attaining high accuracy remains a significant challenge for these tools. Moreover, they are limited in the types and complexity of rules they can extract. This paper introduces RESTGPT, a novel approach that harnesses Large Language Models (LLMs) to enhance REST API specifications by identifying constraints and generating relevant parameter values. Given an OpenAPI Specification [24], 1 RESTGPT augments it with derived constraints and example values. Existing approaches such as NLP2REST [17] require a validation process due to its low precision, which involves not just the extraction of constraints but also executing requests against the APIs to dynamically check if these constraints yield successful responses. Such a process demands significant engineering effort and a deployed service instance, making it cumbersome and resource-intensive. In contrast, RESTGPT achieves higher accuracy without requiring expensive validation. Furthermore, unlike ARTE [1], RESTGPT excels in understanding the context of a parameter name, generating more contextually relevant values by analyzing the parameter description. Our preliminary results demonstrate the significant advantage of our approach over existing solutions. Compared to NLP2REST without the validation module, our method improves precision from 50% to 97%. Even when compared to NLP2REST equipped with its validation module, our approach still increases precision from 79% to 97%. Additionally, RESTGPT successfully generates both syntactically and semantically valid inputs for 73% of the parameters over the analyzed services and their operations, a marked improvement over ARTE, which could generate valid inputs for 17% of the parameters only. These findings demonstrate the effectiveness of RESTGPT and highlight the potential of leveraging LLMs for improving REST API testing. To facilitate reproducibility and further exploration, all our code, data, and results are made available in our artifact repository [5]. Given these encouraging results, we outline a number of research directions for leveraging LLMs in other ways for further enhancing REST API testing. These include detecting other types of failures than those that manifest as 500 responses and generating 1 OpenAPI specification is the most popular REST API specification language; other specification languages include RAML [21] and API Blueprint [2]." 2312.00897v1,"A Physical Survey of Meteoroid Streams: Comparing Cometary Reservoirs N. Buccongello a,b , P. G. Brown a,b , D. Vida a,b , A. Pinhas c a Department of Physics and Astronomy, University of Western Ontario, London, Ontario, N6A 3K7, Canada b Western Institute for Earth and Space Exploration, University of Western Ontario, London, Ontario, N6A 5B7, Canada c Columbus Technologies and Services Inc. & Jacobs Space Exploration Group, NASA Marshall Space Flight Center, Huntsville, Alabama, 35812, USA Abstract In this work, we present an optical survey of mm-sized meteoroids using the Canadian Automated Meteor Observatory’s (CAMO) mirror tracking system. The system tracks meteors to magnitude +7.5 through an image-intensified telescopic system which has a spatial accuracy of ∼1 m and a temporal resolution of 10 ms. We analyze 41 meteors from 13 showers with known parent bodies, recorded between 2016 and 2022. We fit a numerical ablation and fragmentation model to our data which models meteoroid fragmentation as erosion into 10 µm to 500 µm constituent grains and uses the observed wake as a hard constraint on the model parameters. We measure average bulk meteoroid densities which are consistent with in situ measurements: 602 ± 155 kg m −3 for Jupiter-family and 345 ± 48 kg m −3 for Halley-type showers. The Geminids had the highest measured bulk density of 1387 ± 240 kg m −3 , consistent with carbonaceous material. We fail to reproduce the high bulk density (>3000 kg m −3 ) for Jupiter-family meteoroids previously reported in the literature derived using fragmentation models on data sets with fewer observational constraints. We also provide estimates of the meteoroid grain sizes, grain mass distributions, and energy necessary to trigger the erosion for meteoroids in the analyzed showers. 1. Introduction Comets are among the most pristine bodies in our solar system and their wellpreserved primordial nuclei are direct windows as to how the earliest solar system solids formed (Blum et al., 2022). They also may have played a role in water delivery and the subsequent rise of life on Earth (Thomas et al., 2007). Meteoroids, dust particles released from comets, are also proxies for the physical properties of their parent bodies. Thus, inferring the properties of cometary meteoroids permits a deeper understanding of cometary nuclei, and indirectly, the agglomeration processes that operated Email address: nbuccong@uwo.ca (N. Buccongello) Preprint submitted to Elsevier December 5, 2023" 2312.00902v1,"Lennard Jones Token: a blockchain solution to scientific data curation Brian H. Lee and Alejandro Strachan a) 1 Author affiliations School of Materials Engineering and Birck Nanotechnology Center, Purdue University, West Lafayette, Indiana 47907, USA a) Author email Author to whom correspondence should be addressed: strachan@purdue.edu Abstract Data science and artificial intelligence have become an indispensable part of scientific research. While such methods rely on high-quality and large quantities of machine-readable scientific data, the current scientific data infrastructure faces significant challenges that limit effective data curation and sharing. These challenges include insufficient return on investment for researchers to share quality data, logistical difficulties in maintaining long-term data repositories, and the absence of standardized methods for evaluating the relative importance of various datasets. To address these issues, this paper presents the Lennard Jones Token, a blockchain-based proof- of-concept solution implemented on the Ethereum network. The token system incentivizes users to submit optimized structures of Lennard Jones particles by offering token rewards, while also charging for access to these valuable structures. Utilizing smart contracts, the system automates the evaluation of submitted data, ensuring that only structures with energies lower than those in the existing database for a given cluster size are rewarded. The paper explores the details of the Lennard Jones Token as a proof of concept and proposes future blockchain-based tokens aimed at enhancing the curation and sharing of scientific data. 1" 2312.00918v1,"PACE: A Program Analysis Framework for Continuous Performance Prediction CHIDERA BIRINGA, University of Massachusetts Dartmouth, USA GÖKHAN KUL, University of Massachusetts Dartmouth, USA Software development teams establish elaborate continuous integration pipelines containing automated test cases to accelerate the development process of software. Automated tests help to verify the correctness of code modifications decreasing the response time to changing requirements. However, when the software teams do not track the performance impact of pending modifications, they may need to spend considerable time refactoring existing code. This paper presents PACE, a program analysis framework that provides continuous feedback on the performance impact of pending code updates. We design performance microbenchmarks by mapping the execution time of functional test cases given a code update. We map microbenchmarks to code stylometry features and feed them to predictors for performance predictions. Our experiments achieved significant performance in predicting code performance, outperforming current state-of-the-art by 75% on neural-represented code stylometry features. CCS Concepts: • Software Performance Prediction → Current Code State; • Feature Engineering → Code Stylometry Features; • Automated Testing → Microbenchmarking; • Machine Learning → Regression. ACM Reference Format: Chidera Biringa and Gökhan Kul. 2023. PACE: A Program Analysis Framework for Continuous Performance Prediction. 1, 1 (December 2023), 23 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Software development teams often adopt agile practices and implement automated testing and integration architecture to ensure that implemented software requirements work as anticipated. However, this approach often excludes the performance implications of specific methods and their aptitude to increase the overall software execution time. If ignored, the quality of user interaction with software functionalities may diminish due to poor performance, especially when automated test scripts do not maintain a record of adjustments made to software features, making it strenuous to identify the changes that cause performance issues. We polled 34 software developers working at 28 organizations, varying from software companies to federal agencies with in-house software development units. Twenty-nine developers reported that their software development environments run on continuous integration (CI) pipelines. CI [38] is a process in agile software development to automatically test, verify, and integrate local software updates to the remote or production version of the software. Pipelines facilitate continuous integration by serializing algorithms and methods to achieve the objective of continually merging local changes to the primary software. 100% of these CI pipelines in the poll utilize automated tests. However, some software tests to measure performance are not easy to automate, straining Authors’ addresses: Chidera Biringa, cbiringa@umassd.edu, University of Massachusetts Dartmouth, 285 Old Westport Rd, North Dartmouth, MA, Dartmouth, Massachusetts, USA, 02747; Gökhan Kul, gkul@umassd.edu, University of Massachusetts Dartmouth, 285 Old Westport Rd, North Dartmouth, MA, Dartmouth, Massachusetts, USA, 02747. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. XXXX-XXXX/2023/12-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: December 2023." 2312.00919v1,"Rethinking Skip Connections in Spiking Neural Networks with Time-To-First-Spike Coding Youngeun Kim 1* , Adar Kahana 2 , Ruokai Yin 1 , Yuhang Li 1 , Panos Stinis 2,3 , George Em Karniadakis 2,3 , Priyadarshini Panda 1 1* Department of Electrical Engineering, Yale University, New Haven, CT, United States. 2 Division of Applied Mathematics, Brown University, Providence, RI, United States. 3 Advanced Computing, Mathematics and Data Division, Pacific Northwest National Laboratory, Richland, WA, United States. *Corresponding author(s). E-mail(s): youngeun.kim@yale.edu; Contributing authors: adar kahana@brown.edu; ruokai.yin@yale.edu; yuhang.li@yale.edu; panagiotis.stinis@pnnl.gov; george karniadakis@brown.edu; priya.panda@yale.edu; Abstract Time-To-First-Spike (TTFS) coding in Spiking Neural Networks (SNNs) offers significant advantages in terms of energy efficiency, closely mimicking the behavior of biological neurons. In this work, we delve into the role of skip connections, a widely used concept in Artificial Neural Networks (ANNs), within the domain of SNNs with TTFS coding. Our focus is on two distinct types of skip connection architectures: (1) addition-based skip connections, and (2) concatenation-based skip connections. We find that addition-based skip connections introduce an additional delay in terms of spike timing. On the other hand, concatenation-based skip connections circumvent this delay but produce time gaps between afterconvolution and skip connection paths, thereby restricting the effective mixing of information from these two paths. To mitigate these issues, we propose a novel approach involving a learnable delay for skip connections in the concatenationbased skip connection architecture. This approach successfully bridges the time gap between the convolutional and skip branches, facilitating improved information mixing. We conduct experiments on public datasets including MNIST and Fashion-MNIST, illustrating the advantage of the skip connection in TTFS coding architectures. Additionally, we demonstrate the applicability of TTFS coding 1" 2312.00929v1,"Assessment of the Flamelet Generated Manifold method with preferential diffusion modelling for the prediction of partially premixed hydrogen flames E. J. Pérez-Sánchez ∗ , E. M. Fortes, D. Mira Barcelona Supercomputing Center (BSC), Plaza Eusebi Güell 1-3, 08034, Barcelona, Spain Abstract This study presents a systematic analysis of the capabilities of a flamelet model based on Flamelet Generated Manifolds (FGM) to reproduce preferential diffusion effects in partially premixed hydrogen flames. Detailed transport effects are accounted for by including a mixture-averaged transport model when building the flamelet database. This approach adds new terms to the transport equations of the controlling variables in the form of diffusive fluxes where the coefficients can be computed from the information contained in the manifold and saved in the flamelet database. The manifold is constructed from the solution of a set of premixed unstretched adiabatic one-dimensional flames with mixture-averaged transport for a range of mixture fraction within the flammability range. Special attention is given to the numerical aspects related to the construction of the chemical manifold to reduce the numerical error in evaluating the new terms derived from the preferential diffusion of certain species. Finally, a systematic application of the method to simulate laminar hydrogen flames in various canonical configurations is presented from premixed to stratified flames, including the case of a triple flames with different mixing lengths. The results demonstrate that the method describes accurately the flame structure and propagation velocities at a low cost, showing a remarkable agreement with the detailed chemistry solutions for flame structure and propagation velocity. Keywords: Hydrogen, Flamelet Generated Manifold, preferential diffusion, stratified flames 1. Introduction The need of designing clean and green combustion systems with net zero CO 2 -emissions has impelled the research in hydrogen combustion due to its high mass energy content, absence of carbon-derived pollutants emissions like soot and potentially low NOx formation when operated in lean conditions. However, the high flame speed together with its relative low density energy along with effect of preferential diffusion can lead to a variety of phenomena, including thermoacoustics and thermodiffusive instabilities, that can have a direct impact on the engine design and operation. Preferential diffusion introduces a set of topological changes in the flame that affect both its morphology and dynamics, and whose understanding has been a target for the scientific community ∗ Corresponding author Email address: eduardo.perez@bsc.es (E. J. Pérez-Sánchez) Preprint submitted to Combustion and Flame December 5, 2023" 2312.00932v1,"Boltzmann’s casino and the unbridgeable chasm in emergence of life research Elbert Branscomb * Affiliate faculty, Institute for Genomic Biology, UIUC, Champaign-Urbana USA * brnscmb@illinois.edu Current Address: 6269 Lariat Loop NE, Bainbridge Island, WA 98110; USA ORCID 0000-0002-7194-4231 Abstract Notwithstanding its long history and compelling motivation, research seeking to explicate the emergence life (EoL) has throughout been a cacophony of unresolved speculation and dispute; absent still any clear convergence or other inarguable evidence of progress. This notwithstanding that it has also produced a rich and varied supply of putatively promising technical advances. Not surprising then the effort being advanced by some to establish a shared basis in fundamental assumptions upon which a more productive community research effort might arise. In this essay however, I press a case in opposition. First, that a chasm divides the rich fauna of contesting EoL models into two conceptually incommensurate classes; here named “chemistry models” (to which class belongs nearly all thinking and work in the field, past and present) and “engine models” (advanced in various more-or-less partial forms by a marginal minority of voices dating from Boltzmann forward). Second, that contemporary non-equilibrium thermodynamics dictates that ‘engine-less’ (i.e. ’chemistry’) models cannot in principle generate non-equilibrium, organized states of matter and are in consequence inherently incapable of prizing life out of inanimate matter. 1 Introduction: Boltzmann’s order-disorder principle, and the ’cascade economics’ of building organized states of matter A central premise of this paper is that the matter comprising a living system is necessarily in a particular type of extremely organized, far-from-equilibrium thermodynamic state. A circumstance which presents not just a central challenge to comprehending life in general, but one that cannot be validly avoided in speculations as to how ’living forms of matter’ could have arisen in the first place. The path to addressing that challenge was opened by Boltzmann through his introduction into thermodynamic theory of ”state probability”; and with it the insight that ’ordering’ or ’organizing’ a body of matter, is no less an act of thermodynamic work than any contemplated in classical thermodynamics. Organizing matter, Boltzmann saw, is putting it in a relatively ’improbable’ state and is in consequence per se thermodynamically costly; increasingly so the more organized the matter is. But conventional thinking on the problem of abiogenesis (not to mention that in the rest of 1/68" 2312.00936v1,"SURFACE COIL INTENSITY CORRECTION FOR MRI Xuan Lei, Philip Schniter, Chong Chen, and Rizwan Ahmad The Ohio State University ABSTRACT Modern MRI scanners utilize one or more arrays of small receive-only coils to collect k-space data. The sensitivity maps of the coils, when estimated using traditional methods, differ from the true sensitivity maps, which are generally unknown. Consequently, the reconstructed MR images exhibit undesired spatial variation in intensity. These intensity variations can be at least partially corrected using pre-scan data. In this work, we propose an intensity correction method that utilizes pre-scan data. For demonstration, we apply our method to a digital phantom, as well as to cardiac MRI data collected from a commercial scanner by Siemens Healthineers. The code is available at https://github.com/OSU-MR/SCC. the tissue closer to the received coils. Post-processing methods based on filtering or histogram manipulation have been proposed to suppress intensity variation but have not been widely adopted [2, 3]. Although modern commercial scanners utilize data from pre-scans to partially correct the intensity variation, these corrections are not typically employed in research settings. This leads to mismatch between clinical and research imaging results. This work presents an opensource implementation for a Surface Coil intensity Correction method (SCC) for data collected on Siemens scanners. 2. METHODS 2.1. Problem formulation Index Terms— MRI, brightness correction, surface coil 1. INTRODUCTION MRI is a well-established noninvasive diagnostic tool. To meet the demands of shorter scan times, finer resolution, and higher signal-to-noise ratio, MRI hardware as well as data collection and processing methods have evolved rapidly in the last three decades. In particular, MRI scanners now use arrays of receive-only surface coils for signal detection. The k-space data are collected simultaneously across all receive coils, facilitating higher k-space undersampling and thus shorter scan times. However, the sensitivity maps of the receive coils are spatially varying and generally not known in advance. The commonly used methods to find sensitivity maps from the kspace data do not yield true sensitivity maps but estimates in which the voxel-wise square-root of the sum-of-squares of the coil sensitivity maps equals one. Although this constraint allows estimating a unique set of sensitivity maps, the resulting estimated maps are spatially modulated relative to the true maps. When these imperfect sensitivity-map estimates are used in any SENSE-based reconstruction method [1], the reconstructed images also exhibit spatially varying intensity, leading to incorrect contrast and overly bright and dark regions. This can be specifically problematic for thoracic and abdominal imaging in larger patients because the central area of the body can appear excessively dark compared to Corresponding author: Rizwan Ahmad (ahmad.46@osu.edu). In MRI, the data are collected in the spatial frequency domain, called k-space, simultaneously from K ≥ 1 receive coils. The data measured from the k th receive coil is modeled as y (k) = P S (k) } x + η (k) , | F {z (1) ≜ A (k) where y ∈ C is measured k-space data, x ∈ C N is a vectorized 2D or 3D image, S (k) ∈ C N ×N is a diagonal matrix representing the sensitivity map, F ∈ C N ×N is the 2D or 3D discrete Fourier transform, P is the sampling matrix, which contains M rows from an N × N identity matrix, and η (k) ∈ C M is additive circularly symmetric Gaussian noise with variance σ 2 . By vertically stacking y (k) , A (k) , and η (k) into y ∈ C KM , A ∈ C KM ×N , and η ∈ C KM , respectively, the data measured from all K coils can be expressed as (k) M y = Ax + η. (2) To estimate x in (2), the regularized least-square (RL) solution is a common choice, which yields 1 x RL = arg min 2 ∥Ax − y∥ 22 + R(x), (3) σ x where the regularization term R(x) encourages x RL to adhere to a prior belief about the set of true x. To construct A in (3), one must know the true sensitivity maps {S (k) } K k=1 . In practice, the true sensitivity maps are b (k) } K unknown, and so one typically uses an estimate { S k=1 produced by ESPIRiT [4], by the method of Walsh et al. [5], or by simply dividing individual coil images by the square-" 2312.00938v1,"IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, PREPRINT VERSION, 11 2023 1 WATonoBus: An All Weather Autonomous Shuttle Neel P. Bhatt , Ruihe Zhang , Minghao Ning , Ahmad Reza Alghooneh , Joseph Sun , Pouya Panahandeh , Ehsan Mohammadbagher , Ted Ecclestone , Ben MacCallum , Ehsan Hashemi , and Amir Khajepour Abstract—Autonomous vehicle all-weather operation poses significant challenges, encompassing modules from perception and decision-making to path planning and control. The complexity arises from the need to address adverse weather conditions like rain, snow, and fog across the autonomy stack. Conventional model-based and single-module approaches often lack holistic integration with upstream or downstream tasks. We tackle this problem by proposing a multi-module and modular system architecture with considerations for adverse weather across the perception level, through features such as snow covered curb detection, to decision-making and safety monitoring. Through daily weekday service on the WATonoBus platform for almost a year, we demonstrate that our proposed approach is capable of addressing adverse weather conditions and provide valuable learning from edge cases observed during operation. Index Terms—Autonomous shuttle, dependable perception, dependable localization, adverse weather, pullover and merging, system architecture. I. I NTRODUCTION utonomous shuttle bus technology has been steadily advancing in recent years [1]. The introduction of selfdriving shuttle buses that can operate along predefined routes without the need for human drivers will enable a new generation of the first- and last-mile transportation solutions. Autonomous shuttle buses have the potential to reduce traffic congestion and improve traffic efficiency. By eliminating the need for drivers to operate the vehicle, human errors are minimized and road safety will therefore increase due to the corresponding reduction in collision frequency [2]. Through collaborations among universities, government bodies, and industry partners, numerous cities have initiated pilot programs to test and deploy autonomous shuttle buses in controlled environments [3–5]. Of these, most are simply exploratory and are motivated by short-term objectives that include, for example, the collection of autonomous driving data, the evaluation of economic benefits, and the opportunity to increase public exposure to autonomous driving technology. Although autonomous shuttle buses provide many benefits in comparison to traditional transportation methods, the task of matching or exceeding the performance of a human driver under dynamic weather and lighting conditions remains a challenge. One A Manuscript received November 29, 2023. Neel P. Bhatt, Ruihe Zhang, Minghao Ning, Ahmad Reza Alghooneh, Joseph Sun, Pouya Panahandeh, Ehsan Mohammadbagher, Ted Ecclestone, Ben MacCallum and Amir Khajepour are with the Mechanical and Mechatronics Eng. Department, University of Waterloo, 200 University Ave W, Waterloo, ON N2L3G1, Canada. Ehsan Hashemi is with the Mechanical Eng. Department, University of Alberta, 9211-116 Street NW, Edmonton, AB T6G1H9, Canada. (e-mail:{npbhatt, r422zhang, minghao.ning, aralghooneh, chen.sun, pouya.panahandeh, ehsan.mbagher, ejecclestone, ben.maccallum, a.khajepour}@uwaterloo.ca, ehashemi@ualberta.ca). related safety standard has been drafted to provide qualitative guidelines for testing the performance of autonomous shuttle bus projects [6], however, the multi-seasonal autonomous shuttle bus projects are still rarely found, posing challenges on the practicability of this technology. A. Related works In December 1997, Schiphol Airport in Netherland unveiled one of the early instances of an ”automated people mover” system, known as the ParkShuttle [7]. This pivotal development laid foundation for testing autonomous driving capabilities within a public environment. Currently, numerous global companies have successfully manufactured pilot selfdriving shuttle buses for commercial purposes. These firms are Apollo, EasyMile, Navya, and Olli [8–10]. WEpod project was initiated in the Netherlands with the aim of enhancing our understanding of autonomous vehicles (AVs) [11]. Two driverless shuttles navigated through the Wageningen University campus, smoothly interacting with regular traffic while maintaining a top speed of 25 km/hr. Mcity in University of Michigan was introduced in 2018 as the first driverless shuttle testing field in the United States. One goal of Mcity project was to analyze how passengers, pedestrians, bicyclists, and other drivers interact with the shuttle and gauge consumer acceptance of the technology [12]. Another autonomous bus project in Oslo was introduced called “smarter transport in the Oslo region (STOR)” [13, 14]. However, the buses were not fully automated they could not distinguish between different objects. In the campus of Aalto University, the driverless shuttle project had operated among other traffic participants for 29 days and 365 km with 522 passengers [15]. Nevertheless, the buses were sensitive to environment dynamics. Snowflakes, heavy rain, and even flying leaves could cause emergency stops. In a comparable endeavor in Finland, two shuttles were provided in this project to cover a 1.5 km trajectory in a park with five stops, interacting with pedestrians and cyclists [16]. Passengers are interviewed to gather their perspectives regarding the utilization of autonomous shuttles [17]. Taiwanese government also examined the potential of autonomous transportation by employing 9-meter driverless buses. These buses were deployed on a designated 2.9 km route in Taichung, Taiwan’s second-largest city, where they successfully tackled tasks such as navigating an open intersection and executing multiple U-turns [18]. UNICARagil was another university-driven project supported by specialists from different enterprises [19–24]. They created an entirely new vehicle from the ground up and incorporate various enhancements to enable autonomous driving capabilities." 2312.00943v1,"Path Integral Quantization of Generalized Stueckelberg Electrodynamics: A Faddeev-Jackiw Approach L. G. Caro ID ∗ and B. M. Pimentel ID † São Paulo State University, Institute for Theoretical Physics, São Paulo, 01140-070, Brazil G. B. de Gracia ID ‡ Federal University of ABC, Center of Mathematics, Santo André, 09210-580, Brazil A. A. Nogueira ID § Federal University of Alfenas, Institute of Exact Sciences, Alfenas 37133-840, Brazil Abstract We build a setup for path integral quantization through the Faddeev-Jackiw approach, extending it to include Grassmannian degrees of freedom, to be later implemented in a model of generalized electrodynamics that involves fourth-order derivatives in the components of a massive vector field being endowed with gauge freedom, due to an additional scalar field. Namely, the generalized Stueckelberg electrodynamics. In the first instance, we work on the free case to gain some familiarity with the program and, subsequently, we add the interaction with fermionic matter fields to complete our aim. In addition to deriving the correct classical brackets for such a model, we get the full expression for the associated generating functional and its associated integration measure. Keywords: Constrained systems, Gauge invariance, Symplectic structure, Classical brackets, Path integrals, Grassmann calculus, Faddeev-Jackiw method. ∗ Electronic address: gabriel.caro@unesp.br † Electronic address: bruto.max@unesp.br ‡ Electronic address: g.gracia@ufabc.edu.br § Electronic address: anderson.nogueira@unifal-mg.edu.br" 2312.00944v1,"Enhancing Diffusion Models with 3D Perspective Geometry Constraints RISHI UPADHYAY, University of California, Los Angeles, USA HOWARD ZHANG, University of California, Los Angeles, USA YUNHAO BA, University of California, Los Angeles, USA and Sony AI, USA ETHAN YANG, University of California, Los Angeles, USA BLAKE GELLA, University of California, Los Angeles, USA SICHENG JIANG, University of California, Los Angeles, USA ALEX WONG, Yale University, USA ACHUTA KADAMBI, University of California, Los Angeles, USA (a) Stable Diffusion V2 (b) Stable Diffusion Ours (c) Depth Prompt: ""An aerial photo of the Washington Monument in the middle of a circle"" Fig. 1. Images generated with our novel geometric constraint preserve straight lines and perspective. (a) An image generated by stable diffusion v2, (b) An image generated by our fine-tuned diffusion model, and (c) the depth map and prompt both models were conditioned on. While perspective is a well-studied topic in art, it is generally taken for granted in images. However, for the recent wave of high-quality image synthesis methods such as latent diffusion models, perspective accuracy is not an explicit requirement. Since these methods are capable of outputting a wide gamut of possible images, it is difficult for these synthesized images to adhere to the principles of linear perspective. We introduce a novel geometric constraint in the training process of generative models to enforce perspective accuracy. We show that outputs of models trained with this constraint both appear more realistic and improve performance of downstream models trained on generated images. Subjective human trials show that images generated with latent diffusion models trained with our constraint are preferred over images from the Stable Diffusion V2 model 70% of the time. SOTA monocular depth estimation models such as DPT and PixelFormer, fine-tuned on our images, outperform the original models trained on real images by up to 7.03% in RMSE and 19.3% in SqRel on the KITTI test set for zero-shot transfer. CCS Concepts: • Computing methodologies → Computer vision; Neural networks. Additional Key Words and Phrases: Diffusion Models, Perspective Constraints, Depth Estimation Authors’ addresses: Rishi Upadhyay, rishiu@ucla.edu, University of California, Los Angeles, USA; Howard Zhang, hwd15508@ucla.edu, University of California, Los Angeles, USA; Yunhao Ba, yhba@ucla.edu, University of California, Los Angeles, USA and Sony AI, USA; Ethan Yang, eyang657@ucla.edu, University of California, Los Angeles, USA; Blake Gella, bgella118827@ucla.edu, University of California, Los Angeles, USA; Sicheng Jiang, sicheng2020@ucla.edu, University of California, Los Angeles, USA; Alex Wong, alex.wong@yale.edu, Yale University, USA; Achuta Kadambi, achuta@ee.ucla.edu, University of California, Los Angeles, USA. 1 INTRODUCTION ""Re-draw The School of Athens in the style of Van Gogh"", ""Show an aerial viewpoint of the Washington Monument"". The introduction of recent text-to-image synthesis methods such as latent diffusion models has drastically increased our creative capabilities. These models can generate anything from a Renaissance style painting to an everyday smartphone selfie from just a simple text prompt. However, as powerful as these models can be, their limited ability to adhere to physical constraints that are explicitly present in natural images restricts their potential [Wang et al. 2022]. In contrast, traditional methods of image generation such as hand-drawn art or ray-traced images place careful attention on ensuring an accurate physical environment including geometry and lighting. One of the largest advancements in the photo-realism of handdrawn art was the development of a system to draw accurate perspective geometry in the 1400s. While the gap between real and generated images is not as large for diffusion models as it was back then, a greater consideration for perspective accuracy can have a similarly large impact in the photo-realism of their outputs. Perspective is one of the most important physical constraints because it ensures object properties such as size, relative location, and depth are accurately represented. In a sense, it ensures physical accuracy [Kadambi 2020]. This allows the use of perspective accurate data for downstream tasks such as camera calibration [Beardsley and Murray 1992; Caprile and Torre 1990; Chen and Jiang 1991; He and Li 2007; Li et al. 2010], 3D reconstruction [Guillou et al. 2000;" 2312.00951v1,"AV4EV: Open-Source Modular Autonomous Electric Vehicle Platform to Make Mobility Research Accessible Zhijie Qiao 1,2 * , Mingyan Zhou 1 * , Tejas Agarwal 1,2 , Zhijun Zhuang 1 , Felix Jahncke 1,3 , Po-Jen Wang 2 , Jason Friedman 1,2 , Hongyi Lai 1,2 , Divyanshu Sahu 1 , Tomáš Nagy 1,4 , Martin Endler 1,4 , Jason Schlessman 2,5 , Rahul Mangharam 1,2 1 School of Engineering and Applied Science, University of Pennsylvania, Email: rahulm@seas.upenn.edu 2 Autoware Foundation Center of Excellence 3 Professorship of Autonomous Vehicle Systems, Technical University of Munich 4 Czech Institute of Informatics, Robotics and Cybernetics, Czech Technical University in Prague 5 Red Hat Research Abstract—When academic researchers develop and validate autonomous driving algorithms, there is a challenge in balancing high-performance capabilities with the cost and complexity of the vehicle platform. Much of today’s research on autonomous vehicles (AV) is limited to experimentation on expensive commercial vehicles that require large teams with diverse skills to retrofit the vehicles and test them in dedicated testing facilities. Testing the limits of safety and performance on such vehicles is costly and hazardous. It is also outside the reach of most academic departments and research groups. On the other hand, scaleddown 1/10th-1/16th scale vehicle platforms are more affordable but have limited similitude in dynamics, control, and drivability. To address this issue, we present the design of a one-thirdscale autonomous electric go-kart platform with open-source mechatronics design along with fully-functional autonomous driving software. The platform’s multi-modal driving system is capable of manual, autonomous, and teleoperation driving modes. It also features a flexible sensing suite for development and deployment of algorithms across perception, localization, planning, and control. This development serves as a bridge between full-scale vehicles and reduced-scale cars while accelerating cost-effective algorithmic advancements in autonomous systems research. Our experimental results demonstrate the AV4EV platform’s capabilities and ease-of-use for developing new AV algorithms. All materials are available at AV4EV.org to stimulate collaborative efforts within the AV and electric vehicle (EV) communities. Index Terms—Autonomous Vehicle, Electrical Vehicle, Open- Source Design I. INTRODUCTION The increasing interest in self-driving cars has ushered in a new area of study in recent years: autonomous racing. This involves the development of software and hardware for high-performance racing vehicles intended to function autonomously at unprecedented levels, including high speeds, substantial accelerations, minimal response times, and within unpredictable, dynamic, and competitive settings [1]. However, a significant hurdle remains the unavailability of suitable testing platforms that encompass the independent driving * These authors contributed equally to this work. capacities of full-sized vehicles such as the Dallara AV21 from the Indy Autonomous Challenge, and the accessibility of smaller-scaled RC cars such as F1TENTH [2]. To address this issue, we created AV4EV, an accessible, open-source reference model for a one-third-scale autonomous electric racing platform. This platform merges the capabilities of full-sized vehicles with the compactness and adaptability of its smaller size. AV4EV offers open-source designs for mechatronics, sensing, and autonomous driving software, aiming to provide a standardized solution for modular autonomous and electric vehicles. Our go-kart won the championship at the 2023 Autonomous Karting Series Purdue Grand Prix, where it competed against several other US national teams [3]. This solution can easily be adopted by universities and research institutes to promote the safe and effective development and verification of AV. This work makes the following contributions: 1) We introduced an accessible modular electric vehicle platform with multiple driving modes (manual, autonomous, and teleoperated), bridging the gap between full-scale vehicles and RC cars. 2) We developed a flexible sensing setup and demonstrative software solutions to handle autonomous driving capabilities that are validated through experiments. 3) We provided comprehensive open-source resources to guide building and testing the one-third-scale electric gokart with detailed tutorials, GitHub repositories for hardware design and software stacks, demonstration videos, and a bill of materials [4]–[8]. II. M ECHATRONICS The go-kart mechatronic system is designed as a modular system, consisting of several subsystems that are responsible for different vehicle execution tasks. There are five subsystems which integrated with the base go-kart chassis in a non-intrusive way: Power Distribution System (PDS), Main Control System (MCS), Throttle-by-Wire System (TBWS)," 2312.00953v1,"DEEP IMAGE PRIOR WITH STRUCTURED SPARSITY (DISCUS) FOR DYNAMIC MRI RECONSTRUCTION Muhammad Ahmad Sultan, Chong Chen, Yingmin Liu, and Rizwan Ahmad The Ohio State University ABSTRACT Index Terms— Dynamic MRI, unsupervised learning, manifold learning, deep image prior (DIP) methods can outperform sparsity-based compressed sensing (CS) methods in terms of image quality [2]. Most DL-based image reconstruction methods require high-quality fully sampled data for supervised training. However, such data are typically not available for dynamic MRI. In contrast, self-supervised methods do not rely on fully sampled data, making them an attractive option for dynamic imaging. Several self-supervised methods have been proposed for MRI reconstruction, including deep image prior (DIP) [3]. DIP utilizes the network structure as an implicit prior. For dynamic imaging, Yoo et al. employed DIP by training a generative network to map a low-dimensional manifold to an image series [4]. In another study, Hamilton et al. integrated low-rank constraint with DIP to facilitate accelerated free-breathing cardiac imaging [5]. Bell et al. proposed a more robust adaptation of DIP by training the network to function as a denoiser instead of a generator [6]. In this work, we propose an extension of DIP, called deep image prior with structured sparsity (DISCUS). DIS- CUS trains a single network to map a series of random code vectors to a series of images. In contrast to methods that require specifying the dimensionality of the manifold [4], which may not known in advance, DISCUS discovers the dimensionality by imposing group sparsity on the code vectors. Also, DISCUS does not assume that temporal closeness (order of acquisition) is tied to image similarity [7]. This makes DISCUS suitable for free-breathing single-shot applications, where consecutive frames are not necessarily more similar. In the subsequent sections, we describe DISCUS and validate it using simulated and measured data. 1. INTRODUCTION 2. METHODS Magnetic resonance imaging (MRI) is a routine diagnostic tool with a broad range of clinical applications. Long scan times, however, are a major hurdle in MRI as they can reduce patient comfort, decrease throughput, and make imaging susceptible to motion artifacts. Consequently, accelerating MRI has been an active area of research [1]. More recently, deep learning (DL)-based methods have shown great promise for MRI reconstruction. Several recent studies suggest that such In this section, we first briefly describe DIP and then use that as a starting point to explain DISCUS. High-quality training data are not always available in dynamic MRI. To address this, we propose a self-supervised deep learning method called deep image prior with structured sparsity (DISCUS) for reconstructing dynamic images. DISCUS is inspired by deep image prior (DIP) and recovers a series of images through joint optimization of network parameters and input code vectors. However, DISCUS additionally encourages group sparsity on frame-specific code vectors to discover the low-dimensional manifold that describes temporal variations across frames. Compared to prior work on manifold learning, DISCUS does not require specifying the manifold dimensionality. We validate DISCUS using three numerical studies. In the first study, we simulate a dynamic Shepp-Logan phantom with frames undergoing random rotations, translations, or both, and demonstrate that DISCUS can discover the dimensionality of the underlying manifold. In the second study, we use data from a realistic late gadolinium enhancement (LGE) phantom to compare DISCUS with compressed sensing (CS) and DIP and to demonstrate the positive impact of group sparsity. In the third study, we use retrospectively undersampled single-shot LGE data from five patients to compare DISCUS with CS reconstructions. The results from these studies demonstrate that DISCUS outperforms CS and DIP and that enforcing group sparsity on the code vectors helps discover true manifold dimensionality and provides additional performance gain. Corresponding author: Rizwan Ahmad (ahmad.46@osu.edu). 2.1. DIP DIP can be used to solve a wide range of inverse problems [3]. To apply DIP to MRI reconstruction, a random code vector z is passed through a network G θ to generate an estimate of the true image x ∈ C N . Both the network parameters, θ, and the code vector, z, are optimized to make the output of" 2312.00957v1,"A Comprehensive Real-World Evaluation of 5G Improvements over 4G in Low- and Mid-Bands Muhammad Iqbal Rochman ∗ , Wei Ye † , Zhi-Li Zhang † , and Monisha Ghosh ‡ ∗ University of Chicago, † University of Minnesota Twin Cities, ‡ University of Notre Dame. Email: ∗ muhiqbalcr@uchicago.edu, † {ye000094,zhzhang}@umn.edu, ‡ mghosh3@nd.edu Abstract—As discussions around 6G begin, it is important to carefully quantify the spectral efficiency gains actually realized by deployed 5G networks as compared to 4G through various enhancements such as higher modulation, beamforming, and MIMO. This will inform the design of future cellular systems, especially in the mid-bands, which provide a good balance between bandwidth and propagation. Similar to 4G, 5G also utilizes low-band (<1 GHz) and mid-band spectrum (1 to 6 GHz), and hence comparing the performance of 4G and 5G in these bands will provide insights into how further performance improvements can be attained. In this work, we address a crucial question: is the performance boost in 5G compared to 4G primarily a result of increased bandwidth, or do the other enhancements play significant roles, and if so, under what circumstances? There is extremely limited academic research that addresses this important question. Hence, we conduct city-wide measurements of 4G and 5G cellular networks deployed in low- and midbands in Chicago and Minneapolis, and carefully analyze the performance to quantify the contributions of different aspects of 5G advancements to its improved throughput performance. Our analyses show that (i) compared to 4G, the throughput improvement in 5G today is mainly influenced by the wider channel bandwidth, both from single channels and channel aggregation, (ii) in addition to wider channels, improved 5G throughput requires better signal conditions, which can be delivered by denser deployment and/or use of beamforming in mid-bands, (iii) the channel rank in real-world environments rarely supports the full 4 layers of 4x4 MIMO and (iv) advanced features such as MU- MIMO and higher order modulation such as 1024-QAM have yet to be widely deployed. These observations and conclusions lead one to consider designing the next generation of cellular systems to have wider channels, perhaps with improved channel aggregation, a deployment architecture that is dense and uses more beams, thus ensuring uniformly better signal strength over the coverage area and no more than 4 MIMO layers per user. Index Terms—5G, 4G, mid-band, low-band, C-band, BRS, MIMO, throughput, measurements. I. I NTRODUCTION 5G New Radio (NR) networks are widely recognized as the cornerstone for emerging next-generation mobile applications such as AR/VR, remote driving, and cloud gaming. Our recent measurement studies [1] reveal that with good coverage, current commercial 5G networks can achieve an average downlink throughput of 700 Mbps (with peak rates reaching ∼1 Gbps) even while driving in urban environments, far surpassing the performance of 4G Long-Term Evolution (LTE) networks. This substantial improvement may be attributed to the adoption of advanced wireless communication technologies, including but not limited to massive MIMO [2], beamforming [3], TABLE I: Statistics of 4G/5G dataset. Mobile Operators Radio Technologies Measurement Venues Cumulative Data Traces XCAL Key Perf. Indicators AT&T, T-Mobile, Verizon 4G, 5G Minneapolis, Chicago 1200+km; Around 14 hours PCI-Beam idx; Freq.; SCS; RSRP; RSRQ; CQI; RI; BLER; MCS; #RBs; #MIMO layers; MIMO modes; PHY-layer throughput; higher modulation [4], and increased bandwidth. The midband spectrum (1–6 GHz) in particular is deemed crucial for the success of 5G, as it balances coverage with bandwidth [5]. However, some advanced 5G technologies may still be in the product development phase, or skipped altogether due to cost considerations. Additionally, due to the phased deployment of commercial 5G, earlier research does not have results on the latest deployment of 5G in the BRS-band (2.5–2.7 GHz) and C-band (3.7–4.2 GHz). Hence, in this paper we focus on the physical layer of 4G and 5G networks, exploring deployed radio channel characteristics and their impact on throughput performance, with emphasis on the low-band (<1 GHz) and mid-band channels, particularly the recent deployments of NR in BRS [6] and C- band [7, 8]. Specifically, we wish to address the following questions: What are the similarities and differences in the channel resources and radio technologies currently used in 4G and 5G networks? More importantly, is the observed 5G performance boost primarily a result of increased bandwidth, or do other novel enhancements play significant roles? And can we quantify their relationship and contribution to throughput? We believe that addressing these queries can prompt a reevaluation of mobile network evolution, offering valuable insights for the design and deployment of future 6G networks. To this end, we carried out extensive in-field measurements in two major metropolitan areas in the US, Minneapolis and Chicago, along with the highways connecting them, as shown in Fig. 1. We employ commercial smartphones as user equipment (UE) and utilize a professional network analyzer tool to log all network events and key performance indicators (KPIs). Our data trajectory spans a driving distance exceeding 1200 km, encompassing both 4G and 5G networks of three major US operators—namely, AT&T (ATT), T-Mobile (TMO), and Verizon (VZW) as shown in Table I (see §III for details). To the best of our knowledge, our work is one of the first to conduct a comprehensive city-wide study spanning two cities, aimed at assessing the enhancements offered by 5G over 4G," 2312.00968v1,"Omni-SMoLA: Boosting Generalist Multimodal Models with Soft Mixture of Low-rank Experts Jialin Wu Xia Hu Yaqing Wang Bo Pang Google Research Radu Soricut {jialinwu, xiahu, yaqingwang, bopang, rsoricut}@google.com Abstract tune the model parameters with supervised data representing multiple tasks. However, recent research suggests that it causes non-negligible performance degradation compared to the performance of a single-task specialist [6]. It is likely that, even though these tasks share the same configuration of modalities (e.g., image + text as input, text as output), what the model needs to solve for is significantly diverse – for instance, some tasks require recognizing the fine-grained identity of visual content, others may rely on world-knowledge outside of the visual scene, while others require reading and understanding texts from images. Recent work [48] show that Mixture-of-Experts (MoE) models stand to benefit more from instruction tuning compared to dense models, and serve as good candidate architectures for building generalist large language models. Intuitively, this should work well because different expert modules can specialize and handle different tasks. However, there is an obvious issue with applying the MoE design on Transformer blocks for large-scale models: the different transformer blocks result in replicating the model parameters using high-rank experts. This creates a situation in which the scale of each expert model block compared to their dense-model counterparts is much more limited. In this work, we address the aforementioned limitations by introducing Omni-SMoLA, an architecture that efficiently mixes many multi-modal low rank experts. Using this architecture, we demonstrate strong capabilities for adapting pretrained models to tackle specialized tasks. The core intuition is that a large pretrained (or instruction-tuned) model provides a foundational backbone of capabilities (we denote this model by θ ∗ ), while different lightweight experts learn additional specializations (which can be knowledge, style, or capabilities). In particular, for the modalities considered in this paper (text & vision), the Omni-SMoLA architecture consists of three sets of experts, focusing on text tokens, visual tokens and multimodal tokens, respectively, in order to satisfy different needs from various tasks. In general, the SMoLA design has several important proprieties. First, due to its adoption of the low rank expert design [43] and unlike conventional MoE transformer mod- Large multi-modal models (LMMs) exhibit remarkable performance across numerous tasks. However, generalist LMMs often suffer from performance degradation when tuned over a large collection of tasks. Recent research suggests that Mixture of Experts (MoE) architectures are useful for instruction tuning, but for LMMs of parameter size around O(50-100B), the prohibitive cost of replicating and storing the expert models severely limits the number of experts we can use. We propose Omni-SMoLA, an architecture that uses the Soft MoE approach to (softly) mix many multimodal low rank experts, and avoids introducing a significant number of new parameters compared to conventional MoE models. The core intuition here is that the large model provides a foundational backbone, while different lightweight experts residually learn specialized knowledge, either per-modality or multimodally. Extensive experiments demonstrate that the SMoLA approach helps improve the generalist performance across a broad range of generative vision-and-language tasks, achieving new SoTA generalist performance that often matches or outperforms single specialized LMM baselines, as well as new SoTA specialist performance. 1. Introduction Large multimodal models (LMMs) [6–8, 14, 33, 53] demonstrate remarkable performance on a variety of tasks including visual question answering, image captioning, visual document understanding, etc. To date, the best performance on most of these tasks is achieved by so-called specialist LMMs, but their large scale makes it impractical to deploy a multitude of such specialists at once. As a result, so-called generalist LMMs emerge as an obvious choice, where such a model is trained and deployed to handle a wide range of tasks using the same set of model parameters. Building a single generalist model to solve multiple tasks remains challenging. A straightforward approach is to fine- 1" 2312.00969v1,"Numerical Investigation of Non-equilibrium Electron Effects on the Collisional Ionization Rate in the Collisional-Radiative Model M. S. Cho, 1, 2 H. -K. Chung, 3 M. E. Foord, 2 S. B. Libby, 2 and B. I. Cho 1, ∗ 1 Gwangju Institute of Science and Technology, Department of Physics and Photon Science, Gwangju 61005, South Korea 2 Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, California 94550, USA 3 Korea Institute of Fusion Energy, Daejeon 34133, South Korea (Dated: December 5, 2023) The interplay of kinetic electron physics and atomic processes in ultrashort laser-plasma interactions provides a comprehensive understanding of electron energy distribution’s impact on plasma properties. Notably, non-equilibrium electrons play a vital role in collisional ionization, influencing ionization degrees and spectra. This paper introduces a computational model that integrates the physics of kinetic electrons and atomic processes, utilizing a Boltzmann equation for non-equilibrium electrons and a collisional-radiative model for atomic state populations. The model is used to investigate the influence of non-equilibrium electrons on collisional ionization rates and their effect on population distribution, as demonstrated by L. Young [1]. The study reveals significant non-equilibrium electron presence during XFEL-matter interactions, profoundly affecting collisional ionization rates in the gas plasma, thereby necessitating careful consideration of the Collisional-Radiative (CR) model applied to such systems. I. INTRODUCTION Recently, the examination of the interplay between kinetic physics of electrons and atomic processes in the ultrashort region of laser-plasma has become possible through the development of ultrafast laser technology [2–8]. This advance has allowed for a direct and more comprehensive analysis of the electron energy distribution and its impact on plasma properties, beyond the traditional approach of solely measuring the temperature and density of free electrons. The electron distribution undergoes a temperature process until it reaches a specific distribution, with the presence of non-equilibrium electrons during this process having a substantial effect on the characteristics of plasmas. This necessitates a new interpretation of existing plasma phenomena, with non-equilibrium electrons playing a crucial role in various laser heating processes, such as inverse bremsstrahlung [6] and thermalization [7]. These findings have significant implications for the development of plasma-based technologies and applications. In this context, researchers also have been exploring the impact of non-equilibrium electrons on plasma properties in the Collisional-Radiative (CR) model, commonly used to calculate the ionization degree and spectrum. When calculating the collisional ionization rate in the CR model, the electron energy distribution function of free electrons is required, and it is typically assumed to follow a specific statistical distribution, such as Maxwell-Boltzmann or Fermi-Dirac distribution, for calculation-costly efficiency. While this is a reasonable assumption for high-density plasmas with short thermalization times, the use of targets with various materials and densities necessitates a precise understanding of the ∗ bicho@gist.ac.kr effects of non-equilibrium electrons in the ultrashort region. To address this need, researchers have attempted to incorporate the effect of non-equilibrium electrons in the CR model [4, 9–12]. SCFLY, one of widely used CR codes, has been successful in revealing the main ion dynamics occurring in X-ray Free Electron Laser (XFEL) heated plasmas and modeling their consequential transmission/emission spectrum [13–20]; however, most of the calculations assume a Maxwell-Boltzmann distribution for the free electron energy, which may not accurately reflect the behavior of low-density targets such as gas targets. An experiment using an XFEL to heat a low density neon gas target is one of examples to use SCFLY for interpretation [13], but the code did not sufficiently consider the effect of non-equilibrium electrons, necessitating code improvements to ensure accurate analysis of low-density plasma dynamics. This paper presents a model for calculating nonequilibrium electron distributions coupled with the code SCFLY, which is used to reinterpret an XFEL heated neon plasma experiment which has reported the difference between experiment and theory [1]. The result of this work reveals existence of non-equilibrium plasma electrons, confirming that their impact on the final ion distribution is not negligible. Here, we find that by including the calculated non-Maxwellian distributions in the atomic modeling, much better agreement is found for ionization balance of the Neon plasmas. The module is developed to solve the Boltzmann transport equation under the assumption of spatially unform plasmas in cooperation with 0-d Collisional-Radiative philosophy and updating electron distribution function in time. Its impact on the transition rate, e.g. the collisional ionization rate, results in the change of plasma characteristics such as the charge state distribution, which closely approaches the experimental data. In addition, it also probes the differences between different collision-ionization coefficient" 2312.00981v1,"1 Securing the Sensing Functionality in ISAC Networks: An Artificial Noise Design Jiaqi Zou, Graduate Student Member, IEEE, Christos Masouros, Senior Member, IEEE, Fan Liu, Member, IEEE Songlin Sun, Senior Member, IEEE Abstract—Integrated sensing and communications (ISAC) systems employ dual-functional signals to simultaneously accomplish radar sensing and wireless communication tasks. However, ISAC systems open up new sensing security vulnerabilities to malicious illegitimate eavesdroppers (Eves) that can also exploit the transmitted waveform to extract sensing information from the environment. In this paper, we investigate the beamforming design to enhance the sensing security of an ISAC system, where the communication user (CU) serves as a sensing Eve. Our objective is to maximize the mutual information (MI) for the legitimate radar sensing receiver while considering the constraint of the MI for the Eve and the quality of service to the CUs. Then, we consider the artificial noise (AN)-aided beamforming to further enhance the sensing security. Simulation results demonstrate that our proposed methods achieve MI improvement of the legitimate receiver while limiting the sensing MI of the Eve, compared with the baseline scheme, and that the utilization of AN further contributes to sensing security. Index Terms—Integrated sensing and communications, sensing security, mutual information, artificial noise. I. I NTRODUCTION Integrated sensing and communications (ISAC) is identified as a key 6G technology that will support various futuristic applications through the co-design of sensing and communication functionalities. In particular, supported by the implementation of the dual-functional waveform and the base stations (BSs), ISAC provides a step change from the spectral coexistence of radar and communication systems to the shared utilization of costly hardware platforms. Inspired by these favorable characteristics, various designs have been proposed for the dual-functional waveforms to promote sensing and communication performance. For example, recent works in [1] minimized the beampattern matching error for radar sensing, and [2] considered the Cramér-Rao bound (CRB) minimization subject to the minimum signal-to-interference-plus-noise ratio (SINR) constraints for each communication user (CU). However, the aforementioned works have overlooked the con- Jiaqi Zou is with the School of Information and Communication Engineering, Beijing University of Posts and Telecommunications (BUPT), Beijing, 100876, China, and also with the Department of Electrical and Electronic Engineering, University College London, London, WC1E 7JE, UK (e-mail: jqzou@bupt.edu.cn). Christos Masouros is with the Department of Electronic and Electrical Engineering, University College London, London, WC1E 7JE, UK (e-mail: chris.masouros@ieee.org). Fan Liu is with the Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China (e-mail: liuf6@sustech.edu.cn). Songlin Sun is with Beijing University of Posts and Telecommunications (BUPT), Beijing, 100876, China (e-mail: slsun@bupt.edu.cn). sideration of security issues, which avail unique vulnerabilities in ISAC systems. Due to the inherent broadcast nature of wireless signals, it is inevitable that wireless communication/sensing systems are susceptible to potential security threats. Compared with the communication-only systems, ISAC systems encounter more intricate security issues which can be generally categorized into the information security for communication and the sensing security for radar. The former arises from the fact that the probing ISAC waveform is modulated with information, which could potentially be leaked to the sensed targets that can act as eavesdroppers (Eves). To deal with this, physical layer security schemes have been proposed, such as [3] that maximized the secrecy rate by jointly optimizing the beamforming vector, the duration of snapshots, and the covariance matrix of the artificial noise (AN). Besides, the work in [4] optimizes the beamforming and AN design to minimize the signal-to-noise ratio (SNR) at the Eve. In contrast, the sensing security for radar has not been well investigated. In particular, the transmitted waveform could be exploited by the communication user serving as malicious passive sensing Eves to extract sensing information about targets or their environment, which poses significant challenges and the need to secure the sensing functionality of ISAC networks. Against this background, our work proposes to address the sensing security issue for ISAC systems, which to the best of our knowledge, has not been investigated in the literature. In particular, we consider a bi-static ISAC scenario, where the users that are granted access only to communication services, can exploit the ISAC signals for illegitimate sensing and therefore take the role of sensing Eves. In this scenario, the legitimate receiver and the Eve conduct sensing with the dual-functional ISAC waveforms. We formulate the problem to maximize the radar mutual information (MI) of the legitimate receiver, subject to MI of the Eve, the minimum SINR constraints for each CU and the maximum transmit power budget. Since the formulated problem is nonconvex, we propose a successive convex approximation (SCA) method combined with semidefinite relaxation (SDR) to deal with the non-convexity. Furthermore, we propose an AN-aided method where we firstly give the derivation of sensing MI with AN and then jointly optimize the beamforming and the covariance of AN. Simulation results demonstrate significant improvement in the sensing MI of our proposed methods compared with the baseline and also reveal that through adding AN to the transmit signals of the BS, the secure sensing performance can be effectively improved." 2312.00987v1,"Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification An Ngo Bucknell University Lewisburg, Pensylvania, USA axn001@bucknell.edu MinhPhuong Cao Bucknell University Lewisburg, Pensylvania, USA mtc013@bucknell.edu governmental forms, business agreements, medical consents, intellectual property rights, and electronic documents and transactions [8, 13, 18]. In the face of escalating sophistication in contemporary scams, manual verification of human signatures is infeasible. As a result, researchers have developed strategies to automate signature verification by employing machine learning approaches [18]. Hidden Markov Models, Support Vector Machines, Neural Networks, k-nearest Neighbors, and Ensemble methods are the most widely used classifiers, achieving average error rates between 3.73 to 26.73% [16, 18]. Contemporary studies on automatic signature verification (ASV) emphasize data-driven methodologies for automation. For example, Hafemann et al. [15] employed Convolutional Neural Networks (CNN) to facilitate automated feature extraction. CNN-based techniques have outperformed the majority of statistical and traditional machine learning-based methods [18, 25, 40], obtaining superior error rates in recent investigations while exhibiting generalizability and scalability across larger and multiple datasets [9, 15]. Prior studies have examined two paradigms, namely, writer-dependent and writer-independent [16]. In this study, we experiment with a writer-dependent scenario common in the literature [16]. In other words, we train distinct models for each user. Based on the acquisition method, one can also categorize ASVs into online (dynamic) and offline (static). While only signature images are used in offline ASVs, online ASVs utilize a time-sequenced series of pen positions, pen pressure, and inclination among other [8, 13, 16, 18]. This paper focuses on offline data-driven ASVs exclusively and leaves the investigation of rest, including online ASVs, for the future. Like other biometric systems, ASVs are susceptible to various attacks [13]. The latest survey [13] categorizes the attacks based on the impostor types as random (zero-effort or accidental) and skilled forgeries. Under random forgery, no information about the target is known to the attacker. Under skilled forgeries, the attackers have some information about the target and signature and undergo certain training. The categorization is in line with [4] classifies the forgeries into random, simple, simulated, and skilled forgeries [4]. Random forgery entails any signature unrelated to the genuine signer. In contrast, simple forgery refers to instances where the forger possesses limited knowledge of the target, such as the individual’s name. Simulated forgery encompasses scenarios in which an inexperienced forger attempts to replicate a given signature, and skilled forgery involves experienced forgers practicing and perfecting their imitation of a particular signature. Ballard et al. [1] proposed naive, trained, and generative attack classifications. They recommended generative attacks to test the robustness of ASV-like security systems, emphasizing on the effort ABSTRACT While previous studies have explored attacks via random, simple, and skilled forgeries, generative attacks have received limited attention in the data-driven signature verification (DASV) process. Thus, this paper explores the impact of generative attacks on DASV and proposes practical and interpretable countermeasures. We investigate the power of two prominent Deep Generative Models (DGMs), Variational Auto-encoders (VAE) and Conditional Generative Adversarial Networks (CGAN), on their ability to generate signatures that would successfully deceive DASV. Additionally, we evaluate the quality of generated images using the Structural Similarity Index measure (SSIM) and use the same to explain the attack’s success. Finally, we propose countermeasures that effectively reduce the impact of deep generative attacks on DASV. We first generated six synthetic datasets from three benchmark offline-signature datasets viz. CEDAR, BHSig260-Bengali, and BH- Sig260 -Hindi using VAE and CGAN. Then, we built baseline DASVs using Xception, ResNet152V2, and DenseNet201. These DASVs achieved average (over the three datasets) False Accept Rates (FARs) of 2.55%, 3.17%, and 1.06%, respectively. Then, we attacked these baselines using the synthetic datasets. The VAE-generated signatures increased average FARs to 10.4%, 10.1%, and 7.5% while CGAN-generated signatures to 32.5%, 30% and 26.1%. The variation in the effectiveness of attack for VAE and CGAN was investigated further and explained by a strong (𝜌 = −0.86) negative correlation between FARs and SSIMs. We created another set of synthetic datasets and used the same to retrain the DASVs. The retained baseline showed significant robustness to random, skilled, and generative attacks as the FARs shrank to less than 1% on average. The findings underscore the importance of studying generative attacks and potential countermeasures for DASV. KEYWORDS Signature verification, Deep generative models, attacks, generative attack explainability, data-driven verification system 1 Rajesh Kumar Bucknell University Lewisburg, Pensylvania, USA rk042@bucknell.edu INTRODUCTION Signatures are a universally acknowledged method of identity verification, extensively utilized in diverse scenarios, including legal documents, financial transactions, workplace documentation, This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license visit https://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Proceedings on Privacy Enhancing Technologies YYYY(X), 1–10 © YYYY Copyright held by the owner/author(s). https://doi.org/XXXXXXX.XXXXXXX 1" 2312.00988v1,"On the global minimum of the classical potential energy for clusters bound by many-body forces Michael K.-H. Kiessling 1,∗ and David J. Wales 2 1 Department of Mathematics, Rutgers, The State University of New Jersey 110 Frelinghuysen Rd., Piscataway, NJ 08854, USA email: miki@math.rutgers.edu 2 Yusuf Hamied Department of Chemistry, Lensfield Road, Cambridge CB2 1EW, UK email: dw34@cam.ac.uk Revised version of November 26, 2023 Abstract This note establishes, first of all, the monotonic increase with N of the average K-body energy of classical N -body ground state configurations with N ≥ K monomers that interact solely through a permutation-symmetric K- body potential, for any fixed integer K ≥ 2. For the special case K = 2 this result had previously been proved, and used successfully as a test criterion for optimality of computer-generated lists of putative ground states of N -body clusters for various types of pairwise interactions. Second, related monotonicity results are established for N -monomer ground state configurations whose monomers interact through additive mixtures of certain types of k-meric potentials, k ∈ {1, ..., K}, with K ≥ 2 fixed and N ≥ K. All the monotonicity results furnish simple necessary conditions for optimality that any pertinent list of computer-generated putative global minimum energies for N -monomer clusters has to satisfy. As an application, databases of N -body cluster energies computed with an additive mix of the dimeric Lennard-Jones and trimeric Axilrod–Teller interactions are inspected. We also address how many local minima satisfy the upper bound inferred from the monotonicity conditions, both from a theoretical and from an empirical perspective. ∗ Corresponding Author. © (2023) The authors. Reproduction, in its entirety, for non-commercial purposes is permitted. Accepted on November 29, 2023, for publication in Journal of Statistical Physics. 1" 2312.00994v1,"A NEW UPPER BOUND FOR THE GROWTH FACTOR IN GAUSSIAN ELIMINATION WITH COMPLETE PIVOTING ANKIT BISAIN, ALAN EDELMAN, AND JOHN URSCHEL Abstract. The growth factor in Gaussian elimination measures how large the entries of an LU factorization can be relative to the entries of the original matrix. It is a key parameter in error estimates, and one of the most fundamental topics in numerical analysis. We produce an upper bound of n 0.2079 ln n+0.91 for the growth factor in Gaussian elimination with complete pivoting – the first improvement upon Wilkinson’s original 1961 bound of 2 n 0.25 ln n+0.5 . 1. Introduction The solution of a linear system Ax = b is one of the oldest problems in mathematics. One of the most fundamental and important techniques for solving a linear system is Gaussian elimination, in which a matrix is factored into the product of a lower and upper triangular matrix. Given an n×n matrix A, Gaussian elimination performs a sequence of rank-one transformations, resulting in the sequence of matrices A (k) ∈ C k×k for k equals n to 1, satisfying A (k) = M (2,2) − M (2,1) [M (1,1) ] −1 M (1,2) , k  n−k  (1,1) (1,2) where A = M (2,1) M (2,2) n−k . M M k The resulting LU factorization of A is encoded by the first row and column of each of the iterates A (k) , k = 1, ..., n. Not all matrices have an LU factorization, and a permutation of the rows (or columns) of the matrix may be required. In addition, performing computations in finite precision can elicit issues due to round-off error. The error due to rounding in Gaussian elimination for a matrix A in some fixed precision is controlled by the growth factor of the Gaussian elimination algorithm, defined by g(A) := max k |A (k) | ∞ , |A| ∞ where | · | ∞ is the entry-wise matrix infinity norm (see [8, Theorem 3.3.1] for details). For this reason, understanding the growth factor is of both theoretical and practical importance. Complete pivoting, famously referred to as “customary” by von Neumann [19], is a strategy for permuting the rows and columns of A so that, at each step, the pivot (the top-left entry of A (k) ) is the largest magnitude entry of A (k) . Complete pivoting remains the premier theoretical permutation strategy for performing Gaussian elimination. Despite its popularity, the worstcase behavior of the growth factor under complete pivoting is poorly understood. 1.1. Historical Overview and Relevant Results. The appearance of the computer in the aftermath of the Second World War created a new branch of mathematics now known as numerical analysis. In their seminal 1947 paper Numerical Inverting of Matrices of High Order, von Neumann and Goldstine studied the stability of Gaussian elimination with complete pivoting [19]. This work was motivated by their development of the first stored-program digital Department of Mathematics, Massachusetts Institute of Technology, Cambridge, MA, 02139 USA. E-mail addresses: ankitb12@mit.edu, edelman@mit.edu, urschel@mit.edu. 2020 Mathematics Subject Classification. Primary 65F05, 15A23. 1" 2312.01001v1,"Learning county from pixels: Corn yield prediction with attention-weighted multiple instance learning Xiaoyu Wang a , Yuchi Ma b , Qunying Huang c , Zhengwei Yang d , Zhou Zhang a,∗ a Biological Systems Engineering, University of Wisconsin-Madison, Madison, 53706, WI, USA b Department of Earth System Science and Center on Food Security and the Environment, Stanford University, Stanford, 94305, CA, USA c Department of Geography, University of Wisconsin-Madison, Madison, 53706, WI, USA d Research and Development Division, National Agricultural Statistics Service, United States Department of Agriculture, Washington, 20250, DC, USA Abstract Remote sensing technology has become a promising tool in yield prediction. Most prior work employs satellite imagery for county-level corn yield prediction by spatially aggregating all pixels within a county into a single value, potentially overlooking the detailed information and valuable insights offered by more granular data. To this end, this research examines each county at the pixel level and applies multiple instance learning to leverage detailed information within a county. In addition, our method addresses the “mixed pixel” issue caused by the inconsistent resolution between feature datasets and crop mask, which may introduce noise into the model and therefore hinder accurate yield prediction. Specifically, the attention mechanism is employed to automatically assign weights to different pixels, which can mitigate the influence of mixed pixels. The experimental results show that the developed ∗ Corresponding author Email addresses: xwang2696@wisc.edu (Xiaoyu Wang), yuchima8@gmail.com (Yuchi Ma), qhuang46@wisc.edu (Qunying Huang), zhengwei.yang@usda.gov (Zhengwei Yang), zzhang347@wisc.edu (Zhou Zhang) Preprint submitted to ISPRS Journal of Photogrammetry and Remote SensingDecember 5, 2023" 2312.01014v1,"ARTICLE TEMPLATE Generalized Left-Localized Cayley Parametrization for Optimization with Orthogonality Constraints Keita Kume a and Isao Yamada a a Dept. of Information and Communications Engineering, Tokyo Institute of Technology, Tokyo, Japan ARTICLE HISTORY Compiled December 5, 2023 ABSTRACT We present a reformulation of optimization problems over the Stiefel manifold by using a Cayley-type transform, named the generalized left-localized Cayley transform, for the Stiefel manifold. The reformulated optimization problem is defined over a vector space, whereby we can apply directly powerful computational arts designed for optimization over a vector space. The proposed Cayley-type transform enjoys several key properties which are useful to (i) study relations between the original problem and the proposed problem; (ii) check the conditions to guarantee the global convergence of optimization algorithms. Numerical experiments demonstrate that the proposed algorithm outperforms the standard algorithms designed with a retraction on the Stiefel manifold. KEYWORDS Stiefel manifold; Cayley transform; Cayley parametrization; Orthogonality constraint; Non-convex optimization 1. Introduction The Stiefel manifold Stpp, N q :“ tU P R N ˆp | U T U “ I p u is defined for pp, N q P N ˆ N with p ď N , where I p is the p ˆ p identity matrix (see Appendix A for basic facts on Stpp, N q). We consider an orthogonal constraint optimization problem formulated as: Problem 1.1. For a given continuous function f : R N ˆp Ñ R , find U ‹ P argmin f pU q, (1) U PStpp,N q where the existence of a minimizer in (1) is automatically guaranteed by the compactness of Stpp, N q and the continuity of f over the N p-dimensional Euclidean space R N ˆp . CONTACT Keita Kume. Email: kume@sp.ce.titech.ac.jp CONTACT Isao Yamada. Email: isao@sp.ce.titech.ac.jp This is an original manuscript of an article published by Taylor & Francis in Optimization on 15 Nov. 2022, available online: https://doi.org/10.1080/02331934.2022.2142471." 2312.01019v1,"A Note on Finite Number Rings ∗ Suk-Geun Hwang † , Woo Jeon ‡ , and Ki-Bong Nam § , Tung T. Nguyen, ¶ December 5, 2023 Abstract √ We define the finite number ring Z n [ m r] where m, n are positive integers and r in an integer akin to the definition of the Gaussian integer Z[i]. √ This idea is also introduced briefly in [9]. By definition, this finite number ring Z n [ m r] is naturally isomorphic to the ring Z n [x]/hx m − ri. From an educational standpoint, this description offers a straightforward and elementary presentation of this finite ring, making it suitable for readers who do not have extensive exposure to abstract algebra. We discuss various arithmetical properties of this ring. In particular, when n = p is a prime √ number and Z p contains a primitive m-root of unity, we describe the structure of Z n [ m r] explicitly. Keywords: Radical Extension, Unital Determinant, Finite Fields, Polynomial Factorization 1 Introduction For each positive integer n, we will denote by Z n the ring of integers modulo n. We recommend [6, 7] for some good textbooks on the ring Z n . Throughout the paper, p is a prime number. Recall that the Gaussian integers Z[i] is isomorphic to Z[x]/hx 2 + 1i where hx 2 + 1i is the ideal of Z[x] which is generated by x 2 + 1 (see [5, 10]). Note also that Z[i] can also be considered as the set of all elements of the form a + bi where a, b ∈ Z and i 2 = −1. Addition and multiplication on Z[i] can be defined in a natural way. For example (a + bi)(c + di) = (ac − bd) + (ad + bc)i. The advantage of this presentation of Z[i] is that it is rather straightforward and can be understood by readers who do not have serious exposure to the theory of quotient rings. Motivated by this observation, we can define an extension ring Z n [i] of Z n as the set of all formal elements of the form a + bi where a, b ∈ Z n . Multiplication and addition are also ∗ Mathematics Subject Classification: 11T06, 11T30, 11Z05, 97H40 Department of Mathematics Education, Kyungpook University, Taegu 702-701, Korea and Department of Mathematics, University of Wisconsin-Whitewater, Whitewater, WI 53190. USA, Email: sghwang@knu.ac.kr, hwangs@uww.edu ‡ Department of Mathematics & Statistics, University of Wisconsin-Green Bay, Green Bay, WI 54311, USA, Email: jeonw@uwgb.edu § Dept. of Math., Univ. of Wisconsin-Whitewater, Whitewater, WI 53190, USA, Email: namk@uww.edu ¶ Dept. of Kinesiology, Western University, Ontario, Canada, Email: tungnt@uchicago.edu † 1" 2312.01024v1,"1 Hybrid Quantum Neural Network in High-dimensional Data Classification *1. Hao-Yuan Chen, 2. Yen-Jui Chang, 3. Shih-Wei Liao, 3. 4. Ching-Ray Chang 1 Dept of Computer Science, Goldsmiths, University of London, London WC1E 7HU, United Kingdom 2 Dept of Physics, National Taiwan University, Taipei 106216, Taiwan 3 Dept of Computer Science and Information Engineering, National Taiwan University, Taipei 106216, Taiwan 4 Quantum Information Center, Chung Yuan Christian University, Taoyuan 320314, Taiwan *E-mail: (hc118@student.london.ac.uk) Abstract—The research explores the potential of quantum deep learning models to address challenging machine learning problems that classical deep learning models find difficult to tackle. We introduce a novel model architecture that combines classical convolutional layers with a quantum neural network, aiming to surpass state-of-the-art accuracy while maintaining a compact model size. The experiment is to classify high-dimensional audio data from the Bird-CLEF 2021 dataset. Our evaluation focuses on key metrics, including training duration, model accuracy, and total model size. This research demonstrates the promising potential of quantum machine learning in enhancing machine learning tasks and solving practical machine learning challenges available today. Index Terms—Quantum deep learning utility, Hybrid Quantum neural network, High-dimensional data, Binary classification I. I NTRODUCTION UANTUM Machine learning is a promising research domain where quantum computing and machine learning are combined to solve various challenges in machine learning problems and other applicable challenges in quantum computing. High-dimensionality of the quantum information implies a significant opportunity for machine learning and deep learning models to be improved and accelerated by quantum computing techniques. In the research, [2] has illustrated the overall frameworks and promising acceleration of various quantum computing and quantum-inspired computations in machine learning domains. The research aims to address whether there is any hybrid quantum neural network that could deliver a significant advancement of classical deep learning models from the perspectives of accuracy, model size, and training speed in a binary classification problem under a high-dimensional dataset. The hypothesis, in addition, is based on the concept that the hybrid quantum deep neural network could provide a significant advancement in the area where classical neural networks struggle to deliver excellent results in which the SOTA model can’t correctly have an accuracy of more than 90 percent. Moreover, the benefits of the hybrid quantum neural network consist of accuracy improvement and model size reduction. The selection dataset in this study is challenging yet crucial for environmental and biological science research. Q Manuscript However, to the best of our knowledge, by 2023, the SOTA model of the Bird-CLEF 2021 can’t surpass the threshold of 90 percent accuracy with results at around 88 percent prediction accuracy. The research objectives of this research are, firstly, designing a hybrid quantum neural network on top of the current architecture of a state-of-the-art (SOTA) model combining a quantum neural network with classical optimizers like the Adam optimization algorithm. The second goal is to experiment and validate the hybrid neural network against the classical SOTA models to ensure it surpasses the overall performance benchmark from various metrics. At the end of the study, a discussion on the potential quantum deep learning utility is delivered to evaluate the general utility of the hybrid quantum model with the metrics from classification accuracy, total model size, and the training speed (represented in training duration in seconds). II. B INARY C LASSIFICATION IN H IGH - DIMENSIONAL D ATASETS Firstly, a theoretical framework for this research is constructed by discussing binary classification using a convolutional neural network and the challenges of high-dimensional datasets in machine learning. The theoretical framework of this research provides an analytical view to model and understand the problem we are approaching to deliver quantum deep learning utility with a novel hybrid quantum deep learning model. A. Binary Classifications using Convolutional Neural Network (CNN) Binary classification is a commonly seen classification and machine learning problem in which algorithms aim to correctly identify the input data by binary classes. The mathematical model that can describe binary classification generally revolves around finding a function that maps input features to a binary output (0 or 1, representing the two classes). In binary classification with Convolutional Neural Networks (CNNs), the architecture learns features from images through layers like convolutional layers with filters for feature mapping and ReLU activation functions for non-linearity. Pooling layers" 2312.01025v1,"Adding Domain Knowledge to Query-Driven Learned Databases Peizhi Wu Ryan Marcus Zachary G. Ives University of Pennsylvania pagewu@cis.upenn.edu University of Pennsylvania rcmarcus@cis.upenn.edu University of Pennsylvania zives@cis.upenn.edu ABSTRACT In recent years, learned cardinality estimation has emerged as an alternative to traditional query optimization methods: by training machine learning models over observed query performance, learned cardinality estimation techniques can accurately predict query cardinalities and costs — accounting for skew, correlated predicates, and many other factors that traditional methods struggle to capture. However, query-driven learned cardinality estimators are dependent on sample workloads, requiring vast amounts of labeled queries. Further, we show that state-of-the-art query-driven techniques can make significant and unpredictable errors on queries that are outside the distribution of their training set. We show that these out-of-distribution errors can be mitigated by incorporating the domain knowledge used in traditional query optimizers: constraints on values and cardinalities (e.g., based on key-foreign-key relationships, range predicates, and more generally on inclusion and functional dependencies). We develop methods for semi-supervised query-driven learned query optimization, based on constraints, and we experimentally demonstrate that such techniques can increase a learned query optimizer’s accuracy in cardinality estimation, reduce the reliance on massive labeled queries, and improve the robustness of query end-to-end performance. ACM Reference Format: Peizhi Wu, Ryan Marcus, and Zachary G. Ives. 2023. Adding Domain Knowledge to Query-Driven Learned Databases. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 14 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn 1 INTRODUCTION Cardinality estimation has been a core problem [29] in data management research for decades [42]. A wide variety of cardinality estimation techniques have been developed, such as histograms, sketches, multidimensional histograms [13], sampling and synopses [19], statistics on query expressions [12], learned compensation factors for query predicate estimates [36], and constraint-based bounds (e.g., key-foreign key dependencies [42]. More recently, learned cardinality estimators [21, 22, 27, 38, 48, 51], have shown promise in replacing these often-complex or heuristic techniques with a single general framework using machine learning models. Broadly, learned cardinality estimation techniques can be divided into data-driven methods, such as DeepDB [22] and NeuroCard [51], Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn (a) Consistency Constraint: | 𝑞 ˆ 2 | + | 𝑞 ˆ 3 | = | 𝑞 ˆ 1 | if 𝑞 2 = 𝑞 1 − 𝑞 3 (b) PK-FK Inequality Constraint: | 𝑞 ˆ 1 | ≤ | 𝑞 ˆ 2 | if 𝑞 1 = 𝑞 2 ⊲⊳ 𝑇 Figure 1: Violin plots for MSCN predictions of two ratios of cardinality estimates ( 𝑞 ˆ 𝑖 for each query 𝑞 𝑖 ) that should comply with database constraints. Left (a): consistency constraint over a range selection query that has been partitioned. Correct estimates are indicated by the red dashed line. The left and right sides of the line are too low and too high, respectively. Right (b): PK-FK inequality constraint over keyforeign key join queries. The left side of the red dashed line is possibly correct while the right side is definitely incorrect. which use samples from a database to build a model of data distributions and seek to predict query cardinalities; and query-driven methods such as Deep Sketches [28], which seek to take information from an executed sample workload and learn a model to make accurate cardinality estimations. While data-driven cardinality estimators tend to produce accurate results for a wide variety of queries, query-driven cardinality estimators have a number of advantages, such as low model complexity and fast inference [39]. One of the biggest downsides of query-driven cardinality estimators, however, is their reliance on a training set, which can (1) be expensive to collect, and (2) can result in query-driven models making poor predictions for queries that are highly dissimilar to those in the training set (i.e., “out of distribution” queries) [46]. Query-driven learned cardinality estimators violate “common sense” constraints. Surprisingly, query-driven learned cardinality estimators often make predictions that are not logically consistent with the underlying database. We illustrate two cases of this unexpected behavior in Figure 1: we train an MSCN [27] model to predict queries from DSB benchmark [15], and test various queries with zero or one joins. First, in Figure 1a, we test to see if the predictions made by the MSCN model obey a simple consistency constraint. We do this by generating a range query, 𝑞 1 , which selects all values between randomly generated points 𝑎 and 𝑏. We then pick a random midpoint 𝑚 such that 𝑎 < 𝑚 < 𝑏, and create (i) 𝑞 2 , which scans all data from 𝑎 to 𝑚, and (ii) 𝑞 3 , which scans all data from 𝑚 to 𝑏. Clearly, the cardinality of 𝑞 1 is equal to the cardinality of 𝑞 2 plus the cardinality of 𝑞 3 , but the MSCN model could predict a" 2312.01044v1,"Large Language Models Are Zero-Shot Text Classifiers Zhiqiang Wang, Yiran Pang, Yanbin Lin Department of Electrical Engineering and Computer Science, Florida Atlantic University Boca Raton, FL 33431, USA {zwang2022, ypang2022, liny2020}@fau.edu can effectively predict outcomes on new data [9]. Another drawback of supervised learning is that models are limited to classifying data into known classes, and are incapable of categorizing data into classes that are unseen or not labeled in the training data [10]. Recently, deep learning (DL) methods have outperformed earlier ML algorithms in natural language processing (NLP) tasks. The success of these deep learning algorithms is attributed to their ability to model intricate and non-linear relationships in data [11]. The deep learning models for text and document classification typically involve three fundamental architectures, which are deep neural networks (DNN), recurrent neural network (RNN), and convolutional neural network (CNN). RNN usually works through Long Short-Term Memory networks (LSTM) or Gated Recurrent Units (GRU) architectures for text classification, encompassing an input layer (word embedding), hidden layers, and the output layer [12]. However, DL methods also need dataset labeling and a lot of training data. A dataset labeled with one specific set of classes cannot be repurposed to train a method designed to predict an entirely different set of classes. Apart from these ML-based and DL-based methods, recent progress in NLP has resulted in the development of large language models (LLMs) such as Llama2, ChatGPT. Existing research [13]–[15] suggests that the impressive performance of LLMs holds promise for their potential to address the above limitations. LLMs represent sophisticated language models characterized by their extensive parameter sizes and remarkable learning abilities [16]. The effectiveness of LLMs is commonly credited to their proficiency in few-shot or zeroshot learning within context. Pre-trained LLMs are extensively employed across various sub-disciplines of NLP and are typically recognized for their exceptional ability to learn from a few examples, which is Few-Shot Learning (FSL) [17]. In NLP tasks, both zero-shot learning (ZSL) [18] and FSL are techniques used to enable models to perform tasks they haven’t been explicitly trained on, but they differ in their approach and reliance on training data. In FSL, the model is trained with a handful of labeled task-specific examples [19]. Different from FSL, ZSL directly utilizes pre-trained models to predict both known (seen) and unknown (unseen) classes without requiring any labeled training instances and fine-tuning [20]. FSL is advantageous, even with access to larger datasets, because labeling data is time-consuming and training on extensive data sets can be computationally costly [21]. While ZSL can Abstract—Retrained large language models (LLMs) have become extensively used across various sub-disciplines of natural language processing (NLP). In NLP, text classification problems have garnered considerable focus, but still faced with some limitations related to expensive computational cost, time consumption, and robust performance to unseen classes. With the proposal of chain of thought prompting (CoT), LLMs can be implemented using zero-shot learning (ZSL) with the step-bystep reasoning prompts, instead of conventional question-andanswer formats. The zero-shot LLMs in the text classification problems can alleviate these limitations by directly utilizing pre-trained models to predict both seen and unseen classes. Our research primarily validates the capability of GPT models in text classification. We focus on effectively utilizing prompt strategies to various text classification scenarios. Besides, we compare the performance of zero-shot LLMs with other state-ofthe-art text classification methods, including traditional machine learning methods, deep learning methods, and ZSL methods. Experimental results demonstrate that the performance of LLMs underscores their effectiveness as zero-shot text classifiers in three of the four datasets analyzed. The proficiency is especially advantageous for small businesses or teams that may not have extensive knowledge in text classification. Index Terms—Zero-shot text classification, large language models, text classification, Chat GPT-4, Llama2. I. I NTRODUCTION Text classification is considered the most fundamental and crucial task in the field of natural language processing. Over the past several decades, text classification issues have received extensive attention and have been effectively tackled in numerous practical applications [1]–[3]. These applications contain sentiment analysis [4], topic labeling [5], question answering [6] and dialog act classification [7]. Due to the information explosion, processing and classifying large amounts of text data manually is a time-consuming and challenging. Therefore, introducing machine learning methods for text classification tasks is indispensable. The majority of text classification systems can typically be separated into four key stages: Feature Extraction, Dimension Reduction, Classifier Selection, and Evaluation [8]. For the classifier, traditional and popular machine learning (ML) methods include logistic regression (LR), Multinomial Naive Bayes (MNB), Logistic Regression (LG), k-nearest neighbor (KNN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest, and Adaboost. These supervised ML methods face significant limitations, primarily that it requires extensive amounts of task-specific, labeled data for training before it 1" 2312.01045v1,"PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks 1 st Yisheng Zhong, 2 nd Li-Ping Wang ∗ State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China {zhongyisheng,wangliping}@iie.ac.cn Abstract—Federated Learning (FL) faces two major issues: privacy leakage and poisoning attacks, which may seriously undermine the reliability and security of the system. Overcoming them simultaneously poses a great challenge. This is because privacy protection policies prohibit access to users’ local gradients to avoid privacy leakage, while Byzantine-robust methods necessitate access to these gradients to defend against poisoning attacks. To address these problems, we propose a novel privacy-preserving Byzantine-robust FL framework PROFL. PROFL is based on the two-trapdoor additional homomorphic encryption algorithm and blinding techniques to ensure the data privacy of the entire FL process. During the defense process, PROFL first utilize secure Multi-Krum algorithm to remove malicious gradients at the user level. Then, according to the Pauta criterion, we innovatively propose a statistic-based privacypreserving defense algorithm to eliminate outlier interference at the feature level and resist impersonation poisoning attacks with stronger concealment. Detailed theoretical analysis proves the security and efficiency of the proposed method. We conducted extensive experiments on two benchmark datasets, and PROFL improved accuracy by 39% to 75% across different attack settings compared to similar privacy-preserving robust methods, demonstrating its significant advantage in robustness. Index Terms—Federated Learning, Poisoning Attack, Privacy- Preserving, Defense Strategy. I. I NTRODUCTION Federated Learning (FL) allows data owners to enhance the efficiency and accuracy of global models without exposing their private data. FL has broad potential applications in fields such as healthcare [1] and finance [2]. However, FL also faces problems including privacy leakage and poisoning attacks, which pose a threat to its security and reliability. Privacy leakage that results in data security issues is the first major threat faced by FL. As the gradients contain some private information, uploading them directly to the central server without undergoing special treatment can result in leakage issues [3]. Poisoning attack leading to a decrease in model reliability is the another major threat to FL. Byzantine adversaries employ poisoning attacks to manipulate malicious participants and intentionally inject harmful information into the uploaded gradient. This manipulation leads to gradient deviation, ultimately undermining model performance [4] and altering model decisions [5]. Therefore, developing a FL mechanism that simultaneously preserves privacy and resists poisoning attacks is crucial to making FL a trustworthy and reliable technique. However, there are still two important obstacles to achieving such a FL system. One is that privacy-preserving FL aims to guarantee the indistinguishability of the data, while defensive approaches necessitate access to local gradients and use similarity measures to distinguish malicious gradients from benign gradients, which seems paradoxical. The other is that there are now cunning Byzantine adversaries who make poisoning gradient attacks more covert. For example, some camouflage methods [6] are capable of analyzing the range of parameter changes that the defender cannot detect and then evade defense mechanisms. Recent approaches achieve a balance between privacy and robustness. For instance, PEFL [7] utilizes the Pearson correlation coefficient to identify outliers, employing a dual-server model for secure computation where trusted servers hold keys to collaborate with additive homomorphic encryption algorithms. The ShieldFL [8] adopts Two-trapdoor homomorphic encryption technology to relax the trust requirement for servers, using cosine similarity to identify malicious gradients. However, their robustness and privacy are not ideal. To address the above issues, we proposes a composite privacy-preserving Byzantine-robust algorithm called PROFL. It performs two-trapdoor additional homomorphic algorithm (AHE) [9] and blinding techniques on two non-colluding servers to prevent privacy leakage during the defense process. In addition, PROFL first uses the multi-krum algorithm [4] based on the Euclidean distance as the similarity measure to detect and eliminate poisoning gradients at the user level. Then, PROFL uses statistical methods based on the Pauta criterion to eliminate outliers at the feature level, thereby resisting concealed impersonation poisoning attack. Such a composite defense can defend against malicious gradient attacks from macro and micro perspectives simultaneously. The main contributions are summarized as follows. ● We propose a composite robust mechanism to counter both general and concealed poisoning attacks. Across multiple attack scenarios, compared to similar ap-" 2312.01052v1,"Structured, Complex and Time-complete Temporal Event Forecasting Yunshan Ma 1* , Chenchen Ye 2* , Zijian Wu 1∗ , Xiang Wang 3† , Yixin Cao 4 , Liang Pang 5 , Tat-Seng Chua 1 1 National University of Singapore, 2 University of California, Los Angeles, 3 University of Science and Technology of China, 4 Singapore Management University, 5 Institute of Computing Technology, Chinese Academy of Sciences yunshan.ma@u.nus.edu, ccye@cs.ucla.edu, zijian.wu@u.nus.edu, xiangwang1223@gmail.com, caoyixin2011@gmail.com, pangliang@ict.ac.cn, dcscts@nus.edu.sg 1 Introduction Temporal Event (TE) forecasting conceptually targets at predicting a future event based on historically observed facts. People seek to mine the rules that govern the evolution of various events, in order to facilitate disaster prevention or early warning in various areas, such as civil unrest or regional conflict. Due to its significant value, event forecasting has attracted more and more attention from various research communities. Albeit the previous diverse formulations of TE forecasting, we highlight three key properties that are crucial for both representation and forecasting of TE, i.e., Structured, Complex, and Time- ∗ Equal contribution. Corresponding author. Xiang Wang is also affiliated with Institute of Artificial Intelligence, Institute of Dataspace, Hefei Comprehensive National Science Center. † Datasets Time Series RCT-B Storyline News14, WCEP TKG GDELT, ICEWS TCE w Schema General, IED Structured Complex Time-complete SCTc-TE (ours) MidEast-TE (a) Comparison between our SCTc-TE and previous formulations. Covid-19 RU-UKR War Fed Increase Interest &− ' &− ( & e Temporal event forecasting aims to predict what will happen next given the observed events in history. Previous formulations of temporal event are unstructured, atomic, or lacking full temporal information, thus largely restricting the representation quality and forecasting ability of temporal events. To address these limitations, we introduce a novel formulation for Structured, Complex, and Time-complete Temporal Event (SCTc-TE). Based on this new formulation, we develop a simple and fully automated pipeline for constructing such SCTc- TEs from a large amount of news articles. Furthermore, we propose a novel model that leverages both Local and Global contexts for SCTc- TE forecasting, named LoGo. To evaluate our model, we construct two large-scale datasets named MidEast-TE and GDELT-TE. Extensive evaluations demonstrate the advantages of our datasets in multiple aspects, while experimental results justify the effectiveness of our forecasting model LoGo. We release the code and dataset via https://github.com/yecchen/G DELT-ComplexEvent. Formulation ti m Abstract entity relation (atomic event type) (b) Illustration of SCTc-TE. X-Y bilateral relation Local Context Global Context (X, ?, Y) Complex Event (c) Effects of local/global contexts. Figure 1: (a) Comparison between our SCTc-TE formulation and previous TE formulations; (b) An illustration of our SCTc-TE formulation; (c) The motivation of leveraging both local and global contexts. complete. First, structured representations, such as Temporal Knowledge Graph (TKG) (Cai et al., 2022) or Temporal Complex Event (TCE) with schema (Li et al., 2021a), are simple and flexible for indexing and query, and the concise format of structured data enables the storing of large-scale events with limited memory. In contrast, other unstructured formulations, such as time series (Morstatter, 2021) or natural language (Caselli and Vossen, 2017a), are either non-flexible to represent multiline of events or redundant due to natural language representation. Second, Complex Event (CE), which is composed by a set of atomic events (Li et al., 2021a), is capable of capturing multiple actors, relations, and timelines, thus satisfying various requirements in practice. Conversely, the formulations of atomic event, such as GDELT (Leetaru and Schrodt, 2013) or ACE2005 (Walker et al., 2006), are restricted to individual events that cannot model the complex scenarios or even perform forecasting. Third and more importantly, the timecomplete characteristic, which means that every atomic event in a certain complex event has its" 2312.01056v1,"Investigating the Surrogate Modeling Capabilities of Continuous Time Echo State Networks Saakaar Bhatnagar † saakaar@stanford.edu December 5, 2023 Keywords: Echo State Networks; Surrogate Modeling; Data-Driven Modeling; Ordinary Differential Equations Abstract Continuous Time Echo State Networks (CTESN) are a promising yet under-explored surrogate modeling technique for dynamical systems, particularly those governed by stiff Ordinary Differential Equations (ODEs). This paper critically investigates the effects of important hyper-parameters and algorithmic choices on the generalization capability of CTESN surrogates on two benchmark problems governed by Robertson’s equations. The method is also used to parametrize the initial conditions of a system of ODEs that realistically model automobile collisions, solving them accurately up to 200 times faster than numerical ODE solvers. The results of this paper demonstrate the ability of CTESN surrogates to accurately predict sharp transients and highly nonlinear system responses, and their utility in speeding up the solution of stiff ODE systems, allowing for their use in diverse applications from accelerated design optimization to digital twins. 1 Introduction Modeling dynamic systems using scientific machine learning (SciML) techniques is a rapidly growing field with advanced ML architectures being applied to model complex problems across a diverse range of applications. Some examples are rapid design optimization [1], real-time health monitoring [2], turbulent flow modeling [3], and materials discovery [4]. Many of these applications utilize a ” surrogate model ” that makes real-time predictions of the system behavior in place of full-order models that would be too slow or expensive for the application. Recently, Echo State Networks (ESNs) have seen an increase in popularity for modeling highly nonlinear and chaotic phenomena in domains such as optimal control planning [5], chaotic time series prediction [6, 7], signals analysis [8] and even turbulent fluid flow [9]. These applications leverage the ability of ESNs to capture highly nonlinear transient behavior accurately, as well as the extremely low cost of training them. One of the biggest limitations, however, for using the standard ESN implementation in the surrogate modeling of nonlinear dynamical systems, is that the available training data may not be uniformly sampled in time. A particular example of this is the numerical solution of stiff systems of Ordinary Differential Equations (ODEs) from ODE solvers. An ODE system is said to be stiff if it has regions in time where the time step needs to be very small in order for the solving numerical method to remain stable. This often occurs in systems where there are phenomena occurring at vastly different time scales. Numerical ODE solvers overcome the instability due to stiffness by having a variable time step size during the solve, leading to uneven sampling of the solution in time. A variant of ESNs, called Continuous Time Echo State Networks or CTESNs has been proposed [10] to address this issue. CTESNs have been successfully employed in various applications from accelerating predictions of power system dynamics [11] to accelerating solutions of pharmacology models [12]. CTESNs have demonstrated superior modeling capability compared to several other surrogate † Corresponding Author 1" 2312.01061v1,"Spectral-wise Implicit Neural Representation for Hyperspectral Image Reconstruction Huan Chen ∗ , Wangcai Zhao ∗ , Tingfa Xu † , Guokai Shi, Shiyun Zhou, Peifu Liu, Jianan Li † Abstract—Coded Aperture Snapshot Spectral Imaging (CASSI) reconstruction aims to recover the 3D spatial-spectral signal from 2D measurement. Existing methods for reconstructing Hyperspectral Image (HSI) typically involve learning mappings from a 2D compressed image to a predetermined set of discrete spectral bands. However, this approach overlooks the inherent continuity of the spectral information. In this study, we propose an innovative method called Spectral-wise Implicit Neural Representation (SINR) as a pioneering step toward addressing this limitation. SINR introduces a continuous spectral amplification process for HSI reconstruction, enabling spectral super-resolution with customizable magnification factors. To achieve this, we leverage the concept of implicit neural representation. Specifically, our approach introduces a spectralwise attention mechanism that treats individual channels as distinct tokens, thereby capturing global spectral dependencies. Additionally, our approach incorporates two components, namely a Fourier coordinate encoder and a spectral scale factor module. The Fourier coordinate encoder enhances the SINR’s ability to emphasize high-frequency components, while the spectral scale factor module guides the SINR to adapt to the variable number of spectral channels. Notably, the SINR framework enhances the flexibility of CASSI reconstruction by accommodating an unlimited number of spectral bands in the desired output. Extensive experiments demonstrate that our SINR outperforms baseline methods. By enabling continuous reconstruction within the CASSI framework, we take the initial stride toward integrating implicit neural representation into the field. Index Terms—Hyperspectral image reconstruction, implicit neural representation, spectral continuity I. I NTRODUCTION H YPERSPECTRAL images (HSIs) provide valuable insights into our environment, capturing intricate spatial and continuous spectral information in three-dimensional (3D) tensors. Every pixel’s intensity across the spectral range is meticulously documented, forming a comprehensive visual mosaic [1]–[7]. However, this wealth of data presents challenges. Conventional 2D sensors require multiple captures to construct a 3D data cube, limiting real-time scene imaging [8]. The inventive Coded Aperture Snapshot Spectral Imaging (CASSI) system [9]–[13] emerges as a solution. It employs Huan Chen, Wangcai Zhao, Tingfa Xu, Shiyun Zhou, Peifu Liu and Jianan Li are with Beijing Institute of Technology, Beijing 10081, China. Email: {huanchen, wczhao24, ciom xtf1, zhoushiyun, 3220185049, laprf, lijianan}@bit.edu.cn Tingfa Xu is also with Big Data and Artificial Intelligence Laboratory, Beijing Institute of Technology Chongqing Innovation Center, Chongqing 401135, China. Guokai Shi is with North Automatic Control Technology Institute; Taiyuan 030006, China. Email: guokai shi@163.com ∗ Equal contribution. † Correspondence to: Tingfa Xu and Jianan Li. Fig. 1. Correlation and Complementarity among HSI Spectral Channels Spatial information in adjacent spectral channels displays significant correlation, as evidenced by the similarity between 2D images rendered at 450.0nm and 472.2nm. Conversely, spatial information with substantial wavelength differences complements each other. This is evident in the corresponding 2D images at 450.0nm and 650.0nm, which capture distinct portions of the RGB image’s spatial structure. mask modulation and spectral compression to generate a compacted 2D tensor. This tensor is then reconstructed into a complete 3D HSI cube using intricate algorithms [14], [15]. Expanding on CASSI, researchers focus on precise spatial information recovery. Conventional methods use prior regularization like total variation [16], [17], non-local similarity [18], [19], and sparsity [11], [20]. Deep convolutional neural networks map 2D measurements to HSIs. However, most treat HSI spectra as discrete bands [21]–[23]. In the natural visual world, spectra and sensor responses are continuous. Each HSI pixel holds a comprehensive spectral profile. Models using spectral separation-based methods are limited by fixed spectral band reconstruction. Changing HSI bands requires retraining, elevating time costs and impeding CASSI’s practicality. Discrete HSI reconstruction loses spectral features [24], sacrificing fidelity. This study aims to enhance CASSI reconstruction flexibility and optimize spectral fidelity. We propose a single model capable of reconstructing HSIs with various spectral resolutions, negating the requirement to train separate models for distinct spectral band counts. Our motivation draws from the achievements of Implicit Neural Representation (INR) networks, as seen in their success in 3D object and scene representation [25], [26], and continuous 2D image superresolution [27]. Hence, we approach the CASSI reconstruction problem through an INR perspective. INR involves establishing relationships between continuous coordinate mappings Copyright © 20xx IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending an email to pubs-permissions@ieee.org." 2312.01064v1,"Research in Astron. Astrophys. Vol.0 (20xx) No.0, 000–000 http://www.raa-journal.org http://www.iop.org/journals/raa (L A TEX: main.tex; printed on December 5, 2023; 2:24) R esearch in A stronomy and A strophysics Received 20xx month day; accepted 20xx month day Application of Regularization Methods in the Sky Map Reconstruction of the Tianlai Cylinder Pathfinder Array Kaifeng Yu 1,2,3 , Shifan Zuo 1,2 , Fengquan Wu 1,2 , Yougang Wang 1,2 and Xuelei Chen ∗1,2,3,4,5 1 National Astronomical Observatories, Chinese Academy of Sciences, Beijing 100101, China; Key Laboratory of Radio Astronomy and Technology, Chinese Academy of Sciences, Beijing 100101, China; 3 School of Astronomy and Space Science, University of Chinese Academy of Sciences, Beijing 100049, China 4 Key Laboratory of Cosmology and Astrophysics (Liaoning) & College of Sciences, Northeastern University, Shenyang 110819, China 5 Center of High Energy Physics, Peking University, Beijing 100871, China. ∗ xuelei@cosmology.bao.ac.cn 2 Abstract The Tianlai cylinder pathfinder is a radio interferometer array to test 21 cm intensity mapping techniques in the post-reionization era. It works in passive drift scan mode to survey the sky visible in the northern hemisphere. To deal with the large instantaneous field of view and the spherical sky, we decompose the drift scan data into m-modes, which are linearly related to the sky intensity. The sky map is reconstructed by solving the linear interferometer equations. Due to incomplete uv coverage of the interferometer baselines, this inverse problem is usually ill-posed, and regularization method is needed for its solution. In this paper, we use simulation to investigate two frequently used regularization methods, the Truncated Singular Value Decomposition (TSVD), and the Tikhonov regularization techniques. Choosing the regularization parameter is very important for its application. We employ the generalized cross validation (GCV) method and the L-curve method to determine the optimal value. We compare the resulting maps obtained with the different regularization methods, and for the different parameters derived using the different criteria. While both methods can yield good maps for a range of regularization parameters, in the Tikhonov method the suppression of noisy modes are more gradually applied, produce more smooth maps which avoids some visual artefacts in the maps generated with the TSVD method. Key words: radio interferometer — map reconstruction — inverse problem 1 INTRODUCTION The Tianlai experiment is designed to develop and test the H I Intensity Mapping (IM) technique (Chen 2012; Li et al. 2020), in which the large scale distribution of neutral hydrogen is observed at low angular resolutions without resolving individual galaxies. This allows fast survey speed to cover the large volume required for cosmological studies (Chang et al. 2008). This technique has been applied to the observation of the Green Bank Telescope (GBT) and the Parkes telescope (Chang et al. 2010; Masui et al. 2013; Switzer et al. 2013; Wolz et al. 2017; Anderson et al. 2018; Wolz et al. 2021). Other existing" 2312.01065v1,"Scholarly Knowledge Graph Construction from Published Software Packages Muhammad Haris 1[0000−0002−5071−1658] , Sören Auer 2,1[0000−0002−0698−2864] , and Markus Stocker 2,1[0000−0001−5492−3212] 1 L3S Research Center, Leibniz University Hannover 30167, Hannover, Germany haris@l3s.de 2 TIB—Leibniz Information Centre for Science and Technology, Germany {markus.stocker,auer}@tib.eu Abstract. The value of structured scholarly knowledge for research and society at large is well understood, but producing scholarly knowledge (i.e., knowledge traditionally published in articles) in structured form remains a challenge. We propose an approach for automatically extracting scholarly knowledge from published software packages by static analysis of their metadata and contents (scripts and data) and populating a scholarly knowledge graph with the extracted knowledge. Our approach is based on mining scientific software packages linked to article publications by extracting metadata and analyzing the Abstract Syntax Tree (AST) of the source code to obtain information about the used and produced data as well as operations performed on data. The resulting knowledge graph includes articles, software packages metadata, and computational techniques applied to input data utilized as materials in research work. The knowledge graph also includes the results reported as scholarly knowledge in articles. Our code is available on GitHub at the following link: https://github.com/mharis111/parse-software-scripts. Keywords: Analyzing Software Packages · Code Analysis · Abstract Syntax Tree · Open Research Knowledge Graph · Scholarly Communication · Machine Actionability 1 Introduction Scholarly artefacts (articles, datasets, software, etc.) are proliferating rapidly in diverse data formats on numerous repositories [3]. The inadequate machine support in data processing motivates the need to extract essential scholarly knowledge published via these artefacts and represent extracted knowledge in structured form. This enables building databases that power advanced services for scholarly knowledge discovery and reuse. We propose an approach for populating a scholarly knowledge graph (specifically, the Open Research Knowledge Graph) with structured scholarly knowledge automatically extracted from software packages. The main purpose of the knowledge graph is to capture information about the materials and methods used in" 2312.01066v1,"A Database System for State Management in Stateful Network Service Function Chains [Vision] Zhonghao Yang Shuhao Zhang Information Systems Technology and Design Singapore University of Technology and Design Singapore zhonghao yang@mymail.sutd.edu.sg School of Computer Science and Engineering Nanyang Technological University Singapore shuhao.zhang@ntu.edu.sg Abstract—Network Function Virtualization (NFV) heralds a transformative era in network function deployment, enabling the orchestration of Service Function Chains (SFCs) for delivering complex and dynamic network services. Yet, the development and sustenance of stateful SFCs remain challenging, with intricate demands for usability in SFC development, performance, and execution correctness. In this paper, we present DB4NFV, a database system designed to address these challenges. Central to DB4NFV is the integration of transactional semantics into the entire lifecycle of stateful SFC, a core idea that enhances all aspects of the system. This integration provides an intuitive and well-structured API, which greatly simplifies the development of stateful SFCs. Concurrently, transactional semantics facilitate the optimization of runtime performance by efficiently leveraging modern multicore architectures. Moreover, by encapsulating state operations as transactions, DB4NFV achieves robustness, even at the entire chain level, ensuring reliable operation across varying network conditions. Consequently, DB4NFV marks a substantial forward leap in NFV state management, leveraging transactional semantics to achieve a harmonious blend of usability, efficiency, and robustness, thus facilitating the effective deployment of stateful SFCs in contemporary network infrastructures. Index Terms—Network Function Virtualization (NFV), State Management, Database Systems, Transactional Semantics I. I NTRODUCTION Network Function Virtualization (NFV) has brought about a paradigm shift in network architectures by transitioning from traditional, hardware-dependent networking functions to agile, software-driven Virtualized Network Functions (VNFs) [1]. Central to this shift are stateful Service Function Chains (SFCs), where the management of dynamic states across interconnected VNFs becomes a pivotal concern. The effective handling of these states is crucial as it dictates the performance, correctness, reliability, and scalability of the SFCs in response to network dynamics [2]–[7]. The complexity inherent in managing stateful SFCs is further amplified by the need to meet stringent correctness demands, such as Chain-Output Equivalence (COE) [8], highlighting the intricate and multifaceted nature of state management in the evolving landscape of NFV. Figure 1 depicts a representative stateful SFC composed of four types of network functions: a stateful firewall, a load balancer, a trojan detector [9], and a portscan detector [10]. Each VNF operates across multiple instances Firewall Traffic Firewall Firewall Load Balancer Trojan Trojan Detector Detector Load Balancer Portscan Portscan Detector Detector Traffic State Manager Fig. 1: An Example of Stateful Service Function Chain with a Conceptual State Manager. for enhanced performance and reliability. In this configuration, the firewall instances manage per-flow security states, essential for identifying and mitigating malicious activities, and operate primarily on local instance memory for per-flow state access. In contrast, the load balancer, trojan detector, and portscan detector necessitate collaborative management of shared states across multiple flows. For example, a load balancer instance, upon processing a new connection request, consults and updates the shared state to route the request to the optimally loaded host. The challenge of state management intensifies in scenarios involving network dynamics, such as scaling, load balancing, and fault tolerance, where states and traffic flows necessitate efficient redistribution or recovery among instances [8]. The integration of a conceptual state manager in this architecture abstracts data storage and concurrency control through well-defined interfaces. This abstraction enables instances to seamlessly access and manipulate state objects as needed, thereby obviating the requirement for frequent cross-instance state transfers. Such an approach not only isolates state management from VNF execution logic but also empowers developers to more effectively implement and adapt concurrency control and failure recovery strategies in response to evolving network conditions. The concept of decoupling state management from NFV, despite being proposed in prior research [11], presents three fundamental challenges that are yet to be comprehensively addressed. Firstly, the integration of increasingly complex network functions into modern SFCs necessitates NFV platforms that offer enhanced usability to streamline the development process. Secondly, the latency sensitivity inherent" 2312.01072v1,"Temporal Credit Assignment in Deep RL A Survey of Temporal Credit Assignment in Deep Reinforcement Learning Eduardo Pignatelli e.pignatelli@ucl.ac.uk University College London Johan Ferret jferret@google.com Google DeepMind Matthieu Geist mfgeist@google.com Google DeepMind Thomas Mesnard mesnard@google.com Google DeepMind Hado van Hasselt hado@google.com Google DeepMind Laura Toni l.toni@ucl.ac.uk University College London Abstract The Credit Assignment Problem (CAP) refers to the longstanding challenge of Reinforcement Learning (RL) agents to associate actions with their long-term consequences. Solving the CAP is a crucial step towards the successful deployment of RL in the real world since most decision problems provide feedback that is noisy, delayed, and with little or no information about the causes. These conditions make it hard to distinguish serendipitous outcomes from those caused by informed decision-making. However, the mathematical nature of credit and the CAP remains poorly understood and defined. In this survey, we review the state of the art of Temporal Credit Assignment (CA) in deep RL. We propose a unifying formalism for credit that enables equitable comparisons of state of the art algorithms and improves our understanding of the trade-offs between the various methods. We cast the CAP as the problem of learning the influence of an action over an outcome from a finite amount of experience. We discuss the challenges posed by delayed effects, transpositions, and a lack of action influence, and analyse how existing methods aim to address them. Finally, we survey the protocols to evaluate a credit assignment method, and suggest ways to diagnoses the sources of struggle for different credit assignment methods. Overall, this survey provides an overview of the field for new-entry practitioners and researchers, it offers a coherent perspective for scholars looking to expedite the starting stages of a new study on the CAP, and it suggests potential directions for future research. 1" 2312.01082v1,"On the Effects of Randomness on Stability of Learning with Limited Labelled Data: A Systematic Literature Review BRANISLAV PECHER ∗ , Faculty of Information Technology, Brno University of Technology, Czechia IVAN SRBA, Kempelen Institute of Intelligent Technologies, Slovakia MARIA BIELIKOVA † , Kempelen Institute of Intelligent Technologies, Slovakia Learning with limited labelled data, such as few-shot learning, meta-learning or transfer learning, aims to effectively train a model using only small amount of labelled samples. However, these approaches were observed to be excessively sensitive to the effects of uncontrolled randomness caused by non-determinism in the training process. The randomness negatively affects the stability of the models, leading to large variance in results across training runs. When such instability is disregarded, it can unintentionally, but unfortunately also intentionally, create an imaginary perception of research progress. Recently, this area started to attract a research attention and the number of relevant studies is continuously growing. In this survey, we provide a comprehensive overview of 134 papers addressing the effects of randomness on the stability of learning with limited labelled data. We distinguish between four main tasks addressed in the papers (investigate/evaluate; determine; mitigate; benchmark/compare/report randomness effects), providing findings for each one. Furthermore, we identify and discuss seven challenges and open problems together with possible directions to facilitate further research. The ultimate goal of this survey is to emphasise the importance of this growing research area, which so far has not received appropriate level of attention. CCS Concepts: • General and reference → Surveys and overviews; • Computing methodologies → Artificial intelligence; Machine learning; Learning paradigms. Additional Key Words and Phrases: randomness, stability, meta-learning, transfer learning, language model fine-tuning, in-context learning, literature survey 1 INTRODUCTION The approaches for learning with limited labelled data are designed to achieve high performance of the machine learning models even with few labels available [8, 66, 74, 75]. Under the term learning with limited labelled data we understand any approach that is designed to work with the lack of labels, without any constraint on how the labelled samples are distributed, i.e., whether all the samples are from a single task or are distributed across different tasks. Although similar to the notion of few-shot learning, it represents a broader scope encompassing a larger number of possible approaches (some of which are incorrectly categorised as few-shot learning in current practice). To deal with the limited labels, the approaches utilise additional information from different sources [8, 74, 75]. A popular option is to transfer knowledge from similar tasks and datasets using transfer learning. For example, in the NLP domain it is common to use language model fine-tuning, where a language model pre-trained on a large set of unlabelled data (from unrelated domain) is fine-tuned for the specific downstream task or problem statement using only few labelled samples available for it [17, 49, 59, 78]. Another emerging technique is the in-context learning, where a large pre-trained language model is “prompted“ to predict a label for a single test sample by presenting it with a concatenation of few labelled samples and the test sample, without requiring any parameter update [8, 40]. Finally, meta-learning is often used, where the model is explicitly trained to quickly ∗ Also with Kempelen Institute of Intelligent Technologies. † Also with slovak.AI. Authors’ addresses: Branislav Pecher, Faculty of Information Technology, Brno University of Technology, Brno, Czechia, branislav.pecher@kinit.sk; Ivan Srba, Kempelen Institute of Intelligent Technologies, Bratislava, Slovakia, ivan.srba@kinit.sk; Maria Bielikova, Kempelen Institute of Intelligent Technologies, Bratislava, Slovakia, maria.bielikova@kinit.sk." 2312.01083v1,"Consistency Prototype Module and Motion Compensation for Few-Shot Action Recognition (CLIP-CPM 2 C) Fei Guo, Li Zhu ∗ , YiKang Wang, Han Qi School of Software Engineering, Xi’an Jiaotong University, China co.fly@stu.xjtu.edu.cn funnyq@stu.xjtu.edu.cn zhuli@xjtu.edu.cn qihan19@stu.xjtu.edu.cn Abstract Recently, few-shot action recognition has significantly progressed by learning the feature discriminability and designing suitable comparison methods. Still, there are the following restrictions. (a) Previous works are mainly based on visual mono-modal. Although some multi-modal works use labels as supplementary to construct prototypes of support videos, they can not use this information for query videos. The labels are not used efficiently. (b) Most of the works ignore the motion feature of video, although the motion features are essential for distinguishing. We proposed a Consistency Prototype and Motion Compensation Network(CLIP-CPM 2 C) to address these issues. Firstly, we use the CLIP for multi-modal few-shot action recognition with the text-image comparison for domain adaption. Secondly, in order to make the amount of information between the prototype and the query more similar, we propose a novel method to compensate for the text(prompt) information of query videos when text(prompt) does not exist, which depends on a Consistency Loss. Thirdly, we use the differential features of the adjacent frames in two directions as the motion features, which explicitly embeds the network with motion dynamics. We also apply the Consistency Loss to the motion features. Extensive experiments on standard benchmark datasets demonstrate that the proposed method can compete with state-of-the-art results. Our code is available at the URL: https://github.com/xxx/xxx.git. 1. Introduction In the realm of computer vision, human action recognition has been widely used in various fields. Video action recognition is an important branch of human action recognition. The application of deep learning in this field has greatly advanced its progress. To achieve this success, we need many manually annotated videos. Unfortunately, acquiring such labeled data in production environments is both time-consuming and labor-intensive, rendering it impractical. A promising solution to this challenge is few-shot action recognition, a paradigm studied by researchers in recent years. This approach enables action recognition without many expensive labels. Few-shot action recognition can be classified according to the following two criteria. The first criterion pertains to ”How to perform the calculation?” and includes three categories: (1) memory-based methods [27, 56, 59]. (2) data-enhancement-based methods [8, 14]. (3) metric-based comparison methods [1, 2, 15, 19, 26, 38, 39, 55]. Metric-based comparison, a crucial method, further divides into a comparison of global semantics and a comparison of temporal information between video frames. The second criterion considers ”What kind of content can be used for calculation?” and encompasses three categories: (1) visual mono-modal [1, 2, 26, 38, 39, 49, 51] (2) visual multi-modal [8, 42, 50, 60]. (3) visual-text multi-modal [23, 36, 45, 48, 56]. Our work belongs to the category of metric-based methods and also belongs to the category of visual-text multi-modal. Through the analysis of previous work, it becomes apparent that in mono-modal approaches, extracting more accurate statistical characteristics of video distribution poses a challenge due to the limited samples in each episode. In contrast, multi-modal methods leverage complementary information, providing a solution to the issue caused by insufficient samples. In recent years, CLIP [28], a largescale visual-language pre-processing model, has used massive image-text pairs from the Internet as training samples for comparative learning, thereby obtaining robust image-text matching accuracy. Researchers have successfully applied the CLIP model in various downstream tasks [10, 16, 44, 52, 57], demonstrating its effectiveness through domain adaptation. In particular, in the domain of action recognition, researchers have conducted extensive studies on the migration of CLIP. The motivation of CLIP in few-shot action recognition is based on that pre-trained visual-language models can be generalized to video tasks. The visual encoder is introduced for the visual features in MORN(2022) [23]. After flat-" 2312.01099v1,"IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. XX, NO. XX, XXXX 2020 Rethinking Multiple Instance Learning for Whole Slide Image Classification: A Bag-Level Classifier is a Good Instance-Level Teacher Hongyi Wang, Luyang Luo, Member, IEEE, Fang Wang, Ruofeng Tong, Yen-Wei Chen, Member, IEEE, Hongjie Hu, Lanfen Lin, Member, IEEE, and Hao Chen, Senior Member, IEEE, Abstract— Multiple Instance Learning (MIL) has demonstrated promise in Whole Slide Image (WSI) classification. However, a major challenge persists due to the high computational cost associated with processing these gigapixel images. Existing methods generally adopt a two-stage approach, comprising a non-learnable feature embedding stage and a classifier training stage. Though it can greatly reduce the memory consumption by using a fixed feature embedder pre-trained on other domains, such scheme also results in a disparity between the two stages, leading to suboptimal classification accuracy. To address this issue, we propose that a bag-level classifier can be a good instance-level teacher. Based on this idea, we design Iteratively Coupled Multiple Instance Learning (ICMIL) to couple the embedder and the bag classifier at a low cost. ICMIL initially fix the patch embedder to train the bag classifier, followed by fixing the bag classifier to fine-tune the patch embedder. The refined embedder can then generate better representations in This work was supported by the National Key Research and Development Project (No. 2022YFC2504605), National Natural Science Foundation of China (No. 62202403), Hong Kong Innovation and Technology Fund (No. PRP/034/22FX), and the Project of Hetao Shenzhen-Hong Kong Science and Technology Innovation Cooperation Zone (HZQB- KCZYB-2020083). It was also supported in part by the Grant in Aid for Scientific Research from the Japanese Ministry for Education, Science, Culture and Sports (MEXT) under the Grant No. 20KK0234, 21H03470. (Corresponding authors: Lanfen Lin, Hao Chen.) Hongyi Wang is with the College of Computer Science and Technology, Zhejiang University, Hangzhou 310063, China (e-mail: whongyi@zju.edu.cn). Luyang Luo is with Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China (e-mail: cseluyang@ust.hk). Fang Wang is with Department of Radiology, Sir Run Run Shaw Hospital, Hangzhou 310016, China (e-mail: wangfang11@zju.edu.cn). Ruofeng Tong is with College of Computer Science and Technology, Zhejiang University, Hangzhou 310063, China, and also with Research Center for Healthcare Data Science, Zhejiang Lab, Hangzhou 311121, China (e-mail: trf@zju.edu.cn). Yen-Wei Chen is with College of Information Science and Engineering, Ritsumeikan University, Kusatsu 5250058, Japan, and also with College of Computer Science and Technology, Zhejiang University, Hangzhou 310063, China (e-mail: chen@is.ritsumei.ac.jp). Hongjie Hu is with Department of Radiology, Sir Run Run Shaw Hospital, Hangzhou 310016, China (e-mail: hongjiehu@zju.edu.cn). Lanfen Lin is with College of Computer Science and Technology, Zhejiang University, Hangzhou 310063, China (e-mail: llf@zju.edu.cn). Hao Chen is with Department of Computer Science and Engineering, the Hong Kong University of Science and Technology, Hong Kong, China, and Department of Chemical and Biological Engineering, The Hong Kong University of Science and Technology, Hong Kong, China. He is also with HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute, Shenzhen, China. (e-mail: jhc@cse.ust.hk). return, leading to a more accurate classifier for the next iteration. To realize more flexible and more effective embedder fine-tuning, we also introduce a teacherstudent framework to efficiently distill the category knowledge in the bag classifier to help the instancelevel embedder fine-tuning. Thorough experiments were conducted on four distinct datasets to validate the effectiveness of ICMIL. The experimental results consistently demonstrate that our method significantly improves the performance of existing MIL backbones, achieving state-of-the-art results. The code is available at: https://github.com/Dootmaan/ICMIL/tree/confidence based Index Terms— Multiple instance learning, Whole slide image, Weakly-supervised learning, Deep learning. I. I NTRODUCTION W HOLE Slide Images (WSIs), which are biomedical images scanned at the microscopic level, have become extensively utilized in cancer diagnosis [1]. Compared to traditional microscope-based observation, WSIs offer advantages such as easier storage and analysis. However, their highresolution nature presents challenges for computer-aided automatic analysis [2], [3], as the currently limited GPU memory makes it infeasible to directly apply existing classification networks to these gigapixel images. To tackle this issue, a widely adopted approach is the patch-based learning scheme [4]–[6], which involves dividing a WSI into multiple small patches and training an end-to-end classification network exclusively on the patch level. Although the patch-level training consumes much less GPU memory, acquiring precise and comprehensive patch-level annotations for WSIs is prohibitively expensive due to their large size and resolution [7]. Therefore, MIL, as a weakly-supervised learning scheme that only requires slide-level labels, has become more and more widely used recently [8]. MIL methods treat each WSI as a bag, and consider the tiled non-overlapping patches within the WSI as the instances in the bag. A bag is classified as positive if at least one of its instances is positive, and as negative only if all instances are negative. To facilitate cost-effective training, the common pipeline for MIL-based WSI analysis typically consists of two stages as shown in Fig. 1(a). The first stage is a non-learnable patch embedding 1" 2312.01109v1,"Kattis vs. ChatGPT: Assessment and Evaluation of Programming Tasks in the Age of Artificial Intelligence DUNDER, N. and LUNDBORG, S. ∗ , KTH Royal Institute of Technology, Sweden WONG, J., Utrecht University, Netherlands VIBERG, O., KTH Royal Institute of Technology, Sweden AI-powered education technologies can support students and teachers in computer science education. However, with the recent developments in generative AI, and especially the increasingly emerging popularity of ChatGPT, the effectiveness of using large language models for solving programming tasks has been underexplored. The present study examines ChatGPT’s ability to generate code solutions at different difficulty levels for introductory programming courses. We conducted an experiment where ChatGPT was tested on 127 randomly selected programming problems provided by Kattis, an automatic software grading tool for computer science programs, often used in higher education. The results showed that ChatGPT independently could solve 19 out of 127 programming tasks generated and assessed by Kattis. Further, ChatGPT was found to be able to generate accurate code solutions for simple problems but encountered difficulties with more complex programming tasks. The results contribute to the ongoing debate on the utility of AI-powered tools in programming education. CCS Concepts: • Applied computing → Education; • Computing technologies → Artificial intelligence; • Hardware → Emerging Technologies. Additional Key Words and Phrases: Programming Education, ChatGPT, Automated Grading, Academic Integrity ACM Reference Format: Dunder, N., Lundborg, S., Wong, J., and Viberg, O.. 2018. Kattis vs. ChatGPT: Assessment and Evaluation of Programming Tasks in the Age of Artificial Intelligence . In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY . ACM, New York, NY, USA, 10 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Programming education is ""an important source of skills and knowledge for students and a necessary feature to survive in a competitive job market"" ( [32], p.2). During the last decade, artificial intelligence(AI)-powered education technologies have been used in programming education to assist teachers in guiding students to acquire programming and computational skills and knowledge [12]. Such AI-powered technologies include various types of intelligent tutoring systems (for an overview, see [6], plagiarism detection tools [5] and auto-grading tools such as Kattis (e.g., [2])). Therefore, AI is not futuristic but actively used in classrooms and courses worldwide [11]. Recently, new kinds of AI-powered tools, namely generative AI technologies - ""a distinct class of AI and an incredibly powerful technology that has been popularized by ChatGPT"" ( [19],p.2) - have rapidly penetrated different parts of our society, including learning and teaching practices in the setting of programming higher education [12, 18, 29, 32]. Whereas earlier research on using AI-powered education tools in programming education has shown related evidence in Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. Manuscript submitted to ACM 1" 2312.01113v1,"International Journal of Information Security https://doi.org/10.1007/s10207-022-00626-2 REGULAR CONTRIBUTION Malicious code detection in android: the role of sequence characteristics and disassembling methods Pinar G. Balikcioglu 1 · Melih Sirlanci 1,2 · Ozge A. Kucuk 1 · Bulut Ulukapi 1 · Ramazan K. Turkmen 1 · Cengiz Acarturk 1,3 © The Author(s) 2022 Abstract The acceptance and widespread use of the Android operating system drew the attention of both legitimate developers and malware authors, which resulted in a significant number of benign and malicious applications available on various online markets. Since the signature-based methods fall short for detecting malicious software effectively considering the vast number of applications, machine learning techniques in this field have also become widespread. In this context, stating the acquired accuracy values in the contingency tables in malware detection studies has become a popular and efficient method and enabled researchers to evaluate their methodologies comparatively. In this study, we wanted to investigate and emphasize the factors that may affect the accuracy values of the models managed by researchers, particularly the disassembly method and the input data characteristics. Firstly, we developed a model that tackles the malware detection problem from a Natural Language Processing (NLP) perspective using Long Short-Term Memory (LSTM). Then, we experimented with different base units (instruction, basic block, method, and class) and representations of source code obtained from three commonly used disassembling tools (JEB, IDA, and Apktool) and examined the results. Our findings exhibit that the disassembly method and different input representations affect the model results. More specifically, the datasets collected by the Apktool achieved better results compared to the other two disassemblers. Keywords Malware detection · LSTM · Natural language processing Abbreviations LSTM Short-term long memory NLP Natural language processing RNN Recurrent neural network DT Decision trees SVM Support vector machines NB Naïve Bayes LR Logistic regression EL Ensemble learning OL Online learning KNN K-nearest neighbor CNN Convolutional neural network B Cengiz Acarturk cengiz.acarturk@uj.edu.pl 1 Cyber Security Department, Middle East Technical University, Ankara, Turkey 2 Computer Science and Engineering Department, Ohio State University, Columbus, OH, USA 3 Cognitive Science Department, Jagiellonian University, Krakow, Poland MLP Multilayer perceptron ISM Instruction as a sequence model BSM Blocks as sequences model MSM Methods as sequences model CSM Classes as sequences model Introduction Android mobile operating system has a market share of 73% for smartphones, and 43% for tablets [1]. Thanks to its open-source feature, the Android operating system offers an affordable and convenient interface for end-users. It also provides a well-established development environment and infrastructure for mobile software developers. Hence, an inevitable consequence is the close attention of malware authors, who target the Android platform by mostly embedding their malicious code into benign applications. Nowadays, malicious code detection, as implemented by antivirus software or anti-malware tools, is a native part 123" 2312.01114v1,"Behavior Research Methods manuscript No. (will be inserted by the editor) TURead: An Eye Movement Dataset of Turkish Reading Cengiz Acartürk · Ayşegül Özkan · Tuğçe Nur Pekçetin · Zuhal Ormanoğlu · Bilal Kırkıcı Received: date / Accepted: date Abstract In this study, we present TURead, an eye movement dataset of silent and oral sentence reading in Turkish, an agglutinative language with a shallow orthography understudied in reading research. TURead provides empirical data to investigate the relationship between morphology and oculomotor control. We employ a target-word approach in which target words are manipulated by word length and by the addition of two commonly used suffixes in Turkish. The dataset contains well-established eye movement variables; prelexical characteristics such as vowel harmony and bigram-trigram frequencies and word features, such as word length, predictability, frequency, eye voice span measures, Cloze test scores of the root word and suffix predictabilities, as well as the scores obtained from two working memory tests. Our findings on fixation parameters and word characteristics are in line with the patterns reported in the relevant literature. Keywords Eye Movements · Oculomotor Control · Silent Reading · Oral Reading · Turkish Cengiz Acartürk Cognitive Science Department, Jagiellonian University, Poland; Cognitive Science Department, Middle East Technical University, Turkey E-mail: acarturk@acm.org Ayşegül Özkan Cognitive Science Department, Jagiellonian University, Poland; Cognitive Science Department, Middle East Technical University, Turkey E-mail: aysglozkn@gmail.com Tuğçe Nur Pekçetin, Zuhal Ormanoğlu Cognitive Science Department, Middle East Technical University, Turkey E-mail: tugce.nur.pekcetin@gmail.com, zuhalormanoglu@gmail.com Bilal Kırkıcı Department of Foreign Language Education, Middle East Technical University, Turkey E-mail: bkirkici@metu.edu.tr" 2312.01126v1,"1 BER Analysis of SCMA-OFDM Systems in the Presence of Carrier Frequency Offset Haibo Liu, Qu Luo, Graduate Student Member, IEEE, Zilong Liu, Senior Member, IEEE, Shan Luo, Pei Xiao, Senior Member, IEEE, and Rongping Lin Abstract—Sparse code multiple access (SCMA) building upon orthogonal frequency division multiplexing (OFDM) is a promising wireless technology for supporting massive connectivity in future machine-type communication networks. However, the sensitivity of OFDM to carrier frequency offset (CFO) poses a major challenge because it leads to orthogonality loss and incurs intercarrier interference (ICI). In this paper, we investigate the bit error rate (BER) performance of SCMA-OFDM systems in the presence of CFO over both Gaussian and multipath Rayleigh fading channels. We first model the ICI in SCMA-OFDM as Gaussian variables conditioned on a single channel realization for fading channels. The BER is then evaluated by averaging over all codeword pairs considering the fading statistics. Through simulations, we validate the accuracy of our BER analysis and reveal that there is a significant BER degradation for SCMA- OFDM systems when the normalized CFO exceeds 0.02. Index Terms—Sparse code multiple access (SCMA), orthogonal frequency division multiplexing (OFDM), carrier frequency offset (CFO), bit error rate (BER) I. I NTRODUCTION Non-orthogonal multiple access (NOMA) has been extensively studied in recent years to meet the stringent requirements such as massive connectivity and higher spectral efficiency in future machine-type communication networks [1]. In a NOMA system, multiple users communicate simultaneously to achieve an overloading factor larger than one [2], [3]. As an important variant of code division multiple access, sparse code multiple access (SCMA) has emerged as a promising NOMA technique [4]. In SCMA, the incoming message bits of each SCMA user are directly mapped to a multi-dimensional sparse codeword drawn from a carefully designed codebook [5]. To deal with asynchronous wireless transmissions, one can build SCMA upon orthogonal frequency division multiplexing (OFDM) [6]–[8], where the resultant system is called SCMA- OFDM. This is because the cyclic prefix (CP) in an OFDM system can help accommodate the inter-user asynchrony and intersymbol interference in uplink channels. In SCMA-OFDM, multi-dimensional sparse codewords are sent over a number of orthogonal subcarriers (SCs), also known as resource elements (REs). Haibo Liu and Shan Luo are with the School of Aeronautics and Astronautics, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China (e-mail: liu hb@std.uestc.edu.cn, luoshan@uestc.edu.cn). Qu Luo and Pei Xiao are with 5G & 6G Innovation Centre, University of Surrey, UK (email: {q.u.luo, p.xiao}@surrey.ac.uk). Zilong Liu is with the School of Computer Science and Electronics Engineering, University of Essex, UK (email: zilong.liu@essex.ac.uk). Rongping Lin is with the School of Information and Communication Engineering, UESTC, Chengdu 611731, China (e-mail: linrp@uestc.edu.cn). Due to its multicarrier feature, nonetheless, an OFDM system may suffer from significant inter-carrier interference (ICI) due to the carrier frequency offset (CFO) caused by inaccurate oscillator clocks. As a matter of fact, CFO may be large and widely present for an array of low-cost and low-end communication sensor devices. In addition, similar to the CFO effect, the deleterious Doppler shifts in moving environments may also lead to ICI. Extensive research activities have been conducted in recent years to understand the detrimental effects of CFO in OFDM systems [9]–[12]. For example, in [9], the ICI was approximated to be a Gaussian distributed noise. In [10], the authors extended the approximation method of [9] to frequency-selective channels in order to derive an improved bit error rate (BER) analysis framework. It should be noted that these works generally assume that the subcarriers in an OFDM symbol are independent. However, this may not held in SCMA-OFDM because CFO simultaneously affects those nonzero codeword elements located in a frequency sub-band. Aiming to address this problem, we carry out a systematic study to analyze the impact of CFO on SCMA-OFDM. Despite a rich body of literature on SCMA, there is a paucity of studies on its accurate error rate performance analysis. The major difficulty lies in the multidimensional sparse codebook nature of SCMA that involves multi-user and multi-carrier transmissions. The error performances of uplink and downlink SCMA over Rayleigh fading channels with a maximum likelihood decoder were analyzed in [13], and a similar study was presented in [14] for uplink SCMA with multiple receive antennas. In this letter, we present a BER analysis for the CFO impaired SCMA-OFDM systems over Gaussian and multipath Rayleigh fading channels. First, the ICI in SCMA-OFDM is approximated by two uncorrelated Gaussian variables and the signal-to-interference-plus-noise ratio (SINR) conditioned on a single channel realization is evaluated. Then, the conditional pair-wise error probability (PEP) is obtained by using the conditional SINR. Finally, the BER is calculated by averaging over the fading statistics and all the transmitted codewords. Our analysis shows that the PEP of SCMA systems affected by CFO can be expressed as the product of a few integrals, where each integral can be expressed by a series of generalized hypergeometric functions. Interestingly, our numerical evaluations indicate that the BER performance of SCMA-OFDM system degrades significantly when the normalized CFO exceeds 0.02," 2312.01129v1,"ControlDreamer: Stylized 3D Generation with Multi-View ControlNet Yeongtak Oh ∗1 , 1 2 Jooyoung Choi ∗1 , Yongsung Kim 2 , Chaehun Shin 1 , Sungroh Yoon †12 Minjun Park 2 , Department of Electrical and Computer Engineering, Seoul National University Interdisciplinary Program in Artificial Intelligence, Seoul National University dualism9306@snu.ac.kr, jy choi@snu.ac.kr, libary753@gmail.com, minjunsz@gmail.com, chaehuny@snu.ac.kr, sryoon@snu.ac.kr Abstract. Recent advancements in text-to-3D generation have significantly contributed to the automation and democratization of 3D content creation. Building upon these developments, we aim to address the limitations of current methods in generating 3D models with creative geometry and styles. We introduce multi-view ControlNet, a novel depth-aware multi-view diffusion model trained on generated datasets from a carefully curated 100K text corpus. Our multi-view ControlNet is then integrated into our two-stage pipeline, ControlDreamer, enabling text-guided generation of stylized 3D models. Additionally, we present a comprehensive benchmark for 3D style editing, encompassing a broad range of subjects, including objects, animals, and characters, to further facilitate diverse 3D generation. Our comparative analysis reveals that this new pipeline outperforms existing text-to-3D methods as evidenced by qualitative comparisons and CLIP score metrics. Keywords: text-to-3D, two-stage pipeline, multi-view diffusion model, ControlNet 1 Introduction 3D content creation is recently gathering attention, particularly in the realms of virtual reality and game development. This evolving landscape has been profoundly impacted by the recent advancement of 2D lifting methods. Dreamfusion’s [25] introduction of score distillation sampling (SDS) has revolutionized and democratized the field, facilitating the generation of 3D models by leveraging large-scale text-to-image diffusion models [1, 29, 31]. This breakthrough has enabled more intuitive and imaginative 3D content creation from user’s textual descriptions. Furthering this evolution, various works show high-resolution textto-3D generation, employing multiple 3D representations [4, 5, 18] or variants of score distillation sampling [10, 37]. * † These authors contributed equally to this work Corresponding author" 2312.01132v1,"The magnetic field does not perform work - or does it? Heinz-Jürgen Schmidt 1 § and Thomas Bröcker 1 1 Universität Osnabrück, Fachbereich Mathematik/Informatik/Physik, Barbarastr. 7, D - 49069 Osnabrück, Germany Abstract. We investigate the question discussed in the literature as to whether the magnetic field can perform work using two models that describe interacting magnetic dipoles. In the first model, the dipoles are realized by rigidly rotating charge clouds, whereas in the second model, one of the two dipoles is described by a real macroscopic spin density. The theoretical foundations of the second model are formulated in a recently published paper. We obtain equations of motion and detailed energy balance equations for both cases, but the answer to the title question depends on the choice of criteria for “magnetic work”. § Correspondence should be addressed to hschmidt@uos.de" 2312.01143v1,"Towards leveraging LLMs for Conditional QA Syed-Amad Hussain 1 , Parag Pravin Dakle 2 , SaiKrishna Rallabandi 2 and Preethi Raghavan 2 1 Ohio State University, Columbus, OH AI Center of Excellence, Fidelity Investments, Boston MA hussain.97@buckeyemail.osu.edu {paragpravin.dakle, saikrishna.rallabandi, preethi.raghavan}@fmr.com 2 Abstract This study delves into the capabilities and limitations of Large Language Models (LLMs) in the challenging domain of conditional question-answering. Utilizing the Conditional Question Answering (CQA) dataset and focusing on generative models like T5 and UL2, we assess the performance of LLMs across diverse question types. Our findings reveal that fine-tuned LLMs can surpass the state-of-the-art (SOTA) performance in some cases, even without fully encoding all input context, with an increase of 7-8 points in Exact Match (EM) and F1 scores for Yes/No questions. However, these models encounter challenges in extractive question answering, where they lag behind the SOTA by over 10 points, and in mitigating the risk of injecting false information. A study with oracle-retrievers emphasizes the critical role of effective evidence retrieval, underscoring the necessity for advanced solutions in this area. Furthermore, we highlight the significant influence of evaluation metrics on performance assessments and advocate for a more comprehensive evaluation framework. The complexity of the task, the observed performance discrepancies, and the need for effective evidence retrieval underline the ongoing challenges in this field and underscore the need for future work focusing on refining training tasks and exploring prompt-based techniques to enhance LLM performance in conditional question-answering tasks. 1 Introduction Contextual question answering (CQA) is a significant area of research in Natural Language Processing, with a multitude of challenges to be addressed for achieving high-performing systems. In CQA, questions are often based on a given context, and the responses should adhere to this context rather than relying solely on pre-existing knowledge. Large Language Models (LLMs) have demonstrated impressive performance across diverse tasks, including CQA, significantly revolutionizing the field of natural language processing. Despite their notable performance, LLMs face several areas for improvement, especially in handling diverse types of questions and conversational contexts. Key challenges persist in understanding complex and ambiguous questions, dealing with memory bias and document grounding, and managing incomplete or missing information. Our findings reveal that fine-tuned LLMs can surpass state-of-the-art (SOTA) performance in some areas, with an increase of 7-8 points in Exact Match (EM) and F1 scores for Yes/No questions. However, the models encounter challenges in extractive question answering, lagging behind the SOTA by over 10 points. Our investigation delves into the performance of LLMs across various question types, including extractive, generative, unanswerable, multi-hop, and incomplete questions. We also explore context retrieval mechanisms and the potential of fine-tuning strategies for evidence-based generation. Despite recent LLMs showing exceptional performance in many tasks, we posit that a fine-tuned approach can achieve state-of-the-art performance, generating accurate, complete responses with justification via extracted evidence. Evaluation techniques employed in our study range from traditional metrics" 2312.01149v1,"Disjoint Dominating and 2-Dominating Sets in Graphs: Hardness and Approximation results Soumyashree Rana a , Sounaka Mishra b , Bhawani Sankar Panda a a Department of Mathematics, Indian Institute of Technology Delhi, New Delhi, 110016, India b Department of Mathematics, Indian Institute of Technology Madras, Chennai, 600036, India Abstract A set D ⊆ V of a graph G = (V, E) is a dominating set of G if each vertex v ∈ V \ D is adjacent to at least one vertex in D, whereas a set D 2 ⊆ V is a 2-dominating (double dominating) set of G if each vertex v ∈ V \ D 2 is adjacent to at least two vertices in D 2 . A graph G is a DD 2 -graph if there exists a pair (D, D 2 ) of dominating set and 2-dominating set of G which are disjoint. In this paper, we solve some open problems posed by M.Miotk, J. Topp and P.Żyliński (Disjoint dominating and 2-dominating sets in graphs, Discrete Optimization, 35:100553, 2020) by giving approximation algorithms for the problem of determining a minimal spanning DD 2 -graph of minimum size (Min- DD 2 ) with an approximation ratio of 3; a minimal spanning DD 2 -graph of maximum size (Max-DD 2 ) with an approximation ratio of 3; and for the problem of adding minimum number of edges to a graph G to make it a DD 2 -graph (Min-to-DD 2 ) with an O(log n) approximation ratio. Furthermore, we prove that Min-DD 2 and Max-DD 2 are APX- complete for graphs with maximum degree 4. We also show that Min-DD 2 and Max- DD 2 are approximable within a factor of 1.8 and 1.5 respectively, for any 3-regular graph. Finally, we show the inapproximability result of Max-Min-to-DD 2 for bipartite graphs, 1 that this problem can not be approximated within n 6 −ε for any ε > 0, unless P=NP. Keywords: Domination, double domination, NP-complete, Approximation algorithm, APX-complete. 1. Introduction Let G = (V, E) be a finite, simple, and undirected graph with vertex set V and edge set E. The graphs considered in this paper are without isolated vertices. A set D ⊆ V is said to be a dominating set of G if each vertex in V \ D has an adjacent vertex in D. The minimum cardinality among all dominating sets of G is the domination number of G, and it is denoted by γ(G). Likewise, a set D 2 ⊆ V is known as a 2-dominating (double dominating) set of G if each vertex in V \ D 2 has at least two adjacent vertices in D 2 . Email addresses: maz218122@iitd.ac.in (Soumyashree Rana), sounak@iitm.ac.in (Sounaka Mishra), bspanda@maths.iitd.ac.in (Bhawani Sankar Panda) Preprint submitted to Discrete Optimization December 5, 2023" 2312.01156v1,"Efficient Light Source Placement using Quantum Computing Sascha Mücke 1 , Thore Gerlach 2 1 2 Lamarr Institute, TU Dortmund University, Dortmund, Germany Fraunhofer IAIS, Sankt-Augustin, Germany Abstract NP-hard problems regularly come up in video games, with interesting connections to real-world problems. In the game Minecraft, players place torches on the ground to light up dark areas. Placing them in a way that minimizes the total number of torches to save resources is far from trivial. In this paper, we use Quantum Computing to approach this problem. To this end, we derive a QUBO formulation of the torch placement problem, which we uncover to be very similar to another NP-hard problem. We employ a solution strategy that involves learning Lagrangian weights in an iterative process, adding to the ever growing toolbox of QUBO formulations. Finally, we perform experiments on real quantum hardware using real game data to demonstrate that our approach yields good torch placements. Keywords Quantum Computing, QUBO, Constrained Optimization, ADMM, Minecraft 1. Introduction Intriguing scientific problems pop up when you would rather take your mind off them for a while, e.g., when playing video games — although, of course, it comes as no complete surprise to encounter them in this domain. Video games, by nature, pose a wide range of problems that players are expected to solve in order to progress, such as slaying enemies, traversing mazes or solving logical puzzles. Some games have even been shown to be NP-complete [1]. It is, however, a mild surprise to encounter them in Minecraft, which is an exceptionally serene open-world sandbox game developed by Mojang and first published around 2010 1 . In Minecraft, players can roam around a vast world containing mountains, oceans and caves made up entirely of cubic blocks, giving the game its unique and slightly retro visual quality (see Fig. 1). The game has been praised for fostering creativity in children (and adults) and has even been used as a tool for teaching [2]. However, in the darkness of a cave, hostile monsters can spawn on top of blocks that are insufficiently lit, either by the sun or a light source such as a torch or lantern. These monsters will attack the player, who therefore wants to light up dark areas as best as they can while exploring. At the same time, building torches requires valuable resources, which is why the LWDA’23: Lernen, Wissen, Daten, Analysen. October 09–11, 2023, Marburg, Germany $ sascha.muecke@tu-dortmund.de (S. Mücke); thore.gerlach@iais.fraunhofer.de (T. Gerlach) € https://smuecke.de/ (S. Mücke)  0000-0001-8332-6169 (S. Mücke); 0000-0001-7726-1848 (T. Gerlach) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings CEUR Workshop Proceedings (CEUR-WS.org) https://www.minecraft.net/ http://ceur-ws.org ISSN 1613-0073 1" 2312.01157v1,"Quantum dissipative adaptation with cascaded photons T. Ganascini 1 , T. Werlang 1 , and D. Valente 1∗ 1 Instituto de Fı́sica, Universidade Federal de Mato Grosso, Cuiabá, MT, Brazil Classical dissipative adaptation is a hypothetical non-equilibrium thermodynamic principle of self-organization in driven matter, relating transition probabilities with the non-equilibrium work performed by an external drive on dissipative matter. Recently, the dissipative adaptation hypothesis was extended to a quantum regime, with a theoretical model where only one single-photon pulse drives each atom of an ensemble. Here, we further generalize that quantum model by analytically showing that N cascaded single-photon pulses driving each atom still fulfills a quantum dissipative adaptation. Interestingly, we find that the level of self-organization achieved with two pulses can be matched with a single effective pulse only up to a threshold, above which the presence of more photons provide unparalleled degrees of self-organization. I. INTRODUCTION Finding nonequilibrium self-organization principles is a longstanding quest [1–3]. The various behaviors of different nonequilibrium dissipative systems may seem too diverse to obey one set of principles. Yet, as physicists we have witnessed many times in history where unified theories of seemingly distinct phenomena have come to light. For instance, the Boltzmann distribution is a powerful principle relating the energy and the probability distribution for any system at thermal equilibrium with a weakly coupled reservoir. Inspired by that, as well as by living matter [3], the principle of dissipative adaptation as a nonequilibrium version of the Boltzmann distribution has been recently proposed and discussed [4–7]. According to the dissipative adaptation hypothesis, the transition probabilities between pairs of states are most relevant when a dissipative system is driven far from equilibrium, and the work performed by a given drive during the dynamical transition between the initial and the final state can dominate the probabilities with which these transitions occur. To test whether the dissipative adaptation hypothesis is truly a general principle, we should look for it also at the most elementary scales of nature, where only few energy levels are present, temperatures are very low, and quantum coherences as well as quantum fluctuations are significant. Indeed, a quantum dissipative adaptation has been recently found in the case where the source of work is a single-photon pulse, for which quantum fluctuations are far more significant than the average field [8, 9]. In its original formulation, the quantum dissipative adaptation also depends on quantum coherence. A quite counterintuitive effect emerges in that case, namely, the highest average work performed by the photon does not correspond to the highest probability of single-photon absorption. Finally, the quantum version is valid at zero temperatures, a regime forbidden by its classical counterpart. Yet, both the classical and the quantum scenarios ∗ Electronic address: valente.daniel@gmail.com have shown evidence that work is a key thermodynamical quantity to bias the transition probabilities of a fluctuating system, hence determining the degree of stabilization (adaptation) to a given drive. The sketch of the quantum self-organization described here can be seen in Fig.(1). Here, we raise the question of how broadly applicable is the idea of a quantum dissipative adaptation. In particular, we are interested in the cases where quantum self-organization with a single photon is not ideal, i.e., when the transition probability between two ground states of a Λ atom is less then unity after the singlephoton pulse has gone away. Is it true that the more energy is given (by means of more subsequent photon pulses arriving), the more the system adapts, so the higher the degree of self-organization? That would provide a significant analogy with living matter, where we also see the increase of specialization in time provided enough resources. This adds to a flourishing list of other analogies between living matter and dissipative systems, such as self-replication [3, 9, 10] and the emergence of adaptive energy-seeking behavior [11, 12]; photonic systems included [13, 14]. In this paper, we show that the relation between the transition probability and the average work as found for a single photon remains valid if N consecutive pulses of arbitrary shapes reach every atom in the ensemble. Moreover, we show under which conditions a “two-photon environment” may improve the selforganization beyond any possible “single-photon environment”. Our results represent a further step in the direction of promoting the dissipative adaptation hypothesis to a general thermodynamic principle of non-equilibrium self-organization. II. MODEL We consider a global time-independent Hamiltonian of the system and its environment, H = H S + H I + H E . (1)" 2312.01163v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2023 1 A New Learning Paradigm for Foundation Model-based Remote Sensing Change Detection Kaiyu Li, Xiangyong Cao, Deyu Meng Abstract—Change detection (CD) is a critical task to observe and analyze dynamic processes of land cover. Although numerous deep learning-based CD models have performed excellently, their further performance improvements are constrained by the limited knowledge extracted from the given labelled data. On the other hand, the foundation models that emerged recently contain a huge amount of knowledge by scaling up across data modalities and proxy tasks. In this paper, we propose a Bi-Temporal Adapter Network (BAN), which is a universal foundation model-based CD adaptation framework aiming to extract the knowledge of foundation models for CD. The proposed BAN contains three parts, i.e. frozen foundation model (e.g., CLIP), bitemporal adapter branch (Bi-TAB), and bridging modules between them. Specifically, the Bi-TAB can be either an existing arbitrary CD model or some hand-crafted stacked blocks. The bridging modules are designed to align the general features with the task/domain-specific features and inject the selected general knowledge into the Bi-TAB. To our knowledge, this is the first universal framework to adapt the foundation model to the CD task. Extensive experiments show the effectiveness of our BAN in improving the performance of existing CD methods (e.g., up to 4.08% IoU improvement) with only a few additional learnable parameters. More importantly, these successful practices show us the potential of foundation models for remote sensing CD. The code is available at https://github.com/likyoo/BAN and will be supported in our Open-CD † . Index Terms—Change detection, foundation model, visual tuning, remote sensing image processing, deep learning. I. I NTRODUCTION T TH dynamic properties of the Earth’s surface are influenced by a wide range of natural and anthropogenic factors, resulting in constant change. Therefore, analyzing the time-series Remote Sensing (RS) data is an important topic in Earth vision, and change detection (CD) techniques have become an indispensable tool for this task, contributing to the comprehensive interpretation of surface changes. The basic goal of CD is to detect targets or pixels with semantic changes or specific changes between bi-temporal RS images of the same region. Further, the CD can detect, quantify and analyze changes in land cover and has rich applications in several scenarios, e.g., urban expansion [1], [2], natural disaster assessment [3], cropland protection [4], etc. Kaiyu Li and Xiangyong Cao are with the School of Computer Science and Technology and Ministry of Education Key Lab For Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an 710049, China (email: likyoo.ai@gmail.com, caoxiangyong@xjtu.edu.cn) (Corresponding author: Xiangyong Cao). Deyu Meng is with the School of Mathematics and Statistics and Ministry of Education Key Lab of Intelligent Network Security, Xi’an Jiaotong University, Xi’an 710049, China (email: dymeng@mail.xjtu.edu.cn). † An open source CD toolbox: https://github.com/likyoo/open-cd Traditional CD methods are based on manual feature extraction, making it difficult to achieve fast and accurate detection in complex scenarios [5]. In the last decade, deep learning (DL) technologies have greatly contributed to the development of the field of CD. For example, Convolutional Neural Network (CNN) has achieved practical success in CD, and its superior learning ability and automatic feature extraction capability make it powerful to handle complex scenarios [1], [6]–[9]. Recently, the Vision Transformer (ViT) [10] has further energized the field of CD [11], [12] since it can handle arbitrary unstructured data and capture global dependencies in the whole image, which opens up more possibilities for CD. Furthermore, some studies have combined CNNs and ViTs in series or parallel form to explore some more powerful CD capabilities [13]–[17]. In summary, these models have achieved practical success to some extent. However, as the model scale grows, the limited data restricts the performance improvement of the CD models. To alleviate this problem, some studies have been tried in several aspects, e.g., generating more simulation data using generative models [18], constructing more image pairs through data augmentation strategies and single-temporal images [19], [20], etc. However, compared to the millions or even billions of annotated data or image-text pairs in natural images, these generated data are still not able to drive the models to achieve the emergence about capabilities and homogeneity [21]. Recently, the significance of the foundation model has been increasingly recognized in computer vision. Compared to small models customized for specific tasks, the foundation models [22]–[24] show impressive generalization ability across diverse downstream tasks, which inspires us to introduce the foundation model into the CD task. The foundation model refers to models that have been trained on large-scale datasets and are capable of capturing a wide range of knowledge and understanding. The foundation model started with Natural Language Processing (NLP) tasks, typically exemplified by OpenAI’s GPT series [25], and has been widely explored in computer vision and vision-language tasks, e.g. CLIP [22], BLIP [26], SAM [27], etc. These large foundation models allow for cross-domain knowledge transfer and sharing, and reduce the demand for task-specific training data [28]. In other words, even though in most tasks (e.g., CD) it is difficult to train a task-specific large model from scratch due to the limited data and computational source, we can resort to the existing foundation models and adapt them to specific tasks. Some researchers have tried to tune or adapt foundation models to some downstream tasks in natural images and have achieved some success [29], [30]. For Remote Sensing CD," 2312.01166v1,"Enhanced spatial modeling on linear networks using Gaussian Whittle-Matérn fields Somnath Chaudhuri a,b , Maria A. Barceló a,b , Pablo Juan a,c,* , Diego Varga a,b,d , David Bolin e , Håvard Rue e , Marc Saez a,b a Research Group on Statistics, Econometrics and Health (GRECS), University of Girona, Spain b CIBER of Epidemiology and Public Health (CIBERESP), Spain c Department of Mathematics, University of Jaume I, Spain d Department of Geography, University of Girona, Spain e King Abdullah University of Science and Technology, Saudi Arabia Abstract Spatial statistics is traditionally based on stationary models on ℝ 𝑑 like Matérn fields. The adaptation of traditional spatial statistical methods, originally designed for stationary models in Euclidean spaces, to effectively model phenomena on linear networks such as stream systems and urban road networks is challenging. The current study aims to analyze the incidence of traffic accidents on road networks using three different methodologies and compare the model performance for each methodology. Initially, we analyzed the application of spatial triangulation precisely on road networks instead of traditional continuous regions. However, this approach posed challenges in areas with complex boundaries, leading to the emergence of artificial spatial dependencies. To address this, we applied an alternative computational method to construct nonstationary barrier models. Finally, we explored a recently proposed class of Gaussian processes on compact metric graphs, the Whittle-Matérn fields, defined by a fractional SPDE on the metric graph. The latter fields are a natural extension of Gaussian fields with Matérn covariance functions on Euclidean domains to non-Euclidean metric graph settings. A ten-year period (2010-2019) of daily traffic-accident records from Barcelona, Spain have been used to evaluate the three models referred above. While comparing model performance we observed that the Whittle-Matérn fields defined directly on the network outperformed the network triangulation and barrier models. Due to their flexibility, the Whittle-Matérn fields can be applied to a wide range of environmental problems on linear networks such as spatio-temporal modeling of water contamination in stream networks or modeling air quality or accidents on urban road networks. Keywords: Environmental Processes, INLA, Linear Networks, Matérn covariance, SPDE, Whittle-Matérn fields ∗ Corresponding author: juan@uji.es 1" 2312.01172v1,"To appear at the 27th Design, Automation and Test in Europe Conference (DATE’24), Mar 25-27 2024, Valencia, Spain. On-sensor Printed Machine Learning Classification via Bespoke ADC and Decision Tree Co-Design Giorgos Armeniakos ∗ , Paula L. Duarte † , Priyanjana Pal † , Georgios Zervakis ‡ , Mehdi B. Tahoori † , Dimitrios Soudris ∗ ∗ National Technical University of Athens, GR, ‡ University of Patras, GR, † Karlsruhe Institute of Technology, DE ∗ {armeniakos, dsoudris}@microlab.ntua.gr, † {paula.duarte, priyanjana.pal, mehdi.tahoori}@kit.edu, ‡ zervakis@upatras.gr Abstract—Printed electronics (PE) technology provides costeffective hardware with unmet customization, due to their low non-recurring engineering and fabrication costs. PE exhibit features such as flexibility, stretchability, porosity, and conformality, which make them a prominent candidate for enabling ubiquitous computing. Still, the large feature sizes in PE limit the realization of complex printed circuits, such as machine learning classifiers, especially when processing sensor inputs is necessary, mainly due to the costly analog-to-digital converters (ADCs). To this end, we propose the design of fully customized ADCs and present, for the first time, a co-design framework for generating bespoke Decision Tree classifiers. Our comprehensive evaluation shows that our co-design enables self-powered operation of on-sensor printed classifiers in all benchmark cases. Index Terms—Co-design, Decision Tree, Low-Power, Machine Learning, Printed Electronics I. I NTRODUCTION Printed electronics technology, capturing substantial attention, holds promise for computing in various domains yet to embrace it. Examples include smart packaging, disposables (e.g., packaged foods), FMCG, in-situ monitoring, and healthcare products like smart bandages [1]. These domains impose rigorous prerequisites for ultra-low-cost fabrication, unattainable by silicon-based systems. Furthermore, aside from their high costs, silicon systems lack the stretchability, porosity, flexibility, and conformality inherent in printed electronics. While printed circuits exhibit the potential to meet the demands of ultra-low cost (even sub-cent levels) due to their inexpensive additive manufacturing processes, the relatively large feature sizes, inherent in printed electronics, pose a challenge in realizing large-scale integration circuits for onsensor processing. This becomes particularly relevant for Machine Learning (ML) classification circuits, as classification is the primary task for numerous applications in aforementioned domains [2, 3]. Such applications have to classify (analog) data collected from printed sensors to extract useful information. Significant recent research has focused on addressing the intrinsic constraints of printed electronics, aiming to enable the realization of printed-battery-powered printed ML classifiers [2]–[7]. In [2], the authors leverage the substantial customization capabilities stemming from the low fabrication costs of printed circuits, and explored the concept of bespoke ML circuits that are tailored to a specific model. The term “bespoke” signifies fully customized circuit implementations, adapting to individual ML models and dataset, and can be obtained by hardwiring all model parameters in the circuit design. This level of customization is infeasible in conventional silicon-based systems [2]. While bespoke design indeed yields significant area and power gains, further improvements are mandatory to enable printed-battery-powered ML classifiers. The works in [3]–[5] and [6] combined bespoke design with approximate [8] and stochastic [9] computing, respectively, targeting Multilayer Perceptrons and/or Support Vector Machines. However, in most cases, the obtained gains are either inadequate or come at the cost of a considerable accuracy degradation. Leveraging the fact that in printed applications the classification tasks and datasets are relatively simple [2], the authors in [2, 7] utilize Decision Trees due to their implementation simplicity. Combining Decision Trees with bespoke design and approximate computing, [7] delivered promising results. Despite the impressive results demonstrated in the aforementioned works, they all overlook the substantial– potentially dominant–power and area overheads associated with the mandatory analog-to-digital converters (ADCs) for processing sensor data. Thus, their efficiency remains unclear. In this work, we address the limitation of the current stateof-the-art. Our focus goes beyond printed-battery operation; instead, we target the design of self-powered (i.e., using printed energy harvesters) printed classifiers, accounting also for the cost of the ADCs. To achieve this, we adopt Decision Trees as our classification algorithm and propose a modelcircuit co-design framework. To maximize hardware efficiency, we implement bespoke Decision Tree classifiers based on the unary numeric system [10]. As we explain later, this approach may reduce a Decision Tree to a simple two-stage logic. Furthermore, we leverage the high customization in printed circuits and propose the design of bespoke ADCs tailored to our Decision Tree architecture by retaining only the bare minimum of ADC comparators. Finally, we propose and implement an ADC-aware Decision Tree training that identifies parameters that minimize the ADCs cost while still adhering to accuracy requirements. Our evaluation demonstrates that, compared to the state-of-the-art baseline, we reduce the area and power of printed Decision Trees by on average 8.6x and 12.2x, respectively, for less than 1% accuracy degradation. Our novel contributions in this work are as follows: 1) This is the first work that considers and investigates the impact of ADCs in designing digital printed ML classifiers. 2) We propose the first ADC-aware co-design framework" 2312.01191v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Bootstrapping Interactive Image-Text Alignment for Remote Sensing Image Captioning Cong Yang, Zuchao Li, Lefei Zhang, Senior Member Abstract—Recently, remote sensing image captioning has gained significant attention in the remote sensing community. Due to the significant differences in spatial resolution of remote sensing images, existing methods in this field have predominantly concentrated on the fine-grained extraction of remote sensing image features, but they cannot effectively handle the semantic consistency between visual features and textual features. To efficiently align the image-text, we propose a novel two-stage visionlanguage pre-training-based approach to bootstrap interactive image-text alignment for remote sensing image captioning, called BITA, which relies on the design of a lightweight interactive Fourier Transformer to better align remote sensing image-text features. The Fourier layer in the interactive Fourier Transformer is capable of extracting multi-scale features of remote sensing images in the frequency domain, thereby reducing the redundancy of remote sensing visual features. Specifically, the first stage involves preliminary alignment through image-text contrastive learning, which aligns the learned multi-scale remote sensing features from the interactive Fourier Transformer with textual features. In the second stage, the interactive Fourier Transformer connects the frozen image encoder with a large language model. Then, prefix causal language modeling is utilized to guide the text generation process using visual features. Ultimately, across the UCM-caption, RSICD, and NWPU-caption datasets, the experimental results clearly demonstrate that BITA outperforms other advanced comparative approaches. The code is available at https://github.com/yangcong356/BITA. Index Terms—Fourier Transformer, vision-language pretraining, multimodal information alignment, remote sensing image captioning I. I NTRODUCTION R EMOTE sensing image captioning (RSIC) is a complex task that revolves around enabling machine learning models to accurately comprehend and depict various contextual objects within remote sensing images using appropriate vocabulary [10]. In contrast to other remote sensing tasks such as image classification [2]–[7] or object detection [8], [9], RSIC stands apart; its objective is not merely to predict isolated labels or words, but rather to generate meaningful and comprehensive sentences that describe the entirety of a remote sensing image. Due to its significant potential applications in areas like smart city development and military intelligence [1], Manuscript received 23 August 2023, revised 2 December 2023. This work was supported by the National Natural Science Foundation of China under Grant 62122060 and the Special Fund of Hubei Luojia Laboratory under Grant 220100014. (Corresponding author: Lefei Zhang.) The authors are with the National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, 430072, P. R. China, and also with the Hubei Luojia Laboratory, Wuhan 430079, P. R. China. (e-mail: {yangcong356, zcli-charlie, zhanglefei}@whu.edu.cn) RSIC is becoming increasingly appealing within the field of remote sensing. Recent works [15], [16], [19] have yielded significant improvements in captioning performance on the RSIC task. Zhang et al. [12] employed convolutional neural networks to detect major objects in remote sensing images, subsequently utilizing a recurrent neural network to generate natural language descriptions for the initially detected targets. Wang et al. [14] utilized the Mahalanobis matrix to measure the difference between visual features and textual features to improve captioning results. Due to prior work neglecting the structured spatial relations of semantic content in remote sensing images, Zhao et al. [13] proposed a structured attention-based approach that employs pixel-level segmentation masks to guide the caption generation process, enabling better generation of accurate and concise descriptions. While these advanced methods have improved the accuracy of caption generation, they overlook bridging the modality gap between visual and textual information, resulting in generated descriptive sentences lacking semantic coherence [10]. The modality gap is manifested as the image-text alignment issue, which involves matching specific objects within remote sensing images to their corresponding proper nouns in the generated sentences. Due to the capability of reducing the modality gap, the vision-language pre-training (VLP) paradigm has gained increasing attention in multimodal understanding and generation tasks [51], [59], [61]. The goal of VLP is to integrate the robust representations and reasoning capabilities of both visual models and large language models (LLMs, such as GPT-3 [28], T5 [25], OPT [26], LLaMA [27], etc.), enabling effective learning from multimodal data. Although the clear capability of the VLP paradigm to bridge multi-modal discrepancies is undeniable, the multi-scale characteristic of remote sensing images presents a significant challenge in the development path for VLP in the remote sensing field. This is because the multi-scale characteristic of remote sensing images primarily manifests as significant variance in the ground sampling distance (reflecting the spatial resolution of the remote sensing sensor) among the images. This variance can affect the feature representations of the same object, thereby increasing the modality gap between visual information and textual information [36]. To address the negative effects caused by the multi-scale characteristics of remote sensing images and the multimodal gap between image and text, this paper proposes an interactive visual-textual alignment method for remote sensing image captioning, named BITA. a novel lightweight Interactive Fourier Transformer (IFT) module is designed to guide the" 2312.01197v1,"S HORT - TERM P RECIPITATION F ORECASTING IN T HE N ETHERLANDS : A N A PPLICATION OF C ONVOLUTIONAL LSTM NEURAL NETWORKS TO WEATHER RADAR DATA Petros Demetrakopoulos Eindhoven University of Technology p.s.dimitrakopoulos@student.tue.nl A BSTRACT This work addresses the challenge of short-term precipitation forecasting by applying Convolutional Long Short-Term Memory (ConvLSTM) neural networks to weather radar data from the Royal Netherlands Meteorological Institute (KNMI). The research exploits the combination of Convolutional Neural Networks (CNNs) layers for spatial pattern recognition and LSTM network layers for modelling temporal sequences, integrating these strengths into a ConvLSTM architecture. The model was trained and validated on weather radar data from the Netherlands. The model is an autoencoder consisting of nine layers, uniquely combining convolutional operations with LSTM’s temporal processing, enabling it to capture the movement and intensity of precipitation systems. The training set comprised of sequences of radar images, with the model being tasked to predict precipitation patterns 1.5 hours ahead using the preceding data. Results indicate high accuracy in predicting the direction and intensity of precipitation movements. The findings of this study underscore the significant potential of ConvLSTM networks in meteorological forecasting, particularly in regions with complex weather patterns. It contributes to the field by offering a more accurate, data-driven approach to weather prediction, highlighting the broader applicability of ConvLSTM networks in meteorological tasks. Keywords Machine learning · Deep learning · Precipitation forecasting · Weather forecasting 1 Introduction Meteorological forecasting, which is a critical aspect of climate science, has seen significant advancements with the integration of machine learning (ML) techniques. This research targets the complex task of short-term precipitation forecasting, also known as ""nowcasting"". The data used to train and validate the model come from two weather radars monitoring precipitation in The Netherlands [1], a country characterized by a humid and precipitation-intense climate. The study employs Convolutional LSTM (ConvLSTM) neural networks to model these weather patterns, aiming to enhance the accuracy of short-term predictions. 2 Literature Review and related work A comprehensive review of existing literature reveals a growing interest in applying deep learning techniques for weather forecasting purposes. Studies have particularly noted the efficacy of Convolutional Neural Networks (CNNs) in spatial pattern recognition and Long Short-Term Memory (LSTM) networks in modelling temporal sequences. The fusion of these two approaches in ConvLSTM architectures has shown promising results in various fields, including video frame prediction and climate modelling. The most noteworthy related publication is the one titled ""Convolutional LSTM network: A machine learning approach for precipitation nowcasting"" by [2] X. Shi et. al. published in 2015. Other published works have also proposed Generative Adversarial Network architectures with a worth-mentioning paper by L. Xu et. al. [3] published in 2022." 2312.01201v1,"PAC Privacy Preserving Diffusion Models Qipan Xu 1 Youlong Ding 2 Jie Gao 1 Hao Wang 1 Abstract these DMs can produce images that safeguard privacy while maintaining high visual fidelity. For instance, DPGEN (Chen et al., 2022) leverages a randomized response technique to privatize the recovery direction in the Langevin MCMC process for image generation. The images produced by DPGEN are not only visually appealing but also compliant with differential privacy standards, although its privacy mechanism has been shown to be data-dependent later on. Moreover, the Differentially Private Diffusion Models (DPDM) (Dockhorn et al., 2022) adapt DP-SGD and introduce noise multiplicity in the training process of diffusion models, demonstrating that DPDM can indeed produce high-utility images while strictly adhering to the principles of differential privacy. Data privacy protection is garnering increased attention among researchers. Diffusion models (DMs), particularly with strict differential privacy, can potentially produce images with both high privacy and visual quality. However, challenges arise in ensuring robust protection in privatizing specific data attributes, areas where current models often fall short. To address these challenges, we introduce the PAC Privacy Preserving Diffusion Model, a model leverages diffusion principles and ensure Probably Approximately Correct (PAC) privacy. We enhance privacy protection by integrating a private classifier guidance into the Langevin Sampling Process. Additionally, recognizing the gap in measuring the privacy of models, we have developed a novel metric to gauge privacy levels. Our model, assessed with this new metric and supported by Gaussian matrix computations for the PAC bound, has shown superior performance in privacy protection over existing leading private generative models according to benchmark tests. While diffusion models integrated with differential privacy (DP) mark a significant advance in privacy-preserving generative modeling, several challenges and limitations remain. • Most research on diffusion models with DP has concentrated on the privatization of overall image features. The need to privatize specific attributes, such as facial expressions in human portraits, has not been adequately addressed. This oversight suggests a gap in the nuanced application of DP in generative modeling. 1. Introduction • The core objective of DP is to evaluate the distinguishability between processed and original data. Yet, a significant hurdle is the difficulty of providing adversarial worst-case proofs, especially when comparing two distinct datasets. This difficulty presents a substantial barrier to validating the efficacy of DP methods in practical scenarios. Modern deep learning models, fortified with differential privacy as defined by (Dwork et al., 2006), have been instrumental in significantly preserving the privacy of sensitive data (Dwork et al., 2014). DP-SGD (Abadi et al., 2016), a pioneering method for training deep neural networks within the differential privacy framework, applies gradient clipping at each step of the SGD (stochastic gradient descent) to enhance privacy protection effectively. • The absence of a robust privacy measurement for models poses a critical challenge. Without a clear metric, it becomes problematic to assess and compare the data privacy protection performance across different models. This lack of standardized evaluation complicates the advancement and adoption of privacy-preserving techniques in the field. Diffusion models (DMs) (Song & Ermon, 2019; 2020; Dhariwal & Nichol, 2021) have emerged as state-of-theart generative models, setting new benchmarks in various applications, particularly in generating high-quality images. When trained under strict differential privacy protocols, 1 Department of CS, Rutgers University 2 Department of CS, Hebrew University of Jerusalem. Correspondence to: Qipan Xu . These issues highlight the need for continued research and development to overcome the current limitations of diffusion models with DP and to push the boundaries of privacy protection in generative modeling. 1" 2312.01202v1,"From Voices to Validity: Leveraging Large Language Models (LLMs) for Textual Analysis of Policy Stakeholder Interviews ALEX LIU and MIN SUN ∗ , University of Washington, USA Obtaining stakeholders’ diverse experiences and opinions about current policy in a timely manner is crucial for policymakers to identify strengths and gaps in resource allocation, thereby supporting effective policy design and implementation. However, manually coding even moderately sized interview texts or open-ended survey responses from stakeholders can often be labor-intensive and time-consuming. This study explores the integration of Large Language Models (LLMs)—like GPT-4—with human expertise to enhance text analysis of stakeholder interviews regarding K-12 education policy within one U.S. state. Employing a mixed-methods approach, human experts developed a codebook and coding processes as informed by domain knowledge and unsupervised topic modeling results. They then designed prompts to guide GPT-4 analysis and iteratively evaluate different prompts’ performances. This combined human-computer method enabled nuanced thematic and sentiment analysis. Results reveal that while GPT-4 thematic coding aligned with human coding by 77.89% at specific themes, expanding to broader themes increased congruence to 96.02%, surpassing traditional Natural Language Processing (NLP) methods by over 25%. Additionally, GPT-4 is more closely matched to expert sentiment analysis than lexicon-based methods. Findings from quantitative measures and qualitative reviews underscore the complementary roles of human domain expertise and automated analysis as LLMs offer new perspectives and coding consistency. The human-computer interactive approach enhances efficiency, validity, and interpretability of educational policy research. CCS Concepts: • Human-centered computing → Human computer interaction (HCI); • Computing methodologies → Natural language processing; • General and reference → Cross-computing tools and techniques; • Social and professional topics → K-12 education. Additional Key Words and Phrases: Education policy, Large Language Models (LLMs), Thematic analysis, Sentiment analysis, Policy stakeholders 1 INTRODUCTION Policymakers seek reliable, valid, and meaningful evidence to support decision-making in a timely manner. An important source of policy evidence comes from stakeholders’ lived experiences regarding the implementation of current policies and their suggestions for improvement [17, 19]. These stakeholders include individuals and organizations concerned with or affected by a policy’s creation, enactment, and evaluation. Insights can be gleaned from stakeholder interviews, open-ended surveys, or social media posts [8, 39, 46]. Qualitative data on stakeholders’ insights, combined with quantitative causal analysis of policy impact, are often utilized in policy analysis. However, when decisions must be made swiftly, the cost of manually analyzing even a moderately sized corpus of text can impede the actual incorporation of stakeholders’ voices [24]. The rapid advancement of natural language processing (NLP) techniques—from traditional rule-based and statistical models to deep learning-based models, such as large language models (LLMs)—sheds light on the time-efficient comprehension of contents and sentiments in large text corpora. Traditional NLP approaches, such as topic modeling and specifically methods like Latent Dirichlet Allocation (LDA), have found favor in social sciences and policy studies for uncovering latent themes in extensive collections of texts, such as political speeches, news articles, and social media content [10, 18, 20, 51]. In addition to content understanding, policy researchers are also interested in gauging stakeholders’ satisfaction about a given policy, perceived intended and unintended consequences, and areas for further Authors’ address: Alex Liu, alexliux@uw.edu; Min Sun, misun@uw.edu, University of Washington, 2012 Skagit Lane, Miller Hall, Seattle, Washington, USA, 98195-3600. 1" 2312.01204v1,"1 A Comprehensive Survey of Wireless Time-Sensitive Networking (TSN): Architecture, Technologies, Applications, and Open Issues Kouros Zanbouri, Md. Noor-A-Rahim, Jobish John, Cormac J. Sreenan, Member, IEEE, H. Vincent Poor, Fellow, IEEE, and Dirk Pesch, Senior Member, IEEE Abstract—Time-Sensitive Networking (TSN) is expected to be a critical component of critical machine type communication networks in areas such as Industry 4.0 and beyond. With rising mobility requirements in industrial applications and the prevalence of wireless networks, wireless network integration into TSN is becoming increasingly important. This survey article presents a comprehensive review of wireless TSN, including an overview of the architecture of a wireless TSN network and an examination of the various wireless technologies and protocols that can be used in such networks. In addition, the article discusses industrial applications of wireless TSN, among them automation, robotics, and autonomous vehicles. The article concludes by summarizing the challenges and open issues related to the integration of TSN into wireless networks, and by offering recommendations for future research directions. Index Terms—Wireless TSN, TSN, 5G, 6G, WiFi-7, IEEE 802.11be, Industrial IoT, Industry 4.0, Industry 5.0, Millimeterwave, Smart Manufacturing, Smart Factory, Wireless Factory. I. I NTRODUCTION Time-critical communication has been a key feature of various communication networks such as in industrial automation systems [1], [2], in real-time applications for healthcare [3], autonomous driving [4], professional audio/video delivery in an Internet of Multimedia Things [5], smart-grids [6], and other applications, where highly reliable and timely data delivery are required to ensure high Quality of Service (QoS). In such networks, wireless communication links and device mobility can result in a significant degree of unreliability [7]. IEEE 802.1 Time-Sensitive Networking (TSN) is a collection of standards and tools to facilitate real-time deterministic communications with low latency and high reliability [8], [9]. While TSN aims to be physical and data link layer agnostic, current implementations are essentially all based on Ethernet as the network medium. The market for timesensitive networking, which was valued at USD 0.2 billion in 2023, is anticipated to grow to USD 1.7 billion by 2028, at a Compound Annual Growth Rate (CAGR) of 58.3% [10]. The use of TSN ensures minimal congestion loss for time-sensitive data traffic, thanks to resource reservations, multiple queuing mechanisms, and traffic shaping methods. TSN guarantees that Kouros Zanbouri, Md. Noor-A-Rahim, Cormac Sreenan, and Dirk Pesch are with the School of Computer Science & IT, University College Cork, Ireland. (E-mail: {k.zanbouri, m.rahim, cjs, d.pesch}@cs.ucc.ie). Jobish John is with the Eindhoven University of Technology, Netherlands. H. V. Poor is with the Department of Electrical and Computer Engineering, Princeton University, USA (E-mail: poor@princeton.edu). important data will not exceed a maximum end-to-end latency, enabling dependable data transfer by implementing a reliability system at the packet level. Additionally, TSN safeguards against threats such as bandwidth misuse, equipment failure, and malicious cyberattacks, among others [11]. By extending the features of TSN to wireless communication, wireless TSN enables more flexible and scalable communication systems that can be used in locations where wired networks are not feasible or practical, resulting in reduced installation and maintenance expenses [12]. Thus, wireless TSN aims at delivering the same low-latency and high-reliability features that are available with wired TSN, while accommodating real-time applications that require wireless communications. This paves the way for wireless TSN to be employed in various domains, including industrial automation, autonomous driving, healthcare, and multimedia applications. However, in contrast to traditional wired communications, wireless communication introduces a range of challenges such as erroneous, non-reciprocal channels, signal distortion, latency, and radio interference (both self-interference and external interference) that make wireless communication unpredictable and complicate the assurance of performance requirements and bounds as usually guaranteed by wired TSN. Hence, by their nature, wireless networks are not ideal to support real-time critical traffic and extreme low-latency applications. In the context of enabling TSN for wireless networks, several TSN standards have been developed to address issues such as the need for precise time synchronization over IEEE 802.11 networks, as specified in the IEEE 802.1AS standard [13]. Although the majority of the approaches in the TSN standards are not specifically tailored to data link layer constraints, this broad specification allows for future adaptation and modification to accommodate widely used wireless network protocols, such as IEEE 802.11, 5G, as well as future 6G. This paper provides for the first time a comprehensive survey of the existing body of work on wireless TSN, with a focused exploration of its architecture, technologies, standards, applications, and pertinent challenges in its integration with wireless networks. Previous surveys have mostly delved into generic TSN, leaving a notable gap in the exploration of wireless TSN. The authors of [14], [15] provide a thorough analysis of the TSN Working Group’s standards and protocols whilst investigating industrial TSN use cases, concentrating especially on distributed measurement systems in industry. The last section of the paper is dedicated to TSN usage in Wi-Fi" 2312.01209v1,"A Method of Moments Approach to Asymptotically Unbiased Synthetic Controls Joseph Fry University of Colorado at Boulder, 256 UCB, 80309 Boulder, Colorado, United States E-mail address: joseph.fry@colorado.edu Abstract A common approach to constructing a Synthetic Control unit is to fit on the outcome variable and covariates in pre-treatment time periods, but it has been shown by Ferman and Pinto (2021) that this approach does not provide asymptotic unbiasedness when the fit is imperfect and the number of controls is fixed. Many related panel methods have a similar limitation when the number of units is fixed. I introduce and evaluate a new method in which the Synthetic Control is constructed using a General Method of Moments approach where if the Synthetic Control satisfies the moment conditions it must have the same loadings on latent factors as the treated unit. I show that a Synthetic Control Estimator of this form will be asymptotically unbiased as the number of pre-treatment time periods goes to infinity, even when pre-treatment fit is imperfect and the set of controls is fixed. Furthermore, if both the number of pre-treatment and post-treatment time periods go to infinity, then averages of treatment effects can be consistently estimated and asymptotically valid inference can be conducted using a subsampling method. I conduct simulations and an empirical application to compare the performance of this method with existing approaches in the literature. Keywords: synthetic control, general method of moments, policy evaluation, factor model 1 Introduction The Synthetic Control Estimator (SCE) was first introduced by Abadie and Gardeazabal (2003) and Abadie et al. (2010) in the context of panel data where a single unit becomes and stays treated. The basic idea behind this approach is to construct a weighted average of the control units or a “synthetic” control (SC) unit by minimizing the difference between this SC and the treated unit on a set of pre-treatment 1" 2312.01218v1,"MNRAS 000, 1–?? (2023) Preprint 5 December 2023 Compiled using MNRAS L A TEX style file v3.0 A targeted search for FRB counterparts with Konus-Wind A. Ridnaia, 1★ D. Frederiks, 1 and D. Svinkin 1 1 Ioffe institute, Politekhnicheskaya 26, St. Petersburg 194021, Russia Accepted 2023 November 15. Received 2023 November 13; in original form 2023 September 29 ABSTRACT We present results of the search for hard X-ray/soft 𝛾-ray emission in coincidence with publicly reported (via Transient Name Server, TNS †) fast radio bursts (FRBs). The search was carried out using continuous Konus-Wind data with 2.944 s time resolution. We perform a targeted search for each individual burst from 581 FRBs, along with a stacking analysis of the bursts from 8 repeating sources in our sample and a separate stacking analysis of the bursts from the non-repeating FRBs. We find no significant associations in either case. We report upper bounds on the hard X-ray (20 - 1500 keV) flux assuming four spectral models, which generally describe spectra of short and long GRBs, magnetar giant flares, and the short burst, coincident with FRB 200428 from a Galactic magnetar. Depending on the spectral model, our upper bounds are in the range of (0.1 − 2) × 10 −6 erg cm −2 . For 18 FRBs with known distances we present upper bounds on the isotropic equivalent energy release and peak luminosity. For the nearest FRB 200120E, we derive the most stringent upper bounds of 𝐸 iso ≤2.0 ×10 44 erg and 𝐿 iso ≤1.2 ×10 44 erg s −1 . Furthermore, we report lower bounds on radio-to-gamma-ray fluence ratio 𝐸 radio /𝐸 iso ≥ 10 −11 − 10 −9 and compare our results with previously reported searches and theoretical predictions for high-energy counterparts to FRBs. Key words: gamma-rays: stars – transients: fast radio bursts – stars: magnetars 1 INTRODUCTION Fast radio bursts (FRBs) are exceptionally bright (∼Jy), shortduration (∼ms) radio transients, discovered serendipitously in 2007 (Lorimer et al. 2007). The dispersion measures (DM) of observed FRBs are well in excess of the expected Milky Way contribution, which implies they are originating from extragalactic distances (see, e.g. Cordes & Chatterjee (2019); Petroff et al. (2022), for a review). Over 600 unique sources have been reported thus far by different radio telescopes (see Table 1), including 492 sources detected by the Canadian Hydrogen Intensity Mapping Experiment Fast Radio Burst (CHIME/FRB) Project (CHIME/FRB Collaboration et al. 2021). Among them, only 18 (Chatterjee et al. 2017; Ravi et al. 2019; Bhandari et al. 2020, 2022) FRBs have been localized with enough (sub-arcsecond to arcsecond) precision to identify their host galaxies and redshifts, which confirms extragalactic origins and reveals a wide range of galaxy types and local environments surrounding the FRBs (Heintz et al. 2020). More than half of these localizations have been provided by the Australian Square Kilometre Array Pathfinder (ASKAP; Macquart et al. 2010). While most FRBs are only seen once (“one-offs”), a small fraction (∼ 4 %) of them have been found to produce multiple bursts (“repeaters”) (Spitler et al. 2016; CHIME/FRB Collaboration et al. 2021; Fonseca et al. 2020; Andersen et al. 2023). It remains an open question whether all FRBs repeat, and whether multiple progenitor populations of FRBs exist. Until now, no clear physical picture of either the central-engine that produce a FRB or the mechanism by which the emission is gen- ★ E-mail: ridnaia@mail.ioffe.ru † Transient Name Server (TNS), http://www.wis-tns.org/ © 2023 The Authors erated has emerged. A wide range of models have been proposed, none of which is able to explain alone the variety of observed events (see Platts et al. 2019 for a review). The most debated progenitor models include magnetars as their central-engines, with the FRB emission originating inside or outside of the magnetosphere (Popov & Postnov 2010; Zhang 2020; Kumar et al. 2017; Katz 2014; Lyubarsky 2014; Metzger et al. 2019; Beloborodov 2017, 2020). The recent discovery of a FRB-like event from the Galactic magnetar SGR 1935+2154 (FRB 200428; Bochenek et al. 2020; CHIME/FRB Collaboration et al. 2020) strongly suggests that at least some fraction of FRBs may originate from magnetars. The bright radio burst FRB 200428 was accompanied by the simultaneous emission of hard X-rays with properties similar to those of the short bursts typical of Galactic magnetars (Mereghetti et al. 2020; Ridnaia et al. 2021; Li et al. 2021; Tavani et al. 2021), except for the peculiarly hard energy spectrum (Ridnaia et al. 2021). A couple more coincident radio and high energy events were detected from the same source (Dong & Chime/Frb Collaboration 2022; Wang et al. 2022; Frederiks et al. 2022; Maan et al. 2022; Huang et al. 2022; Li et al. 2022), characterized by much fainter radio emission and longer duration than FRB 200428, and softer X-ray spectra typical of magnetar bursts. To date, there is no other confirmed multi-wavelength or multimessenger transient being associated with any FRB. The presence or absence of a simultaneous or delayed emission corresponding to FRBs in different wavebands would be essential to constrain the emission mechanisms and to identify the FRB progenitor(s). In the last years, many multi-wavelength searches for FRB counterparts have been carried out at all wavelengths with no confirmed results (see, e.g., Nicastro et al. 2021 for a review). In high-energy domain, a number of systematic searches has been made by using archival data of" 2312.01227v1,"... 1 Distributed Bayesian Estimation in Sensor Networks: Consensus on Marginal Densities Parth Paritosh, Member, IEEE, Nikolay Atanasov, Member, IEEE, and Sonia Martı́nez, Fellow, IEEE Abstract—In this paper, we aim to design and analyze distributed Bayesian estimation algorithms for sensor networks. The challenges we address are to (i) derive a distributed provably-correct algorithm in the functional space of probability distributions over continuous variables, and (ii) leverage these results to obtain new distributed estimators restricted to subsets of variables observed by individual agents. This relates to applications such as cooperative localization and federated learning, where the data collected at any agent depends on a subset of all variables of interest. We present Bayesian density estimation algorithms using data from non-linear likelihoods at agents in centralized, distributed, and marginal distributed settings. After setting up a distributed estimation objective, we prove almost-sure convergence to the optimal set of pdfs at each agent. Then, we prove the same for a storage-aware algorithm estimating densities only over relevant variables at each agent. Finally, we present a Gaussian version of these algorithms and implement it in a mapping problem using variational inference to handle non-linear likelihood models associated with LiDAR sensing. ✦ 1 I NTRODUCTION W ITH the advent of low-cost computing, storage and communication devices, large sensor networks have become integral to urban, transport and power-grid infrastructure. Using data to automate the monitoring of an underlying process of interest requires inference algorithms. Any centralized solution to this inference problem necessitates data aggregation. Although centralized estimates may be more accurate, the associated processing and communication costs are prohibitive, especially in real-time settings. Real-time inference is crucial for tasks such as indoor positioning [1], urban monitoring [2], and path planning for robotic networks [3]. Thus, modern sensor networks parallelize inference across nodes improving communication efficiency and robustness to node failures. However, most distributed algorithms do not account for the relevance of the information shared among the nodes. Motivated by this, we design algorithms to simultaneously address the inherent commmunication network constraints while accounting for variable relevance at each node. Literature review: To achieve online estimation in connected sensor networks, researchers have studied schemes for combining distributed estimates [4] that can be classified as opinion pooling [5] and graph-based message-passing algorithms [6]. Message-passing algorithms are appropriate when the causal relationships between the variables are known. Some of the well-known message passing algorithms are Gaussian, sigma-point and non-linear belief propagation; see [7] and references therein. In contrast, linear and geometric averaging of agent estimates are two common approaches for pooling opinions [6] in a network • The authors are with the Contextual Robotics Institute, University of California San Diego, 9500 Gilman Dr, La Jolla, CA 92093 (e-mails: { pparitos,natanasov,soniamd } @ucsd.edu). We gratefully acknowledge support from ONR N00014-19-1-2471, ARL DCIST CRA W911NF17- 2-0181, and NSF FRR CAREER 2045945. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. with communication across one-hop neighbors. The seminal work in [4] presented a local and computationally tractable consensus estimation algorithm as a two step process consisting of a non-Bayesian pooling step followed by a Bayesian update with locally available data. Other aspects such as network structure [8], time-varying connections [9], convergence rates [10], malicious agents [11] and uncertain likelihoods [12] have since been addressed. Distributed estimation algorithms can be analyzed as steps of gradient-based optimization methods that minimize the divergence between the data generating process and the estimated model. This approach establishes consistency of the estimation task, with estimation quality as the objective. For the consensus step, this approach generates algorithms beyond linear and logarithmic pooling choices as shown in [13], [6]. Mirror descent methods [14], [15] generalize the first-order gradient methods via metric-space projections to exploit the inherent problem geometry. Past research on distributed estimation using partially informative observation models has relied on fusing observation likelihoods with individual agent’s network sized estimates [16], [17], [18]. Doan et al. [19] apply mirror descent to the linear average of neighbor estimates for consistent estimation in discrete space. Another algorithm in [17] incorporates geometric averaging with stochastic mirror descent (SMD) to achieve consensus over the network. This choice of divergence formulation for the centralized objective can be used to derive linear regression updates, Kalman filter and particle filters as special cases. The work in [15] further extends the SMD algorithm for finding optimal continuous-space probability density functions (pdfs), although in a centralized setting with a variationally coherent objective. More recently, [20] studied convergence of variational estimates on compact subsets of hypotheses. However, all of these papers assume that agents estimate a common set of variables and neither one includes distributional convergence guarantees. In this work, in addition to distributing the estimation process, we focus on distributing the storage by estimating only a subset of variables relevant to the local data gener-" 2312.01233v1,"The matched projections of idempotent matrices. I Xiaoyi Tian a , Qingxiang Xu a, , Chunhong Fu b a b Department of Mathematics, Shanghai Normal University, Shanghai 200234, PR China Health School Attached to Shanghai University of Medicine & Health Sciences, Shanghai 200237, PR China Abstract This paper deals mainly with the optimal approximation to an idempotent matrix by projections and its applications. For every idempotent Q ∈ C n×n , a projection m(Q) called the matched projection can be induced. It is proved that km(Q) − Qk F ≤ kP − Qk F for any projection P ∈ C n×n , and furthermore it is shown that the equality above occurs only if P = m(Q). Based on this characterization of the minimum distance from projections to an idempotent, the maximum distance from projections to an idempotent is also clarified, and some Frobenius norm bounds of P − Q and P − Q † are derived under a condition weaker than the demanding P Q = Q, where P ∈ C n×n is a projection, Q ∈ C n×n is an idempotent and Q † denotes the Moore-Penrose inverse of Q. Specifically, some Frobenius norm upper bounds and lower bounds of AA † − AX are provided in a unified way, in which A † is the Moore-Penrose inverse of a matrix A, while X is an arbitrary inner inverse or outer inverse of A. Numerical examples are provided to illustrate the optimality of the constants associated with the obtained norm estimations. Keywords: Idempotent, projection, Frobenius norm, generalized inverse 2000 MSC: 65F35, 15A60, 15A09 1. Introduction By a projection, we mean a Hermitian idempotent. The direct sum decompositions and the orthogonal decompositions of spaces are frequently used, so idempotents and projections (also known as skew projections and Email addresses: tianxytian@163.com (Xiaoyi Tian), qingxiang_xu@126.com (Qingxiang Xu), fchlixue@163.com (Chunhong Fu) Preprint submitted to XXX December 5, 2023" 2312.01236v1,"Preprint TRANSACTIONS ON ROBOTICS, VOL. X, NO. Y, MONTH YEAR 1 Evetac: An Event-based Optical Tactile Sensor for Robotic Manipulation Niklas Funk 1 , Erik Helmut 1 , Georgia Chalvatzaki 1,2 , Roberto Calandra 3,4 , Jan Peters 1,2,5 Abstract—Optical tactile sensors have recently become popular. They provide high spatial resolution, but struggle to offer fine temporal resolutions. To overcome this shortcoming, we study the idea of replacing the RGB camera with an event-based camera and introduce a new event-based optical tactile sensor called Evetac. Along with hardware design, we develop touch processing algorithms to process its measurements online at 1000 Hz. We devise an efficient algorithm to track the elastomer’s deformation through the imprinted markers despite the sensor’s sparse output. Benchmarking experiments demonstrate Evetac’s capabilities of sensing vibrations up to 498 Hz, reconstructing shear forces, and significantly reducing data rates compared to RGB optical tactile sensors. Moreover, Evetac’s output and the marker tracking provide meaningful features for learning data-driven slip detection and prediction models. The learned models form the basis for a robust and adaptive closed-loop grasp controller capable of handling a wide range of objects. We believe that fast and efficient event-based tactile sensors like Evetac will be essential for bringing human-like manipulation capabilities to robotics. The sensor design is open-sourced at https://sites.google.com/view/evetac. Index Terms—Touch Sensing, Optical Tactile Sensor, Eventbased Camera I. I NTRODUCTION M ANIPULATION of mechanical objects is essential for real-world robotic applications ranging from industrial assembly [1], [2] to household robots [3]–[5]. Physical manipulation of objects includes making and breaking contact between the robotic manipulator and the object of interest. In particular, the manipulator should apply sufficient forces for stable grasping, while preventing any loss of contact and damage to the objects by applying excessive force. For the goal of having reactive, adaptive, reliable, and efficient dexterous manipulation skills also in unstructured environments with little or no prior knowledge available, direct sensing of contacts, i.e., tactile sensing, is of crucial importance [6]. Due to their huge potential, there exists a long history in developing tactile sensors for robotics [6]–[9]. While a wide range of sensing technologies have been proposed, recently, especially RGB optical tactile sensors have received 1 Department cal University of of Computer Darmstadt, Science, Darmstadt, Techni- Germany {niklas,georgia,jan}@robot-learning.de 2 Hessian Centre for Artificial Intelligence 3 LASR Lab, Technische Universität Dresden, Germany roberto.calandra@tu-dresden.de 4 The Centre for Tactile Internet with Human-in-the-Loop (CeTI), Germany 5 German Research Center for AI (DFKI), Research Department: SAIROL This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. Fig. 1: Two Evetac sensors installed in the ROBOTIS RH-P12-RN(A) gripper holding a pen. In the bottom left and right, we depict a magnified version of the sensors’ measurements. Evetac is an opensource event-based optical tactile sensor for robotic manipulation. Its main components are an illuminated, dotted, soft silicone gel that interacts with the environment. Changes in gel configuration are captured by a high-resolution event-based camera inside the sensor as shown in the bottom left & right. increased attention [10], [11]. They are also known as visionbased tactile sensors, as their functioning principle relies on an RGB camera capturing an elastomer’s deformation. The advantages of RGB optical tactile sensors are their small form factors, compatibility with standard interfaces, low cost, and very high, human-like, or even superhuman spatial resolution. Yet, compared to other tactile sensing technologies and the human sense of touch, they typically lack temporal resolution. Alternative sensing technologies such as capacitive [12], piezoresistive [13], [14], magnetic [15], or pressure-based [16] tactile sensors are contrarily typically fast, but lack resolution. Inspired by human tactile sensing capabilities and their different mechanoreceptors, which offer a high temporal resolution of resolving vibrations of at least up to 400 Hz [7], [17], as well as a high spatial resolution through approximately 17000 tactile sensing units per hand [17]–[19], with higher densities in the fingertips, in this paper, we propose a novel event-based optical tactile sensor called Evetac. While eventbased optical tactile sensors have been presented previously" 2312.01238v1,"A DEEP LEARNING PIPELINE FOR CROSS - SECTIONAL AND LONGITUDINAL MULTIVIEW DATA INTEGRATION A P REPRINT Sandra E. Safo ∗ Division of Biostatistics and Health Data Science University of Minnesota Twin Cities Minneapolis, MN 55455 ssafo@umn.edu Sarthak Jain Electrical and Computer Engineering University of Minnesota Twin Cities Minneapolis, MN 55455 sarthak1996jain17@gmail.com December 5, 2023 A BSTRACT Biomedical research now commonly integrates diverse data types or views from the same individuals to better understand the pathobiology of complex diseases, but the challenge lies in meaningfully integrating these diverse views. Existing methods often require the same type of data from all views (cross-sectional data only or longitudinal data only) or do not consider any class outcome in the integration method, presenting limitations. To overcome these limitations, we have developed a pipeline that harnesses the power of statistical and deep learning methods to integrate cross-sectional and longitudinal data from multiple sources. Additionally, it identifies key variables contributing to the association between views and the separation among classes, providing deeper biological insights. This pipeline includes variable selection/ranking using linear and nonlinear methods, feature extraction using functional principal component analysis and Euler characteristics, and joint integration and classification using dense feed-forward networks and recurrent neural networks. We applied this pipeline to cross-sectional and longitudinal multi-omics data (metagenomics, transcriptomics, and metabolomics) from an inflammatory bowel disease (IBD) study and we identified microbial pathways, metabolites, and genes that discriminate by IBD status, providing information on the etiology of IBD. We conducted simulations to compare the two feature extraction methods. Availability and Implementation: The proposed pipeline is available from the following GitHub repository: https://github.com/lasandrall/DeepIDA-GRU. Contact: ssafo@umn.edu Keywords Data Integration; Multiview Dashboard; Integrative Analysis; Software; Multi-omics; Multi-modal 1 Introduction Biomedical research now commonly integrates diverse data types (e.g. genomics, metabolomics, clinical) from the same individuals to better understand complex diseases. These data types, whether measured at one time point (crosssectional) or multiple time points (longitudinal), offer diverse snapshots of disease mechanisms. Integrating these complementary data types provides a comprehensive view, leading to meaningful biological insights into disease etiology and heterogeneity. Inflammatory bowel disase (IBD) including Crohn’s disease and ulcerative colitis, for instance, is a complex disease with multiple factors (including clinical, genetics, molecular, and microbial levels) contributing to the heterogeneity of the disease. IBD is an autoimmune disorder associated with the inflammation of the gastrointestinal tract (Crohn’s ∗ Corresponding Author: Sandra Safo, www.sandraesafo.com" 2312.01241v1,"Published as a conference paper at ICLR 2024 J UST - IN -T IME S ECURITY P ATCH D ETECTION - LLM A T THE R ESCUE FOR D ATA A UGMENTATION Xunzhu Tang 1 , Zhenghan Chen 2 , Kisub Kim 3 , Haoye Tian 1 , Saad Ezzini 4 , Jacques KLEIN 1 , Tegawendé F. Bissyandé 1 1 University of Luxembourg 2 Windows Copilot, Microsoft 3 Singapore Management University 4 Lancaster University {xunzhu.tang,haoye.tian,jacques.klein@uni.lu,tegawende.bissyande}@uni.lu zhenghanchen@microsoft.com falconlk00@gmail.com s.ezzini@lancaster.ac.uk A BSTRACT In the face of growing vulnerabilities found in open-source software, the need to identify discreet security patches has become paramount. The lack of consistency in how software providers handle maintenance often leads to the release of security patches without comprehensive advisories, leaving users vulnerable to unaddressed security risks. To address this pressing issue, we introduce a novel security patch detection system, LLMDA, which capitalizes on Large Language Models (LLMs) and code-text alignment methodologies for patch review, data enhancement, and feature combination. Within LLMDA, we initially utilize LLMs for examining patches and expanding data of PatchDB and SPI-DB, two security patch datasets from recent literature. We then use labeled instructions to direct our LLMDA, differentiating patches based on security relevance. Following this, we apply a PTFormer to merge patches with code, formulating hybrid attributes that encompass both the innate details and the interconnections between the patches and the code. This distinctive combination method allows our system to capture more insights from the combined context of patches and code, hence improving detection precision. Finally, we devise a probabilistic batch contrastive learning mechanism within batches to augment the capability of the our LLMDA in discerning security patches. The results reveal that LLMDA significantly surpasses the start of the art techniques in detecting security patches, underscoring its promise in fortifying software maintenance. 1 I NTRODUCTION The widespread adoption of open-source software (OSS) has been a transformative force in software development. OSS projects have become cornerstones of modern computing infrastructure, driving innovation and fostering a culture of collaboration. However, as with all technologies, the broad use of OSS is accompanied by its own challenges. As indicated in the 2021 Open Source Security and Risk Analysis (OSSRA) report (Synopsys, 2021), the rapid expansion of OSS has led to a corresponding surge in vulnerabilities. These vulnerabilities, when exploited, enable attackers to perform “N-day” attacks against unpatched software systems. These attacks often have severe consequences. In November 2022, Threat Analysis Group discovered zero-day exploit chains targeting Android and iOS. These exploits were delivered via SMS bit.ly links to users in Italy, Malaysia, and Kazakhstan, related to CVE-2022-42856 1 and CVE-2022-4135 2 . Clicking the links redirected users to exploithosting pages for Android or iOS, followed by redirects to seemingly legitimate sites, including an Italian logistics company’s shipment tracking page and a popular Malaysian news website. Such 1 2 https://nvd.nist.gov/vuln/detail/cve-2022-42856 https://nvd.nist.gov/vuln/detail/cve-2022-4135 1" 2312.01244v1,"Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE 2023): Workshop and Shared Task Report Ali Hürriyetoğlu Hristo Tanev Osman Mutlu KNAW Humanities Cluster DHLab European Commission Koc University name.surname@dh.huc.knaw.nl hristo.tanev@ec.europa.eu Surendrabikram Thapa Fiona Anting Tan Erdem Yörük Virginia Tech National University of Singapore Koc University surendrabikram@vt.edu tan.f@u.nus.edu eryoruk@ku.edu.tr Abstract omutlu@ku.edu.tr We provide a summary of the sixth edition of the CASE workshop that is held in the scope of RANLP 2023. The workshop consists of regular papers, three keynotes, working papers of shared task participants, and shared task overview papers. This workshop series has been bringing together all aspects of event information collection across technical and social science fields. In addition to contributing to the progress in text based event extraction, the workshop provides a space for the organization of a multimodal event information collection task. 1 Introduction Nowadays, the unprecedented quantity of easily accessible data on social, political, and economic processes offers ground-breaking potential in guiding data-driven analysis in social and human sciences and in driving informed policy-making processes. Governments, multilateral organizations, and local and global NGOs present an increasing demand for high-quality information about a wide variety of events ranging from political violence, environmental catastrophes, and conflict, to international economic and health crises (Coleman et al., 2014; Della Porta and Diani, 2015) to prevent or resolve conflicts, provide relief for those that are afflicted, or improve the lives of and protect citizens in a variety of ways. The citizen actions against the COVID measures in the period 2020-2022 and the war between Russia and Ukraine are only two examples where we must understand, analyze, and improve the real-life situations using such data. Finally, these efforts respond to “growing public interest in up-to-date information on crowds” as well. 1 The workshop Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE 2023) is held in the scope of the conference Recent Advances in Natural Language Processing (RANLP). CASE 2023 is the sixth edition of a workshop series (Hürriyetoğlu et al., 2022b, 2021b; Hürriyetoğlu et al., 2020). We provide brief notes about the accepted papers, shared tasks, and keynote speeches in the following sections. 2 Accepted papers This year, all seven submissions were accepted by the program committee. A quick summary of these papers are provided below. • Osorio and Vásquez (2023) collect and annotate a dataset in 3 different granularity: whether a document is related to criminal activities, whether each sentence is related to lethal behaviors, and each sentence’s membership to 11 predefined categories of events. Following these granularities, the authors design three binary classification tasks and apply numerous non-neural and neural models to the annotated dataset; they observe good performance and provide analysis for data slices with lower performance. Tanev and Longueville (2023) discern “main” location, where the event in question occurred, versus “secondary” locations, that provide extra context such as the origin of the protestors and the first event location in a series of protests. They accomplish this by training a BERT model on news articles annotated with the main event location (CASE 2021 shared task news dataset). The secondary locations are all other mentioned 1 https://sites.google.com/view/crowdcountingconsortium/faqs locations. They compared their results to •" 2312.01267v1,"Distributed Reinforcement Learning for Molecular Design: Antioxidant case Huanyi Qin 1 , Denis Akhiyarov 2 , Sophie Loehle 2 , Kenneth Chiu 1 , and Mauricio Araya-Polo 2 1 Department of Computer Science, SUNY Binghamton {hqin4, kchiu}@binghamton.edu 2 TotalEnergies {denis.akhiyarov, sophie.loehle, mauricio.araya}@totalenergies.com Abstract Deep reinforcement learning has successfully been applied for molecular discovery as shown by the Molecule Deep Q-network (MolDQN) algorithm. This algorithm has challenges when applied to optimizing new molecules: training such a model is limited in terms of scalability to larger datasets and the trained model cannot be generalized to different molecules in the same dataset. In this paper, a distributed reinforcement learning algorithm for antioxidants, called DA-MolDQN is proposed to address these problems. State-of-the-art bond dissociation energy (BDE) and ionization potential (IP) predictors are integrated into DA-MolDQN, which are critical chemical properties while optimizing antioxidants. Training time is reduced by algorithmic improvements for molecular modifications. The algorithm is distributed, scalable for up to 512 molecules, and generalizes the model to a diverse set of molecules. The proposed models are trained with a proprietary antioxidant dataset. The results have been reproduced with both proprietary and public datasets. The proposed molecules have been validated with DFT simulations and a subset of them confirmed in public ""unseen"" datasets. In summary, DA-MolDQN is up to 100x faster than previous algorithms and can discover new optimized molecules from proprietary and public antioxidants. 1 Introduction Antioxidants are compounds that inhibit oxidation and are critical in a variety of industrial applications, such as fuel additives [34], lubricants [1], and polymer stabilization [24]. They can prevent oxidation and degradation, improving the performance and longevity of materials and products. Traditional antioxidant discovery approaches are time-consuming and costly, because these approaches typically require time-consuming iterative approaches from chemical researchers and rely on expensive Density Functional Theory (DFT) [22] calculations. Reinforcement learning (RL) algorithms [23, 5, 31, 17] are often used to optimize and generate new molecules based on their chemical properties, such as quantitative estimation of drug-likeness (QED) or synthesizability (SA) scores. However, new challenges arise while using RL to optimize antioxidants. Bond dissociation energy (BDE) and ionization potential (IP) indicate the reactivity and stability of the antioxidant molecules, respectively [18, 15]. Unfortunately, the estimation of BDE and IP is more demanding than QED and SA scores because DFT calculation is borderline prohibitive— it takes hours or even days to calculate a single BDE value while using DFT [37]. In this paper, Alfabet [30] and AIMNet-NSE [40] machine learning models are integrated to predict and estimate the BDE and IP properties of antioxidants, which are state-of-the-art BDE and IP predictors based on deep learning. Another challenge of antioxidant properties optimization is that the Pareto optimization front between BDE and IP is often a trade-off. Molecules with good BDE properties usually have poor IP properties and vice versa. By balancing the weight of BDE and IP, the proposed RL agent is able to optimize 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.01269v1,"Room-temperature orbit-transfer torque enabling van der Waals magnetoresistive memories Zhen-Cun Pan a,1 , Dong Li b,1 , Xing-Guo Ye a,1 , Zheng Chen c,1 , Zhao-Hui Chen a , An-Qi Wang a , Mingliang Tian c,d,e , Guangjie Yao a , Kaihui Liu a , Zhi-Min Liao a,f, ⇑ a State Key Laboratory for Mesoscopic Physics and Frontiers Science Center for Nano-optoelectronics, School of Physics, Peking University, Beijing 100871, China Academy for Advanced Interdisciplinary Studies, Peking University, Beijing 100871, China c Anhui Key Laboratory of Condensed Matter Physics at Extreme Conditions, High Magnetic Field Laboratory, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031, China b d e f School of Physics and Optoelectronic Engineering, Anhui University, Hefei 230601, China Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China Hefei National Laboratory, Hefei 230088, China Abstract: The non-volatile magnetoresistive random access memory (MRAM) is believed to facilitate emerging applications, such as in-memory computing, neuromorphic computing and stochastic computing. Two-dimensional (2D) materials and their van der Waals heterostructures promote the development of MRAM technology, due to their atomically smooth interfaces and tunable physical properties. Here we report the all-2D magnetoresistive memories featuring all-electrical data reading and writing at room temperature based on WTe 2 /Fe 3 GaTe 2 /BN/Fe 3 GaTe 2 heterostructures. The data reading process relies on the tunnel magnetoresistance of Fe 3 GaTe 2 /BN/Fe 3 GaTe 2 . The data writing is achieved through current induced polarization of orbital magnetic moments in WTe 2 , which exert torques on Fe 3 GaTe 2 , known as the orbit-transfer torque (OTT) effect. In contrast to the conventional reliance on spin moments in spin-transfer torque and spin–orbit torque, the OTT effect leverages the natural out-of-plane orbital moments, facilitating field-free perpendicular magnetization switching through interface currents. Our results indi-cate that the emerging OTT-MRAM is promising for low-power, highperformance memory applications. 1. Introduction the nanoscale to meet the demands of continuous MRAM miniaturization [3]. In conventional MRAM, energy-efficient data writing is accomplished using either spin-transfer torque (STT) [11,12] or spin–orbit torque (SOT) [13–18]. STT relies on spin-polarized current flowing through the device, while SOT switches magnetization by inducing interfacial spin polarizations between the FM and non- FM layers, thereby improving device durability and reliability [3,19]. These spin polarizations are generated through the spin Hall effect [7,8], Rashba-Edelstein effect [13], or topological surface states [20,21]. However, these effects typically produce in-plane spin polarization, which hinders magnetization switching with PMA [17]. Consequently, SOT-based PMA switching often requires an external magnetic field, although a few experiments have utilized SOT to achieve field-free PMA switching through structural asymmetry [22,23] or interfacial exchange bias [24]. Recently, a novel mechanism called orbit-transfer torque (OTT) has been proposed [25], which goes beyond spin-related effects like STT and SOT to achieve magnetization switching. OTT utilizes the current-induced orbital magnetization of Bloch electrons [26]. Magnetoresistive random access memory (MRAM), due to its high energy efficiency and fast data storage, has attracted tremendous attention in the era of big data [1–3]. In MRAM cells, data is stored as low and high resistance states in a magnetic tunnel junction (MTJ), achieved through parallel and antiparallel magnetization alignment of two ferromagnetic (FM) layers [4,5]. Writing data in MRAM cells relies on current-induced magnetization switching of the free FM layer in the MTJ [6–8]. With its nonvolatile nature, MRAM shows promise for emerging applications like neural networks, in-memory computing, and stochastic computing [9]. The discovery of two-dimensional (2D) FM materials [10] with perpendicular magnetic anisotropy (PMA) enables compact device architectures, offering stable and reliable operation at ⇑ Corresponding author. 1 E-mail address: liaozm@pku.edu.cn (Z.-M. Liao). These authors contributed equally to this work. 1" 2312.01274v1,"Learning to Compose SuperWeights for Neural Parameter Allocation Search Piotr Teterwak * Boston University Soren Nelson * Physical Sciences Inc Nikoli Dryden ETH Zürich piotrt@bu.edu snelson@psicorp.com nikoli.dryden@inf.ethz.ch Dina Bashkirova Boston University Kate Saenko Boston University Bryan A. Plummer Boston University dbash@bu.edu saenko@bu.edu bplum@bu.edu Abstract Neural parameter allocation search (NPAS) automates parameter sharing by obtaining weights for a network given an arbitrary, fixed parameter budget. Prior work has two major drawbacks we aim to address. First, there is a disconnect in the sharing pattern between the search and training steps, where weights are warped for layers of different sizes during the search to measure similarity, but not during training, resulting in reduced performance. To address this, we generate layer weights by learning to compose sets of SuperWeights, which represent a group of trainable parameters. These SuperWeights are created to be large enough so they can be used to represent any layer in the network, but small enough that they are computationally efficient. The second drawback we address is the method of measuring similarity between shared parameters. Whereas prior work compared the weights themselves, we argue this does not take into account the amount of conflict between the shared weights. Instead, we use gradient information to identify layers with shared weights that wish to diverge from each other. We demonstrate that our SuperWeight Networks consistently boost performance over the state-of-the-art on the ImageNet and CIFAR datasets in the NPAS setting. We further show that our approach can generate parameters for many network architectures using the same set of weights. This enables us to support tasks like efficient ensembling and anytime prediction, outperforming fully-parameterized ensembles with 17% fewer parameters 1 . 1. Introduction Parameter sharing is used to increase the computational efficiency and/or accuracy of neural networks (e.g., [2, 13, * Equal Contribution, work done while Soren was at Boston University 1 Code available: https://github.com/piotr- teterwak/ SuperWeights b.) Ours (SuperWeights) a.) Prior Work Bilinear Warping Layer Representation Layer Weights No Gradient-based Warping SuperWeight Representation Layer Weights from SuperWeights SSN[23] Templates warped for small and large layers Non-warped SuperWeight templates (Section 2.1) for small and large layers Non-warped SuperWeight templates (Section 2.1) for large layers Figure 1. Comparison to prior work. (a) Prior work in Neural Parameter Allocation Search [26] would search for a good parameter sharing strategy by comparing the linear weights learned by each layer over a set of shared templates that warped to the size required by each layer using bilinear interpolation only when searching for a good parameter sharing strategy. In contrast, (b) illustrates our SuperWeight Networks, which creates SuperWeights that are concatenated together to form a layer’s weights. Each SuperWeight is only shared by layers of a minimize size, helping us to avoid warping the layers in the search step and ensuring there is no disconnect between search and training stages. 20, 23, 26, 29, 32]). Instead of using hand-crafted heuristics to obtain a good parameter sharing strategy, Plummer et al. [26] introduced a task they called Neural Parameter Allocation Search (NPAS), which automatically determines where and how to share parameters in any neural network. A key challenge in this task is learning when sharing can occur between layers that may perform different operations (e.g., convolutional and fully connected) and have different sizes. Plummer et al. addressed this issue by using bilinear interpolation to warp the shared parameters to the size of each layer in the network (illustrated in Figure 1(a)). However, this was computationally costly as each layer would be need to be re-warped on every forward pass. In addition, this approach also made training the network more chal-" 2312.01275v1,"A Review of Link Prediction Applications in Network Biology AHMAD F. AL MUSAWI, Department of Computer Science, Virginia Commonwealth University, USA and Department of Information Technology, University of Thi Qar, Iraq SATYAKI ROY, Department of Mathematical Sciences, University of Alabama in Huntsville, USA PREETAM GHOSH, Department of Computer Science, Virginia Commonwealth University, USA In the domain of network biology, the interactions among heterogeneous genomic and molecular entities are represented through networks. Link prediction (LP) methodologies are instrumental in inferring missing or prospective associations within these biological networks. In this review, we systematically dissect the attributes of local, centrality, and embedding-based LP approaches, applied to static and dynamic biological networks. We undertake an examination of the current applications of LP metrics for predicting links between diseases, genes, proteins, RNA, microbiomes, drugs, and neurons. We carry out comprehensive performance evaluations on established biological network datasets to show the practical applications of standard LP models. Moreover, we compare the similarity in prediction trends among the models and the specific network attributes that contribute to effective link prediction, before underscoring the role of LP in addressing the formidable challenges prevalent in biological systems, ranging from noise, bias, and data sparseness to interpretability. We conclude the review with an exploration of the essential characteristics expected from future LP models, poised to advance our comprehension of the intricate interactions governing biological systems. CCS Concepts: • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability. Additional Key Words and Phrases: link prediction, network biology, graph representation learning ACM Reference Format: Ahmad F. Al Musawi, Satyaki Roy, and Preetam Ghosh. 2018. A Review of Link Prediction Applications in Network Biology. J. ACM 37, 4, Article 111 (August 2018), 30 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Understanding the intricate interplay among biological entities lies at the core of many questions in the field of systems biology. One approach to addressing this challenge involves harnessing the power of network analysis, notably through the mathematical construct of graphs, where biological entities are represented as nodes, and their interconnections take the form of links [1, 2]. The integration of network theory in the study of molecular and biomedical interactions has led to the emergence of network biology. This interdisciplinary domain harnesses cutting-edge computational and visualization methodologies to unravel the intricate structures and dynamic behaviors intrinsic to complex biological systems based on the underlying molecular interactions, namely, protein-protein, metabolic, signaling, and transcription-regulatory interactions [3, 4]. Authors’ addresses: Ahmad F. Al Musawi, Department of Computer Science, Virginia Commonwealth University, Richmond, Virginia, USA, almusawiaf@vcu.edu and Department of Information Technology, University of Thi Qar, Annasiriyah, Thi Qar, Iraq, almusawiaf@utq.edu.iq; Satyaki Roy, Department of Mathematical Sciences, University of Alabama in Huntsville, Alabama, USA, sr0215@uah.edu; Preetam Ghosh, Department of Computer Science, Virginia Commonwealth University, Richmond, Virginia, USA, pghosh@vcu.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. 0004-5411/2018/8-ART111 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 37, No. 4, Article 111. Publication date: August 2018. 111" 2312.01283v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Deeper into Self-Supervised Monocular Indoor Depth Estimation Chao Fan , Zhenyu Yin , Member, IEEE, Yue Li , and Feiqing Zhang Abstract—Monocular depth estimation using Convolutional Neural Networks (CNNs) has shown impressive performance in outdoor driving scenes. However, self-supervised learning of indoor depth from monocular sequences is quite challenging for researchers because of the following two main reasons. One is the large areas of low-texture regions and the other is the complex ego-motion on indoor training datasets. In this work, our proposed method, named IndoorDepth, consists of two innovations. In particular, we first propose a novel photometric loss with improved structural similarity (SSIM) function to tackle the challenge from low-texture regions. Moreover, in order to further mitigate the issue of inaccurate ego-motion prediction, multiple photometric losses at different stages are used to train a deeper pose network with two residual pose blocks. Subsequent ablation study can validate the effectiveness of each new idea. Experiments on the NYUv2 benchmark demonstrate that our IndoorDepth outperforms the previous state-of-the-art methods by a large margin. In addition, we also validate the generalization ability of our method on ScanNet dataset. Code is availabe at https://github.com/fcntes/IndoorDepth. Index Terms—Depth estimation, self-supervised, monocular, SSIM. I. I NTRODUCTION D EPTH estimation plays a significant role in the development of 3D computer vision, especially for the applications in autonomous driving [1]–[4], 3D reconstruction [5], [6], virtual reality [7]–[9], etc. In recent years, there has been growing interest in monocular depth estimation based on deep learning. Compared with supervised learning approaches [10]–[14] which need a large amount of groundtruth depth, self-supervised learning methods [15]–[17] use the photometric consistency as the supervisory signal. Therefore, it is more attractive for researchers to adopt self-supervised methods to avoid the use of expensive sensors (e.g. LiDAR). Some recent self-supervised methods [18]–[20] have achieved significant performance in outdoor scenes, such as the KITTI dataset [21] and Make3D dataset [22]. Chao Fan, Yue Li and Feiqing Zhang are with the University of Chinese Academy of Sciences, Beijing 100049, China, also with the Shenyang Institute of Computing Technology, Chinese Academy of Sciences, Shenyang 110168, China, and also with the Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic Hardware & Software, Shenyang 110168, China (e-mail: fanchao18@mails.ucas.ac.cn; liyue161@mails.ucas.edu.cn; zhangfeiqing17@mails.ucas.ac.cn). Zhenyu Yin is with the Shenyang Institute of Computing Technology, Chinese Academy of Sciences, Shenyang 110168, China, and also with the Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic Hardware & Software, Shenyang 110168, China (e-mail: congmy@163.com). Although such self-supervised methods have been able to obtain high-quality depth maps in outdoor scenes, they usually collapse easily in indoor scenes like NYUv2 dataset [23] and ScanNet dataset [24]. It is still challenging to obtain accurate indoor depth estimation results for self-supervised methods due to the following reasons. (1) Lack of textures: large low-texture regions make the network difficult to train because of the ambiguity of photometric loss in these regions. Specifically, the image gradients are close to zero which further causes zero gradients for both depth and pose estimation [25]. (2) Challenging pose estimation: the main reason why it becomes difficult to predict accurate camera poses is that the ego-motion is more complicated since indoor images are usually captured by hand-held devices. Compared with camera poses in outdoor environments where translations are dominant, indoor poses contain frequent rotations which have been proved to behave as noise to self-supervised depth learning [26]. In this paper, we propose IndoorDepth, a self-supervised monocular indoor depth estimation method by combining two innovations. First, in order to mitigate the issue of lowtexture regions, we propose a novel photometric loss, which achieves a more suitable discrimination of structural similarity by an improved structural similarity (SSIM) [27] function. Specifically, we make it more sensitive to subtle differences in structure by reducing the structural similarity index. This allows us to obtain more reasonable structural similarity index for low-texture regions in contrast to the original very high and undiscriminating index. Second, we propose a deeper pose network trained by multiple photometric losses which can further alleviate the problem of inaccurate rotation prediction. Following the iterative strategy in MonoIndoor [28], we successfully construct a deeper pose network with more residual pose blocks. But we do not simply stack more residual blocks, because it has been proved that the performance does not significantly improve or even becomes worse when the number of residual blocks is more than one [28]. In order to make all the added residual pose blocks work, we use multiple photometric losses at different stages to train the pose network. Subsequent experiments can demonstrate that such a strategy leads to better results. Our main contributions can be summarized as follows: A novel photometric loss with an improved SSIM function which helps us to obtain more reasonable structural similarity index for low-texture regions. • A deeper pose network trained by multiple photometric • 0000–0000/00$00.00 © 2021 IEEE" 2312.01292v1,"C HINA C OMMUNICATIONS Joint Beam Scheduling and Power Optimization for Beam Hopping LEO Satellite Systems Shuang Zheng, Xing Zhang * , Peng Wang, Wenbo Wang Key Laboratory of Universal Wireless Communication, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China * The corresponding author, email: hszhang@bupt.edu.cn Cite as: S. Zheng, X. Zhang, et al., “Joint beam scheduling and power optimization for beam hopping leo satellite systems,” China Communications, vol. 0, no. 0, pp. 1-14, 2023. DOI: 10.23919/JCC.ea.YYYY-MMMM.NNNN Abstract: Low earth orbit (LEO) satellite communications can provide ubiquitous and reliable services, making it an essential part of the Internet of Everything network. Beam hopping (BH) is an emerging technology for effectively addressing the issue of low resource utilization caused by the non-uniform spatio-temporal distribution of traffic demands. However, how to allocate multi-dimensional resources in a timely and efficient way for the highly dynamic LEO satellite systems remains a challenge. This paper proposes a joint beam scheduling and power optimization beam hopping (JBSPO-BH) algorithm considering the differences in the geographic distribution of sink nodes. The JBSPO-BH algorithm decouples the original problem into two sub-problems. The beam scheduling problem is modelled as a potential game, and the Nash equilibrium (NE) point is obtained as the beam scheduling strategy. Moreover, the penalty function interior point method is applied to optimize the power allocation. Simulation results show that the JBSPO-BH algorithm has low time complexity and fast convergence and achieves better performance both in throughput and fairness. Compared with greedybased BH, greedy-based BH with the power optimization, round-robin BH, Max-SINR BH and satellite resource allocation algorithm, the throughput of the Received: Revised: Editor: China Communications proposed algorithm is improved by 44.99%, 20.79%, 156.06%, 15.39% and 8.17%, respectively. Keywords: beam hopping; potential game; interior point method; resource allocation I. INTRODUCTION Satellite communication can provide seamless global communications, meeting the communication needs of sparsely populated or complex terrain areas [1, 2]. With the rapid development of broadband Internet services, traditional satellite communications are experiencing challenges such as high traffic demand and low throughput. High-throughput satellites (HTS) increase system capacity with critical technologies such as multi-spot beams, frequency reuse, and antenna gain, which has become a hot spot in today’s industry [3–5]. Most existing HTS systems use geosynchronous orbit (GEO) satellites, which are simple to build and provide stable and uninterrupted services for fixed areas. In recent years, the research on HTS has progressively evolved into low earth orbit (LEO) satellites. The main reasons are that geosynchronous orbital resources are limited, and LEO satellites have the advantages of low latency and low cost [6]. In most scenarios, the spatio-temporal distribution of traffic demands changes dynamically. The fixed power allocation and beam scheduling approach will make the limited multi-beam HTS onboard resources unable to respond efficiently to the non-uniform traffic 1" 2312.01296v1,"Anomaly Detection Under Uncertainty Using Distributionally Robust Optimization Approach Amir Hossein Noormohammadi a, * , Seyed Ali MirHassani a , Farnaz Hooshmand Khaligh a Department of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran Abstract Anomaly detection is defined as the problem of finding data points that do not follow the patterns of the majority. Among the various proposed methods for solving this problem, classification-based methods, including one-class Support Vector Machines (SVM) are considered effective and state-ofthe-art. The one-class SVM method aims to find a decision boundary to distinguish between normal data points and anomalies using only the normal data. On the other hand, most real-world problems involve some degree of uncertainty, where the true probability distribution of each data point is unknown, and estimating it is often difficult and costly. Assuming partial distribution information such as the first and second-order moments is known, a distributionally robust chance-constrained model is proposed in which the probability of misclassification is low. By utilizing a mapping function to a higher dimensional space, the proposed model will be capable of classifying origininseparable datasets. Also, by adopting the kernel idea, the need for explicitly knowing the mapping is eliminated, computations can be performed in the input space, and computational complexity is reduced. Computational results validate the robustness of the proposed model under different probability distributions and also the superiority of the proposed model compared to the standard oneclass SVM in terms of various evaluation metrics. Keywords Anomaly; One-Class Support Vector Machine; Uncertainty; chance Constraints; Distributionally Robust; Kernel 1 Introduction The history of anomaly detection dates back to studies conducted by the statistics community at the beginning of the nineteen century [1]. Due to the importance of anomaly detection during the time, many researchers from various domains have studied this problem and a wide range of approaches have been introduced [2]. In [2], an anomalous data point is defined as one that does not follow the patterns of the majority of the data points considered normal data, and the anomaly detection problem is defined as finding such data points. Although anomalies and outliers are considered the same concept, in this research, outliers refer to those in the normal class in the training data set that deviate compared to other normal data points, due to various reasons such as instrument error, measurement error, and unrepresentative sampling. Figure 1 shows a two-dimensional data set * Corresponding author. E-mail addresses: a.h.noomohammadi@aut.ac.ir (A. H. Noormohammadi), a_mirhassani@aut.ac.ir (S. A. MirHassani), f.hooshmand.khaligh@aut.ac.ir (F. Hooshmand Khaligh)." 2312.01301v1,"Churn Prediction via Multimodal Fusion Learning: Integrating Customer Financial Literacy, Voice, and Behavioral Data 1 st David Hason Rudd 2 nd Huan Huo 3 rd Md Rafiqul Islam Information Systems (Data Analytics) Faculty of Engineering and IT Faculty of Engineering and IT The University of Technology Sydney The University of Technology Sydney Australian Institute of Higher Education (AIH) Sydney, Australia Sydney, Australia Sydney, Australia r.islam@aih.edu.au huan.huo@uts.edu.au david.hasonrudd@uts.edu.au 4 rd Guandong Xu Faculty of Engineering and IT Advanced Analytics institute (AAi) Sydney, Australia guandong.xu@uts.edu.au Abstract—In today’s competitive landscape, businesses grapple with customer retention. Churn prediction models, although beneficial, often lack accuracy due to the reliance on a single data source. The intricate nature of human behavior and highdimensional customer data further complicate these efforts. To address these concerns, this paper proposes a multimodal fusion learning model for identifying customer churn risk levels in financial service providers. Our multimodal approach integrates customer sentiments, financial literacy (FL) level, and financial behavioral data, enabling more accurate and bias-free churn prediction models. The proposed FL model utilizes a SMOGN- COREG supervised model to gauge customer FL levels from their financial data. The baseline churn model applies an ensemble artificial neural network and oversampling techniques to predict churn propensity in high-dimensional financial data. We also incorporate a speech emotion recognition model employing a pretrained CNN-VGG16 to recognize customer emotions based on pitch, energy, and tone. To integrate these diverse features while retaining unique insights, we introduced late and hybrid fusion techniques that complementary boost coordinated multimodal colearning. Robust metrics were utilized to evaluate the proposed multimodal fusion model and hence the approach’s validity, including mean average precision and macro-averaged F1 score. Our novel approach demonstrates a marked improvement in churn prediction, achieving a test accuracy of 91.2%, a Mean Average Precision (MAP) score of 66, and a Macro-Averaged F1 score of 54 through the proposed hybrid fusion learning technique compared with late fusion and baseline models. Furthermore, the analysis demonstrates a positive correlation between negative emotions, low FL scores, and high-risk customers. Index Terms—Churn prediction, multimodal learning, feature fusion, financial literacy, speech emotion recognition, customer behavior I. I NTRODUCTION Understanding and predicting customer churn has become paramount for long-term success in an increasingly competitive business landscape [1]. Customer churn, or customer attrition, directly affects a company’s revenue and growth potential, making it essential to be accurately predicted and prevented [2]. Furthermore, the human cognitive system is inherently susceptible to cognitive biases, such as anchoring bias, the availability heuristic, and the bandwagon effect [9]. These biases can significantly skew customer’s feeling and decision-making towards products and services. Misguided customer interactions or suboptimal presentations of complex financial products can trigger these biases, prompting a focus on potential risks over service benefits. For financial service providers, understanding these psychological factors is crucial. It allows them to tailor product design, marketing strategies, and customer relationship management (CRM) to mitigate negative biases and churn rate. Therefore, predicting customer emotion and knowledge about products and services is not just advantageous—it’s pivotal for businesses striving for success in today’s highly competitive marketplace. Customer historical data recorded by organizations is increasing exponentially, and data analytics specialists contend that the traditional customer churn analysis method, which heavily relied on transactional data and customer demographics, is no longer a robust solution. A more comprehensive approach is required to better deal with the heterogeneous data input in various modalities. The current study aims to predict customer churn propensity by incorporating diverse modalities for the first time, to our best knowledge. The proposed approach incorporates survey analysis regarding customer financial literacy level, emotion detection from customer voices (CV), and CRM data to offer a more comprehensive representation of churn risk. The proposed approach utilizes multimodal machine learning (ML) methods for a more holistic understanding of customer churn. This approach is characterized by considering multiple facets of the customer experience, from interactions with customer service to engagement with a product or service." 2312.01307v1,"SAGE: Bridging Semantic and Actionable Parts for GEneralizable Articulated-Object Manipulation under Language Instructions Haoran Geng ∗1,2 , Songlin Wei ∗2,3 , Congyue Deng 1 , Bokui Shen 1 , He Wang †2,3 , Leonidas Guibas †1 “Turn on the blender” Context-aware instruction interpretation SAGE (container, prismatic, -1) “Turn on the blender.” (container, prismatic, -1) “Close it.” (door, revolute, -60) Semantic part = container Part grounding Motion generation “Lift the pot's lid.” (lid, prismatic, +1) “Nudge the door outward.” “Slide the drawer open.” (handle, prismatic, +1) (door, revolute, +75) “Open the pot.” (pot lid, prismatic, +1) Actionable part = slider button “Open the door, please.” “Open the microwave.” “Turn on the machine.” (handle, revolute, +30) (handle, revolute, +90)→ fail (button, prismatic, -1) “Turn off the machine.” + (door, revolute, +60) → (button, prismatic, -1) (button, revolute, +180) + (door, revolute, +90) Fig. 1: Overview. We present SAGE, a framework bridging the understanding of semantic and actionable parts for generalizable manipulation of articulated objects. Left: our pipeline. Initially, a context-aware instruction interpretation module is employed to parse the input instruction and observation into an action program and associated semantic parts. Subsequently, we ground the semantic part (container) to its actionable part (slider button) and generate the motion (the “press” action for a button) to complete the task. Right: examples of real-world tasks and our results. Our framework is able to tackle diverse manipulation tasks on a large variety of articulated objects. Abstract— Generalizable manipulation of articulated objects remains a challenging problem in many real-world scenarios given the diverse object structures, functionalities, and goals. In these tasks, both semantic interpretations and physical plausibilities are crucial for a policy to succeed. To address this problem, we propose SAGE, a novel framework that bridges the understanding of semantic and actionable parts of articulated objects to achieve generalizable manipulation under language instructions. Given a manipulation goal specified by natural language, an instruction interpreter with Large Language Models (LLMs) first translates them into programmatic actions on the object’s semantic parts. This process also involves a scene context parser for understanding the visual inputs, which is designed to generate scene descriptions with both rich information and accurate interaction-related facts by joining the forces of generalist Visual-Language Models (VLMs) and domain-specialist part perception models. To further convert the action programs into executable policies, a part grounding module then maps the object semantic parts suggested by the instruction interpreter into so-called Generalizable Actionable Parts (GAParts). Finally, an interactive feedback module is incorporated to respond to failures, which greatly increases the robustness of the overall framework. Experiments both in simulation environments and on real robots show that our framework can handle a large variety of articulated objects with ∗ Equal contribution. † Equal advising. 1 Department of Computer Science, Stanford University. 2 CFCS, School of Computer Science, Peking University. 3 Beijing Academy of Artificial Intelligence. Corresponding author: hewang@pku.edu.cn diverse language-instructed goals. We also provide a new benchmark for language-guided articulated-object manipulation in realistic scenarios. More details and demonstrations can be found at https://geometry.stanford.edu/projects/ sage/. I. I NTRODUCTION Generalizable object manipulation, which involves the transfer of manipulation skills across object shapes [21], [38], object categories[13], [14], [53], [57], or even tasks [61], is gaining increasing attention in the robot learning community. A line of works has focused on learning generalizable atomic manipulation skills of articulated objects [13]–[15], [17], [21], [38]. Yet this remains a challenging problem, especially in real-world scenarios with complex object structures (such as home appliances) and long-horizon tasks specified by natural language instructions. Imagine that you bought a new blender for your kitchen. You may play it with its power off, pressing its buttons, opening its lid, or taking off its container. But to make juice with it, you need to truly understand the functionalities of these parts, for example, “pressing the container turns it on, and it will mince the contents in the container”. In Gibson’s theory of distributed cognition [62], your interactions with the blender without and with prior knowledge can be explained by two different types of affordances: physical affordance and cognitive affordance. Physical affordances are for tasks" 2312.01308v1,"Bridging Background Knowledge Gaps in Translation with Automatic Explicitation HyoJung Han Jordan Boyd-Graber New Suggestions - A Marine Carpuat Computer Science CS, UMIACS, iSchool, LCS Computer Science, UMIACS 1 …frère de of Dominique de Villepin… University of Maryland University Maryland University of Maryland 2 La veille de Noël 1800, sachant qu'... hjhan@cs.umd.edu jbg@umiacs.umd.edu marine@cs.umd.edu 3 …ont écrit leur « J’accuse… ! ». 󰏃🙂 Source 󰑔🤔 Literal 1 …brother of Dominique de Villepin … Translation New Suggestions - D 2 The day before Christmas 1800, knowing that 3 …have written their “J’accuse…!”. Abstract 1 …frère de Dominique de Villepin… 󰏃🙂 󰑔😃 with 1 …brother of the former French Prime Source 2 La veille de Noël 1800, sachant qu'... Minister Dominique de Villepin … Explicitation Translations help people understand content 3 …l'attentat contre Charlie Hebdo… 2 On Christmas Eve in 1800, amid the French written in another language. However, even cor- 󰑔🤔 Literal 1 …brother of Dominique de Villepin … Revolution, rect 3 literal translations do not fulfill that goal Translation 2 The day before Christmas 1800, knowing that have written their “J’accuse…!”, a famous 3 …the attack against Charlie Hebdo… when open people necessary background letter lack by a the French novelist accusing the government in response to a miscarriage of to understand them. Professional translators 󰑔😃 with 1 …brother of the former French Prime justice. explicitations to explain the missincorporate Minister Dominique de Villepin … Explicitation 2 On Christmas Eve in 1800, amid the French ing context by considering cultural differences \caption{Example of cultural explicitation in French-English. Translators compensate for background between knowledge gaps with explicitation in the target language. Here, while Revolution, source and target audiences. Despite underlined parts do not need to be introduced in the French-speaking world, English 3 …the attack against the French satirical speakers may additional information, in the red colored text, to enhance their its need potential to help as users, NLP research on exnewspaper Charlie Hebdo… understanding. Flags represent national identity and its associated cultural milieu rather plicitation is limited because of the dearth of than language.} adequate evaluation methods. This work intro- Figure 1: Examples of French-English W IKI E XPL . duces techniques for automatically generating Translators compensate for background knowledge gaps explicitations, motivated by W IKI E XPL 1 : a with explicitation in the target language. Here, while undataset that we collect from Wikipedia and anderlined parts do not need to be introduced in the Frenchnotate with human translators. The resulting exspeaking world, English speakers may need additional 1 …frère de Dominique de Villepin… plicitations are useful as they help answer ques- 󰏃🙂 information, as in the red colored text, to enhance their …frère de Dominique de Villepin… Source 2 La veille de Noël 1800, sachant qu'... 󰏃🙂 tions 1 more accurately in a multilingual question understanding. Flags represent national identity and its 3 …SNCF, en 2010… Source answering 2 La veille de Noël 1800, sachant qu'... framework. associated cultural milieu rather than language. 󰑔🤔 Literal 1 …brother of Dominique de Villepin … 󰑔🤔 Literal 1 …brother of Dominique de Villepin … New Suggestions - B Translation 1 2 The day before Christmas 1800, knowing that The Best Translations Go Beyond Cur Source Literal Transl 󰑔🤔 “Wh Translation w …brother of de Villepin … 󰑔😃 “Ah \caption{Translat target language. French-speaking Minister. Flags re language.} P New Suggestions - C Translation 1 …brother of the former French Prime 󰑔😃 with Literal Meaning 2 The day before Christmas 1800, knowing that 3 …SNCF, in 2010… that is generally shared among the source language Minister Dominique de Villepin … 󰑔😃 with 1 …brother of the former French Prime Explicitation speaking communities Minister Dominique (Séguinot, de Villepin … 1988; Klaudy, Explicitation 2 On Christmas Eve in 1800, amid the French A good translation is one that literally conveys the 1993). Since the target audience 2 On Christmas Eve language in 1800, amid the French does not Revolution, knowing that correct meaning of every word in one language in Revolution, share the same background and cultural knowledge, 3 …railway authority SNCF, in 2010… another language. . . and this is what is rewarded translators often give an explanatory translation for by translation metrics like BLEU . However, the better understanding, which Klaudy (1993, 1998) best translations go beyond \caption{French-English the literal text Example (Snelldefines “pragmatic explicitation”. For examof \wikiexpl{}. Translators as compensate for background knowledge gaps with explicitation in the target language. Here, while underlined parts do Hornby, 1990, 2006), viewing translation as means ple, world, the English name “Dominique de Villepin” may be not need to be introduced in the French-speaking speakers may need additional information, as in the the red colored text, to enhance their understanding. Flags to an end: enable a communicative act in tarwell known in French community while totally unrepresent national identity and its associated cultural milieu rather than language.} get language. This requires “going beyond” strict known to English speakers in which case the transequivalency to consider underlying presuppositions lator may detect this gap of background knowledge of the respective source and target cultures (Nida between two sides and translate it as “the former and Taber, 1969, 2003). French Prime Minister Dominique de Villepin” As a result, professional translators use a tech- instead of just “Dominique de Villepin”. nique called “explicitation”, an explicit realiza- Despite its utility, research on explicitation is tion of implicit information in the source language limited: 1) current automatic metrics of translabecause it is apparent from either the context or tion prefer translations that precisely convey the the situation (Vinay and Darbelnet, 1958, 1995). exact literal meaning of the original source (thus One of the main motivations of explicitation is penalizing the addition of “extraneous informato convey the necessary background knowledge tion”); 2) the lack of labeled explicitation data 1 We release our dataset at https://github.com/ h-j-han/automatic_explicitation. hampers the study of automatic generation. Existing research including Hoek et al. (2015) and … 󰏃🙂 “I kn Source No 󰏃🙂 on Literal Trans 󰑔🤔 “W Translation Many are th their “J’accu accusing the 󰑔😃 “A \caption{Explicitati knowledge by add while ``J’accuse...! speakers need to b powerful.}" 2312.01313v1,"1 Observer-based Periodic Event-triggered and Self-triggered Boundary Control of a Class of Parabolic PDEs Bhathiya Rathnayake, Student Member, IEEE and Mamadou Diagne, Member, IEEE Abstract—This paper introduces the first observer-based periodic event-triggered control (PETC) and self-triggered control (STC) for boundary control of a class of parabolic PDEs using PDE backstepping control. We introduce techniques to convert a certain class of continuous-time event-triggered control into PETC and STC, eliminating the need for continuous monitoring of the event-triggering function. For the PETC, the eventtriggering function requires only periodic evaluations to detect events, while the STC proactively computes the time of the next event right at the current event time using the system model and the continuously available measurements. For both strategies, the control input is updated exclusively at events and is maintained using a zero-order hold between events. We demonstrate that the closed-loop system is Zeno-free. We offer criteria for selecting an appropriate sampling period for the PETC and for determining the time until the next event under the STC. We prove the system’s global exponential convergence to zero in the spatial L 2 norm for both anti-collocated and collocated sensing and actuation under the PETC. For the STC, local exponential convergence to zero in the spatial L 2 norm for collocated sensing and actuation is proven. Simulations are provided to illustrate the theoretical claims. Index Terms—Backstepping control design, event-triggered control, periodic event-triggered control, self-triggered control, reaction-diffusion systems. I. I NTRODUCTION Event-triggered control (ETC) updates the control input based on events generated by a suitable event-triggering mechanism instead of at fixed intervals. This approach incorporates feedback into the control update tasks, allowing the control input to be updated aperiodically and only when necessary, based on the system’s states. Consequently, ETC reduces the frequency of control updates while maintaining a satisfactory level of performance in the closed-loop system [8]. ETC consists of a feedback control law that achieves desired closed-loop system properties and an event-triggered mechanism that specifies control input updates. A primary aim is avoiding Zeno behavior—infinite updates in a finite time—which is usually achieved by the careful design of the event-triggering mechanism so that it is endowed with a positive lower bound for the time between events, known as the minimal dwell-time. Research over the last decade B. Rathnayake is with the Department of Electrical and Computer Engineering, University of California San Diego, 9500 Gilman Dr, La Jolla, CA 92093. Email: brm222@ucsd.edu M. Diagne is with the Department of Mechanical and Aerospace Engineering, University of California San Diego, 9500 Gilman Dr, La Jolla, CA 92093. Email: mdiagne@ucsd.edu has expanded from ODEs [8] to those on PDEs, generating considerable advances (e.g. [3]–[5], [9], [11], [13], [14], [18]). Particularly, [13] and [14] significantly contribute to this work by introducing ETC for reaction-diffusion PDEs, with the former addressing an anti-collocated and the latter a collocated boundary sensing and actuation configuration. A significant limitation of ETC for both ODEs and PDEs is the necessity for continuous-time monitoring of the triggering function to detect events, which is not ideal for digital implementations. These strategies are referred to as continuoustime ETC (CETC). To address this limitation, two alternative approaches have been developed: • Periodic event-triggered control (PETC) which checks the event-triggering condition periodically and decides on control updates [6], • Self-triggered control (STC) which proactively calculates the next event time at the current event time, using system states and the knowledge of the system’s dynamics [8]. Recent works on both PETC [2], [6], [7], [19] and STC [1], [10], [17], [20] of ODE systems have surfaced. However, their use in controlling PDE plants remains limited, with only a few papers addressing infinite-dimensional systems [15], [16]. Utilizing semigroup theory, [16] provides a full-state feedback PETC for infinite dimensional systems with unbounded control operators and point actuation whereas [15] provides a full-state feedback STC for infinite dimensional systems with bounded control operators and spatially distributed actuation. The present contribution introduces the first observer-based PETC and STC for boundary control of a class of parabolic PDEs under Robin actuation using PDE backstepping approach. 1 Specifically, we present observer-based PETC designs when the boundary sensing and actuation are either collocated or anti-collocated and an observer-based STC design with collocated boundary sensing and actuation. Our designs are far from trivial and encompass all possible configurations of boundary sensing and actuation but anti-collocated sensing and actuation under STC. The PETC results from a careful redesign of the continuoustime event-triggering function of the CETC [13], [14] to allow for periodic evaluation only. A novel periodic event triggering function is derived by finding an upper bound of the underlying continuous-time event-triggering function between two consecutive periodic evaluations. Subsequently, an explicit upper-bound of the allowable sampling period for periodic 1 The full-state feedback PETC was in part presented in [12]." 2312.01317v1,"UWThPh-2023-28 Modified Einstein equations from the 1-loop effective action of the IKKT model Kaushlendra Kumar 1a,b , Harold C. Steinacker 2 c a Institute of Theoretical Physics, Leibniz University Hannover Appelstraße 2, A-30167 Hannover, Germany b Erwin Schrödinger Institute for Mathematics and Physics University of Vienna c Department of Physics, University of Vienna, Boltzmanngasse 5, A-1090 Vienna, Austria Abstract We derive the equations of motion that arise from the one-loop effective action for the geometry of 3+1 dimensional quantum branes in the IKKT matrix model. These equations are cast into the form of generalized Einstein equations, with extra contributions from dilaton and axionic fields, as well as a novel anharmonicity tensor C µν capturing the classical Yang-Mills-type action. The resulting gravity theory approximately reduces to general relativity in some regime, but differs significantly at cosmic scales, leading to an asymptotically flat FLWR cosmological evolution governed by the classical action. 1 Address from July 1, 2023: Institute of Physics, Humboldt University, Zum Großen Windkanal 2, 12489 Berlin. Email: kumarkau@physik.hu-berlin.de 2 Email: harold.steinacker@univie.ac.at" 2312.01322v1,"Weak KAM Theory in Quasi-periodic Hamiltonian Systems Xun Niu a 1 , Yong Li a,b,∗ 2 a Institute of Mathematics, Jilin University, Changchun 130012, P. R. China c School of Mathematics and Statistics, Center for Mathematics and Interdisciplinary Sciences, Northeast Normal University, Changchun, Jilin 130024, P. R. China Abstract We investigate the dynamics of quasi-periodic Hamiltonian systems from the perspective of weak KAM theory. We obtain that the limit u, which obtained from convergence of a sequence of functional minimizers, satisfies Hamilton-Jacobi equations in a weak sense. This is the so-called weak KAM solutions. Meanwhile, we also get a minimal measures µ. Finally, we discuss the existence and uniqueness of smooth solutions to a kind of divergence equation by the continuation method, which is crucial to our approach. Keywords: quasi-periodic Hamiltonian, weak KAM theory, viscosity solutions Contents 1 Introduction 2 2 Weak KAM solution 2.1 Main assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Proof of the main theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 3 Convergence 5 4 Properties of limits 7 5 Existence and uniqueness of the solution 12 6 15 15 Appendix 6.1 Proof of Lemma 4.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 References 16 1 E-mail address : niuxunmath@163.com E-mail address : liyong@jlu.edu.cn ∗ Corresponding author 2 Preprint submitted to A December 5, 2023" 2312.01327v1,"Review Ionizing spotlight of active galactic nucleus Alexei V. Moiseev 1,†,‡ *O and Aleksandrina A. Smirnova 1 * Citation: Alexei Moiseev and Aleksandrina Smirnova Ionizing spotlight of AGN. Preprints 2022, 1, 0. https://doi.org/ Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affil- iations. Copyright: © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Special Astrophysical Observatory, Russian Academy of Sciences, Nizhny Arkhyz 369167, Russia; moisav@sao.ru Correspondence: moisav@sao.ru; (A.M.), ssmirnova@gmail.com; (A.S.) Abstract: Ionization cones and relativistic jets give us one of the most large-scale example of active galactic nuclei (AGN) influence on the surrounding gas environment in galaxies and beyond. The study of ionization cones makes it possible not only to test the predictions of the unified model of galactic activity, but also to probe galaxy gas environment and trace how the luminosity of the nucleus changes over time (a light echo). In the external galactic or even extragalactic gas ionization cones create Extended Emission-Line Regions (EELRs) which can span distances from several to hundreds kpc away a host galaxy. We review the recent results of studying the gas kinematics and its ionization properties in EELRs with a special attention to search of fading AGN radiation on the time scale few × ( 10 4 − 10 5 ) yr. The role of modern narrow-band and integral-field surveys in these researches is also considered. Keywords: galaxies: active; galaxies: jets; galaxies: Seyfert; Interstellar medium (ISM): nebulae 1. Introduction There is no doubt that the phenomenon of active galaxy nucleus (AGN) is caused by the accretion of the surrounding matter to the central super massive black hole (SMBH). Until recently, there were only indirect evidences, but now we have images of black holes in the nucleus of the active galaxy M87 [1] and in the Milky Way [2], obtained by radio interferometry. Figure 1 shows the unified model of the ‘accretion engine’ of the AGN[3,4], including a rotating accretion disk of the matter captured by the central black hole, relativistic jet and a gas-dust optically thick torus surrounding the accretion disk. The variety of observed AGN types can be explained by the different orientation of the AGN central engine toward the observer, so that the dust torus hides the accretion disk and the ionized gas clouds closest to the nucleus (r < 1 pc) in different ways. These clouds, moving at speeds up to several tens of thousands km s − 1 , are responsible for the formation of broad components in the lines of ionized hydrogen in the spectra of type 1 Seyfert galaxy (broad line region — BLR). If BLR region is covered from us by a torus, the spectrum of type 2 Seyfert galaxy is directly observed. It contains relatively narrow both recombination and forbidden lines produced by gas clouds at larger distances from SMBH (narrow line region — NLR). The line-fo-sight velocities do not exceed several hundreds of km s − 1 , the size of a typical NLR region ranges from a few hundred parsecs to a few kpc. The growth and activity of the SMBH is closely related to the host galaxy properties and evolution. The galaxies interaction and secular evolution [8] leads to the loss of angular momentum of the external gas feeding the accretion engine. On the other hand, the active nucleus also demonstrates a noticeable influence on the surrounding interstellar medium and even intergalactic environment. Gas in accretion disk is heated up to high temperatures and radiates both as in the UV as in X-rays. Therefore, we distinguish between mechanical effects (an injection of the kinetic energy of a jet and/or hot winds to the environment) and radiative ones, associated with both ionization of the interstellar medium by energetic quanta, and with the radiation pressur from the accretion engine. Such effect can stop star formation in the galactic gas by ionizing it and heating it up to high temperatures, so that not only fragmentation, but also the existence of cold molecular clouds becomes impossible (negative feedback). On the other hand, the wind from outflow and shock waves associated with jet may compress the gas and trigger the star formation (positive feedback). This" 2312.01332v1,"The electromagnetic properties of the T cc + molecular states Ya-Ding Lei 1, ∗ and Hao-Song Li 1, 2, 3, 4, † 1 School of Physics, Northwest University, Xian 710127, China Institute of Modern Physics, Northwest University, Xian 710127, China 3 Shaanxi Key Laboratory for Theoretical Physics Frontiers, Xian 710127, China 4 Peng Huanwu Center for Fundamental Theory, Xian 710127, China 2 + In this work, we discuss the electromagnetic properties of the S-wave and D-wave T cc molecular states, which include the magnetic moments, transition magnetic moments and radiative decay + widths. According to our results, the magnetic moment of T cc state observed experimentally is −0.09µ N . Meanwhile, we also discuss the relations between the transition magnetic moments of + the S-wave T cc molecular states and the radiative decay widths, and we analyze the proportionality + between the magnetic moments of the T cc molecular states. These results provide further information + on the inner structure of T cc molecular states and deepen the understanding of electromagnetic properties of doubly charmed tetraquarks. I. INTRODUCTION In 2003, the Belle Collaboration observed X(3872), which proved the existence of exotic hadronic states [1]. The mass of X(3872) is very close to the mass threshold of DD̄ ∗ , which promoted the theoretical studies of D (∗) D (∗) states. Quantum Chromodynamics (QCD) allows for the existence of multi-quark states, such as tetraquark states and pentaquark states. In 2007, the Bell Collaboration reported the first non-zero-charge Z c (4430) + with quark configuration of cuc̄ d ¯ [2]. Subsequently, a series of tetraquark states were observed, such as Z c (3900) + [3, 4], Z c (4020) + [5]. These works aroused the interest of theorists in doubly heavy tetraquarks, and as experimental precision improved, more and more exotic tetraquark states were observed and studied [6–17]. + In 2021, the LHCb Collaboration observed the doubly charmed tetraquark state T cc composed of P + four quarks ccū d ¯ and quantum number J = 1 [18, 19]. This exotic state shows a narrow peak in + the mass spectrum of the D 0 D 0 π + meson. The mass of the T cc state with respect to the D ∗+ D 0 mass threshold and the width are δ m BW = −273 ± 61 ± 5 +11 −14 keV, Γ m BW = 410 ± 165 ± 43 +18 −38 keV. For the doubly charmed tetraquarks, their properties have been studied extensively in the past decades, and there exists abundant experimental and theoretical works [20–35]. + Whether T cc is compact tetraquark states or a molecular states remains debated, there are many theoretical studies of the interpretation of compact tetraquark states [36–39]. In addition, the + interpretation of molecular state is reasonable [40–44], since the mass of the T cc state is very close ∗+ 0 ∗ to the D D mass threshold. In Ref. [45], the authors studied the DD hadronic molecule + + interpretation of T cc and calculated the mass and decay width of T cc using the one-meson exchange + potential model. In Ref. [46], the authors assumed that T cc is an isoscalar DD ∗ molecule, and used + the effective Lagrangian method to study the partial decay width of T cc → DDπ, which resulted in smaller than the central experimental value of the Breit-Wigner fit. In Ref. [47], the authors + studied the decay of T cc in the molecular interpretation using effective field theory, and calculated differential distributions in the invariant mass. For exotic hadronic state, the magnetic moments and the transition magnetic moments are crucial observable physical quantities, which can be used to distinguish between different configurations, ∗ Electronic address: yadinglei@stumail.nwu.edu.cn † Electronic address: haosongli@nwu.edu.cn" 2312.01335v1,"Facial Emotion Recognition Under Mask Coverage Using a Data Augmentation Technique Aref Farhadipour Pouya Taghipour Media Engineering IRI Broadcasting University Tehran, Iran areffarhadi@gmail.com Microelectronics and Communications Research Lab École de technologie supérieure (ETS) Montréal, Quebec, Canada pouya.taghipour.1@ens.etsmtl.ca Abstract— Identifying human emotions using AI-based computer vision systems, when individuals wear face masks, presents a new challenge in the current Covid-19 pandemic. In this study, we propose a facial emotion recognition system capable of recognizing emotions from individuals wearing different face masks. A novel data augmentation technique was utilized to improve the performance of our model using four mask types for each face image. We evaluated the effectiveness of four convolutional neural networks, Alexnet, Squeezenet, Resnet50 and VGGFace2 that were trained using transfer learning. The experimental findings revealed that our model works effectively in multi-mask mode compared to single-mask mode. The VGGFace2 network achieved the highest accuracy rate, with 97.82% for the person-dependent mode and 74.21% for the person-independent mode using the JAFFE dataset. However, we evaluated our proposed model using the UIBVFED dataset. The Resnet50 has demonstrated superior performance, with accuracies of 73.68% for the person-dependent mode and 59.57% for the person-independent mode. Moreover, we employed metrics such as precision, sensitivity, specificity, AUC, F1 score, and confusion matrix to measure our system's efficiency in detail. Additionally, the LIME algorithm was used to visualize CNN's decision-making strategy. To address this issue, we propose a new emotion recognition system that can perform effectively in the presence of masks. We first trained the system using datasets comprising images of individuals wearing masks. Convolutional Neural Networks (CNN) were used in four different architectures, and applied with the transfer learning approach. To prevent overfitting and address data scarcity challenges [1], we introduce an augmentation technique that adds different masks to the face to increase image variations. This approach involves using an automated algorithm to place mask models on the human face. Keywords— Facial Emotion Recognition; Convolutional Neural Network; Data Augmentation; Transfer Learning I. I NTRODUCTION The popularity of computer assistant systems is dependent on the proper interaction between humans and machines, regardless of real-world scenarios. Emotion recognition from facial expressions plays a crucial role in ensuring accurate communication between humans and machines. However, expressing emotions through the face involves variations in the form and position of facial organs. Additionally, real-world obstacles, such as a mask covering the face, may hinder the system from correctly interpreting a person's emotional state entirely. The COVID-19 pandemic has resulted in the widespread use of masks in crowded environments, such as workplaces and hospitals. Despite the increased use of masks, individuals still wish to avail of services that rely on machine interaction. Unfortunately, the standard emotion recognition systems are unable to correctly monitor the person's entire face due to partial mask coverage. To the best of our understanding, only a few studies have been done on facial emotion recognition under masked conditions. Castellano et al. [2] focused on emotion recognition task solely from the eye area. This approach was assessed using the masked FER-2013 dataset containing seven emotions. In [3], a deep network with a two-stage attention mechanism was proposed to tackle the obstacles of face masks in emotion recognition. The network could recognize three emotions: positive, negative, and neutral. Paper [4] proposed face expression recognition system based on vision transformers. Based on this strategy in the first step, a face parsing model has been trained to recognize better covered part of the face from the naked. In the next step, they established a vision transformer extractor for face emotion recognition and in the best situation, 62% accuracy was reported on the masked FER-2023 dataset. In [5], a variety of training schemes have been evaluated to better understand the changes in arusal and valence dusing the masked facial emotion expression. The best results on the masked AffectNet dataset were obtained, with 53% and 45% accuracy for arousal and valence, respectively. Magherini et al. [6] utilized Resnet50 and InceptionResnet to classify five-class emotion recognition for masked images. Their system achieved 96.92% accuracy on AffectNet dataset. Dinca et al. [7] proposed an autoencoder artichecture of CNN to recognize positive and negative emotions, yielding 95.4% for the AFEW- VA dataset. II. E XPERIMENTAL S ETUP Datasets are a crucial requirement in the design of pattern recognition systems. In this paper, we used two datasets, namely JAFFE and UIBVFED. We will introduce these" 2312.01338v1,"1 Enhancing and Adapting in the Clinic: Source-free Unsupervised Domain Adaptation for Medical Image Enhancement Heng Li, Ziqin Lin, Zhongxi Qiu, Zinan Li, Ke Niu, Na Guo, Huazhu Fu, Yan Hu, Jiang Liu Abstract—Medical imaging provides many valuable clues involving anatomical structure and pathological characteristics. However, image degradation is a common issue in clinical practice, which can adversely impact the observation and diagnosis by physicians and algorithms. Although extensive enhancement models have been developed, these models require a well pretraining before deployment, while failing to take advantage of the potential value of inference data after deployment. In this paper, we raise an algorithm for source-free unsupervised domain adaptive medical image enhancement (SAME), which adapts and optimizes enhancement models using test data in the inference phase. A structure-preserving enhancement network is first constructed to learn a robust source model from synthesized training data. Then a teacher-student model is initialized with the source model and conducts source-free unsupervised domain adaptation (SFUDA) by knowledge distillation with the test data. Additionally, a pseudo-label picker is developed to boost the knowledge distillation of enhancement tasks. Experiments were implemented on ten datasets from three medical image modalities to validate the advantage of the proposed algorithm, and setting analysis and ablation studies were also carried out to interpret the effectiveness of SAME. The remarkable enhancement performance and benefits for downstream tasks demonstrate the potential and generalizability of SAME. The code is available at https://github.com/liamheng/Annotation-free- Medical-Image-Enhancement. Index Terms—Medical image enhancement, source-free unsupervised domain adaptation, knowledge distillation, pseudo-label selection. I. I NTRODUCTION The advancement of modern medical imaging technology has provided a wealth of valuable clues regarding anatomical structures and pathological characteristics for disease diagnosis. Based on high-quality medical images, emerging deep learning algorithms have demonstrated significant potential in medical image analysis and disease diagnosis, achieving a This work was supported in part by the National Natural Science Foundation of China (82272086, 82102189), Guangdong Provincial Department of Education (SJZLGC202202), and Shenzhen Natural Science Fund (20200925174052004). (Corresponding Author: Jiang Liu, liuj@sustech.edu.cn) H. Li, Z. Qiu, Y. Hu, and J. Liu are with the Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, China; Z. Lin, Z. Li, and J. Liu are with the Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China; H. Fu is with the Institute of High Performance Computing, Agency for Science, Technology and Research, Singapore; K. Niu is with Computer School, Beijing Information Science and Technology University, Beijing, China; N. Guo is with the School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China. Fig. 1. Examples of medical image enhancement. (a) Low-quality samples of fundus photography, OCT, and ultrasound. (b) Samples enhanced by the source model and (c) further improved by SFUDA. (d) High-quality references. diagnostic performance comparable to that of human medical professionals [1]. Regrettably, medical imaging in clinical settings is vulnerable to quality degradation (Fig. 1 (a)) caused by environmental factors, inappropriate operation, and patient status [2], leading to uncertainties in observations and diagnoses [3]. For instance, an investigation of 135,867 fundus images in the UK Biobank revealed that only 71.5% of the samples were of sufficient quality to conduct vessel morphometry [4]. In such cases, patients may need to be re-examined to obtain qualified imaging data, causing unnecessary costs, secondary radiation exposure, and time delays. Enhancing the legibility of low-quality medical imaging holds great potential in improving clinical observation and diagnosis, avoiding the shortcomings of re-examination. Consequently, significant efforts have been devoted to enhancing medical images over the years. Historically, researchers have mined statistical prior knowledge to develop hand-crafted methods for medical image enhancement [5]. With recent advances in deep learning, powerful image embedding capabilities have enabled more convenient and efficient enhancement of medical images. Despite the advantages of deep learning, abundant training data are necessary to optimize deep networks. Furthermore, enhancement algorithms typically rely on high-low quality paired data, which creates a major challenge in data collection [6]. To address this issue, more recent studies have introduced enhancement algorithms based on unpaired [7], [8] and synthetic data [9], [10]. However, these methods have their own respective limitations, such as compromised image structure preservation with unpaired data or performance drops in real-world scenarios with synthesized" 2312.01342v1,"Graph Coordinates and Conventional Neural Networks - An Alternative for Graph Neural Networks Zheyi Qin Randy Paffenroth Anura P. Jayasumana Electrical and Computer Engineering Colorado State University Fort Collins, USA zheyi.qin@colostate.edu Department of Data Science Program Worcester Polytechnic Institute Worcester, MA, USA rcpaffenroth@wpi.edu Electrical and Computer Engineering Colorado State University Fort Collins, USA anura.jayasumana@colostate.edu Abstract—Graph-based data present unique challenges and opportunities for machine learning. Graph Neural Networks (GNNs), and especially those algorithms that capture graph topology through message passing for neighborhood aggregation, have been a leading solution. However, these networks often require substantial computational resources and may not optimally leverage the information contained in the graph’s topology, particularly for large-scale or complex graphs. We propose Topology Coordinate Neural Network (TCNN) and Directional Virtual Coordinate Neural Network (DVCNN) as novel and efficient alternatives to message passing GNNs, that directly leverage the graph’s topology, sidestepping the computational challenges presented by competing algorithms. Our proposed methods can be viewed as a reprise of classic techniques for graph embedding for neural network feature engineering, but they are novel in that our embedding techniques leverage ideas in Graph Coordinates (GC) that are lacking in current practice. Experimental results, benchmarked against the Open Graph Benchmark Leaderboard, demonstrate that TCNN and DVCNN achieve competitive or superior performance to message passing GNNs. For similar levels of accuracy and ROC-AUC, TCNN and DVCNN need far fewer trainable parameters than contenders of the OGBN Leaderboard. The proposed TCNN architecture requires fewer parameters than any neural network method currently listed in the OGBN Leaderboard for both OGBN- Proteins and OGBN-Products datasets. Conversely, our methods achieve higher performance for a similar number of trainable parameters. These results hold across diverse datasets and edge features, underscoring the robustness and generalizability of our methods. By providing an efficient and effective alternative to message passing GNNs, our work expands the toolbox of techniques for graph-based machine learning. A significantly lower number of tunable parameters for a given evaluation metric makes TCNN and DVCNN especially attractive for resource limited IoT/mobile devices and for reducing power consumption of ML models. I. I NTRODUCTION Node and link property predictions are a fundamental problem in graph-based machine learning and network analysis, aiming to predict the attributes or properties of nodes in a given graph. Graphs are mathematical structures consisting of nodes (or vertices) and edges, and are highly expressive representations of complex data and relationships. They have found immense utility in a wide range of domains, such as social networks, biological systems, and computer vision, to name a few. Recent years have seen significant progress in the development of graph-based machine learning techniques, including message passing based Graph Neural Networks (GNNs) [1], graph embedding based Neural Networks [2], Graph Convolutional Networks (GCNs) [3], and Graph Attention Networks (GATs) [4], which have proven effective in tackling the node property prediction problem. These models capture the graph’s local and global structural information and the interactions between nodes and their neighbors to learn powerful representations for downstream tasks. As observed in Wikipedia, which is at least indicative of the common parlance though perhaps not authoritative, ”[T]he key design element of GNNs is the use of pairwise message passing, such that graph nodes iteratively update their representations by exchanging information with their neighbors.” 1 Accordingly, it is important to emphasize that this paper does not derive any new methods for GNNs as defined above. However, our focus in this paper is on Graph Embedding based Neural Networks (GENN), where there is an explicit graph embedding step (e.g., into some Euclidean space) before applying a Neural Network, as opposed to the commonly defined GNNs. The node property prediction task holds great promise in driving advances in various applications, including but not limited to drug discovery, fraud detection, recommender systems, and community detection. In essence, the goal is to leverage a graph’s inherent structure and topological features, along with any available node or edge features, to predict node properties, which can be categorical, binary, or continuous variables. However, there are three major limitations associated with GNNs. First, despite the significant achievements of GNNs in a range of graph-based tasks, their efficiency in capturing and utilizing topological information may sometimes be compromised. For instance, obtaining a comprehensive understanding 1 https://en.wikipedia.org/wiki/Graph neural network" 2312.01344v1,"tsMorph: generation of semi-synthetic time series to understand algorithm performance Moisés Santos 1,3[0000−0002−1541−8333] , André de Carvalho 1 , and Carlos Soares 2,3 1 Institute of Mathematical and Computer Sciences, University of São Paulo, São Paulo, Brazil andre@icmc.usp.br 2 Fraunhofer AICOS Portugal, Porto, Portugal 3 LIACC/Faculdade de Engenharia da Universidade do Porto, Porto, Portugal mrsantos@fe.up.pt, csoares@fe.up.pt Abstract. Time series forecasting is a subject of significant scientific and industrial importance. Despite the widespread utilization of forecasting methods, there is a dearth of research aimed at comprehending the conditions under which these methods yield favorable or unfavorable performances. Empirical studies, although common, encounter challenges due to the limited availability of datasets, impeding the extraction of reliable insights. To address this, we present tsMorph, a straightforward approach for generating semi-synthetic time series through dataset morphing. tsMorph operates by creating a sequence of datasets derived from two original datasets. These newly generated datasets exhibit a progressive departure from the characteristics of one dataset and a convergence toward the attributes of the other. This method provides a valuable alternative for obtaining substantial datasets. In this paper, we demonstrate the utility of tsMorph by assessing the performance of the Long Short- Term Memory Network forecasting algorithm. The time series under examination are sourced from the NN5 Competition. The findings reveal compelling insights. Notably, the performance of the Long Short-Term Memory Network improves proportionally with the frequency of the time series. These experiments affirm that tsMorph serves as an effective tool for gaining an understanding of forecasting algorithm behaviors, offering a pathway to overcome the limitations posed by empirical studies and enabling more extensive and reliable experimentation. Keywords: Synthetic data · Time series · Dataset morphing. 1 Introduction Forecasting is one of the main tasks in the decision-making process [12]. Quantitative approaches use historical data such as time series to make forecasts [18]. Time series forecasting is used in several application domains, such as weather, stock markets, and epidemiology. Several methods for time series forecasting have been proposed in the literature with high predictive performance on diverse domains [17]. However, according to Wang et al. (2022) [20], a limited" 2312.01345v1,"1 Introducing Modelling, Analysis and Control of Three-Phase Electrical Systems Using Geometric Algebra Manel Velasco, Isiah Zaplana, Arnau Dòria-Cerezo, Josué Duarte and Pau Martı́ Abstract—State-of-the-art techniques for modeling, analysis and control of three-phase electrical systems belong to the real-valued multi-input/multi-output (MIMO) domain, or to the complex-valued nonlinear single-input/single-output (SISO) domain. In order to complement both domains while simplifying complexity and offering new analysis and design perspectives, this paper introduces the application of geometric algebra (GA) principles to the modeling, analysis and control of three-phase electrical systems. The key contribution for the modeling part is the identification of the transformation that allows transferring real-valued linear MIMO systems into GA-valued linear SISO representations (with independence of having a balanced or unbalanced system). Closed-loop stability analysis in the new space is addressed by using intrinsic properties of GA. In addition, a recipe for designing stabilizing and decoupling GA- valued controllers is provided. Numerical examples illustrate key developments and experiments corroborate the main findings. Index Terms—Three-phase electrical systems, geometric algebra, modelling, balanced, unbalanced I. I NTRODUCTION T HE modeling, analysis and control of three-phase electrical systems exhibits different complexity depending on the adopted representation, as sketched in Fig. 1 where a closed-loop scheme may take different forms according to the underlying space. A three-phase dynamic system can be modeled as a 3 × 3 real-valued MIMO system, with a matrix of real-valued transfer functions (transfer matrix) relating each input to each output. In many applications, when either the αβ stationary frame or the dq synchronously rotating frame is adopted, the three-phase quantities can be represented by twophase quantities and the real-valued MIMO transfer matrix is reduced by one dimension, leading to 2 × 2 real MIMO systems, a illustrated in Sub-fig. 1a. Moreover, the two-phase quantities can be organized in a complex space vector of two components, the real and imaginary parts. Then, in the complex domain, three-phase dynamic systems can be modeled using complex-valued SISO notation [1], which implies an additional reduction of the system order and moves the analysis to simpler spaces. This M. Velasco, J. Duarte and P. Martı́ are with the Automatic Control Department, Universitat Politècnica de Catalunya, Barcelona, Spain, email: {manel.velasco, josue.duarte, pau.marti}@upc.edu I. Zaplana is with the Automatic Control Department and Inst. of Industrial and Control Engineering, Universitat Politècnica de Catalunya, Barcelona, Spain, email: isiah.zaplana@upc.edu A. Dòria-Cerezo is with the Dept. of Electrical Engineering and Inst. of Industrial and Control Engineering, Universitat Politècnica de Catalunya, Barcelona, Spain, email: arnau.doria@upc.edu allows conceptualizing alternative controllers obeying principles different than those based on real-valued models, while using extensions of control theoretical results to the complex domain, for both the analysis [2]–[6] and design phase [7]–[9]. In the complex domain, as illustrated in Sub-fig. 1b, threephase dynamic systems modeled as SISO systems are characterized by one or two complex transfer functions (i.e., with complex coefficients) depending on whether the system is balanced or unbalanced, respectively [10], [11]. In particular, the model for unbalanced systems requires the complex conjugate of the input, which makes the SISO system nonlinear and poses difficulties in its analysis and design phases. This problem has been treated for example by neglecting the contribution of the complex conjugate input [12], or by directly applying MIMO techniques or cascaded combinations of SISO systems, in different frames (dq or αβ) and using a variety of scalar or vector notation, e.g. [11], [13]–[17]. To overcome the previous limitations while still targeting reduced order modeling spaces, and with the objective of exploring the announced benefits of geometric algebra (GA) [18], [19], this paper introduces the use of GA principles to the modeling, analysis and control of three-phase electrical systems. It is worth noting that the application of GA to the electrical engineering field is not new. However it has been mainly bounded to the modeling of apparent power [20]–[23], power flow analysis [24], [25], and the analysis of second order systems expressed in terms of generalized coordinates [26], which differs from the current paper domain which is closedloop control of three-phase electrical systems. The main contribution of the paper is to show that threephase electrical systems can be modeled in the GA domain with a linear SISO model, for both balanced and unbalanced scenarios, as shown in Sub-fig. 1c. Both the linearity and the SISO structure of the GA representation (Sub-fig. 1c) suggests an easier analysis and design phase compared to cases given by the real (Sub-fig. 1a) and complex (Sub-fig. 1b) spaces. For the modeling part, the paper presents the transformation that allows transferring αβ (or dq) real-valued linear MIMO systems to GA-valued linear SISO systems. In the GA domain, the controller and plant that form the closed-loop system (Subfig. 1c) are characterized by transfer functions expressed in the GA space. Therefore, linear SISO analysis and design approaches must be reexamined. To this end, the stability of a GA closed-loop system is shown to be be assessed using the same tools that apply to linear SISO real-valued systems. And regarding GA controller design, guidelines are provided" 2312.01354v1,"Protecting Sensitive Tabular Data in Hybrid Clouds Maya Anderson Gidon Gershinsky IBM Research Israel mayaa@il.ibm.com IBM Research Israel gidon@il.ibm.com Eliot Salant Salvador Garcia IBM Research Israel salant@il.ibm.com Marina Salud Hospital Spain SALVADOR.GARCIA@marinasalud.es Abstract Regulated industries, such as Healthcare and Finance, are starting to move parts of their data and workloads to the public cloud. However, they are still reluctant to trust the public cloud with their most sensitive records, and hence leave them in their premises, leveraging the hybrid cloud architecture. We address the security and performance challenges of big data analytics using a hybrid cloud in a real-life use case from a hospital. In this use case, the hospital collects sensitive patient data and wants to run analytics on it in order to lower antibiotics resistance, a significant challenge in healthcare. We show that it is possible to run large-scale analytics on data that is securely stored in the public cloud encrypted using Apache Parquet Modular Encryption (PME), without significant performance losses even if the secret encryption keys are stored on-premises. PME is a standard mechanism for data encryption and key management, not specific to any public cloud, and therefore helps prevent vendor lock-in. It also provides privacy and integrity guarantees, and enables granular access control to the data. We also present an innovation in PME for lowering the performance hit incurred by calls to the Key Management Service. Our solution therefore enables protecting large amounts of sensitive data in hybrid clouds and still allows to efficiently gain valuable insights from it. CCS Concepts: • Security and privacy → Management and querying of encrypted data; • Applied computing → Health care information systems. Keywords: Hybrid cloud, tabular data, analytics, sensitive data, parquet, encryption 1 Introduction Hybrid clouds are composed of an on-premises IT infrastructure, fully controlled by a company or a public organization, and of a public cloud infrastructure shared by users from many companies and organizations. The public cloud provides isolation between different users and supports strong security guarantees for data, so one cloud tenant is unable to view or modify the data or other resources of another cloud tenant. Still, businesses are often wary about placing their sensitive parts of information in a shared public cloud. The hybrid cloud architecture addresses this challenge by allowing organizations to keep their ""crown jewels"" and controls (such as encryption keys and user verification) inside the business premises, while using the public cloud for storage of sensitive data that was encrypted on premises, and for data processing. Despite the benefits presented by the hybrid architecture, it still faces a number of technical challenges related to performance of data processing pipelines that crunch large amounts of sensitive information. The compute, storage and security components of such pipelines are spread across the various public and private domains, with a tightly controlled connection between the on-premises and public cloud infrastructures. The data processing on analytic workloads have a degraded performance if the data is encrypted. In this work, we address the security and performance challenges of big data analytics in hybrid cloud use cases by leveraging the new Apache Parquet standard for columnar data encryption - Parquet Modular Encryption (PME). As a part of the Apache Parquet community, we are contributing to the design and implementation of PME [4] , including its key management layer which is optimized for highly distributed architectures such as hybrid clouds. In this paper, we demonstrate these technologies via a real-life use case from a hospital that leverages both its on-premises IT infrastructure and public cloud services. Hybrid cloud architecture provides an additional benefit for such users, since it allows saving a significant investment in building and maintaining an on-premises IT infrastructure, along with the expensive IT and security in-house specialists required to plan and deploy such systems. Much of this burden is offloaded to the public cloud that is fully staffed with IT and security experts, who provide efficient support to a large number of cloud users and therefore provide advanced but affordable services to the customers. The customers, such as the hospitals, can focus on their main area of professional expertise - and also can keep the critical security components (such as encryption key managers) inside their infrastructure, so they are never deployed in a public cloud. This approach allows having stronger security at a lower price, since the commodity tasks are performed by cloud providers’ teams of" 2312.01358v1,"Formations Organization in Robotic Swarm Using the Thermal Motion Equivalent Method Eduard Heiss 1* , Andrey Kozyr 2 , Oleg Morozov 3 Digital Control Systems Laboratory, Tula State University, Tula, Russia 3 Department of Automatic Control Systems, Tula State University, Tula, Russia Email: 1 edheiss73@gmail.com, 2 Kozyr_A_V@mail.ru, 3 omo.sau.tsu.tula.ru *Corresponding Author 1, 2 Abstract— Due to its decentralised, distributed and scalable nature, swarm robotics has great potential for applications ranging from agriculture to environmental monitoring and logistics. Various swarm control methods and algorithms are currently known, such as virtual leader, vector and potential field, and others. Such methods often show good results in specific conditions and tasks. The variety of tasks solved by the swarm requires the development of a universal control algorithm. In this paper, we propose an evolution of a thermal motion equivalent method (TMEM) inspired by the behavioural similarity of thermodynamic interactions between molecules. Previous research has shown the high efficiency of such a method for terrain monitoring tasks. This work addresses the problem of swarm formation of geometric structures, as required for logistics and formation movement tasks. It is shown that the formation of swarm geometric structures using the TMEM is possible with a special nonlinear interaction function of the agents. A piecewise linear interaction function is proposed that allows the formation of a stable group of agents. The results of the paper are validated by numerical modelling of the swarm dynamics. A linear quadrocopter model is considered as an agent. The fairness of the choice of the interaction function is shown. Keywords—swarm control; formations; thermal motion equivalent method; UAVs I. I NTRODUCTION Robotic swarm hold great promise for a variety of applications due to the known qualities of system decentralization, scalability, and resilience to local agent failures [1]–[3]. This paper focuses on the swarm construction of unmanned aerial vehicles (UAVs). A UAV swarm is defined as a cyber-physical system consisting of multiple, possibly heterogeneous UAVs that interact to jointly accomplish a specific mission [4]. The modern uses of swarms are extensive: control [5] and extinguishing [6] fires; fighting insect colonies [7], [8], monitoring agricultural crops [9], monitoring coral reefs [10]; search and rescue operations [11]–[14] environmental monitoring [15]; agriculture [16]; monitoring in the area of mineral extraction [17]; cargo delivery [18], [19]. The extensive application area of autonomous swarms is primarily due to their reliability and the possibility of task distribution. Swarms lead to high efficiency and effectiveness in mission execution, which is impossible to achieve with a single UAV. A large number of papers have been devoted to the study of swarm. The main studies have focused on solving specific theoretical problems such as the organization of a sustainable swarm [20]. A large amount of work is devoted to group control methods. One of the most common methods for a swarm control is the artificial potential field model [21]–[24]. The artificial potential field method [25], [26] provides the construction of a motion trajectory for each element of the formation. This approach organizes the agents` movement and prevents their physical collision. The method is based on the creation of a virtual potential field that attracts the agent to the target and repels it from obstacles. The method has disadvantages, one of them is the occurrence of local minima [27], [28]. However, there are methods to solve such problems, for example, by considering only the nearest objects [29] or by specialised algorithms [30]. A vector field is also used for group control. A vector field is a space, each point of which corresponds to a vector with a given length, which allows to ensure the movement of agents along the required trajectory [31], [32]. A consensus approach is used for control of a large-scale swarm [33]–[35]. In this case, according to a certain control law, all swarm agents converge to the same state [36], [37]. A relevant area of research on swarm is behavioral algorithms that model biological behavior [38], [39]: the particle swarm method [40], which can be used in conjunction with other methods [41]; algorithms inspired by the organization of fish movement [42]; algorithms using virtual pheromones [43]; artificial bee swarm algorithms [44]; and modeling of natural systems, such as the thermal motion equivalent method (TMEM) [45]–[47]. The idea of the TMEM is the organization of the swarm agents` behavioral similarity to the atoms` thermal motion. In this approach, swarm behavior can be controlled by integral parameters equivalent to similar criteria of a thermodynamic system, such as enthalpy, temperature, pressure, etc. The concept of thermal motion of atoms allows UAVs with different initial states to calculate the expected swarm trajectory and avoid collisions and obstacles during formation flight. Often heuristic algorithms are used to construct trajectories for agents to move. Spatial optimisation of trajectories [48], [49] and spatial-temporal optimisation [50] are also used to construct trajectories for swarm agents. Trajectory construction has received a lot of attention [51]– [55], including disturbance flight issues [56]. A decentralised behaviour-based formation control algorithm is presented in [57]. The paper assumes that all robots have information about the final destination, the geometric structure, the relative position of neighbouring robots and obstacles. The anticipation angle is used to avoid collisions. The disadvantage is the low stability of the formation." 2312.01371v1,"Draft: 5 December 1 2023 Asymptotic differences between a lumped probability-distributed rainfall-runoff model and a physical benchmark model Piotr Morawiecki† and Philippe Trinh‡ Department of Mathematical Sciences, University of Bath, Bath BA2 7AY, UK (Received xx; revised xx; accepted xx) Typically, physical and conceptual rainfall-runoff models are developed independently and are based on different, though not entirely incompatible, governing principles. In this work, we perform a systematic asymptotic analysis of a typical conceptual rainfall-runoff model and compare its results to a physical model. The setting for this experiment is a geometrically simplified benchmark catchment consisting of a two-dimensional hillslope. For demonstration purposes, we analyse the lumped Probability Distributed Model (PDM) formulated by Lamb (1999). Our analysis reveals fundamental differences between the PDM and physical models, both in qualitative and quantitative behaviours, particularly when studying overland-flow-dominated catchments. For example, our study highlights the fact that the PDM model overestimates the rate of river flow growth during highly intensive rainfalls. Additionally, we observe that the PDM model cannot accurately predict peak flows in different seasons, characterised by a wide range of mean precipitation/evapotranspiration rates. We argue that this analytical approach of identifying fundamental differences between models can serve to understand model limitations and develop more theoretically-justified rainfall-runoff models. 1. Introduction Traditionally, the models used for predicting river flows can be divided into three main classes: physical, conceptual, and statistical models (Sitterson et al. 2018). Physical models are based on equations of hydrodynamics to describe surface and subsurface flow. However, they have high data and computing power requirements, which is why conceptual rainfall-runoff models are often preferred; these latter models take advantage of physically intuitive concepts such as the separation of surface and subsurface flows, but represent physics with simpler, often less theoretically justified, mathematical formulations. The goal of this paper is to investigate how accurate are predictions of such conceptual model, as compared to hydrographs produced by a physical benchmark model. We focus on the Probability Distributed Model (PDM) by Moore (1985), and in particular its implementation in a six-parameter lumped model by Lamb (1999). Our choice is motivated by the simplicity of this class of conceptual models, as well as its relative importance in hydrological modelling in the UK. PDM is used as a subcomponent of other rainfall-runoff models; for example, a lumped PDM is used in the UK Environmental Agency National Flood Forecasting System (Moore 2007). Similar, PDM is used within a distributed Gridto-Grid model by Bell et al. (2007), used for the operational flood forecasting services of England, Wales, and Scotland (Cole et al. 2010; Price et al. 2012), by the Australian Bureau of Meteorology (Acharya et al. 2019; Wells et al. 2019), and within a wide range † Email address for correspondence: pwm27@bath.ac.uk ‡ Email address for correspondence: hppt20@bath.ac.uk" 2312.01375v1,"1 Experimental apparatus for non-contact resistivity measurements of the rock core plug based on magnetic induction Pablo Diniz Batista 1 § , Leduc Hermeto de Almeida Fauth 1 § , Bernardo Coutinho Camilo dos Santos 2 § , Willian Andrighetto Trevizan 2 § , Maury Duarte Correia 2 § , Jorlandio Francisco Felix 3 §* . Federal Institute of Education, Science and Tecnology of Brasília, QNN 26 Área Especial – Ceilândia, Brasília – DF, CEP: 72220-260 Brazil. 1 2 Research Research Center of Petrobras (CENPES), Av. Horácio de Macedo, 950 Cidade Universitária, Rio de Janeiro, RJ CEP:21941-598. 3 Universidade de Brasília, Instituto de Física, Núcleo de Física Aplicada, Brasília DF 70910-900, Brazil. § These authors have contributed equally to this work. *Address correspondence to pablo.batista@ifb.edu.br Abstract A new apparatus has been developed to measure the conductivity of rock samples. The probe, which consists of multi-coil transmitters and receivers doesn't require physical contact with the samples. The measurement is based on the induction principle. The measurement system is validated by using saline solutions and water-saturated sands of known conductivity. This work presents details of the development of a system of magnetic resistivity measurements by magnetic induction for petrophysical applications. The first application consists of measuring the resistivity of the core plug which is 0.038 m in diameter. Currently the system is operating properly at a frequency of 50 kHz with a current of up to 500 mA at 20 °C. During the study two types of samples were investigated: aqueous solutions with conductivities between 1 to 100 mS/cm and rocks. Several tests were carried out with the objective of investigating the performance of the instrument, such as the experiment to obtain sensitivity for the measurement system as a function of the current applied to the transmitter coil. KEYWORDS: Conductivity, Rock, Instrumentation, magnetic Induction I. INTRODUCTION In general, the term petrophysics has been understood as being the study of physical and chemical rock properties and their interaction with fluids. In the context of the oil and gas industry it aims to optimize the process of extracting oil and its derivatives. For this reason, core analysis laboratories of rock samples obtained downhole provide essential data for exploration, evaluation and production of oil and gas reservoirs [1]. As core comes in a variety of lengths and diameters thus, the core analysis laboratories must be flexible enough to process the various types of core, such as whole cores and sidewall cores. Apart from these, there is a third type of rock sample known as core plug [2]. These plugs are taken as a representative subsample of the whole core and are useful in analyzing intervals between relatively homogeneous cores. A plug for analysis is typically 0.025 to 0.038 m diameter and 0.05" 2312.01383v1,"Some further construction methods for uninorms via uninorms ∗ Zhenyu Xiu 1† , Xu Zheng 2‡ 1,2 College of Applied Mathematics, Chengdu University of Information Technology, Chengdu 610000, China Abstract In this paper, we further investigate new construction methods for uninorms on bounded lattices via given uninorms. More specifically, we first construct new uninorms on arbitrary bounded lattices by extending a given uninorm on a subinterval of the lattices under necessary and sufficient conditions on the given uninorm. Moreover, based on the new uninorms, we can give another sufficient and necessary condition under which S 1 ∗ is a t-conorm (T 1 ∗ is a t-norm) in [32]. Furthermore, using closure operators (interior operators), we also provide new construction methods for uninorms by extending the given uninorm on a subinterval of a bounded lattice under some additional constraints and simultaneously investigate the additional constraints carefully and systematically. Meanwhile, some illustrative examples for the above construction methods of uninorms on bounded lattices are provided. Keywords: bounded lattices; closure operators; interior operators; t-conorms; uninorms 1 Introduction Yager and Rybalor [37] introduced the notions of uninorms with a neutral element in the interior of the unit interval [0, 1] which are generalizations of t-norms and t-conorms. These operators also have been proved to paly an important role in other fields, such as neural networks, decision-making, expert systems and so on (see, e.g., [16, 20–22, 26, 27, 31, 33, 38, 39]). Since the bounded lattice L is more general than [0, 1], the studies of uninorms on [0, 1] have been extended to L . Uninorms on L, were first proposed in [29] as a unification of t-norms and t-conorms on L. Since then, a lot of researchers have used ∗ Supported by National Natural Science Foundation of China (No.11871097, 12271036) E-mail address: xzy@cuit.edu.cn ‡ Corresponding author. E-mail address: 3026217474@qq.com † 1" 2312.01386v1,"Regret Optimality of GP-UCB Wenjia Wang Data Science and Analytics Thrust, Information Hub, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China, wenjiawang@ust.hk Xiaowei Zhang Department of Industrial Engineering and Decision Analytics, The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong SAR, xiaoweiz@ust.hk Lu Zou Data Science and Analytics Thrust, Information Hub, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China Gaussian Process Upper Confidence Bound (GP-UCB) is one of the most popular methods for optimizing black-box functions with noisy observations, due to its simple structure and superior performance. Its em- pirical successes lead to a natural, yet unresolved question: Is GP-UCB regret optimal? In this paper, we offer the first generally affirmative answer to this important open question in the Bayesian optimization literature. We establish new upper bounds on both the simple and cumulative regret of GP-UCB when the objective function to optimize admits certain smoothness property. These upper bounds match the known minimax lower bounds (up to logarithmic factors independent of the feasible region’s dimensionality) for optimizing functions with the same smoothness. Intriguingly, our findings indicate that, with the same level of exploration, GP-UCB can simultaneously achieve optimality in both simple and cumulative regret. The crux of our analysis hinges on a refined uniform error bound for online estimation of functions in reproducing kernel Hilbert spaces. This error bound, which we derive from empirical process theory, is of independent interest, and its potential applications may reach beyond the scope of this study. Key words : GP-UCB; Bayesian optimization; reproducing kernel Hilbert space; regret optimality 1. Introduction The task of decision-making in complex stochastic systems often leads to black-box optimization problems that possess no analytically tractable structures. The objective functions in such problems are computationally costly to evaluate, lack explicit expressions, and provide no efficient means for gradient estimation. Addressing these challenges is a central research theme within the simu- lation literature (Fu 2015, Hong and Zhang 2021). In recent years, Bayesian optimization (Frazier 2018) has risen to prominence as a principled approach for optimizing black-box functions. Its applications are wide-ranging, spanning engineering design (Forrester et al. 2008), materials design 1" 2312.01391v1,"Moderate Dimension Reduction for k-Center Clustering Shaofeng H.-C. Jiang * Peking University Robert Krauthgamer † Weizmann Institute of Science Shay Sapir ‡ Weizmann Institute of Science December 5, 2023 Abstract The Johnson-Lindenstrauss (JL) Lemma introduced the concept of dimension reduction via a random linear map, which has become a fundamental technique in many computational settings. For a set of n points in R d and any fixed ǫ > 0, it reduces the dimension d to O ( log n ) while preserving, with high probability, all the pairwise Euclidean distances within factor 1 + ǫ. Perhaps surprisingly, the target dimension can be lower if one only wishes to preserve the optimal value of a certain problem, e.g., max-cut or k-means. However, for some notorious problems, like diameter (aka furthest pair), dimension reduction via the JL map to below O ( log n ) does not preserve the optimal value within factor 1 + ǫ. We propose to focus on another regime, of moderate dimension reduction, where a problem’s value is preserved within factor α = O ( 1 ) (or even larger) using target dimension log n/poly ( α ) . We establish the viability of this approach and show that the famous k-center problem is α- log n approximated when reducing to dimension O ( α 2 + log k ) . Along the way, we address the diameter problem via the special case k = 1. Our result extends to several important variants of k-center (with outliers, capacities, or fairness constraints), and the bound improves further with the input’s doubling dimension. While our poly ( α ) -factor improvement in the dimension may seem small, it actually has significant implications for streaming algorithms, and easily yields an algorithm for k-center 2 in dynamic geometric streams, that achieves O ( α ) -approximation using space poly ( kdn 1/α ) . This is the first algorithm to beat O ( n ) space in high dimension d, as all previous algorithms require space at least exp ( d ) . Furthermore, it extends to the k-center variants mentioned above. 1 Introduction The seminal work of Johnson and Lindenstrauss [JL84] introduced the technique of dimension reduction via an (oblivious) random linear map, and this technique has become fundamental in many computational settings, from offline to streaming and distributed algorithms, especially nowadays that high-dimensional data is ubiquitous. Their so-called JL Lemma asserts (roughly) * Research partially supported by a national key R&D program of China No. 2021YFA1000900 and a startup fund from Peking University. Email: shaofeng.jiang@pku.edu.cn † Work partially supported by the Israel Science Foundation grant #1336/23 and the Weizmann Data Science Research Center. Email: robert.krauthgamer@weizmann.ac.il ‡ Partially supported by the Israeli Council for Higher Education (CHE) via the Weizmann Data Science Research Center. Email: shay.sapir@weizmann.ac.il 1" 2312.01397v1,"Preprint, under review V ISUAL P ROMPTING U PGRADES N EURAL N ETWORK S PARSIFICATION : A D ATA -M ODEL P ERSPECTIVE Can Jin 1 , Tianjin Huang 2 , Yihua Zhang 3 , Mykola Pechenizkiy 2 , Sijia Liu 3 , Shiwei Liu 2,4 , Tianlong Chen 5,6,7 1 University of Science and Technology of China, 2 Eindhoven University of Technology, 3 Michigan State University, 4 University of Texas at Austin, 5 MIT, 6 University of North Carolina at Chapel Hill, 7 Harvard University jincan3@mail.ustc.edu.cn, {t.huang,m.pechenizkiy,s.liu3}@tue.nl, {zhan1908,liusiji5}@msu.edu, tianlong@mit.edu A BSTRACT The rapid development of large-scale deep learning models questions the affordability of hardware platforms, which necessitates the pruning to reduce their computational and memory footprints. Sparse neural networks as the product, have demonstrated numerous favorable benefits like low complexity, undamaged generalization, etc. Most of the prominent pruning strategies are invented from a model-centric perspective, focusing on searching and preserving crucial weights by analyzing network topologies. However, the role of data and its interplay with model-centric pruning has remained relatively unexplored. In this research, we introduce a novel data-model co-design perspective: to promote superior weight sparsity by learning important model topology and adequate input data in a synergetic manner. Specifically, customized Visual Prompts are mounted to upgrade neural Network sparsification in our proposed VPNs framework. As a pioneering effort, this paper conducts systematic investigations about the impact of different visual prompts on model pruning and suggests an effective joint optimization approach. Extensive experiments with 3 network architectures and 8 datasets evidence the substantial performance improvements from VPNs over existing startof-the-art pruning algorithms. Furthermore, we find that subnetworks discovered by VPNs from pre-trained models enjoy better transferability across diverse downstream scenarios. These insights shed light on new promising possibilities of data-model co-designs for vision model sparsification. Code is available at https://github.com/UNITES-Lab/VPNs. 1 I NTRODUCTION Large-scale neural networks like vision and language models (Brown et al., 2020; Radford et al., 2019; Touvron et al., 2023; Chiang et al., 2023; Li et al., 2022; Bai et al., 2023) have attracted stupendous attention in nowadays deep learning community, which pose significantly increased demands to computing resources. While remarkable performance has been offered, they suffer from prohibitively high training and inference costs, and the deployment of these gigantic models entails substantial memory and computational overhead. For instance, inferring the GPT-3 with 175B parameters requires at least five 80GB A100 GPUs (Frantar & Alistarh, 2023). To establish economic and lightweight network alternatives, model compression serves as an effective tool, gaining great popularity (Dettmers et al., 2022; Frantar & Alistarh, 2023; Yao et al., 2022; Sun et al., 2023). Among plenty of efforts for compression, model pruning (LeCun et al., 1989; Gale et al., 2019; Frankle & Carbin, 2018; Chen et al., 2020) is one of the dominant approaches, aiming to trim down the least significant weights without hurting model performance. It is usually applied subsequent to the convergence of training (Frankle & Carbin, 2018; Chen et al., 2020; Molchanov et al., 2016), during the training process (Zhu & Gupta, 2017; Gale et al., 2019; Chen et al., 2021a), and even prior to the initiation of training (Mocanu et al., 2018; Lee et al., 2019; Evci et al., 2020). The resulting sparsity ranges from fine-grained elements like individual weights (Zhu & Gupta, 2017) to coarse-grained structures such as neurons (Hu et al., 2016), blocks (Lagunas et al., 2021), 1" 2312.01402v1,"More Quantum Speedups for Multiproposal MCMC CHIN-YI LIN, Department of Physics, National Taiwan University, Taiwan KUO-CHIN CHEN, Hon Hai Quantum Computing Research Center, Taiwan PHILIPPE LEMEY, Department of Microbiology, Immunology and Transplantation, KU Leuven, Belgium MARC A. SUCHARD, Departments of Biostatistics, Biomathematics and Human Genetics, UCLA, USA ANDREW J. HOLBROOK, Department of Biostatistics, UCLA, USA MIN-HSIU HSIEH, Hon Hai Quantum Computing Research Center, Taiwan Multiproposal Markov chain Monte Carlo (MCMC) algorithms choose from multiple proposals at each iteration in order to sample from challenging target distributions more efficiently. Recent work demonstrates the possibility of quadratic quantum speedups for one such multiproposal √ MCMC algorithm. Using 𝑃 proposals, this quantum parallel MCMC (QPMCMC) algorithm requires only O ( 𝑃) target evaluations at each step. Here, we present a fast new quantum multiproposal MCMC strategy, QPMCMC2, that only requires O (1) target evaluations and O (log 𝑃) qubits. Unlike its slower predecessor, the QPMCMC2 Markov kernel (1) maintains detailed balance exactly and (2) is fully explicit for a large class of graphical models. We demonstrate this flexibility by applying QPMCMC2 to novel Ising-type models built on bacterial evolutionary networks and obtain significant speedups for Bayesian ancestral trait reconstruction for 248 observed salmonella bacteria. 1 INTRODUCTION In their many forms, multiproposal MCMC methods [1–6] use multiple proposals to gain advantage over traditional MCMC algorithms [7, 8] that only generate a single proposal at each step. After generating a number proposals, these methods randomly select the next Markov chain state from a set containing all 𝑃 proposals and the current state with selection probabilities involving the target and proposal density (mass) functions. Calculation of proposal probabilities typically scales O (𝑃 2 ), so recent efforts [9, 10] focus on efficient joint proposal structures that lead to computationally efficient O (𝑃)-time proposal selection probabilities. Even after incorporating efficient joint proposals such as the Tjelmeland correction (Section 2.2), selection probabilities still require evaluation of the target function at each of the 𝑃 proposals. [11] uses the Gumbel-max trick to turn the proposal selection task into a discrete optimization procedure amenable to established quantum optimization techniques [12, 13]. On √ the one hand, the resulting QPMCMC algorithm facilitates quadratic speedups, only requiring O ( 𝑃) target evaluations. On the other hand, these target evaluations take the form of generic oracle calls embedded within successive Grover iterations [14], the circuit depth of which is not clear. Worse still, the fact that the optimization algorithms of [12, 13] sometimes fail to obtain the optimum means that the QPMCMC Markov kernel fails to maintain detailed balance with non-negligible probability. The relationship between the algorithm’s stationary distribution (if it exists) and the target distribution is unclear as a result. Our QPMCMC2 algorithm (Section 3.2) also combines multiproposal MCMC with quantum computing but improves upon QPMCMC in multiple ways. First, the QPMCMC2 circuit depth is O (1), i.e., it does not grow with the number of proposals 𝑃. Second, the QPMCMC2 Markov kernel maintains detailed balance exactly, so the algorithm obtains ergodicity and provides asymptotically exact estimators with the usual guarantees [15]. Third, the QPMCMC2 circuit is fully explicit for a large class of graphical models, making it possible to quantify circuit depth and the O (log 𝑃) circuit width. Authors’ addresses: Chin-Yi Lin, Department of Physics, National Taiwan University, Taipei, Taiwan, cylin1113@gmail.com; Kuo-Chin Chen, Hon Hai Quantum Computing Research Center, Taipei, Taiwan, Jim.KC.Chen@foxconn.com; Philippe Lemey, Department of Microbiology, Immunology and Transplantation, KU Leuven, Leuven, Belgium; Marc A. Suchard, Departments of Biostatistics, Biomathematics and Human Genetics, UCLA, Los Angeles, USA; Andrew J. Holbrook, Department of Biostatistics, UCLA, Los Angeles, USA; Min-Hsiu Hsieh, Hon Hai Quantum Computing Research Center, Taipei, Taiwan, min-hsiu.hsieh@foxconn.com." 2312.01407v1,"VideoRF: Rendering Dynamic Radiance Fields as 2D Feature Video Streams Liao Wang 1,3∗ Kaixin Yao 1,3∗ Chengcheng Guo 1 Zhirui Zhang 1 Qiang Hu 1 Jingyi Yu 1 Lan Xu 1† Minye Wu 2† 1 2 3 ShanghaiTech University KU Leuven NeuDim Figure 1. Our proposed VideoRF views dynamic radiance field as 2D feature video streams combined with deferred rendering. This technique facilitates hardware video codec and shader-based rendering, enabling smooth high-quality rendering across diverse devices. Abstract Neural Radiance Fields (NeRFs) excel in photorealistically rendering static scenes. However, rendering dynamic, long-duration radiance fields on ubiquitous devices remains challenging, due to data storage and computational constraints. In this paper, we introduce VideoRF, the first approach to enable real-time streaming and rendering of dynamic radiance fields on mobile platforms. At the core is a serialized 2D feature image stream representing the 4D radiance field all in one. We introduce a tailored training scheme directly applied to this 2D domain to impose the temporal and spatial redundancy of the feature image stream. By leveraging the redundancy, we show that the feature image stream can be efficiently compressed by 2D video codecs, which allows us to exploit video hardware accelerators to achieve real-time decoding. On the other hand, based on the feature image stream, we propose a novel rendering pipeline for VideoRF, which has specialized space mappings to query radiance properties efficiently. Paired with a deferred shading model, VideoRF has the capability of real-time rendering on mobile devices * Authors contributed equally to this work. † The corresponding authors are Minye Wu (minye.wu@kuleuven.be) and Lan Xu (xulan1@shanghaitech.edu.cn). thanks to its efficiency. We have developed a real-time interactive player that enables online streaming and rendering of dynamic scenes, offering a seamless and immersive free-viewpoint experience across a range of devices, from desktops to mobile phones. Our project page is available at https://aoliao12138.github.io/VideoRF/. 1. Introduction Photorealistic Free-Viewpoint Video (FVV) of dynamic scenes offers an immersive experience in virtual reality and telepresence. Work involving Neural Radiance Fields (NeRFs) has shown great potential in creating photorealistic Free-Viewpoint Videos (FVVs). However, there are still challenges in smoothly delivering and rendering FVVs using NeRFs on commonly used devices, similar to the ease of watching online videos. The difficulty lies in reducing the data capacity for transmitting and storing long sequences and ensuring a low, mobile-compatible computational load. Neural Radiance Field (NeRF) [40] surpasses traditional 3D reconstruction methods in photorealistic novel view synthesis. Several works extend NeRF to dynamic scenes by maintaining a canonical space and matching it implicitly [11, 43, 49] or explicitly [35] to align with each frame’s live space. However, their dependence on canonical space limits effectiveness in sequences with large motions or topo-" 2312.01416v1,"Uncertainty-biased molecular dynamics for learning uniformly accurate interatomic potentials ∗ Viktor Zaverkin 1, 2, , , David Holzmüller 3 , Henrik Christiansen 1 , Federico Errica 1 , Francesco Alesiani 1 , Makoto Takamoto 1 , Mathias Niepert 1, 4 , and Johannes Kästner 2 1 NEC Laboratories Europe GmbH, Kurfürsten-Anlage 36, 69115 Heidelberg, Germany 2 Institute for Theoretical Chemistry, University of Stuttgart, Pfaffenwaldring 55, 70569 Stuttgart, Germany 3 Institute for Stochastics and Applications, University of Stuttgart, Pfaffenwaldring 57, 70569 Stuttgart, Germany 4 Institute for Artificial Intelligence, University of Stuttgart, Universitätsstraße 32, 70569 Stuttgart, Germany ∗ viktor.zaverkin@neclab.eu ABSTRACT Efficiently creating a concise but comprehensive data set for training machine-learned interatomic potentials (MLIPs) is an under-explored problem. Active learning (AL), which uses either biased or unbiased molecular dynamics (MD) simulations to generate candidate pools, aims to address this objective. Existing biased and unbiased MD simulations, however, are prone to miss either rare events or extrapolative regions—areas of the configurational space where unreliable predictions are made. Simultaneously exploring both regions is necessary for developing uniformly accurate MLIPs. In this work, we demonstrate that MD simulations, when biased by the MLIP’s energy uncertainty, effectively capture extrapolative regions and rare events without the need to know a priori the system’s transition temperatures and pressures. Exploiting automatic differentiation, we enhance bias-forces-driven MD simulations by introducing the concept of bias stress. We also employ calibrated ensemble-free uncertainties derived from sketched gradient features to yield MLIPs with similar or better accuracy than ensemble-based uncertainty methods at a lower computational cost. We use the proposed uncertainty-driven AL approach to develop MLIPs for two benchmark systems: alanine dipeptide and MIL-53(Al). Compared to MLIPs trained with conventional MD simulations, MLIPs trained with the proposed data-generation method more accurately represent the relevant configurational space for both atomic systems. Introduction Computational techniques are invaluable for exploring complex configurational and compositional spaces of molecular and material systems. The accuracy and efficiency, however, depend on the chosen computational methods. Ab initio molecular dynamics (AIMD) simulations using densityfunctional theory (DFT) provide accurate results but are computationally demanding. Atomistic simulations with classical force fields (FFs) offer a faster alternative but often lack accuracy. Thus, developing accurate and computationally efficient interatomic potentials is a key challenge that has been successfully addressed by machine-learned interatomic potentials (MLIPs). 1–3 An essential component of any MLIP is the accurate encoding of the atomic system by a local representation, which depends on configurational (atomic positions) and compositional (atomic types) degrees of freedom. 4 Recently, a wide range of machine learning approaches have been introduced, including linear and kernel-based models, 5–8 Gaussian approximation, 9, 10 and neural network (NN) interatomic potentials, 11–18 all demonstrating remarkable success in atomistic simulations. The effectiveness of MLIPs, however, crucially relies on training data sufficiently covering the relevant configurational and compositional spaces. 19, 20 Without such training data, MLIPs cannot faithfully reproduce the underlying physics. An open challenge, therefore, is the generation of comprehensive training data sets for MLIPs, covering relevant configurational and compositional spaces and ensuring that resulting MLIPs are uniformly accurate across these spaces. This objective must be realized while reducing the number of expensive DFT evaluations, which provide reference energies, atomic forces, and stresses. This challenge is further complicated by the limited knowledge of physical conditions, such as temperature and pressure, at which configurational changes occur. To address this challenge, iterative active learning (AL) algorithms can be used to improve the accuracy of MLIPs by providing an augmented data set; 21–26 see Fig. 1 (a). They select the data most informative to the model, that is, atomic configurations with higher energy and force uncertainties, as estimated by the model. This data is drawn from configurational and compositional spaces explored during, e.g., molecular dynamics (MD) simulations. Reference DFT energies, atomic forces, and stresses are evaluated for the selected atomic configurations. Furthermore, energy and force uncertainties indicate the onset of extrapolative regions—regions where unreliable predictions are made—prompting the termination of the MD simulation and the evaluation of reference DFT values. In such a naive AL setting, covering the configurational space and exploring extrapolative configurations might require running longer MD simulations and defining physical conditions for observing slow configurational changes (rare events). Alternatively, enhanced sampling methods can significantly speed up the exploration of the configurational space by us-" 2312.01426v1,"Rough volatility: evidence from range volatility estimators Saad Mouti University of California, Santa Barbara saadmouti@ucsb.edu November 1, 2023 ∗ Abstract— In [24], first posted in 2014, volatility is characterized by fractional behavior with a Hurst exponent H < 0.5, challenging traditional views of volatility dynamics. Gatheral et al. demonstrated this using realized volatility measurements. Our study extends this analysis by employing range-based proxies to confirm their findings across a broader dataset and non-standard assets. Notably, we address the concern that rough volatility might be an artifact of microstructure noise in high-frequency return data. Our results reveal that log-volatility, estimated via range-based methods, behaves akin to fractional Brownian motion with an even lower H, below 0.1. We also affirm the efficacy of the rough fractional stochastic volatility model (RFSV), finding that its predictive capability surpasses that of AR, HAR, and GARCH models in most scenarios. This work substantiates the intrinsic nature of rough volatility, independent of the microstructure noise often present in high-frequency financial data. Keywords: Range-based volatility; Garman-Klass; Parkinson; volatility scaling; fractional Brownian motion; fractional Ornstein-Uhlenbeck; volatility forecasting. 1 Introduction Volatility plays a crucial role in many areas of finance and economics, such as risk management and portfolio selection. It is known to be both time-varying and predictable, and stochastic volatility models are one way to deal with these features. As a consequence, its modeling and forecasting spur the interest of many authors, academics, and practitioners alike. In the financial markets, the common practice is to represent asset prices by a continuous semi-martingale. A given log-price log S t is defined by d log S t = µ t dt + σ t dW t where µ t is a drift term, W t a Brownian motion and σ t , the key ingredient is the process volatility. The Black-Scholes framework assumes the volatility to be either constant or deterministic. Such specifications proved to be inadequate in the late eighties. The main reason ∗ This paper is part of the thesis [30] co-supervised by Mathieu Rosenbaum, Nicole El Karoui, and Aymeric Kalife, and benefited from funding provided by AXA. I would like to thank Thibault Jaisson, Omar El Euch, Pamela Saliba, and Othmane Mounjid for their valuable discussions. My appreciation also extends to participants at the Imperial College Rough Volatility symposium, UC Berkeley’s CDAR seminar, and the 2023 Southern California Probability Symposium at UC San Diego for their constructive feedback. 1" 2312.01429v1,"Transformers are uninterpretable with myopic methods: a case study with bounded Dyck grammars Kaiyue Wen Tsinghua University wenky20@mails.tsinghua.edu.cn Bingbin Liu Carnegie Mellon University bingbinl@cs.cmu.edu Yuchen Li Carnegie Mellon University yuchenl4@cs.cmu.edu Andrej Risteski Carnegie Mellon University aristesk@andrew.cmu.edu Abstract Interpretability methods aim to understand the algorithm implemented by a trained model (e.g., a Transofmer) by examining various aspects of the model, such as the weight matrices or the attention patterns. In this work, through a combination of theoretical results and carefully controlled experiments on synthetic data, we take a critical view of methods that exclusively focus on individual parts of the model, rather than consider the network as a whole. We consider a simple synthetic setup of learning a (bounded) Dyck language. Theoretically, we show that the set of models that (exactly or approximately) solve this task satisfy a structural characterization derived from ideas in formal languages (the pumping lemma). We use this characterization to show that the set of optima is qualitatively rich; in particular, the attention pattern of a single layer can be “nearly randomized”, while preserving the functionality of the network. We also show via extensive experiments that these constructions are not merely a theoretical artifact: even after severely constraining the architecture of the model, vastly different solutions can be reached via standard training. Thus, interpretability claims based on inspecting individual heads or weight matrices in the Transformer can be misleading. 1 Introduction Transformer-based models power many leading approaches to natural language processing. With their growing deployment in various applications, it is increasingly essential to understand the inner working of these models. Towards addressing this, there have been great advancement in the field of interpretability presenting various types of evidence (Clark et al., 2019; Vig & Belinkov, 2019; Wiegreffe & Pinter, 2019; Nanda et al., 2023; Wang et al., 2023), some of which, however, can be misleading despite being highly intuitive (Jain & Wallace, 2019; Serrano & Smith, 2019; Rogers et al., 2020; Grimsley et al., 2020; Brunner et al., 2020; Meister et al., 2021). In this work, we aim to understand the theoretical limitation of a family of interpretability methods by characterizing the set of viable solutions. We focus on “myopic” interpretability methods, i.e. methods based on examining individual components only. We adopt a particular toy setup in which Transformers are trained to generate Dyck grammars, a classic type of formal language grammar consisting of balanced parentheses of multiple types. Dyck is a useful sandbox, as it captures properties like long-range dependency and hierarchical tree-like structure that commonly appear in natural and programming language syntax, and has been an object of interest in many theoretical studies of Transofmers (Hahn, 2020; Yao et al., 2021; Liu et al., 2022b, 2023). Dyck is canonically parsed using a stack-like data structure. Such stack-like patterns (Figure 1) have been observed in the 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.01431v1,"D 2 ST-Adapter: Disentangled-and-Deformable Spatio-Temporal Adapter for Few-shot Action Recognition Guangming Lu 1 Jiandong Tian 2 Qizhong Tan 1, * Harbin Institute of Technology, Shenzhen 2 Shenyang Institute of Automation, Chinese Academy of Sciences Wenjie Pei 1, * 1 wenjiecoder@outlook.com, 200110929@stu.hit.edu.cn, luguangm@hit.edu.cn, tianjd@sia.cn Abstract Adapting large pre-trained image models to few-shot action recognition has proven to be an effective and efficient strategy for learning robust feature extractors, which is essential for few-shot learning. Typical fine-tuning based adaptation paradigm is prone to overfitting in the few-shot learning scenarios and offers little modeling flexibility for learning temporal features in video data. In this work we present the Disentangled-and-Deformable Spatio-Temporal Adapter (D 2 ST-Adapter), a novel adapter tuning framework for few-shot action recognition, which is designed in a dualpathway architecture to encode spatial and temporal features in a disentangled manner. Furthermore, we devise the Deformable Spatio-Temporal Attention module as the core component of D 2 ST-Adapter, which can be tailored to model both spatial and temporal features in corresponding pathways, allowing our D 2 ST-Adapter to encode features in a global view in 3D spatio-temporal space while maintaining a lightweight design. Extensive experiments with instantiations of our method on both pre-trained ResNet and ViT demonstrate the superiority of our method over state-of-theart methods for few-shot action recognition. Our method is particularly well-suited to challenging scenarios where temporal dynamics are critical for action recognition. 1. Introduction Few-shot action recognition aims to learn an action recognition model from a set of base classes of video data, which has the capability to recognize novel categories of actions using only a few support samples. To this end, learning an effective feature extractor that is generalizable across different classes is crucial to the task. A typical way [1, 2, 40, 41, 52] is to leverage pre-trained large vision models [13, 27, 35] for feature learning by task adaptation. Most existing methods [26, 41, 42] seek to adapt large * Equal contribution. Code is available at https://github.com/qizhongtan/ D2ST-Adapter. Receptive Field up 3D-Conv down ST-Adapter Attention Region Reference Point Shifted Reference Point up DSTA-S DSTA-T Spatial Pathway DSTA-S Temporal Pathway down D 2 ST-Adapter DSTA-T Figure 1. Different from ST-Adapter [25], our D 2 ST-Adapter is designed in a dual-pathway architecture to encode spatial and temporal features in a disentangled manner. Furthermore, we propose the Deformable Spatio-Temporal Attention (DSTA) as the essential component, which configures different sampling density in the spatial and temporal domains to model two pathways specifically and enables D 2 ST-Adapter to perform feature adaptation in a global view in 3D spatio-temporal space while maintaining a lightweight design. vision models to few-shot action recognition by fine-tuning either the entire or partial model. While such methods have achieved promising performance, there are two important limitations that hamper them from exploiting the full potential of the pre-trained models. First, fully fine-tuning the pre-trained models is prone to overfitting in the fewshot learning scenarios whilst partial fine-tuning acquires limited effectiveness due to limited capacity for adaptation. Second, most large vision models are trained on im-" 2312.01459v1,"Yielding behaviour of active particles in bulk and in confinement Yagyik Goswami, 1, 2 G. V. Shivashankar, 1, 3 and Srikanth Sastry 2, ∗ 1 Laboratory of Nanoscale Biology, Paul Scherrer Institut, Villigen, Aargau, Switzerland 2 Theoretical Sciences Unit and School of Advanced Materials, Jawaharlal Nehru Centre for Advanced Scientific Research, Rachenahalli Lake Road, Bengaluru-560064, India 3 Department of Health Sciences and Technology, ETH Zürich, Zürich, Switzerland (Dated: December 5, 2023) The investigation of collective behaviour in dense assemblies of self-propelled active particles has been motivated by a wide range of biological phenomena. Of particular interest are dynamical transitions of cellular and sub-cellular biological assemblies, including the cytoskeleton and the cell nucleus. Motivated by observations of mechanically induced changes in the dynamics of such systems, and the apparent role of confinement geometry, we study the transition between jammed and fluidized states of active particles assemblies, as a function of the strength and temporal persistence of active forces, and in different confinement geometries. Our results show that the fluidization transition broadly resembles yielding in amorphous solids, consistently with recent suggestions. More specifically, however, we find that a detailed analogy holds with the yielding transition under cyclic shear deformation, for finite persistence times. The fluidization transition is accompanied by driving induced annealing, strong dependence on the initial state of the system, a divergence of time scales to reach steady states, and a discontinuous onset of diffusive motion. We also observe a striking dependence of the transition on persistence times and on the nature of the confinement. Collectively, our results have implications in epigenetic cell state transitions induced by alterations in confinement geometry. I. INTRODUCTION Active matter, composed of interacting self-propelled particles or entities, has been investigated intensely in recent years [1, 2], and displays novel aspects of dynamics and organization not realised in conventional condensed matter. Although avenues for synthesizing active materials have been well explored, many obvious examples of active matter arise in biological systems across length scales, from bird flocks and animal herds[3], bacterial suspensions[4], tissues [5–7], to the cytoskeleton[8], which have been investigated theoretically and computationally [9] to comprehend experimental findings. In several contexts, the systems of interest may be characterised as dense, disordered assemblies, displaying features characteristic of glassy systems or phenomenology associated with packings that undergo jamming. In particular, novel behaviour arising in models of active glasses [5–7, 10–19, 32, 35] have been explored, seeking similarities with and departures from glass and jamming phenomenology in the absence of active forces or self-propulsion. In addition to investigations of the nature of relaxation dynamics, and approach to structurally arrested states with a decrease in thermal fluctuations and active forces and/or increase in density [5–7, 13], some recent works [14, 15, 17–19] have addressed the converse problem of loss of rigidity or fluidization, with an increase in the magnitude of active forces. Such a fluidization transition has an appealing analogy with the phenomenon of yielding in amorphous solids, upon an increase of external driving through the application of, e. g., shear stress or deformation. The active forces on individual particles, in the simple case where their orientations remain fixed, may be viewed as a spatially randomised generalisation of shear induced forces or displacements that arise when a global stress or strain is applied. Such an analogy has indeed been fruitfully pursued for the case when the orientations of the active forces is fixed. However, if one considers such active glass models in specific experimental contexts, including biological contexts where the active forces are generated by energy-consumption, one must consider a situation where the orientation of the active forces is not fixed but may evolve in time, in a manner characterised by a persistence time. For active glasses with finite persistence times, we find that the fluidization transition bears striking similarities to the yielding transition under cyclic shear deformation, wherein the shear deformation is applied cyclically (typically) around the zero strain state. The response of amorphous solids to cyclic shear is characterised [20, 21] by (i) annealing effects at small deformations, (ii) strong dependence on the initial annealing state of the amorphous solids, (iii) a discontinuous transition from an absorbing state with zero diffusivity of particles to a diffusive state with finite diffusivities, and (iv) diverging times to reach steady states as the yielding transition is approached from either side. As we show, active glasses with finite (but large) persistence times show a transition from arrested to fluidized states display these features remarkably. In addition to the persistence time, we also study the role of confinement on the transition to the fluidized state. The presence of a confining boundary has been found to induce non-trivial behaviour in active systems[22–24]. Such effects can be ∗ sastry@jncasr.ac.in" 2312.01479v1,"OpenVoice: Versatile Instant Voice Cloning Zengyi Qin ∗ MIT & MyShell.ai Wenliang Zhao Tsinghua University Xumin Yu Tsinghua University Xin Sun MyShell.ai Abstract We introduce OpenVoice, a versatile instant voice cloning approach that requires only a short audio clip from the reference speaker to replicate their voice and generate speech in multiple languages. OpenVoice represents a significant advancement in addressing the following open challenges in the field: 1) Flexible Voice Style Control. OpenVoice enables granular control over voice styles, including emotion, accent, rhythm, pauses, and intonation, in addition to replicating the tone color of the reference speaker. The voice styles are not directly copied from and constrained by the style of the reference speaker. Previous approaches lacked the ability to flexibly manipulate voice styles after cloning. 2) Zero-Shot Cross-Lingual Voice Cloning. OpenVoice achieves zero-shot cross-lingual voice cloning for languages not included in the massive-speaker training set. Unlike previous approaches, which typically require extensive massive-speaker multi-lingual (MSML) dataset 2 for all languages, OpenVoice can clone voices into a new language without any massive-speaker training data for that language. OpenVoice is also computationally efficient, costing tens of times less than commercially available APIs that offer even inferior performance. To foster further research in the field, we have made the source code 3 and trained model publicly accessible. We also provide qualitative results in our demo website 4 . Prior to its public release, our internal version of OpenVoice was used tens of millions of times by users worldwide between May and October 2023, serving as the backend of MyShell.ai. 1 Introduction Instant voice cloning (IVC) in text-to-speech (TTS) synthesis means the TTS model can clone the voice of any reference speaker given a short audio sample without additional training on the reference speaker. It is also referred to as Zero-shot TTS. IVC enables the users to flexibly customize the generated voice and exhibits tremendous value in a wide variety of real-world applications, such as media content creation, customized chatbots, and multi-modal interaction between humans and computers or large language models. An abundant of previous work has been done in IVC. Examples of auto-regressive approaches include VALLE [16] and XTTS [3], which extract the acoustic tokens or speaker embedding from the reference audio as a condition for the auto-regressive model. Then the auto-regressive model sequentially generate acoustic tokens, which are then decoded to raw audio waveform. While these methods can clone the tone color, they do not allow users to flexibly manipulate other important style parameters such as emotion, accent, rhythm, pauses and intonation. Also, auto-regressive models are relatively computationally expensive and has relatively slow inference speed. Examples of non-autoregressive approach include YourTTS [2] and the recently developed Voicebox [8], which ∗ Corresponding email: qinzy@mit.edu We use the term MSML dataset to denote a speech dataset with multiple languages, and each language has a vast amount of speakers. MSML dataset is a necessity to train cross-lingual instant voice cloning models. 3 https://github.com/myshell-ai/OpenVoice 4 https://myshell-tts.vercel.app 2 Technical Report." 2312.01486v1,"Elementary fractal geometry. 4. Automata-generated topological spaces Christoph Bandt Institute of Mathematics, University of Greifswald, bandt@uni-greifswald.de December 5, 2023 Abstract Finite automata were used to determine multiple addresses in number systems and to find topological properties of self-affine tiles and finite type fractals. We join these two lines of research by axiomatically defining automata which generate topological spaces. Simple examples show the potential of the concept. Spaces generated by automata are topologically self-similar. Two basic algorithms are outlined. The first one determines automata for all k-tuples of equivalent addresses from the automaton for double addresses. The second one constructs finite topological spaces which approximate the generated space. Finally, we discuss the realization of automata-generated spaces as self-similar sets. 1 Overview The basic principle of number systems is to assign addresses to points. We have an address map φ : S → X from a symbolic space S to a set X of points. The simplest symbolic space is the space of sequences s = i 1 i 2 ... from the digit set D = {0, 1, ..., m − 1}. Two symbol sequences s, t are called equivalent if they address the same point: φ(s) = φ(t). This paper studies algorithms which describe multiple addresses. If the set of pairs (s, t) of equivalent addresses is generated by a finite automaton, the address map φ is called automatic, and the topological quotient space X = S/φ is automata-generated. Gilbert [19, 20] started work in this direction in 1982. He constructed automata which determine double and triple expansions in number systems with complex bases −n+i, n = 1, 2, ... Thurston emphasized the connection between number systems, self-similar tilings and automata in his influential lecture notes [46]. This work was extended in numerous papers on canonical number systems (cf. [2] and [18, Section 2.4]) and on the topology of self-affine tiles in the plane [1, 13, 28, 29, 30, 31, 42] and in space [47]. Roughly speaking, self-affine tiles are the unit intervals of canonical number systems. Their vertices, which are interesting from a geometrical viewpoint, have three or more addresses. Symbolic dynamics is a related field where addressing plays a central part. Milnor and Thurston [38] characterized unimodal maps on the interval by their kneading sequence which represents the double address of the critical point. There are special parameters where this address is preperiodic. For complex rational functions, Thurston discussed the symbolic description 1" 2312.01488v1,"ADT: Agent-based Dynamic Thresholding for Anomaly Detection Xue Yang Enda Howley Michael Schukat University of Galway Galway, Ireland x.yang6@universityofgalway.ie University of Galway Galway, Ireland enda.howley@universityofgalway.ie University of Galway Galway, Ireland michael.schukat@universityofgalway.ie ABSTRACT The complexity and scale of IT systems are increasing dramatically, posing many challenges to real-world anomaly detection. Deep learning anomaly detection has emerged, aiming at feature learning and anomaly scoring, which has gained tremendous success. However, little work has been done on the thresholding problem despite it being a critical factor for the effectiveness of anomaly detection. In this paper, we model thresholding in anomaly detection as a Markov Decision Process and propose an agent-based dynamic thresholding (ADT) framework based on a deep Q-network. The proposed method can be integrated into many systems that require dynamic thresholding. An auto-encoder is utilized in this study to obtain feature representations and produce anomaly scores for complex input data. ADT can adjust thresholds adaptively by utilizing the anomaly scores from the auto-encoder and significantly improve anomaly detection performance. The properties of ADT are studied through experiments on three real-world datasets and compared with benchmarks, hence demonstrating its thresholding capability, data-efficient learning, stability, and robustness. Our study validates the effectiveness of reinforcement learning in optimal thresholding control in anomaly detection. KEYWORDS Anomaly Detection, Dynamic Thresholding, Optimal Control, Deep Learning, Reinforcement Learning, Markov Decision Process 1 INTRODUCTION Anomaly detection has attracted much attention for years. It refers to the problem of finding patterns in data that deviate from the expected normal behavior [5]. Anomalies are often ""rare"" and ""different"" and can provide critical information [16]. Anomaly detection has been well studied in numerous research areas and application domains including data mining, network intrusion detection, medical and public health, and energy management [6]. In general, a measurement of the input data (i.e. anomaly score) will be compared with a domain-specific threshold to determine the degree to which the data is considered abnormal. There is a substantial amount of research that is dedicated to using deep learning (DL)-based methods for feature learning and anomaly scoring for complex input data, achieving competitive advantages over conventional anomaly detection methods. However, little work has been done on the thresholding problem despite it being a critical factor for the effectiveness of anomaly detection. Given the fact that varying the threshold values can greatly change detection performance, the importance of thresholding should receive more attention. Proc. of the Adaptive and Learning Agents Workshop (ALA 2023), Cruz, Hayes, Wang, Yates (eds.), May 9-10, 2023, Online, https:// ala2023.github.io/ . 2023. In the literature, many existing anomaly detection approaches use static or expert-defined thresholds [3, 15, 20]. However, with the dramatic increase in the complexity and scale of IT systems and data, the traditional thresholding approaches are not efficient enough due to their poor scalability and robustness [3]. They have difficulty adapting to non-stationary and evolving time series data [5]. Recently, some novel dynamic thresholding methods were proposed such as the statistical method that is based on extreme value theory (EVT) [22]. Unfortunately, some of the methods cannot always guarantee good results and the improvement over static thresholding is limited, which has also been shown in our experiments. It is desirable to develop more effective thresholding methods in this area. Reinforcement Learning (RL) is well known for its capability of solving complex sequential decision-making in various domains, e.g. computer games, robotics, transport, and traffic signal control. RL models the sequential decision-making problem as a Markov Decision Process (MDP), where an agent learns through trial and error from the interaction with an environment. The goal for the agent is to maximize the total rewards over time. An RL agent is capable of providing advantageous control for dynamic complex systems [13]. The application of RL in optimal thresholding control is therefore a worthwhile study. This paper presents an agent-based dynamic thresholding (ADT) framework for optimal thresholding control in anomaly detection and models the problem as a MDP. The popular deep reinforcement learning (DRL) algorithm, i.e. Deep Q-network (DQN) is applied to deal with high-dimensional and continuous inputs. An auto-encoder (AE) is utilized to obtain feature representations and perform anomaly scoring for time series data. ADT can provide appropriate dynamic thresholds by utilizing the anomaly scores from AE, achieving adaptive anomaly detection. Specifically, the threshold 𝛿 is adjusted between a passive mode (i.e. 𝛿 = 1) and an active mode (i.e. 𝛿 = 0) in the detection process. The proposed thresholding method can be combined with many systems that require dynamic thresholding, ideally as long as they are able to generate expressive abnormal-related measurements. ADT is lightweight and data-efficient, since a small amount of data is adequate for the training (e.g. < 1% of the benchmarked dataset). The experimental results on three real-world datasets prove that our thresholding method leads to significantly improved detection performance compared with benchmarks, e.g. achieving the best F1 scores in all cases ranging from 0.945 to 0.999. The main contributions of this paper are as follows: first of all, we model thresholding in anomaly detection as a MDP and propose an agent-based dynamic thresholding framework using DQN. Secondly, we incorporate a deep generative model and our agentbased thresholding controller to perform anomaly detection on real-world datasets, demonstrating the high detection performance," 2312.01489v1,"Zonification and Pricing in Carsharing Jiali Deng Department of Mathematical Sciences, University of Copenhagen, Copenhagen, 2100, jd@math.ku.dk Giovanni Pantuso Department of Mathematical Sciences, University of Copenhagen, Copenhagen, 2100, gp@math.ku.dk In this article we address the problem of partitioning a carsharing business area into pricing zones. We formalize the problem mathematically and show that the resulting partitioning problem can be formulated as a binary integer programming problem. The partitioning problem is then extended to include pricing decisions, yielding the first joint zonification and pricing problem. The resulting mixed integer (possibly nonlinear) programming problem is solved exactly using an ad-hoc integer Benders decomposition for which we define effective problem-specific improvements. Extensive tests based on a real-world carsharing system demonstrate that the method outperforms a state-of-the-art commercial solver on problems of size compa- rable to those encountered in real-world instances. Furthermore, by jointly optimizing prices and pricing zones, we observe a profit increase of 7.01% compared to a zip code-based prior partition of the business area, and of 25.61% compared to a scenario where the business area is not partitioned. Keywords : one-way carsharing, pricing, zonification, tessellation, districting, benders decomposition 1. Introduction Carsharing pricing decisions have attracted significant attention in the research literature, see e.g., Boyacı and Zografos (2019), Zhang et al. (2022), Huang et al. (2020), Soppert et al. (2022), Jorge et al. (2015), Pantuso (2022), Müller et al. (2023). They have been identified as a promising instrument to resolve fleet imbalances, see e.g., Illgen and Höck (2019), and improve profits and service rates. Among other things, prices are commonly differentiated geographically, see e.g., Jorge et al. (2015), Huang et al. (2020), Pantuso (2022), that is, dependent on the origin and/or destination of the rental. This typically implies that the business area is partitioned into distinct pricing zones that are independent of pricing decisions (Jorge et al. 2015, Boyacı and Zografos 2019, Li et al. 2022) and provided a priori (Lu et al. 2021, Huang et al. 2020, Pantuso 2022). The decision of how to optimally divide a business area into pricing zones has not been investigated in detail. In this paper, we focus on the problem of partitioning a set of carsharing stations into distinct pricing zones. We refer to this problem as the zonification problem. The problem, which is motivated by an underlying industrial case, can be briefly described as follows. Consider a one-way station- based carsharing system and assume a given fixed set of stations, see e.g., Figure 1a. The goal of the service provider is to optimally adjust prices and pricing zones periodically during the day, and for small intervals of time (e.g., every hour), in order to adapt to changes in demand patterns. 1" 2312.01498v1,"IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. 1 Learning Neural Traffic Rules Xuan Zhang, Xifeng Gao, Kui Wu, Zherong Pan † Abstract—Extensive research has been devoted to the field of multi-agent navigation. Recently, there has been remarkable progress attributed to the emergence of learning-based techniques with substantially elevated intelligence and realism. Nonetheless, prevailing learned models face limitations in terms of scalability and effectiveness, primarily due to their agent-centric nature, i.e., the learned neural policy is individually deployed on each agent. Inspired by the efficiency observed in real-world traffic networks, we present an environment-centric navigation policy. Our method learns a set of traffic rules to coordinate a vast group of unintelligent agents that possess only basic collisionavoidance capabilities. Our method segments the environment into distinct blocks and parameterizes the traffic rule using a Graph Recurrent Neural Network (GRNN) over the block network. Each GRNN node is trained to modulate the velocities of agents as they traverse through. Using either Imitation Learning (IL) or Reinforcement Learning (RL) schemes, we demonstrate the efficacy of our neural traffic rules in resolving agent congestion, closely resembling real-world traffic regulations. Our method handles up to 240 agents at real-time and generalizes across diverse agent and environment configurations. Index Terms—Traffic Rule, Multi-Agent Navigation, Neural Navigation Policy I. I NTRODUCTION Multi-agent navigation forms the cornerstone of numerous pivotal robotic applications, including domains such as automated warehousing [1], autonomous driving [2], and realization of smart cities [3]. As a consequence, the refinement of navigation algorithms has garnered substantial research focus throughout the past decades. An ideal navigation algorithm should satisfy three desiderata. Scalability: Capable of controlling an arbitrarily large crowd of agents; Generality: Capable of handling arbitrary environment and agent configurations; Efficacy: A mild growth of computational and deployment cost with crowd size. Unfortunately, to this day, an ideal navigation algorithm that satisfies all three attributes continues to be elusive. The key to a successful navigation algorithm is the strategy to mitigate agent congestion. Early research endeavors tackled congestion through either back-tracking search [4, 5, 6] or localized collision-avoidance [7, 8]. The search-based algorithms exhibit notable generality; some even provide assurances of completeness or optimality. However, they have limitations with scalability and efficacy. Conversely, the local navigation policies exhibit ideal scalability, yet their generality is curtailed due to their myopic nature, oftentimes leading to agents stuck in congested configurations. Recent strides in this domain have been achieved through learning-based navigation policies [9, 10, 11]. These innovative algorithms parameterize navigation policies as deep networks, subsequently fine-tuned through either IL or RL to address complex, long-term decisionmaking challenges. While learning-based policies empirically † indicates corresponding author. Authors are with Lightspeed Studios, Tencent America. {xuanxzzhang,xifgao,kwwu,zrpan}@global.tencent.com. surpass myopic local navigation methods, they necessitate that each agent possesses the computational resources to execute intricate neural network inferences. This assumption results in a substantial deployment cost. In reality, large-scale robot swarm systems [12, 13] are often equipped with limited computational capabilities that cannot feasibly accommodate the demands of neural network inferences. Examining prevailing learning-based policies [9, 14, 10], we find a vast majority of them being agent-centric, i.e., their deep neural policies are independently deployed on each individual agent, which inevitably requires non-trivial computation and communication capabilities. In contrast, realworld traffic networks exhibit an environment-centric approach rather than an agent-centric one. At the heart of these networks resides a collection of human-designed traffic rules driven solely by the specific characteristics of the environment, such as highways, crossroads, and T-junctions. The efficacy of these rules is evidenced in their ability to manage substantial crowds of pedestrians and vehicles, effortlessly mitigating congestion by adhering to predefined traffic regulations. In essence, this approach sidesteps the need for intricate agentspecific decision-making processes. Main Results: Inspired by the elegance of real-world traffic networks, we introduce a learnable environment-centric navigation policy, assuming that our agents are endowed solely with rudimentary computational capacities, confining their interactions to local navigations. Our neural policy encapsulates a set of traffic rules based on the environments, which are followed by our agents. Specifically, our method decomposes the environment into discrete blocks, and we represent our neural policy as a GRNN built on the block network. Each GRNN node is trained to manipulate the velocities of agents traversing the corresponding block, facilitating the rule-following behavior. Our GRNN is trained to mitigate agent congestion via two methodologies: IL, guided by a groundtruth traffic rule, and RL, guided by a congestion-resolving reward signal. After the training phase, our neural policy can be deployed on unseen environment configurations to coordinate up to 240 intelligent agents at real-time in a simulated environment. Our contributions are summarized below: ● A decentralized agent navigation paradigm utilizing learned environment-encoded traffic rules. ● Environment-centric navigation policies parameterization using GRNN. ● Reward design and training algorithms for environmentcentric policies in both IL and RL setting. II. R ELATED W ORK We review related works on multi-agent navigation, learning-based navigation methods, and traffic-rule modeling. Multi-Agent Navigation: Over the course of time, researchers have branched into two avenues, yielding centralized" 2312.01507v1,"Preprint Form L EARN 2 EXTEND : Extending sequences by retaining their statistical properties with mixture models Dimitris Vartziotis 1,∗ , George Dasoulas 2,∗ & Florian Pausinger 1,∗ TWT Science & Innovation. Stuttgart, Germany 2 Harvard University. Cambridge, MA, USA 1 A BSTRACT This paper addresses the challenge of extending general finite sequences of real numbers within a subinterval of the real line, maintaining their inherent statistical properties by employing machine learning. Our focus lies on preserving the gap distribution and pair correlation function of these point sets. Leveraging advancements in deep learning applied to point processes, this paper explores the use of an auto-regressive Sequence Extension Mixture Model (SEMM) for extending finite sequences, by estimating directly the conditional density, instead of the intensity function. We perform comparative experiments on multiple types of point processes, including Poisson, locally attractive, and locally repelling sequences, and we perform a case study on the prediction of Riemann ζ function zeroes. The results indicate that the proposed mixture model outperforms traditional neural network architectures in sequence extension with the retention of statistical properties. Given this motivation, we showcase the capabilities of a mixture model to extend sequences, maintaining specific statistical properties, i.e. the gap distribution, and pair correlation indicators. Keywords: Point Processes, Pair Correlation, Mixture Models 1 I NTRODUCTION 1.1 P ROBLEM FORMULATION Point processes (Cox & Isham, 2018; Daley & Vere-Jones, 2003) play a central role in modern mathematics as they are often used in mathematical models of real world phenomena Babu & Feigelson (1996); Snyder & Miller (1991); Mohler et al. (2011). However, depending on the particular type of point process, it can be expensive to generate instances of point processes, or to extend given point samples Beutler & Leneman (1966); Perman et al. (1992). The main aim of this paper is to investigate how to extend a given finite sequence of real numbers contained in a subinterval of the real line so that basic statistical properties of this point set are maintained. Problem 1 Given a sequence of N points in a subset [0, T ] of the real line, extend this sequence such that the pair correlation function as well as the gap distributions are maintained. If we view the input as an instance of a random process, then this is an extremely hard statistical problem, i.e., we try to infer an underlying model from a single sample. The main point of our work is to leverage deep learning to approximate a sequence extension model. 1.2 M OTIVATION AND PREVIOUS WORK Modeling point processes has been a long-standing problem, that is ubiquitous in multiple real-world domains, ranging from physics Fox (1978), neuroscience Johnson (1996), and epidemiology Gatrell et al. (1996) to telecommunication networks Haenggi (2017), and social networks Wasserman (1980). Moving beyond standard statistics practices Stoyan (2006), machine learning advancements ∗ The authors contributed equally. Page 1 of 17" 2312.01509v1,"Tackling Bias in Pre-trained Language Models: Current Trends and Under-represented Societies VITHYA YOGARAJAN, University of Auckland, New Zealand GILLIAN DOBBIE, University of Auckland, New Zealand TE TAKA KEEGAN, University of Waikato, New Zealand ROSTAM J. NEUWIRTH, University of Macau, China The benefits and capabilities of large language models (LLMs) in current and future innovations are vital to any society. However, introducing and using LLMs comes with biases and discrimination, resulting in concerns about equality, diversity and fairness, and must be addressed. While understanding and acknowledging bias in LLMs and developing mitigation strategies are crucial, the generalised assumptions towards societal needs can result in disadvantages towards under-represented societies and indigenous populations. Furthermore, the ongoing changes to actual and proposed amendments to regulations and laws worldwide also impact research capabilities in tackling the bias problem. This research presents a comprehensive survey synthesising the current trends and limitations in techniques used for identifying and mitigating bias in LLMs, where the overview of methods for tackling bias are grouped into metrics, benchmark datasets, and mitigation strategies. The importance and novelty of this survey are that it explores bias in LLMs from the perspective of under-represented societies. We argue that current practices tackling the bias problem cannot simply be ‘plugged in’ to address the needs of under-represented societies. We use examples from New Zealand to present requirements for adapting existing techniques to under-represented societies. CCS Concepts: • Computing methodologies → Natural language processing; Artificial intelligence; Machine learning; • Social and professional topics → Governmental regulations. Additional Key Words and Phrases: Natural language processing, Artificial Intelligence, Governmental regulations, Bias, Language Models, Human society 1 INTRODUCTION The launch of OpenAI’s ChatGPT in November 2022 [185] is potentially the most significant milestone in the advances of language models (LLMs 1 ) and artificial intelligence (AI). It is reported that ChatGPT gained over 100 million users within the first two months of release [38]. The underlying technology of such LLMs is the key to innovations, and there are examples of LLMs exhibiting remarkable capabilities across various domains, including high-stakes decision applications like healthcare, criminal justice, and finance [20, 167, 213]. The capabilities of LLMs result in one model fits all scenarios where, with minimal or no tuning, LLMs can be adapted to downstream tasks such as classification, question-answering, logical reasoning, fact retrieval, and information extraction [112]. The need to train task-specific models on relatively small task-specific datasets is becoming a thing of the past [20]. However, introducing and using LLMs comes with biases and discrimination, resulting in concerns about equality, diversity and fairness, especially for under-represented and indigenous populations [93, 108, 187, 212]. LLMs are trained on massive amounts of data from various sources and, as such, 1 This research use LLMs to refer the family of pre-trained transformer-based language models, including but not limited to the substantially large language models such as GPT4. Authors’ addresses: Vithya Yogarajan, vithya.yogarajan@auckland.ac.nz, School of Computer Science, University of Auckland, 38 Princes Street, Auckland, New Zealand, 1010; Gillian Dobbie, g.dobbie@auckland.ac.nz, School of Computer Science, University of Auckland, 38 Princes Street, Auckland, New Zealand, 1010; Te Taka Keegan, tetaka@waikato.ac.nz, School of Computing and Mathematical Sciences, University of Waikato, Gate 8, Hillcrest Road, Hamilton, New Zealand, 3216; Rostam J. Neuwirth, rjn@um.edu.mo, Faculty of Law, University of Macau, E32, Avenida da Universidade, Taipa, Macao, China. Manuscript submitted to ACM" 2312.01511v1,"SoK: The Gap Between Data Rights Ideals and Reality Yujin Kwon UC Berkeley Berkeley, USA yujinyujin9393@berkeley.edu Ella Corren UC Berkeley, School of Law Berkeley, USA ecorren@berkeley.edu Chris Hoofnagle TUM Munich, Germany gonzalo.munilla-garrido@tum.de Dawn Song UC Berkeley, School of Law Berkeley, USA choofnagle@berkeley.edu UC Berkeley Berkeley, USA dawnsong@cs.berkeley.edu The U.S. has adopted similar approaches, as seen in the California Consumer Privacy Protection Act (CCPA), modeled after the GDPR. The proposition that bestowing individuals with data rights can mitigate corporate malfeasance and safeguard personal privacy is a subject of disagreement [122, 200, 232]. Many hold a positive position on rights regimes, but the traditional belief hinges on an intricate, contingent network of assumptions regarding user awareness, the capacity to exercise their rights, and the companies’ diligence in offering, elucidating, and applying controls. However, rights are not self-actuating; individuals need to be cognizant of their rights and possess the capability to exercise them. In addition, in instances where infringing upon rights can provide advantages to companies, these corporations frequently establish transaction costs and other obstacles to dissuade or reject user rights invocations [103]. Furthermore, the implementation of rights-based approaches needs enforcement actions, which can be subject to either insufficient or excessive enforcement by individuals and regulators. Such opposing viewpoints on the effectiveness of rights-based regimes call for a more comprehensive examination of the field. Against this backdrop, this paper presents a meta-analysis of existing empirical evidence, evaluating the effectiveness and desirability of these regimes. Our analysis uncovers a significant variability in the efficacy of data rights, contingent upon the user, company, regulator, and context. While acknowledging the beneficial role data rights have played in certain situations, we argue that their overall effectiveness remains limited. To provide a comprehensive perspective on the efficacy and desirability of individual privacy rights, we develop an evaluation framework synthesizing 201 academic papers, news articles, and blog posts. Our investigation raises 15 key questions, revealing conflicting narratives and indicating that the current implementation of rights-based regimes needs improvement. We conclude by recommending potential enhancements and exploring alternatives to rights-based regimes. ABSTRACT As information economies burgeon, they unlock innovation and economic wealth while posing novel threats to civil liberties and altering power dynamics between individuals, companies, and governments. Legislatures have reacted with privacy laws designed to empower individuals over their data. These laws typically create rights for “data subjects” (individuals) to make requests of data collectors (companies and governments). The European Union General Data Protection Regulation (GDPR) exemplifies this, granting extensive data rights to data subjects, a model embraced globally. However, the question remains: do these rights-based privacy laws effectively empower individuals over their data? This paper scrutinizes these approaches by reviewing 201 interdisciplinary empirical studies, news articles, and blog posts. We pinpoint 15 key questions concerning the efficacy of rights allocations. The literature often presents conflicting results regarding the effectiveness of rightsbased frameworks, but it generally emphasizes their limitations. We offer recommendations to policymakers and Computer Science (CS) groups committed to these frameworks, and suggest alternative privacy regulation approaches. KEYWORDS GDPR, usable privacy, policy, legal, law 1 Gonzalo Munilla Garrido INTRODUCTION The digital age introduces significant privacy threats and challenges. Policymakers have largely responded with rights-based regimes that grant users specific rights, such as accessing and erasing their data, aiming to empower them in the face of surveillance capitalism. These regimes, now a regulatory standard enacted in numerous global privacy laws [200], primarily follow the European Union General Data Protection Regulation (GDPR) model, which grants the most extensive set of data rights [90, 200] (see Appendix Tab. 1). Disclaimer: The information and views set out in this article are those of the authors and do not necessarily reflect the official opinion of the institutions. 2 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license visit https://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. YYYY(X), 1–22 © 2023 Copyright held by the owner/author(s). https://doi.org/XXXXXXX.XXXXXXX DATA RIGHTS ASSESSMENT FRAMEWORK & METHOD Since the European data rights model has become the standard in the field [90, 200, 232], we select the GDPR data rights in Tab. 1 as the focus of our analysis. We developed a general data rights assessment framework consisting of 15 key questions (see Appendix A) by 1" 2312.01517v1,"Age-based restrictions: An alternative to horizontal lockdowns? Vasiliki Bitsouni ∗1 , Nikolaos Gialelis †2,3 , and Vasilis Tsilidis ‡1 1 Department of Mathematics, University of Patras, GR-26504 Rio Patras, Greece 2 Department of Mathematics, National and Kapodistrian University of Athens, GR-15784 Athens, Greece 3 School of Medicine, National and Kapodistrian University of Athens, GR-11527 Athens, Greece Abstract During an epidemic, such as the COVID-19 pandemic, policy-makers are dealing with the decision of effective, but socioeconomically costly interference, such as horizontal lockdowns, including school and workplace closure, physical distancing e.t.c. Investigating the role of the age of the individuals in the evolution of epidemiological phenomena, we propose a scheme for the comparison of certain epidemiological strategies. Then, we put the proposed scheme to the test by employing an age-based epidemiological compartment model introduced in [4], coupled with data from the literature, in order to compare the effectiveness of age-based and horizontal interventions. In general, our results suggest that these two are comparable mainly at low or medium level of austerity. Keywords: Epidemiological strategy, Comparison scheme, Basic reproductive number, Horizontal restrictions, Aged-based interventions, Asymptomatic infectious, Numerical simulations MSC2020: 35Q92, 37N25, 92-10, 92D30 1 Introduction The recent COVID-19 pandemic brought to the fore the disastrous for the economy consequences of horizontal lockdowns. Economically costly horizontal measures during the COVID-19 pandemic have been the closure of workplaces and schools, the cancellation of public events and general stay-at-home restrictions (see [5, 10, 11, 20] and many references therein). This fact highlights the need for a more sophisticated managing of epidemiological crises. In this context, many countries, especially after the spasmodic first response, have looked for more flexible intervention policies. Multiple combinations of interventions were deployed by policy-makers in order to combat the spread of SARS-CoV-2 and minimize their financial ramifications [2, 19, 21]. The aim of the present paper is to investigate the role of the age of the individuals in the evolution of epidemiological phenomena, in order to verify age-based restrictions as a potential alternative to horizontal lockdowns. Using as a case study the COVID-19 outbreak and data from the literature, in order to address the following questions: – How can we systematically model and compare the effect of lockdowns and testing? – How does the age of individuals affect the outcome of the epidemic? – Can age-based interventions offer a replacement to horizontal lockdowns? ∗ vbitsouni@math.upatras.gr † ngialelis@math.uoa.gr ‡ vtsilidis@upatras.gr 1" 2312.01536v1,"C ALLI P AINT : C HINESE C ALLIGRAPHY I NPAINTING WITH D IFFUSION M ODEL Qisheng Liao 1 , Zhinuo Wang 2 , Muhammad Abdul-Mageed 1,3 , Gus Xia 1 1 MBZUAI, 2 Brown University, 3 The University of British Columbia 1 {Qisheng.Liao,Muhammad.Mageed,Gus.Xia}@mbzuai.ac.ae 2 zhinuo_wang@brown.edu A BSTRACT Chinese calligraphy can be viewed as a unique form of visual art. Recent advancements in computer vision hold significant potential for the future development of generative models in the realm of Chinese calligraphy. Nevertheless, methods of Chinese calligraphy inpainting, which can be effectively used in the art and education fields, remain relatively unexplored. In this paper, we introduce a new model that harnesses recent advancements in both Chinese calligraphy generation and image inpainting. We demonstrate that our proposed model CalliPaint can produce convincing Chinese calligraphy. Figure 1: An illustration of our model. The left side displays the structure of our training procedure. During training, every image includes annotated text that showcases the character, script, and style of that specific image. The U-Net models are trained to acquire the ability to produce such images starting from Gaussian noise. The right side illustrates the process of inference. In this instance, we employ two distinct textual conditions while maintaining the same image condition. The resulting outcomes exhibit identical unmasked sections, but the masked portions are generated differently depending on the text conditions. 1 Introduction Chinese calligraphy is a highly regarded and traditional art form that involves writing Chinese characters with a brush and ink. It is not just a means of communication but a visual art that has deep cultural and historical significance in China and other East Asian countries. Lately, there has been a noticeable trend in the use of machine learning for the creation of Chinese calligraphy. Examples include Zi2zi [1], CalliGAN [2], and ZiGAN [3], which typically employ a Generative Adversarial Network (GAN) architecture. While, Calliffusion [4], a new proposed work for Chinese calligraphy generation, uses Denoising Diffusion Probabilistic Models(DDPMs) [5] for generations." 2312.01544v1,"KEEC: E MBED TO C ONTROL ON A N E QUIVARIANT G EOMETRY A P REPRINT Xiaoyuan Cheng † Department of Civil, Environmental & Geomatic Engineering University College London London, WC1E 6BT, UK Yiming Yang † Department of Statistical Science University College London London WC1E 6BT, UK Wei Jiang Department of Electrical Engineering & Automation Aalto University Espoo 02150, Finland Yukun Hu ∗ University College London Department of Civil, Environmental & Geomatic Engineering University College London London, WC1E 6BT, UK December 5, 2023 A BSTRACT This paper investigates how representation learning can enable optimal control in unknown and complex dynamics, such as chaotic and non-linear systems, without relying on prior domain knowledge of the dynamics. The core idea is to establish an equivariant geometry that is diffeomorphic to the manifold defined by a dynamical system and to perform optimal control within this corresponding geometry, which is a non-trivial task. To address this challenge, Koopman Embed to Equivariant Control (KEEC) is introduced for model learning and control. Inspired by Lie theory, KEEC begins by learning a non-linear dynamical system defined on a manifold and embedding trajectories into a Lie group. Subsequently, KEEC formulates an equivariant value function equation in reinforcement learning on the equivariant geometry, ensuring an invariant effect as the value function on the original manifold. By deriving analytical-form optimal actions on the equivariant value function, KEEC theoretically achieves quadratic convergence for the optimal equivariant value function by leveraging the differential information on the equivariant geometry. The effectiveness of KEEC is demonstrated in challenging dynamical systems, including chaotic ones like Lorenz-63. Notably, our findings indicate that isometric and isomorphic loss functions, ensuring the compactness and smoothness of geometry, outperform loss functions without these properties. Keywords Koopman operator · Embed to control · Equivariant geometry · Optimal control · Unstable steady state 1 Introduction The success of the model-based control approaches highly relies on the accuracy of the learned environmental model [1, 2]. However, characterizing an unknown control system directly from raw data is challenging, which can be attributed to the non-linear structure. Even though a satisfied model could be obtained, the model is often highly nonlinear, where model-based optimal control can be both analytically and computationally intractable. Both problems could, in principle, be addressed by finding a proper representation of the underlying dynamical system, which means it is possible for the dynamical system to evolve a locally linearly on the manifold and then robustly and easily perform optimal control under an appropriate representation. Generally, discovering and controlling such a manifold is a non-trivial task for representation and learning. † * These authors contributed equally to this work. Corresponding author: yukun.hu@ucl.ac.uk" 2312.01552v1,"Preprint T HE U NLOCKING S PELL ON B ASE LLM S : R ETHINKING A LIGNMENT VIA I N -C ONTEXT L EARNING Bill Yuchen Lin ♠ Melanie Sclar ♢ ♠ Abhilasha Ravichander ♠ Ximing Lu ♢ ♠ Khyathi Chandu Chandra Bhagavatula ♠ Allen Institute for Artificial Intelligence ♢ Nouha Dziri ♠ Yejin Choi ♠♢ University of Washington # yuchenl@allenai.org ⋆ https://allenai.github.io/re-align A BSTRACT Alignment tuning has become the de facto standard practice for enabling base large language models (LLMs) to serve as open-domain AI assistants. The alignment tuning process typically involves instruction learning through supervised fine-tuning (SFT) and preference tuning via reinforcement learning from human feedback (RLHF). A recent study, LIMA (Zhou et al., 2023), shows that using merely 1K examples for SFT can achieve significant alignment performance as well, suggesting that the effect of alignment tuning might be “superficial. ” This raises questions about how exactly the alignment tuning transforms a base LLM. We analyze the effect of alignment tuning by examining the token distribution shift between base LLMs and their aligned counterpart (e.g., Llama-2 and Llama- 2-chat). Our findings reveal that base LLMs and their alignment-tuned versions perform nearly identically in decoding on the majority of token positions (i.e., they share the top-ranked tokens). Most distribution shifts occur with stylistic tokens (e.g., discourse markers, safety disclaimers). These direct evidence strongly supports the hypothesis that alignment tuning primarily learns to adopt the language style of AI assistants, and that the knowledge required for answering user queries predominantly comes from the base LLMs themselves. Based on these findings, we rethink the alignment of LLMs by posing the research question: how effectively can we align base LLMs without SFT or RLHF? To address this, we introduce a simple, tuning-free alignment method, U RIAL (Untuned LLMs with Restyled In-context ALignment). U RIAL achieves effective alignment purely through in-context learning (ICL) with base LLMs, requiring as few as three constant stylistic examples and a system prompt. We conduct a fine-grained and interpretable evaluation on a diverse set of examples, named just-eval-instruct. Results demonstrate that base LLMs with U RIAL can match or even surpass the performance of LLMs aligned with SFT (Mistral-7b-Instruct) or SFT+RLHF (Llama-2-70b-chat). We show that the gap between tuning-free and tuning-based alignment methods can be significantly reduced through strategic prompting and ICL. Our findings on superficial nature of alignment tuning and results with U RIAL suggest that deeper analysis and theoretical understanding of alignment is crucial to future LLM research. 1 I NTRODUCTION Base large language models (LLMs) that are only pre-trained on unsupervised text corpora typically cannot directly serve as open-domain AI assistants such as ChatGPT. In order to align these base LLMs as helpful and harmless assistants, recent research typically fine-tunes base LLMs with instruction tuning (Wei et al., 2022a) and preference learning (Bai et al., 2022). Instruction tuning is a supervised fine-tuning (SFT) process that mainly uses human annotations or data collected from proprietary LLMs such as GPT-4 (Taori et al., 2023; Wang et al., 2023). A typical method of preference learning is reinforcement learning from human feedback (RLHF) (Bai et al., 2022), which continually tunes a SFT-ed LLM for further aligning with human preference. Tuning-based alignment has led to significant improvements in LLMs, appearing to unlock impressive capabilities (Bubeck et al., 2023), suggesting that extensive fine-tuning is essential to build AI assistants. 1" 2312.01553v1,"Emergent electric field induced by current-driven domain wall motion in a room-temperature antiferromagnet FeSn 2 Tomoyuki Yokouchi 1† , Yuta Yamane 2,3 , Yasufumi Araki 4 , Jun’ichi Ieda 4 and Yuki Shiomi 1 1 2 Department of Basic Science, The University of Tokyo, Tokyo, Japan Frontier Research Institute for Interdisciplinary Sciences, Tohoku University, Sendai, Japan 3 Research Institute of Electrical Communication, Tohoku University, Sendai, Japan 4 Advanced Science Research Center, Japan Atomic Energy Agency, Tokai, Japan † To whom correspondence should be addressed. E-mail: yokouchi@g.ecc.u-tokyo.ac.jp 1" 2312.01555v1,"Explainable AI is Responsible AI: How Explainability Creates Trustworthy and Socially Responsible Artificial Intelligence STEPHANIE BAKER, James Cook University, Australia WEI XIANG, La Trobe University, Australia Artificial intelligence (AI) has been clearly established as a technology with the potential to revolutionize fields from healthcare to finance - if developed and deployed responsibly. This is the topic of responsible AI, which emphasizes the need to develop trustworthy AI systems that minimize bias, protect privacy, support security, and enhance transparency and accountability. Explainable AI (XAI) has been broadly considered as a building block for responsible AI (RAI), with most of the literature considering it as a solution for improved transparency. This work proposes that XAI and responsible AI are significantly more deeply entwined. In this work, we explore state-of-the-art literature on RAI and XAI technologies. Based on our findings, we demonstrate that XAI can be utilized to ensure fairness, robustness, privacy, security, and transparency in a wide range of contexts. Our findings lead us to conclude that XAI is an essential foundation for every pillar of RAI. CCS Concepts: • Computing methodologies → Artificial intelligence; Machine learning; • General and reference → Surveys and overviews. Additional Key Words and Phrases: explainability, explainable AI, responsible AI, trustworthy AI 1 INTRODUCTION In our increasingly data-driven society, artificial intelligence (AI) has become pervasive for decisionmaking in a wide range of fields. AI has immense potential to make positive change in fields ranging from agriculture [123] to healthcare [20]. However, as with any tool, AI can also cause great harm if developed and used improperly or inappropriately; regardless of whether this is done unintentionally or maliciously. The consequences of bad AI practice can range from bias affecting underprivileged or underrepresented groups [37, 42], to financial harm [118], to physical and mental harm [74, 100]. The need to develop AI in a way that benefits human life and societies has lead to the emergence of responsible AI (RAI). RAI is fundamentally the field of applying ethics to the development and utilization of AI, to ensure that AI systems and used for the good of humanity [10, 137]. As with all moral philosophy, there is no single consensus on what makes AI ethical and therefore responsible. However, efforts have been made to establish RAI characteristics, frameworks, and guidelines in academia [10, 64, 75], industry [50, 58, 85, 87, 125], and goverments and political bodies [36, 43, 54, 59, 70, 89, 90, 96]. Frequently identified pillars of RAI across these diverse sources include fairness, robustness, transparency, accountability, privacy, and safety. Explainability is also considered as a pillar of RAI by many works [22, 64, 75], often connected to transparency. Explainability is broadly considered by the field of explainable AI (XAI), which is focused on providing humans with insight into the reasoning of AI models during their decisionmaking processes. Researchers in the XAI domain have developed methods for producing explanations that include text-based [12, 34], visual [78, 126], and feature importance [78, 116] methods. Given that XAI techniques improve transparency [6, 128], it is understandable that some researchers have classed explainability as a pillar of RAI. However, our review of the literature finds that considering XAI as one discrete pillar of RAI, separate to all others, is insufficient to capture Authors’ addresses: Stephanie Baker, stephanie.baker@jcu.edu.au, James Cook University, 1/14-88 McGregor Road, Cairns, QLD, Australia, 4878; Wei Xiang, La Trobe University, Corner Plenty Road & Kingsbury Drive, Melbourne, VIC, Australia, 3083, w.xiang@latrobe.edu.au." 2312.01561v1,"Multi-View Person Matching and 3D Pose Estimation with Arbitrary Uncalibrated Camera Networks Yan Xu Carnegie Mellon University Kris Kitani Carnegie Mellon University yxu2@alumni.cmu.edu kmkitani@andrew.cmu.edu Abstract Cross-view person matching and 3D human pose estimation in multi-camera networks are particularly difficult when the cameras are extrinsically uncalibrated. Existing efforts generally require large amounts of 3D data for training neural networks or known camera poses for geometric constraints to solve the problem. However, camera poses and 3D data annotation are usually expensive and not always available. We present a method, PME, that solves the two tasks without requiring either information. Our idea is to address cross-view person matching as a clustering problem using each person as a cluster center, then obtain correspondences from person matches, and estimate 3D human poses through multi-view triangulation and bundle adjustment. We solve the clustering problem by introducing a “size constraint” using the number of cameras and a “source constraint” using the fact that two people from the same camera view should not match, to narrow the solution space to a small feasible region. The 2D human poses used in clustering are obtained through a pre-trained 2D pose detector, so our method does not require expensive 3D training data for each new scene. We extensively evaluate our method on three open datasets and two indoor and outdoor datasets collected using arbitrarily set cameras. Our method outperforms other methods by a large margin on cross-view person matching, reaches SOTA performance on 3D human pose estimation without using either camera poses or 3D training data, and shows good generalization ability across five datasets of various environment settings. 1. Introduction Matching people across multiple time-synchronized cameras and estimating their 3D pose are challenging, especially when camera poses are unknown. Provided camera poses, existing efforts [9, 28] often use the epipolar constraint to restrict the solution space of cross-view matching. Figure 1. Our result on CMU Panoptic studio dataset [14]. It jointly addresses cross-view person matching (colored) and 3D human pose estimation from multi-view image sequences captured by extrinsically uncalibrated cameras. Camera poses (black) are also estimated. Works in 3D pose estimation [29, 38, 41, 43] often use the camera poses to annotate 3D ground truth data for training pose regressors [18, 30, 39]. These methods rely heavily on calibrated camera poses, directly or indirectly. However, camera poses are not always available or expensive to obtain in many scenarios. For example, can we perform 3D pose estimation for a group of people camping in a mountain or desert with multiple randomly placed cameras? Aiming at answering the above question, we present a method for Person Matching and 3D pose Estimation (or PME) using image sequences captured from multiple camera views, without knowing the camera poses. Overall, our idea is to first match people in 2D across cameras, then obtain point correspondences from matched people, and finally solve and optimize 3D poses using the matched 2D poses. This idea avoids the need for 3D data. Meanwhile, since the matching step operates in 2D, it also can take full advantage of off-the-shelf 2D detection [8], tracking [17]," 2312.01562v1,"Kernel Alignment for Quantum Support Vector Machines Using Genetic Algorithms Floyd M. Creevey, 1, ∗ Jamie A. Heredge, 1, † Martin E. Sevior, 1, ‡ and Lloyd C. L. Hollenberg 1, § 1 School of Physics, University of Melbourne, VIC, Parkville, 3010, Australia. (Dated: December 5, 2023) The data encoding circuits used in quantum support vector machine (QSVM) kernels play a crucial role in their classification accuracy. However, manually designing these circuits poses significant challenges in terms of time and performance. To address this, we leverage the GASP (Genetic Algorithm for State Preparation) framework for gate sequence selection in QSVM kernel circuits. We explore supervised and unsupervised kernel loss functions’ impact on encoding circuit optimisation and evaluate them on diverse datasets for binary and multiple-class scenarios. Benchmarking against classical and quantum kernels reveals GA-generated circuits matching or surpassing standard techniques. We analyse the relationship between test accuracy and quantum kernel entropy, with results indicating a positive correlation. Our automated framework reduces trial and error, and enables improved QSVM based machine learning performance for finance, healthcare, and materials science applications. Keywords: quantum computing, genetic algorithm, quantum machine learning, SVM, QSVM I. INTRODUCTION Support vector machines (SVMs) are a popular class of classical machine learning algorithms that are widely used for classification and regression tasks in various fields, such as finance [1], healthcare [2, 3], and chemistry [4]. They work by finding the hyperplane that best separates the given data. Recently, quantum SVMs (QSVMs) have been introduced as the generalisation of SVMs that use a quantum kernel function to measure the similarity between data points [5]. The quantum kernel function is typically implemented using a quantum circuit that encodes the features of the data points into the amplitudes of a quantum state, and then applies a set of quantum gates to compute the inner product between the quantum states. One advantage of QSVMs over classical SVMs is their ability to construct kernels that are not classically simulable [6]. Another advantage is their potential for enhanced performance on certain tasks, such as the classification of non-linearly separable data, due to the ability of the quantum kernel function to operate in a higher-dimensional feature space than classical SVMs [7]. These advantages make QSVMs an attractive area of research for improving the performance of classical machine learning algorithms. However, designing an effective quantum kernel function is a non-trivial task, and has been the subject of much research in the field of quantum machine learning [8]. There are several techniques that are currently used to design quantum circuits for machine learning tasks, including analytical methods [9], numerical [10], and variational methods [11, 12]. Each of these techniques has its own strengths and weaknesses, with the choice of technique depending on the specific problem and the available resources. Analytical methods are based on mathematical analysis and aim to find the optimal ∗ fcreevey@student.unimelb.edu.au † heredgej@student.unimelb.edu.au ‡ martines@unimelb.edu.au § lloydch@unimelb.edu.au circuit design that minimises the error in the output. These methods can be computationally efficient, but they may not be suitable for all problems, as they rely on the availability of exact mathematical solutions. Numerical optimisation techniques involve the use of optimisation algorithms to find the best circuit design by minimising a cost function that measures the error in the output. These methods are generally more flexible than analytical methods, but they can be computationally intensive and may require large amounts of data. Variational methods employ parameterised quantum circuits, where the parameters are optimised to minimise output error, based on the idea of representing the quantum state through a neural network and optimising network parameters using classical algorithms. Such methods are highly flexible and can be used for a wide range of problems, but they may not always produce the most accurate results. The approach toward optimising the quantum kernel function described in this paper is to use a genetic algorithm, building from the genetic algorithm for state preparation (GASP) framework presented in [13]. Previous work has been done on the generation of optimal ad-hoc kernel function quantum circuits for classification by using a quantum support vector machine [8][14], presenting the use of a genetic algorithm and comparison with classical classifiers. This paper will examine different distinct fitness functions for the generation of the kernel function and analyse performance based on both their classification accuracy and entropy of entanglement. A genetic algorithm is a heuristic search algorithm that mimics the process of natural selection [15]. The genetic algorithm can be used to search for an optimal quantum circuit that produces an accurate kernel matrix for the SVM while taking into account various constraints such as the number of qubits, the gate depth, and the connectivity of the quantum circuit. We explore the use of a genetic algorithm to optimise the kernel function quantum circuit of a QSVM on various datasets. To generate the quantum √ circuits, we use a set of four gates: the single-qubit X, X, and R z gates, and the two-qubit CX gate. These form a universal gate set for quantum computation and are commonly used in quantum algorithms" 2312.01564v1,"APoLLo : Unified Adapter and Prompt Learning for Vision Language Models Sanjoy Chowdhury 1∗ 1 Sayan Nag 2∗ University of Maryland, College Park {sanjoyc,dmanocha}@umd.edu Dinesh Manocha 1 2 University of Toronto sayan.nag@mail.utoronto.ca Project page - https://gamma.umd.edu/pro/vision_language/apollo/ Flowers (Novel) Abstract The choice of input text prompt plays a critical role in the performance of Vision-Language Pretrained (VLP) models such as CLIP. We present APoLLo , a unified multi-modal approach that combines Adapter and Prompt learning for Vision-Language models. Our method is designed to substantially improve the generalization capabilities of VLP models when they are fine-tuned in a few-shot setting. We introduce trainable cross-attention-based adapter layers in conjunction with vision and language encoders to strengthen the alignment between the two modalities. We enforce consistency between the respective encoder branches (receiving augmented inputs) to prevent overfitting in downstream tasks. Our method is evaluated on three representative tasks: generalization to novel classes, cross-dataset evaluation, and unseen domain shifts. In practice, APoLLo achieves a relative gain up to 6.03% over MaPLe (SOTA) on novel classes for 10 diverse image recognition datasets. 1 Introduction Recent years have witnessed tremendous success of largescale pre-trained language models (Devlin et al., 2018; Liu et al., 2019; Raffel et al., 2020; Biderman et al., 2023; Scao et al., 2022; Shen et al., 2023; Touvron et al., 2023) as well as visual models (Dosovitskiy et al., 2020; Liu et al., 2021b; Tan and Le, 2019) leading to a surge in pre-trained Vision-Language models (Dou et al., 2022; Li et al., 2022a; Yang et al., 2022; Wang et al., 2023a; Li et al., 2023b,a; Wang et al., 2023b) for multi-modal downstream tasks. Despite being largely successful in terms of generalization capabilities, these VLP models such as CLIP (Radford et al., 2021) are difficult to fine-tune for few-shot learning-based downstream tasks (Khattak et al., 2023). This is mainly because of the massive scale of these models coupled with the deficiency of training data ∗ Equal contribution. OxfordPets (Base) Stanford Cars (Base) ImageNet (Novel) 78.16 77.83 72.46 72.94 73.43 97.11 SUN397 (Base) 70.54 95.43 82.97 94.36 80.82 80.36 DTD (Base) 83.95 83.00 95.63 Caltech101 (Novel) 37.44 90.71 40.62 FGVCAircraft (Base) 87.88 91.35 UCF101 (Base) Food101 (Base) APoLLo(Ours) MaPLe (SOTA) Figure 1: APoLLo sets a new state-of-the-art across several datasets for the base-to-novel class generalization task by learning a vision-language representation using a unified adapter and prompt tuning strategy under a few-shot setting. Each axis denotes an accuracy value, either on base or novel class (specified accordingly) for the corresponding dataset (refer to Table 1). (Khattak et al., 2023). Recent studies in literature propose fine-tuning of these models by introducing and calibrating the parameters by prompting (Zhou et al., 2022a) and adapter (Gao et al., 2021a) techniques. While the former injects tunable parameters through learned embeddings in one or more modalities, the latter incorporates in-situ adjustments conventionally near the prediction head. The effectiveness of such fine-tuning-based methods notwithstanding recent investigations reveal (Zhou et al., 2022b) the caveats of these approaches – such as neglecting the useful knowledge gained from the preceding pre-training step and overfitting with the downstream tasks. Although we find a considerable wealth of studies that involve text-based prompt learning (Lu et al., 2022; Shu et al., 2022; Huang et al., 2022), the same for the visual pipeline still remains an under-explored area. Main Results: We present APoLLo , a novel unified adapter and prompt learning approach for VLP models to tackle the generalizability problems in few-shot scenarios. We enforce consistency between intra-modal encoders using consistency-" 2312.01573v1,"Neural Computing and Applications https://doi.org/10.1007/s00521-023-09214-4 (0123456789().,-volV) (0123456789(). ,- volV) S . I . : D E E P L E A R N I N G I N M U L T I M O D A L M E D I C A L I M A G I N G F O R C A N CE R Survey on deep learning in multimodal medical imaging for cancer detection Yan Tian 1 • Zhaocheng Xu 2 • Yujun Ma 2 • Weiping Ding 3 • Ruili Wang 4 • Zhihong Gao 5,6 • Guohua Cheng 7 • Linyang He 7 • Xuran Zhao 1 Received: 5 October 2022 / Accepted: 21 October 2023 Ó The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2023 Abstract The task of multimodal cancer detection is to determine the locations and categories of lesions by using different imaging techniques, which is one of the key research methods for cancer diagnosis. Recently, deep learning-based object detection has made significant developments due to its strength in semantic feature extraction and nonlinear function fitting. However, multimodal cancer detection remains challenging due to morphological differences in lesions, interpatient variability, difficulty in annotation, and imaging artifacts. In this survey, we mainly investigate over 150 papers in recent years with respect to multimodal cancer detection using deep learning, with a focus on datasets and solutions to various challenges such as data annotation, variance between classes, small-scale lesions, and occlusion. We also provide an overview of the advantages and drawbacks of each approach. Finally, we discuss the current scope of work and provide directions for the future development of multimodal cancer detection. Keywords Cancer detection  Convolutional neural network  Medical image analysis  Computer vision 1 Introduction Yan Tian and Zhaocheng Xu have contributed equally to this work. This work was supported in part by the National Natural Science Foundation of China under Grant 61972351 and 62111530300; in part by the Special Project for Basic Business Expenses of Zhejiang Provincial Colleges and Universities under Grant JRK22003 and in part by Zhejiang Engineering Research Center of Intelligent Medicine under Grant 2016E10011. & Weiping Ding dwp9988@163.com Cancer detection [1] in multimodal medical imaging, including X-ray imaging, ultrasonic imaging, whole slide images (WSIs), computed tomography (CT) imaging and magnetic resonance imaging (MRI), has been a promising research area in both academic research and clinical applications. An accurate and efficient cancer detector can be applied to detect various cancers, such as breast, lung, 4 School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou 325000, China 5 Department of Big Data in Health Science, The First Affiliated Hospital of Wenzhou Medical University, Wenzhou 325000, China 6 Zhejiang Engineering Research Center of Intelligent Medicine, Wenzhou 325000, China 7 Jianpei Technology Co. Ltd, Hangzhou 311200, China & Ruili Wang Prof.ruili.wang@gmail.com & Zhihong Gao gzh@wzhospital.cn 1 School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou 310018, China 2 School of Mathematical and Computational Sciences, Massey University, Auckland 0632, New Zealand 3 School of Information Science and Technology, Nantong University, Nantong 226019, China 123" 2312.01575v1,"A Challenging Multimodal Video Summary: Simultaneously Extracting and Generating Keyframe-Caption Pairs from Video Keito Kudo 1 Haruki Nagasawa 1 Jun Suzuki 1 Nobuyuki Shimizu 2 1 Tohoku University 2 LY Corporation {keito.kudo.q4, haruki.nagasawa.s8}@dc.tohoku.ac.jp jun.suzuki@tohoku.ac.jp nobushim@lycorp.co.jp N pairs of Keyframe & Caption This paper proposes a practical multimodal video summarization task setting and a dataset to train and evaluate the task. The target task involves summarizing a given video into a predefined number of keyframe-caption pairs and displaying them in a listable format to grasp the video content quickly. This task aims to extract crucial scenes from the video in the form of images (keyframes) and generate corresponding captions explaining each keyframe’s situation. This task is useful as a practical application and presents a highly challenging problem worthy of study. Specifically, achieving simultaneous optimization of the keyframe selection performance and caption quality necessitates careful consideration of the mutual dependence on both preceding and subsequent keyframes and captions. To facilitate subsequent research in this field, we also construct a dataset by expanding upon existing datasets and propose an evaluation framework. Furthermore, we develop two baseline systems and report their respective performance. 1 1 Introduction The popularity of video sharing platforms has increased, which has resulted in a substantial increase in daily video-watching by individuals. As a result, there is increasing interest in practical video summarization systems that can comprehend video content efficiently, and many previous studies have proposed different automatic video summarization methods to address this demand. Most early attempts only considered video and image data, and these methods were developed in the vision and image processing community (Apostolidis et al., 2021), e.g., keyframe detection (Wolf, 1996; Kulhare et al., 2016; Yan et al., 2018; Khurana and Deshpande, 2023) and video storyboarding (Zhang et al., 2016). However, the recent trend 1 This dataset and our systems (code) are publicly available at https://github.com/keitokudo/Multi-VidSum. “A logo is shown.” The number of keyframe = Abstract “An athlete is ready to start.” 4 Multi-VidSum System Video “A man is long jumping in a stadium.” “A jumper completes a long jump and then runs around holding a flag.” Figure 1: Overview of the Multi-VidSum task. We assume that the number of the output keyframe-caption pairs is given (e.g., 4) depending on summary display space and user preference. has shifted to multimodal video summarization, which requires joint outputs of both image and text pairs, e.g., video captioning (Sun et al., 2022; Koh et al., 2023), dense video captioning (Krishna et al., 2017; Zhou et al., 2018b; Yang et al., 2023b), and video storytelling (Li et al., 2020). Multimodal video summarization tasks are a high-demand practical application and a challenging research task. Thus, in this paper, we propose a multimodal video summarization task, which we refer to Multi-VidSum task. This task considers more practical situations and challenging perspectives. The Multi-VidSum task requires us to summarize a given video into a predefined number of keyframecaption pairs and display them in a listable format to grasp the video content efficiently. We first formulate the task definition and develop evaluation metrics to assess the task appropriately. Then, we construct training and evaluation datasets to process this task. In addition, we develop two baseline systems using the constructed data, thereby providing an effective benchmark for future research and offering insights into handling the target task based on performance comparisons. The challenge of this task lies in the simultaneous execution of keyframe selection and caption generation while maintaining sufficient consider-" 2312.01576v1,"Learning Efficient Unsupervised Satellite Image-based Building Damage Detection Yiyun Zhang, Zijian Wang, Yadan Luo, Xin Yu, Zi Huang The University of Queensland Brisbane, Australia {yiyun.zhang, zijian.wang, y.luo, xin.yu}@uq.edu.au, huang@itee.uq.edu.au Abstract—Existing Building Damage Detection (BDD) methods always require labour-intensive pixel-level annotations of buildings and their conditions, hence largely limiting their applications. In this paper, we investigate a challenging yet practical scenario of BDD, Unsupervised Building Damage Detection (U- BDD), where only unlabelled pre- and post-disaster satellite image pairs are provided. As a pilot study, we have first proposed an advanced U-BDD baseline that leverages pre-trained visionlanguage foundation models (i.e., Grounding DINO, SAM and CLIP) to address the U-BDD task. However, the apparent domain gap between satellite and generic images causes low confidence in the foundation models used to identify buildings and their damages. In response, we further present a novel self-supervised framework, U-BDD++, which improves upon the U-BDD baseline by addressing domain-specific issues associated with satellite imagery. Furthermore, the new Building Proposal Generation (BPG) module and the CLIP-enabled noisy Building Proposal Selection (CLIP-BPS) module in U-BDD++ ensure high-quality self-training. Extensive experiments on the widely used building damage assessment benchmark demonstrate the effectiveness of the proposed method for unsupervised building damage detection. The presented annotation-free and foundation model-based paradigm ensures an efficient learning phase. This study opens a new direction for real-world BDD and sets a strong baseline for future research. The code is available at https://github.com/fzmi/ubdd. Index Terms—building damage detection, satellite image, unsupervised learning, foundation model, disaster assessment Building Damaged Before Wildfire After Wildfire 🛠 Foundation Models Undamaged Damaged Building Localisation Damage Classification I. I NTRODUCTION Natural disasters pose significant threats to individuals and communities worldwide, necessitating swift and accurate postdisaster evaluation. One of the essential procedures for postdisaster relief organisations is to identify damaged buildings in the affected areas, which is crucial for coordinating the optimal response and disaster recovery. Although traditional on-site surveys are accurate, they can be hazardous for the ground assessment personnel and time-consuming. Fortunately, the recent advancements in remote sensing and deep learning have paved the way for more efficient assessment of building damage, eliminating the need for physical inspection. Existing Building Damage Detection (BDD) algorithms [1]– [4] focus on determining if buildings have been damaged from bi-temporal satellite image pairs (i.e., pre-disaster and post-disaster satellite images of the same geolocation). Previous methods treat BDD as a segmentation task, in which a classification task is performed to assess damages (e.g., damaged or undamaged). However, these methods heavily rely Fig. 1: High-level illustration of a U-BDD approach. Provided with a pre-disaster satellite image (top-left) and the corresponding postdisaster image (top-right) in an area of interest, pre-trained foundation models can be applied to perform building localisation (bottom-left) and damage classification (bottom-right) masks. on comprehensive pixel-level annotations of building masks, which are time-consuming and labour-intensive. It would be preferable to detect damages with minimal human labelling efforts from the readily available bi-temporal satellite images. In this paper, we are motivated to develop an innovative yet practical building damage detection method, named Unsupervised Building Damage Detection (U-BDD). Under this setting, only unlabelled pre-disaster and post-disaster satellite image pairs are provided. The absence of manual annotations imposes considerable difficulties in extracting building and damage features from the image pairs, leading to a unique challenge to BDD. To the best of our knowledge, none" 2312.01585v1,"OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection Haoyu Jiang Haiyang Yu jhy549@sjtu.edu.cn Shanghai Jiao Tong University haiyang_yu@sjtu.edu.cn Shanghai Jiao Tong University Nan Li Ping Yi lyyqmjshu@sjtu.edu.cn Shanghai Jiao Tong University yiping@sjtu.edu.cn Shanghai Jiao Tong University ABSTRACT Deep neural networks (DNNs) have been found vulnerable to backdoor attacks, raising security concerns about their deployment in mission-critical applications. There are various approaches to detect backdoor attacks, however they all make certain assumptions about the target attack to be detected and require equal and huge numbers of clean and backdoor samples for training, which renders these detection methods quite limiting in real-world circumstances. This study proposes a novel one-class classification framework called One-class Graph Embedding Classification (OCGEC) that uses GNNs for model-level backdoor detection with only a little amount of clean data. First, we train thousands of tiny models as raw datasets from a small number of clean datasets. Following that, we design a ingenious model-to-graph method for converting the model’s structural details and weight features into graph data. We then pre-train a generative self-supervised graph autoencoder (GAE) to better learn the features of benign models in order to detect backdoor models without knowing the attack strategy. After that, we dynamically combine the GAE and one-class classifier optimization goals to form classification boundaries that distinguish backdoor models from benign models. Our OCGEC combines the powerful representation capabilities of graph neural networks with the utility of one-class classification techniques in the field of anomaly detection. In comparison to other baselines, it achieves AUC scores of more than 98% on a number of tasks, which far exceeds existing methods for detection even when they rely on a huge number of positive and negative samples. Our pioneering application of graphic scenarios for generic backdoor detection can provide new insights that can be used to improve other backdoor defense tasks. Code is available at https://github.com/jhy549/OCGEC. CCS CONCEPTS • Security and privacy; • Computing methodologies → Machine learning; KEYWORDS Deep Neural Networks; Model-level Backdoor Detection; Model to Graph; One-Class Classification 1 INTRODUCTION Nowadays, deep neural networks (DNNs) have excelled in various fields such as computer vision [45], speech recognition [7], 64 64 256 256 512 512 512512 512 Graph G concatenation Figure 1: A novel method for converting model architecture and weights into a graph representation. machine translation [26], malware classification [16], facial recognition [27], and autonomous driving [43]. Deep learning models demand a lot of data, expensive computational resources, and specialist development knowledge, taking weeks on many CPUs and GPUs. Because individuals and most companies have limited computational capacity, sharing deep learning models and training sets on online machine learning platforms is becoming increasingly common. For example, Google’s Cloud Machine Learning Engine [1] allows TensorFlow models and training data uploads for cloudbased training. Amazon offers pre-built virtual machines with deep learning frameworks for EC2 cloud computing[47], whereas Microsoft offers Azure Batch AI Training[37]. These online machine learning service platforms are popular. The presence of third-party datasets, online third-party platforms, and pre-trained models make deep neural network (DNN) training easier, but users lose control, making them vulnerable to backdoor attacks. However, recent research indicates that this setup makes backdoor attacks possible[22]. Attackers have the ability to manipulate the output of a model by strategically injecting carefully crafted samples into the training dataset or constructing a backdoor neural network. Backdoored models work well on normal inputs, but when triggered by special inputs, the attacker has full control over the model’s output. Backdoor attacks pose a severe threat to the security of machine learning systems, underlining the significance of real-world backdoor detection. In a notable study [9], attackers demonstrated the generation of a backdoored traffic sign classifier." 2312.01592v1,"Expand BERT Representation with Visual Information via Grounded Language Learning with Multimodal Partial Alignment Cong-Duy Nguyen ∗ The-Anh Vu-Le ∗ Thong Nguyen Nanyang Technological University Singapore nguyentr003@ntu.edu.sg University of Illinois Urbana-Champaign, USA vltanh@illinois.edu National University of Singapore Singapore e0998147@u.nus.edu Tho Quan Luu Anh Tuan Ho Chi Minh City University of Technology (HCMUT), VNU-HCM Vietnam qttho@hcmut.edu.vn Nanyang Technological University Singapore anhtuan.luu@ntu.edu.sg ABSTRACT Language models have been supervised with both language-only objective and visual grounding in existing studies of visual-grounded language learning. However, due to differences in the distribution and scale of visual-grounded datasets and language corpora, the language model tends to mix up the context of the tokens that occurred in the grounded data with those that do not. As a result, during representation learning, there is a mismatch between the visual information and the contextual meaning of the sentence. To overcome this limitation, we propose GroundedBERT - a grounded language learning method that enhances the BERT representation with visually grounded information. GroundedBERT comprises two components: (i) the original BERT which captures the contextual representation of words learned from the language corpora, and (ii) a visual grounding module which captures visual information learned from visual-grounded datasets. Moreover, we employ Optimal Transport (OT), specifically its partial variant, to solve the fractional alignment problem between the two modalities. Our proposed method significantly outperforms the baseline language models on various language tasks of the GLUE and SQuAD datasets. CCS CONCEPTS • Computing methodologies → Natural language processing; Computer vision; • Theory of computation → Theory and algorithms for application domains. KEYWORDS Grounded Language Learning, Optimal Transport ACM Reference Format: Cong-Duy Nguyen, The-Anh Vu-Le, Thong Nguyen, Tho Quan, and Luu Anh Tuan. 2023. Expand BERT Representation with Visual Information via Grounded Language Learning with Multimodal Partial Alignment. In ∗ Both authors contributed equally to this research. This work is licensed under a Creative Commons Attribution International 4.0 License. MM ’23, October 29-November 3, 2023, Ottawa, ON, Canada © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0108-5/23/10. https://doi.org/10.1145/3581783.3612248 Proceedings of the 31st ACM International Conference on Multimedia (MM ’23), October 29-November 3, 2023, Ottawa, ON, Canada. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3581783.3612248 1 INTRODUCTION Grounded language learning is concerned with learning the meaning of language as it applies to the real world. Humans, especially children, learn language from not only pure textual information but also different modalities such as vision and audio, which contain rich information that cannot be captured by text alone [35, 44, 50]. However, many traditional language models are learned only from textual corpora [3, 11]. They have the limitation in learning complex semantics that require the combination of signals in data through cross-referencing and synthesis. Recently, there have been many studies trying to improve the language representation with visual information [2, 9, 16, 21, 49, 51, 54–56]. In those attempts, they update the weights of the language encoder using the visual objective together with the pure languagebased objective during pretraining. However, there is usually a huge gap in the distribution and quantity of word tokens between visual datasets and language corpora. For example, in Table 1, the Book Corpus and Wikipedia, two conventional language corpora, contain billions of words with millions of unique tokens, while MS COCO, a common visual-grounded dataset, contains only 6 million words and 44 thousand unique tokens. Therefore, during visual-grounded learning, only the tokens from the visual datasets are updated while the majority of the tokens are not equipped with visual information. However, during pretraining, those tokens with and without information from the images will be mixed up in the same context of the sentence, confusing the contextual learning process. Moreover, previous attempts compressed the entire image into one vector as a global representation and then matched it to the paired caption. However, as shown by the samples picked from the Visual Genome [19] dataset in Figure 1, many of the captions only describe local regions in the corresponding image. Thus, using a global representation vector can distract the encoder from capturing local information, making it difficult for the model to align between modalities. As a solution to this issue, we use the Vision Transformer [13] model as the visual encoder to store local information in patch embeddings." 2312.01619v1,"How Many Validation Labels Do You Need? Exploring the Design Space of Label-Efficient Model Ranking Zhengyu Hu 1 Jieyu Zhang 2 Yue Yu 3 Yuchen Zhuang 3 Hui Xiong 1 B 1 HKUST (GZ) 2 University of Washington 3 Georgia Institute of Technology zhu021@connect.hkust-gz.edu.cn, jieyuz2@cs.washington.edu, {yueyu, yczhuang}@gatech.edu, xionghui@ust.hk Abstract This paper presents LEMR (Label-Efficient Model Ranking) and introduces the MoraBench Benchmark. LEMR is a novel framework that minimizes the need for costly annotations in model selection by strategically annotating instances from an unlabeled validation set. To evaluate LEMR, we leverage the MoraBench Benchmark, a comprehensive collection of model outputs across diverse scenarios. Our extensive evaluation across 23 different NLP tasks in weak supervision, semi-supervised learning, and prompt selection tasks demonstrates LEMR’s effectiveness in significantly reducing labeling costs. Key findings highlight the impact of suitable ensemble methods, uncertainty sampling strategies, and model committee selection in enhancing model ranking accuracy. LEMR, supported by the insights from MoraBench, provides a cost-effective and accurate solution for model selection, especially valuable in resource-constrained environments. 1 Introduction Model selection plays a central role in building robust predictive systems for Natural Language Processing (NLP) tasks (Awasthy et al., 2020; Lizotte, 2021; Zhang et al., 2022c; Han et al., 2023), which underpins numerous application scenarios including feature engineering (Severyn and Moschitti, 2013), algorithm selection (Yang et al., 2023), and hyperparameter tuning (Perez et al., 2021). Typically, in a standard machine learning pipeline, a held-out validation set is utilized for the model selection purpose, which often contains massive labeled data. Under a more practical low-resource setting, however, creating a large set of validation data is no longer feasible (Perez et al., 2021; Bragg et al., 2021) due to the additional annotation cost (Zhang et al., 2023) as well as the reliance on domain expertise (Xu et al., 2023a; Hu et al., 2023). The resolution of this challenge is vital for the de- ployment of model selection techniques under real application scenarios. Facilitating model selection under the true resource-limited scenarios can be challenging. Existing approaches often adopt fixed parameter (Liu et al., 2022), or early stopping (Mahsereci et al., 2017; Choi et al., 2022; Yu et al., 2023) for model selection, yet it can suffer from the training instability issue under the low-resource settings and does not reliably choose better-than-average hyperparameters (Blier and Ollivier, 2018; Perez et al., 2021). There are also several works (Zhou et al., 2022; Lu et al., 2022) that focus on unsupervised model selection, which creates pseudo-validation sets for ranking different models. Nonetheless, in the absence of access to labeled data, a substantial discrepancy often exists between the ranking outcomes derived from these models and the true ranking of models. To sum up, model ranking remains challenging and under-explored under lowresource scenarios. In this work, we propose LEMR (Label-Efficient Model Ranking), a framework that significantly reduces the need for costly annotations. Our framework does not assume any ground-truth clean labels at hand. Instead, we aim to strategically annotate instances from an unlabeled validation set for model ranking. The framework can be divided into four steps. First, an ensemble method with a selected model committee generates pseudo-labels for the validation set, addressing the labeling cost dilemma (Step-I in Section 4.1). The framework then mitigates the noisy knowledge in these pseudo-labels at two levels: by obtaining ground-truth labels based on uncertainty sampling (Step-II in Section 4.2), and by using a Z-score mechanism to dynamically adjust the model committee based on these updated labels (Step-II in Section 4.2). Finally, LEMR ranks all models using the refined pseudo-label and ground-truth label sets (Step-IV in Section 4.4). Here, we conduct a more systematic study of how" 2312.01623v1,"Universal Segmentation at Arbitrary Granularity with Language Instruction Yong Liu 1 , Cairong Zhang 2 , Yitong Wang 2 , Jiahao Wang 3 , Yujiu Yang 1 Yansong Tang 1 * 1 Tsinghua Shenzhen International Graduate School, Tsinghua University 2 ByteDance Inc. 3 The University of Hong Kong liuyong23@mails.tsinghua.edu.cn, tang.yansong@sz.tsinghua.edu.cn Seg. Mask Lang. “head” “all faces” “the most salient object” “man looking this way” “mom and kid” “wall” “bed, light, shelf, et al.” Sem. Level part part instance instance group class scene Bottom Semantic Understanding Level Top Figure 1. Illustration of our UniLSeg that is able to segment images at any granularity or semantic level with language as instructions. “Seg. Mask”, “Lang.”, and “Sem. Level” denote the segmentation masks, corresponding language descriptions, and semantic levels, respectively. The segmentation masks are shown in red or other colors. UniLSeg can take arbitrary text as input, whether it is a detailed long description of an object or a short category name. With flexible expressions indicating segmentation target, UniLSeg achieves excellent performance on various semantic level, e.g., object part, single or multiple instances, and the whole scene. Abstract data format, where images with texts describing segmentation targets as input and corresponding masks are output. Combined with a automatic annotation engine for utilizing numerous unlabeled data, UniLSeg achieves excellent performance on various tasks and settings, surpassing both specialist and unified segmentation models. This paper aims to achieve universal segmentation of arbitrary semantic level. Despite significant progress in recent years, specialist segmentation approaches are limited to specific tasks and data distribution. Retraining a new model for adaptation to new scenarios or settings takes expensive computation and time cost, which raises the demand for versatile and universal segmentation model that can cater to various granularity. Although some attempts have been made for unifying different segmentation tasks or generalization to various scenarios, limitations in the definition of paradigms and input-output spaces make it difficult for them to achieve accurate understanding of content at arbitrary granularity. To this end, we present UniLSeg, a universal segmentation model that can perform segmentation at any semantic level with the guidance of language instructions. For training UniLSeg, we reorganize a group of tasks from original diverse distributions into a unified 1. Introduction Segmentation is one of the most important problem in computer vision, which aims to group meaningful regions and perform pixel-level understanding. Recent years have witnessed great progress in the development of various segmentation tasks such as semantic segmentation [7, 16, 46], interactive segmentation [29, 43, 44, 72], salient object segmentation [25, 83], and referring segmentation [49, 76]. Although many excellent works have emerged, they tend to be specialist approaches for specific segmentation tasks, making it difficult for them to address complex and diverse segmentation scenarios. When adapting to novel settings or semantics, new models need to be designed and trained * Corresponding author 1" 2312.01626v1,"SOME REMARKS ON SELECTIVELY STAR-CCC SPACES YUAN SUN ∗ Abstract. In this paper, the author represent a unification and extension of concepts previously studied by several authors. By establish connections between the chain condition, selectively starccc properties and star-Lindelöf properties, the author provide that selectively 3-star-ccc equals weakly strongly star-Lindelöf for normal spaces, which gives a negative answer to Question 4.10 raised by Xuan and Song in [11], and use a different method from Xuan and Song to provide that the CCC implies selectively 2-star-ccc, which gives a positive answer to Problem 4.4 in [7]. Finally, an example is given to distinguish these properties. 1.Introduction A systematic study of classical selection principles was started by Scheepers in [4]. Later, Kočinac applied the star operator in the field of selection principles. He introduced and studied a number of starselection principles. The survey papers [6] contain a detailed exposition on star selection principles theory. Aurichi introduced and studied a class of spaces which is a selective version of the countable chain condition in [5]. Later, Bal and Kočinac in [7] defined and studied a star version of selectively ccc which constitute a more general spaces. Recently, Song and Xuan investigated the equivalence and properties of certain of these spaces. Several questions were raised in [11]. Most of these questions remains open.This paper arose in the attempt to analyse these questions. 2. Notation and terminology In this paper, we adopt the notation and terminology in [3]; N + denotes the set of strictly positive integers, ω denotes the first infinite 2000 Mathematics Subject Classification. 54D20, 54E35. Key words and phrases. Chain conditions, Selectively star-ccc, Weakly star- Lindelöf, Star-Lindelöf. *Corresponding author. E-mail address: sunyuan@bucea.edu.cn. 1" 2312.01631v1,"Cooperative vs. Teleoperation Control of the Steady Hand Eye Robot with Adaptive Sclera Force Control: A Comparative Study Mojtaba Esfandiari 1 , Ji Woong Kim 1 , Botao Zhao 1 , Golchehr Amirkhani 1 , Muhammad Hadi 1 , Student, IEEE, Peter Gehlbach 2 , Member, IEEE, Russell H. Taylor 3 , Life Fellow, IEEE, Iulian Iordachita 1 , Senior Member, IEEE Abstract— A surgeon’s physiological hand tremor can significantly impact the outcome of delicate and precise retinal surgery, such as retinal vein cannulation (RVC) and epiretinal membrane peeling. Robot-assisted eye surgery technology provides ophthalmologists with advanced capabilities such as hand tremor cancellation, hand motion scaling, and safety constraints that enable them to perform these otherwise challenging and high-risk surgeries with high precision and safety. Steady-Hand Eye Robot (SHER) with cooperative control mode can filter out surgeon’s hand tremor, yet another important safety feature, that is, minimizing the contact force between the surgical instrument and sclera surface for avoiding tissue damage cannot be met in this control mode. Also, other capabilities, such as hand motion scaling and haptic feedback, require a teleoperation control framework. In this work, for the first time, we implemented a teleoperation control mode incorporated with an adaptive sclera force control algorithm using a PHANTOM Omni haptic device and a force-sensing surgical instrument equipped with Fiber Bragg Grating (FBG) sensors attached to the SHER 2.1 end-effector. This adaptive sclera force control algorithm allows the robot to dynamically minimize the toolsclera contact force. Moreover, for the first time, we compared the performance of the proposed adaptive teleoperation mode with the cooperative mode by conducting a vessel-following experiment inside an eye phantom under a microscope. I. INTRODUCTION Retinal vein occlusion (RVO) is the second most prevalent retinal vascular disease. It occurs due to a retinal vein occlusion, leading to severe vision loss. In 2015, an overall 28.06 million people worldwide (0.77% of people aged 30-89 years) were affected by RVO, branch RVO (BRVO) (23.38 million), and central RVO (CRVO) (4.67 million) [1]. There is no standard method for directly treating RVO with surgery, as it requires consistently and safely performing retinal vein cannulation (RVC). Due in part to human hand tremor limits, this is not broadly possible without robotics-assisted surgical systems. The diameter of the retinal veins is on the order of *This work is supported by the U.S. National Institutes of Health under the grant numbers 2R01EB023943-04A1 and 1R01 EB025883-01A1, and partially by JHU internal funds. 1 Mojtaba Esfandiari, Ji Woong Kim, Botao Zhao, Golchehr Amirkhani, Muhammad Hadi, and Iulian Iordachita are with the Department of Mechanical Engineering and also Laboratory for Computational Sensing and Robotics at the Johns Hopkins University, Baltimore, MD, 21218, USA (email: mesfand2,jkim447,bzhao17,gamirkh1, mhadi2, iordachita@jhu.edu ). 2 Peter Gehlbach is with the Wilmer Eye Institute, Johns Hopkins Hospital, Baltimore, MD, 21287, USA. (e-mail: pgelbach@jhmi.edu ) 3 Russell H. Taylor is with the Department of Computer Science and also the Laboratory for Computational Sensing and Robotics at the Johns Hopkins University, Baltimore, MD, 21218, USA. ( rht@jhu.edu ) Eye phantom Microscope Force-Sensing Tool SHER 2.1 ATI Force Sensor Colored vessels Light FBG Interrogator Phantom Omni Fig. 1: Vessel following experiment in an eye phantom with two different control modes. The experiment setup includes the SHER 2.1, PHANTOM Omni, a surgical microscope, an FBG interrogator, a force-sensing surgical instrument, an eye phantom, and a light source. 150±15µm [2], while, the root mean square (RMS) value of hand tremor of an ophthalmic surgeon is reported as 182µm [3], which is comparable to the vein diameter. Therefore, performing freehand RVC is both challenging and potentially unsafe using free-hand methods. To address this issue, researchers developed several surgical robotic systems such as the Steady Hand Eye Robot (SHER) [4], a hybrid parallel-serial micro-manipulator [5], Preceyes [6], RVRMS [7], and others [8]–[10], trying to mitigate (filter) physiological hand tremor and also to provide surgeons with a higher level of skill and positioning accuracy. The SHER is a 5-degree-of-freedom (DoF) robot manipulator that allows surgeons to cooperatively manipulate a surgical instrument attached to its end-effector towards a desired target (Fig. 1). Due to the high structural rigidity of the robot, it removes surgeon hand tremors, but the small interaction force present between the surgical instrument and the sclera entry port is diminished during cooperative (admittance) control mode. Thus the contact force exerted by the surgeon on the sclera surface can exceed a safe threshold of 120 mN [11]. To minimize the sclera force exerted on the needle, Ebrahimi et al. developed adaptive force control algorithms, including adaptive norm control (ANC) and adaptive component control (ACC), using a force-sensing instrument equipped with fiber Bragg grating (FBG) to maintain the scleral forces below a safe threshold [12], [13]. FBG sensors" 2312.01636v1,"universe Article Comparing numerical relativity and perturbation theory waveforms for a non-spinning equal-mass binary Tousif Islam 1,2,3 , Scott E. Field 1,3 and Gaurav Khanna 2,3,4 1 2 3 4 * Abstract: Past studies have empirically demonstrated a surprising agreement between gravitational waveforms computed using adiabatic-driven-inspiral point-particle black hole perturbation theory (ppBHPT) and numerical relativity (NR) following a straightforward calibration step, sometimes referred to as α-β scaling. Specifically focusing on the quadrupole mode, this calibration technique necessitates only two time-independent parameters to scale the overall amplitude and time coordinate. In this article, part of a special issue, we investigate this scaling for non-spinning binaries at the equal mass limit. Even without calibration, NR and ppBHPT waveforms exhibit an unexpected degree of similarity after accounting for different mass scale definitions. Post-calibration, good agreement between ppBHPT and NR waveforms extends nearly up to the point of the merger. We also assess the breakdown of the time-independent assumption of the scaling parameters, shedding light on current limitations and suggesting potential generalizations for the α-β scaling technique. Keywords: Numerical relativity; black hole perturbation theory; gravitational waves; binary black holes 1. Introduction    Citation: Islam,T.;Field, S.; Khanna, G. Title. Universe 2023, 1, 0. https://doi.org/ Received: Revised: Accepted: Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Department of Mathematics, University of Massachusetts, Dartmouth, MA 02747, USA Department of Physics, University of Massachusetts, Dartmouth, MA 02747, USA Center for Scientific Computing and Data Science Research, University of Massachusetts, Dartmouth, MA 02747, USA Department of Physics and Center for Computational Research, University of Rhode Island, Kingston, RI 02881, USA Correspondence: tislam@umassd.edu Simulating binary black hole (BBH) mergers and understanding the morphology of the resultant gravitational waveforms enables us to develop tools for the rapid characterization of detected gravitational wave (GW) signals [1–15]. An accurate description of BBH mergers requires numerically solving the Einstein equation for the two-body problem. This approach is known as numerical relativity (NR) [16–23] and is often computationally intensive, taking days to weeks to simulate a single BBH merger and its associated waveforms. In recent decades, significant advancements have been made in making NR codes more efficient in performing BBH simulations for systems where the masses of the 1 two-component black holes are comparable, i.e., where q : = m m 2 ≲ 10 is the mass ratio, m 1 is the mass of the primary black hole, and m 2 is the mass of the secondary black hole. While NR simulations have begun to push beyond the q = 10 barrier [17,24,25], long-duration simulations with high accuracy remain challenging and parameter space explorations mostly out of reach. Alternatively, when m 2 ≪ m 1 , one can simplify the problem by assuming the secondary as a point-particle and solving the Teukolsky or the Regge-Wheeler-Zerilli (RWZ) equation [26–37] to obtain the far-field waveform. This theoretical framework is termed point-particle black-hole perturbation theory (ppBHPT) and is anticipated to yield accurate waveforms for binary systems characterized by sufficiently large mass ratios. Conversely, it is expected that the accuracy of ppBHPT waveforms will diminish as we move from the extreme mass ratio limit to the comparable mass regime. Universe 2023, 1, 0. https://doi.org/10.3390/universe1010000 https://www.mdpi.com/journal/universe" 2312.01639v1,"On the Effectiveness of Large Language Models in Domain-Specific Code Generation Meng Chen Hongyu Zhang Chengcheng Wan Shanghai Jiao Tong University Shanghai, China mengchen@sjtu.edu.cn Chongqing University Chongqing, China hyzhang@cqu.edu.cn East China Normal University Shanghai, China ccwan@sei.ecnu.edu.cn Zhao Wei Yong Xu Juhong Wang Tencent Inc. Beijing, China zachwei@tencent.com Tencent Inc. Beijing, China rogerxu@tencent.com Tencent Inc. Beijing, China julietwang@tencent.com Xiaodong Gu * Shanghai Jiao Tong University Shanghai, China xiaodong.gu@sjtu.edu.cn ABSTRACT Large language models (LLMs) such as ChatGPT have shown remarkable capabilities in code generation. Despite their great success, their effectiveness within particular domains (e.g., web development) necessitates further evaluation. In this study, we conduct an empirical study of domain-specific code generation with LLMs. We demonstrate that LLMs exhibit sub-optimal performance in generating domain-specific code, due to their limited proficiency in utilizing domain-specific libraries. We further observe that incorporating API knowledge as prompts can empower LLMs to generate more professional code. Based on these findings, we further investigate how to efficiently incorporate API knowledge into the code generation process. We experiment with three strategies for incorporating domain knowledge, namely, external knowledge inquirer, chain-of-thought prompting, and chain-of-thought fine-tuning. We refer to these strategies as a new code generation approach called DomCoder. Experimental results show that all strategies of Dom- Coder lead to improvement in the effectiveness of domain-specific code generation under certain settings. The results also show that there is still ample room for further improvement, based on which we suggest possible future works. 1 INTRODUCTION Large language models (LLMs) trained with publicly available code, such as ChatGPT, have demonstrated remarkable proficiency in * Corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference 2024, Dec 2023, © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn various coding tasks, including code generation [7, 23], software testing [31], and program repair [6]. Despite their remarkable performance, current LLMs for code generation heavily rely on enormous training data to acquire a broad spectrum of open-domain knowledge. Notably, the evaluation of present LLMs typically revolves around open-domain benchmarks like HumanEval [7] and MBPP [2], which primarily consist of programming contests (e.g., sorting, dynamic programming), and while they showcase the capabilities of LLMs in certain aspects, they do not fully represent the intricacies and challenges associated with real-world code generation scenarios. In this paper, we explore a more demanding code generation scenario, focusing on domain-specific code generation. We define domain-specific code as source code that is tailored specifically for and can only be applied to a particular domain (e.g., web and game), typically developed using domain-specific frameworks (e.g., HTTP, RPC, Unreal). In contrast to general-purpose code, domain-specific code poses unique challenges due to the limited availability of code corpora specific to a given domain. LLMs often struggle to acquire the necessary domain knowledge when confronted with this scarcity of domain-specific training data. This scarcity presents a significant obstacle to the task of generating domain-specific code. We aim to answer the following major questions: (1) How effective are LLMs such as ChatGPT on domain-specific code generation? (2) How to effectively prompt LLMs to produce domain-specific code? In addition, noticed that it is not always straightforward to guide LLMs on domain-specific code repositories, we also explore the following research question: (3) Can we enhance code generation models for a particular domain? Specifically, how to efficiently integrate domain knowledge into code generation models to enable them to excel in domain-specific code generation tasks? To answer these questions, we constructed a domain-specific code dataset that involves two distinct domains and two programming languages: web development in Go and game development in C++. To ensure that the code belonged to the domain we were interested in, we specifically focus on six prominent industry libraries within the chosen domains, namely, Gin, Prometheus, gRPC-go, Unreal" 2312.01643v1,"Enriching meta-analyses through scoping review, bibliometrics, and alternative impact metrics: Visualizing study characteristics, hidden risk of bias, societal influence, and research translation Yefeng Yang a,* , Malgorzata Lagisz a,# , Shinichi Nakagawa a,# a Evolution & Ecology Research Centre and School of Biological, Earth and Environmental Sciences, University of New South Wales, Sydney, NSW 2052, Australia # Equally contributed senior author ⁎ Corresponding author yefeng.yang1@unsw.edu.au (Y.Y) Open Science Raw data and analytical script to reproduce examples presented in the manuscript are archived at GitHub repository https://github.com/Yefeng0920/MA_Map_Bib." 2312.01651v1,"Experimental Optimal Quantum State Estimation with Genuine Three-copy Collective Measurements Kai Zhou, 1, 2 Changhao Yi, 3, 4, 5 Wen-Zhe Yan, 1, 2 Zhibo Hou, 1, 2, 6, ∗ Huangjun Zhu, 3, 4, 5, † Guo-Yong Xiang, 1, 2, 6, ‡ Chuan-Feng Li, 1, 2, 6 and Guang-Can Guo 1, 2, 6 1 CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, People’s Republic of China 2 CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, People’s Republic of China 3 State Key Laboratory of Surface Physics and Department of Physics, Fudan University, Shanghai 200433, China 4 Institute for Nanoelectronic Devices and Quantum Computing, Fudan University, Shanghai 200433, China 5 Center for Field Theory and Particle Physics, Fudan University, Shanghai 200433, China 6 Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People’s Republic of China Nonclassical phenomena tied to entangled states are focuses of foundational studies and powerful resources in many applications. By contrast, the counterparts on quantum measurements are still poorly understood. Notably, genuine multipartite nonclassicality is barely discussed, not to say experimental realization. Here we experimentally demonstrate the power of genuine tripartite nonclassicality in quantum measurements based on a simple estimation problem. To this end we realize an optimal genuine three-copy collective measurement via a nine-step two-dimensional photonic quantum walk with 30 elaborately designed coin operators. Then we realize an optimal estimation protocol and achieve an unprecedented high estimation fidelity, which can beat all strategies based on restricted collective measurements by more than 11 standard deviations. These results clearly demonstrate that genuine collective measurements can extract more information than local measurements and restricted collective measurements. Our work opens the door for exploring genuine multipartite nonclassical measurements and their power in quantum information processing. Introduction.—The cross fertilization of quantum mechanics and information theory has revolutionized the way information is perceived and processed. This revolution is closely tied to a number of intriguing nonclassical phenomena predicted by quantum theory. For example, local measurements on entangled states can produce correlations that are much stronger than what can be produced by classical means [1, 2]. Such nonclassical correlations are interesting not only to foundational studies, but also to many practical tasks, such as quantum cryptography and distributed information processing. Although nonclassicality in quantum states has been actively studied by numerous researchers, nonclassicality in quantum measurements, often described by positive operator-valued measures (POVMs) [3], is still poorly understood. A few notable exceptions are tied to collective measurements on two or more independent copies of a quantum state. Surprisingly, it turns out collective measurements can extract much more information than local measurements although there is no entanglement or correlations among the different copies [4–7]. This superior information extraction capability is rooted in the nonclassicality of quantum measurements rather than quantum states. It may offer practical advantages in many tasks, such as quantum state estimation [5–8], direction estimation [9], multi-parameter estimation [10–12], and quantum state discrimination [4, 13, 14]. Recently, the nonclassicality of collective measurements has been experimentally demonstrated on photonic [15–19], ion-trap [20], and superconducting platforms [20, 21]. Nevertheless, all these demonstrations are limited to the simplest two-copy collective measurements because of the tremendous difficulty in realizing multicopy collective measurements as pointed out in Refs. [20, 21]. The situation is more complicated and interesting if we turn to the multipartite scenario, which allows a variety of nonclassical phenomena. Genuine multipartite nonclassicality is particularly appealing as it cannot be reduced to nonclassicality of fewer parties. In the case of quantum states, it is well known in the form of genuine multipartite entanglement (GME) [22–25], which cannot be reduced to entanglement among fewer parties. GME plays a central role in nonstatistical tests of quantum nonlocality [22, 23, 26], quantum networking [27], quantum cryptography [28], and quantum metrology [29, 30]. By contrast, much less is known about genuine multipartite nonclassicality in quantum measurements and its significance in information processing. Actually, we are not even aware of a clear definition in the literature. In this work, we explore genuine tripartite nonclassicality in quantum measurements and experimentally demonstrate its information-extraction power based on a simple estimation problem. More specifically, we consider the estimation of a random qubit pure state given three identically prepared copies. We first choose a genuine three-copy collective measurement that is optimal for the estimation task and is strictly better than alternative choices based on restricted collective measurements assisted by adaptive strategies. Surprisingly, however, GME is not involved in any POVM element associated with this optimal measurement, which reveals a subtle distinction between quantum measurements and quan-" 2312.01656v1,"The Contemporary Art of Image Search: Iterative User Intent Expansion via Vision-Language Model YILIN YE, The Hong Kong University of Science and Technology (Guangzhou), China, and The Hong Kong University of Science and Technology, China QIAN ZHU, The Hong Kong University of Science and Technology, China SHISHI XIAO, The Hong Kong University of Science and Technology (Guangzhou), China KANG ZHANG, The Hong Kong University of Science and Technology (Guangzhou), China, and The Hong Kong University of Science and Technology, China WEI ZENG ∗ , The Hong Kong University of Science and Technology (Guangzhou), China, and The Hong Kong University of Science and Technology, China Image search is an essential and user-friendly method to explore vast galleries of digital images. However, existing image search methods heavily rely on proximity measurements like tag matching or image similarity, requiring precise user inputs for satisfactory results. To meet the growing demand for a contemporary image search engine that enables accurate comprehension of users’ search intentions, we introduce an innovative user intent expansion framework. Our framework leverages visual-language models to parse and compose multimodal user inputs to provide more accurate and satisfying results. It comprises two-stage processes: 1) a parsing stage that incorporates a language parsing module with large language models to enhance the comprehension of textual inputs, along with a visual parsing module that integrates an interactive segmentation module to swiftly identify detailed visual elements within images; and 2) a logic composition stage that combines multiple user search intents into a unified logic expression for more sophisticated operations in complex searching scenarios. Moreover, the intent expansion framework enables users to perform flexible contextualized interactions with the search results to further specify or adjust their detailed search intents iteratively. We implemented the framework into an image search system for NFT (non-fungible token) search and conducted a user study to evaluate its usability and novel properties. The results indicate that the proposed framework significantly improves users’ image search experience. Particularly the parsing and contextualized interactions prove useful in allowing users to express their search intents more accurately and engage in a more enjoyable iterative search experience. CCS Concepts: • Human-centered computing → Interactive systems and tools; • Information systems → Users and interactive retrieval; Search interfaces; Personalization. ACM Reference Format: Yilin Ye, Qian Zhu, Shishi Xiao, Kang Zhang, and Wei Zeng. 2024. The Contemporary Art of Image Search: Iterative User Intent Expansion via Vision-Language Model. In Proceedings of The 2024 ACM SIGCHI Conference on Computer-Supported Cooperative Work & Social Computing (CSCW 2024), November 09–13, 2024, San Jose, Costa Rica. ACM, New York, NY, USA, 31 pages. https://doi.org/XXXXXXX.XXXXXXX ∗ Wei Zeng is the corresponding author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CSCW’24, November 09–13, 2024, San Jose, Costa Rica © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX 1" 2312.01661v1,"ChatGPT as a Math Questioner? Evaluating ChatGPT on Generating Pre-university Math Questions Phuoc Pham Van Long ∗ Duc Anh Vu ∗ Nhat M. Hoang ∗ Nanyang Technological University Singapore phuoc002@e.ntu.edu.sg Nanyang Technological University Singapore ducanh001@e.ntu.edu.sg Nanyang Technological University Singapore nhat005@e.ntu.edu.sg Xuan Long Do ∗ Anh Tuan Luu † National University of Singapore Singapore xuanlong.do@comp.nus.edu.sg Nanyang Technological University Singapore anhtuan.luu@ntu.edu.sg ABSTRACT KEYWORDS Mathematical questioning is crucial for assessing students’ problemsolving skills. Since manually creating such questions requires substantial effort, automatic methods have been explored. Existing state-of-the-art models rely on fine-tuning strategies and struggle to generate questions that heavily involve multiple steps of logical and arithmetic reasoning. Meanwhile, large language models (LLMs) such as ChatGPT have excelled in many NLP tasks involving logical and arithmetic reasoning. Nonetheless, their applications in generating educational questions are underutilized, especially in the field of mathematics. To bridge this gap, we take the first step to conduct an in-depth analysis of ChatGPT in generating pre-university math questions. Our analysis is categorized into two main settings: context-aware and context-unaware. In the context-aware setting, we evaluate ChatGPT on existing math question-answering benchmarks covering elementary, secondary, and ternary classes. In the context-unaware setting, we evaluate ChatGPT in generating math questions for each lesson from pre-university math curriculums that we crawl. Our crawling results in TopicMath 1 , a comprehensive and novel collection of pre-university math curriculums collected from 121 math topics and 428 lessons from elementary, secondary, and tertiary classes. Through this analysis, we aim to provide insight into the potential of ChatGPT as a math questioner 1 . ACM proceedings, L A TEX, text tagging CCS CONCEPTS • Artificial Intelligence; • Computational Linguistics → Large Language Models; • Educational Question Generation; ∗ Equal contribution. † Corresponding author. 1 Our codes and data are publicly available at https://github.com/dxlong2000/ChatGPT- as-a-Math-Questioner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SAC’24, April 8 –April 12, 2024, Avila, Spain © 2024 Association for Computing Machinery. ACM ISBN 979-8-4007-0243-3/24/04. . . $15.00 https://doi.org/xx.xxx/xxx_x ACM Reference Format: Phuoc Pham Van Long, Duc Anh Vu[1], Nhat M. Hoang[1], Xuan Long Do[1], and Anh Tuan Luu. 2024. ChatGPT as a Math Questioner? Evaluating ChatGPT on Generating Pre-university Math Questions. In Proceedings of ACM SAC Conference (SAC’24). ACM, New York, NY, USA, Article 4, 9 pages. https://doi.org/xx.xxx/xxx_x 1 INTRODUCTION Math problems are essential educational tools for evaluating students’ logical and problem-solving abilities [10, 36]. Engaging students in answering those expert-designed questions has been shown to improve their learning outcomes [12, 28]. Nonetheless, manually crafting such questions demands substantial human effort and expertise, making it time-consuming, non-generalizable, and impractical for scalability [22]. Therefore, automatic tools to generate mathematical questions have received growing attention [20, 37]. Existing state-of-the-art frameworks primarily rely on fine-tuning strategies [34, 35, 37, 42]. However, these approaches are criticized for their limitations in generating questions that necessitate multi-step reasoning [15]. Recent progress in large language models (LLMs), like ChatGPT [24], has garnered significant interest and demonstrated remarkable efficacy in numerous natural language processing (NLP) tasks through the use of prompts. Nevertheless, their potential and benefits in crafting educational questions, especially within mathematics, remain underinvestigated. In this work, we take the first step to conduct an in-depth analysis of the potential of applying ChatGPT in automatically generating pre-university math questions. We categorize our analysis into two main scenarios: (1) context-aware, where the model is given a context to generate math questions either with or without an expected answer, and (2) context-unaware, where the model generates math questions based solely on an instructional prompt. Under the context-aware setting, ChatGPT is evaluated on 3 math questionanswering benchmarks from elementary, secondary, and ternary classes respectively. In context-unaware scenarios, where no prior context is available, assessing ChatGPT is more challenging due to significant variations in model performance based on different instructional prompts. Nonetheless, this setting is more realistic and helpful since teachers may not have any contexts or stories beforehand to ask for generating math questions." 2312.01665v1,"Evaluation of flamelet-based models for liquid ammonia combustion in a temporally evolving mixing layer Zhenhua An, Jiangkuan Xing ∗ , Abhishek Lakshman Pillai, Ryoichi Kurose Department of Mechanical Engineering and Science, Kyoto University, Kyoto, daigaku-Katsura, Nishikyo-ku, Kyoto 615–8540, Japan Abstract Liquid ammonia combustion can be enhanced by co-firing with small molecular fuels such as methane, and liquid ammonia will undergo flash evaporation due to its relatively low saturation pressure. These characteristics, involving the presence of multiple fuel streams, a rapid phase change process, and strong heat loss, pose challenges for flamelet modeling of liquid ammonia combustion. To address these issues, this study aims to evaluate the effectiveness of flamelet-based models for liquid ammonia combustion in a turbulent mixing layer. Specifically, the extended flamelet/progress variable (E-FPV), extended flamelet-generated manifolds (E-FGM), and extended hybrid (E-Hybrid) models are developed and assessed. Firstly, a three-dimensional Point-Particle Direct Numerical Simulation (PP-DNS) with detailed chemistry is performed, where the turbulent flow is fully resolved, and the ammonia droplets are described by the Lagrangian method, to investigate the combustion characteristics of a liquid ammonia/methane co-fired flame and to provide state-of-the-art validation data for flamelet modeling. The PP-DNS results reveal distinct stages in the liquid ammonia/methane co-fired flame, namely, the mixing, methanedominated, and fully reacting stages. The phase change process introduces significant heat loss due to the high latent heat of liquid ammonia. Subsequently, flamelet-based models are developed to account for the complex fuel streams, rapid phase change process, and strong local heat loss. The performance of these models is evaluated through a priori analysis by comparing the predictions with the PP-DNS results. The a priori results show that the E-FGM model outperforms the E-FPV and E-Hybrid models. This superior performance can be attributed to the rapid flash evaporation and sufficient mixing of the superheated ammonia, resulting in the dominance of the premixed combustion mode in liquid ammonia combustion. Keywords: Liquid ammonia combustion; Point-Particle DNS; FPV; FGM; Hybrid model; Turbulent mixing layer *Corresponding author. E-mail address: xing.jiangkuan.6h@kyoto-u.ac.jp (JK. Xing). 1" 2312.01672v1,"STADEE: STA TISTICS - BASED DEE P D ETECTION OF M ACHINE G ENERATED T EXT ∗ Zheng Chen, Huming Liu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu, China 610054 zchen@uestc.edu.cn December 5, 2023 A BSTRACT The emergence of large-scale pre-trained language models (PLMs), such as ChatGPT, creates opportunities for malicious actors to disseminate disinformation, necessitating the development of automated techniques for detecting machine-generated content. However, current approaches, which predominantly rely on fine-tuning a PLM, face difficulties in identifying text beyond the scope of the detector’s training corpus. This is a typical situation in practical applications, as it is impossible for the training corpus to encompass every conceivable disinformation domain. To overcome these limitations, we introduce STADEE, a STAtistics-based DEEp detection method that integrates essential statistical features of text with a sequence-based deep classifier. We utilize various statistical features, such as the probability, rank, cumulative probability of each token, as well as the information entropy of the distribution at each position. Cumulative probability is especially significant, as it is explicitly designed for nucleus sampling, the most prevalent text generation algorithm currently. To assess the efficacy of our proposed technique, we employ and develop three distinct datasets covering various domains and models: HC3-Chinese, ChatGPT-CNews, and CPM-CNews. Based on these datasets, we establish three separate experimental configurations—namely, in-domain, out-of-domain, and in-the-wild—to evaluate the generalizability of our detectors. Experimental outcomes reveal that STADEE achieves an F1 score of 87.05% in the in-domain setting, a 9.28% improvement over conventional statistical methods. Furthermore, in both the out-of-domain and in-the-wild settings, STADEE not only surpasses traditional statistical methods but also demonstrates a 5.5% enhancement compared to fine-tuned PLMs. These findings underscore the generalizability of our STADEE in detecting machine-generated text. Keywords Detection of Machine-generated Text · Pre-trained Language Model · Statistical Features. 1 Introduction In recent years, there have been notable advancements in the field of natural language generation, particularly with the development of large-scale PLMs like ChatGPT [1] and GPT-4 [2]. The texts produced by these models are of such exceptional quality that it can be challenging for humans to discern them from those written by people. In fact, according to a technical report by OpenAI, the majority of texts generated by GPT-2 were already indistinguishable from those written by humans [3]. These PLMs have a broad range of applications, including story [4] and dialogue generation [5], as well as code writing [6]. Nonetheless, they can also be easily exploited by malicious actors to fabricate fake news [7, 8, 9] and comments [10] for personal profit or political interference, thereby posing a significant threat to society. Therefore, it is imperative to explore automatic methods for detecting machine-generated text to identify disinformation and mitigate the likelihood of abuse [11]. ∗ The Version of Record of this contribution is published in International Conference on Intelligent Computing 2023 and is available online at https://doi.org/10.1007/978-981-99-4752-2_60" 2312.01675v1,"Condensed Matter Physics ????, Vol. ?, No ?, ?????: 1–?? http://www.icmp.lviv.ua/journal On a previously unpublished work with Ralph Kenna Ralph Kenna 1 , Bertrand Berche 2 1 Centre for Fluids and Complex Systems, Coventry University, England and L4 collaboration, Leipzig-Lorraine-Lviv-Coventry, Europe 2 Laboratoire de Physique et Chimie Théoriques, CNRS - Université de Lorraine, UMR 7019, Nancy, France and L4 collaboration, Leipzig-Lorraine-Lviv-Coventry, Europe December 5, 2023 This is part of an unpublished work in collaboration with Ralph Kenna. It was probably not mature enough at the time it was submitted more than ten years ago and it was rejected by the editors, but some of the ideas have later been published partially in subsequent works. I believe that this “draft” reveals a lot about Ralph’s enthusiasm and audacity and deserves to be published now, maybe as a part of his legacy. Key words: universality, finite-size scaling, upper critical dimension My friend Ralph Kenna I am writing these words a few days after Ralph Kenna has passed away. Ralph was much more than a collaborator, he was my friend. We have had a long, fruitful, friendly, enriching scientific collaboration. His enthusiasm led him to produce new, original, and often revolutionary ideas. This is one of the elements of Ralph’s personality. This truly sealed our friendship, together with our conception of Physics and the views of the world that we shared, through strong social and political commitment. Our collaboration has left many ideas unresolved, drafts unpublished, some probably too daring and based on speculations that were too poorly supported. Still, I would like to submit to the editors of this journal one of these texts which dates from 2012, with Jean-Charles Walter as a third co-author. The paper was rejected by the Physical Review Letters, but I would like this article to be published, along with some of the critical comments made at the time by the referees, that led to its rejection by the famous APS journal. Photo, courtesy of Thierry Platini This is not to circumvent the work of the referees of PRL. The article included a hypothesis that was probably insufficiently supported, at least not enough to convince the referees, but it reflected much of the audacity of which Ralph was capable. Ralph has always been unwavering in his support for Ukraine, in particular since the Russian invasion. The publication of one of his bold scientific texts by a Ukrainian journal could be seen as a mutual, unfortunately, posthumous support. The unpublished paper I am writing these lines as if it were Ralph’s work alone. This allows me to pay tribute to the fact that I considered him the driving force behind our collaboration. We were very complementary in our way of working I believe. I sometimes held him back in speculations, and if I allowed myself © Ralph Kenna 1 , Bertrand Berche 2 ?????-1" 2312.01679v1,"IEEE TRANSACTIONS ON MEDICAL IMAGING, ACCEPTED 1 Adversarial Medical Image with Hierarchical Feature Hiding Qingsong Yao, Zecheng He, Yuexiang Li, Yi Lin, Kai Ma, Yefeng Zheng, Fellow, IEEE and S. Kevin Zhou, Fellow, IEEE Abstract— Deep learning based methods for medical images can be easily compromised by adversarial examples (AEs), posing a great security flaw in clinical decisionmaking. It has been discovered that conventional adversarial attacks like PGD which optimize the classification logits, are easy to distinguish in the feature space, resulting in accurate reactive defenses. To better understand this phenomenon and reassess the reliability of the reactive defenses for medical AEs, we thoroughly investigate the characteristic of conventional medical AEs. Specifically, we first theoretically prove that conventional adversarial attacks change the outputs by continuously optimizing vulnerable features in a fixed direction, thereby leading to outlier representations in the feature space. Then, a stress test is conducted to reveal the vulnerability of medical images, by comparing with natural images. Interestingly, this vulnerability is a double-edged sword, which can be exploited to hide AEs. We then propose a simple-yet-effective hierarchical feature constraint (HFC), a novel add-on to conventional white-box attacks, which assists to hide the adversarial feature in the target feature distribution. The proposed method is evaluated on three medical datasets, both 2D and 3D, with different modalities. The experimental results demonstrate the superiority of HFC, i.e., it bypasses an array of state-of-the-art adversarial medical AE detectors more efficiently than competing adaptive attacks 1 , which reveals the deficiencies of medical reactive defense and allows to develop more robust defenses in future. Index Terms— Security in Machine Learning, adversarial attacks and defense I. I NTRODUCTION D EEP neural networks (DNNs) are vulnerable to adversarial examples (AEs) [1], which are maliciously computed by adding human-imperceptible perturbations to clean images. Zhou is with School of Biomedical Engineering & Suzhou Institute for Advanced Research, University of Science and Technology of China and Institute of Computing Technology, Chinese Academy of Sciences. Zhou is the corresponding author. Email: skevinzhou@ustc.edu.cn Yao is with Institute of Computing Technology, Chinese Academy of Science. Email: yaoqingsong19@mails.ucas.edu.cn Li, Ma and Zheng are with Jarvis Research Center, Tencent YouTu Lab, Shenzhen, P.R. China. Emails: {vicyxli, kylekma, yefengzheng}@tencent.com Li is also with Medical AI ReSearch (MARS) Group, Guangxi Key Laboratory for Genomic and Personalized Medicine, Guangxi Medical University, Nanning, P.R. China. Lin is with the Department of Computer Science and Engineering, The Hong Kong University of Science and Technology. He is with Meta Reality Labs. Email: zechengh@princeton.edu 1 Our code is available at https://github.com/qsyao/ Hierarchical_Feature_Constraint. Clean BIM Adversarial Detector AEs-BIM Label: Pneumonia ResNet-50 Prediction Fig. 1. We craft adversarial examples by the state-of-the-art basic iterative method (BIM) [19] under a small constraint L ∞ = 1 to manipulate the medical diagnosis result. Then, we visualize the penultimate layer’s deep representations of the clean and adversarial examples by 2D t- SNE. Obviously, the adversarial feature lies in an outlier position that can be easily detected by adversarial detectors. Those AEs can compromise a network to generate the attackerdesired incorrect predictions [2]. Accordingly, the adversarial attack in medical imaging analysis [3] is disastrous. For example, the attacker can manipulate the diagnosis of patients in order to raise malicious competition between AI software vendors, threaten the patient’s health [4], and even cause public distrust of the DNN-based diagnosis system. More disturbingly, it has been investigated that medical DNNs [5- 7], including organ segmentation [8], disease diagnosis [9- 11], and landmark detection [12], are more vulnerable to adversarial attacks than those for natural images. Nevertheless, conventional medical AEs like PGD [13] which optimize the classification logits can be easily detected in the feature space [14]. In Fig. 1, we plot a 2D t-SNE [15] to illustrate the differences between adversarial and clean features from the penultimate layer of a well-trained pneumonia classifier [16]. It can be observed that adversarial attacks move the feature from the original clean distribution to extreme outlier positions. Therefore, reactive defenders [17] can easily make use of this characteristic for the identification of AEs [18]. Since the development process of adversarial attack and defense approaches is an alternate progress, stronger attacks inspire more robust defenses and vice versa, which will both" 2312.01692v1,"R ISK -C ONTROLLING M ODEL S ELECTION VIA G UIDED B AYESIAN O PTIMIZATION Bracha Laufer-Goldshtein 1∗ Adam Fisch 2 Regina Barzilay 2 Department of EE, Tel-Aviv University 2 CSAIL, MIT Tommi Jaakkola 2 1 A BSTRACT Adjustable hyperparameters of machine learning models typically impact various key trade-offs such as accuracy, fairness, robustness, or inference cost. Our goal in this paper is to find a configuration that adheres to user-specified limits on certain risks while being useful with respect to other conflicting metrics. We solve this by combining Bayesian Optimization (BO) with rigorous risk-controlling procedures, where our core idea is to steer BO towards an efficient testing strategy. Our BO method identifies a set of Pareto optimal configurations residing in a designated region of interest. The resulting candidates are statistically verified and the best-performing configuration is selected with guaranteed risk levels. We demonstrate the effectiveness of our approach on a range of tasks with multiple desiderata, including low error rates, equitable predictions, handling spurious correlations, managing rate and distortion in generative models, and reducing computational costs. 1 I NTRODUCTION Deploying machine learning models in the real-world requires balancing different performance aspects such as low error rate, equality in predictive decisions (Hardt et al., 2016; Pessach & Shmueli, 2022), robustness to spurious correlations (Sagawa et al., 2019; Yang et al., 2023), and model efficiency (Laskaridis et al., 2021; Menghani, 2023). In many cases, we can influence the model’s behavior favorably via sets of hyperparameters that determine the model configuration. However, selecting such a configuration that exactly meets user-defined requirements on test data is typically non-trivial, especially when considering a large number of objectives and configurations that are costly to assess (e.g., that require retraining large neural networks for new settings). Bayesian Optimization (BO) is widely used for efficiently selecting configurations of functions that require expensive evaluation, such as hyperparameters that govern the model architecture or influence the training procedure (Shahriari et al., 2015; Wang et al., 2022; Bischl et al., 2023). The basic concept is to substitute the costly function of interest with a cheap, and easily optimized, probabilistic surrogate model. This surrogate is used to select promising candidate configurations, while balancing exploration and exploitation. Beyond single-function optimization, BO has been extended to multiple objectives, where a set of Pareto optimal configurations that represent the best possible trade-offs is sought (Karl et al., 2022). It has also been extended to accommodate multiple inequality constraints (Gardner et al., 2014). Nevertheless, none of these mechanisms provide formal guarantees on model behavior at test time, and can suffer from unexpected fluctuations from the desired final performance (Letham et al., 2019; Feurer et al., 2023). Addressing configuration selection from a different prospective, Learn Then Test (LTT) (Angelopoulos et al., 2021) is a rigorous statistical testing framework for controlling multiple risk functions with distribution-free, finite-sample validity in a model-agnostic fashion. Although providing exact theoretical verification, it becomes practically challenging to apply this framework over large configuration spaces due to increased computational costs and loss of statistical power, resulting in the inability to identify useful configurations. These challenges were addressed in the recently proposed Pareto Testing method (Laufer-Goldshtein et al., 2023), which combines the complementary features of multi-objective optimization and statistical testing. The core idea is that multi-objective optimization can dramatically reduce the space of configurations to consider, ∗ Correspondence to blaufer@tauex.tau.ac.il 1" 2312.01695v1,"Quantitative Destruction of Lagrangian Torus Lin Wang School of Mathematics and Statistics, Beijing Institute of Technology, Beijing 100081, China. E-mail address: lwang@bit.edu.cn Abstract. Let P N be a trigonometric polynomial of degree N and satisfy ∥P N ∥ C r ≤ ε. If P N destroys the Lagrangian torus with the rotation vector ω of an integrable Hamiltonian system, then what are the relation among ε, N , r and the arithmetic property of ω? By addressing this, we provide quantitatively higher dimensional generalizations of the remarkable results on destruction of invariant circles for the area-preserving twist map by Herman [21] in 1983 and Mather [28] in 1988. Key words. Lagrangian tori, Hamiltonian systems, Trigonometric polynomials AMS subject classifications (2020). 37J40, 37E40 1. Introduction In 2013, C.-Q. Cheng and the author [12] constructed an example to show that: given an integrable Hamiltonian systems with d degrees (d ≥ 2) of freedom, each invariant Lagrangian torus can be destroyed by an arbitrarily small perturbation in the C r topology with r < 2d. That result is almost sharp due to the fact proved by Pöschel [32] (see also Salamon [34]): the KAM torus is preserved under an arbitrarily small perturbation in the C r topology with r > 2d. Loosely speaking, a KAM torus is a special kind of Lagrangian torus. To distinguish the dynamics on the Lagrangian torus and the KAM torus, let us recall their definitions. We use, once and for all, T d to denote a d-dimensional flat torus. Let H : T ∗ T d → R be a C r (r ≥ 2) Hamiltonian, and Φ tH : T ∗ T d → T ∗ T d be its flow. Definition 1.1 (KAM torus) T̄ d is called a d-dimensional KAM torus if • T̄ d is a graph over T d ; • T̄ d is invariant under the Hamiltonian flow Φ tH ; • there exists a diffeomorphism ϕ : T d → T̄ d such that ϕ −1 ◦ Φ tH ◦ ϕ = R ω t for any t ∈ R, where R ω t : x 7→ x + ωt and ω is called the rotation vector of T̄ d . The Lagrangian torus with the rotation vector ω is defined as follows. Definition 1.2 (Lagrangian torus) T d is a called a d-dimensional Lagrangian torus with the rotation vector ω if 1" 2312.01697v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Hulk: A Universal Knowledge Translator for Human-Centric Tasks Yizhou Wang*, Yixuan Wu*, Shixiang Tang, Weizhen He, Xun Guo, Feng Zhu, Lei Bai, Rui Zhao, Jian Wu, Member, IEEE, Tong He, Wanli Ouyang, Senior Member, IEEE COCO 2D Pose, AP RAPv2 Attribute, mA 85.3 35.6 77.1 CrowdHuman 59.2 Detection, 100 − MR 76.6 87.9 33.6 86.2 CUHK-PEDES Caption, B@4 32.9 −2 58.5 58.4 82.3 81.0 31.1 CrowdHuman 32.0 85.8 83.6 86.0 Detection, JI 84.0 3D Pose PA-100K Attribute, mA AIC 2D Pose, AP 77.5 CIHP 71.3 69.8 Parsing, mIoU 12.9 65.6 20.2 18.8 23.1 66.0 Human3.6M 68.6 Parsing, mIoU 60.5 31.0 46.2 52.8 65.5 63.9 64.0 LIP Parsing, mIoU 93.0 93.1 67.3 94.0 NTU60-XSub Skeleton action, Acc 68.1 3DPW Mesh, 100-MPVPE 33.0 3DPW 3D Pose, 100-MPJPE 57.0 60.1 52.9 56.4 Human3.6M 3DPW 3D Pose, 100-PA·MPJPE 3D Pose, 100-MPJPE Human3.6M 3D Pose, 100-PA·MPJPE Specialist SOTA MotionBERT UniHCP Hulk (Ours) Fig. 1: Left: Our proposed Hulk is a general human-centric perceiver that can tackle major 2D vision, 3D vision, skeleton-based, and vision language tasks using a unified framework. Right: Hulk pushes the limits on various human-centric tasks when compared with specialist models, pretraining models, e.g., MotionBERT [1], and existing generalist models, e.g., UniHCP [2]. Abstract—Human-centric perception tasks, e.g., human mesh recovery, pedestrian detection, skeleton-based action recognition, and pose estimation, have wide industrial applications, such as metaverse and sports analysis. There is a recent surge to develop human-centric foundation models that can benefit a broad range of human-centric perception tasks. While many human-centric foundation models have achieved success, most of them only excel in 2D vision tasks or require extensive fine-tuning for practical deployment in real-world scenarios. These limitations severely restrict their usability across various downstream tasks and situations. To tackle these problems, we present Hulk, the first multimodal human-centric generalist model, capable of addressing most of the mainstream tasks simultaneously without task-specific finetuning, covering 2D vision, 3D vision, skeleton-based, and vision-language tasks. The key to achieving this is condensing various task-specific heads into two general heads, one for discrete representations, e.g., languages, and the other for continuous representations, e.g., location coordinates. The outputs of two heads can be further stacked into four distinct input and output modalities. This uniform representation enables Hulk to treat humancentric tasks as modality translation, integrating knowledge across a wide range of tasks. To validate the effectiveness of our proposed method, we conduct comprehensive experiments on 11 benchmarks across 8 human-centric tasks. Experimental results surpass previous methods substantially, demonstrating the superiority of our proposed method. The code will be available on https://github.com/OpenGVLab/HumanBench. Index Terms—Computer Vision, Human-centric Perception, Foundation Models, Multimodal Learning, Multitask Learning. I. I NTRODUCTION R ECENT years have witnessed increasing research attention to human-centric tasks, e.g., person reidentification [3]–[6], pose estimation [7]–[10], and human mesh recovery [1], [11], due to their widespread applications, including sports analysis [12]–[14], surveillance [15]–[18], augmented reality [19]–[21], and video production [22]–[24]. Most of the previous methods have typically emphasized unique designs tailored for individual tasks, involving heavy work for task-specific design, fine-tuning, and deployment. This lack of flexibility and adaptability constrained their applications in real-world scenarios, where multiple tasks are related and need to be addressed using a single model. To this end, some works have explored learning general representative encoders, also known as human-centric foundation Yizhou Wang and Yixuan Wu are contributed equally. This work was done when Yixuan Wu, Xun Guo were interns at Shanghai AI Laboratory, Shanghai, China. Yixuan Wu is with the School of Medicine, Zhejiang University, Hangzhou, 310027, China. Weizhen He is with the College of Electrical Engineering, Zhejiang University, Hangzhou, 310027, China. Xun Guo is with the Department of Automation, University of Science and Technology of China, Hefei, 230052, China. Shixiang Tang is with the School of Electrical and Information Engineering, University of Sydney, NSW, Australia. Feng Zhu and Rui Zhao are with SenseTime Group Limited, China. Jian Wu is with School of Public Health, Zhejiang University, Hangzhou, 310058, China. Yizhou Wang, Lei Bai, Tong He, and Wanli Ouyang are with Shanghai AI Laboratory, Shanghai, 200232, China." 2312.01714v1,"Retrieval-augmented Multi-modal Chain-of-Thoughts Reasoning for Large Language Models Bingshuai Liu ∗ Xiamen University bsliu@stu.xmu.edu.cn Chenyang Lyu ∗ MBZUAI chenyang.lyu@mbzuai.ac.ae Zhanyu Wang Tencent AI Lab zhanyuwang@tencent.com Jinsong Su † Xiamen University jssu@xmu.edu.cn Zijun Min Xiamen University minzijun@stu.xmu.edu.cn Longyue Wang Tencent AI Lab vinnylywang@tencent.com Abstract The advancement of Large Language Models (LLMs) has brought substantial attention to the Chain of Thought (CoT) approach Wei et al. [2022a], primarily due to its ability to enhance the capability of LLMs on tasks requiring complex reasoning. Moreover, the significance of CoT approaches extends to the application of LLMs for multi-modal tasks, such as multi-modal question answering. However, the selection of optimal CoT demonstration examples in multi-modal reasoning for LLMs remains less explored for LLMs due to the inherent complexity of multi-modal examples. In this paper, we introduce a novel approach that addresses this challenge by using retrieval mechanisms to dynamically and automatically select demonstration examples based on cross-modal similarities. This method aims to refine the CoT reasoning process in multi-modal scenarios via informing LLMs with more relevant and informative examples. Furthermore, we employ a stratified sampling method categorising demonstration examples into groups based on their types and retrieving examples from different groups respectively to promote the diversity of demonstration examples. Through a series of experiments, we demonstrate that our approach significantly improves the performance of LLMs, achieving state-of-the-art results in multi-modal reasoning tasks. Specifically, our methods demonstrate significant advancements on the ScienceQA dataset. While our method based on ChatGPT outperforms the Chameleon (ChatGPT) by 2.74% with an accuracy of 82.67%, the GPT4-based approach surpasses the Chameleon (GPT-4) by 0.89%, achieving 87.43% on accuracy under the same setting. Moreover, our best performing show a 6.05% increase over Chameleon for ChatGPT-based models and a 4.57% increase for GPT-4-based models. Additionally, we present an early in-depth evaluation of GPT-4V on the ScienceQA dataset, with results indicating that GPT-4V’s zero-shot capabilities significantly surpass those of its text-only counterpart, demonstrating the effectiveness of the GPT-4V system and the importance of the incorporation of visual context. 1 Introduction The field of Natural Language Processing (NLP) has experienced significant advancements due to the emergence of Large Language Models (LLMs), which have reshaped the landscape of many tasks for ∗ † These authors contributed equally to this work. Corresponding author. Preprint (work in progress)." 2312.01719v1,"Unidirectional Nano-Modulated Binding and Electron Scattering in Epitaxial Borophene Sherif Kamal, 1 Insung Seo, 2 Pantelis Bampoulis, 3, 4 Matteo Jugovac, 5 Carlo Alberto Brondin, 6 Tevfik Onur Menteş, 5 Iva Šarić Janković, 7 Andrey V. Matetskiy, 8 Paolo Moras, 8 Polina M. Sheverdyaeva, 8 Thomas Michely, 4 Andrea Locatelli, 5 Yoshihiro Gohda, 2 Marko Kralj, 1 and Marin Petrović 1, ∗ 1 Centre for Advanced Laser Techniques, Institute of Physics, 10000 Zagreb, Croatia 2 Department of Materials Science and Engineering, Tokyo Institute of Technology, Yokohama 226-8502, Japan 3 Physics of Interfaces and Nanomaterials, MESA+ Institute, University of Twente, 7522 NB, Enschede, The Netherlands 4 Institute of Physics II, University of Cologne, 50937 Cologne, Germany 5 Elettra - Sincrotrone Trieste S.C.p.A., S.S. 14 km 163.5, 34149 Trieste, Italy 6 Department of Molecular Sciences and Nanosystems, Ca’ Foscari University of Venice, 30172 Venice, Italy 7 Faculty of Physics and Center for Micro- and Nanosciences and Technologies, University of Rijeka, 51000 Rijeka, Croatia 8 Istituto di Struttura della Materia-CNR (ISM-CNR), S.S. 14 km 163.5, 34149, Trieste, Italy A complex interplay between the crystal structure and electron behavior within borophene renders this material an intriguing 2D system with many of its electronic properties still undiscovered. Experimental insight into those properties is additionally hampered by the limited capabilities of the established synthesis methods, which in turn inhibits the realization of potential borophene applications. In this multi-method study, photoemission spectroscopies and scanning probe techniques complemented by theoretical calculations have been used to investigate the electronic characteristics of a high-coverage, single-layer borophene on Ir(111) substrate. Our results show that the binding of borophene to Ir(111) exhibits pronounced one-dimensional modulation and transforms borophene into a nano-grating. The scattering of photoelectrons from this structural grating gives rise to the replication of electronic bands. In addition, the binding modulation is reflected in the chemical reactivity of borophene and gives rise to its inhomogeneous aging effect. Such aging is easily reset by dissolving boron atoms in iridium at high temperature followed by their reassembly into a fresh atomically-thin borophene mesh. Besides proving electron-grating capabilities of the boron monolayer, our data provides a comprehensive insight into the electronic properties of epitaxial borophene which is vital for further examination of other boron systems of reduced dimensionality. I. INTRODUCTION Synthesis of various borophene (Bo) polymorphs on a range of different substrates [1] opened new pathways for investigation of these atomically-thin boron systems. In order to attain precise control over the synthesis, growth of Bo is typically carried out in ultra-high vacuum (UHV) conditions on metallic single-crystals. In such way, epitaxial Bo has been realized on Ag, Cu, Ir, Au, Al and Ru substrates [2–7]. Epitaxial growth holds potential for high sample quality – in terms of size, number of defects and structural homogeneity – which is often an imperative for investigation of intrinsic properties of Bo. Also, high material quality is required for various technological applications of Bo, such as metal-ion batteries [8, 9], supercapacitors [10], hydrogen storage [11], gas sensors [12] and freshwater production [13]. However, binding to the metal substrate is reflected in the structural and physical properties of epitaxial Bo. Interaction of Bo with the underlying metal not only defines the most stable polymorph [14], but can also induce new morphology in the form of stripes, chains and zig-zag ∗ mpetrovic@ifs.hr arrays which are identified as the moiré patterns in some cases [2, 3, 5, 15, 16]. All these nanoscopic structures are in turn linked to the electronic and vibrational properties of Bo, and are expected to perturb intrinsic features of Bo such as high electrical and thermal conductivity [17, 18]. Signatures of nano-modulation in other epitaxial two-dimensional (2D) systems can readily be found in the spectroscopic data, namely the valence band and the core-level electronic structure. Examples of this are Dirac cone replication of graphene on Ir(111) [19] or distinct peaks in the N 1s spectra of hexagonal boron nitride (hBN) on transition metals [20]. However, experimental detection of similar signatures in Bo samples is only scarcely addressed in the literature. In particular, studies employing angle-resolved photoemission spectroscopy (ARPES), the best tool for studying the valence band structure of materials, are largely lacking. ARPES has been employed in only a few Bo investigations due to the experimental challenges arising from the sample inhomogeneity (e.g. presence of several polymorphs, small domains, defects) and significant chemical reactivity of Bo. Up to now, only β 12 and χ 3 polymorphs on Ag(111) have been examined with ARPES by Feng and co-workers, where metallicity and the existence of the Dirac cones have been suggested [21–" 2312.01728v1,"JOURNAL OF L A TEX CLASS FILES, VOL. XX, NO. X, XXX 2024 1 ImputeFormer: Graph Transformers for Generalizable Spatiotemporal Imputation Tong Nie § , Guoyang Qin, Yuewen Mei, and Jian Sun ∗ Abstract—This paper focuses on the multivariate time series imputation problem using deep neural architectures. The ubiquitous issue of missing data in both scientific and engineering tasks necessitates the development of an effective and general imputation model. Leveraging the wisdom and expertise garnered from low-rank imputation methods, we power the canonical Transformers with three key knowledge-driven enhancements, including projected temporal attention, global adaptive graph convolution, and Fourier imputation loss. These task-agnostic inductive biases exploit the inherent structures of incomplete time series, and thus make our model versatile for a variety of imputation problems. We demonstrate its superiority in terms of accuracy, efficiency, and flexibility on heterogeneous datasets, including traffic speed, traffic volume, solar energy, smart metering, and air quality. Comprehensive case studies are performed to further strengthen the interpretability. Promising empirical results provide strong conviction that incorporating time series primitives, such as low-rank properties, can substantially facilitate the development of a generalizable model to approach a wide range of spatiotemporal imputation problems. Index Terms—Graph Transformers, Data Imputation, Spatiotemporal Modeling, Time Series, Graph Neural Networks. ✦ 1 I NTRODUCTION M ISSING data is a frequent occurrence in modern detection systems. Sparse observations or measurements pose significant challenges for decision-makers in implementing well-developed, data-driven models for managing and optimizing systems. This issue is particularly prominent in traffic monitoring systems, where the quality of measured data is susceptible to a variety of factors such as adverse weather, energy supply, sensor service time, and light condition [1], [2], [3]. The well-known Performance Measurement System (PeMS) in California, USA [4] suffers from detection errors that cause a large proportion (nearly 40% ) of measurements to become invalid or missing. This issue prompts practitioners to develop advanced models that can fuse available information from limited observations to impute those missing values. To achieve this goal, extensive research has contributed to machine learning methods for application purposes, especially in transportation research [1], [2], [3], [5], [6], [7], [8], [9], [10]. Generally, there exist two research paradigms towards missing data imputation. The first belongs to the low-rank and lowdimensional models, such as [5], [8], [10], [11], [12]. This kind of model typically assumes a well-structured matrix or tensor structure for the data studied. Since the algebraic structures of the matrix or tensor manifold can provide guidance in reconstructing the data [13], it is becoming a simple yet effective method for handling incomplete measurements. However, limited model expressivity hinders • • • The authors are with the Department of Traffic Engineering and Key Laboratory of Road and Traffic Engineering, Ministry of Education, Tongji University. Shanghai, China. 201804. E-mail: { nietong, 2015qgy, meiyuewen, sunjian } @tongji.edu.cn. Corresponding author: Jian Sun. § The code will be open-sourced upon publication. the capture of complex patterns such as nonlinearity and nonstationary, thus being less competitive in reality. Another dominating direction is deep imputation models. By learning the dynamics of the data-generating process, deep learning-based imputation models have demonstrated great potential and surpass analytical methods [14], [15], [16], [17], [18], [19]. Among these achievements, Transformer-based architectures stand out for their generative output, which can produce imputations more efficiently than autoregressive-based models [17], [18], [20]. Despite the success of neural imputation models on several benchmarks, there are still some remaining problems that need to be fully addressed. First, data-intensive models require a large quantity of observed data to train, and therefore are rendered inadequate in the presence of low-quality training data. Unfortunately, it is challenging for real-world sensor systems to provide a desirable data condition. For example, GPS records in the ride-sharing system are extremely sparse [21]. Second, intricate model structures such as probabilistic diffusion and bidirectional recurrence can consume a substantial amount of computational memory and resources, making them less efficient for real-time deployment. Third, without the guidance of physics or data structures, bruteforce training methods are prone to overfit the training data and perform poorly when applied to tasks from different domains or shifted distributions. Therefore, a robust, efficient, and generalizable deep imputation model is needed. From a technical perspective, these two types of models can complement each other. Matrix- and tensor-based analytical models provide general prior knowledge of spatiotemporal data, such as the low-rank and sparsity nature. While deep learning models have demonstrated impressive representation learning powers. From an application perspective, real-world scenarios prioritize a universal and transferable model capable of approaching various imputation problems, such as coping with cross-domain datasets," 2312.01729v1,"EdgeConvFormer: Dynamic Graph CNN and Transformer based Anomaly Detection in Multivariate Time Series Jie Liu a , Qilin Li a,∗ , Senjian An a , Bradley Ezard a and Ling Li a,∗ a School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, WA 6102, Australia ARTICLE INFO ABSTRACT Keywords: Multivariate Time Series Anomaly Detection Graph CNN Transformer Transformer-based models for anomaly detection in multivariate time series can benefit from the self-attention mechanism due to its advantage in modeling long-term dependencies. However, Transformer-based anomaly detection models have problems such as a large amount of data being required for training, standard positional encoding is not suitable for multivariate time series data, and the interdependence between time series is not considered. To address these limitations, we propose a novel anomaly detection method, named EdgeConvFormer, which integrates Time2vec embedding, stacked dynamic graph CNN, and Transformer to extract global and local spatialtime information. This design of EdgeConvFormer empowers it with decomposition capacities for complex time series, progressive spatiotemporal correlation discovery between time series, and representation aggregation of multi-scale features. Experiments demonstrate that EdgeConvFormer can learn the spatial-temporal correlations from multivariate time series data and achieve better anomaly detection performance than the state-of-art approaches on many real-world datasets of different scales. 1. Introduction In the modern manufacturing industry and engineering services, a large number of sensors are deployed to monitor the status and behaviors of many complex systems, generating large amounts of multivariate time series data. A critical task in managing such systems is to detect anomalies and ideally to localize the root cause of the anomalies so that the underlying issues can be resolved in a timely manner. Time series data can be divided into univariate and multivariate time series. Univariate time series is the time series of a single variable without considering the influence of other variables. Multivariate time series are time series composed of multiple time-related variables where each variable not only depends on its past value but also on other variables. Complex systems are usually high-dimensional, of varying lengths, and interdependent among variables. The multiple variables in a multivariate time series often have a dynamic and cooperative relationship, reflecting the status of complex entities such as network services and large industrial equipment [1]. ∗ Corresponding author E-mail addresses: l.li@curtin.edu.au (L. Li), qilin.li@curtin.edu.au (Q. Li) Jie Liu et al.: Preprint submitted to Elsevier Page 1 of 32" 2312.01731v1,"Survival of magnetic- correlations above ordering temperature in a ferromagnetically ordered classical kagomé magnet: Li 9 Cr 3 (P 2 O 7 ) 3 (PO 4 ) 2 R. Kumar, 1, ∗ A. Chakraborty, 2, 3 S. Fukuoka, 1 F. Damay, 4 E. Kermarrec, 5 P. L. Paulose, 6, † and Y. Ihara 1, ‡ 1 Department of Physics, Faculty of Science, Hokkaido University, Sapporo 060-0810, Japan 2 Department of Physics, Indian Institute of Technology Kanpur, India 3 Institute of Physics, Johannes Gutenberg University, Mainz, Germany 4 Laboratoire Léon Brillouin, Université Paris-Saclay, CNRS, CEA, CE-Saclay, F-91191 Gif-sur-Yvette, France 5 Université Paris Saclay, CNRS, Laboratoire de Physique des Solides, 91405 Orsay, France 6 Department of Condensed Matter Physics and Material Sciences, Tata Institute of Fundamental Research, Colaba, Mumbai - 400005 (India) (Dated: December 5, 2023) Abstract Motivated by the recent discovery of a semiclassical nematic spin liquid state in a Heisenberg kagomé antiferromagnet Li 9 Fe 3 (P 2 O 7 ) 3 (PO 4 ) 2 (LFPO) with S=5/2 [Kermarrec et al. Phys. Rev. Lett. 127, 157202 (2021)], we now investigate the impact of spin quantum number S on the ground state properties by studying the isostructural kagomé magnet Li 9 Cr 3 (P 2 O 7 ) 3 (PO 4 ) 2 (LCPO) with active t 2g orbitals and S = 3/2. Thermodynamic measurements reveal that the ground state properties of LCPO is dominated by the ferromagnetic interactions with a mean - field temperature Θ ∼ 3 K (J < 1 K) and the ordering temperature, T c ~ 2.7 K, and the size of the ordered moment ~ 1.05 ± 0.25 µ B is significantly reduced from that of a fully ordered moment. The ab initio electronic structure calculations nicely corroborate the thermodynamic results and suggest the presence of additional in and out-of-plane further neighbor antiferromagnetic couplings, though significantly weaker in comparison to the dominant first-nearest neighbor ferromagnetic coupling. The spin-lattice relaxation rate measured with fields larger than the saturation field shows a magnetic field induced gap (∆ ∝ B) in the excitation spectrum, and in B→ 0 limit the gap has a finite intercept ~ 3 K, equivalent to the mean-field scale. We interpret the origin of this gap is associated with the magnetic interactions inherent to the material. With our experimental results, we establish the stabilization of a ferromagnetic like ground state and the persistence of magnetic-correlations above the ordering temperature in LCPO. PACS numbers: I. state [16] or a resonating Affleck-Kennedy-Lieb-Tasaki loop (RAL) [17, 18] state in the context of S = 1 kagomé Heisenberg Antiferromagnet (KHAF), the appearance of magnetic field induced nematic and supernematic phases in S = 1 and S = 2 kagomé antiferromagnets [19], a highly debated ground state of a S = 3/2 kagomé material, SrCr 9p Ga 12−9p O 19 , ranging from a spin glass, spin liquid to a topological glass [20–27], and the presence of a one-third magnetization plateau in a S = 5/2 KHAF under higher magnetic fields [15], to name a few. INTRODUCTION The kagomé lattice with antiferromagnetic interactions has the distinction of being a highly frustrated lattice in two-dimensional (2D) that defies the Néel order and hosts a highly dynamic state of moments (spin liquid with emergent excitations). [1, 2] On the other hand, a kagomé lattice with ferromagnetic interactions does not manifest a classical/quantum spin liquid state, but rather stabilizes a purely ferromagnetic (FM) ground state. [3] Chisnell et al. [4] has demonstrated that the insulating kagomé ferromagnet has the potential to host topological properties such as the topological magnon bands as well as a bulk magnon Hall effect [5]. We have been investigating a family of kagomé materials with chemical formula Li 9 M 3 (P 2 O 7 ) 3 (PO 4 ) 2 [28] and recently some of us discovered a classical spin liquid state in the temperature range T N (1.3 K) ≤ T ≤ Θ (11 K), and the signature of a one-third plateau in magnetization of the Fe 3+ (S = 5/2) based compound Li 9 Fe 3 (P 2 O 7 ) 3 (PO 4 ) 2 (LFPO) [15]. The structure is highly flexible and can accommodate a variety of magnetic ions M [ = V 3+ (S = 1), Cr 3+ (S = 3/2) and Fe 3+ (S = 5/2)] and nonmagnetic ions M [ = Al 3+ and Ga 3+ ] while keeping the trigonal symmetry preserved. The material with quantum number S = 1, i.e., Li 9 V 3 (P 2 O 7 ) 3 (PO 4 ) 2 is found to exhibit the signature of ferromagnetic fluctuations in its ground state and this material could be a potential candidate to stabilize some of the competing magnetic phases by perturbing the local energy scale [29–33]. All in all, this family offers a greater tunability to the ground state properties While the low - spin quantum number S = 1/2 based kagomé materials have been the primary choice of researchers and were thoroughly studied in quest of discovering a spin-liquid state [1–3, 6–8], the materials with S > 1/2 are relatively less explored, but at the same time are equally interesting and promising to look for some uncharted phases of quantum magnetism [9–15]. For example, be it the idea of a hexagonal-singlet solid ∗ Electronic address: photon1900@gmail.com † Electronic address: paulose@tifr.res.in ‡ Electronic address: yihara@phys.sci.hokudai.ac.jp 1" 2312.01735v1,"Weighted Q-learning for optimal dynamic treatment regimes with MNAR coavriates Jian Sun ∗ , Li Su † , and Bo Fu ‡ Abstract Dynamic treatment regimes (DTRs) formalize medical decision-making as a se- quence of rules for different stages, mapping patient-level information to recommended treatments. In practice, estimating an optimal DTR using observational data from electronic medical record (EMR) databases can be complicated by covariates that are missing not at random (MNAR) due to informative monitoring of patients. Since com- plete case analysis can result in consistent estimation of outcome model parameters un- der the assumption of outcome-independent missingness (Yang et al., 2019), Q-learning is a natural approach to accommodating MNAR covariates. However, the backward induction algorithm used in Q-learning can introduce complications, as MNAR covari- ates at later stages can result in MNAR pseudo-outcomes at earlier stages, leading to suboptimal DTRs, even if outcome variables are fully observed. To address this unique missing data problem in DTR settings, we propose two weighted Q-learning ap- proaches where inverse probability weights for missingness of the pseudo-outcomes are obtained through estimating equations with valid nonresponse instrumental variables or sensitivity analysis. Asymptotic properties of the weighted Q-learning estimators ∗ School of Data Science, Fudan University, Shanghai 200433, China. Email: jsun19@fudan.edu.cn. MRC Biostatistics Unit, University of Cambridge, Cambridge, CB2 0SR, UK. Email: li.su@mrcbsu.cam.ac.uk. ‡ School of Data Science, Fudan University, Shanghai 200433, China. Email: fu@fudan.edu.cn. † 1" 2312.01743v1,"Superconformal interacting particles Roberto Casalbuoni ∗ and Daniele Dominici † Department of Physics and Astronomy, University of Florence and INFN, Florence, Italy Joaquim Gomis ‡ Departament d’Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat de Barcelona, Diagonal 647, 08028 Barcelona, Spain The free massless superparticle is reanalysed, in particular by performing the Gupta-Bleuler quantization, using the first and second class constraints of the model, and obtaining, as a result, the Weyl equation for the spinorial component of the chiral superfield. Then we construct a superconformal model of two interacting massless superparticles from the free case by the introduction of an invariant interaction. The interaction introduces an effective mass for each particle by modifying the structure of fermionic constraints, all becoming second class. The quantization of the model produces a bilocal chiral superfield. We also generalise the model by considering a system of superconformal interacting particles and its continuum limit. PACS numbers: 11.25.Hf, 11.30.-j, 11.10.Ef, 03.30.+p I. INTRODUCTION The application of conformal invariance to classical interacting relativistic particles has recently been studied [1, 2]. The motivation was to generalise the non-relativistic one- dimensional case, as for example the Calogero-Moser rational model [3–5], which describes N interacting particles via two body interactions. This model is very important in the context of integrable models. The other example, always in one dimension, is the conformal ∗ Electronic address: casalbuoni@fi.infn.it † Electronic address: dominici@fi.infn.it Electronic address: joaquim.gomis@ub.edu ‡" 2312.01746v1,"O PEN -DDVM: A R EPRODUCTION AND E XTENSION OF D IFFUSION M ODEL FOR O PTICAL F LOW E STIMATION Qiaole Dong School of Data Science, Fudan University qldong18@fudan.edu.cn Bo Zhao Beijing Academy of Artificial Intelligence zhaobo@baai.ac.cn Yanwei Fu School of Data Science, Fudan University yanweifu@fudan.edu.cn A BSTRACT Recently, Google proposes DDVM [14] which for the first time demonstrates that a general diffusion model for image-to-image translation task works impressively well on optical flow estimation task without any specific designs like RAFT [20]. However, DDVM is still a closed-source model with the expensive and private Palette-style pretraining. In this technical report, we present the first open-source DDVM by reproducing it. We study several design choices and find those important ones. By training on 40k public data with 4 GPUs, our reproduction achieves comparable performance to the closed-source DDVM. The code and model have been released in https://github.com/ DQiaole/FlowDiffusion_pytorch. 1 Introduction Optical flow is a fundamental modality in computer vision, which provides key information for various real-world applications, e.g., video frame interpolation [8], video inpainting [3], and action recognition [19]. Optical flow estimation aims to estimate a per-pixel displacement vector field between two consecutive video frames. Previous optical flow estimation methods [9, 23, 18, 2, 7] have achieved remarkable progress based on the successful architecture of Recurrent All-Pairs Field Transforms (RAFT) [20], which iteratively updates a flow field with GRU-based operator. Recently, denoising diffusion probabilistic models [6] have emerged as novel method for distribution modelling. Saxen et al. for the first time apply diffusion model for optical flow estimation and achieve impressively good performance as introduced in DDVM [14]. DDVM [14] takes a noisy version of the optical flow as input and concatenates two RGB images as the condition. It employs the Efficient U-Net [13] architecture to predict the noise-free estimation of the 2-channel optical flow, with the training loss penalizing residual error in the denoised map. Besides, to train a generic diffusion model for optical flow estimation without task-specific inductive biases, DDVM utilizes massively synthetic datasets, including AutoFlow [16], FlyingThings3D [10], TartanAir [22], and Kubric [5]. Additionally, DDVM requires a Palette-style [12] pretraining on huge image datasets. During inference, it employs a strategy called coarse-to-fine for high-resolution input, which refines the noised estimation in a patch-wise manner based on coarse results from resized low-resolution images. For more details about DDVM, please refer to the original paper [14]. As mentioned above, training a generic diffusion model for optical flow estimation without task-specific inductive biases necessitates massive synthetic datasets and a longer training process. In this paper, we make a preliminary study and propose to take advantage of multi-scale correlation volume as a prior for optical flow estimation inspired by classic work [20]. As shown in Fig. 1, we first extract the feature for two input images on 1/8 resolution by a simple ResNet. We then construct a 4-layer multi-scale correlation volume through matrix multiplication and average pooling. We also perform lookups operation defined in RAFT [20] on the 4D correlation volume with the current noised flow, which results in a single feature map containing all local correlation information. Our U-Net accepts both 8-channel tensors (two 3-channel RGB images and one 2-channel noised flow) and the correlation feature as input. Specifically, the" 2312.01747v1,"1 Autonomous and Adaptive Role Selection for Multi-robot Collaborative Area Search Based on Deep Reinforcement Learning Index Terms—Deep reinforcement learning, Area search, Collaborative decision-making, Multi-robot systems. I. I NTRODUCTION M ULTI-ROBOT area search remains a fundamental problem in robotics due to its widespread applications such as Mars exploration [1], disaster response [2], and urban search and rescue [3], [4]. Unlike single-robot systems, multi-robot systems offer significant advantages, leveraging cooperation among the robots for enhanced task efficiency and resilient decision-making, particularly in time-critical tasks. This entails the robots performing collaborative mapping (exploration) while simultaneously searching for the targets (coverage). In the decision-making process, the robots need to 1) sense the environment to gather more information about targets, 2) rescue targets, and 3) coordinate among multi-robots to maximize the number of rescued targets in the explored area within the limited timesteps. Here, our focus is on integrating the role concept in the multi-robot area search problems, which decouples upper-level task planning from the low-level task execution. The more intuitive way to address sophisticated tasks is to decompose them as small and simple sub-tasks. Therefore, many researchers divided the area search problem into two Lina Zhu and Yuehu Liu are with the Institute of Artificial Intelligence and Robotics, Xi’an Jiaotong University, Xi’an, China, 710049 (e-mail: Zhulina@stu.xjtu.edu.cn; liuyh@xjtu.edu.cn). Zhichao Cui is with the School of Electronics and Control Engineering, Chang’an University, Xi’an, China, 710064 (e-mail: cui.zhichao@chd.edu.cn). Jiyu Cheng, Hao Zhang, and Wei Zhang are with the School of Control Science and Engineering, Shandong University, Shandong, China, 250061 (email: 202114807@mail.sdu.edu.cn; {jycheng, davidzhang}@sdu.edu.cn). (Corresponding author: Jiyu Cheng.) Task planning Task Execution ×N Role Switching R 2 R 1 Primitive policy Role-selection 𝑎 ! ! 𝑎 ! "" ⋮ ⋮ ×T 𝑎 ! # ⋮ Abstract—In the tasks of multi-robot collaborative area search, we propose the unified approach for simultaneous mapping for sensing more targets (exploration) while searching and locating the targets (coverage). Specifically, we implement a hierarchical multi-agent reinforcement learning algorithm to decouple task planning from task execution. The role concept is integrated into the upper-level task planning for role selection, which enables robots to learn the role based on the state status from the upperview. Besides, an intelligent role switching mechanism enables the role selection module to function between two timesteps, promoting both exploration and coverage interchangeably. Then the primitive policy learns how to plan based on their assigned roles and local observation for sub-task execution. The welldesigned experiments show the scalability and generalization of our method compared with state-of-the-art approaches in the scenes with varying complexity and number of robots. ×N 𝜌 ! ! 𝜌 ! "" ⋮ Lina Zhu, Jiyu Cheng, Hao Zhang, Zhichao Cui, Wei Zhang, Senior Member, IEEE, and Yuehu Liu 𝜌 ! # R 2 R 1 R 1 R 2 Role policy environment Fig. 1. Overview of our method. Our approach involves the separation of training phases for task planning and execution. Task planning utilized a roleselection module, allowing the robot to learn its role from the upper-view. The implementation of role selection between different timesteps is enabled through the role switching mechanism. distinguishing sub-tasks: exploration and coverage, which are resolved in two distinct phases. In these approaches, the robots first select a sub-area generated by the cellular decomposition algorithm (e.g. Voronoi partition [5]) to explore, and then the robot sweeps the entire sub-area along a planned path calculated by the coverage path planning methods [6] for coverage. However, addressing exploration and coverage tasks separately may lead to sub-optimal solutions and increased computational cost, consequently limiting overall task performance. A unified approach is expected to be studied to maximize resource utilization, improve efficiency, and achieve an optimal solution. Approaching the aforementioned challenge as a combinatorial optimization problem, the unified approach addresses the exploration and coverage simultaneously [7], [8]. They discretized the exploration and coverage problem to induce a graph-represented environment and achieved the simultaneous execution of both sub-tasks by learning the spatial relationship between the sub-tasks and the robots. The above complete unified approaches improve the decision-making capability, but the coupling of task planning and task execution often escalates training complexity. Aiming at reducing the training complexity and realizing explicit cooperation among the robots, decoupling task planning from task execution provides a promising way of integrating upper-level decision-making planners. An advanced comprehension for planning complex" 2312.01766v1,"On the stability of fractional Sobolev trace inequality and corresponding profile decomposition ∗ Yingfang Zhang, Yuxuan Zhou and Wenming Zou Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China. Abstract In this paper, we study the stability of fractional Sobolev trace inequality within both the functional and critical point settings. In the functional setting, we establish the following sharp estimate: C BE (n, m, α) 2 inf v∈M n,m,α 2 2 kf − vk D α (R n ) ≤ kf k D α (R n ) − S(n, m, α)kτ m f k L q (R n−m ) , 2(n−m) n where 0 ≤ m < n, m 2 < α < 2 , q = n−2α and M n,m,α denotes the manifold of extremal functions. Additionally, We find an explicit bound for the stability constant C BE . Furthermore, we establish a compactness result ensuring the existence of minimizers for the Bianchi-Egnell type functional: 2 2 S Tr (f ) := kf k D α − S(n, m, α)kτ m f k L q 2 inf v∈M n,m,α kf − vk D α , for f ∈ D α (R n )\M n,m,α . Our stability results extend previous works on the Escobar trace inequality and fractional Sobolev inequality. As a corollary, we derive some improved trace inequalities for functions supported in general domains. Applying a standard dual scheme, we also obtain a sharp a priori estimate for Neumann problem on the half-space. In the critical point setting, we investigate the validity of a sharp quantitative profile decomposition related to the Escobar trace inequality and establish a qualitative profile decomposition for the critical elliptic equation ( ∆u = 0 in R n + 2 ∂u n−2 u on ∂R n + . ∂t = −|u| We then derive the sharp stability estimate: 2 C CP (n, ν)d(u, M ν E ) ≤ ∆u + |u| n−2 u H −1 (R n + ) , where ν = 1, n ≥ 3 or ν ≥ 2, n = 3 and M ν E represents the manifold consisting of ν weakinteracting Escobar bubbles. Through some refined estimates, we also give a strict upper 2 . bound for C CP (n, 1), which is n+2 ∗ Supported NSFC(No.12171265,11025106). E-mail addresses: zhangyf22@mails.tsinghua.edu.cn (Zhang), zhou-yx22@mails.tsinghua.edu.cn(Zhou), zou-wm@mail.tsinghua.edu.cn (Zou) 1" 2312.01784v1,"Classification of positive solutions to the Hénon-Sobolev critical systems ∗ Yuxuan Zhou, Wenming Zou Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China. Abstract In this paper, we investigate positive solutions to the following Hénon-Sobolev critical system:  −2a  ∇u) = |x| −bp |u| p−2 u + να|x| −bp |u| α−2 |v| β u in R n  − div(|x| − div(|x| −2a ∇v) = |x| −bp |v| p−2 v + νβ|x| −bp |u| α |v| β−2 v in R n   u, v ∈ D a 1,2 (R n ) 2n where n ≥ 3, −∞ < a < n−2 2 , a ≤ b < a + 1, p = n−2+2(b−a) , ν > 0 and α > 1, β > 1 satisfying α + β = p. Our findings are divided into two parts, according to the sign of the parameter a. For a ≥ 0, we demonstrate that any positive solution (u, v) is synchronized, indicating that u and v are constant multiples of positive solutions to the decoupled Hénon equation: − div(|x| −2a ∇w) = |x| −bp |w| p−2 w. Our approach involves establishing qualitative properties of the positive solutions and employing a refined ODE approach. These qualitative properties encompass radial symmetry, asymptotic behaviors, modified inversion symmetry, and monotonicity. For a < 0 and b > a, we characterize all nonnegative ground states. Specifically, relying on a sharp vector-valued Caffarelli-Kohn-Nirenberg inequality, we find that any ground state is synchronized and thus can be expressed by ground states of the aforementioned decoupled Hénon equation. Additionally, we study the nondegeneracy of nonnegative synchronized solutions. This work also delves into the following k-coupled Hénon-Sobolev critical system: ( P k − div(|x| −2a ∇u i ) = j=1 κ ij |x| −bp |u i | α ij −2 |u j | β ij u i in R n u i ∈ D a 1,2 (R n ) for ∀ 1 ≤ i ≤ k where κ ij > 0 and α ij > 1, β ij > 1 satisfying α ij + β ij = p. It turns out that most of our arguments before can be applied to this case. One remaining problem is whether similar classification results hold for k ≥ 3. By exploiting some insights from [16], here we present a uniqueness result under prescribed initial conditions. Key words: Hénon-Sobolev critical system, qualitative properties, critical nonlinearities. 2020 Mathematics Subject Classification: 35J61; 35B50; 35B06; 35J47; ∗ Supported NSFC(No.12171265,11025106). E-mail addresses: zhou-yx22@mails.tsinghua.edu.cn(Zhou), zouwm@mail.tsinghua.edu.cn (Zou) 1" 2312.01792v1,"Wild-Tab: A Benchmark For Out-Of-Distribution Generalization In Tabular Regression Sergey Kolesnikov Tinkoff s.s.kolesnikov@tinkoff.ai Abstract Out-of-Distribution (OOD) generalization, a cornerstone for building robust machine learning models capable of handling data diverging from the training set’s distribution, is an ongoing challenge in deep learning. While significant progress has been observed in computer vision and natural language processing, its exploration in tabular data, ubiquitous in many industrial applications, remains nascent. To bridge this gap, we present Wild-Tab, a large-scale benchmark tailored for OOD generalization in tabular regression tasks. The benchmark incorporates 3 industrial datasets sourced from fields like weather prediction and power consumption estimation, providing a challenging testbed for evaluating OOD performance under real-world conditions. Our extensive experiments, evaluating 10 distinct OOD generalization methods on Wild-Tab, reveal nuanced insights. We observe that many of these methods often struggle to maintain high-performance levels on unseen data, with OOD performance showing a marked drop compared to in-distribution performance. At the same time, Empirical Risk Minimization (ERM), despite its simplicity, delivers robust performance across all evaluations, rivaling the results of state-of-the-art methods. Looking forward, we hope that the release of Wild-Tab will facilitate further research on OOD generalization and aid in the deployment of machine learning models in various real-world contexts where handling distribution shifts is a crucial requirement. 1 Introduction Tabular data forms the backbone of numerous practical applications across diverse fields such as finance [27, 32, 45], healthcare [13, 43, 57], and e-commerce [11, 15]. Over the past decade, deep learning models have achieved remarkable success in analyzing this type of data, often surpassing traditional statistical methods [3, 7, 23, 52]. However, akin to other machine learning domains, these models tend to overfit to the training distribution, resulting in subpar generalization to outof-distribution data [24, 35, 41]. The intricacies of this problem are particularly pronounced in tabular regression tasks, wherein models are tasked with predicting a continuous output variable. In such contexts, even minor inaccuracies in the predicted values can precipitate substantial real-world consequences, encompassing erroneous medical diagnoses, flawed financial decisions, or inaccurate path prediction in autonomous vehicles [5, 33, 41]. While there have been notable progress in devising innovative techniques for out-of-distribution generalization [61, 64] - such as the introduction of Quantile Risk Minimization (QRM) for Probable Domain Generalization [17], or the use of the information bottleneck constraint in combination with invariance for improving out-of-distribution generalization [1] - most existing studies focus primarily on static image-based classification tasks [24, 35]. Research examining distributional shifts over time [62] or out-of-distribution generalization in time series [20] exist, but work addressing OOD generalization in tabular data and regression tasks remains scant. Preprint. Under review." 2312.01801v1,"SPROUT: Authoring Programming Tutorials with Interactive Visualization of Large Language Model Generation Process Yihan Liu, Zhen Wen, Luoxuan Weng, Ollie Woodman, Yi Yang, and Wei Chen A B C D Source Code def dijkstra(g, start, end): distances = {node: 32767 �)) distances[start] = 0 nodes = [node for node in g] while nodes: �)) Programming Tutorial Fig. 1: SPROUT provides a series of interactive visualizations of the programming tutorial authoring process with large language models. The outline view (A) shows the intermediate generation process in the form of a tree graph, which is also equipped with interactions for various editing operations. The branch view (B) enables users to switch between different branches to explore alternative thought paths. The node space view (C) showcases the content alternatives for further customization. Each of them is mapped to a paragraph in the tutorial, describing a code segment of the source code provided by users (D). Abstract—The rapid development of large language models (LLMs), such as ChatGPT, has revolutionized the efficiency of creating programming tutorials. LLMs can be instructed with text prompts to generate comprehensive text descriptions of code snippets. However, the lack of transparency in the end-to-end generation process has hindered the understanding of model behavior and limited user control over the generated results. To tackle this challenge, we introduce a novel approach that breaks down the programming tutorial creation task into actionable steps. By employing the tree-of-thought method, LLMs engage in an exploratory process to generate diverse and faithful programming tutorials. We then present SPROUT , an authoring tool equipped with a series of interactive visualizations that empower users to have greater control and understanding of the programming tutorial creation process. A formal user study demonstrated the effectiveness of SPROUT , showing that our tool assists users to actively participate in the programming tutorial creation process, leading to more reliable and customizable results. By providing users with greater control and understanding, SPROUT enhances the user experience and improves the overall quality of programming tutorial. A free copy of this paper and all supplemental materials are available at https://osf.io/uez2t/?view_only=5102e958802341daa414707646428f86. Index Terms—Large language model, programming tutorial, authoring tool, interactive visualizations 1 I NTRODUCTION Programming tutorials are used to teach learners coding skills and how to solve programming problems. Numerous programmers disseminate their programming expertise through authoring various tutorials [18], such as blog articles, online videos, programming games, etc. As the demand to learn programming has expanded, there has been a rise in the number of tutorial authors (e.g., developers [15], computer science educators [11], data scientists [39], etc.), and the research on improving authoring experiences and workflow of programming tutorials. The recent prevalence of Large Language Models (LLMs) has revolutionized the conventional process of authoring articles [2, 8, 37]. Similarly, programming tutorial authors can provide LLMs with code snippets and text instructions to generate tutorial articles. The prominent ability of LLMs significantly diminishes the effort for authors to complete programming tutorials. However, the text generated by LLMs is not always perfect or error- • Yihan Liu, Zhen Wen, Luoxuan Weng, Ollie Woodman, Yi Yang, and Wei Chen are with the State Key Lab of CAD&CG, Zhejiang University. E-mail: {lyh1024 | wenzhen | lukeweng | orw | yang-yi | chenvis}@zju.edu.cn. • Wei Chen is the corresponding author. Manuscript received xx xxx. 201x; accepted xx xxx. 201x. Date of Publication xx xxx. 201x; date of current version xx xxx. 201x. For information on obtaining reprints of this article, please send e-mail to: reprints@ieee.org. Digital Object Identifier: xx.xxxx/TVCG.201x.xxxxxxx free [14]. Sometimes the exhaustive LLM-generated content is also not aligned with users’ expectations. These problems call for further refinement on the auto-generated content. Owing to the inherent nontransparency of the generation process of LLMs, users lose access to the intermediate steps of the creation, leading to limited control and customizability when authoring articles [37]. Additionally, to achieve ideal modifications often necessitates users’ continuous interactions with LLMs via text-based conversation interfaces, which can not adequately support the nuanced and complex requirements of users seeking to fine-tune tutorials or address specific preferences. It is even more time-consuming when dealing with programming tutorials, as it requires precise verification for the correctness and consistency. The aforementioned limitations pose challenges in the process of authoring programming tutorials using LLMs. These challenges have an impact on the overall quality and reliability of LLM-generated programming tutorials. Some previous works delve in training LLMs to generate code-related content [4, 43] or proposing advanced prompting methods to promote the generation quality of LLMs [3, 40]. However, to tackle with programming tutorial task, these approaches are not out-of-box solutions for generating faithful content accurately under human’s interventions. Several interactive systems have also been developed to enhance the efficiency of interactions with LLMs. While proving useful, these systems primarily concentrate on specific needs, such as creative writing or data-driven article authoring [37, 46]. Unfortunately, these approaches are not suitable for the specific context of programming tutorial authoring, which necessitate accurate and pre-" 2312.01803v1,"EXPECTED HITTING TIME ESTIMATES ON FINITE GRAPHS LAURENT SALOFF-COSTE AND YUWEN WANG Abstract. The expected hitting time from vertex a to vertex b, H(a, b), is the expected value of the time it takes a random walk starting at a to reach b. In this paper, we give estimates for H(a, b) when the distance between a and b is comparable to the diameter of the graph, and the graph satisfies a Harnack condition. We show that, in such cases, H(a, b) can be estimated in terms of the volumes of balls around b. Using our results, we estimate H(a, b) on various graphs, such as rectangular tori, some convex traces in Z d , and fractal graphs. Our proofs use heat kernel estimates. 1. Introduction Given a Markov chain on a graph (for us here, a finite graph), there are many reasons to be interested in the random variables τ b , the time it takes for the Markov chain to make its first visit at the vertex b. An excellent introduction is in [LP17]. See also [AF02]. In the case of simple random walk on the d-torus (Z/N Z) d , when d is fixed and N is a varying parameter, and for vertices a, b at distance of order N of each other,   N 2 if d = 1,    2 N log N if d = 2, H(a, b) = E a [τ b ] ≍     N d if d > 2. The goal of this work is try to explain these behaviors in geometric terms so that they can be extended beyond very specific examples such as the (Z/N Z) d . For this, we use heat kernel techniques. Comparing to [LP17, Proposition 10.21] which gives the behavior of E a [τ b ] on (Z/N Z) d in terms of the distance between a and b even when a, b are relatively close to each other, our results are (mostly) limited to the case when the distance between vertices a and b is of order the diameter of the graph. However, we also provide a simple condition that imply that E a [τ b ] ≍ E a [τ c ] for any vertices b, c , a, as it happens for instance on (Z/N Z) d when d ≥ 3. From the point of view of heat kernel estimates, treating the small distance case in the most sensitive cases would require gradient (i.e., difference) estimates which are much more difficult to obtain than the heat kernel estimates themselves. Our focus is to understand how the torus result cited above generalizes to a variety of other Q examples of a similar type, from rectangular tori N 1 (Z/a i Z), a 1 ≤ · · · ≤ a N , to Cayley graphs of finite nilpotent groups such as the group of 3 by 3 upper-triangular matrices with entries mod N and entries equal to 1 on the diagonal, to lattice traces on simple convex subsets of R 2 or R 3 , and classes of finite fractal graph such as the N -iteration in the construction of the Sierpinski gasket. See the examples in Section 6. The common thread amongst all these 2020 Mathematics Subject Classification. 60J10. Key words and phrases. Hitting time, random walks, Green’s function, heat kernel estimates. L. Saloff-Coste’s research was partially supported by NSF grant DMS-2054593. Y. Wang’s research is supported by the Austrian Science Fund (FWF) project (P 34129), and partially supported by the Universität Innsbruck Early Stage Funding Program. 1" 2312.01806v1,"Condensed Matter Physics, ????, Vol. ?, No. ?, ?????: 1– ?? http://www.icmp.lviv.ua/journal Regular article Partition function zeros of zeta-urns Piotr Bialas 1 , Zdzislaw Burda 2 and Desmond A. Johnston 3 ∗ 1 Institute of Applied Computer Science, Jagiellonian University, ul. Lojasiewicza 11, 30-348 Kraków, Poland 2 AGH University of Krakow, Faculty of Physics and Applied Computer Science, al. Mickiewicza 30, 30-059 Kraków, Poland 3 School of Mathematical and Computer Sciences, Heriot-Watt University, Riccarton, Edinburgh EH14 4AS, UK December 5, 2023 We discuss the distribution of partition function zeros for the grand-canonical ensemble of the zeta-urn model, where tuning a single parameter can give a first or any higher order condensation transition. We compute the locus of zeros for finite-size systems and test scaling relations describing the accumulation of zeros near the critical point against theoretical predictions for both the first and higher order transition regimes. Key words: Lee-Yang & Fisher zeroes, Critical exponents, First order phase transitions, Second order phase transitions 1. Introduction In this paper we highlight the fact that a simple model of weighted partitions of indistinguishable particles into boxes, the zeta-urn model [1–3] in a grand-canonical ensemble where the number of boxes can fluctuate [4, 5], provides a useful illustrative example for exploring the finite size scaling of partition function zeros, since its finite size partition function is, at least in principle, exactly calculable and the order of its phase transition (condensation) may be tuned by varying a single parameter. The thermodynamic limit is also amenable to evaluation via saddle point methods. In section 2 we first describe the formulation of the zeta-urn model in the canonical ensemble, since the partition function of the grand-canonical ensemble builds on the canonical partition function. The presence of a transition in the model is revealed by the breakdown of the saddle point approximation in the thermodynamic limit and its nature, a real space condensation [6–17], can be elucidated by explicitly evaluating the fraction of sites with 𝑞 particles in a given configuration in finite size systems as the mean particle density is varied. We then discuss the thermodynamic limit in the grand-canonical ensemble and note that first or higher order transitions may be observed by tuning the power that appears in the weights for single box configurations. In section 3 we review some general features of partition function zeros [18–21] and their finite size scaling for phase transitions of different orders [22], using both the density of zeros at a given system size and the scaling of the position of a given zero as the system size varies. In sections 4, 5 we investigate the application of these methods to studying the partition function zeros of the grand-canonical zeta-urn model. For 𝛽 > 1, the model displays a phase transition and we discuss the first order and second/higher order regimes in subsections 5.1 and 5.2 respectively. The locus of zeros still displays interesting properties for values of 𝛽 for which there is no phase transition (i.e. 𝛽 ≤ 1, including negative values) and we outline these in subsection 5.3. We close with a summary and brief discussion in section 6. ∗ Corresponding author: D.A.Johnston@hw.ac.uk. This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. ?????-1" 2312.01833v1,"Minimum-phase property of the hemodynamic response function, and implications for Granger Causality in fMRI Leonardo Novelli a , Lionel Barnett b , Anil Seth b,c , Adeel Razi a,d,e a Turner Institute for Brain and Mental Health, School of Psychological Sciences and Monash Biomedical Imaging, Monash University, Australia b Sussex Centre for Consciousness Science, Department of Informatics, University of Sussex, United Kingdom c CIFAR Program on Brain, Mind, and Consciousness, Toronto, Canada d Wellcome Centre for Human Neuroimaging, University College London, United Kingdom e CIFAR Azrieli Global Scholars Program, Toronto, Canada Abstract Granger Causality (GC) is widely used in neuroimaging to estimate directed statistical dependence among brain regions using time series of brain activity measurements. An important issue is that functional MRI (fMRI) measures brain activity indirectly via the blood-oxygen-level-dependent (BOLD) signal, which affects the temporal structure of the signals and distorts GC estimates. However, some notable applications of GC are not concerned with the GC magnitude but its statistical significance against a null hypothesis. This is the case for network inference, which aims to build a statistical model of the system based on directed relationships among its elements. The critical question for the viability of network inference in fMRI is whether the hemodynamic response function (HRF) and its variability across brain regions introduce spurious relationships, i.e., positive GC values between BOLD signals that are statistically significant—even if the GC between the neuronal signals is zero. It has previously been mathematically proven that such spurious statistical relationships are not induced if the HRF is minimum-phase, i.e., if both the HRF and its inverse are stable (producing finite responses to finite inputs). However, whether the HRF is minimum-phase has remained contentious. Here, we address this issue using multiple realistic biophysical models available in the literature and studying their transfer functions. We find that these models are minimum-phase for a wide range of physiologically plausible parameter values. Therefore, statistical testing of GC is plausible even if the HRF varies across brain regions, with the following limitations. First, the minimum-phase condition is violated for parameter combinations that generate an initial dip in the HRF, confirming a previous mathematical proof. Second, the slow sampling of the BOLD signal (in seconds) compared to the timescales of neural signal propagation (milliseconds) may still introduce spurious GC. 1. Introduction The hemodynamic response function (HRF) is an important part of the biophysical models used in functional magnetic resonance imaging (fMRI). The HRF describes the temporal evolution of the blood oxygen-level-dependent (BOLD) signal in response to neural activity, mediated by vascular changes and neurovascular coupling. However, most HRF models sit on opposite sides of the model complexity spectrum. The simple “canonical” HRF model assumes the same response function across the entire brain—typically, a mixture of Gamma functions whose parameters lack physical interpretation (Glover, 1999). Such simplicity allows one to model the BOLD signal as a convolution of the neural activity with the canonical HRF, which guarantees mathematical tractability and simplifies model fitting (Frässle et al., 2021). On the opposite side of the spectrum, there are realistic models based on physiologically-informed nonlinear differential equations (Buxton et al., 1998; Friston et al., 2000; Stephan et al., 2007; Havlicek et al., 2015; Aquino et al., 2014; Uludag and Havlicek, 2021). Their parameters vary across brain regions and represent physiological mechanisms that regulate blood flow and oxygenation level. Here, we linearise two popular biophysical models (Stephan et al., 2007; Havlicek et al., 2015) to make two contributions. First, the linearised HRFs fill a gap in the model spectrum by balancing complexity and tractability. Email address: leonardo.novelli@monash.edu (Leonardo Novelli)" 2312.01837v1,"Prompting Disentangled Embeddings for Knowledge Graph Completion with Pre-trained Language Model Yuxia Geng Jiaoyan Chen Yuhang Zeng School of Computer Science Hangzhou Dianzi University Hangzhou, China yuxia.geng@hdu.edu.cn Department of Computer Science The University of Manchester Manchester, United Kingdom jiaoyan.chen@manchester.ac.uk HDU-ITMO Joint Institute Hangzhou Dianzi University Hangzhou, China yuhang.zeng@hdu.edu.cn Zhuo Chen, Wen Zhang Jeff Z. Pan Yuxiang Wang, Xiaoliang Xu Zhejiang University Hangzhou, China {zhuo.chen, zhang.wen}@zju.edu.cn School of Informatics The University of Edinburgh Edinburgh, United Kingdom j.z.pan@ed.ac.uk School of Computer Science Hangzhou Dianzi University Hangzhou, China {lsswyx, xxl}@hdu.edu.cn semantics like neighborhood graph patterns concerned, so that the missing facts can be inferred by their vector representations (a.k.a. embeddings) [7], [45]. We call them structure-based methods (see Section II). Besides the graph structure, there are also some methods exploiting the text of the entities and relations as additional information for prediction, but methods of this type proposed before 2021 such as DKRL [48] (see their review [15]) use non-contextualized text embeddings such as Word2Vec to encode the text, which specify a token a unique embedding and cannot fully capture its meaning in the context. Recently, Pre-trained Language Models (PLMs) such as BERT [11], which encode the text with the tokens’ contexts considered, have achieved great success in natural language processing (NLP), and they have been applied to KGC. The methods often represent entities and relations using their textual information, view KGC as an NLP downstream task, and fine-tune PLMs to infer the missing facts. For example, KG- BERT [52] takes as input a triple’s whole text, encodes the text with BERT, and feeds the text encoding into a classifier to predict its plausibility (score); KGT5 [33] leverages the I. I NTRODUCTION Seq2Seq PLM framework to directly generate a triple’s missing Knowledge Graphs (KGs) [31] are collections of real-world part conditioned on its other two known parts. We call the factual knowledge represented as RDF triples. A set of such methods that utilize the textual information with some PLMs triples typically constitutes a multi-relational graph with entities as PLM-based. The challenge of these methods thus lies in as nodes and relations as edges. The entities and relations often incorporating the graph structure simultaneously. Several efforts have rich textual information as their names and descriptions. have been made in this direction. For example, LASS [35] and In recent years, KGs have been valuable resources in a StAR [43] further forward the PLM-based text encoding to variety of knowledge-intensive applications, such as question a KGE model to fine-tune the PLM and learn the structure answering, search engines, and recommender systems. Despite embeddings jointly. However, fine-tuning the PLM is (i) costly the increasing use, KGs often suffer from incompleteness with in both computation and storage, limiting the applicability to a high ratio of plausible facts missing [13]. Knowledge Graph larger models, and (ii) more prone to overfit and forget the Completion (KGC) is then proposed to find these missing facts knowledge e.g. linguistic inherence learned during pre-training, using the existing facts and/or external resources. in many cases limiting the performance [3], [12]. With the graph structure implied by triples, a large part of Meanwhile, a more efficient technology of using PLMs KGC methods uses KG embedding (KGE) techniques to encode named prompt-tuning has arisen: adapting the PLM directly as the KG entities and relations into a vector space with their a downstream task predictor by adding (learnable) task-specific Abstract—Both graph structures and textual information play a critical role in Knowledge Graph Completion (KGC). With the success of Pre-trained Language Models (PLMs) such as BERT, they have been applied for text encoding for KGC. However, the current methods mostly prefer to fine-tune PLMs, leading to huge training costs and limited scalability to larger PLMs. In contrast, we propose to utilize prompts and perform KGC on a frozen PLM with only the prompts trained. Accordingly, we propose a new KGC method named PDKGC with two prompts — a hard task prompt which is to adapt the KGC task to the PLM pre-training task of token prediction, and a disentangled structure prompt which learns disentangled graph representation so as to enable the PLM to combine more relevant structure knowledge with the text information. With the two prompts, PDKGC builds a textual predictor and a structural predictor, respectively, and their combination leads to more comprehensive entity prediction. Solid evaluation on two widely used KGC datasets has shown that PDKGC often outperforms the baselines including the stateof-the-art, and its components are all effective. Our codes and data are available at https://github.com/genggengcss/PDKGC. Index Terms—Knowledge Graph Completion, Pre-trained Language Model, Prompt Tuning, Disentangled Embedding" 2312.01844v1,"Effective models for generalized Newtonian fluids through a thin porous medium following the Carreau law Marı́a ANGUIANO 1 , Matthieu BONNIVARD 2 and Francisco J. SUÁREZ-GRAU 3 Abstract We consider the flow of a generalized Newtonian fluid through a thin porous medium of thickness ϵ, perforated by periodically distributed solid cylinders of size ϵ. We assume that the fluid is described by the 3D incompressible Stokes system, with a non-linear viscosity following the Carreau law of flow index 1 < r < +∞, and scaled by a factor ϵ γ , where γ ∈ R. Generalizing (Anguiano et al. , Q. J. Mech. Math., 75(1), 2022, 1-27), where the particular case r < 2 and γ = 1 was addressed, we perform a new and complete study on the asymptotic behaviour of the fluid as ϵ goes to zero. Depending on γ and the flow index r, using homogenization techniques, we derive and rigorously justify different effective linear and non-linear lower-dimensional Darcy’s laws. Finally, using a finite element method, we study numerically the influence of the rheological parameters of the fluid and of the shape of the solid obstacles on the behaviour of the effective systems. AMS classification numbers: 76-10, 76A05, 76M50, 76A20, 76S05, 35B27, 35Q35. Keywords: Homogenization, non-Newtonian fluid, Carreau law, thin porous media. 1 Introduction An incompressible generalized Newtonian fluid is a type of non-Newtonian fluid which is characterized by a viscosity depending on the principal invariants of the symmetric stretching tensor D[u]. If u is the velocity, p the pressure and Du the gradient velocity tensor, D[u] = (Du + D t u)/2 denotes the symmetric stretching tensor and σ the stress tensor given by σ = −pI + 2η r D[u]. The viscosity η r is constant for a Newtonian fluid but dependent of the shear rate, i.e. η r = η r (D[u]), for generalized Newtonian fluids. The deviatoric stress tensor τ , i.e. the part of the total stress tensor that is zero at equilibrium, is then a nonlinear function of the shear rate D[u]: τ = η r (D[u])D[u] (see Barnes et al. [15], Bird et al. [16] and Mikelić [34] for more details). The power law or Ostwald-de Waele model (Ostwald, 1925; de Waele, 1923) is commonly used to describe the motion of a generalized Newtonian fluid. The corresponding viscosity formula is η r (D[u]) = µ|D[u]| r−2 , 1 < r < +∞, 1 µ > 0, (1.1) Departamento de Análisis Matemático. Facultad de Matemáticas. Universidad de Sevilla, 41012 Sevilla (Spain) anguiano@us.es 2 Univ Lyon, Ecole Centrale de Lyon, CNRS, Univ Claude Bernard Lyon 1, Univ Jean Monnet, INSA Lyon, Institut Camille Jordan, UMR5208, 69130 Ecully, France, matthieu.bonnivard@ec-lyon.fr 3 Departamento de Ecuaciones Diferenciales y Análisis Numérico. Facultad de Matemáticas. Universidad de Sevilla, 41012 Sevilla (Spain) fjsgrau@us.es 1" 2312.01848v1,"Decomposing Electronic Structures in Twisted Multilayers: Bridging Spectra and Incommensurate Wave Functions Citian Wang 1 and Huaqing Huang 1, 2, 3, ∗ 1 School of Physics, Peking University, Beijing 100871, China Collaborative Innovation Center of Quantum Matter, Beijing 100871, China 3 Center for High Energy Physics, Peking University, Beijing 100871, China (Dated: December 5, 2023) 2 Twisted multilayer systems, encompassing materials like twisted bilayer graphene (TBG), twisted trilayer graphene, and twisted bilayer transition metal dichalcogenides, have garnered significant attention in condensed matter physics. Despite this interest, a comprehensive description of their electronic structure, especially in dealing with incommensurate wave functions, poses a persistent challenge. Here, we introduce a unified theoretical framework for efficiently describing the electronic structure covering both spectrum and wave functions in twisted multilayer systems, accommodating both commensurate and incommensurate scenarios. Our analysis reveals that physical observables in these systems can be systematically decomposed into contributions from individual layers and their respective k points, even in the presence of intricate interlayer coupling. This decomposition facilitates the computation of wave function-related quantities relevant to response characteristics beyond spectra. We propose a local low-rank approximated Hamiltonian in the truncated Hilbert space that can achieve any desired accuracy, offering numerical efficiency compared to the previous large-scale calculations. The validity of our theory is confirmed through computations of spectra and optical conductivity for moiré TBG, and demonstrating its applicability in incommensurate quasicrystalline TBG. Our findings provide a generic approach to studying the electronic structure of twisted multilayer systems and pave the way for future research. I. INTRODUCTION Twisted multilayer systems, formed by stacking twodimensional (2D) periodic layers with a twist, encompassing materials like twisted bilayer graphene (TBG) [1– 15], twisted trilayer graphene [16–21], and twisted bilayer transition metal dichalcogenides [22–27], have garnered significant attention in condensed matter physics. These systems provide a highly tunable platform for exploring exotic quantum phenomena, including unconventional superconductivity [28–34], correlated insulating phases [35–40], and topological phases of matters [41– 48]. The recent observation of fractional anomalous Hall states in twisted bilayer MoTe 2 [49–51] has reignited interest among both theoretical and experimental physicists in these twisted multilayer systems. However, providing a comprehensive description of their electronic structure remains challenging, primarily due to intricate interlayer coupling, especially in incommensurate cases without a moiré superlattice. Previous methods for calculating electronic structure in twisted multilayer systems generally fall into two categories. One approach is the moiré effective method, which approximates usually incommensurate noncrystalline systems as translational symmetric systems using a low-energy continuum model [52–66]. This includes the well-known Bistritzer-MacDonald (BM) model for TBG with small twist angles [54]. The other method relies on large-scale calculation techniques, such as direct supercell calculations and density-functional calculations with ∗ Corresponding author: huaqing.huang@pku.edu.cn generalized unfolding techniques [67–79]. Both methods have their advantages and disadvantages. The moiré effective approach is computationally efficient but becomes less valid for large twist angles or larger energy scales due to the absence of microscopic details. On the other hand, the large-scale simulation approach offers high accuracy but involves extremely high computational costs. Worse still, it cannot handle incommensurate cases without a single moiré superlattice, which are generally encountered. Experimental observations of incommensurate twisted multilayer systems, including quasicrystalline 30 ◦ TBG [80–84], graphene on top of the BN layer [85], and trilayer moiré quasicrystal [86], highlights the limitations of existing methods. To address this, Moon et al. introduced a k-space tight-binding model [87], successfully calculating the density of states and offering some insights into interlayer coupling. However, this model lacks a quasi-band structure for direct comparison with angleresolved photoemission spectroscopy (ARPES) data and the ability to extract wave function information essential for computing physical observables beyond spectra. In summary, substantial gaps exist between existing models and experimental observations, and a unified, accurate, and computationally efficient theory for electronic structure in both commensurate and incommensurate twisted multilayer systems is still absent, significantly hindering further research. In this paper, we introduce a unified theoretical framework for comprehensively describing the electronic structure in multilayer systems, accommodating both commensurate and incommensurate scenarios, bridging gaps in previous methods. The workflow of our theory, de-" 2312.01862v1,"Numerical simulation of flow field and debris migration in EUV source vessel Wen-Sheng Meng (孟文盛) 1 , a) Chao-Ben Zhao(赵超本) 1 , a) Jian-Zhao Wu (吴建钊) 1 , Bo-Fu Wang (王伯福) 1 , b) Quan Zhou (周全) 1 , b) and Kai Leong Chong (庄启亮) 1b) 1 Shanghai Key Laboratory of Mechanics in Energy Engineering, Shanghai Institute of Applied Mathematics and Mechanics, School of Mechanics and Engineering Science, Shanghai University, Shanghai, 200072, China (Dated: 5 December 2023) Practical EUV sources yield the desired 13.5 nm radiation but also generate debris, significantly limiting the lifespan of the collector mirror in lithography. In this study, we explore the role of buffer gas in transporting debris particles within a EUV source vessel using direct numerical simulations (DNS). Our study involves a 2m × 1m × 1m rectangular cavity with an injecting jet flow subjected to sideward outlet. Debris particles are introduced into the cavity with specified initial velocities, simulating a spherical radiating pattern with particle diameters ranging from 0.1 µm to 1 µm. Varying the inflow velocity (from 1m/s to 50m/s) of the buffer gas reveals a morpho- logical transition in the flow field. At low inflow velocities, the flow remains steady, whereas higher inflow velocities induce the formation of clustered corner rolls. Upon reaching sufficiently high inflow velocities, the jet flow can penetrate the entire cav- ity, impacting the endwall. Interestingly, the resulting recirculation flow leads to the spontaneous formation of spiraling outflow. The distinct flow structures at various inflow velocities lead to distinct patterns of particle transport. For low-speed gas, it is efficient in expelling all particles smaller than 0.4 µm, while for high-speed gas, those fine particles accumulate near the endwall and are challenging to be extracted. Our findings highlight the significance of controlling flow conditions for effective de- bris particle transport and clearance in diverse applications especially in EUV source vessels. a) These authors contributed equally to this work b) Authors to whom correspondence should be addressed: bofuwang@shu.edu.cn and qzhou@shu.edu.cn and klchong@shu.edu.cn 1" 2312.01869v1,"TCP Slice: A semi-distributed TCP algorithm for Delay-constrained Applications Dibbendu Roy Goutam Das Department of Electrical Engineering IIT Indore droy@iiti.ac.in G.S. Sanyal School of Telecommunications IIT Kharagpur Kharagpur, India gdas@gssst.iitkgp.ac.in Abstract—The TCP congestion control protocol serves as the cornerstone of reliable internet communication. However, as new applications require more specific guarantees regarding data rate and delay, network management must adapt. Thus, service providers are shifting from decentralized to centralized control of the network using a software-defined network controller (SDN). The SDN classifies applications and allocates logically separate resources called “slices”, over the physical network. We propose “TCP Slice”, a congestion control algorithm that meets specific delay and bandwidth guarantees. Obtaining closed-form delay bounds for a client is challenging due to dependencies on other clients and their traffic stochasticity. We use network calculus to derive the client’s delay bound and incorporate it as a constraint in the Network Utility Maximization problem. We solve the resulting optimization using dual decomposition and obtain a semidistributed TCP protocol that can be implemented with the help of SDN controller and the use of Explicit Congestion Notification (ECN) bit. Additionally, we also propose a proactive approach for congestion control using digital twin. TCP Slice represents a significant step towards accommodating evolving internet traffic patterns and the need for better network management in the face of increasing application diversity. Index Terms—TCP, Network slicing, SDN, Network calculus, semi-distributed, congestion control I. I NTRODUCTION The TCP congestion control protocol is certainly the backbone of reliable internet communication and has been the de facto standard ever since its inception in the 1980s [1]. The success of TCP can be attributed to its capability of being deployed in a distributed manner without necessitating complete knowledge of the network state. Thus, each client can send data over TCP without being concerned about the network’s other clients, leading to a highly scalable system. However, over the years, the nature of internet traffic has changed significantly due to increased accessibility and the introduction of new applications and services [2]. The days of being satisfied with basic data delivery assurances are long gone. As an example, Table I shows the diverse quality of service (QoS) requirements of 5G use cases [3]. It is anticipated that this diversity will continue to expand with the emergence of newer application scenarios, and future networks, including 6G [4], [5], and therefore the future internet will be required to accommodate these diverse demands. To address the aforementioned needs, better management of networks is necessary. Thus, a more centralized control of the TABLE I A PPLICATION , S LICE AND R EQUIREMENT M APPING IN 5G [3] Use Cases Slice Augmented and Virtual reality eMBB Autonomous Cars, Remote Surgery uRLLC IoT, Smart Factories, Platooning mMTC QoS Downstream ≥ 100Mbps, Uplink ≥ 50Mbps, Latency ≤ 4ms Latency ≤ 1ms, Reliability = 99.999% Connection Density = 1 × 10 6 devices/Km 2 network through software-defined networks (SDN) has gained popularity [6], [7] (see Fig.1). Specifically, to meet the various QoS requirements of emerging new applications, the notion of network slicing is introduced [8]. The idea behind network slicing is to divide a single physical network infrastructure into multiple virtual networks, each tailored to serve different use cases with distinct performance, security, and resource allocation requirements. Each network slice operates independently and can be managed and optimized separately. Evidently, the implementation of slices requires global network state information, making SDN a key enabler for the same. The SDN can run network operations such as routing, network address translation, and network slice management by implementing network functions on top of its control plane (known as Network function virtualization - NFV, see Fig.1). As shown in Table I, based on QoS requirements, 5G defines three main categories of slices, enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communications (uRLLC), and massive Machine Type Communications (mMTC). Keeping these developments in mind, it is important to look into the possibilities of extending the capabilities of traditional TCP algorithms. A. Related Works and Challenges TCP, being the fundamental technology for moving internet traffic, is a well-researched topic with vast literature [1], [9]–[13]. In this paper, we propose am analytical TCP algorithm that specifically meets delay guarantees which can" 2312.01887v1,"Non-Intrusive Load Monitoring for Feeder-Level EV Charging Detection: Sliding Window-based Approaches to Offline and Online Detection Cameron Martin 1 , Fucai Ke 2 , Hao Wang 1,3* 1 Department of Data Science and AI, Faculty of Information Technology, Monash University, Australia 2 Department of Human Centred Computing, Faculty of Information Technology, Monash University, Australia 3 Monash Energy Institute, Monash University, Australia Abstract—Understanding electric vehicle (EV) charging on the distribution network is key to effective EV charging management and aiding decarbonization across the energy and transport sectors. Advanced metering infrastructure has allowed distribution system operators and utility companies to collect highresolution load data from their networks. These advancements enable the non-intrusive load monitoring (NILM) technique to detect EV charging using load measurement data. While existing studies primarily focused on NILM for EV charging detection in individual households, there is a research gap on EV charging detection at the feeder level, presenting unique challenges due to the combined load measurement from multiple households. In this paper, we develop a novel and effective approach for EV detection at the feeder level, involving sliding-window feature extraction and classical machine learning techniques, specifically models like XGBoost and Random Forest. Our developed method offers a lightweight and efficient solution, capable of quick training. Moreover, our developed method is versatile, supporting both offline and online EV charging detection. Our experimental results demonstrate high-accuracy EV charging detection at the feeder level, achieving an F-Score of 98.88% in offline detection and 93.01% in online detection. Index Terms—Electric vehicle (EV), EV charging detection, nonintrusive load monitoring (NILM), smart meter data, feeder I. I NTRODUCTION With a fast-growing uptake of electric vehicles (EVs), the peak load on distribution networks is expected to increase significantly. A study in [1] revealed that, for a transformer connected to six households, an additional EV using Level-2 charging (e.g., 6.6kW) can lead to transformer overloading at above 115% of the nominal capacity for an extra hour, potentially reducing the transformer’s lifespan. Considering that EV penetration tends to cluster geographically [2], this further exacerbates the transformer overloading problem. Hence, it becomes timely and important to understand EV charging in residential distribution systems. The increasing uptake of smart meters generates rich load datasets and offers promising solutions to EV charging event This work was supported in part by the Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) under Grant DE230100046. *Corresponding author: Hao Wang (hao.wang2@monash.edu). detection. Non-intrusive load monitoring (NILM) is an effective technique that has been used for load disaggregation including EV charging detection. For example, some previous studies [3], [4] employed rule-based methods for meter-level EV charging detection. Nonetheless, these approaches suffer from limitations, including limited adaptability to diverse and dynamic load behaviors and shortcomings in terms of accuracy and generalizability. The rapid advances in deep learning has catalyzed the development of learning-based NILMs. These methods have made progress in addressing limitations of rule-based methods, such as improved detection accuracy [5], [6], [7], [8], [9], [10], [11]. However, the complexity and time-intensive nature of deep learning-based NILM methods pose challenges to their interpretability, restricting their potential to provide insights into EV charging behaviors. Besides, distribution network operators may not monitor the smart meter data of individual households; instead, they collect the aggregated load of multiple households on a feeder. As a result, detecting EV charging at the feeder level emerges as a critical task of understanding and managing EV charging for the future distribution system [12]. Recognizing the scarcity of research on EV charging detection based on aggregated load from multiple households, our work aims to bridge this gap by developing an effective algorithm for EV charging detection at the feeder level . This paper presents a novel framework for EV charging detection, in particular intended for distribution network operators. We synthesize feeder load data by aggregating realworld household smart meter data. Our goal is to develop a lightweight solution that relies on standard and classical machine learning algorithms, rather than focusing on complex deep learning models. We prioritize the effectiveness of input features, interpretability, and generalizability of the developed framework. Within our developed framework, we use the Random Forest and XGBoost models for classification, i.e., charging detection. The features for the classification models are extracted based on a set of sliding windows supporting offline and online detection, respectively. The contributions of our work are summarized as follows." 2312.01907v1,"Model Predictive Control Approach to Autonomous Formation Flight Harun CELIK and Dilara KILINC Abstract— Formation flight is when multiple objects fly together in a coordination. Various automatic control methods have been used for the autonomous execution of formation flight of aerial vehicles. In this paper, the capacity of the model predictive control (MPC) approach in the autonomous execution of formation flight is examined. The MPC is a controller that capable of performing formation flight, maintaining tracking desired trajectory while avoiding collisions between aerial vehicles, and obstacles faced. Through this approach, aerial vehicle models with six degrees of freedom in a three-dimensional environment are performed formation flight autonomously, mostly in a triangle order. Not only the trajectory for the formation flight can be tracked through the MPC architecture, also the collision avoidance strategies of the aerial vehicles can be performed by this architecture. Simulation studies show that MPC has sufficient capability in both cases. Therefore, it is concluded that this method can deal with constraints, avoid obstacles as well as collisions between aerial vehicles. However, implementation of MPC to aerial vehicles in real time holds challenges. Keywords— model predictive control, formation flight, aerial vehicles, collision avoidance Authors are with Astronautical E ngineering, E rciyes U niversity, Kayseri, Turkiye. C onrresponding author e - mail : haruncelik@ erciyes.edu.tr This paper is presented in Turkish to contribute to national scientific language/literature. Cite as: H. Çelik and D. Kılınç, ""KOL UÇUŞUNUN OTONOM İCRASINDA MODEL ÖNGÖRÜLÜ KONTROL YAKLAŞIMI,"" In Mühendislik Alanında Gelişmeler 2 , Ankara: Platanus Publishing, 2023, pp.149-166." 2312.01909v1,"Vacuum energy, temperature corrections and heat kernel coefficients in (D + 1)-dimensional spacetimes with nontrivial topology 1 1 Herondy Mota ∗ Departamento de Física, Universidade Federal da Paraíba, Caixa Postal 5008, João Pessoa, Paraíba, Brazil. In this work we make use of the generalized zeta function technique to investigate the vacuum energy, temperature corrections and heat kernel coefficients associated with a scalar field under a quasiperiodic condition in a (D + 1)-dimensional conical spacetime. In this scenario we find that the renormalized vacuum energy, as well as the temperature corrections, are both zero. The nonzero heat kernel coefficients are the ones related to the usual Euclidean divergence, and also to the nontrivial aspects of the quaisperiodically identified conical spacetime topology. An interesting result that arises in this configuration is that for some values of the quasiperiodic parameter, the heat kernel coefficient associated with the nontrivial topology vanishes. In addition, we also consider the scalar field in a (D+1)-dimensional spacetime formed by the combination of a conical and screw dislocation topological defects. In this case, we obtain a nonzero renormalized vacuum energy density and its corresponding temperature corrections. Again, the nonzero heat kernel coefficients found are the ones related to the Euclidean and nontrivial topology divergences. For D = 3 we explicitly show, in the massless scalar field case, the limits of low and high temperatures for the free energy. In the latter, we show that the free energy presents a classical contribution. I. INTRODUCTION Casimir effect is a phenomenon that arises in the realm of Quantum Field Theory as a consequence of boundary conditions imposed on quantum fields, namely, scalar, electromagnetic and spinor fields. In this sense, the quantum modes of a given field in its vacuum state are altered in such a way that a detectable nonzero Casimir force is produced, at least in the electromagnetic case. In fact, an attractive force was predicted in 1948 by Casimir who considered a configuration constituted by an electromagnetic field whose modes are confined between two identical and large perfect parallel conducting plates [1]. Although not with a great precision, the first attempt to detect this effect was in 1958 by Sparnaay [2] and confirmed, after several decades, by others [3–8]. In the past years, Casimir like effects arising due to the geometrical and topological aspects of curved spacetimes have been investigated. In these scenarios, the quantum modes in the vacuum state are modified and a nonzero vacuum energy is produced [9, 10]. An interesting curved spacetime is the one with a conical topology as, for instance, the cosmic string spacetime. The existence of cosmic strings can produce gravitational, astrophysical and cosmological signatures and is predicted in some extensions of the Standard Model of particle physics [11, 12], and in the context of string theory [13, 14]. Cosmic string is also a linear topological defect that is supposed to be formed due to phase transitions in the early Universe. An idealized and static one is characterized by a spacetime with conical topology that has associated to it a planar angle deficit proportional to its linear energy density, µ 0 , that is, ∆ϕ ≃ 8πGµ 0 , where G is the Newton’s gravitational constant. In condensed matter systems, the cosmic string counterpart is a disclination [15, 16]. In Refs. [17–24] quantum effects induced by linear topological defects, such as the ones just described, on the vacuum expectation values of the energy-momentum tensor, induced current density and induced density fluctuation of a classical liquid were considered. In the context of theories of solid and crystal continuum media there also exists an interesting linear topological defects known as screw dislocation [16]. The combination of a screw dislocation and a cosmic string (disclination) is also a topological defect that has a spacelike helical structure, with chiral properties [25–27]. In this case, there is not only a delta function singularity in the scalar curvature, associated with the conical defect, but also in the torsion. The latter is a characteristic of a screw dislocation and the combination of it with a conical defect, also known as cosmic dispiration [28, 29], is formally constructed in the framework of the Einstein-Cartan theory of gravity [25]. In dealing with the technical calculation involved in the investigation of Casimir effect it is necessary to adopt regularization and renormalization methods to treat the infinity contributions to the vacuum energy arising in this context. A very elegant and powerful method is the one constructed by means of the generalized zeta function approach ∗ Electronic address: hmota@fisica.ufpb.br" 2312.01912v1,"Resource Leak Checker (RLC#) for C# Code using CodeQL Pritam Gharat Narges Shadab Shrey Tiwari t-prgharat@microsoft.com Microsoft Research India narges.shadab@email.ucr.edu University of California, Riverside USA shreymt@gmail.com Microsoft Research India Shuvendu Lahiri Akash Lal shuvendu.lahiri@microsoft.com Microsoft Research USA akashl@microsoft.com Microsoft Research India ABSTRACT critical impact on software performance and security, preventing and detecting resource leaks remains a challenging problem. The motivation of this work is to detect resource leaks in Azure microservices written in C# code. To achieve this, we have developed a resource leak checker called RLC#. Inspired by the Resource Leak Checker (RLC) [2] —an open-source tool for Java—our RLC# targets C# code and leverages CodeQL for data flow analysis. Like its Java counterpart, RLC# focuses on intraprocedural analysis, ensuring that methods like ‘Close’ or ‘Dispose’, used for releasing or disposing of resources, are called appropriately on relevant objects (references to resources). Violations of this must-call property are reported as resource leaks. RLC, the Java counter-part, performs three intraprocedural analyses to verify compliance with this property (details available in section 2). A key insight in RLC is that checking the must-call property is an accumulation problem. This verification doesn’t necessitate heavyweight whole-program interprocedural alias analysis. Although the accumulation analysis remains sound even in the absence of alias information, it becomes imprecise without such information. To address this limitation, RLC uses local aliasing and a resource management specification language. Developers write these specifications detailing how resources are managed within an application—how they are stored, passed around, and ultimately ACM Reference Format: released. These specifications, integrated at method boundaries, fa- Pritam Gharat, Narges Shadab, Shrey Tiwari, Shuvendu Lahiri, and Akash cilitate interprocedural data flow analysis, rendering the accumu- Lal. 2023. Resource Leak Checker (RLC#) for C# Code using CodeQL. In Prolation analysis modular. ceedings of . ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn RLC#, our resource leak checker, leverages the data flow analysis module of CodeQL to verify the must-call property. Unlike the 1 INTRODUCTION accumulation problem tackled by its predecessor, the resource leak checking in RLC# can be framed as a graph-reachability problem. A resource leak occurs when a finite resource managed by devel- CodeQL constructs a data flow graph that captures the flow of data opers is acquired (via allocation) but is not disposed when it is no between its nodes. These nodes correspond to relevant expressions longer needed. In managed languages like C#, these resources can within a program. For instance: for a resource leak checker, a relinclude file handles, database connections, and network connecevant expression may include a call to a constructor that allocates tions. Resource leaks can lead to resource starvation, performance a resource or a call to a method Dispose. For a null-dereference slowdowns, crashes, and even denial-of-service attacks. Despite its check, a relevant expression may include a NULL assignment or a pointer dereference. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed RLC# harnesses the expressive power of code-pattern matching for profit or commercial advantage and that copies bear this notice and the full citain CodeQL. By identifying all relevant expressions, it ensures comtion on the first page. Copyrights for components of this work owned by others than prehensive coverage for resource leak detection. CodeQL provides ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission predicates (akin to APIs) that allow RLC# to verify the must-call and/or a fee. Request permissions from permissions@acm.org. property. It checks for the existence of one or more data flow paths ,, between relevant nodes. © 2023 Association for Computing Machinery. Resource leaks occur when a program fails to release a finite resource after it is no longer needed. These leaks are a significant cause of real-world crashes and performance issues. Given their critical impact on software performance and security, detecting and preventing resource leaks is a crucial problem. Recent research has proposed a specify-and-check approach to prevent resource leaks. In this approach, programmers write resource management specifications that guide how resources are stored, passed around, and released within an application. We have developed a tool called RLC#, for detecting resource leaks in C# code. Inspired by the Resource Leak Checker (RLC) from the Checker Framework, RLC# employs CodeQL for intraprocedural data flow analysis. The tool operates in a modular fashion and relies on resource management specifications integrated at method boundaries for interprocedural analysis. In practice, RLC# has successfully identified 24 resource leaks in open-source projects and internal proprietary Azure microservices. Its implementation is declarative, and it scales well. While it incurs a reasonable false positive rate, the burden on developers is minimal, involving the addition of specifications to the source code. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn" 2312.01929v1,"Adjoint-Based Enforcement of State Constraints in PDE Optimization Problems Pritpal Matharu ∗1 and Bartosz Protas 2 1 Department of Mathematics, KTH Royal Institute of Technology, Stockholm, Sweden 2 Department of Mathematics and Statistics, McMaster University, Hamilton, Ontario, Canada December 5, 2023 Abstract This study demonstrates how the adjoint-based framework traditionally used to compute gradients in PDE optimization problems can be extended to handle general constraints on the state variables. This is accomplished by constructing a projection of the gradient of the objective functional onto a subspace tangent to the manifold defined by the constraint. This projection is realized by solving an adjoint problem defined in terms of the same adjoint operator as used in the system employed to determine the gradient, but with a different forcing. We focus on the “optimize-then-discretize” paradigm in the infinite-dimensional setting where the required regularity of both the gradient and of the projection is ensured. The proposed approach is illustrated with two examples: a simple test problem describing optimization of heat transfer in one direction and a more involved problem where an optimal closure is found for a turbulent flow described by the Navier-Stokes system in two dimensions, both considered subject to different state constraints. The accuracy of the gradients and projections computed by solving suitable adjoint systems is carefully verified and the presented computational results show that the solutions of the optimization problems obtained with the proposed approach satisfy the state constraints with a good accuracy, although not exactly. ∗ Email address for correspondence: pritpal@kth.se 1" 2312.01941v1,"Intrusion Detection System with Machine Learning and Multiple Datasets Haiyan Xuan 1 , Mohith Manohar 2* 1 Carmel High School, Carmel, IN, United States of America 2 SimplyFixable, New York, NY, United States of America 2 Department of Computer Science, Columbia University, New York, NY, United States of America * Correspondence: Mohith Manohar mm5874@columbia.edu Keywords: Intrusion Detection System, Artificial Intelligence, Network Security, Machine Learning, Hyperparameter Tuning Abstract As Artificial Intelligence (AI) technologies continue to gain traction in the modern-day world, they ultimately pose an immediate threat to current cybersecurity systems via exploitative methods. Prompt engineering is a relatively new field that explores various prompt designs that can hijack large language models (LLMs). If used by an unethical attacker, it can enable an AI system to offer malicious insights and code to them. In this paper, an enhanced intrusion detection system (IDS) that utilizes machine learning (ML) and hyperparameter tuning is explored, which can improve a model's performance in terms of accuracy and efficacy. Ultimately, this improved system can be used to combat the attacks made by unethical hackers. A standard IDS is solely configured with preconfigured rules and patterns; however, with the utilization of machine learning, implicit and different patterns can be generated through the models' hyperparameter settings and parameters. In addition, the IDS will be equipped with multiple datasets so that the accuracy of the models improves. We evaluate the performance of multiple ML models and their respective hyperparameter settings through various metrics to compare their results to other models and past research work. The results of the proposed multi-dataset integration method yielded an accuracy score of 99.9% when equipped with the XGBoost 1 and random forest 2 classifiers and RandomizedSearchCV 3 hyperparameter technique. 1 Introduction 1.1 Problem Statement The emergence of newly advanced LLMs poses a potential danger to existing IDS and other monitoring systems from unforeseen attacks from LLM-targeted exploitative methods. A new study has shown how injected prompts can alter the behavior of LLMs through exploitative methods, 1 https://xgboost.readthedocs.io/en/stable/ 2 https://scikit-learn.org/stable/modules/generated/sklearn.ensemble.RandomForestClassifier.html 3 https://scikit-learn.org/stable/modules/generated/sklearn.model_selection.RandomizedSearchCV.html" 2312.01977v1,"MNRAS 000, 1–23 (2023) Preprint 5 December 2023 Compiled using MNRAS L A TEX style file v3.0 Cosmological constraints on early dark energy from the full shape analysis of eBOSS DR16 Rafaela Gsponer, 1★ Ruiyang Zhao, 2,3,1 Jamie Donald-McCann, 1 David Bacon, 1 Kazuya Koyama, 1 Robert Crittenden, 1 Théo Simon, 4 Eva-Maria Mueller 5 1 Institute of Cosmology & Gravitation, University of Portsmouth, Dennis Sciama Building, Portsmouth, PO1 3FX, UK 2 National Astronomy Observatories, Chinese Academy of Sciences, Beijing, 100101, P.R. China 3 University of Chinese Academy of Sciences, Beijing 100049, P.R.China 4 Laboratoire Univers & Particules de Montpellier (LUPM), CNRS & Université de Montpellier (UMR-5299), F-34095 Montpellier Cedex 05, France 5 Department of Physics and Astronomy, University of Sussex, Brighton BN1 9QH, UK Accepted XXX. Received YYY; in original form ZZZ ABSTRACT We evaluate the effectiveness of Early Dark Energy (EDE) in addressing the Hubble tension using data from the completed eBOSS survey, focusing on luminous red galaxies (LRGs), quasars (QSOs), and emission line galaxies (ELGs). We perform cosmological parameter measurements based on full shape analysis of the power spectrum of all three tracers. We conduct this full shape analysis with the effective field theory of large-scale structure (EFTofLSS). EDE is known to strongly suffer from volume projection effects, which makes the interpretation of cosmological constraints challenging. To quantify the volume projection effects within an EDE full shape analysis, we explore the impact of different prior choices on the nuisance parameters of EFTofLSS through an extensive mock study. We compare classical Gaussian priors to the non-informative Jeffreys prior, known to mitigate volume projection effects in ΛCDM. Our full shape analysis combines eBOSS and BOSS data with Planck, external Baryon Acoustic Oscillation (BAO), PantheonPlus, and SH0ES supernova data. EDE demonstrates to reduce the tension from 5.2𝜎 to 3𝜎 compared to ΛCDM. The derived values at a 68% credible interval with Gaussian and Jeffreys priors are +0.82 +0.023 𝐻 0 = 71.73 +0.82 km/s/Mpc with 𝑓 EDE = 0.1179 +0.025 −0.022 and 𝐻 0 = 72.03 −0.87 km/s/Mpc with 𝑓 EDE = 0.1399 −0.022 , respectively. −0.86 Although the Hubble tension is mitigated compared to ΛCDM, the inclusion of eBOSS data amplifies the tension within EDE from 2𝜎 to 3𝜎, in contrast to the full shape analysis of BOSS data with Planck, external BAO, PantheonPlus, and SH0ES. This highlights the significance of incorporating additional large-scale structure data in discussions concerning models aiming to resolve the Hubble tension. Key words: large-scale structure of the Universe – methods: data analysis – cosmology: cosmological parameters 1 INTRODUCTION Over the last century Λ Cold Dark Matter (ΛCDM) has been established as the standard model in cosmology, but despite its successes, it faces both observational and theoretical challenges. One observational challenge which appears particularly persistent is the Hubble tension, which describes the difference in value of the Hubble constant 𝐻 0 as inferred from direct versus indirect measurements. The most significant discrepancy in its value comes from the cosmic microwave background (CMB) as measured by the Planck satellite, which implies 𝐻 0 = 67.27 ± 0.60 km/s/Mpc (Aghanim et al. 2020a) in ΛCDM, and the direct measurements of Cepheidcalibrated Type Ia supernovae by the SH0ES project, which reports 𝐻 0 = 73.04 ± 1.04 km/s/Mpc (Riess et al. 2022a,b). While each observational method presents unique systematic challenges, it is unlikely that a single source of systematic error can entirely account for the Hubble tension because the significance of the tension ★ E-mail: rafaela.gsponer@port.ac.uk © 2023 The Authors remains relatively stable when any individual measurement is excluded. Therefore, the tension may instead be indicating limitations in the current standard model. For comprehensive reviews on the Hubble tension and specific measurement systematics, readers are referred to Di Valentino et al. (2021) and Abdalla et al. (2022), and references therein. Due to the robustness of the tension on the observational side, many proposals have been put forward to explain the Hubble tension by introducing new physics. Early-time solutions (models which alter the expansion history prior to recombination) as well as late-time solutions (models which alter the expansion history after recombination) have been extensively been studied; early-time solutions have demonstrated particular promise in alleviating the tension considering the current low redshift data, which tightly constrains the expansion history at 𝑧 ≲ 2 (Bernal et al. 2016; Aylor et al. 2019; Knox & Millea 2020; Camarena & Marra 2021; Schöneberg et al. 2022). A subclass of these early-time solutions that has gained much attention in recent years is early dark energy" 2312.01992v1,"Whence Nonlocality? Removing spooky action at a distance from the de Broglie Bohm pilot-wave theory using a time-symmetric version of de Broglie double solution Aurélien Drezet 1 1 Univ. Grenoble Alpes, CNRS, Grenoble INP, Institut Neel, F-38000 Grenoble, France ∗ Abstract In this work, we review and extend a version of the old attempt made by Louis de broglie for interpreting quantum mechanics in realistic terms, namely the double solution. In this theory quantum particles are localized waves, i.e, solitons, that are solutions of relativistic nonlinear field equations. The theory that we present here is the natural extension of this old work and relies on a strong time-symmetry requiring the presence of advanced and retarded waves converging on particles. Using this method, we are able to justify wave-particle duality and to explain the violations of Bell’s inequalities. Moreover, the theory recovers the predictions of the pilot-wave theory of de Borglie and Bohm, often known as Bohmian mechanics. As a direct consequence, we reinterpret the nonlocal action at a distance presents in the pilot-wave theory. In the double solution developed here there is fundamentally no action at a distance but the theory requires a form of superdeterminism driven by time-symmetry. ∗ Electronic address: aurelien.drezet@neel.cnrs.fr 1" 2312.02017v1,"A multi-channel cycleGAN for CBCT to CT synthesis Chelsea A. H. Sargeant [0000−0002−8737−4835] , Edward G. A. Henderson [0000−0003−3752−4054] , Dónal M. McSweeney [0000−0002−7099−8270] , Aaron G. Rankin [0000−0002−0386−1119] , and Denis Page [0009−0005−9015−180X]⋆ Division of Cancer Sciences, The University of Manchester chelsea.sargeant@postgrad.manchester.ac.uk Abstract. Image synthesis is used to generate synthetic CTs (sCTs) from on-treatment cone-beam CTs (CBCTs) with a view to improving image quality and enabling accurate dose computation to facilitate a CBCT-based adaptive radiotherapy workflow. As this area of research gains momentum, developments in sCT generation methods are difficult to compare due to the lack of large public datasets and sizeable variation in training procedure. To compare and assess the latest advancements in sCT generation, the SynthRAD2023 challenge provides a public dataset and evaluation framework for both MR and CBCT to sCT synthesis. Our contribution focuses on the second task, CBCT-to-sCT synthesis. By leveraging a multi-channel input to emphasize specific image features, our approach effectively addresses some of the challenges inherent in CBCT imaging, whilst restoring contrast necessary for accurate visualisation of patients anatomy. Additionally, we introduce an auxiliary fusion network to further enhance the fidelity of generated sCT images. Keywords: synthetic CT · multi-channel cycleGAN · CBCT quality 1 Introduction In photon and proton radiotherapy, on-treatment cone-beam computed tomography (CBCT) imaging plays a crucial role in detecting anatomical changes and ensuring accurate patient positioning for precise treatment setup [7]. However, CBCT image quality often suffers from artefacts such as scatter, noise and beam hardening, resulting in inferior image quality compared to planning CT (pCT) scans. These artefacts lead to inaccuracies in Hounsfield unit (HU) values, rendering CBCT images unsuitable for accurate dose calculation. To address these challenges, deep learning-based image synthesis techniques have been successfully employed to enhance CBCT image quality to a level comparable to CT scans. This involves using neural networks to discover a complex mapping between source (CBCT) and target (CT) image domains, enabling the generation of synthetic CT (sCT) images directly from CBCT data [9]. The primary objective is to produce sCT images that retain the anatomical structure ⋆ Authors listed in order of contribution." 2312.02036v1,"ON BI-IDEALS OF ORDERED FULL TRANSFORMATION SEMIGROUPS MINNUMOL P. K. AND P. G. ROMEO Department of Mathematics Cochin University of Science and Technology(CUSAT) Kochi, Kerala, India, 682022 Abstract. In this paper we describe the Green’s relations on the semigroup of bi-ideals of ordered full transformation semigroup B(T X ) in terms of Green’s relations of ordered full transformation semigroup T X . The bi-ideals of semigroups were introduced by R. A. Good and D.R. Hughes in 1952. It is a special case of the (m,n)-ideal introduced by S. Lajos who gave a characterization of semigroup by the set of their bi-ideals ( see cf.[3], [4], [5]). Further N. Kehayopulu studied the concept of bi-ideals in the case of ordered semigroups in [6] and [10] S. Mallick and K. Hansda introduced a semigroup B(S) of all bi-ideals of an ordered semigroup S and they gave different charecterizations of B(S) for different regular subclasses of S. In this paper we describe the Green’s relations on the semigroup of bi-ideals of an ordered full transformation semigroup. 1. Preliminaries First we recall definitions and results needed in the sequel. An ordered semigroup (S, ·, ≤) is a poset (S, ≤) as well as a semigroup (S, ·) such that for any a, b, x ∈ S, a ≤ b implies xa ≤ xb and ax ≤ bx. For A, B ⊆ S, AB = {ab | a ∈ A and b ∈ B} and (A] = {x ∈ S | (∃ a ∈ A) and x ≤ a} is called downward closure of A. E-mail address: pkminnumol@gmail.com, romeo − parackal@yahoo.com. 2020 Mathematics Subject Classification. 20M17, 20M12, 06F05. Key words and phrases. ordered semigroup, bi-ideals, natural partial order, full transformation semigroup, Green’s relations. First author wishes to thank Cochin University of Science And Technology for providing financial support. Second author wishes to thank Council of Scientific and Industrial Research(CSIR) INDIA, for providing financial support. 1" 2312.02084v1,"Aether-scalar field compactification and Casimir effect 1,2 K. E. L. de Farias, ∗ 1 M. A. Anacleto, † 1 E. Passos, ‡ 3 Iver Brevik, § 2 Herondy Mota, ¶ and 1 João R. L. Santos ∗∗ 1 Departamento de Física, Universidade Federal de Campina Grande, Caixa Postal 10071, 58429-900, Campina Grande, Paraíba, Brazil. 2 Departamento de Física, Universidade Federal da Paraíba, Caixa Postal 5008, João Pessoa, Paraíba, Brazil. and 3 Department of Energy and Process Engineering, Norwegian University of Science and Technology N-7491 Trondheim, Norway. In this study, we explore the impact of an additional dimension, as proposed in Kaluza-Klein’s theory, on the Casimir effect within the context of Lorentz invariance violation (LIV), which is represented by the aether field. We demonstrate that the Casimir energy is directly influenced by the presence of the fifth dimension, as well as by the aether parameter. Consequently, the force between the plates is also subject to variations of these parameters. Furthermore, we examine constraints on both the size of the extra dimension and the aether field parameter based on experimental data. The LIV parameter can provide insights into addressing the size-related challenges in Kaluza-Klein’s theory and offers a mean to establish an upper limit on the size of the extra dimension. This helps to rationalize the difficulties associated with its detection in current experiments. I. INTRODUCTION The possibility of extra dimensions has gained prominence in current physics models. It is often investigated as a solution to open problems that the standard model cannot answer. These problems include quantum gravity, since attempts to quantize gravity imply the existence of extra dimensions as a condition, the presence of dark matter in the universe, which remains poorly understood and undetected, and dark energy, which permeates the majority of the Universe. In this sense, Theodor Kaluza in 1921 [1] and Oskar Klein in 1926 [2], propose a theory (KK theory) that posits the existence of an extra dimension - a fifth dimension - in an attempt to find a unified theory for the fundamental forces of nature, specifically electromagnetism and gravity. This extra dimension is compactified, small enough to be hidden at macroscopic scales. Despite the recent attention, there is a problem involving the length, denoted here by b, of the extra dimension. In many theories, including the KK theory, the length b is predicted to be so small that it would make detection impossible, as it suggests a length near 10 −35 m (the Planck scale). At this length, only particles with energy near the Planck energy scale can access the extra dimension. To address this problem, Sean Carroll and Heywood Tam, propose the aether compactification theory as an alternative way to compactification in the presence of large extra dimensions without the introduction of branes to control the influence of a five-dimensional bulk space-time on the field content in our four-dimensional Universe. Differently from braneworlds, in this type of compactification there are no corrections to the four-dimensional Newtonian law [3]. However, the possibility of suppressing the Kaluza- Klein modes makes the mechanism efficient to guarantee a four-dimensional effective theory describing the physics of our Universe after the compactification process. The Lorentz-violating aether fields along extra dimensions affect the conventional Kaluza-Klein compactification scheme, since their interactions play a fundamental role in the mass splitting of the KK towers: the mass spacings between different states are now modified. That is, the large extra dimensions, even for very high KK modes could, in principle, be accessible to a four-dimensional observer. Several studies with the aether field, both in four dimensions and in extra dimensions, have been developed over the past few years [4–11]. The main goal of the present study is to investigate the implications, on the Casimir effect, of the aether field with expectation value aligned along the extra dimension. One of the models frequently employed in the literature, and among the simplest, involves an extra dimension compactified into a circle of length b [12–14]. The mere presence of this single extra dimension provides us with ways to detect it indirectly. One phenomenological manifestation of this extra dimension can be observed in the vacuum energy density, which can be modified in order to be appreciable at a potentially detectable scale. The method to detect this energy is through the famous Casimir effect [15], where it exerts an attractive or repulsive force between ∗ klecio.lima@uaf.ufcg.edu.br † anacleto@df.ufcg.edu.br ‡ passos@df.ufcg.edu.br § iver.h.brevik@ntnu.no ¶ hmota@fisica.ufpb.br ∗∗ joaorafael@df.ufcg.edu.br" 2312.02115v1,"Exact solutions of Cotton Gravity Roberto A. Sussman ∗ and Sebastián Nájera † Instituto de Ciencias Nucleares, Universidad Nacional Autónoma de México, Circuito Exterior C.U., A.P. 70-543, México D.F. 04510, México. We examine various exact solutions in “Cotton Gravity” (CG), a new gravity theory that provides an extension of General Relativity (GR) based on the Cotton tensor. Using an alternative formulation of the field equations in terms of a Codazzi tensor, we obtain various non-trivial CG exact solutions that generalize known GR solutions: FLRW cosmologies, Lemaı̂tre-Tolman-Bondi (LTB) and Szekeres dust solutions, as well as static perfect fluid spheres and solutions with a shear-free 4 velocity. We show that CG modifies the spatial curvature of the nonstatic GR solutions, allowing for significant changes in the dynamics, an evolution from initial deceleration to a late time accelerated cosmic expansion driven by negative spatial curvature and without assuming a dark energy source or imposing a cosmological constant. In fact, the cosmological constant emerges naturally as an integration constant incorporated into the modified spatial curvature and can be characterized as the case with constant negative spatial curvature. Static fluid spheres in the weak field regime of CG allow for modeling the flattening of rotation velocities in galactic systems without assuming dark matter. The methods we have presented can be improved to be able to obtain more general solutions that will facilitate the application of CG to current open problems in gravitational systems in general. I. INTRODUCTION .- Dark sector sources (dark matter and dark energy) are essential for the compatibility between cosmological observations, the Copernican principle at large scales and cosmic dynamics as determined by General Relativity (GR). However, detection of these sources and the understanding of their fundamental has remained elusive. This has motivated the search of gravity theories alternative to GR. In 2021 Harada [1] proposed a new gravity theory that generalizes GR through the rank-3 Cotton tensor [2, 3]. He showed that all solutions of GR are also solutions of “Cotton Gravity” theory (henceforth CG theory), but there are non-trivial CG solutions not reducible or equivalent to GR solutions (see Harada’s response [4] to a critical comment [5]). As a first non-trivial solution, Harada derived a Schwarzschild CG analogue that follows as a spherically symmetric vacuum solution. In a follow up article [6] Harada showed that the Newtonian limit of CG allows for fitting galactic rotation curves without assuming the existence of dark matter. The main problem with Harada’s formulation of CG is its inability to obtain non-trivial solutions for non-vacuum conformally flat spacetimes characterized by a vanishing Weyl tend sor, since the Cotton tensor C abc = −4∇ d C abc vanishes automatically if the Weyl tensor vanishes [7]. An alternative formulation of the field equations of CG was found by Mantica and Molinary [8] in terms of the constraints for a symmetric tensor formed with the Ricci and energy momentum tensors of GR to be a Codazzi ∗ Electronic address: sussman@nucleares.unam.mx † Electronic address: najera.sebastian@ciencias.unam.mx tensor. These authors further discussed the compatibility between Codazzi tensors, CG and various assumptions of sources and their connection with known GR solutions. Since in this formulation it is not necessary to compute beforehand the Cotton tensor, it can be applied to all conformally flat spacetimes. In the present article we adapt (to make it more intuitive) the parametrization of CG field equations proposed by Mantica and Molinary [8]. Our aim is not to present realistic spacetimes, but to illustrate the potential of CG as an extension of GR by generating non-trivial CG solutions from solutions of GR. Evidently, looking at the feasibility of CG requires much more research beyond the results we have presented. We use first the parametrization of CG to reproduce the Schwarzchild CG analogue found in [1]. We present then Friedman-Lemaı̂tre-Robertson- Walker (FLRW) models reported in an accompanying paper [9], as well as CG solutions that generalize inhomogeneous GR solutions: Lemaı̂tre-Tolman-Bondi (LTB) and quasi-spherical Szekeres dust models, spherically symmetric static perfect fluid spheres, as well as perfect fluid solutions with a shear-free 4-velocity (which [8] denote as “Generalized Stephani” solutions). The non-static CG solutions we found modify the spatial curvature of their GR analogues, an important degree of freedom absent in GR that introduces a significant modification of the dynamics. In particular, an accelerated expansion is possible in FLRW and LTB dust models, without assuming a dark energy source. The specific ΛCDM model can be identified as the unique FLRW dust model in CG with constant negative spatial curvature (constant Ricci scalar of hypersurfaces orthonormal to the 4-velocity). In the case of static spheres, we show that rotation curves in the fluid region can exhibit a flattened profile without assuming dark matter, complementing the results of Harada in [6] in fitting rotational velocity profiles of 84 galactic systems through" 2312.02128v1,"Can we truly transfer an actor’s genuine happiness to avatars? An investigation into virtual, real, posed and spontaneous faces Vitor Miguel Xavier Peres, Greice Pinho Dal Molin and Soraia Raupp Musse Email: {vitor.peres,greice.molin}@edu.pucrs.br, soraia.musse@pucrs.br School of Technology Pontifical Catholic University of Rio Grande do Sul Porto Alegre, Brazil ABSTRACT “A look is worth a thousand words” is a popular phrase. And why is a simple look enough to portray our feelings about something or someone? Behind this question are the theoretical foundations of the field of psychology regarding social cognition and the studies of psychologist Paul Ekman. Facial expressions, as a form of nonverbal communication, are the primary way to transmit emotions between human beings. The set of movements and expressions of facial muscles that convey some emotional state of the individual to their observers are targets of studies in many areas. Our research aims to evaluate Ekman’s action units (AU) in datasets of real human faces, posed and spontaneous, and virtual human faces resulting from transferring real faces into Computer Graphics (CG) faces. In addition, we also conducted a case study with specific movie characters, such as She-Hulk and Genius. We intend to find differences and similarities in facial expressions between real and CG datasets, posed and spontaneous faces, and also to consider the actors’ genders in the videos. This investigation can help several areas of knowledge, whether using real or virtual human beings, in education, health, entertainment, games, security, and even legal matters. Our results indicate that AU intensities are greater for posed than spontaneous datasets, regardless of gender. Furthermore, there is a smoothing of intensity up to 80% for AU6 and 45% for AU12 when a real face is transformed into CG. CCS CONCEPTS • Computing methodologies → Animation; Image-based rendering; Perception; Reconstruction; 3D imaging. KEYWORDS Action Units; Facial Expression; 3D facial, CG Faces, Virtual, Real, Posed, Spontaneous ACM Reference Format: Vitor Miguel Xavier Peres, Greice Pinho Dal Molin and Soraia Raupp Musse, Email: {vitor.peres,greice.molin}@edu.pucrs.br, soraia.musse@pucrs.br. 2023. Can we truly transfer an actor’s genuine happiness to avatars? An investigation into virtual, real, posed and spontaneous faces. In 22nd Brazilian Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SBGames 2023, November 6-9, 2023, Rio Grande (RS), Brazil © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-1627-0/23/06. . . $15.00 https://doi.org/10.1145/3631085.3631231 Symposium on Games and Digital Entertainment (SBGames 2023), June 11- September 11, 2023, Rio Grande (RS), Brazil. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3631085.3631231 1 INTRODUCTION Expressing emotions is a crucial component of face-to-face communication, as highlighted in a seminal study by psychologist Ekman et al. [1]. As a result, our perception as humans is critical regarding the facial expressions of virtual humans and even robots. Studies on human facial expressions are essential in creating more realistic features for game and movie characters, enhancing user experiences. To this end, performance-driven animations [2, 3] have been employed in the game and movie industries to transfer facial motion from real actors to virtual characters. While evaluating such characters typically occurs through movie and game reviews via audience opinions, this paper aims to investigate how the transformation between the real and virtual domains takes place. For instance, is a real human face movement truly represented when transferred to a virtual face? So, the main investigation we intend to pursue in this work concerns the difference/similarities between real and correspondent CG faces. Numerous researchers have explored facial expression analysis. Barrett et al. [4] conducted a literature review of the six categories of emotions, showing how people move their faces during various emotional states and assessing which emotions can be inferred from facial movements. This study is called emotional perception. Park et al.’s [5] work with real faces has shown that spontaneous smiles have higher intensity in the Upper face region (eyes) than the Lower face (nose and mouth), whereas posed smiles have more intense Lower-face activation. Through the extraction of the Facial Action Coding System (FACS) [6], a comprehensive anatomical taxonomy designed to categorize all facial movements (consisting of 46 distinct Action Unit) and the union of these movements (Action Unit) given a target emotion, it becomes possible to distinguish between posed and spontaneous images by quantifying the relative intensity of Upper and Lower facial expressions [5]. According to Mäkäräinen et al. [7], simplifying facial expressions in the transfer from real to Computer Graphics (CG) domains can provide artists with greater freedom to enhance the final facial expression. The authors also believe that reducing realism can decrease emotional intensity in facial expressions, and exaggeration can compensate for this reduction. In this work, we aim to compare real and correspondent CG faces when expressing happiness, according to ANOVA and Pearson Correlation metrics. Firstly, we want to analyze the discrete activation of AUs in the Upper and Lower face regions, as proposed by Park et" 2312.02129v1,"December 5, 2023 Meromorphic CFTs have central charges c = 8N: a proof by the MLDE approach Arpit Das 1, 2, ∗ 1 School of Mathematics, University of Edinburgh, EH9 3FD, U.K. 2 Higgs Centre for Theoretical Physics, University of Edinburgh, Edinburgh, EH8 9YL, U.K. Abstract In this short note, we present a simple and elementary proof that meromorphic conformal field theories (CFTs) have central charges of the form: c = 8N with N ∈ N (the set of natural numbers) using the modular linear differential equations (MLDEs) approach. We first set up the 1-character MLDE for arbitrary value of the Wronskian index: ℓ. From this we get the general form of the meromorphic CFT’s character. We then study its modular transformations and the asymptotic value of it’s Fourier coefficients to conclude that odd values of ℓ make the character in-admissible implying that the central charge for admissible character has to be a multiple of 8. ∗ Electronic address: arpit.das@ed.ac.uk 1" 2312.02153v1,"Aligning and Prompting Everything All at Once for Universal Visual Perception Yunhang Shen 1 , Chaoyou Fu 1 , Peixian Chen 1 , Mengdan Zhang 1 Ke Li 1 , Xing Sun 1 , Yunsheng Wu 1 , Shaohui Lin 2 , Rongrong Ji 3 1 Tencent Youtu Lab 2 School of Computer Science and Technology East China Normal University, Shanghai, China 3 Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, Xiamen University, China {shenyunhang01, bradyfu24}@gmail.com, shlin@cs.ecnu.edu.cn, rrji@xmu.edu.cn {davinazhang, peixianchen, tristanli, winfredsun, simonwu}@tencent.com Abstract Vision foundation models have been explored recently to build general-purpose vision systems. However, predominant paradigms, driven by casting instance-level tasks as an object-word alignment, bring heavy cross-modality interaction, which is not effective in prompting object detection and visual grounding. Another line of work that focuses on pixel-level tasks often encounters a large annotation gap of things and stuff, and suffers from mutual interference between foreground-object and background-class segmentation. In stark contrast to the prevailing methods, we present APE, a universal visual perception model for aligning and prompting everything all at once in an image to perform diverse tasks, i.e., detection, segmentation, and grounding, as an instance-level sentence-object matching paradigm. Specifically, APE advances the convergence of detection and grounding by reformulating language-guided grounding as open-vocabulary detection, which efficiently scales up model prompting to thousands of category vocabularies and region descriptions while maintaining the effectiveness of cross-modality fusion. To bridge the granularity gap of different pixel-level tasks, APE equalizes semantic and panoptic segmentation to proxy instance learning by considering any isolated regions as individual instances. APE aligns vision and language representation on broad data with natural and challenging characteristics all at once without task-specific fine-tuning. The extensive experiments on over 160 datasets demonstrate that, with only one-suit of weights, APE outperforms (or is on par with) the state-of-the-art models, proving that an effective yet universal perception for anything aligning and prompting is indeed feasible. Codes and trained models are released at https://github.com/shenyunhang/APE. Figure 1. APE supports prompting thousands of things, stuff, and sentences in a single forward pass and performing various segmentation without granularity discrepancy. APE achieves new stateof-the-art or competitive performance on over 160 datasets with one suite of parameters. 1. Introduction Developing vision systems that recognize and localize a wide range of basic concepts and can be transferable to novel concepts or domains, has emerged as an important research topic in the community. In light of the strong 1" 2312.02161v1,"Efficient LDPC Decoding using Physical Computation Uday Kumar Reddy Vengalam, Andrew Hahn, Yongchao Liu, Anshujit Sharma, Hui Wu, and Michael Huang Department of Electrical and Computer Engineering, University of Rochester {uvengala, ahahn7, yongchao.liu, ashar36, hui.wu, michael.huang}@rochester.edu Abstract— Due to 5G deployment, there is significant interest in LDPC decoding. While much research is devoted on efficient hardwiring of algorithms based on Belief Propagation (BP), it has been shown that LDPC decoding can be formulated as a combinatorial optimization problem, which could benefit from significant acceleration of physical computation mechanisms such as Ising machines. This approach has so far resulted in poor performance. This paper shows that the reason is not fundamental but suboptimal hardware and formulation. A co-designed Ising machine-based system can improve speed by 3 orders of magnitude. As a result, a physical computation approach can outperform hardwiring stateof-the-art algorithms. In this paper, we show such an augmented Ising machine that is 4.4× more energy efficient than the state of the art in the literature. Index Terms—Ising model, QUBO, Min-Sum algorithm I. I NTRODUCTION Error-correcting codes (ECCs) are essential in detecting and correcting errors in modern communication and storage infrastructures. The central idea of any ECC is to encode redundant information into the message sent. The redundancy allows the receiver to deal with a limited number of errors induced by the communication channel or storage media. There have been many ECCs introduced in literature, such as Hamming codes [1], convolutional codes [2], polar codes [3], turbo codes [4], etc. However, among them, low density parity check (LDPC) codes [5] have become more popular due to their ability to achieve the Shannon limit [6]. Recently they have been introduced in the 5G-NR standard along with Polar codes [7]. Decoding LDPC is at the moment computationally intensive. Perhaps the most popular approach to LDPC decoding is a Belief Propagation (BP) type algorithm. More specifically, more than 200 ASIC designs have been discussed in literature [8], [9] all using some variant of the Min-Sum algorithm [10], where an approximation is applied to the canonical BP algorithm to reduce computational intensity. An alternative approach to LDPC decoding is to treat it as a combinatorial optimization problem (COP). Algorithmically, Min-Sum variants are far more efficient than a typical COP solver when targeting real-world LDPC decoding. However, the latter can benefit from orders-of-magnitude acceleration from emerging hardware Ising machines [11]–[13]. Indeed, one such design using D-Wave’s quantum annealer was found to outperform an FPGA-based implementation of a variant of BP [14]. Nevertheless, LDPC decoding using Ising machines is not yet competitive with the state-of-the-art ASIC designs hardwiring Min-Sum algorithm. Depending on the details of the custom hardware, these ASICs can expect a decoder throughput of roughly 0.13 - 271Gbps, with a power consumption of 5mW - 12W. Using D-Wave hardware to solve an LDPC decoding problem today can only achieve 21 Mb/s throughput, not to mention the kilo-watt power consumption. Of course, part of that is specific to D-Wave hardware. But there are intrinsic reasons as well. In this paper, we change this picture and show an efficient LDPC decoder based on physical computation with the following contributions: 1) Fundamental analysis: we show an important factor prohibiting out-performance is in current problem formulation when mapping to an Ising machine. 2) Co-designed architecture: We address this problem by proposing a novel, co-designed Ising machine architecture that allows better expressivity of the target problem. 3) Evaluation: Using detailed simulation, we show decoding throughput of 81 Gbits/sec and a power consumption of 158.24mW, representing at least 4 times reduction in energy compared to state-of-the-art decoder ASICs for 5G standards. II. B ACKGROUND AND R ELATED W ORK We first discuss the communication model assumed. We then discuss LDPC codes and the Ising model. A. Communication model In a general communication system, a message M is first encoded using an encoder into a code word C. This code word is modulated using a modulator into the signal to be sent. While being transmitted, the signal gets affected by noise present in the channel. The received signal is then demodulated and decoded to recover the original message M , hopefully error free. N M k bits C Encoder n bits Bits to symbols mapper S n symbols Channel (AWGN) R R= S+N Decoder ! 𝑪 n bits Figure 1. Schematic diagram of communication system. In this paper, we assumed a discrete communication system (Fig. 1), where a binary message M with k-bit is encoded into an n-bit code word C using a (k, n) LDPC code. This" 2312.02169v1,"Neutrosophic Systems with Applications , Vol. 9, 2023 https://doi.org/10.61356/j.nswa.2023.68 Pura Vida Neutrosophic Algebra Ranulfo Paiva Barbosa (Sobrinho) 1, * 1 and Florentin Smarandache 2 Web3 Blockchain Entrepreneur; 37 Dent Flats, Monte de Oca, 11501, San José, Costa Rica; ranulfo17@gmail.com. 2 Math and Science Department, University of New Mexico, Gallup, NM, 87301, USA; smarand@unm.edu. * Correspondence: ranulfo17@gmail.com. Abstract: We introduce Pura Vida Neutrosophic Algebra, an algebraic structure consisting of neutrosophic numbers equipped with two binary operations namely addition and multiplication. The addition can be calculated sometimes with the function min and other times with the max function. The multiplication operation is the usual sum between numbers. Pura Vida Neutrosophic Algebra is an extension of both Tropical Algebra (also known as Min-Plus, or Min-Algebra) and Max-Plus Algebra (also known as Max-algebra). Tropical and Max-Plus algebras are algebraic structures included in semirings and their operations can be used in matrices and vectors. Pura Vida Neutrosophic Algebra is included in Neutrosophic semirings and can be used in Neutrosophic matrices and vectors. Keywords: Tropical Algebra; Max-Plus Algebra; Pura Vida Neutrosophic Logic; Neutrosophic Number. 1. Introduction Uncertain, indeterminacy, imprecise, and vague are common characteristics of data in real-life problems like decision-making, engineering, computer science, finance, etc. Several theories have been proposed to deal with these data characteristics, fuzzy set theory [1], intuitionistic fuzzy sets [2], rough set theory [3], Soft set [4], and Neutrosophy theory [5]. Since Smarandache introduced Neutrosophy to study the basis, nature, and range of neutralities as well as their contact with ideational spectra in the 1990s, we have seen the emergence of neutrosophic algebraic structures [6], neutrosophic probability and statistics [7, 8] neutrosophic numbers [8], single-valued neutrosophic sets (SVNSs) [9, 21], and several algebraic structures such as neutrosophic semirings [10], among others theoretical advances [11] and also applications [12]. Through neutrosophic semirings, we introduce Pura Vida (PV) Neutrosophic Algebra, an algebraic structure consisting of neutrosophic numbers equipped with two binary operations namely addition and multiplication. Pura Vida Neutrosophic Algebra is an extension of both Tropical Algebra (also known as Min-Plus) [13] and Max-Plus Algebra [14]. Both Tropical and Max-Plus algebra are algebraic structures included in semirings and were discovered independently by several researchers [13, 14]. They were defined on the real number domain and for the first time, we extended them to the neutrosophic domain. 2. Preliminaries 2.1. Semiring A semiring [15] denoted (V, ⊕, ⊗, 0, 1 ) is a set V equipped with two binary operations, addition: ⊕ : V x V → V And multiplication: Ranulfo Paiva Barbosa and Florentin Smarandache, Pura Vida Neutrosophic Algebra" 2312.02193v1,"Article A new promising material for biological applications: multilevel physical modification of AgNPs-decorated PEEK Jana Pryjmaková 1 , Daniel Grossberger 1 , Anna Kutová 1 , Barbora Vokatá 2 , Miroslav Šlouf 3 , Petr Slepička 1, *, and Jakub Siegel 1 Department of Solid-State Engineering, University of Chemistry and Technology Prague, 166 28 Prague, Czech Republic; jana.pryjmakova@vscht.cz (J.P.), dan.grossberger@seznam.cz (D.G.), kutovaa@vscht.cz (A.K.), jakub.siegel@vscht.cz (J.S.) 2 Department of Microbiology, University of Chemistry and Technology Prague, 166 28 Prague, Czech Republic; vokataa@vscht.cz 3 Institute of Macromolecular Chemistry, Academy of Sciences of the Czech Republic, Heyrovského nám. 2, 162 06 Prague, Czech Republic; slouf@imc.cas.cz * Correspondence: petr.slepicka@vscht.cz; Tel.: +420-220-445-162 1 Citation: Lastname, F.; Lastname, F.; Lastname, F. Title. Nanomaterials 2023, 11, x. https://doi.org/10.3390/xxxxx Academic Editor: Firstname Last- name Abstract: : In the case of polymer medical devices, the surface design plays a crucial role in contact with human tissue. The use of AgNPs as antibacterial agents is well known; however, their anchoring into the polymer surface can still be investigated. This work describes the change in surface morphology and behaviour in the biological environment of polyetheretherketone (PEEK) with immobilised AgNPs after different surface modifications. The initial composites were prepared by immobilisation of silver nanoparticles from a colloid solution into the upper surface layers of polyetheretherketone (PEEK). The prepared samples (Ag/PEEK) had a planar morphology and were further modified with a KrF laser, a GaN laser, and Ar plasma. The samples were studied using the AFM method to visualise changes in surface morphology and to obtain information on the height of the structures and other surface parameters. Comparative analysis of the nanoparticles and polymers was performed using FEG-SEM. The chemical composition of the surface of the samples and optical activity were studied by XPS and UV-Vis spectroscopy. Finally, drop plate antibacterial and cytotoxicity tests were performed to determine the role of Ag nanoparticles after modification and suitability of the surface, which are important for the use of the resulting composite in biomedical applications. Keywords: polyetheretherketone, immobilisation, physical modification, nanostructures, antibacterial properties, biocompatibility Received: date Accepted: date Published: date 1. Introduction Publisher’s Note: MDPI stays neu- tral with regard to jurisdictional claims in published maps and institu- tional affiliations. Copyright: © 2021 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). In recent years, the field of biomedical engineering has witnessed remarkable advances in material science, particularly in the development of novel surface modification techniques to enhance the functionality and performance of biomedical devices. One such material that has gained significant attention is polyetheretherketone (PEEK). With its excellent mechanical properties, biocompatibility, and resistance to harsh environments, PEEK has emerged as a promising candidate for various biomedical applications [1-3]. However, to further expand its potential in the healthcare sector, researchers have been exploring strategies to improve its antibacterial properties, as microbial colonisation remains a persistent challenge in medical devices. The anchoring of AgNPs to the polymer surface can be achieved through various methods, including chemical reduction, physical deposition, or in situ preparation [4-7]. One of the effective methods for anchoring AgNPs is their immobilisation into the polymer near the surface with an excimer laser. This kind of composite represents a long-term Nanomaterials 2021, 11, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/nanomaterials" 2312.02195v1,"Cancer Subtype Identification through Integrating Inter and Intra Dataset Relationships in Multi-Omics Data M. Peelen 1 , L. Bagheriye 2 , Member, IEEE and J. Kwisthout 3 1,2,3 Donders Institute for Brain, Cognition and Behaviour, Radboud University Nijmegen, P.O. Box 9104, 6500HE Nijmegen, Netherlands. Corresponding author: L.Bagheriye Author (Leila.Bagheriye@donders.ru.nl). ABSTRACT The integration of multi-omics data has emerged as a promising approach for gaining comprehensive insights into complex diseases such as cancer. This paper proposes a novel approach to identify cancer subtypes through the integration of multi-omics data for clustering. The proposed method, named LIDAF utilises affinity matrices based on linear relationships between and within different omics datasets (Linear Inter and Intra Dataset Affinity Fusion (LIDAF)). Canonical Correlation Analysis is in this paper employed to create distance matrices based on Euclidean distances between canonical variates. The distance matrices are converted to affinity matrices and those are fused in a three-step process. The proposed LIDAF addresses the limitations of the existing method resulting in improvement of clustering performance as measured by the Adjusted Rand Index and the Normalized Mutual Information score. Moreover, our proposed LIDAF approach demonstrates a notable enhancement in 50% of the log 10 rank p-values obtained from Cox survival analysis, surpassing the performance of the best reported method, highlighting its potential of identifying distinct cancer subtypes. INDEX TERMS Affinity matrix, Cancer subtype identification, Data fusion, Multi-omics. I. INTRODUCTION Cancer subtype diagnosis is a field of critical importance, as accurate identification empowers medical professionals to make informed decisions regarding the most suitable treatment options, thereby maximizing the likelihood of achieving favourable patient outcomes [1]. Over the past two decades, significant efforts have been made to identify cancer subtypes through, for example, the exploration of gene expressions and genomics in cancer cells, which have provided valuable insights into studying organisms at the DNA and RNA levels [2]. To gather this information and mitigate the challenges arising from the disparity between the number of samples and the high dimensionality of features, multiple omics datasets of the same type are merged to generate a single omics dataset. This, however, introduces heterogeneity and more complexity in the data, which could invoke the “Curse of Dimensionality” [3]. For this paper, omics data is obtained from The Cancer Genome Atlas (TCGA), which is a comprehensive source that encompasses gene expressions, miRNA, and DNA methylation, spanning across various cancer types [4-7]. Gene expressions includes protein-coding genes, noncoding RNA genes and pseudogenes [8]. Analysing this type of data provides insight into the dysregulation of genes associated with specific types of cancer. The strength of the dataset lies in the inclusion of differentially expressed genes, which improves the reliability of gene identification and allows a better understanding of molecular changes associated with specific types of cancer. Another omics type used in this paper is miRNA. miRNA is a small type of RNA that does not encode proteins but has a significant impact on gene expressions. In the context of cancer, miRNA expressions are often impaired. This disruption can occur through several mechanisms, including amplification or deletion of miRNA genes, irregular control of transcription, or disruptions in epigenetic modifications [9]. As a result, miRNA shows potential as a biomarker for clinical applications. DNA methylation represents the third type of omics utilized in this paper. It serves as an important mechanism playing a crucial role in regulating gene expressions in both normal and cancer cells [10]. Dysregulation of DNA methylation can lead to inappropriate silencing of tumour suppressor genes or the activation of oncogenes, contributing to cancer development and progression. Initially, most approaches for identifying cancer subtypes relied on distinct biological characteristics or clinical outcomes, but were constrained by using only a single omics type. As a result, these methods struggled to provide a comprehensive description of the organism’s clinical" 2312.02199v1,"USat: A Unified Self-Supervised Encoder for Multi-Sensor Satellite Imagery Jeremy Irvin * , Lucas Tao * , Joanne Zhou, Yuntao Ma, Langston Nashold, Benjamin Liu, Andrew Y. Ng Stanford University {jirvin16,lucastao,joannezhou,yunt.ma,lnashold,bencliu,ayn}@stanford.edu Abstract Large, self-supervised vision models have led to substantial advancements for automatically interpreting natural images. Recent works have begun tailoring these methods to remote sensing data which has rich structure with multi-sensor, multi-spectral, and temporal information providing massive amounts of self-labeled data that can be used for self-supervised pre-training. In this work, we develop a new encoder architecture called USat that can input multi-spectral data from multiple sensors for self-supervised pre-training. USat is a vision transformer with modified patch projection layers and positional encodings to model spectral bands with varying spatial scales from multiple sensors. We integrate USat into a Masked Autoencoder (MAE) self-supervised pre-training procedure and find that a pre-trained USat outperforms state-of-theart self-supervised MAE models trained on remote sensing data on multiple remote sensing benchmark datasets (up to 8%) and leads to improvements in low data regimes (up to 7%). Code and pre-trained weights are available at https://github.com/stanfordmlgroup/USat. 1. Introduction The development of AI techniques for interpreting remotely sensed imagery has the potential to enable large-scale solutions for many domains with significant societal impact, including agriculture [19, 31], energy [35], climate and weather prediction [3], disaster response [21], and sustainable development [5]. The biggest bottleneck to building and deploying these technologies is their dependency on labeled data, which substantially prohibits the development of such technologies for new regions and new tasks [26, 45]. The recent success of natural image and text foundation models in substantially reducing the need for labeled data presents a clear opportunity to adapt similar techniques to remotely sensed imagery [22, 27]. Foundation models are commonly pre-trained in a self-supervised fashion with large amounts of unlabeled data and subse- * Equal contribution. quently fine-tuned for new tasks with limited labeled data [4]. The rich structure of remotely sensed imagery with multi-sensor, multi-spectral, and temporal data provides an immense amount of information that can be leveraged by self-supervised learning. Furthermore, this data is rapidly growing, with petabytes of new data generated each day and only increasing due to new satellites with higher coverage and finer spatial, spectral, and temporal resolutions [34]. Several prior works have begun leveraging the incredible amounts of remotely sensed imagery to build selfsupervised approaches. Many of these studies developed contrastive learning approaches for remote sensing data [42], where positive pairs are constructed using vanilla image augmentations [23, 40], geographic proximity [17, 18, 20], views from multiple sensors [7, 15, 16, 39], temporal imagery capturing the same geo-location [1, 29], and contrasting geo-tagged images with their geo-locations [28]. These methods have been shown to be effective for many different types of tasks and sensors, but depend on defining positive pairs which is often unclear how to do and can lead to harmful invariances in some cases [43]. Masked autoencoding (MAE) methods for remotely sensed imagery have emerged more recently, including a model to leverage temporal and multi-spectral imagery [9], an approach to incorporate scale-specific information in the model using an additional positional encoding [33], a method which combines the MAE objective with a teacher-student distillation objective [30], and approaches designed for hyperspectral imagery [14, 36]. The vast majority of previous selfsupervised approaches for remotely sensed imagery learn encoders that input images from a single sensor (e.g. a single satellite product) thereby limiting their practical use and performance, a result we demonstrate in this work. Developing self-supervised methods that can leverage data from multiple sensors has the potential to provide additional self-supervision and allow for more tailored adaptation to downstream tasks. The success of contrastive learning methods which leverage multi-sensor views provides evidence that self-supervision from more than one sensor improves upon single sensor approaches [7, 15, 16, 39]. SatMAE can naturally be extended to multiple sensors by" 2312.02201v1,"ImageDream: Image-Prompt Multi-view Diffusion for 3D Generation Peng Wang Yichun Shi ByteDance, USA {peng.wang, yichun.shi}@bytedance.com Magic123 Reconstructed MVDream Ghost eating burger Ghost eating burger ImageDream Input Ghost eating burger Figure 1. ImageDream is a novel framework that generates high quality 3D model from any viewpoint given a single image. It vastly improves the 3D geometry quality comparing to previous SoTA, e.g. Magic123 [31], and more importantly, it inherits the great text image alignment from the generated image-prompt, comparing with MVDream [37]. Here, we provide 8 views of a generated object from different methods, and in the last row, we show the corresponding normal maps rendered with ImageDream generated model. Abstract 1. Introduction In the domain of 3D generation, incorporating images as an additional modality for 3D generation, compared to methods relying solely on text [30], offers significant advantages, as the common saying, An image is worth a thousand words. Primarily, images convey rich, precise visual information that text might ambiguously describe or entirely omit. For instance, subtle details like textures, colors, and spatial relationships can be directly and unambiguously captured in an image, whereas a text description might struggle to convey the same level of detail comprehensively or might require excessively lengthy descriptions. This visual specificity aids in generating more accurate and detailed 3D models, as the system can directly reference actual visual cues rather than interpret textual descriptions, which can vary greatly in detail and subjectivity. Moreover, using images allows for a more intuitive and direct way for users to communicate their desired outcomes, particularly for those who may find it challenging to articulate their visions textually. This multimodal approach, combining the richness of vi- We introduce ImageDream, a novel Image-Prompt Multi-view diffusion model devised for 3D object generation. ImageDream excels in delivering 3D models of superior quality comparing with other State-of-the-Art (SoTA) image-conditioned endeavors. Specifically, we consider a canonical camera coordination of the object in image rather than relative. This enhancement significantly augments the visual geometry correctness. Our models are meticulously crafted, taking into account varying degrees of control granularity derived from the provided image: wherein, the global control predominantly influences the object layout, whereas the local control adeptly refines the image appearance. The prowess of ImageDream is empirically showcased through a comprehensive evaluation predicated on a common prompt list as delineated in MVDream [37]. Our project page is https://Image-Dream.github.io. 1" 2312.02206v1,"Axiomatic Preference Modeling for Longform Question Answering Corby Rosset, Guoqing Zheng, Victor Dibia, Ahmed Awadallah, Paul Bennett Microsoft Research corbyrosset, zheng, victordibia hassanam, pauben@microsoft.com Abstract The remarkable abilities of large language models (LLMs) like GPT-4 partially stem from posttraining processes like Reinforcement Learning from Human Feedback (RLHF) involving human preferences encoded in a reward model. However, these reward models (RMs) often lack direct knowledge of why, or under what principles, the preferences annotations were made. In this study, we identify principles that guide RMs to better align with human preferences, and then develop an axiomatic framework to generate a rich variety of preference signals to uphold them. We use these axiomatic signals to train a model for scoring answers to longform questions. Our approach yields a Preference Model with only about 220M parameters that agrees with gold humanannotated preference labels more often than GPT-4. The contributions of this work include: training a standalone preference model that can score human- and LLM-generated answers on the same scale; developing an axiomatic framework for generating training data pairs tailored to certain principles; and showing that a small amount of axiomatic signals can help small models outperform GPT-4 in preference scoring. We release our model on huggingface. 1 Introduction Recent advances in large language models (LLMs) has seen the introduction of diverse post-training strategies, including Reinforcement Learning from Human Feedback (RLHF) and Reinforcement Learning from AI Feedback (RLAIF). These techniques have helped bridge the “alignment gap” between the responses of raw pretrained language models and responses that resonate more closely with human preferences (Bai et al., 2022b; Ziegler et al., 2020). These techniques steer LLMs to prefer one response over another based on feedback signals from either human annotators, or from another LLM instructed to follow certain principles (Bahdanau et al., 2019; Kwon et al., 2023; Sun et al., Top Voted Human Answers (5764) ChatGPT Answers (5564) 2 0 2 Naive Preference Model Score 2 0 2 2 0 2 Axiomatic Preference Model Score Related Answers (10000) Top Upvoted Answers (5764) 2 0 2 Naive Preference Model Score Axiomatic Preference Model Score Figure 1: A naive preference model trained on upvotes alone is not aligned e.g., ChatGPT answers that are rated highly by humans are given low scores. An axiomatic preference model addresses this and other gaps. 2023). RLHF in particular involves the construction of a “reward model” (RM) which is trained to encode these human preferences and output a scalar score for any given response (Christiano et al., 2023; Stiennon et al., 2022; Beeching et al., 2023; Ouyang et al., 2022). Primarily, a RM-based approach to training LLMs separates what to learn from how to learn it (Leike et al., 2018). The problem with most RMs used in RLHF posttraining is that they are taught to regress a single scalar preference score annotated by humans without clear knowledge of why they made that decision or what principles they operated under. We term models trained in this fashion as naive preferencemodels. Furthermore, the underlying preference pairs used to train the RM do not come from diverse sources, often being sampled from the same" 2312.02213v1,"JarviX: A LLM No code Platform for Tabular Data Analysis and Optimization Shang-Ching Liu 1,3,† , ShengKun Wang 2,3,† , Wenqi Lin 3 , Chung-Wei Hsiung 3 , Yi-Chen Hsieh 3 , Yu-Ping Cheng 3 , Sian-Hong Luo 3 ,Tsungyao Chang 3 , Jianwei Zhang* 1 1 Department of Computer Science, University of Hamburg 2 Department of Computer Science, Virginia Tech 3 Synergies Intelligent Systems, Inc. jianwei.zhang@uni-hamburg.de Abstract In this study, we introduce JarviX, a sophisticated data analytics framework. JarviX is designed to employ Large Language Models (LLMs) to facilitate an automated guide and execute high-precision data analyzes on tabular datasets. This framework emphasizes the significance of varying column types, capitalizing on state-of-the-art LLMs to generate concise data insight summaries, propose relevant analysis inquiries, visualize data effectively, and provide comprehensive explanations for results drawn from an extensive data analysis pipeline. Moreover, JarviX incorporates an automated machine learning (AutoML) pipeline for predictive modeling. This integration forms a comprehensive and automated optimization cycle, which proves particularly advantageous for optimizing machine configuration. The efficacy and adaptability of JarviX are substantiated through a series of practical use case studies. 1 Introduction Although the predominant focus of contemporary research on large language models is the evaluation of various tasks (Liang et al., 2022; Zhao et al., 2023), there is a noticeable lack of academic resources that provide structured guidelines and frameworks for downstream applications. Tabular data analysis, as an important application task of LLMs, has always faced challenges related to the precision of mathematical calculations. Despite its ability to address complex high school math problems and participate in advanced mathematical discussions, advanced models such as GPT-4 are not yet on par with expert level performance (Bubeck et al., 2023). They are prone to basic errors and can sometimes produce incoherent outputs. † These authors contributed equally to this work. This may stem from the fact that autoregressive models lack self-correction mechanisms when generating solutions (Shen et al., 2021). This paper introduces a thorough approach towards employing LLMs for tabular data analysis tasks, specifically aiming to equip nonspecialists with the ability to engage in advanced data analytics using LLMs within a rule-based system. Although LLMs have proven to be potent in data processing (Zhao et al., 2023), their application in guiding users through rule-based systems to intuitively create data visualizations, synthesize statistical insights, and provide context-aware explanations is significantly underexplored. LLM guides users through a rule-based system in JarviX, which enables data visualization and statistical analysis. It leverages a vectorized domain knowledge repository to provide relevant explanations for each visualization and suggests further exploration directions (Feng et al., 2023). Users can generate additional exploratory charts and insights through text or voice input, facilitated by Whisper. 1 These insights are processed by the Vicuña model 2 through prompts fine-tuned by GPT- 4 3 . This approach culminates in a comprehensive report encapsulating all the insights and analytical processes, serving as a thorough guide for users and a blueprint for future analysis. Furthermore, this study explores the integration of H2O-AutoML-customized AutoML pipelines (H2O.ai, 2023) into this process. The use of AutoML is demonstrated to identify the best targets with respect to other data columns and to build specific models to optimize results for various objectives, such as optimal factory configurations (He et al., 2021). 1 https://github.com/openai/whisper https://lmsys.org/blog/2023-03-30-vicuna/ 3 https://openai.com/research/gpt-4 2" 2312.02215v1,"A generalisation of the method of regression calibration and comparison with the Bayesian 2-dimensional Monte Carlo method Mark P Little a, b 1 , Nobuyuki Hamada c , Lydia B Zablotska d a Radiation Epidemiology Branch, National Cancer Institute, Bethesda, MD 20892-9778 USA b Faculty of Health and Life Sciences, Oxford Brookes University, Headington Campus, Oxford, OX3 0BP, UK c Biology and Environmental Chemistry Division, Sustainable System Research Laboratory, Central Research Institute of Electric Power Industry (CRIEPI), 1646 Abiko, Chiba 270-1194, Japan (ORCID ID 0000-0003-2518-6131) d Department of Epidemiology and Biostatistics, School of Medicine, University of California, San Francisco, 550 16 th Street, 2 nd floor, San Francisco, CA 94143, USA 1 Corresponding author: Mark P. Little [ORCID ID 0000-0003-0980-7567], Radiation Epidemiology Branch, National Cancer Institute, Room 7E546, 9609 Medical Center Drive, MSC 9778, Rockville, MD 20892-9778 USA, Tel +1 240 276 7375 (office) / +1 301 875 3413 (mobile) / Fax +1 240 276 7840, E-mail address: mark.little@nih.gov Word count (main text, excluding Abstract, references, Supplementary material): 3514. Word count (abstract): 331. References: 53 Appendices: A+B 1" 2312.02217v1,"Foundations of a theory of gravity with a constraint. Gravitational energy of macroscopic bodies Alexander P. Sobolev 1,§ and Aleksey Sobolev 2 , ‡ ,* 1 ORCID 0000-0003-0649-7305 ORCID 0009-0000-6304-7883 § Moscow Institute of Physics and Technology, Russian Federation ‡ Independent researcher * Author to whom correspondence should be addressed: aleksey.sobolev01@gmail.com 2 Abstract The paper considers a set of equations describing the static isotropic gravity field of a macroscopic body within the framework of a theory of gravity with a constraint. A general approximate solution of these equations has been found. The solution exists only at certain values of three integration constants. The out-of-body metric coincides with the Schwarzschild metric, but, unlike the general relativity theory (GR), the curvature tensor invariants have a certain finite value everywhere. 1. Introduction In 2022, the article 'Foundations of a Theory of Gravity with a Constraint and Its Canonical Quantization' was published [1] (a corrected version of this paper [2]). The distinguishing feature of this theory compared to Einstein-Hilbert's general relativity theory (GR) is the introduction of a constraint among the metric tensor components, replacing the general covariance hypothesis. The inclusion of this constraint enabled the determination of the symmetric energy-momentum tensor of the gravity field, along with its entropy and temperature. Consequently, the gravity field, in this scenario, exhibits properties characteristic of material media and serves as the primary source of the entire energy of the Universe. It has been demonstrated in [1] that the cosmological principle (the hypothesis of homogeneity and isotropy of space) is rigorously satisfied in such a Universe prior to the emergence of matter. At the moment of the onset of the Universe's evolution, the energy density of the gravity field was equal to zero, and its tension was negative [1]. This served as a trigger for the accelerated increase in the initially minimal volume factor and the energy density of the field itself. The energy density, within the time of about 10 -12 seconds, reached a value of ~10 50 J·m -3 [1], which made it possible to launch a process of inception of matter fields due to the gravity field energy. Thus, the centuries-old problem of the creation of matter from nothing (creation ex nihilo) was resolved. Building upon this foundation, a unified evolution model was developed for a non-stationary globally homogeneous large-scale structure encompassing the modern, early, and very early Universe [2]. Within this model, it was demonstrated that the current global energy density in the Universe primarily comprises 94.5% of the gravity field's energy density, with only 5.5% attributed to all known types of matter. Notably, the model's calculated results align with observable astronomical data, eliminating the need for hypotheses such as 'dark energy', 'dark matter', and 'inflatons'. In addition, a wave equation for the gravity field was formulated, and a nonstationary wave function for the very early Universe was constructed [2]. It is shown that the origination of the Universe was random in nature and that the gravity field has only a continuous energy spectrum, while the spectrum of discrete energy levels is absent. Hence, the theory of gravity with a constraint [2] provides solutions to several long-standing problems that remain unresolved within the framework of GR. The predictive capabilities of GR are confined to the limits of our solar system. To explain observation results concerning 1" 2312.02218v1,"WavePlanes: A compact Wavelet representation for Dynamic Neural Radiance Fields Adrian Azzarelli Visual Information Laboratory University of Bristol Nantheera Anantrasirichai Visual Information Laboratory University of Bristol a.azzarelli@bristol.ac.uk n.anantrasirichai@bristol.ac.uk David R Bull Visual Information Laboratory University of Bristol dave.bull@bristol.ac.uk Figure 1. Method overview. We represent N-level wavelet coefficients as Ω sc . (a) The wavelet representation is transformed using the inverse discrete wavelet transform (IDWT). (b) 4-D samples are projected onto each plane and bi-linearly interpolated over multiple scales. (c) Features sampled from different planes and multiple scales are fused into a single feature. (d) Features are linearly decoded. (e) A 2-D pixel is rendered from the 3-D volume using the NeRF volumetric rendering function. (f) A loss and weighted regularization is used for training. After training: (1) We compress non-zero wavelet coefficients. Model Comparison: Our model is small, fast and performant. Time is measured in minutes and model size is represented by point radius. Abstract of ∼12 MB. Compared with state-of-the-art plane-based models, WavePlanes is up to 15× smaller, less computationally demanding and achieves comparable results in as little as one hour of training - without requiring custom CUDA code or high performance computing resources. Additionally, we propose new feature fusion schemes that work as well as previously proposed schemes while providing greater interpretability. Our code is available at: https: //github.com/azzarelli/waveplanes/ Dynamic Neural Radiance Fields (Dynamic NeRF) enhance NeRF technology to model moving scenes. However, they are resource intensive and challenging to compress. To address this issue, this paper presents WavePlanes, a fast and more compact explicit model. We propose a multiscale space and space-time feature plane representation using N-level 2-D wavelet coefficients. The inverse discrete wavelet transform reconstructs N feature signals at varying detail, which are linearly decoded to approximate the color and density of volumes in a 4-D grid. Exploiting the sparsity of wavelet coefficients, we compress a Hash Map containing only non-zero coefficients and their locations on each plane. This results in a compressed model size 1. Introduction Neural Radiance Fields (NeRFs) have gained significant attention due to their ability to generate high-resolution 3D scenes with accurate novel view synthesis. The traditional 1" 2312.02219v1,"Behind the Magic, MERLIM: Multi-modal Evaluation Benchmark for Large Image-Language Models Andrés Villa 1 , Juan León Alcázar 1 , Alvaro Soto 2 , Bernard Ghanem 1 1 King Abdullah University of Science and Technology (KAUST), 2 Pontificia Universidad Católica de Chile villaaf@kaust.edu.sa, jc.leon@uniandes.edu.co, asoto@ing.puc.cl, bernard.ghanem@kaust.edu.sa Abstract Large Vision and Language Models have enabled significant advances in fully supervised and zero-shot vision tasks. These large pre-trained architectures serve as the baseline to what is currently known as Instruction Tuning Large Vision and Language models (IT-LVLMs). IT- LVLMs are general-purpose multi-modal assistants whose responses are modulated by natural language instructions and arbitrary visual data. Despite this versatility, IT-LVLM effectiveness in fundamental computer vision problems remains unclear, primarily due to the absence of a standardized evaluation benchmark. This paper introduces a Multimodal Evaluation Benchmark named MERLIM, a scalable test-bed to assess the performance of IT-LVLMs on fundamental computer vision tasks. MERLIM contains over 279K image-question pairs, and has a strong focus on detecting cross-modal “hallucination” events in IT-LVLMs, where the language output refers to visual concepts that lack any effective grounding in the image. Our results show that state-of-the-art IT-LVMLs are still limited at identifying fine-grained visual concepts, object hallucinations are common across tasks, and their results are strongly biased by small variations in the input query, even if the queries have the very same semantics. Our findings also suggest that these models have weak visual groundings but they can still make adequate guesses by global visual patterns or textual biases contained in the LLM component. We will release MERLIM at https://github.com/ojedaf/MERLIM. Figure 1. Sample Results on MERLIM. We showcase a subset of the performance evaluations on MERLIM. Our evaluation metrics include Precision (Prec), Recall (Rec), and F1 Score (F1) for the Object Recognition Task (OR). We also measure the Accuracy at identifying object-to-object relationships in two sets: one sets generates negative examples through random sampling (Random - Sample RS), the second set set has curated relations (Curated Set - CS) where commercial LLMs discard impossible associations, thus forcing the IT-LVLM to use the visual data. We further verify the IT-LVLMs consistency, as we calculate the Accuracy for both affirmative (Acc) and negative (Acc Neg) versions of the instructions describing the object relations. tion learning. Similarly, in the image domain, vision transformers trained on large-scale image collections have achieved state-of-the-art performance on multiple fully supervised tasks [11, 13, 31]. The integration of a language stream has also demonstrated empirical benefits in fundamental computer vision tasks such as recognition [1, 24, 42] and detection [6, 12]. Ultimately, these advances in computer vision and NLP fields have converged in the development of Large Vision and Language models (LVLMs) [2, 25, 27, 38, 42, 49], which achieved state-of-the-art performance on several downstream visual tasks while enabling significant improvements in the zero-shot setups. 1. Introduction Large-scale transformer networks have significantly advanced the field of Natural Language Processing (NLP) [5, 10, 35, 43]. Large Language Models (LLMs) have demonstrated remarkable zero-shot performance in a wide range of NLP tasks [32, 37]. This success has resulted in a fundamental shift for the NLP community, moving from task-specific pre-training to task-agnostic representa- 1" 2312.02224v1,"Tracing Hyperparameter Dependencies for Model Parsing via Learnable Graph Pooling Network Xiao Guo, Vishal Asnani, Sijia Liu, Xiaoming Liu Michigan State University {guoxia11, asnanivi, liusiji5, liuxm}@msu.edu Abstract VAE NF AA 10% 4% 5% L1 MSE Model Parsing defines the research task of predicting hyperparameters of the generative model (GM), given a generated image as input. Since a diverse set of hyperparameters is jointly employed by the generative model, and dependencies often exist among them, it is crucial to learn these hyperparameter dependencies for the improved model parsing performance. To explore such important dependencies, we propose a novel model parsing method called Learnable Graph Pooling Network (LGPN). Specifically, we transform model parsing into a graph node classification task, using graph nodes and edges to represent hyperparameters and their dependencies, respectively. Furthermore, LGPN incorporates a learnable pooling-unpooling mechanism tailored to model parsing, which adaptively learns hyperparameter dependencies of GMs used to generate the input image. We also extend our proposed method to CNN-generated image detection and coordinate attacks detection. Empirically, we achieve state-of-the-art results in model parsing and its extended applications, showing the effectiveness of our method. Our source code are available. ReLu Tahn GAN 57% Param. Num. Layer Num. Hyperparameters Generative Model Generated Image (a) a GM that generates images. Figure 1. Hyperparameters define Model parsing [2] refers to the task of predicting the hyperparameters given the generated image. about the deception, such as GM and its parameters used to create falsified images, from attack samples. In this work, we study model parsing, which is one of RED tasks that predicts GM hyperparameters from generated images (Fig. 1). Model parsing is an important research topic, as analyzing the GM hyperparameters gains insights into origins of generated images, enabling defenders to develop effective countermeasures against falsified content. Specifically, it is discovered in the previous work [2] that 37 hyperparameters can be parsed using the generated image as input (details in Sec. 3.1.1). However, their approach primarily focuses on finding correlations among GMs using a clustering-based method, neglecting the learning of dependencies among these 37 hyperparameters. To address this limitation, we formulate model parsing into a graph node classification problem, and then propose a framework to capture hyperparameter dependencies, leveraging the effectiveness of Graph Convolution Network (GCN) in capturing the correlation among graph nodes [18, 28, 30, 37, 63]. More formally, we first use the label co-occurrence pattern among training samples in the RED dataset to construct a direct graph, as shown in Fig. 2a. The directed graph, based on the label co-occurrence pattern, illustrates the fundamental correlation between different categories and helps prior GCN-based methods achieve remarkable performance in various applications [10, 11, 15, 48, 59, 68]. In this work, this directed graph is tailored to the model parsing — we define discrete-value and continuous-value graph node to rep- 1. Introduction Generative Models (GMs) [12, 22, 34–36, 45, 61], e.g., Generative Adversarial Networks (GANs), Variational Autoencoder (VAEs), and Diffusion Models (DMs), have recently gained significant attention, offering remarkable capabilities in generating images with visually compelling contents. However, the proliferation of such Artificial Intelligence Generated Content (AIGC) can inadvertently propagate inaccurate or biased information. To mitigate such the negative impact, various image forensics [54] methods have been proposed, including methods for CNN-generated image detection [9, 19, 27, 56, 64] and manipulation localization [3, 32, 58, 66, 71, 74]. Furthermore, recent research [2, 21, 67, 70] has delved into a novel learning paradigm known as reverse engineering of deception (RED), which aims to reverse engineer or deduce crucial information 1 (b)" 2312.02228v1,"PixelLM: Pixel Reasoning with Large Multimodal Model Zhongwei Ren 1* , Zhicheng Huang 2* , Yunchao Wei 1† , Yao Zhao 1 , Dongmei Fu 2 , Jiashi Feng 3 , Xiaojie Jin 3*†‡ 1 Beijing Jiaotong University, 2 University of Science and Technology Beijing, 3 ByteDance Inc. https://pixellm.github.io/ Figure 1. PixelLM is an effective and efficient LMM for pixel-level reasoning and understanding. We show its visualization results in following scenarios: 1) Multi-target reasoning segmentation; 2) Instance-level segmentation tied with text description; 3) Multi-referring segmentation; 4) Conversation Abstract While large multimodal models (LMMs) have achieved remarkable progress, generating pixel-level masks for image reasoning tasks involving multiple open-world targets remains a challenge. To bridge this gap, we introduce PixelLM, an effective and efficient LMM for pixel-level reasoning and understanding. Central to PixelLM is a novel, lightweight pixel decoder and a comprehensive segmentation codebook. The decoder efficiently produces masks from the hidden embeddings of the codebook tokens, which encode detailed target-relevant information. With this design, PixelLM harmonizes with the structure of popular LMMs and avoids the need for additional costly segmen- * Equal contribution. Work done when Zhongwei and Zhicheng in- terned at ByteDance Inc. † Correspondence to Xiaojie Jin and Yunchao Wei . ‡ Project lead. tation models. Furthermore, we propose a target refinement loss to enhance the model’s ability to differentiate between multiple targets, leading to substantially improved mask quality. To advance research in this area, we construct MUSE, a high-quality multi-target reasoning segmentation benchmark. PixelLM excels across various pixellevel image reasoning and understanding tasks, outperforming well-established methods in multiple benchmarks, including MUSE, single- and multi-referring segmentation. Comprehensive ablations confirm the efficacy of each proposed component. All code, models, and datasets will be publicly available. 1. Introduction Built upon the success of Large Language Models (LLMs) [6, 24, 25, 37], large multimodal models (LMMs)" 2312.02236v1,"Rethinking Adversarial Training with Neural Tangent Kernel Guanlin Li Nanyang Technological University, S-Lab Han Qiu Tsinghua University Shangwei Guo Chongqing University guanlin001@e.ntu.edu.sg qiuhan@tsinghua.edu.cn gswei5555@gmail.com Jiwei Li Zhejiang University, Shannon.AI Tianwei Zhang Nanyang Technological University jiwei li@shannonai.com tianwei.zhang@ntu.edu.sg Abstract ability [6, 19] and learning process [2] of networks. The NTK theory also inspires many interesting applications. For example, [31] proposed a new meta-learning paradigm based on NTK to improve the generalization of the model to other domains. [29] adopted the “lazy training” property of neural networks and crafted poisons to decrease the victim model’s performance under a black-box threat model. [8] leveraged NTK to decrease the ratio of modified data in backdoor attacks. In this paper, we aim to investigate and enhance adversarial training (AT) and model robustness with NTK. Adversarial training (AT) is an important and attractive topic in deep learning security, exhibiting mysteries and odd properties. Recent studies of neural network training dynamics based on Neural Tangent Kernel (NTK) make it possible to reacquaint AT and deeply analyze its properties. In this paper, we perform an in-depth investigation of AT process and properties with NTK, such as NTK evolution. We uncover three new findings that are missed in previous works. First, we disclose the impact of data normalization on AT and the importance of unbiased estimators in batch normalization layers. Second, we experimentally explore the kernel dynamics and propose more time-saving AT methods. Third, we study the spectrum feature inside the kernel to address the catastrophic overfitting problem. To the best of our knowledge, it is the first work leveraging the observations of kernel dynamics to improve existing AT methods. It is found that neural networks are fragile to a kind of data, dubbed adversarial examples (AEs), which mislead the models to make wrong predictions [7, 26]. It is essential to explore how to defend against AEs and improve the model’s robustness. An important and effective defense approach is adversarial training (AT) [18], which generates AEs on-thefly to train the model. However, AT can cause the model to have lower clean accuracy and overfit AEs on the test set in an earlier training stage [21]. A lot of efforts have been devoted to the exploration and explanation of such odd property [5, 11, 16, 24]. Recently, there are two works [17, 27] that leverage NTK to study AT. [17] empirically studied the dynamics of finite-wide neural networks under normal training and AT. They found that compared with normal training, AT can make the kernel converge to a different one inheriting the model robustness at a much higher speed, and the corresponding eigenvectors of NTK can reflect more visually interpretable features. [27] studied the adversarial robustness by analyzing the features contained in the neural network’s NTK. They empirically proved the transferability of AEs directly generated from NTKs by treating the neural networks as kernel machines [1]. They also studied the spectrum of NTKs and found the robust features [11] and useful features [11] can be recognized from the contribution to adversarial perturbation. However, the above two works exhibit the following weaknesses. (1) They lack a theoret- 1. Introduction In the past few years, Neural Tangent Kernel (NTK) has become a prevalent tool to analyze and understand deep learning models (i.e., neural networks). To study the optimization process in the function space, [13] proved that the dynamics of an infinite-wide neural network under gradient descent can be computed with NTK. [15] further found that the learning process of such a neural network can be approximated as a linear model with the initial values of its parameters. [1] proved that neural networks can be regarded as kernel machines, whose learning dynamics can be divided into two phases: in the “kernel learning” stage, NTK of a neural network is aligned with the features of the network in a tangent space; in the “lazy training” phase, the kernel stays static, and the model parameters do not change significantly. Besides the theoretical studies of NTK properties, there are also empirical investigations on NTK of finite-wide networks trained on practical datasets to explore the generalization 1" 2312.02242v1,"Quantum State-Channel Duality for the calculation of Standard Model scattering amplitudes. Clelia Altomonte, 1 and Alan J. Barr 2 1) Department of Physics, Strand, King’s College London, WC2R 2LS 2) Department of Physics, Keble Road, University of Oxford, OX1 3RH Merton College, Merton Street, Oxford, OX1 4JD (*Electronic mail: clelia.altomonte@kcl.ac.uk) (Dated: 21 September 2023, First submitted: 6 October 2022 (arXiv: 4530106)) (Accepted for publication in Physics Letters B: 30 October 2023) Abstract: Recent instances of successful application of quantum information techniques to particle physics problems invite for an analysis of the mathematical details behind such connection. In this paper, we identify the Choi- Jamiolkowski isomorphism, or state-channel duality, as a theoretical principle enabling the application of the theory of quantum information to the scattering amplitudes associated with Standard Model processes. I. QUANTUM INFORMATION THEORY APPLIED TO HIGH ENERGY SYSTEMS While the first suggestion to make simulations of Nature quantum mechanical famously dates back to Richard Feynman 1 , recent attempts to apply the theory of quantum information to the study of high energy physics systems have proven particularly successful. As a paradigmatic example quantum state tomography, a procedure that allows full reconstruction of the density matrix of a system by performing a complementary series of measurements on an ensemble of identical copies of the system under scrutiny 2 , is ideally applicable to colliders, where large numbers of events are generated 3–6 , and has been applied to numerical simulation studies of various high energy particle physics systems 4–7 . Quantum algorithms, including quantum machine learning techniques, have been developed for the recognition of Standard Model and beyond signatures in data 8–10 , and for a more computationally economic simulation of collider events 11 . While these results verify the expected agreement between the two fields of particle physics and quantum information (being that the Standard Model is based on quantum field theory, which is a quantum theory), the mathematical details behind such connection could be further exploited, leading to novel insights into both fields. In this paper, we identify the Choi-Jamiolkowski isomorphism 12 , or state-channel duality, as a theoretical principle enabling a systematic application of the theory of quantum information to the calculation of Standard Model scattering amplitudes, and consider it worthy of the attention of the particle physics community for the following reasons. On the one hand, the utility of this approach lies in pointing to a mathematical relation in the form of an isomorphism to establish a rigorous dictionary connecting Standard Model scattering amplitudes and the outputs of quantum channels. The existence of such dictionary allows one to better exploit techniques from quantum information theory in particle physics processes which could be experimentally observed at working and near-term colliders, hence providing a mathematical framework that has the potential to address the following problems: (i) testing the foundations of quantum mechanics in particle physics colliders, by identifying the collider itself as a natural quantum-information processing machine provided that quantum mechanics holds. In this paper, we address this problem by providing, as an example, a tree-level process which shows how the presented framework allows us to test this assumption; (ii) performing tests of basic quantum predictions such as entanglement and quantum state and process tomography in high energy regimes (cf. refs. 3,6,7 ); (iii) expanding theoretical modelling into regions where the Standard Model theory is difficult to calculate perturbatively, and where phenomenological models are currently employed, by having an alternative method for performing calculations. On the other hand, the scope of our approach does not overlap with other quantum computing protocols currently applied to nuclear and particle physics, such as quantum Hamiltonian evolution simulations 13–16 , where the full dynamics of the particle physics system is simulated with the aim of observing non-perturbative effects. Resorting only to the knowledge of initial and final state density matrices, our approach allows us to establish whether a quantum channel which is equivalent to a given S-matrix can be constructed. This makes it possible reliably to use quantum information tools to learn about the Hamiltonian underlying the channel, and can potentially reveal evidence of new physics beyond the Standard Model. The present paper is organised as follows: in Section II, we assess the conditions for Standard Model scattering processes to be suitable systems for the theoretical and experimental study of quantum information, satisfying the general conditions for successful quantum computing implementation 2 . In Section III, by applying state-channel duality we show that Standard Model scattering amplitudes can be calculated as quantum channels. In Section IV we present an example model to illustrate how helicity matrix elements associated with tree-level electroweak interaction Feynman diagrams can" 2312.02247v1,"Federated Active Learning for Target Domain Generalisation Razvan Caramalau University College London London, UK Binod Bhattarai University of Aberdeen Aberdeen, UK Danail Stoyanov University College London London, UK r.caramalau@ucl.ac.uk binod.bhattarai@abdn.ac.uk danail.stoyanov@ucl.ac.uk Abstract In this paper, we introduce Active Learning framework in Federated Learning for Target Domain Generalisation, harnessing the strength from both learning paradigms. Our framework, FEDALV, composed of Active Learning (AL) and Federated Domain Generalisation (FDG), enables generalisation of an image classification model trained from limited source domain client’s data without sharing images to an unseen target domain. To this end, our FDG, FEDA, consists of two optimisation updates during training, one at the client and another at the server level. For the client, the introduced losses aim to reduce feature complexity and condition alignment, while in the server, the regularisation limits free energy biases between source and target obtained by the global model. The remaining component of FEDAL is AL with variable budgets, which queries the server to retrieve and sample the most informative local data for the targeted client. We performed multiple experiments on FDG w/ and w/o AL and compared with both conventional FDG baselines and Federated Active Learning (FAL) baselines. Our extensive quantitative experiments demonstrate the superiority of our method in accuracy and efficiency compared to the multiple contemporary methods. FEDALV manages to obtain the performance of the full training target accuracy while sampling as little as 5% of the source client’s data. Please find the code at: https: //github.com/razvancaramalau/FEDALV.git 1. Introduction Federated Learning (FL) [16, 21–23, 29, 48] is a burgeoning research area with applications across various domains, including computer vision [30, 31], medical imaging [13, 27], and natural language processing [11]. FL addresses the challenge of training machine learning and deep learning models without sharing raw data, addressing concerns related to privacy protection. The key advantage of FL lies in the diverse data distribution across local clients. However, in many scenarios, Figure 1. FEDALV High-level framework: Active Learning is integrated at the server level in our proposed FDG framework. Initially, a subset of source data is labelled, and over time, it is refined to retain only the most informative samples for target generalisation. Communication links with the global model operate during the FL training, and AL queries are propagated once the process is complete. After just a couple of cycles, the target domain (light blue) aligns with the sources in class clusters. the overall data is not only heterogeneous but can also be unlabelled or corrupted. Heterogeneity in the data distribution among clients leads to a distribution or domain shift problem. Early FL methods, such as FedAvg [29], did not account for this distribution shift between clients, resulting in poor generalization in such scenarios. Moreover, these FL methods often overlook the challenges related to data annotations, assuming that every client has overcome the problem of annotating data. In reality, data annotation is a laborious and costly task. There is a growing research interest in FL to tackle the problem of domain generalisation [15, 24, 27, 32, 44, 46], and these methods partly succeed in addressing the problem. Generalising on the joint local domains can mitigate these shifts from the target domain. Therefore, standard aggregation techniques like FedAvg [29], FedProx [23] and SCAFFOLD [16] can be further improved when accounting for the domain generalisation (DG) aspect. Unlike these methods, in this paper, we are introducing an Active Learning (AL) [33, 36] method to tackle the problem of domain generalisation in FL. AL in FL for domain generalisation" 2312.02252v1,"Large Language Models as Consistent Story Visualizers Xiaoqian Shen KAUST Mohamed Elhoseiny KAUST xiaoqian.shen@kaust.edu.sa mohamed.elhoseiny@kaust.edu.sa Abstract Recent generative models have demonstrated impressive capabilities in generating realistic and visually pleasing images grounded on textual prompts. Nevertheless, a significant challenge remains in applying these models for the more intricate task of story visualization. Since it requires resolving pronouns (he, she, they) in the frame descriptions, i.e., anaphora resolution, and ensuring consistent characters and background synthesis across frames. Yet, the emerging Large Language Model (LLM) showcases robust reasoning abilities to navigate through ambiguous references and process extensive sequences. Therefore, we introduce StoryGPT-V, which leverages the merits of the latent diffusion (LDM) and LLM to produce images with consistent and high-quality characters grounded on given story descriptions. First, we train a character-aware LDM, which takes character-augmented semantic embedding as input and includes the supervision of the cross-attention map using character segmentation masks, aiming to enhance character generation accuracy and faithfulness. In the second stage, we enable an alignment between the output of LLM and the character-augmented embedding residing in the input space of the first-stage model. This harnesses the reasoning ability of LLM to address ambiguous references and the comprehension capability to memorize the context. We conduct comprehensive experiments on two visual story visualization benchmarks. Our model reports superior quantitative results and consistently generates accurate characters of remarkable quality with low memory consumption. Our code will be made publicly available 1 . Frame1 Frame2 Frame3 Frame4 Char-LDM Char-LDM Char-LDM Char-LDM LDM Mapper LDM Mapper LDM Mapper LDM Mapper Large Language Model LLM Mapper text emb1 viusal emb1 Fred is speaking to someone Cap0on1 LLM Mapper text emb2 viusal emb2 He is standing in a room Frame1 Caption2 LLM Mapper text emb3 viusal emb3 Frame2 Cap0on3 text emb4 They are talking to each other Fred and Wilma are in a room Frame3 Cap0on4 Figure 1. We present StoryGPT-V, which empowers a large language model for interleaved image-text comprehension and aligns its output with character-aware Latent Diffusion (Char-LDM) for autoregressive story visualization grounded on co-referential text descriptions. based on narrative descriptions [22, 27, 28, 56]. This challenge arises from the fact that captions for a single image are typically self-sufficient, lacking the continuity needed to capture the narrative of object interactions that unfold through multiple sentences over a sequence of frames. This poses a promising avenue for further research and exploration of story visualization. Such a task demands a model capable of producing high-quality characters and detailed environmental objects grounded on given text descriptions. Moreover, it requires the ability to disambiguate referential pronouns in the subsequent frame descriptions, e.g., “she, he, they”. Prior studies [4, 22, 26, 28, 47] explore the realm of story visualization but do not take reference resolution [44] (i.e., anaphora resolution in the context of natural language processing [2, 29]) into consideration. Story-LDM [38] first extended story visualization benchmarks with referential text and devises an attention memory module that retains visual context throughout the series of generated frames. However, it still struggles to generate precise characters for referential text since the interaction between current descriptions and contextual information occurs within the CLIP [36] se- 1. Introduction Image generation algorithms have made significant strides and are on the verge of matching human-level proficiency. Despite this progress, even a powerful image generator suffers from story visualization task, which involves generating a series of frames that maintain semantic coherence 1 Please refer to the anonymous webpage for qualitative results. 1" 2312.02258v1,"Astronomy & Astrophysics manuscript no. main December 6, 2023 ©ESO 2023 Kilonova evolution — the rapid emergence of spectral features Albert Sneppen 1, 2 , Darach Watson 1, 2 and James H. Gillanders 3 1 Cosmic Dawn Center (DAWN) Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, København 2100, Denmark 3 Astrophysics sub-Department, Department of Physics, University of Oxford, Keble Road, Oxford, OX1 3RH, UK 2 Received date / Accepted date ABSTRACT Kilonovae (KNe) are one of the fastest types of optical transients known, cooling rapidly in the first few days following their neutron-star merger origin. We show here that KN spectral features go through rapid recombination transitions, with features due to elements in the new ionisation state emerging quickly. Due to time-delay effects of the rapidly-expanding KN, a ‘wave’ of these new features passing though the ejecta should be a detectable phenomenon. In particular, isolated line features will emerge as blueshifted absorption features first, gradually evolving into more pronounced absorption/emission P Cygni features and then pure emission features. In this analysis we present the evolution of the individual exposures of the KN AT2017gfo observed with VLT/X-shooter that together comprise X-shooter’s first epoch spectrum (1.43 days post-merger). We show that the spectra of these ‘sub-epochs’ show a significant evolution across the roughly one hour of observations, including a decrease of the blackbody temperature and photospheric velocity. The early cooling is even more rapid than that inferred from later photospheric epochs, and suggest a fixed power-law relation between temperature and time cannot capture the data. The cooling constrains the recombination-wave, where a Sr ii interpretation of the AT2017gfo ∼ 1 µm feature predicts both a specific timing for the feature emergence and its early spectral shape, including the very weak emission component observed at about 1.43 days. This reverberation analysis suggests that temporal modelling is important for interpreting individual spectra and that higher cadence spectral series, especially when concentrated at specific times, can provide strong constraints on KN line identifications. Given the use of such short-timescale information, we lay out improved observing strategies for future KN monitoring. 1. Introduction The temporal data on the kilonova AT2017gfo has provided several key insights into its evolution and composition. First, the bolometric luminosity follows a powerlaw-like decay, expected for a large ensemble of rapid neutron-capture process (r-process) isotopes (e.g. Metzger et al. 2010; Wu et al. 2019). Second, follow-up analyses of the spectroscopic data have identified P Cygni features proposed to be formed by r-process elements, the first and most obvious being Sr ii (Watson et al. 2019), but also potentially La iii and Ce iii (Domoto et al. 2022), as well as Y ii (Sneppen & Watson 2023). These P Cygni profiles change across epochs because they trace the receding photospheric velocity. They also potentially probe differing ionisation states and abundances through the ejecta. This means that, more completely, radiative transfer modelling of the spectrum can constrain changes in abundances and velocities (Gillanders et al. 2022; Vieira et al. 2023a,b). Lastly, the continuum flux (across early epochs) is remarkably similar to a blackbody in terms of both normalisation and spectral shape (e.g. Sneppen 2023) with especially the NIR continuum being challenging to reproduce for current numerical simulations of mergers (e.g. Domoto et al. 2022; Collins et al. 2023). The daily Very Large Telescope (VLT) spectra taken with the X-shooter spectrograph of the kilonova AT2017gfo associated with the gravitational wave event, GW170817, provide the highest-quality information yet available for studying the rapidly evolving electromagnetic output from the merger of neutronstars (Pian et al. 2017; Smartt et al. 2017). Due to observational constraints, spectra were mostly available with a cadence around 24 hours, limiting the temporal analysis to a time-step which is comparable to the time since merger for the early epochs. Tem- porally important earlier spectra were obtained at telescopes in Chile, Australia and South Africa (Andreoni et al. 2017; Mc- Cully et al. 2017; Shappee et al. 2017; Buckley et al. 2018), though not with the spectral coverage of the X-shooter spectra. While we return to these earlier spectra in a companion paper (Sneppen et al. in preparation), each of these ‘daily’ X- shooter spectra is in fact a composite of several individual exposures taken over approximately an hour. For standard reductions these exposures are generally analysed together, but this is not required, given the brightness of the early kilonova, and the mildly relativistic velocities which smear the spectral line data over tens of thousands of km/s and obviate the need for high S/N at high spectral resolution. Conversely, given the rapid kilonova evolution it is informative to examine these exposures individually. Therefore, in Sect. 2, we re-reduce each exposure of the VLT, epoch 1 X-shooter spectrum of AT2017gfo (taken on 18–19 August 2017, 1.4 days post-merger). The reduced subepoch spectra are made publicly available and are intended as an extension and addition to the standard reduction presented in Pian et al. (2017). In Sect. 3, we examine the physical information concealed in the differences between these sub-epochs. In Sect. 4.1, we show that on timescales of order several hours, reverberation effects dictate that KN spectral features will emerge rapidly and as blueshifted absorption components first. Lastly, in Sect. 4.2 we discuss the broader implications for modelling of including reverberation effects and for the optimal observing cadence and timing for future KNe. Article number, page 1 of 8" 2312.02284v1,"PatchFusion: An End-to-End Tile-Based Framework for High-Resolution Monocular Metric Depth Estimation Zhenyu Li, Shariq Farooq Bhat, Peter Wonka King Abdullah University of Science and Technology (KAUST) https://zhyever.github.io/patchfusion/ zhenyu.li.1@kaust.edu.sa Graph-GDSR BoostingDepth ZoeDepth PatchFusion BoostingDepth BoostingDepth PatchFusion ZoeDepth GT GT PatchFusion Figure 1. High-Resolution Depth Estimation. Our tile-based monocular metric depth estimation model processes high-resolution images and delivers high-quality depth estimations with intricate details on test images corresponding to the synthetic training dataset Unreal- Stereo4K [37] as well as for zero-shot generalization to other types of real images. Top: In-domain sample from UnrealStereo4K. Middle: Out-of-domain sample from Middleburry 2014 [35]. Bottom: Out-of-domain sample from the internet. Abstract (2) A Global-to-Local (G2L) module that adds vital context to the fusion network, discarding the need for patch selection heuristics, and (3) A Consistency-Aware Training (CAT) and Inference (CAI) approach, emphasizing patch overlap consistency and thereby eradicating the necessity for post-processing. Experiments on UnrealStereo4K, MVS-Synth, and Middleburry 2014 demonstrate that our framework can generate high-resolution depth maps with intricate details. PatchFusion is independent of the base model for depth estimation. Notably, our framework built on top of SOTA ZoeDepth brings improvements for a total of 17.3% and 29.4% in terms of the root mean squared error (RMSE) on UnrealStereo4K and MVS-Synth, respectively. Single image depth estimation is a foundational task in computer vision and generative modeling. However, prevailing depth estimation models grapple with accommodating the increasing resolutions commonplace in today’s consumer cameras and devices. Existing highresolution strategies show promise, but they often face limitations, ranging from error propagation to the loss of highfrequency details. We present PatchFusion, a novel tilebased framework with three key components to improve the current state of the art: (1) A patch-wise fusion network that fuses a globally-consistent coarse prediction with finer, inconsistent tiled predictions via high-level feature guidance, 1" 2312.02294v1,"Boundary Exponential Stabilization of the KP-II Equation F.A. Gallego a , J.R. Muñoz b a Departamento de Matematica, Universidad Nacional de Colombia (UNAL), Cra 27 No. 64-60, Manizales, 170003, Caldas, Colombia b Departamento de Matematica, Universidade Federal de Pernambuco, S/N Cidade Universitaria, Recife, 50740-545, PE, Brazil Abstract In this paper, we delve into the intricacies of boundary stabilization for the KP-II Equation within the constraints of a bounded domain. Our primary aim is to engineer a parameterized set of feedback laws that not only lead to the existence of solutions originating from minuscule initial data but also facilitate their uniform exponential decay within the energy space. As far as we know, the present work is the first result on boundary feedback stabilization related to the Kadomtsev-Petviashvili II equation posed in a rectangle Ω = (0, L) × (0, L), L > 0. Keywords: KP-II system, Boundary stabilization, Exponential decay 1. Introduction The KP equation, short for the Kadomtsev-Petviashvili equation, holds great significance in the realm of partial differential equations. It emerges prominently when investigating nonlinear waves and solitons, with applications spanning water wave dynamics, plasma physics, and various theoretical physics and mathematical disciplines. This equation, independently discovered by B.B. Kadomtsev and V.I. Petviashvili in 1970 (see [19]), takes center stage in the study of weakly nonlinear, long waves within dispersive media. Its general form is typically expressed as follows: u t + uu x + u xxx + γ∂ −1 x (u yy ) = 0, γ = ±1. When γ = −1, we denote it as KP-I, and when γ = 1, it’s KP-II, inspired by the KP equation’s convention. KP-II describes long gravity waves with subtle surface tension, while KP-I models capillary gravity waves, especially with strong surface tension. Notably, the KP-I equation also arises in the transonic limit (under appropriate scaling) of the defocusing nonlinear Schrödinger equation, as documented in [10]. In this paper, we explore boundary stabilization of the Kadomtsev-Petviashvili (KP) equation, focusing on control strategies and dissipative boundary conditions to ensure stability near domain boundaries. This is crucial in applications like fluid dynamics to prevent wave or soliton instability. Researchers use energy methods, feedback control, and simulations to achieve global solution existence and decay. The integrable nature of the KP equation adds to its intrigue, making it a challenging problem in partial differential equations and mathematical physics. 1.1. Setting of the problem We focus on two boundary stabilization scenarios for the KP-II equation in a bounded domain. Specifically, we investigate the implications of applying Neumann dissipation laws at the domain boundaries, aiming to understand their impact on achieving exponential stabilization and the interplay between temporal and spatial constraints. We consider parameters L > 0 for a positive length, Ω := (0, L) × (0, L) to define a rectangular region in R 2 , and T > 0 for a positive time interval. Within this context, we explore closed-loop systems to address these boundary stabilization challenges:    u t (x, y, t) + u xxx (x, y, t) + 12 (u 2 (x, y, t)) x + γ∂ −1  x u yy (x, y, t) = 0,       u(0, y, t) = u(L, y, t) = u(x, 0, t) = u(x, L, t) = 0, (1)    u x (L, y, t) = αu x (0, y, t),       u(x, y, 0) = u 0 (x, y), Email addresses: fagallegor@unal.edu.co (F.A. Gallego), juan.ricardo@ufpe.br@ (J.R. Muñoz) Preprint submitted to Systems and Control Letters December 6, 2023" 2312.02309v1,"Training Reinforcement Learning Agents and Humans With Difficulty-Conditioned Generators Sidney Tio sidney.tio.2021@phdcs.smu.edu.sg Jimmy Ho jimmyho@smu.edu.sg Pradeep Varakantham School of Computing and Information Systems Singapore Management University pradeepv@smu.edu.sg Abstract We introduce Parameterized Environment Response Model (PERM), a method for training both Reinforcement Learning (RL) Agents and human learners in parameterized environments by directly modeling difficulty and ability. Inspired by Item Response Theory (IRT), PERM aligns environment difficulty with individual ability, creating a Zone of Proximal Development-based curriculum. Remarkably, PERM operates without real-time RL updates and allows for offline training, ensuring its adaptability across diverse students. We present a two-stage training process that capitalizes on PERM’s adaptability, and demonstrate its effectiveness in training RL agents and humans in an empirical study. Figure 1: Overview of the proposed 2-stage process. In Stage 1, the IRT-based Parameterized Environment Response Model (PERM) observes a Reinforcement Learning (RL) Agent as it trains in a given environment with randomized levels. During this stage, PERM learns to accurately infer both student ability and level difficulty. In Stage 2, once trained, PERM is deployed to train both artificial and human students. It achieves this by inferring their current ability and providing suitable training levels within the same domain. Preprint. Under review." 2312.02341v1,"I NCENTIVE S YSTEMS FOR F LEETS OF N EW M OBILITY S ERVICES Ali Ghafelebashi , Meisam Razaviyayn , and Maged Dessouky ∗ December 6, 2023 A BSTRACT Traffic congestion has become an inevitable challenge in large cities due to population increases and expansion of urban areas. Various approaches are introduced to mitigate traffic issues, encompassing from expanding the road infrastructure to employing demand management. Congestion pricing and incentive schemes are extensively studied for traffic control in traditional networks where each driver is a network “player”. In this setup, drivers’ “selfish” behavior hinders the network from reaching a socially optimal state. In future mobility services, on the other hand, a large portion of drivers/vehicles may be controlled by a small number of companies/organizations. In such a system, offering incentives to organizations can potentially be much more effective in reducing traffic congestion rather than offering incentives directly to drivers. This paper studies the problem of offering incentives to organizations to change the behavior of their individual drivers (or individuals relying on the organization’s services). We developed a model where incentives are offered to each organization based on the aggregated travel time loss across all drivers in that organization. Such an incentive offering mechanism requires solving a large-scale optimization problem to minimize the system-level travel time. We propose an efficient algorithm for solving this optimization problem. Numerous experiments on Los Angeles County traffic data reveal the ability of our method to reduce system-level travel time by up to 6.9%. Moreover, our experiments demonstrate that incentivizing organizations can be up to 8 times more efficient than incentivizing individual drivers in terms of incentivization monetary cost. Keywords New Mobility Services · Congestion Reduction · Incentivizing Organizations · Travel Demand Management 1 Introduction Today, traffic congestion is one of the major issues in metropolitan areas across the globe. Traffic congestion declines the overall quality of life, leads to significant economic losses, degrades air quality, and escalates health vulnerabilities due to emissions [1–4]. This paper undertakes the task of devising a novel mechanism around incentives. The core objective of this mechanism is to change the behavioral patterns of individual drivers within organizations by incentivizing organizations. Incentive-based congestion reduction methodologies overlap with pricing methods, including taxes and fees for road access [5–14]. These strategies encourage individuals to avoid congested routes, reducing traffic buildup. Various ∗ This study was funded by a grant from the National Center for Sustainable Transportation (NCST), supported by the U.S. Department of Transportation’s University Transportation Centers Program. The contents of this project reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated in the interest of information exchange. The U.S. Government and the State of California assume no liability for the contents or use thereof. Nor does the content necessarily reflect the official views or policies of the U.S. Government and the State of California. This paper does not constitute a standard, specification, or regulation. This paper does not constitute an endorsement by the California Department of Transportation (Caltrans) of any product described herein. Ali Ghafelebashi, Meisam Razaviyayn, and Maged Dessouky are with the Daniel J. Epstein Department of Industrial & Systems Engineering, University of Southern California, 3715 McClintock Avenue, Los Angeles, CA 90089, United States. Email addresses: ghafeleb@usc.edu (Ali Ghafelebashi), razaviya@usc.edu (Meisam Razaviyayn), maged@usc.edu (Maged Dessouky)." 2312.02358v1,"Peer attention enhances student learning Songlin Xu 1,* , Dongyin Hu 2 , Ru Wang 3 , and Xinyu Zhang 1 1 University of California San Diego 2 University of Pennsylvania 3 University of Wisconsin–Madison * soxu@ucsd.edu ABSTRACT Human visual attention is susceptible to social influences. In education, peer effects impact student learning, but their precise role in modulating attention remains unclear. Our experiment (N=311) demonstrates that displaying peer visual attention regions when students watch online course videos enhances their focus and engagement. However, students retain adaptability in following peer attention cues. Overall, guided peer attention improves learning experiences and outcomes. These findings elucidate how peer visual attention shapes students’ gaze patterns, deepening understanding of peer influence on learning. They also offer insights into designing adaptive online learning interventions leveraging peer attention modelling to optimize student attentiveness and success. Introduction The attention of humans is profoundly influenced by social cues, a tendency firmly rooted in our nature as inherently social animals 1–10 . In educational settings, peer effects readily shape students’ attentional patterns, as students naturally follow the gaze of classmates during lessons 11 . For instance, when peers orient towards an unexpected disruption, like a bird at the window, others rapidly align to observe the same stimulus. Peer attention impacts learning through multiple pathways - peers can provide information, but students may also conform to peer attentional norms to garner acceptance 12, 13 . The existence and nature of peer effects in education have been debated in prior scholarship 14, 14–22 . Some studies reveal positive peer influence on academic achievement 21, 22 , and peer discussion can enhance understanding even without prior knowledge 20 . Peer effects extend to social outcomes as well 16 . However, other work finds limited to no linear peer influence on learning, with residential proximity and friendships conferring little added benefit over random peer pairings 14, 19 . While the precise mechanisms continue to be debated, peer effects appear contingent on contextual factors. Overall, prior research confirms peers shape students’ academic experiences, though the specific nature and direction of these influences likely depend on individual, classroom, and school characteristics. In summary, despite extensive research, peer effects on student learning remain debated, with limited definitive evidence regarding their efficacy. Moreover, granular analysis of real-time student learning behaviors is lacking, which could elucidate mechanisms underlying peer influence. Our research helps address these gaps through a fine-grained investigation correlating learning outcomes with student visual attention patterns under peer influence. Specifically, we test whether peer effects on gaze patterns also impact downstream learning experiences and performance. Drawing on prior work showing peer cues shape visual attention 3, 23 , we hypothesize that manipulating peer attention can guide students’ eye movements, increase focus, and ultimately improve learning outcomes. To test this, we conducted an experiment with 311 participants who watched course videos with or without visualized peer attention regions. Finegrained gaze data revealed participants’ attentional engagement and course following behaviors. Regression models decoded relationships between manipulated gaze patterns, attendant learning experiences (e.g., confusion, valid focus, course following), and downstream learning outcomes. Our results reveal two surprising findings. First, although peer attention manipulated students’ gaze, individuals adapted their viewing strategies rather than always mirroring peer focus. For instance, when peer attention diverged from the lecture pace, students’ gazes often did not follow. Nevertheless, peer attention cues still increased focus and course following compared to controls. Second, intentionally guiding students’ gaze along the lecture pace did not always improve learning outcomes. Instead, students able to adaptively adjust their focus based on personal needs showed enhanced performance." 2312.02366v1,"Towards General Purpose Vision Foundation Models for Medical Image Analysis: An Experimental Study of DINOv2 on Radiology Benchmarks Mohammed Baharoon a , Waseem Qureshi d , Jiahong Ouyang b , Yanwu Xu c , Kilian Phol b , Abdulrhman Aljouie e , Wei Peng b,∗ a Fatima Fellowship b Stanford Medicine, Stanford University, Stanford, CA 94305 c Boston University, Boston, MA 02215 d Oxford Cancer, University of Oxford, Oxford, OX3 7LA e King Abdullah International Medical Research Center Abstract The integration of deep learning systems into the medical domain has been hindered by the resource-intensive process of data annotation and the inability of these systems to generalize to different data distributions. Foundation models, which are models pre-trained on large datasets, have emerged as a solution to reduce reliance on annotated data and enhance model generalizabil- ity and robustness. DINOv2, an open-source foundation model pre-trained with self-supervised learning on 142 million curated natural images, excels in extracting general-purpose visual rep- resentations, exhibiting promising capabilities across various vision tasks. Nevertheless, a critical question remains unanswered regarding DINOv2’s adaptability to radiological imaging, and the clarity on whether its features are sufficiently general to benefit radiology image analysis is yet to be established. Therefore, this study comprehensively evaluates DINOv2 for radiology, conducting over 100 experiments across diverse modalities (X-ray, CT, and MRI). Tasks include disease classi- fication and organ segmentation on both 2D and 3D images, evaluated under different settings like kNN, few-shot learning, linear-probing, end-to-end fine-tuning, and parameter-efficient fine-tuning, to measure the effectiveness and generalizability of the DINOv2 feature embeddings. Comparative ∗ Corresponding author Email address: wepeng@stanford.edu (Wei Peng) Preprint submitted to Medical Image Analysis December 6, 2023" 2312.02367v1,"States as goal-directed concepts: an epistemic approach to state-representation learning 1 Nadav Amir 1∗ Yael Niv 1 Angela Langdon 2 Princeton University 2 National Institute of Mental Health {nadav.amir,yael}@princetn.edu angela.langdon@nih.gov Abstract Our goals fundamentally shape how we experience the world. For example, when we are hungry, we tend to view objects in our environment according to whether or not they are edible (or tasty). Alternatively, when we are cold, we may view the very same objects according to their ability to produce heat. Computational theories of learning in cognitive systems, such as reinforcement learning, use the notion of “state-representation"" to describe how agents decide which features of their environment are behaviorally-relevant and which can be ignored. However, these approaches typically assume “ground-truth"" state representations that are known by the agent, and reward functions that need to be learned. Here we suggest an alternative approach in which state-representations are not assumed veridical, or even pre-defined, but rather emerge from the agent’s goals through interaction with its environment. We illustrate this novel perspective by inferring the goals driving rat behavior in an odor-guided choice task and discuss its implications for developing, from first principles, an information-theoretic account of goal-directed state representation learning and behavior. 1 Introduction Concepts are the building blocks of mental representations, providing scaffolding for generalizations over individual objects or events. How do animals (including humans) form concepts and why do they form the particular ones that they do? These questions have a long history in both Eastern and Western philosophy [10, 23, 19, 20]. More recently, computational learning theories have started addressing a related question, namely, how do cognitive agents generate internal models of their environment, called “state-representations”, generalizing over their experiences for efficient learning [17, 12]? Here, we suggest that state-representations can be understood as concepts, formed by an agent in order to achieve particular goals [7]. Under this account, a concept, such as “fire”, is formed because some set of interests, such as a desire for warmth, leads agents to construe particular entities as similar to each other in virtue of their efficacy in obtaining the goal of warming up. Drawing this parallel between “concepts” and “states”, we propose that state-representations should be understood in terms of the goals they subserve. To explore this hypothesis, we develop a formal framework for describing goal-dependent state-representations and illustrate its application by inferring animals’ goals from empirically observed behavior in a well-studied odor-guided choice task. 2 Formal setting We assume the setting of an observation-action cycle, i.e., an agent receiving an observation from its environment and subsequently performing an action, then receiving a new observation and so on. We denote by O and A the set of possible observations and actions, respectively. An experience sequence, Information-Theoretic Principles in Cognitive Systems Workshop at the 37th Conference on Neural Information Processing Systems (NeurIPS 2023) ." 2312.02368v1,"Rinas: Training with Dataset Shuffling Can Be General and Fast Tianle Zhong Jiechen Zhao Xindi Guo tianle.zhong@email.virginia.edu University of Virginia jc.zhao@mail.utoronto.ca University of Toronto ptk2ks@virginia.edu University of Virginia Qiang Su ∗ Geoffrey Fox ∗ qiang.su@my.cityu.edu.hk City University of Hong Kong vxj6mb@virginia.edu University of Virginia Abstract is significantly growing. This is because the datasets nowadays are towards tens of TBs, largely exceeding the system DRAM capacity and thus leading to the use of slower disk I/O becoming an inevitable bottleneck [22, 39, 63]. Worse, it is challenging for current systems to effectively manage the shuffling overhead on training throughput without sacrificing accuracy [42, 50]. The impact of large dataset shuffling on training throughput is substantial and far from optimal. For example, we observe that data loading I/O for shuffling can consume up to 85% of the total training time for models such as ResNet- 152 on the ImageNet dataset (∼140 GB). This phenomenon corroborates with the prior art [17]. For language model training, the slowdown caused by shuffled loading can also lead to 30% to 50% of training throughput degradation. This overhead persists as a dominant bottleneck in training efficiency, even when deep learning pipelines are integrated with advanced data processing systems and databases [25]. In the practice of typical deep learning systems, shuffling for larger-than-memory datasets is usually abstracted by a shuffled loading operation, fetching a batch of data samples randomly from the dataset in a on-demand fashion, which avoids pre-loading the entire dataset into DRAM for shuffling. To fetch the data from the disk to the system DRAM, each data sample needs to be indexed inside the dataset which enforces the data loading to perform random disk I/O operations [14, 27]. Amidst this backdrop, contemporary research has made strides in two directions: (1) refining the shuffled dataset loading pipeline to conceal its impact on end-to-end training throughput; and (2) identifying an equilibrium between shuffling thoroughness and converged accuracy. However, these advancements come with concessions: (1) hiding data loading overhead is ineffective when it becomes the predominant factor in training performance; (2) the complexity of the data loading pipeline demands extensive modifications to existing software infrastructure; (3) the equilibrium point is not universally applicable across the spectrum of datasets and learning models; (4) the scope of trade-offs is constrained by system capabilities, leaving practitioners to contend with a compromise that sacrifices either accuracy or speed, since Deep learning datasets are expanding at an unprecedented pace, creating new challenges for data processing in model training pipelines. A crucial aspect of these pipelines is dataset shuffling, which significantly improves unbiased learning and convergence accuracy by adhering to the principles of random sampling. However, loading shuffled data for large datasets incurs significant overhead in the deep learning pipeline and severely impacts the end-to-end training throughput. To mitigate this, current deep learning systems often resort to partial dataset shuffling, sacrificing global randomness to maintain acceptable training throughput on large datasets, still leaving global shuffling efficiency issues not fully explored. In this work, we present Rinas, a data loading framework that systematically addresses the performance bottleneck of loading global shuffled datasets. Our key contribution is to offer an intra-batch unordered data fetching approach, which unleashes unexplored parallelism of data loading. We implement Rinas under the PyTorch framework for common dataset libraries HuggingFace and TorchVision. Our experimental results show that Rinas improves the throughput of general language model training and vision model training by up to 59% and 89%, respectively. 1 Introduction Shuffling large datasets remains a critical issue in data processing systems, impacting a wide spectrum of applications [12, 51, 60, 61, 73]. In the realm of deep learning, dataset shuffling is not merely a procedural task but a fundamental aspect of the data loading pipeline. It is instrumental in avoiding overfitting better [33, 72] and benefiting convergence accuracy based on the theoretical foundation [45]. Ideally, the training accuracy improvement derived from data shuffling should introduce minimal shuffling overheads on overall training throughput. Unfortunately, as the sizes of deep learning datasets expand rapidly, the shuffling overhead ∗ Qiang Su and Geoffrey Fox are corresponding authors. The Univesity of Virginia team thanks NSF Grant 2210266 and DOE Grant DE-SC0023452 for partial support. We acknowledge the excellent work of the Rivanna HPC Cluster team. 1" 2312.02375v1,"CityTFT: Temporal Fusion Transformer for Urban Building Energy Modeling Ting-Yu Dai The University of Texas at Austin Austin, TX 78712 funnyengineer@utexas.edu Dev Niyogi The University of Texas at Austin Austin, TX 78712 dev.niyogi@jsg.utexas.edu Zoltan Nagy The University of Texas at Austin Austin, TX 78712 nagy@utexas.edu Abstract Urban Building Energy Modeling (UBEM) is an emerging method to investigate urban design and energy systems against the increasing energy demand at urban and neighborhood levels. However, current UBEM methods are mostly physic-based and time-consuming in multiple climate change scenarios. This work proposes CityTFT, a data-driven UBEM framework, to accurately model the energy demands in urban environments. With the empowerment of the underlying TFT framework and an augmented loss function, CityTFT could predict heating and cooling triggers in unseen climate dynamics with an F1 score of 99.98 % while RMSE of loads of 13.57 kWh. 1 Introduction Urbanization is one of the greatest challenges of modern society. Almost one-third of global greenhouse gas emissions come from buildings and 70% of energy is consumed by urban. As of the latest available data in 2021, the global population stood at over 7.8 billion individuals [1]. Projections indicate that in 2050 [2], the world’s population may surpass 9.7 billion, reflecting a substantial demographic expansion over the intervening years. To address the long-term challenge posed by urbanization effectively, urban building energy modeling emerges as an imperative and requisite approach in academic research and urban planning endeavors. The fundamental purpose of urban building energy modeling is to simulate and analyze the intricate dynamics of energy consumption within urban environments. Compared to building energy modeling, UBEM simulates while considering building height, surface coverage, and spatial arrangement, probing their interactions and discerning their collective influence on energy dynamics at the urban scale. Swan and Ugursal [3] set a tone in reviewing urban modeling of the residential sector, subdividing the modeling methodologies into top-down and bottom-up approaches. Specifically, bottom-up physic-based UBEM methods have garnered attention in recent times [4]. Robinson et al. developed CitySim to assist urban settlements with sustainable planning and also simulate the energy use of a few buildings ranging from tens to thousands. Those UBEM methods are reasonably accurate in simulating the performance of almost any building combination systems [6]. However, customized urban projects, and optimization problems involving many UBEM evaluations, are time-consuming and labor-intensive, and based on the scalability, the simulation runtime can be exponentially high if a broad set of design variations is analyzed. Tackling Climate Change with Machine Learning: workshop at NeurIPS 2023." 2312.02376v1,"Fast Fourier Transform periodic interpolation method for superposition sums in a periodic unit cell Vitaliy Lomakin ∗ Fangzhou Ai December 6, 2023 Department of Electrical and Computer Engineering, University of California San Diego, San Diego 92093, U.S.A Center for Memory and Recording Research, University of California San Diego, San Diego 92093, U.S.A Abstract We propose a Fast Fourier Transform based Periodic Interpolation Method (FFT-PIM), a flexible and computationally efficient approach for computing the scalar potential given by a superposition sum in a unit cell of an infinitely periodic array. Under the same umbrella, FFT-PIM allows computing the potential for 1D, 2D, and 3D periodicities for dynamic and static problems, including problems with and without a periodic phase shift. The computational complexity of the FFT-PIM is of O(N log N ) for N spatially coinciding sources and observer points. The FFT- PIM uses rapidly converging series representations of the Green’s function serving as a kernel in the superposition sum. Based on these representations, the FFT-PIM splits the potential into its near-zone component, which includes a small number of images surrounding the unit cell of interest, and far-zone component, which includes the rest of an infinite number of images. The far-zone component is evaluated by projecting the non-uniform sources onto a sparse uniform grid, performing superposition sums on this sparse grid, and interpolating the potential from the uniform grid to the non-uniform observation points. The near-zone component is evaluated using an FFT- based method, which is adapted to efficiently handle non-uniform source-observer distributions within the periodic unit cell. The FFT-PIM can be used for a broad range of applications, such as periodic problems involving integral equations in computational electromagnetic and acoustic, micromagnetic solvers, and density functional theory solvers. 1 Introduction A common category of problem in computational physics is calculating the potential, referred to as periodic scalar potential (PSP), that is generates by a non-uniform distribution of sources arranged in a unit cell that is extended to an infinite periodic array (Fig. 1). Examples of such problems are phased-array antennas, crystals, periodic gratings, periodically modulated waveguides, to name a few [1, 2, 3, 4]. These problems may present challenges for obtaining accurate and rapid solutions. For a standalone unit cell without periodicity, this task can be accomplished via a standard superposition sum involving free-space Green’s function as its kernel. Such sums can be evaluated rapidly in O(N ) or O(N log N ) computational cost for N sources and observers using several fast methods, such as fast multipole like method [5, 6], H-matrix method [7], interpolation-based methods [8, 9, 10], and FFT-based methods [11, 12, 13, 14]. However, for the periodic case, the superposition sums involve infinite number of images, which poses additional challenges to the slow converge or even divergence as well as a potentially high computational cost. Several existing methods can address such periodic problems with certain assumptions and limitations. Periodic Green’s function (PGF) can be defined in terms of an infinite sum over periodic images. In dynamic problems, e.g., in computational electromagnetics, PGF is assumed to be defined with a phase shift or non-vanishing wavenumber [15, 16, 17]. However, for static problems in which no phase ∗ Corresponding Author. Email: vlomakin@ucsd.edu 1" 2312.02388v1,"Insights to Molecular and Bulk Mechanical Properties of Glassy Carbon Through Molecular Dynamics Simulation and Mechanical Tensile Testing Manali Kunte a,b+ , Lucía Carballo Chanfón a,b+ , Surabhi Nimbalkar a,b , James Bunnell a,b , Emanuel Rodriguez Barajas a,b , Mario Enrique Vazquez a,b , David Trejo-Rodriguez a,b , Carter Faucher a,b , Skelly Smith a,b , Sam Kassegne 1,a,b a NanoFAB.SDSU Research Lab, Department of Mechanical Engineering, College of Engineering, San Diego State University, San Diego, CA, USA 92182, b NSF-ERC Center for Neurotechnology + Manali Kunte and Lucía Carballo Chanfón contributed equally to this work. A BSTRACT With increasing interest in the use of glassy carbon (GC) for a wide variety of application areas, the need for developing fundamental understanding of its mechanical properties has come to the forefront. Further, recent theoretical and modeling works that shed some light on the synthesis of GC through the process of pyrolysis of polymer precursors have highlighted the possibilities of a revisit to investigation of its mechanical properties at a fundamental level. While there are isolated reports on the experimental determination of its elastic modulus, insights into stress-strain behavior of GC material under tension and compression obtained through simulation, either at molecular level or for the bulk material is missing. This current study fills the gap at the molecular level and investigates the mechanical properties of GC using molecular dynamics (MD) simulations which model the atomistic level formation and breaking of bonds using bond-order based reactive force field formulations. The molecular model considered for this simulation has a characteristics 3D cagey structure of 5-, 6-, and 7-membered carbon rings and graphitic domain of a flat graphenelike structure. The GC molecular model was subjected to loading under varying strain rates (0.4/ns, 0.6/ns, 1.25/ns, and 2.5/ns) and varying temperatures (300 - 800 K) in each of the three axes x, y, and z. The simulation showed that GC molecule has distinct stress-strain curves under tension and compression. In tension, MD modeling predicted mean elastic modulus of 5.71 GPa for a single GC molecule with some dependency on strain rates and temperature, while in compression, the elastic modulus was also found to depend on the strain rates as well as temperature and was predicted to have a mean value of 35 GPa. For validation of the simulation results and developing an experimental insight into the bulk behavior, mechanical tests were carried out on dog-bone shaped testing coupons that were subjected to uniaxial tension and loaded until failure. The GC test coupons demonstrated a bulk modulus of 17 ± 2.69 GPa in tension which compare well with those reported in the literature. However, comparing MD simulation outcomes to those of uniaxial mechanical testing, it was clear that the bulk modulus of GC in tension found experimentally is higher than modulus of single GC molecule predicted by MD modeling, which inherently underestimate the bulk modulus. With regard to failure modes, while the MD simulations predicted failure in tension accompanied by breaking of carbon rings within the molecular structure, the mechanical testing, on the other hand, demonstrated failure modes dominated by brittle failure planes largely because of the amorphous structure of GC. 1 Address correspondences to Sam Kassegne • Professor of Mechanical Engineering, NanoFAB.SDSU Research Lab, Department of Mechanical Engineering, College of Engineering, San Diego State University, 5500 Campanile Drive, CA 92182-1323. E-mail: kassegne@sdsu.edu • Tel: (760) 402-7162. 1" 2312.02398v1,"Article Heat-Bath and Metropolis Dynamics in Ising-like Models on Directed Regular Random Graphs Adam Lipowski 1, * ,† , António L. Ferreira 2,† and Dorota Lipowska 3 1 2 Citation: Lipowski, A.; Ferreira, A.L.; Lipowska, D. Heat-Bath and Metropolis Dynamics in Ising-like Models on Directed Regular Random Graphs. Entropy 2023, 1, 0. https://doi.org/ Academic Editor: Antonio M. Scarfone Received: 8 November 2023 Revised: 28 November 2023 Accepted: 29 November 2023 Published: Copyright: © 2023 by the authors. Submitted to Entropy for possible open access publication under the terms and conditions of the Creative Commons Attri- bution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). 3 * † Faculty of Physics, Adam Mickiewicz University in Poznań, 61-614 Poznań, Poland Departamento de Física, I3N, Universidade de Aveiro, 3810-193 Aveiro, Portugal; alf@ua.pt Faculty of Modern Languages and Literatures, Adam Mickiewicz University in Poznań, 61-874 Poznań, Poland; lipowska@amu.edu.pl Correspondence: lipowski@amu.edu.pl These authors contributed equally to this work. Abstract: Using a single-site mean-field approximation (MFA) and Monte Carlo simulations, we examine Ising-like models on directed regular random graphs. The models are directed-network implementations of the Ising model, Ising model with absorbing states, and majority voter models. When these nonequilibrium models are driven by the heat-bath dynamics, their stationary characteristics, such as magnetization, are correctly reproduced by MFA as confirmed by Monte Carlo simulations. It turns out that MFA reproduces the same result as the generating functional analysis that is expected to provide the exact description of such models. We argue that on directed regular random graphs, the neighbors of a given vertex are typically uncorrelated, and that is why MFA for models with heat-bath dynamics provides their exact description. For models with Metropolis dynamics, certain additional correlations become relevant, and MFA, which neglects these correlations, is less accurate. Models with heat-bath dynamics undergo continuous phase transition, and at the critical point, the power-law time decay of the order parameter exhibits the behavior of the Ising mean-field universality class. Analogous phase transitions for models with Metropolis dynamics are discontinuous. Keywords: Ising model; directed random graphs; mean-field approximation; nonequilibrium systems 1. Introduction The formulation of a number of statistical mechanics models was inspired by social dynamics [1]. Indeed, the dynamics of opinion formation [2], of epidemic spreading [3], or diffusion of innovations [4] can be, to some extent, described by a collection of interacting agents, whose states are represented by certain discrete, very often binary, variables. Such an approach bears some similarity to statistical mechanics phenomenology with an Ising model being a prime example [5]. Because statistical mechanics models originally intended to explain some thermodynamic properties of matter, their dynamics were constructed so as to reproduce the canonical equilibrium probability distributions [6]. Having in mind social dynamics applications, we are no longer obliged to impose such restrictions. This is important when modeling, for example, epidemic or rumor spreading since the corresponding models typically contain the so-called absorbing states and are thus much different from equilibrium systems [7]. Although statistical mechanics models are often formulated on regular lattices, such as a square lattice or a linear chain, more heterogeneous networks are usually considered in the context of social dynamics. Corresponding structures are often characterized with broad distributions of vertex degree [8], but also with temporal variability [9], adaptability [10], multilayered structure [11], or directedness of links [12]. Statistical mechanics models placed on such networks constitute a considerable challenge, and sophisticated mathematical methods must be used to examine their properties [13,14]. An important insight Version December 6, 2023 submitted to Entropy https://www.mdpi.com/journal/entropy" 2312.02399v1,"Primordial fluctuations from quantum gravity: 16-cell topological model Pietropaolo Frisoni, 1, ∗ Francesco Gozzini, 2, † and Francesca Vidotto 1, 3, ‡ 1 Dept. of Physics & Astronomy, Western University, London, ON N6A 3K7, Canada 2 Institut für Theoretische Physik, Philosophenweg 16, 69120 Heidelberg, Germany 3 Dept. of Philosophy and Rotman Institute, Western University, London, ON N6A 3K7, Canada We present a numerical analysis of an Hartle-Hawking state for the early universe, in the deep quantum regime, computed using the covariant Loop Quantum Gravity formalism, in a truncation defined by 16-cell and in a simplified case where the dynamics is defined by SU (2) BF theory. We compute mean geometry, fluctuations and correlations. The results are consistent with the hypothesis that refining the triangulation does not affect the global physical picture substantially. I. INTRODUCTION The early universe is believed to have emerged from a phase dominated by quantum gravitational effects. A quantum theory of gravity is needed to describe this phase, and to derive the initial boundary data of the cosmological standard model. An approach to address this derivation in the context of covariant Loop Quantum Gravity has been proposed in [1]. It is based on two hypotheses. First, the initial boundary data of the cosmological standard model can be computed as the result of a quantum gravitational transition amplitude from nothing as originally suggested by Hartle and Hawkings in the (different) context of Euclidean quantum gravity. This state has been argued to be relevant both in the case of a genuine Big Bang and in the case of a Big Bounce [2–4]. Second, a truncation of the theory to a finite number of degrees of freedom capturing only a few lowest frequency modes at each cosmological time represents a good first order approximation in this regime. These hypotheses allows us, in principle, to compute the initial state using the transition amplitudes of the theory. In particular, fluctuations and correlations of the resulting quantum state can be computed and compared with those of the quantum field theory initial state of standard cosmology. In practice, the calculation is hard. Initial numerical investigations have been developed in [5], relying on a drastic truncation, which can be interpreted as triangulation of the spacial geometry of a closed universe into five adjacent tetrahedra. A serious limitation of this particular truncation is that all distinguishable regions of space are adjacent, hiding any dependence of correlations from spatial distance. In this paper we take a step towards removing this limitation. We consider a finer truncation, corresponding to a triangulation of the geometry of a closed universe into sixteen tetrahedra. In this triangulation the distinguishable regions of space are not all adjacent and we can analyse the dependence of the quantum correlations between different regions as a function on their separation. The paper focuses on the setting up of the combinatorics and on showing that the calculations are in principle doable numerical, but does not perform the calculations with the full covariant quantum gravity amplitudes, which will be explored in the future. Here, instead, we use the unphysical simplified version of these amplitudes provided by the SU (2) BF model. This is a rather drastic simplification of the amplitudes and therefore we present the results here more as a proof of concept than an actual test of the theory. While there are regimes where the BF amplitudes happen to be similar to the physical ones, this is not the case in general. In the next chapter we describe the relevant aspects of the geometry of a 16 cell. Then we set of the calculation of the properties of the states that result from the transition to nothing. Finally, we give the numerical results showing the properties of this state. ∗ Electronic address: pfrisoni@uwo.ca † Electronic address: gozzini@thphys.uni-heidelberg.de ‡ Electronic address: fvidotto@uwo.ca" 2312.02426v1,"Superpolynomial period lengths of the winning positions in the subtraction game István Miklós 1,2 and Logan Post 3,4 1 Rényi institute, 1053 Budapest, Reáltanoda u. 13-15, Hungary 2 3 SZTAKI, 1111 Budapest, Lágymányosi u. 11, Hungary Budapest Semesters in Mathematics, 1071 Budapest, Bethlen G. tér 2, Hungary 4 Georgia Institute of Technology, 686 Cherry St NW, Atlanta, GA , USA Abstract Given a finite set of positive integers, A, and starting with a heap of n chips, Alice and Bob alternate turns and on each turn a player chooses x ∈ A with x smaller or equal than the current number of chips and subtract x chips from the heap. The game terminates when the current number of chips becomes smaller than min{A} and no moves are possible. The player who makes the last move is the winner. We can define w A (n) to be 1 if Alice has a winning strategy with a starting heap of n chips and 0 if Bob has a winning strategy. By the Pigeonhole Principle, w A (n) becomes periodic, and it is easy to see that the period length is at most an exponential function of max{A}. The typical period length is a linear function of max{A}, and it is a long time open question if exponential period length is possible. We consider a slight modification of this game by introducing an initial seed S that tells for the few initial numbers of chips whether the current or the opposite player is the winner. In this paper we show that the initial seed cannot change the period length of w A (n) if the size of A is 1 or 2, but it can change the period length with |A| ≥ 3. Further, we exhibit a class of sets A of size 3 and corresponding initial seeds such that the period length becomes a superpolynomial function of max{A}. 1 Introduction Game Theory is the theory of interactive situations or games among rational decision-makers or players in which the decisions of each player are contingent on the decisions of the others. Combinatorial Game Theory considers games with perfect information and without elements of chance. That is, at all times during the game, players have perfect information about the state of the game, and further, the moves in the game are entirely decided by the players, there is no elements of chance once the game has begun. We further require that a combinatorial game must end with a clear winner. An example of a two-player combinatorial game is the subtraction game. For a finite set A ⊂ N + , the 1" 2312.02434v1,"Zhen Liu 1,† , Hao Zhu 1,† , Qi Zhang 2 , Jingde Fu 3 , Weibing Deng 3 , Zhan Ma 1 , Yanwen Guo 4 , Xun Cao 1 1 School of Electronic Science and Engineering, 3 Department of Mathematics, 4 Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China 2 AI Lab, Tencent Company, Shenzhen 518054, China † Equal contribution. Corresponding author: caoxun@nju.edu.cn Implicit Neural Representation (INR), which utilizes a neural network to map coordinate inputs to corresponding attributes, is causing a revolution in the field of signal processing. However, current INR techniques suffer from a restricted capability to tune their supported frequency set, resulting in imperfect performance when representing complex signals with multiple frequencies. We have identified that this frequency-related problem can be greatly alleviated by introducing variable-periodic activation functions, for which we propose FINER. By initializing the bias of the neural network within different ranges, sub-functions with various frequencies in the variable-periodic function are selected for activation. Consequently, the supported frequency set of FINER can be flexibly tuned, leading to improved performance in signal representation. We demonstrate the capabilities of FINER in the contexts of 2D image fitting, 3D signed distance field representation, and 5D neural radiance fields optimization, and we show that it outperforms existing INRs. FINER sin( 𝑥𝑥 + 1 𝑥𝑥) 𝝈𝝈(𝒙𝒙) SIREN sin(𝑥𝑥) Abstract 𝝈𝝈(𝒙𝒙) FINER: Flexible spectral-bias tuning in Implicit NEural Representation by Variable-periodic Activation Functions 𝒙𝒙 𝒙𝒙 (a) Different activation functions for INR 𝒃𝒃 = 𝟎𝟎 𝒃𝒃 = 𝟐𝟐𝝅𝝅 (b) Performance comparisons on 2D image representation Figure 1. Flexible spectral-bias tuning in implicit neural representation (FINER). We observe that the supported frequency set in classical INRs is limited due to the underutilization of activation functions’ definition domain, i.e., they mainly employ the central region near the origin point. To overcome this limitation, we propose a novel variable-periodic activation function for INR. This innovation allows for tuning the supported frequency set by adjusting the initialization range of the bias vector in the neural network. (a) visualizes the selected narrow activation functions in classical periodic activation sin(x) alongside our proposed variable-periodic one sin((|x| + 1)x) with different bias settings. (b) plots the training curves of SIREN and FINER, demonstrating the impact of different initializations applied to the bias vector ⃗b (see Sec. 5.1.1 for more details). 1. Introduction The way a signal is represented is the foundation of all the following problems and determines the paradigm for solving them. Traditional representations, such as the image matrices, point cloud or volumes [35], focus on recording the elements individually and have offered significant contributions in history. However, this representation is increasingly inadequate for addressing the numerous inverse problems arising in modern times, such as neural rendering [35], inverse imaging [39] and simulations [14]. On the contrary, the implicit neural representation (INR) [32], which characterizes a signal by preserving the mapping function from the coordinates to corresponding attributes using neural networks, is gaining increasing atten- tions thanks to the advantages of querying attributes continuously and incorporating differentiable physical process seamlessly. As a result, INR has found widespread appli- 1" 2312.02442v1,"D RAFT VERSION D ECEMBER 6, 2023 Typeset using L A TEX twocolumn style in AASTeX631 A Comparative Study Between M30 and M92 : M92 Is A Merger Remnant With A Large Helium Enhancement J AE -W OO L EE 1 1 Department of Physics and Astronomy, Sejong University, 209 Neungdong-ro, Gwangjin-Gu, Seoul 05006, Republic of Korea, jaewoolee@sejong.ac.kr, jaewoolee@sejong.edu ABSTRACT We perform a comparative study of the ex–situ second–parameter pair globular clusters (GCs) M30 and M92, having similar metallicities but different horizontal branch morphologies. We obtain the similar mean primordial carbon abundances for both clusters. However, M92 shows a large dispersion in carbon due to a more extended C–N anticorrelation, while M30 exhibits a higher primordial nitrogen abundance, suggesting that they have different chemical enrichment histories. Our new results confirm our previous result that M92 is a metal– complex GC showing a bimodal metallicity distribution. We also find that the metal–rich group of stars in M92 shows a helium enhancement as large as ∆Y ∼ 0.05 from the red giant branch bump (RGBB) V magnitudes, which can also be supported by (i) a lack of bright RGB stars, (ii) synthetic evolutionary HB population models and (iii) the more extended spatial distribution due to different degree of the diffusion process from their lower masses. We reinterpret the [Eu/Fe] measurements by other, finding that the two metallicity groups of stars in M92 have significantly different [Eu/Fe] abundances with small scatters. This strongly suggests that they formed independently out of well mixed interstellar media in different environments. We suggest that M92 is a more complex system than a normal GC, most likely a merger remnant of two GCs or a even more complex system. In Appendix, we address the problems with the recently developed color–temperature relations and the usage of broadband photometry in the populational taggings. Keywords: Stellar populations (1622); Population II stars (1284); Hertzsprung Russell diagram (725); Globular star clusters (656); Chemical abundances (224); Stellar evolution (1599); Red giant branch (1368); Red giant bump (1369); Horizontal branch (2048) 1. INTRODUCTION Galactic globular clusters (GCs) had played critical roles in stellar and Galactic astronomy for several decades. Due to the seminal discovery of multiple stellar populations (MSPs) in GCs (D’Ercole et al. 2008; Carretta et al. 2009; Lee et al. 2009; Milone et al. 2017; Gratton et al. 2019; Cassisi & Salaris 2020), the present situation may not be as lucid as before, since the homogeneous chemical composition of a given GC is no longer valid. Nonetheless, they are still the unique object to calibrate the theoretical models for the structure and evolution of low–mass stars with various chemical compositions (e.g., see Cassisi & Salaris 2013; VandenBerg, Casagrande, & Edvardsson 2022). Galactic GCs have also been extensively studied to figure out the formation and evolution of our Galaxy. During the past several decades, not only the in–situ but also the ex–situ GCs have been identified (e.g., Searle & Zinn 1978; Lee & Carney 1999), which can nicely be interpreted with a cold dark matter cosmology that predicts a hierarchical structure formation in the universe. In this study, we perform a comparative study of two ex–situ metal–poor GCs, M92 (NGC 6341) and M30 (NGC 7099), which have long been considered as standard metal–poor GCs. Recent studies of M92 discovered a stellar stream related to M92 (Sollima 2020; Thomas et al. 2020). Furthermore, Thomas et al. (2020) argued that M92 could be a GC that was brought into our Galaxy by a dwarf galaxy or a remnant nucleus of the progenitor dwarf galaxy. 1 In our previous study, we discussed that M92 is a metal–complex GC with an atypical primordial population (Lee 2023a), in sharp contrast to a long-held belief of a prototypical mono–metallic metal–poor GC. As Bekki & Tsujimoto (2016) proposed, for example, GCs in dwarf galaxies with slightly different formation epochs can merge into a metal–complex GC, such as M92. Interestingly, Kirby, Ji, & Kovalev (2023) found the r– process elemental abundance variations only in the first generation (FG) 2 of stars, apparently constraining temporal separation between the FG and the SG of stars. On the other hand, M30 is known to be a member of the Gaia–Enceladus system, that merged into our Galaxy about 10 Gyr ago lead- 1 Note that M92 is known to be associated to Gaia–Enceladus (Forbes 2020; Callingham et al. 2022). 2 In our work, the FG denotes GC stars having the similar chemical com- positions as the Galactic field stars with the same metallicity, while the second generation (SG) of stars showing the chemical compositions that experienced proton capture processes at high temperature." 2312.02443v1,"E4SRec: An Elegant Effective Efficient Extensible Solution of Large Language Models for Sequential Recommendation Xinhang Li Chong Chen Xiangyu Zhao Tsinghua Univerisity Beijing, China xh-li20@mails.tsinghua.edu.cn Huawei Cloud BU Beijing, China chenchong55@huawei.com City Univerisity of Hong Kong Hong Kong xianzhao@cityu.edu.hk Yong Zhang Chunxiao Xing Tsinghua Univerisity Beijing, China zhangyong05@tsinghua.edu.cn Tsinghua Univerisity Beijing, China xingcx@tsinghua.edu.cn ABSTRACT KEYWORDS The recent advancements in Large Language Models (LLMs) have sparked interest in harnessing their potential within recommender systems. Since LLMs are designed for natural language tasks, existing recommendation approaches have predominantly transformed recommendation tasks into open-domain natural language generation tasks. However, this approach necessitates items to possess rich semantic information, often generates out-of-range results, and suffers from notably low efficiency and limited extensibility. Furthermore, practical ID-based recommendation strategies, reliant on a huge number of unique identities (IDs) to represent users and items, have gained prominence in real-world recommender systems due to their effectiveness and efficiency. Nevertheless, the incapacity of LLMs to model IDs presents a formidable challenge when seeking to leverage LLMs for personalized recommendations. In this paper, we introduce an Elegant Effective Efficient Extensible solution for large language models for Sequential Recommendation (E4SRec), which seamlessly integrates LLMs with traditional recommender systems that exclusively utilize IDs to represent items. Specifically, E4SRec takes ID sequences as inputs, ensuring that the generated outputs fall within the candidate lists. Furthermore, E4SRec possesses the capability to generate the entire ranking list in a single forward process, and demands only a minimal set of pluggable parameters, which are trained for each dataset while keeping the entire LLM frozen. We substantiate the effectiveness, efficiency, and extensibility of our proposed E4SRec through comprehensive experiments conducted on four widely-used real-world datasets. The implementation code is accessible at https://github.com/HestiaSky/E4SRec/. Large Language Model, Sequential Recommendation, Item ID and Indexing CCS CONCEPTS • Information systems → Recommender systems; Language models; Personalization. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WWW ’24, May 13–17, 2024, Singapore, Singapore © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/10.1145/1122445.1122456 ACM Reference Format: Xinhang Li, Chong Chen, Xiangyu Zhao, Yong Zhang, and Chunxiao Xing. 2023. E4SRec: An Elegant Effective Efficient Extensible Solution of Large Language Models for Sequential Recommendation. In Proceedings of the ACM Web Conference 2024 (WWW ’24), May 13–17, 2024, Singapore, Singapore. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/1122445.1122456 1 INTRODUCTION Recommender systems, in existence for decades, are instrumental in mitigating information overload and enhancing user experience on the Web [1, 21, 35]. These systems discern user preferences to offer tailored recommendations on content or items [6, 24, 36]. Nowadays, the rise of Large Language Models (LLMs) [20] is revolutionizing our familiar landscapes [43], which excel in assimilating real-world knowledge from the Web and achieving proficient natural language generation. Recently, there has been a significant upsurge in research endeavors focused on leveraging LLMs for recommendation tasks and this trend is progressively becoming more inevitable [47]. While many non-tuning approaches [10, 14, 25], including prompting and in-context learning [3], strive to leverage the zero/few-shot learning ability, tuning approaches usually outperform them as they are fine-tuned for specific tasks using dedicated data. However, bridging the substantial gap between natural language generation tasks and recommendation tasks remains a formidable challenge. To tackle above challenge, existing approaches [2, 11, 17, 50] predominantly convert the recommendation task into a natural language generation task to align it with the inherent capabilities of LLMs. This involves the direct generation of item names or ratings based on appropriate prompts. However, such a solution has several limitations as depicted in Figure 1. First, these methods aim to harness the inherent knowledge of LLMs for recommendation through fine-tuning, essentially crafting an external knowledgeaugmented content-based recommendation [47]. Hence, they demand rich semantic information through the prompt. When the semantic information is insufficient or vague due to a huge number of homogeneous items, which is very common in recommendation, these methods are not able to yield satisfying performance." 2312.02447v1,"Fast non-autoregressive inverse folding with discrete diffusion John J. Yang Massachusetts Institute of Technology johnyang@mit.edu Jason Yim Massachusetts Institute of Technology jyim@csail.mit.edu Regina Barzilay Massachusetts Institute of Technology regina@csail.mit.edu Tommi Jaakkola Massachusetts Institute of Technology tommi@csail.mit.edu Abstract Generating protein sequences that fold into a intended 3D structure is a fundamental step in de novo protein design. De facto methods utilize autoregressive generation, but this eschews higher order interactions that could be exploited to improve inference speed. We describe a non-autoregressive alternative that performs inference using a constant number of calls resulting in a 23 times speed up without a loss in performance on the CATH benchmark. Conditioned on the 3D structure, we fine-tune ProteinMPNN to perform discrete diffusion with a purity prior over the index sampling order. Our approach gives the flexibility in trading off inference speed and accuracy by modulating the diffusion speed. Code: https://github.com/johnyang101/pmpnndiff 1 Introduction De novo protein design aims to design proteins from first principles without modifying an existing protein [7]. This involves designing protein 3D structures for a desired function such as binding then determining the sequence that would fold in-vivo into the designed structure. The first step is the protein structure generation problem for which RFdiffusion has become state-of-the-art [15]. The aim of this work is to develop a discrete diffusion model towards the second step of sampling sequences conditioned to fold into a desired 3D structure, referred to as inverse (protein) folding [6]. Generative models have already become the preferred tool for inverse folding: ProteinMPNN [3] is a widely used method with successful experimental validation. However, ProteinMPNN has two limitations. The first is its autoregressive decoding which scales linearly and can be prohibitively slow for large proteins. The second is the uniformly random decoding order which is likely suboptimal given substantial evidence of higher-order interactions occurring in protein evolution [13]. Inspired by RFdiffusion, in which a pre-trained protein folding model is fine-tuned with diffusion, we use a pre-trained ProteinMPNN and fine-tune it with diffusion. We explore multiple variants of discrete diffusion and find the best configuration to result in equivalent performance as ProteinMPNN on foldability while using 23 times less compute. Our best diffusion model is depicted in Figure 1. Our contribution enables exciting possibilities to extend ProteinMPNN using conditional diffusion models for improvement in both speed and controllable generation. The paper is structured as follows. Related work is provided in Appendix A. Section 2 describes our method of fine-tuning ProteinMPNN with discrete diffusion. Section 3 evaluates each diffusion Machine Learning for Structural Biology Workshop, NeurIPS 2023." 2312.02467v1,"Object Importance Estimation using Counterfactual Reasoning for Intelligent Driving Pranay Gupta 1 , Abhijat Biswas 1 , Henny Admoni 1 , David Held 1 Abstract— The ability to identify important objects in a complex and dynamic driving environment is essential for autonomous driving agents to make safe and efficient driving decisions. It also helps assistive driving systems decide when to alert drivers. We tackle object importance estimation in a datadriven fashion and introduce HOIST - Human-annotated Object Importance in Simulated Traffic. HOIST contains driving scenarios with human-annotated importance labels for vehicles and pedestrians. We additionally propose a novel approach that relies on counterfactual reasoning to estimate an object’s importance. We generate counterfactual scenarios by modifying the motion of objects and ascribe importance based on how the modifications affect the ego vehicle’s driving. Our approach outperforms strong baselines for the task of object importance estimation on HOIST. We also perform ablation studies to justify our design choices and show the significance of the different components of our proposed approach. I. I NTRODUCTION Assistive and autonomous driving agents need to reason about objects within the driving scene to make safe driving decisions. However, not all objects are equally important. The ability to identify important objects would allow autonomous driving systems to perform efficient path planning and resource management by reducing the number of objects that require tracking and modeling. Moreover, prior work has also shown that importance estimation can help reduce false positive alerts in assistive driving systems that detect driver inattention and preemptively warn the driver (e.g., detecting a jaywalking pedestrian and highlighting them on a HUD) [1]. Recent work has also shown improvement in autonomous driving agents’ performance when contrastively trained to de-prioritize unimportant objects [2]. Thus, in this work, we focus on the task of important object identification in the context of driving. In prior works [3], [4], [5], [6], [7] researchers have tried to identify salient regions in a driving scene by modeling driver attention through eye-gaze fixations. However, in the context of driving, the correlation between gaze and attention is questionable [8] (see Sec. 2) as the driver may not always look at important objects due to distractions [9], inexperience [10], or paying attention via peripheral vision [11]. Another line of work [12], [13], [14] tries to identify the importance of objects within the scene directly. However, the definition of “important objects” used in that work is limited to objects which influence the driving behavior of the ego vehicle. We extend the definition of “important 1 Pranay Gupta, Abhijat Biswas, Henny Admoni and David Held are with the Robotics Institute, Carnegie Mellon University, Pittsburgh, PA, USA. pranaygu@andrew.cmu.edu, abhijat@cmu.edu, henny@cmu.edu, dheld@andrew.cmu.edu (a) Red boxes indicate vehicles important for making safe driving decisions by the ego vehicle. (b) The blue car is important since its removal would cause the ego vehicle to speed up. (c) The red vehicle is important since its changing lanes would risk a collision with the ego vehicle. Fig. 1: We perform counterfactual reasoning to identify important vehicles in a driving scenario. We modify the motion of vehicles, and ascribe importance based on how the modification affects the ego vehicle’s driving. objects” to include all the objects that a driver should be aware of, in order to drive the ego vehicle safely (Sec. III- B) i.e., all objects necessary to maintain sufficient situational awareness [15]. This includes objects that both currently influence and can potentially influence the driving decisions of the ego vehicle. In addition to enhancing autonomous and assistive driving systems, identifying objects important according to our definition allows for the development of situational awareness support systems [1]. Moreover, the object-importance datasets proposed in prior works [12], [13] are unimodal (only ego-view RGB videos) and do not benefit from multiple sensor modalities (multiview RGB cameras, LiDAR) for object detection and importance estimation; further, these datasets are not publicly accessible. To address these challenges, we introduce HOIST: Human-annotated Object Importance in Simulated Traffic. HOIST consists of driving scenarios from representative routes of the Longest6 benchmark [16] with humanannotated object importance. While prior works [12], [13], [14] obtain annotations using ego-view driving videos, we collect annotations using bird’s-eye-view RGB videos of the driving scene, as the bird’s-eye-view offers more context regarding the driving scenario as compared to the front-view video. In addition to the RGB videos, HOIST also contains data from all sensor modalities and configurations supported" 2312.02474v1,"Laser induced Flqouet topological phases in a 2D weak topological insulator with unconventional nonlinear dispersion Aayushi Agrawal 1, ∗ and Jayendra N. Bandyopadhyay 1, † 1 Department of Physics, Birla Institute of Technology and Science, Pilani 333031, India (Dated: December 6, 2023) Recently, we presented a two-dimensional (2D) model of a weak topological insulator formed by stacking an N number of Su-Schrieffer-Heeger (SSH) chains [1]. We now study the influence of periodic driving on the topological properties of this system, which has all the fundamental symmetries, by shining it with circularly polarized light (CPL). The CPL is chosen because it breaks the time-reversal symmetry, which induces more exotic topological properties in the system. We investigate two different formations of the N stacked SSH chains: all the SSH chains are topologically trivial in one formation and nontrivial in the other one. In contrast to the undriven or static case, both formations exhibit distinct topological behaviors. Here, we particularly derive the Floquet or the effective Hamiltonian using the replica method, which facilitates the study of highand low-frequency regimes. We have discovered that this model exhibits laser-induced Floquet topological phases with higher Chern numbers. This system has nonlinear dispersion along both directions with additional k x − k y coupling terms, which made the dispersion of this system unconventional. We closely study the role of this unconventional dispersion in the system at the low-energy limit and its response to periodic driving. The low-energy Hamiltonian also reveals a hierarchy in the gaps of the neighboring Floquet bands. Interestingly, though this model has nonlinear quasi-energy dispersion, it still shows some signatures of hierarchy, which was observed in the system with linear dispersion like graphene. Furthermore, we study the effect of linearly polarized light (LPL) on the topological properties of the system. In response to the LPL driving, the bandtouching point either opens up or splits into two band-touching points. I. INTRODUCTION Floquet engineering is becoming a vast area of research, where a desired solid-state system is synthesized by periodic driving. A primary goal of this research area is to design a periodic driving protocol to quickly introduce or enhance desired exotic properties in a given system in a very controlled way [2]. In the realm of topological insulators (TIs), periodically driven TIs or Floquet TIs have been studied extensively. Periodic driving introduces many exciting features in the TIs, which may not be possible to realize by any static means [3– 10]. These periodically driven systems can be realized experimentally by ultracold atoms in optical lattices [11, 12]. The quasi-nD systems, engineered by stacking numerous nD systems, came into light after the discovery of weak topological insulators (WTIs). These topological materials were discovered in quasi-2D quantum spin Hall systems (QSH) in which 2D QSH layers were stacked and formed a 3D layered structure [13, 14]. A few studies concentrated on quasi- 2D systems, such as the 3D layered structure of graphene and topological crystalline insulators (TCI) [15–23]. The recent literature focuses primarily on 2D and some quasi-2D materials. Very little attention is paid to the quasi-1D systems formed by a systematic stacking of identical 1D systems. Recently, present authors rigorously study an N number of stacked SSH chains [1]. Similarly, some studies have investigated the topological properties of another quasi-1D model, an extended Su-Schrieffer-Heeger model (E-SSH) [24, 25]. The E-SSH model is a 1D SSH chain where all the hopping ∗ p20170415@pilani.bits-pilani.ac.in † jnbandyo@gmail.com amplitudes are modulated by a cyclic parameter θ, and this cyclic parameter is considered as another synthetic dimension. The Floquet version of the SSH chain, the simplest 1D TI, displays interesting properties [26–29]. An intriguing feature of the static E-SSH model is that the system’s phase diagram resembles the Haldane model’s phase diagram. The interlink between the E-SSH model and the N stacked SSH model is that by promoting θ to an actual dimension, one can obtain a N stacked SSH model. The E-SSH model is also studied with different periodic driving schemes such as Dirac-delta kickings, and sinusoidal driving [25, 28]. Through Floquet, the quasi-2D system of N stacked graphene layers is also explored where circularly polarized light (CPL) is used as an external periodic drive and topological phases with the high Chern number (C) are observed [16]. The CPL is widely recognized for breaking the time-reversal symmetry [30–37]. As a result, it creates a new gap at the band touching points, and the system harbors the quantum Hall effect without using any external magnetic field or creating Landau levels [38]. Furthermore, the CPL can be used to detect optical chirality, thermoelectric transport, photo-voltage, the dynamical Hall effect, and as a probe for high harmonic generation [39–43]. This work aims to induce new Floquet topological phases through CPL in the N stacked SSH chains model. As per our knowledge, the periodically driven 2D WTI is not studied in the literature. Here, we study a 2D WTI under periodic driving. This undriven N stacked SSH chains follows all three fundamental symmetries (chiral, particle-hole, and time-reversal), which host nontrivial topology but with Chern number C = 0. In the undriven case, two possible constructions were addressed: N stacked SSH model where each SSH chain is topologically trivial (winding number, w = 0), and each SSH chain is nontrivial (w = 1) [1]. These two cases" 2312.02502v1,"Difference of surface effects in the inclusive (p, p ′ x) and (d, d ′ x) reactions Hibiki Nakada, 1, ∗ Shinsuke Nakayama, 2 Kazuki Yoshida, 3 Yukinobu Watanabe, 4 and Kazuyuki Ogata 5, 1 1 Research Center for Nuclear Physics, Osaka University, Ibaraki, Osaka 567-0047, Japan 2 Nuclear Date Center, Japan Atomic Energy Agency, Tokai, Ibaraki 319-1195, Japan 3 Advanced Science Research Center, Japan Atomic Energy Agency, Tokai, Ibaraki 319-1195, Japan 4 Department of Advanced Energy Science and Engineering, Kyushu University, Fukuoka 816-8580, Japan 5 Department of Physics, Kyushu University, Fukuoka 819-0395, Japan Background: Previous studies have revealed surface effects in inclusive (n, n ′ x) and (p, p ′ x) reactions. These findings have contributed significantly to the improvement of nuclear data evaluation. However, surface effect in inclusive (d, d ′ x) reaction has hardly been investigated. Purpose: The purpose of this study is to investigate the difference of the surface effects in the (p, p ′ x) and (d, d ′ x) reactions. We also aim to clarify the origin of the difference. Methods: The energy spectra and their radial distributions for the (p, p ′ x) and (d, d ′ x) reactions are calculated by the one-step semiclassical distorted wave model. Results: In the region with small energy transfer, the radial distribution of the energy spectra for the (d, d ′ x) reaction is found to be shifted toward the outer region of the nucleus more than that of the (p, p ′ x) reaction. Furthermore, the calculations ignoring the nuclear absorption show that the radial distributions in the two reactions are nearly identical. Conclusion: The surface effect in the (d, d ′ x) reaction is more pronounced than in the (p, p ′ x) reaction. A significant cause of the difference is that deuteron undergoes stronger absorption by the nucleus than proton. I. INTRODUCTION Phenomenological models have played an important role in the nuclear data evaluation for nucleon-induced reactions [1–5]. For the calculation of pre-equilibrium processes, which are prominent at incident energies above about 10 MeV, the exciton model [6] has been widely used. This phenomenological model has achieved great success in combination with global parameterization based on analyses of a large number of experimental data for (N, N ′ x) reactions [7, 8]. It has been argued in these analyses that the inclusion of a surface localization effect is important in reproducing the shape of experimental energy spectrum [7, 9]. This effect is taken into account by introducing corrections to the density of states in the exciton model. Note that the importance of the surface effect is supported not only by the comparison with experimental data but also by the microscopic theoretical analysis [10] using the semiclassical distorted wave (SCDW) model, which has no free adjustable parameter [11–15]. Evaluation activities of deuteron nuclear data have gradually begun [1, 4, 16], mainly motivated by the development of deuteron accelerator-based intensive neutron sources [17, 18]. In the evaluation of deuteron nuclear data, phenomenological models [19, 20] using state densities similar to those in the exciton model are often employed to calculate the components of inelastic scattering to continuum states. The evaluation of the inelastic scattering is important since it affects the transport of deuterons in a material. Therefore, as is the case with ∗ Email address: nakada27@rcnp.osaka-u.ac.jp the exciton model, whether the surface effect should be taken into account in the state densities used in the above inelastic scattering model, and if so, to what extent, is an important factor in the deuteron nuclear data evaluation. However, since experimental data for (d, d ′ x) reactions are very limited, there is concern that making this judgment based on a comparison with specific experimental data may give unphysical results under other conditions. A deep and comprehensive understanding for surface effects in (d, d ′ x) reactions is required. Under these circumstances, in Ref. [21], the one-step SCDW model [11] has been successfully applied to the description of inclusive (d, d ′ x) reactions. The SCDW model has the property which describes the inclusive cross section as an incoherent integral of the contributions at individual collision points [10, 22]. Therefore, the model is expected to be useful for investigating the peripherality of the (d, d ′ x) reaction. Findings from the microscopic reaction model analysis will provide guidance and support for the consideration of the surface effect in the phenomenological deuteron inelastic scattering models. The purpose of this study is to investigate the surface effect in the (d, d ′ x) reaction and to clarify the difference from that in the (p, p ′ x) reaction. We also aim to clarify the cause of the difference. The above analyses are performed utilizing the above-mentioned property of the SCDW model. Exploring the difference in surface effects between the two reactions are of interest from the view point not only of nuclear data evaluation but also of fundamental nuclear physics. Furthermore, we apply the findings from the SCDW analysis to the implementation of the surface effect into the phenomenological deuteron inelastic scattering model. This is intended to show how much microscopic reaction theory contributes to improv-" 2312.02503v1,"SAVE: Protagonist Diversification with Structure Agnostic Video Editing Yeji Song 1 Wonsik Shin 1 Junsoo Lee 2 Jeesoo Kim 2 Nojun Kwak 1 1 Seoul National University 2 NAVER Webtoon AI {ldynx,wonsikshin,nojunk}@snu.ac.kr {junsoolee,jeesookim}@webtoonscorp.com https://ldynx.github.io/SAVE/ Figure 1. Diversification of a protagonist. We present a single-shot video editing method that replaces the protagonist of a source video with the one described by the editing prompt maintaining the motion of the original protagonist. Different from previous works, our method is able to cope with diverse protagonists with substantial changes in their body structure. While other methods either fail to follow the editing prompt (second row) or generate a different motion (see Fig. 5), our method achieves success in both challenges (third row). Abstract tion method. We adopt motion personalization that isolates the motion from a single source video and then modifies the protagonist accordingly. To deal with the natural discrepancy between image and video, we propose a motion word with an inflated textual embedding to properly represent the motion in a source video. We also regulate the motion word to attend to proper motion-related areas by introducing a novel pseudo optical flow, efficiently computed from the precalculated attention maps. Finally, we decouple the motion from the appearance of the source video with an additional pseudo word. Extensive experiments demonstrate the editing capability of our method, taking a step toward more diverse and extensive video editing. Driven by the upsurge progress in text-to-image (T2I) generation models, text-to-video (T2V) generation has experienced a significant advance as well. Accordingly, tasks such as modifying the object or changing the style in a video have been possible. However, previous works usually work well on trivial and consistent shapes, and easily collapse on a difficult target that has a largely different body shape from the original one. In this paper, we spot the bias problem in the existing video editing method that restricts the range of choices for the new protagonist and attempt to address this issue using the conventional image-level personaliza- 1" 2312.02531v1,"PolyFit: A Peg-in-hole Assembly Framework for Unseen Polygon Shapes via Sim-to-real Adaptation Geonhyup Lee*, Joosoon Lee*, Sangjun Noh, Minhwan Ko, Kangmin Kim, and Kyoobin Lee† Abstract— The study addresses the foundational and challenging task of peg-in-hole assembly in robotics, where misalignments caused by sensor inaccuracies and mechanical errors often result in insertion failures or jamming. This research introduces PolyFit, representing a paradigm shift by transitioning from a reinforcement learning approach to a supervised learning methodology. PolyFit is a Force/Torque (F/T)-based supervised learning framework designed for 5- DoF peg-in-hole assembly. It utilizes F/T data for accurate extrinsic pose estimation and adjusts the peg pose to rectify misalignments. Extensive training in a simulated environment involves a dataset encompassing a diverse range of peghole shapes, extrinsic poses, and their corresponding contact F/T readings. To enhance extrinsic pose estimation, a multipoint contact strategy is integrated into the model input, recognizing that identical F/T readings can indicate different poses. The study proposes a sim-to-real adaptation method for real-world application, using a sim-real paired dataset to enable effective generalization to complex and unseen polygon shapes. PolyFit achieves impressive peg-in-hole success rates of 97.3% and 96.3% for seen and unseen shapes in simulations, respectively. Real-world evaluations further demonstrate substantial success rates of 86.7% and 85.0%, highlighting the robustness and adaptability of the proposed method. Videos of data generation and experiments are available online at https://sites.google.com/view/polyfit-peginhole. I. I NTRODUCTION Peg-in-hole assembly using robotics is a fundamental yet challenging task. Misalignment issues often occur between assembled parts due to sensor inaccuracies and mechanical errors, potentially resulting in system damages like insertion failures or jamming. Various methods based on compliance control and heuristic algorithms have been proposed to address misalignment in peg-in-hole assembly [1]–[4]. However, traditional methods may require manual calibration for specific peg-hole shapes or dynamic modeling of contact situations. These requirements complicate the development of assembly strategies for different component shapes and limit generalization across shapes. The proposed PolyFit framework for the peg-in-hole task is illustrated in Fig.1. Learning-based peg-in-hole methodologies have been proposed to address the challenges mentioned above [5]–[9]. One study guided a peg into a hole by visually minimizing the seam through vision-based reinforcement learning (RL), showcasing adaptability to unseen shapes [5]. However, vision-based methods may be sensitive to external conditions *Equal Contribution All authors are with the School of Integrated Technology (SIT), Gwangju Institute of Science and Technology (GIST), Cheomdan-gwagiro 123, Bukgu, Gwangju 61005, Republic of Korea. † Corresponding author: Kyoobin Lee kyoobinlee@gist.ac.kr Fig. 1: Schematic illustration of addressing misalignment using the proposed PolyFit framework for a peg-in-hole task. such as occlusion, varying lighting conditions, and camera placement. Meanwhile, methodologies based on Force/Torque (F/T) sensors operate through direct contact with objects and exhibit less sensitivity to external environments challenging for vision sensors. Several studies have utilized contact F/T data sampling in the real world for peg-in-hole tasks, employing learned contact dynamics and an insertion policy to transfer to new shapes and validate against untrained ones [6], [7]. While demonstrating adaptability to unseen objects, collecting real-world data for these studies can be challenging owing to reduced efficiency and the risk of potential damage to the robot. In response to these challenges, contactbased sim-to-real adaptation has emerged as a promising strategy to leverage simulations for data collection [8], [9]. While simulation environments offer a safer and more datarich context for learning, defining and randomizing dynamic parameters present substantial obstacles to efficient sim-toreal adaptation. The proposed PolyFit introduces a significant paradigm shift in peg-in-hole assembly approaches, moving from a RL methodology to a supervised learning-based approach. Addressing the limitations of traditional methods, PolyFit is an F/T-based supervised learning framework designed for 5-degrees-of-freedom (DoF) peg-in-hole assembly. The framework undergoes extensive training in simulation and is adapted for real-world environments." 2312.02532v1,"DRAFT: Dense Retrieval Augmented Few-shot Topic Classifier Framework Keonwoo Kim ∗ Seoul National University VRCREW Inc. keonwookim@bdai.snu.ac.kr Abstract With the growing volume of diverse information, the demand for classifying arbitrary topics has become increasingly critical. To address this challenge, we introduce DRAFT, a simple framework designed to train a classifier for fewshot topic classification. DRAFT uses a few examples of a specific topic as queries to construct Customized dataset with a dense retriever model. Multi-query retrieval (MQR) algorithm, which effectively handles multiple queries related to a specific topic, is applied to construct the Customized dataset. Subsequently, we finetune a classifier using the Customized dataset to identify the topic. To demonstrate the efficacy of our proposed approach, we conduct evaluations on both widely used classification benchmark datasets and manually constructed datasets with 291 diverse topics, which simulate diverse contents encountered in real-world applications. DRAFT shows competitive or superior performance compared to baselines that use in-context learning, such as GPT-3 175B and InstructGPT 175B, on few-shot topic classification tasks despite having 177 times fewer parameters, demonstrating its effectiveness. 1 Introduction With the prevalence of the Internet and social media, there is a significant demand for classifying or detecting texts related to specific topics within the vast amount of information pouring in from the Internet. For instance, on social media platforms where an overwhelming volume of content is generated, there may exist a need to monitor and filter content associated with particular issues (e.g., drugs). Additionally, with the remarkable progress in large language models (LLMs) (Brown et al., 2020; Ouyang et al., 2022; Chowdhery et al., 2022; Rae et al., 2021; Scao et al., 2022; Thoppilan et al., 2022) in recent times, there is also an increasing * Work done while at Neosapience. Younggun Lee Neosapience yg@neosapience.com demand to detect specific topics within the text generated by LLMs. The use of LLMs often contains ethical concerns with the issues of hallucination, as they possess the capability to generate morally inappropriate or unintended content (Ganguli et al., 2022; Perez et al., 2022). However, as the amount of content shared on social media and generated by LLMs increase exponentially, verifying each piece of content becomes challenging for individuals. In natural language processing (NLP), research related to the challenges mentioned earlier can be considered a topic classification task since the demand for automatically classifying texts on a specific topic exists. Recent pre-trained language models (Devlin et al., 2018; Liu et al., 2019; Clark et al., 2020; He et al., 2020) have gained considerable recognition for their ability to achieve high performance in topic classification tasks. To train a topic classification model, it is common practice to rely on supervised learning using a training dataset with labeled data. Most existing methods on a topic classification have primarily relied on benchmark datasets (Zhang et al., 2015; Auer et al., 2007). To the best of our knowledge, they have predominantly focused on improving model performance on benchmark datasets that involve a limited number of topics rather than addressing long-tailed arbitrary topics in real-world scenarios. Regarding real-world applications, the availability of labeled datasets that cover diverse topics is often limited due to the substantial cost of building such datasets. This constraint poses a challenge for directly deploying topic classification models in practical scenarios, thereby calling for a solution that enables their flexible application. Few-shot classification, which performs classification using few text examples, can be applied even without a training dataset for a predefined topic, enabling its extension to tasks classifying a diverse range of arbitrary topics. To the best of our knowledge, existing few-shot classification" 2312.02538v1,"A Multi-Granularity-Aware Aspect Learning Model for Multi-Aspect Dense Retrieval Xiaojie Sun Keping Bi Jiafeng Guo ∗ CAS Key Lab of Network Data Science and Technology, ICT, CAS University of Chinese Academy of Sciences Beijing, China sunxiaojie21s@ict.ac.cn CAS Key Lab of Network Data Science and Technology, ICT, CAS University of Chinese Academy of Sciences Beijing, China bikeping@ict.ac.cn CAS Key Lab of Network Data Science and Technology, ICT, CAS University of Chinese Academy of Sciences Beijing, China guojiafeng@ict.ac.cn Sihui Yang Qishen Zhang Zhongyi Liu Guannan Zhang Xueqi Cheng CAS Key Lab of Network Data Science and Technology, ICT, CAS University of Chinese Academy of Sciences Beijing, China yangsihui22s@ict.ac.cn CAS Key Lab of Network Data Science and Technology, ICT, CAS University of Chinese Academy of Ant Group Sciences Beijing, China Beijing, China {qishen.zqs,zhongyi.lzy,zgn138592}@alibabacxq@ict.ac.cn inc.com ABSTRACT CCS CONCEPTS Dense retrieval methods have been mostly focused on unstructured text and less attention has been drawn to structured data with various aspects, e.g., products with aspects such as category and brand. Recent work has proposed two approaches to incorporate the aspect information into item representations for effective retrieval by predicting the values associated with the item aspects. Despite their efficacy, they treat the values as isolated classes (e.g., “Smart Homes”, “Home, Garden & Tools”, and “Beauty & Health”) and ignore their fine-grained semantic relation. Furthermore, they either enforce the learning of aspects into the CLS token, which could confuse it from its designated use for representing the entire content semantics, or learn extra aspect embeddings only with the value prediction objective, which could be insufficient especially when there are no annotated values for an item aspect. Aware of these limitations, we propose a MUlti-granulaRityaware Aspect Learning model (MURAL) for multi-aspect dense retrieval. It leverages aspect information across various granularities to capture both coarse and fine-grained semantic relations between values. Moreover, MURAL incorporates separate aspect embeddings as input to transformer encoders so that the masked language model objective can assist implicit aspect learning even without aspect-value annotations. Extensive experiments on two real-world datasets of products and mini-programs show that MU- RAL outperforms state-of-the-art baselines significantly. Code will be available at the URL 1 . • Information systems → Information retrieval. ∗ Jiafeng Guo is the corresponding author. 1 https://github.com/sunxiaojie99/MURAL This work is licensed under a Creative Commons Attribution International 4.0 License. WSDM ’24, March 4–8, 2024, Merida, Mexico © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0371-3/24/03. https://doi.org/10.1145/3616855.3635770 KEYWORDS Dense Retrieval, Multi-Aspect, Pre-training ACM Reference Format: Xiaojie Sun, Keping Bi, Jiafeng Guo, Sihui Yang, Qishen Zhang, Zhongyi Liu, Guannan Zhang, and Xueqi Cheng. 2024. A Multi-Granularity-Aware Aspect Learning Model for Multi-Aspect Dense Retrieval. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4–8, 2024, Merida, Mexico. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3616855.3635770 1 INTRODUCTION Query: “sports gloves” Aspect: Category (Phrase-Level) Items Title i1 ATERCEL Weight Lifting Gloves Full Palm Protection, Cycling, Exercise,… Exercise & Fitness; i2 Hestra Army Leather Heli Ski Glove - Classic 3-Finger Snow Glove for Skiing, … Sport Specific Clothing; i3 HEAD Leather Racquetball Glove - Web Extra Grip Breathable Glove… Tennis & Racquet Sports; i4 HSL 2 Pairs Reusable Kitchen Dishwashing Gloves, Waterproof, Non-Slip, Gardening,… Household Supplies; Relevance Figure 1: An example of a query and its candidate items. In recent years, dense retrieval methods have been extensively studied in both Information Retrieval (IR) and Natural Language Processing (NLP) communities [9]. On the shoulders of pre-trained language models (PLMs), they have achieved compelling performance. However, they are mostly studied for unstructured data and have not investigated how to effectively leverage the aspect information of structured data, such as category for products and affiliation for people. For example, in Figure 1, the query “sports gloves” targets gloves for sports use so kitchen gloves should be avoided. It is obvious that the category of the four items could help" 2312.02542v1,"Fortress: Securing IoT Peripherals with Trusted Execution Environments Peterson Yuhala Jämes Ménétrey Pascal Felber University of Neuchâtel Neuchâtel, Switzerland peterson.yuhala@unine.ch University of Neuchâtel Neuchâtel, Switzerland james.menetrey@unine.ch University of Neuchâtel Neuchâtel, Switzerland pascal.felber@unine.ch Marcelo Pasin Valerio Schiavoni University of Neuchâtel Neuchâtel, Switzerland marcelo.pasin@unine.ch University of Neuchâtel Neuchâtel, Switzerland valerio.schiavoni@unine.ch Abstract With the increasing popularity of Internet of Things (IoT) devices, securing sensitive user data has emerged as a major challenge. These devices often collect confidential information, such as audio and visual data, through peripheral inputs like microphones and cameras. Such sensitive information is then exposed to potential threats, either from malicious software with high-level access rights or transmitted (sometimes inadvertently) to untrusted cloud services. In this paper, we propose a generic design to enhance the privacy in IoT-based systems by isolating peripheral I/O memory regions in a secure kernel space of a trusted execution environment (TEE). Only a minimal set of peripheral driver code, resident within the secure kernel, can access this protected memory area. This design effectively restricts any unauthorised access by system software, including the operating system and hypervisor. The sensitive peripheral data is then securely transferred to a user-space TEE, where obfuscation mechanisms can be applied before it is relayed to third parties, e.g., the cloud. To validate our architectural approach, we provide a proof-of-concept implementation of our design by securing an audio peripheral based on inter-IC sound (I 2 S), a serial bus to interconnect audio devices. The experimental results show that our design offers a robust security solution with an acceptable computational overhead. CCS Concepts • Security and privacy → Trusted computing; • Computer systems organization → Embedded systems. Keywords Confidential computing, Trusted Execution Environments, ARM TrustZone, OP-TEE, Kernel drivers, IoT, Secure peripherals, Edge computing Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SAC ’24, April 8–12, 2024, Avila, Spain © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0243-3/24/04. . . $15.00 https://doi.org/10.1145/3605098.3635994 ACM Reference Format: Peterson Yuhala, Jämes Ménétrey, Pascal Felber, Marcelo Pasin, and Valerio Schiavoni. 2024. Fortress: Securing IoT Peripherals with Trusted Execution Environments. In The 39th ACM/SIGAPP Symposium on Applied Computing (SAC ’24), April 8–12, 2024, Avila, Spain. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3605098.3635994 1 Introduction The Internet of Things (IoT) [5] concept has gained tremendous popularity in recent years. In broad terms, IoT refers to the network of smart devices capable of collecting, processing, and exchanging data over the internet. IoT has vast applications across various domains, including smart homes, healthcare, agriculture, industrial automation, and enables a wide range of possibilities, such as remotely controlling devices, monitoring environmental conditions, improving efficiency and enhancing safety. The widespread adoption of IoT platforms has raised serious security and privacy concerns due to the nature of interconnected devices and the vast amounts of data generated [2]. For instance, in smart homes, large amounts of sensitive data are constantly generated through sensors and hardware peripheral devices, e.g., cameras, microphones. This data is usually transmitted to untrusted cloud services and third-party providers, oftentimes with little regard to the confidentiality of the shared data. The involvement of multiple parties introduces privacy issues, as the data could be used for purposes beyond the user’s knowledge or control. For example, in July 2019, more than 1000 Google Assistant recordings were involuntarily leaked [10, 16], with part of these recordings activated accidentally by users. Furthermore, privileged software like the underlying operating system (OS) or hypervisor can be compromised [18, 33], potentially leading to data breaches or unauthorized access to sensitive data. To cope with these security threats, hardware-based security technologies that allow the creation of trusted execution environments (TEEs) have been developed. Popular and emerging implementations include Intel software guard extensions (SGX) [12], Intel trust domain extensions (TDX) [7], and AMD secure encrypted virtualization (SEV) [13] which target server-end environments, and ARM TrustZone [29] or RISC-V MultiZone [14], respectively for low-power ARM-based or RISC-V-based client-end devices. Although TEE frameworks like OP-TEE [31] have been leveraged to secure both user and kernel level applications, a holistic and" 2312.02581v1,"Acta Acustica 2020, 4, 25  K. Müller & F. Zotter, Published by EDP Sciences, 2020 https://doi.org/10.1051/aacus/2020024 Available online at: https://acta-acustica.edpsciences.org S CIENTIFIC A RTICLE Auralization based on multi-perspective ambisonic room impulse responses Kaspar Müller and Franz Zotter * Institute of Electronic Music and Acoustics, University of Music and Performing Arts Graz, 8010 Graz, Austria Received 28 May 2020, Accepted 10 October 2020 Abstract – Most often, virtual acoustic rendering employs real-time updated room acoustic simulations to accomplish auralization for a variable listener perspective. As an alternative, we propose and test a technique to interpolate room impulse responses, specifically Ambisonic room impulse responses (ARIRs) available at a grid of spatially distributed receiver perspectives, measured or simulated in a desired acoustic environment. In particular, we extrapolate a triplet of neighboring ARIRs to the variable listener perspective, preceding their linear interpolation. The extrapolation is achieved by decomposing each ARIR into localized sound events and re-assigning their direction, time, and level to what could be observed at the listener perspective, with as much temporal, directional, and perspective context as possible. We propose to undertake this decomposition in two levels: Peaks in the early ARIRs are decomposed into jointly localized sound events, based on time differences of arrival observed in either an ARIR triplet, or all ARIRs observing the direct sound. Sound events that could not be jointly localized are treated as residuals whose less precise localization utilizes direction-of-arrival detection and the estimated time of arrival. For the interpolated rendering, suitable parameter settings are found by evaluating the proposed method in a listening experiment, using both measured and simulated ARIR data sets, under static and time-varying conditions. Keywords: 6dof rendering, Room impulse responses, Variable-perspective rendering, Virtual acoustics 1 Introduction An interactive, variable listener perspective in virtual acoustic environments necessitates rendering of movements in six degrees of freedom (6DoF), i.e. auralization for arbitrary translation and orientation of a listener. Utilizing room simulations is a common means to achieve variableperspective audio rendering [1–3]. Naturally, such auralizations require a certain level of sophistication to reach authenticity even in static scenarios, and they should moreover ensure smooth transitions when the listener position is time-variant. A comparison of recent room simulation algorithms revealed that auralizations are perceived to be mostly plausible, although not authentic [3]. This motivates the development of approaches based on multi-perspective recordings or measured natural acoustic environments as alternatives, and the development of perspective interpolation approaches as helpful simplifications. There are recent works that extrapolate singleperspective, first or higher-order Ambisonic recordings by projecting directionally localized sound objects onto a outer convex hull or onto predefined virtual room walls to achieve auralization in 6DoF [4–8]. Other approaches use *Corresponding author: zotter@iem.at plane-wave translations for variable-perspective auralization of single Ambisonic recordings [9, 10]. However, these methods mostly become inaccurate for great extrapolation distances. To enable position shifts in a wider area, one can consider interpolating between Ambisonic recordings captured at multiple perspectives in the room simultaneously. While basic approaches apply a distance-weighted linear interpolation of the recorded perspectives near the listener [11, 12], parametric methods mostly use spatial timefrequency processing to extract and localize sound sources in order to synthesize them at a desired listener perspective [13–16], mixed with diffuse or unlocalized sound field residuals. A detailed overview of existing methods is provided in [17]. To avoid typical artifacts of signal-dependent time-frequency filtering, some other works render audio in 6DoF using broadband processing [18–21], which, however, would stay limited in spatial precision. Auralization by convolution with measured multiperspective directional room impulse responses (DRIRs) is an alternative to the rendering of multi-perspective surround recordings. Such a convolution approach complies with typical auralization, in which the directional impulse response is obtained from room-acoustics simulation. Despite a measured multi-perspective DRIR grid is This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited." 2312.02593v1,"6D Assembly Pose Estimation by Point Cloud Registration for Robot Manipulation Kulunu Samarawickrama 1 , Gaurang Sharma 1 , Alexandre Angleraud 1 and Roel Pieters 1 Abstract— The demands on robotic manipulation skills to perform challenging tasks have drastically increased in recent times. To perform these tasks with dexterity, robots require perception tools to understand the scene and extract useful information that transforms to robot control inputs. To this end, recent research has introduced various object pose estimation and grasp pose detection methods that yield precise results. Assembly pose estimation is a secondary yet highly desirable skill in robotic assembling as it requires more detailed information on object placement as compared to bin picking and pick-andplace tasks. However, it has been often overlooked in research due to the complexity of integration in an agile framework. To address this issue, we propose an assembly pose estimation method with RGB-D input and 3D CAD models of the associated objects. The framework consists of semantic segmentation of the scene and registering point clouds of local surfaces against target point clouds derived from CAD models to estimate 6D poses. We show that our method can deliver sufficient accuracy for assembling object assemblies using evaluation metrics and demonstrations. The source code and dataset for the work can be found at: https://github.com/KulunuOS/6DAPose I. Introduction The ability to grasp an object successfully is a highly desired skill of robotic manipulators in applications such as industrial manufacturing, mining, space explorations, etc. The advancement of modern robot manipulators with multiple degrees of freedom, precise sensing and control capabilities highly encourages the development of the robot’s cognition skills in order to execute dexterous tasks in above fields either autonomously or with human collaboration. Several research publications have demonstrated that visionbased deep learning and reinforcement learning can yield successful results in endowing cognitive skills such as object grasping [1], [2]. In that regard, the state of the art on robotic manipulation is heavily focused on object pose estimation and grasp pose detection [3], [4]. Pose estimation via point cloud based deep learning methods such as PVN3D [5] and FFB6D [6] have shown great accuracy in 6D pose estimation with fast inference times, which are ideal characteristics for robotic grasping applications. However, object pose alone is not sufficient to perform a successful grasp. The robot endeffector should reach a pose that produces a fail-proof grasping of the object, which is a different definition compared to the object pose. Grasp pose for an object can be sampled either analytically or using human expertise. Some analytical methods [7], [8], [9] have proposed deriving grasp pose by analyzing object model and depth information acquired from a sensor. Although these methods can produce feasible 1 Automation Technology and Mechanical Engineering, Tampere University, 33720, Tampere, Finland, firstname.surname@tuni.fi Fig. 1: Overview of assembly pose estimation pipeline depicting for each step the base assembly point cloud in red and the estimated assembly point cloud (object pose) in green. grasp poses for a single object, they fail when objects are in clutter. GraspNet [10] introduced a model-agnostic method to directly produce grasp candidates on any observed unknown partial point cloud. This method produces multiple grasp candidates and prunes unfeasible candidates in an end-toend pipeline which makes it highly suitable for bin picking, sorting and inspection tasks. High computational resource consumption of these methods are, however, an undesirable feature for robotic applications. However, there exists a disparity in research for precise robotic assembly, as the majority of the existing studies on robotic assembly focus only on initial object pose estimation. Robotic assembly requires the additional estimation of object placement pose (see Fig. 1). We use the synonymous term ’assembly pose’ henceforth in this paper. Assembly pose can be described as the pose of the end-effector that results in the successful placement of a grasped object that satisfies assembly constraints. The primary constraint that defines accuracy of assembly is the relative pose between objects of the assembly. Other assembly constraints vary depending on the nature of the task and the task environment, such as specific placement direction or motion, but is not considered in this work." 2312.02603v1,"Automatic Robot Path Planning for Visual Inspection from Object Shape Osama Tasneem 1 and Roel Pieters 1 Abstract— Visual inspection is a crucial yet time-consuming task across various industries. Numerous established methods employ machine learning in inspection tasks, necessitating specific training data that includes predefined inspection poses and training images essential for the training of models. The acquisition of such data and their integration into an inspection framework is challenging due to the variety in objects and scenes involved and due to additional bottlenecks caused by the manual collection of training data by humans, thereby hindering the automation of visual inspection across diverse domains. This work proposes a solution for automatic path planning using a single depth camera mounted on a robot manipulator. Point clouds obtained from the depth images are processed and filtered to extract object profiles and transformed to inspection target paths for the robot end-effector. The approach relies on the geometry of the object and generates an inspection path that follows the shape normal to the surface. Depending on the object size and shape, inspection paths can be defined as single or multi-path plans. Results are demonstrated in both simulated and real-world environments, yielding promising inspection paths for objects with varying sizes and shapes. Code and video are open-source available at: https:// github.com/CuriousLad1000/Auto-Path-Planner I. I NTRODUCTION Visual inspection is an indispensable part of any industry [1]. From product quality control to the maintenance of machines, visual inspection plays a vital part in improving the overall production yield and reducing the operation and maintenance costs. Due to the complexity of products and machines, the process of visual inspection is generally done by humans, causing downtime and delay in production and, at the same time, exposing the person to hazardous working environments [2]. However, in many cases, manual visual inspection is difficult to achieve, due to issues in accessibility or the high costs involved, creating demand for automated robotic solutions (see Fig. 1). For example, in the paper mill industry, suction rolls play a vital part in the production of paper from pulp. Based on the stage of use, they perform multiple functions including transportation of the sheet of paper, removing water from the paper, and dewatering the felt. This process can result in the blockage of the hundreds of thousands of holes in the suction roll. Current practices involve manual inspection of these rollers, which is timeconsuming and ergonomically unfriendly. As the holes are small and narrowly spaced, operators are required to inspect the holes closely with special lighting equipment. Current growth in technologies has led to new possibilities where 1 Cognitive Robotics group, Unit of Automation Technology and Mechanical Engineering, Tampere University, 33720, Tampere, Finland; firstname.surname@tuni.fi Fig. 1: Automated path planning utilizes a robot with eyein-hand camera to extract an inspection path that follows the geometry of the object. the task of visual inspection can be automated with sufficient accuracy [3] by utilizing machine learning techniques. However, the introduction of automation in inspection tasks does not intend to completely replace the human but to reduce the laborious task assigned to humans and improve the overall efficiency and accuracy of the system [1]. Techniques such as deep learning [4], [5], [6] are able to recognize various forms of anomalies that a human inspector used to look for and the implementation of such methods has produced better performance than humans on various applications such as object recognition [7], [8] and sketch search [9]. The accuracy of machine learning techniques being used to detect object anomalies heavily rely on the quality of data for training and validation. Collection of such data can become more difficult due to the size, shape, and location of the object. This is especially true for the inspection of larger infrastructures such as buildings and tunnels. Current data collection methods involve placing multiple cameras at different angles around an object [10] or placing a single camera [11] on top and using an array of mirrors around the object to obtain different views [12]. As products and machines used in factories come in different sizes and shapes, re-arrangement of vision sensors is required to correctly align and gather sample data for training and validation. This introduces another bottleneck in the process to automate visual inspection." 2312.02607v1,"Projective Space Stern Decoding and Application to SDitH Kevin Carrier 1 , Valerian Hatey 1 , and Jean-Pierre Tillich 2 1 ETIS UMR 8051 - Cergy-Paris Université, ENSEA, CNRS, kevin.carrier@cyu.fr,valerian.hatey@ensea.fr 2 Project COSMIQ, Inria de Paris, jean-pierre.tillich@inria.fr ⋆ Abstract. We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size of the finite field by reducing it to a low weight codeword problem and working in the relevant projective space. We apply this technique to SDitH and show that the parameters of both the original submission and the updated version fall short of meeting the security requirements asked by the NIST. 1 Introduction Code-based cryptography is based on the hardness of the decoding problem. In its syndrome (and fixed weight) version it is given for the Hamming metric (where we denote the Hamming weight of a vector x by ∣x∣) by (n−k)×n Problem 1.1 (Syndrome Decoding SD(H, s, t)). Given a matrix H ∈ F q , n a syndrome s ∈ F n−k and a weight t ∈ J0, nK, find a vector e ∈ F such that He = s q q and ∣e∣ = t. In other words, it consists in solving a linear system with a constraint on the weight of the solution. This non-linear constraint is commonly believed to make the problem difficult on average over H for suitable values of t. Despite that many efforts have been spent over the last 60 years [Pra62, Ste88, Dum91, MMT11, BJMM12, MO15, BM17, BM18, CDMT22], the problem remains hard in the range of parameters given above, even with the help of a quantum computer [Ber10, KT17]. Thus, the decoding problem has raised interest among cryptosystem designers. It is today the heart of the security of PKE and signature schemes submitted to the NIST competitions 3 such as Classic McEliece [AAB + 22], BIKE [ABC + 22], Wave [BCC + 23] and SDitH [AMFG + 23]. It is quite common to study the binary version of the decoding problem but the non-binary case also aroused interest [BLP10, BLP11] or more recently with the signature schemes Wave [DST19] or SDitH [FJR22] for instance. The security of Wave is ⋆ The work of KC, VH and JPT was funded by the French Agence Nationale de la Recherche through ANR JCJC DECODE (ANR-22-CE39-0004-01) for KC and VH and ANR-22-PETQ-0008 PQ-TLS for JPT. 3 https://csrc.nist.gov/projects/post-quantum-cryptography" 2312.02613v1,"1 A Unified Simulation Framework for Visual and Behavioral Fidelity in Crowd Analysis Niccoló Bisagno, Nicola Garau, Antonio Luigi Stefani, and Nicola Conci University of Trento CNIT - Consorzio Interuniversitario per le Telecomunicazioni Via Sommarive, 9, 38123 Povo, Trento TN (Italy) {niccolo.bisagno, nicola.garau, antonioluigi.stefani, nicola.conci}@unitn.it Abstract—Simulation is a powerful tool to easily generate annotated data, and a highly desirable feature, especially in those domains where learning models need large training datasets. Machine learning and deep learning solutions, have proven to be extremely data-hungry and sometimes, the available real-world data are not sufficient to effectively model the given task. Despite the initial skepticism of a portion of the scientific community, the potential of simulation has been largely confirmed in many application areas, and the recent developments in terms of rendering and virtualization engines, have shown a good ability also in representing complex scenes. This includes environmental factors, such as weather conditions and surface reflectance, as well as human-related events, like human actions and behaviors. We present a human crowd simulator, called UniCrowd, and its associated validation pipeline. We show how the simulator can generate annotated data, suitable for computer vision tasks, in particular for detection and segmentation, as well as the related applications, as crowd counting, human pose estimation, trajectory analysis and prediction, and anomaly detection. I. I NTRODUCTION The ever increasing demand for data to train modern machine learning and deep learning algorithms appears to be unstoppable. When a given problem appears to be nearly solved, a new one takes over, showing the limitations of the previously developed architectures and the associated datasets in addressing it. This is common in well-known tasks like image classification [39], [17], natural language processing [68], [4], speech recognition [15], medical and ultrasound imaging [75], remote sensing [72]). To cope with this issue, researchers have come up with a very heterogeneous set of possible solutions, exploring supervised and unsupervised approaches. As for supervised learning, the basic requirement is the availability of a large collection of labelled data. However, if the amount of annotated data is scarce, supervised solutions tend to overfit, leading to poor generalisation capabilities. The literature has shown that this problem can be mitigated with a variety of regularization techniques, such as the dropout [63], batch normalization [32], transfer learning between different datasets [6], pre-training the network on different datasets [19], or implementing fewshot [64] and zero-shot learning [69] techniques. Another way to tackle the data starvation problem consists of looking at it from the data perspective: fine-tuning and data augmentation are among the most common solutions [61]. Through fine tuning, we teach a network that was conceived to address a certain task, to reconfigure itself to solve a different problem; with data augmentation, we acknowledge that the amount and quality of data necessary to perform the training is not sufficient, and it is necessary to apply transformations to the available samples so as to create new instances. In both cases, this requires extensive and costly annotation sessions, generally performed manually, and validated by humans. In image processing and computer vision, the annotation cost is particularly high, since images and videos are annotated one by one, often requiring the manual selection of the relevant regions of interest. This may lead to the so-called curse of dataset annotation [70]: when datasets tend to be smaller, the more detailed the annotation is. Viceversa, the dataset size is prioritized over the annotation accuracy, leading to poor or inconsistent labels [17]. Some approaches also rely on unsupervised learning, which leverages the potential of not requiring labeled samples, through, for example, clustering and self-supervision [31]. However, unsupervised techniques tend to exhibit their inherent shortcomings in terms of accuracy, being less performing than supervised approaches. When we refer to data, they can be collected both in controlled environments [35] or, as we say, in the wild. Data acquisition in controlled environments usually delivers better annotated data, thanks to an adequate acquisition setup, though with the risk of being less representative of real-world scenarios. When working in the wild, issues emerge, such as privacy, light conditions, overall quality of the data, need of complex setups and costly equipment. Among the tools to address the lack of annotated data, researchers have explored the chance of replacing (or complementing) the collected samples by using simulation frameworks [2], [22], [53], [62]. Simulators provide accurate ground truth data, reducing the time required for annotation and enabling the collection of bigger and exhaustive datasets. However, relying on simulators might introduce additional issues, as the generated (synthetic) data must closely resemble their real counterpart. Simulators should then ensure that the generated data comply with visual fidelity, and, when humans or moving agents are involved, behavioral fidelity. Visual Fidelity assesses how close the synthetic scene visually resembles a real-world one, as captured by a real camera. A given algorithm should perform comparably when trained" 2312.02614v1,"Prompt Optimization via Adversarial In-Context Learning Xuan Long Do 1,3∗ , Yiran Zhao 1∗ , Hannah Brown 1∗ , Yuxi Xie 1 , James Xu Zhao 1 , Nancy F. Chen 3 , Kenji Kawaguchi 1 , Michael Qizhe Xie 1† , Junxian He 2† 1 National University of Singapore, 2 Hong Kong University of Science and Technology, 3 Institute for Infocomm Research (I 2 R), A*STAR {xuanlong.do,zhaoyiran,hsbrown,xieyuxi,xu.zhao}@u.nus.edu, {kenji,michaelxie}@u.nus.edu, junxianh@cse.ust.hk,nfychen@i2r.a-star.edu.sg Abstract We propose a new method, Adversarial In-Context Learning (adv-ICL 3 ), to optimize prompt for in-context learning (ICL) by employing one LLM as a generator, another as a discriminator, and a third as a prompt modifier. As in traditional adversarial learning, adv-ICL is implemented as a two-player game between the generator and discriminator, where the generator tries to generate realistic enough output to fool the discriminator. In each round, given an input prefixed by task instructions and several exemplars, the generator produces an output. The discriminator is then tasked with classifying the generator input-output pair as model-generated or real data. Based on the discriminator loss, the prompt modifier proposes possible edits to the generator and discriminator prompts, and the edits that most improve the adversarial loss are selected. We show that adv-ICL results in significant improvements over state-of-the-art prompt optimization techniques for both open and closed-source models on 11 generation and classification tasks including summarization, arithmetic reasoning, machine translation, data-to-text generation, and the MMLU and big-bench hard benchmarks. In addition, because our method uses pre-trained models and updates only prompts rather than model parameters, it is computationally efficient, easy to extend to any LLM and task, and effective in low-resource settings. 1 Introduction Generative Adversarial Networks (GANs) and adversarial learning (Goodfellow et al., 2014) have driven significant progress across a range of domains, including image generation (Goodfellow et al., 2014; Radford et al., 2015; Arjovsky et al., 2017), domain adaptation (Ganin et al., 2016; Tzeng et al., 2017; Xie et al., 2017; Louppe et al., 2017), and enhancing model robustness (Szegedy et al., 2013; Biggio et al., 2013; Carlini & Wagner, 2017; Madry et al., 2018). At its core, adversarial learning frames training as a minimax game between a generator and a discriminator. The generator aims to generate output realistic enough that the discriminator classifies it as real (i.e., not generated), while the discriminator aims to differentiate between generator output and training data samples as accurately as possible. After each round, the parameters of both models are updated based on an adversarial loss, and the process is repeated. As the generator improves, the discriminator improves ∗ Equal contribution. Equal advising. 3 Our codes are available at https://github.com/zhaoyiran924/Adv-In-Context-Learning. † Preprint. Under review." 2312.02635v1,"Multi-rotor Aerial Vehicles in Physical Interactions: A Survey I. I NTRODUCTION Since the deployment of the first industrial robot sixty years ago [1], engineers and researchers have been constantly looking for ways to use robots in processes that can be automated, with the aim of improving productivity in different industries and freeing humans from repetitive tedious tasks. Meanwhile, inspired by birds and insects, engineers have developed aerial vehicles that also bring new features to the industry. One of the aerial vehicle designs that has exhibited high potential in a wide range of applications is multi-rotor aerial vehicles. Definition 1 (Multi-rotor Aerial Vehicles (MAVs)). MAVs are motorized aerial vehicles that generate thrust force using their rotors directly to compensate for gravity and control motion. In the rest of this paper, terms such as quadrotors, hexarotors, bicopters, and monocopters represent different designs of MAVs based on the authors’ choices specific to the article under discussion. As shown in Figure 1, MAVs occupy a small but significant niche in the realm of modern robots, possessing unique characteristics. With a high level of maturity in studies on MAVs that have opened many possible paths of future development, we would like to answer the following question in this survey: Problem 1 (What is the purpose of MAVs?). What tasks are MAVs most suitable for? What are the mechanisms and J. Xu is with the Autonomous and Intelligent Robotics Laboratory (AIRLab), Lehigh University, PA, USA. Email: jix519@lehigh.edu Underwater Vehicles Multi-rotor Vehicles Aerial Vehicles Fixedwing aircrafts, Flappingwing aircrafts, Gliders, …… Stationary Robots Ground Vehicles Mobile Robots Abstract— Research on Multi-rotor Aerial Vehicles (MAVs) has experienced remarkable advancements over the past two decades, propelling the field forward at an accelerated pace. Through the implementation of motion control and the integration of specialized mechanisms, researchers have unlocked the potential of MAVs to perform a wide range of tasks in diverse scenarios. Notably, the literature has highlighted the distinctive attributes of MAVs that endow them with a competitive edge in physical interaction when compared to other robotic systems. In this survey, we present a categorization of the various types of physical interactions in which MAVs are involved, supported by comprehensive case studies. We examine the approaches employed by researchers to address different challenges using MAVs and their applications, including the development of different types of controllers to handle uncertainties inherent in these interactions. By conducting a thorough analysis of the strengths and limitations associated with different methodologies, as well as engaging in discussions about potential enhancements, this survey aims to illuminate the path for future research focusing on MAVs with high actuation capabilities. Robots Jiawei Xu Fig. 1: MAVs are but a speck of dust in the modern world of robotic systems, but they open the door to a new field of study in Robotics. characteristics of MAVs that make them advantageous in handling these tasks compared to other types of robots? How can developers highlight these characteristics and improve the mechanisms to enhance the effectiveness of MAVs when performing these tasks? Compared to fixed-station manipulators or ground vehicles, MAVs have access to all three axes of 3D space, but they always need to spend energy maintaining stability in flight. Unlike other types of aircraft that require wings as lifting surfaces, MAVs use propellers to generate thrust force directly to counter gravity, reducing the impact of aerodynamic effects and allowing them to hover in place [2]. However, this also results in low energy efficiency during operation [3] and challenges in achieving high-speed flight [4]. Researchers often emphasize the simplicity of MAVs in design and control [5], [6], [7], their agility [8], and their scalability [9], [10]. Field applications are also a common topic of study for MAVs, such as air surveillance [11], map classification [12], coverage control [13], and aerial construction [14], [15], particularly compared to fixed-wing aircraft [16], [17], [18]. The mixture of advantages and disadvantages of MAVs over other types of robots makes them more suitable for dealing with tasks that require flexible deployment and the ability to follow trajectories on command while carrying a payload. From the perspective of accentuating the positive and avoiding the negative, we find a common ground for the tasks for which MAVs are most suitable, that is, low-speed and short-term physical interaction. One of the most well-explored aspects of physical interaction in the robotics literature is manipulation, especially with fixed-station manipulator arms [19], [20], [21]. Such robotic arms are capable of achieving robustness and efficiency higher than that of human operators in many scenarios. Meanwhile, research on mobile and aerial manipulations" 2312.02637v1,"Efficient Microwave Spin Control of Negatively Charged Group-IV Color Centers in Diamond Gregor Pieplow ∗ and Mohamed Belhassen ∗ Department of Physics, Humboldt-Universität zu Berlin, Newtonstr. 15, 12489 Berlin, Germany Tim Schröder † Department of Physics, Humboldt-Universität zu Berlin, Newtonstr. 15, 12489 Berlin, Germany and Ferdinand-Braun-Institut, Gustav-Kirchhoff-Straße 4, 12489 Berlin, Germany (Dated: December 6, 2023) In this work, we provide a comprehensive overview of the microwave-induced manipulation of electronic spin states in negatively charged group-IV color centers in diamond with a particular emphasis on the influence of strain. Central to our investigation is the consideration of the full vectorial attributes of the magnetic fields involved, which are a dc field for lifting the degeneracy of the spin levels and an ac field for microwave control between two spin levels. We observe an intricate interdependence between their spatial orientations, the externally applied strain, and the resultant efficacy in spin state control. In most work to date the ac and dc magnetic field orientations have been insufficiently addressed, which has led to the conclusion that strain is indispensable for the effective microwave control of heavier group-IV vacancies, such as tin- and lead-vacancy color centers. In contrast, we find that the alignment of the dc magnetic field orthogonal to the symmetry axis and the ac field parallel to it can make the application of strain obsolete for effective spin manipulation. Furthermore, we explore the implications of this field configuration on the spin’s optical initialization, readout, and gate fidelities. I. INTRODUCTION For many quantum information applications [1] such as quantum sensing [2], quantum networks [3, 4] and quantum computing [5], key requirements include ultrahigh fidelity initialization, both single and two-qubit gate operations, as well as readout. Notably, the execution of quantum algorithms that offer a quantum advantage [6] demand near-perfect operations within the coherence time of the system. In particular, the fidelity of singlequbit gates now consistently exceeds 99% across diverse platforms, including superconducting qubits [7], quantum dots [8], trapped ions [9], and ultra-cold atoms [10]. An emerging class of optically active spin-1/2 systems for quantum information applications is found in negatively charged group-IV color centers in diamond (G4Vs) [11], including silicon (SiV), germanium (GeV), tin (SnV), and lead vacancy center (PbV). G4Vs exhibit notably high optical efficiency, with a Debye-Waller factor of 60-80% [12–14]), in contrast to the 3% Debye- Waller factor observed in the negatively charged nitrogen vacancy center [15]. Moreover, they display lower sensitivity to electric noise [16], rendering them highly suitable for integration into nanostructures [3, 17], which is crucial for efficient coupling to a precisely defined optical mode [18]. Furthermore, G4Vs exhibit excellent spin coherence times, with, for example, the GeV showing T 2 = 20 ms [19]. This work primarily focuses on the theoretic analysis of single-qubit gates acting on the electronic spin, which op- ∗ These authors contributed equally to this work † Corresponding author: tim.schroeder@physik.hu-berlin.de a b B B B Figure 1. Illustration of the physical system. a) group-IV color center with the respective angles of the dc magnetic field B dc and the ac driving field B ac relative to the symmetry axis. b) Level scheme of the defect without and with an external dc magnetic field, which lifts the spin degeneracy. The qubit driven by B ac is composed of the states |1⟩ and |2⟩. erate in the microwave regime. In the first works demonstrating coherent microwave control of the SnV [20, 21] a consensus has emerged, which asserts that strain is an essential prerequisite for manipulating the spin of the heavier implanted group-IV elements such as tin and lead, owing to their increased spin-orbit coupling in comparison to lighter elements like silicon and germanium. Consequently, we are particularly interested in the interplay of strain and spin-orbit coupling in the investigation of coherent control of the spin qubit. Interestingly, we discovered a magnetic field configuration, for which strain is not only unnecessary but actually hampers the efficiency of the coherent control. As we will demonstrate that the efficiency depends on the orientation of the static field B dc , which is necessary" 2312.02642v1,"Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolic Fuzzing Yibo Wang Syracuse University ywang349@syr.edu Wanning Ding Syracuse University wding04@syr.edu Kai Li San Diego State University kli5@sdsu.edu Abstract low cost. That is, the attack costs in terms of the fees of adversarial transactions are significantly lower than those of normal transactions victimized by the denied mempool. In the existing literature, DETER [22] is the first ADAMS attack which works by sending invalid transactions to directly evict normal transactions in the mempool. MemPurge [29] is a similar mempool attack that finds a way to send overdraft transactions into Geth’s pending-transaction pool and cause eviction there. These known attacks are easy to detect (i.e., following the same direct-eviction pattern), and in fact, the DETER bugs reported in 2021 have been successfully fixed in all major Ethereum clients as of Fall 2023, including Geth, Nethermind, Erigon, and Besu. Given this state of affairs, we pose the following research question: Are there new ADAMS vulnerabilities in the latest Ethereum clients already patched against direct-eviction based attacks? This work takes an automatic and systematic approach to discovering ADAMS vulnerabilities, unlike the existing DETER bugs that are manually found. Fuzzing mempool implementations is promising but also poses unique challenges: Unlike the consensus implementation that reads only valid confirmed transactions, the mempool residing pre-consensus needs to handle various unconfirmed transactions, imposing a much larger input space for the fuzzer. For instance, a mempool can receive invalid transactions under legitimate causes, 1 and factors such as fees are key in determining transaction admission outcomes. Existing blockchain fuzzers including Fluffy [30], Loki [23] and Tyr [19] all focus on fuzzing consensus implementation and don’t explore the extra transaction space required by mempool fuzzing. As a result, the naive application of a consensus fuzzer to fuzz mempool misses detecting the DETER bugs as evaluated in § 4.1, let alone discover more sophisticated new ADAMS bugs. Proposed methods: To enable efficient mempool fuzzing, our key observation is that real-world mempool implementations admit transactions based on abstract “symbols”, such as pending and future transactions, instead of concrete value. In blockchains, mempool controls transaction flow before consensus, denial of whose service hurts the health and security of blockchain networks. This paper presents MPFUZZ , the first mempool fuzzer to find asymmetric DoS bugs by symbolically exploring mempool state space and optimistically estimating the promisingness an intermediate state is in reaching bug oracles. Compared to the baseline blockchain fuzzers, MPFUZZ achieves a > 100× speedup in finding known DETER exploits. Running MPFUZZ on six major Ethereum clients leads to the discovering of new mempool vulnerabilities, which exhibit a wide variety of sophisticated patterns including stealthy mempool eviction and mempool locking. Rule-based mitigation schemes are proposed against newly discovered vulnerabilities. 1 Yuzhe Tang Syracuse University ytang100@syr.edu Introduction In Ethereum, a mempool buffers unconfirmed transactions from web3 users before they are included in the next blocks. Mempool provides the essential functionality to bridge the gap between varying rates of submitted transactions and rates of produced blocks, despite what types of transactions it serves, whether public or private transactions. As shown in recent studies [22], denying a mempool service can force the blockchain to produce blocks of low or even zero (Gas) utilization, undermining validators’ incentives and shrinking the blockchain networks in the long run, re-introducing the 51% attacks. Besides, a denied mempool service can drop normal transactions, cutting millions of web3 users off the blockchain and failing the decentralized applications relying on real-time blockchain access. Problem: Spamming the mempool to deny its service has been studied for long [9, 12, 17, 27]. Early designs by sending spam transactions at high fees burden attackers with high costs and are of limited practicality. What poses a real threat is Asymmetric DeniAl of Mempool Service, coined by ADAMS, in which the mempool service is denied at an asymmetrically 1 For instance, future transactions can be caused by out-of-order informa- tion propagation in Ethereum. 1" 2312.02649v1,"A Q-learning approach to the continuous control problem of robot inverted pendulum balancing Mohammad Safeea a (ms@uc.pt), Pedro Neto b (pedro.neto@dem.uc.pt) a University of Coimbra, CEMMPRE, ARISE, Department of Mechanical Engineering, 3030-788, Coimbra, Portugal; ms@uc.pt b University of Coimbra, CEMMPRE, ARISE, Department of Mechanical Engineering, 3030-788, Coimbra, Portugal; pedro.neto@dem.uc.pt Corresponding Author: Pedro Neto University of Coimbra, CEMMPRE, ARISE, Department of Mechanical Engineering, 3030-788, Coimbra, Portugal Tel: +351 239 790 767 Email: pedro.neto@dem.uc.pt" 2312.02654v1,"THz-Driven Coherent Magnetization Dynamics in a Labyrinth Domain State Matthias Riepp, 1, 2, ∗ André Philippi-Kobs, 2, 3 Leonard Müller, 2 Wojciech Roseker, 2 Rustam Rysov, 2 Robert Frömter, 4 Kai Bagschik, 2 Marcel Hennes, 5 Deeksha Gupta, 1 Simon Marotzke, 2, 3 Michael Walther, 2 Saša Bajt, 6, 7 Rui Pan, 2 Torsten Golz, 2 Nikola Stojanovic, 8 Christine Boeglin, 1 and Gerhard Grübel 2, † 1 Institut de Physique et Chimie des Matériaux de Strasbourg, UMR 7504, Université de Strasbourg, CNRS, 67000 Strasbourg, France 2 Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, 22607 Hamburg, Germany 3 Institut für Experimentelle und Angewandte Physik, Christian-Albrechts-Universität zu Kiel, Leibnitzstraße 19, 24098 Kiel, Germany 4 Institute of Physics, Johannes Gutenberg-University Mainz, 55099 Mainz, Germany 5 Institut des NanoSciences de Paris, UMR7588 , Sorbonne Université, CNRS, 75005 Paris, France 6 Center for Free-Electron Laser Science CFEL, Deutsches Elektronen-Synchrotron DESY, 22607 Hamburg, Germany 7 The Hamburg Centre for Ultrafast Imaging, 22761 Hamburg, Germany 8 Institute for Optical Sensor Systems, Deutsches Zentrum für Luft- und Raumfahrt, Rutherfordstraße 2, 12489 Berlin, Germany Terahertz (THz) light pulses can be used for an ultrafast coherent manipulation of the magnetization. Driving the magnetization at THz frequencies is currently the fastest way of writing magnetic information in ferromagnets. Using time-resolved resonant magnetic scattering, we gain new insights to the THz-driven coherent magnetization dynamics on nanometer length scales. We observe ultrafast demagnetization and coherent magnetization oscillations that are governed by a time-dependent damping. This damping is determined by the interplay of lattice heating and magnetic anisotropy reduction revealing an upper speed limit for THz-induced magnetization switching. We show that in the presence of nanometer-sized magnetic domains, the ultrafast magnetization oscillations are associated with a correlated beating of the domain walls. The overall domain structure thereby remains largely unaffected which highlights the applicability of THz-induced switching on the nanoscale. I. INTRODUCTION Understanding the magnetization dynamics driven by ultrashort light pulses is of key importance for developing faster and more energy efficient opto-magnetic memory technologies. A promising way to a controlled manipulation of the magnetization in ferromagnetic thin films on ultrafast time scales is the use of light pulses with frequencies in the terahertz (THz) regime (ν THz ≈ 0.1– 10 · 10 12 Hz) [1–3]. In contrast to incoherent ultrafast demagnetization induced by femtosecond optical laser pulses with frequencies in the infrared (IR) regime (ν IR ≈ 10 14 Hz) [4], the electric field component E THz is capable of driving a coherent ultrafast demagnetization with significantly lower energy transfer to the sample [5]. Moreover, the magnetic field component H THz may induce coherent oscillations [6–9] and, at high intensities, even a switching of the magnetization [10–13]. The possibility of exciting coherent magnetization dynamics at THz frequencies in ferromagnets, i. e., far from the ferromagnetic precession resonance, was explained by the inertia of the magnetization [14–17]. As a consequence, the magnetization may undergo nutation dynamics, i. e., a trembling of the magnetization vector at THz frequencies respectively femtosecond time scales. Ultrashort ∗ E-mail: matthias.riepp@ipcms.unistra.fr † Present address: European X-Ray Free-Electron Laser Facility GmbH, Holzkoppel 4, 22869 Schenefeld, Germany THz light pulses therefore promise high-speed and lowpower-consumption information writing in ferromagnets. So far, experiments mainly addressed THz-driven ultrafast magnetization dynamics in homogeneously magnetized thin films, i. e., in the single-domain state [7, 8, 18–23]. Information on the THz-driven magnetization dynamics in non-uniformly magnetized states, such as the nanoscale multi-domain states in Co/Pt multilayers with perpendicular magnetic anisotropy (PMA), is still lacking. A dependence of the THz-driven coherent magnetization dynamics on the magnetic anisotropy energy (MAE) was discovered recently by investigating Co thin films with fcc, bcc and hcp crystal structure [20]. In this article, we present THz-driven coherent magnetization dynamics in the labyrinth domain state of a Co/Pt multilayer with PMA. We employ time-resolved XUV resonant magnetic scattering (tr-XRMS) at the free-electron laser (FEL) FLASH to resolve these coherent dynamics with femtosecond time and nanometer spatial resolution [24–28]. The magnetization shows different responses depending on the used THz pump fluence. For low-fluence excitation with a filtered THz spectrum (ν < 6.0 THz), the magnetization undergoes an ultrafast quenching and recovery within 1 ps. For highfluence excitation with the full THz spectrum, a steplike quenching within 2 ps occurs followed by oscillatory dynamics in resonance with the THz fundamental frequency ν 0 = 2.5 THz. The data are consistent with incoherent and coherent ultrafast magnetization dynamics driven by the E THz - and H THz -field components. How-" 2312.02691v1,"Edge coloring of products of signed graphs Robert Janczewski 1 Department of Algorithms and System Modeling, Faculty of Electronics, Telecommunication and Informatics, Gdańsk University of Technology, ul. Narutowicza 11/12, Gdańsk, Poland Krzysztof Turowski 2,∗ Theoretical Computer Science Department, Jagiellonian University, Kraków, 30–348, Poland Bart lomiej Wróblewski 3,∗∗ Department of Algorithms and System Modeling, Faculty of Electronics, Telecommunication and Informatics, Gdańsk University of Technology, ul. Narutowicza 11/12, Gdańsk, Poland Abstract In 2020, Behr [1] defined the problem of edge coloring of signed graphs and showed that every signed graph (G, σ) can be colored using exactly ∆(G) or ∆(G) + 1 colors, where ∆(G) is the maximum degree in graph G. In this paper, we focus on products of signed graphs. We recall the definitions of the Cartesian, tensor, strong, and corona products of signed graphs and prove results for them. In particular, we show that (1) the Cartesian product of ∆- edge-colorable signed graphs is ∆-edge-colorable, (2) the tensor product of a ∆-edge-colorable signed graph and a signed tree requires only ∆ colors and (3) the corona product of almost any two signed graphs is ∆-edge-colorable. We also prove some results related to the coloring of products of signed paths and cycles. Keywords: signed graphs, edge coloring of signed graphs, graph products ∗ Krzysztof Turowski’s research was funded in whole by Polish National Science Center 2020/39/D/ST6/00419 grant. For the purpose of Open Access, the author has applied a CC- BY public copyright license to any Author Accepted Manuscript (AAM) version arising from this submission. ∗∗ Corresponding author 1 E-mail: skalar@eti.pg.gda.pl 2 E-mail: krzysztof.szymon.turowski@gmail.com 3 E-mail: bart.wroblew@gmail.com 1" 2312.02712v1,"Computing the Frequency-Dependent NMR Relaxation of 1 H Nuclei in Liquid Water Dietmar Paschek , 1, a) Johanna Busch , 1 Eduard Mock, 1 Ralf Ludwig , 1, 2, 3 and Anne Strate 1, b) 1) Institut für Chemie, Abteilung Physikalische und Theoretische Chemie, Universität Rostock, Albert-Einstein-Str. 27, D-18059 Rostock, Germany 2) Leibniz-Institut für Katalyse an der Universität Rostock e.V., Albert-Einstein-Str.29a, D-18059 Rostock, Germany 3) Department Life, Light & Matter, Universität Rostock, Albert-Einstein-Str. 25, D-18059 Rostock, Germany (Dated: 2023/12/06 at 01:57:09) It is the purpose of this paper to present a computational framework for reliably determining the frequencydependent intermolecular NMR dipole-dipole relaxation rate of spin 1/2 nuclei from MD simulations. The approach avoids alterations caused by well-known finite-size effects of the translational diffusion. Moreover, a procedure is derived to control and correct for effects caused by fixed distance-sampling cutoffs and periodic boundary conditions. By construction, this approach is capable of accurately predicting the correct lowfrequency scaling behavior of the intermolecular NMR dipole-dipole relaxation rate and thus allows the reliable calculation of the frequency-dependent relaxation rate over many orders of magnitude. Our approach is based on the utilisation of the theory of Hwang and Freed for the intermolecular dipole-dipole correlation function and its corresponding spectral density [J. Chem. Phys. 63, 4017 (1975)] and by its combination with data from molecular dynamics (MD) simulations. The deviations from the Hwang and Freed theory caused by periodic boundary conditions and sampling distance cutoffs are quantified by means of random walker Monte Carlo simulations. An expression based on the Hwang and Freed theory is also suggested for correcting those effects. As a proof of principle, our approach is demonstrated by computing the frequency-dependent interand intramolecular dipolar NMR relaxation rate of the 1 H nuclei in liquid water at 273 K and 298 K based on simulations of the TIP4P/2005 model. Our calculations are suggesting that the intermolecular contribution to the 1 H NMR relaxation rate of the TIP4P/2005 model in the extreme narrowing limit has previously been substantially underestimated. Keywords: NMR, NMR-Relaxation, Molecular Dynamics Simulations, Water, Diffusion I. INTRODUCTION The primary mechanism for relaxation of spin 1/2 nuclei in NMR spectroscopy is based on their magnetic dipole-dipole interactions which are mediated by intra- and intermolecular motions. 1,2 Frequencydependent NMR relaxation data can be used to provide an understanding of the details of molecular motion within a chemical system. 3,4 However, interpreting experimental data often requires models that are specific to certain systems and/or conditions and assume analytical forms of the relevant time correlation functions. 5,6 Since these models may not account for all molecularlevel dynamical processes, it can be sometimes difficult to assess whether a certain model is appropriately describing a particular system. 7,8 To address these limitations, Molecular Dynamics (MD) simulations can be used to study NMR relaxation phenomena using a “first principles”-based approach without the need for analytical models. Hence, the value of MD simulations in interpreting NMR relaxation data has been recognized from early on. 9,10 a) Electronic mail: dietmar.paschek@uni-rostock.de b) Electronic mail: anne.strate@uni-rostock.de Since dipolar NMR relaxation is due to the fluctuating fields resulting from the magnetic dipole-dipole interaction between two spins, formally a division into both, intramolecular and intermolecular contributions can be performed. Here intramolecular dipolar relaxation is driven by molecular vibrations, conformational changes, and rotations. Intermolecular contributions, on the other hand, are primarily driven by translational diffusion. They are, however, also affected by librations, conformation changes and rotational motions on short time scales. Considering the complexity of this convolution of dynamical phenomena, it can be quite challenging to disentangle all their different contributions. Moreover, the accurate computation of intermolecular contributions to the relaxation rate from MD simulations poses serious challenges. Since the relaxation rate largely depends on translational diffusion, the exact size of the self-diffusion coefficients matters. Diffusion coefficients obtained from MD simulations with periodic boundary conditions, however, are known to exhibit a non-negligible system size dependence 11–13 . Hence the computed intermolecular relaxation rates are also system-size dependent. Another important influence of the system size on the computed spectral densities has been recently pointed out by Honegger et al. 14 , suggesting that an accurate representation of the low frequency requires properly covering long intermolecular distance" 2312.02728v1,"Digital Communications and Networks(DCN) journal homepage: www.elsevier.com/locate/dcan Overview of RIS-Enabled Secure Transmission in 6G Wireless Networks JungSook Bae a,∗ , Waqas Khalid b,∗ , Anseok Lee a , Heesoo Lee a , Song Noh c,∗∗ , Heejung Yu d,∗∗ a Terrestrial & Non-Terrestrial Integrated Telecommunications Research Laboratory, Electronics and Telecommunications Research Institute, Daejeon 34129, South Korea b Institute of Industrial Technology, Korea University, Sejong 30019, South Korea c Department of Information and Telecommunication Engineering, Incheon National University, Incheon 22012, South Korea d Department of Electronics and Information Engineering, Korea University, Sejong 30019, South Korea Abstract As sixth-generation (6G) wireless communication networks evolve, privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information. In this context, a reconfigurable intelligent surface (RIS) emerges as a promising technology capable of enhancing transmission efficiency and strengthening information security. This study demonstrates how RISs can play a crucial role in making 6G networks more secure against eavesdropping attacks. We discuss the fundamentals, and standardization aspects of RISs, along with an in-depth analysis of physical-layer security (PLS). Our discussion centers on PLS design using RIS, highlighting aspects like beamforming, resource allocation, artificial noise, and cooperative communications. We also identify the research issues, propose potential solutions, and explore future perspectives. Finally, numerical results are provided to support our discussions and demonstrate the enhanced security enabled by RIS. © 2022 Published by Elsevier Ltd. KEYWORDS: 6G, Physical-layer security (PLS), Reconfigurable intelligent surface (RIS) 1. Introduction Sixth-generation (6G) wireless communication networks will offer significantly higher transmission rate, reduced latency, and enhanced reliability. These enhancements will facilitate innovative applications, unprecedented services, and comprehensive solutions [1]. Nevertheless, 6G networks will also introduce substantial security challenges attributed to the inherent broadcast nature of wireless channels, the voluminous influx of sensitive and confidential data (e.g., personal tracking, financial transactions, and cell phone information), and the exponential surge in potential attack vectors. Therefore, 6G networks must be hypersecure, encompassing data security from the application to the physical layer. A physical-layer security ∗ Co-first authors with equal contribution. ∗∗ Corresponding authors. Email addresses: jsbae@etri.re.kr, waqas283@korea.ac.kr, alee@etri.re.kr, heelee@etri.re.kr, songnoh@inu.ac.kr, heejungyu@korea.ac.kr (PLS) approach based on information-theoretic principles has generated interest in industry and academia. Notably, PLS ensures data security by preventing unauthorized interception and malicious use of private information, all without encryption methods [2]. In 6G networks, sub-terahertz (sub-THz) bands will complement millimeter-wave (mmWave) bands that have been adopted in fifth-generation (5G) networks. Though high-frequency bands offer several advantages, they also pose unique propagation challenges that must be addressed. Notably, mmWave and sub- THz signals are susceptible to blockages and substantial penetration loss [3]. Therefore, algorithms and protocols for wireless transmission must be developed to mitigate the adverse effects of an uncontrolled radio environment. Conventional transmission strategies use multiple antennas, complex signal-processing algorithms, and advanced encoding-decoding procedures. However, the transceiver design cannot be overly complex in resource-constrained scenarios [4]. The true potential of 6G networks can be realized" 2312.02731v1,"D-LGP: Dynamic Logic-Geometric Program for Combined Task and Motion Planning Teng Xue 1,2 , Amirreza Razmjoo 1,2 , and Sylvain Calinon 1,2 Abstract— Many real-world sequential manipulation tasks involve a combination of discrete symbolic search and continuous motion planning, collectively known as combined task and motion planning (TAMP). However, prevailing methods often struggle with the computational burden and intricate combinatorial challenges stemming from the multitude of action skeletons. To address this, we propose Dynamic Logic- Geometric Program (D-LGP), a novel approach integrating Dynamic Tree Search and global optimization for efficient hybrid planning. Through empirical evaluation on three benchmarks, we demonstrate the efficacy of our approach, showcasing superior performance in comparison to state-of-the-art techniques. We validate our approach through simulation and demonstrate its capability for online replanning under uncertainty and external disturbances in the real world. Project webpage: https://sites.google.com/view/dyn-lgp. I. I NTRODUCTION Robots are increasingly playing a vital role in real-world scenarios, particularly with long-horizon manipulation tasks. These tasks can usually be decoupled with various subtasks, each associated with continuous trajectories. This refers to a problem called combined Task and Motion Planning (TAMP), where high-level discrete task planning and lowlevel continuous motion planning are tightly interconnected. The effectiveness of the motion planner heavily relies on the task skeleton, and, simultaneously, the task planner should be aware of how its outputs are evaluated by the motion planner to avoid spending excessive time on bad solutions. Due to this inherent coupling, the entire system, encompassing all objects and robots, must be considered holistically. This can be viewed as a high-dimensional underactuated kinematic system [1]. In this high-dimensional space, there are several submanifolds corresponding to different object configurations, with some low-dimensional intersected subspaces shared among them. Therefore, as highlighted by Garrett et al. [1], TAMP can be more accurately described as a hybrid discretecontinuous search problem. It aims to find a sequence of discrete mode types (e.g., which objects to pick and place) along with the corresponding continuous motion paths within each mode and the configuration parameters in the intersection space. While discrete and continuous planning have been studied separately for a long time in the fields of AI and robotics, TAMP tries to combine aspects of both symbolic AI planning and geometric robot motion planning. Many advances have 1 Idiap Research Institute, Martigny, Switzerland (e-mail: firstname.lastname@idiap.ch) 2 École Polytechnique Fédérale de Lausanne (EPFL), Switzerland Fig. 1: System setup where the robot constructs a tower sequentially. The objective is to stack the blocks at a specified target point in a predefined order. If a block is out of reach (indicated by the red curve), the robot must determine how to use a tool to pull the block into the reachable region before performing the pick-andplace operation. been made to address this integration challenge, typically involving a search-based strategy to identify task skeletons and sampling-based or optimization-based motion planning methods to evaluate them. The interplay between the task and motion domains results in significant high-dimensional combinatorial complexity, particularly as the number of objects and the length of trajectory horizon increase. Unlike continuous planning, where dimensionality can be easily reduced thanks to the interpolation nature, such as using basis functions [2], there is no direct numerical relationship between adjacent symbolic variables in TAMP. This means that even a small change in a high-level task skeleton can lead to a significant difference in the continuous domain. Consequently, this combinatorial complexity of TAMP leads to unavoidable high-dimensional solution space, posing significant challenges for high-level task planners to find a feasible candidate from a huge amount of choices. For example, popular discrete planning methods like Monte Carlo Tree Search (MCTS) suffer a lot from the sparse solution space, despite efforts to introduce multiple bounds [3] or approximated cost-to-go functions [4]. Low-level motion planning, typically sampling-based or optimization-based, is used to evaluate the quality of the selected action skeleton. Nevertheless, these evaluations often lack guarantees of reliability. Sampling-based techniques only provide probabilistic completeness under infinite time, which is impractical for TAMP to be solved in real time. They yield feasible but non-optimal solutions, while optimality is important for realworld robot manipulation, such as time and energy efficiency." 2312.02748v1,"Compositional Generalization for Data-to-Text Generation Xinnuo Xu 1 , Ivan Titov 1,2 and Mirella Lapata 1 1 ILCC, School of Informatics, University of Edinburgh 2 ILLC, University of Amsterdam xxu3@ed.ac.uk, {ititov, mlap}@inf.ed.ac.uk Abstract Data-to-text generation involves transforming structured data, often represented as predicateargument tuples, into coherent textual descriptions. Despite recent advances, systems still struggle when confronted with unseen combinations of predicates, producing unfaithful descriptions (e.g., hallucinations or omissions). We refer to this issue as compositional generalisation, and it encouraged us to create a benchmark for assessing the performance of different approaches on this specific problem. Furthermore, we propose a novel model that addresses compositional generalization by clustering predicates into groups. Our model generates text in a sentence-by-sentence manner, relying on one cluster of predicates at a time. This approach significantly outperforms T5 baselines across all evaluation metrics. Notably, it achieved a 31% improvement over T5 in terms of a metric focused on maintaining faithfulness to the input. 1 1 Introduction Data-to-text generation (DTG) (Gardent et al., 2017; Dušek et al., 2020) aims to accurately generate textual descriptions from input tuples; the tuples should encompass all the information needed for generating the description regardless of the narrative order. Typically, as shown in Figure 1, each tuple consists of two arguments and one predicate that conveys their relationship. 2 Given the large number of pre-defined predicates, it is timeconsuming to collect human-annotated training examples for each potential combination of them. Thus, models must have the ability to generalize and handle examples with previously-unseen predicate combinations. We refer to this generalization scenario as compositional generalization. Prior research (Mehta et al., 2022; Xu et al., 2021; Kale and Rastogi, 2020a; Peng et al., 2020; 1 2 Code available at: github.com/XinnuoXu/CG_DTG. We follow the format specified in Gardent et al. (2017). Figure 1: An example from WebNLG dataset (Gardent et al., 2017). DTG aims at transforming the input structured data (left) into coherent textual description (right). Chen et al., 2020) has focused on evaluating the compositional generalization (CG) abilities of DTG models. These studies created few-shot training splits using established benchmarks by reducing the number of training examples or limiting the number of distinct predicate combinations in the training set through random selection. However, these arbitrary selections overlook the practical effort required for annotating different examples. For example, annotating examples with a larger number of input tuples requires more time and effort. We introduce a test environment based on Gardent et al. (2017). During training, models are exposed to examples with fewer input tuples, while in the testing phase, examples with more input tuples are presented. To make it even more challenging, we combine CG with few-shot learning by reducing the number of training examples for each predicate combination to one. We also incorporate CG with domain adaptation by evaluating the models on unseen domains. Our results demonstrate that the SoTA pre-trained language models (LMs; Raffel et al. 2020; Kale and Rastogi 2020b) fail to generalize effectively in our experimental setup. To tackle this issue, we propose a clusteringbased method (Figure 2) that utilize the graph weights learned from training data to decompose unfamiliar predicate compositions into smaller groups during inference. Each group consists of predicate combinations encountered by the model" 2312.02754v1,"1 Draft Capillary driven flows in the absence of gravity Domenico Fiorini 1,2 †, A. Simonini 1 , J. Steelant 3 , D. Seveno 2 and M. A. Mendez 1 1 Environmental and Applied Fluid Dynamics Department, von Karman Institute for Fluid Dynamics, 1640 Rhode-St-Genése, Belgium 2 KU Leuven, Dept. of Materials Engineering, Leuven 3001, Belgium 3 ESTEC-ESA, Keplerlaan 1, Noordwijk, The Netherlands (Received xx; revised xx; accepted xx) This work investigates the capillary rise dynamics of highly wetting fluid in a divergent U-tube in microgravity conditions. This configuration produces a capillary-driven channel flow. We use image recording in backlight illumination to characterize the interface dynamics and dynamic contact angle of HFE7200 and Di-Propylene Glycol. For the case of HF7200, we complement the interface measurements with Particle Tracking Velocimetry (PTV) to characterize the velocity fields underneath the moving meniscus. In the experiments with Di-propylene Glycol, the liquid column reaches different heights within various experiments, and the measurements show a sharp reduction of the meniscus curvature when the contact line moves from a pre-wet to a dry substrate. In experiments with HFE7200, the interface always moves on a pre-wet surface. Yet a curvature reduction is observed due to the inertial forces on the underlying accelerating flow. The PTV measurements show that the distance from the interface within which the velocity profile adapts to the meniscus velocity shortens as the interface acceleration increases. Key words: Capillary flows, Contact lines, Wetting and wicking 1. Introduction The capillary behaviour of a liquid results from the shape of the gas-liquid interface and the wetting interaction with the solid substrate. The dynamic contact angle formed by the interface with the substrate models this interaction and sets the boundary condition at the substrate for any model of the interface shape. Early investigations (Voinov (1976); Kistler (1993)) showed that the dynamic contact angle depends on the hydrodynamics of the flow near the contact line and the capillary number: Ca = µU CL σ −1 (with µ, σ the liquid’s dynamic viscosity and gas-liquid surface tension and U CL the velocity of the interface’s contact line with the substrate). These studies are primarily based on the assumption of a steady, two-dimensional, viscous-dominated flow near the contact line. Recent work seeks to extend the description of capillary-driven flows to more general scenarios where gas-liquid interfaces are dominated by inertial forces (Varma et al. (2021); Fiorini et al. (2022, 2023c)). These investigations show the impact of the flow further away from the contact line on the interface shape and its motion. Levine et al. (2015) analyzes capillarity and dynamic contact angle in the absence of gravity, where the motion of the gas-liquid interface primarily results from the balance of capillary and inertial forces. To this end, the capillary dynamics of fluids for micro-gravity applications are investigated using prototype test cases such as the capillary rise in tubes and micro-gravity platforms. Among these studies, the pioneering investigations by Stange et al. (2003) and Gerstmann & Dreyer (2007) characterized the capillary rise of various highly wetting liquids in a drop tower. These studies compare the capillary rise † Email address for correspondence: domenico.fiorini@vki.ac.be" 2312.02756v1,"GenVectorX: A performance-portable SYCL library for Lorentz Vectors operations Monica Dessole Jolly Chen Axel Naumann CERN, EP SFT Geneva, Switzerland monica.dessole@cern.ch CERN, EP SFT Geneva, Switzerland CERN, EP SFT Geneva, Switzerland ABSTRACT the Large Hadron Collider (LHC), hosted at CERN in Switzerland, which since its start has reached peaks of 1 PB/s of data gener- The Large Hadron Collider (LHC) at CERN will see an upgraded ated from physics events that need to be stored and accessed by hardware configuration which will bring a new era of physics data the physics community to be analysed. To this extent, the Worldtaking and related computational challenges. To this end, it is necwide LHC Computing Grid (WLCG) [5] was developed in coopessary to exploit the ever increasing variety of computational areration between CERN and other research institutes as a shared chitectures, featuring GPUs from multiple vendors and new accelcomputing infrastructure serving all interested scientists around erators. Performance portable frameworks, like SYCL, allow to ofthe world. Alongside this main distributed facility, it is common fload the computational work on non-CPU resources, while retainto have smaller computing clusters at the level of the single reing their performance, without the need to maintain different imsearch institution. All these computing facilities exhibit different plementations of the same code. The High Energy Physics (HEP) hardware configurations and composition. The demand for comcommunity employs a wide variety of algorithms and tools for acpute power and data storage is expected to increase dramatically celerators, but it still lacks a streamlined coherent approach that in the next years, as in 2029 the High Luminosity LHC (HL-LHC), can target many use cases without compromising the usability asan upgraded hardware configuration of the LHC particle accelerapect. In this paper, we present our efforts in creating GenVectorX, tor, will start operating with a demand of computational resources a C++ package that provides classes and functionalities to reprethat is estimated between 50 and 100 times with respect to the cursent and manipulate particle events using the SYCL programming rent use [16]. In this scenario, in which scientists from all over the model. The SYCL-based implementation exhibits comparable perworld need to deal with an ever increasing amount of input data formance and scalability as the CUDA implementation when tarand to run their analysis on heterogeneous platforms, performance geting NVIDIA GPUs. portability plays a crucial role. Such considerations motivate the need for developing performance portable software tailored to the CCS CONCEPTS HEP use case. Although each research group may need to tweak • Applied computing → Physics; • Computing methodolotheir analysis to use specific libraries, most software environments gies → Massively parallel algorithms; • General and referin HEP use ROOT [7] as the tool for storing, analyzing and visuence → Performance. alizing physics data regarding particle collisions. These collision events are expressed as operations on particles, represented as 4- KEYWORDS dimensional time-space vectors, also known as Lorentz Vectors. performance portability, heterogeneous computing, accelerators, Within ROOT, the GenVector package contains classes for special- GPUs, SYCL, CUDA ized vectors in 2, 3, and, in particular, 4 dimensions, and their oper- ACM Reference Format: ations, providing models and capabilities tailored to HEP analysis. Monica Dessole, Jolly Chen, and Axel Naumann. 2018. GenVectorX: A performance- Performance portability of scientific computing applications is portable SYCL library for Lorentz Vectors operations. In Proceedings of Make gaining importance as hardware becomes more heterogeneous. sure to enter the correct conference title from your rights confirmation email While NVIDIA GPUs are now standard co-processors in generic (Conference acronym ’XX). ACM, New York, NY, USA, 9 pages. https://doi.org/XXXXXXX.XXXXXXX purpose computations, other vendors’ GPU architectures are emerging in the High Performance Computing (HPC) scenario, see 1 INTRODUCTION e.g. LUMI HPC system which is based on AMD GPUs and Au- The core of High Energy Physics (HEP) research is characterised rora HPC system on Intel(R) GPUs. Moreover, the landscape of by the need for processing and analysing huge amounts of data multi-core CPUs and alternative accelerators is also diversifying, coming from the accelerators. The largest source of such data is see e.g. FPGAs and the RISC-V initiative [18]. Programming techniques for GPUs and other accelerators are very different from that Permission to make digital or hard copies of all or part of this work for personal or of traditional CPUs, requiring a significant understanding of the classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citahardware architecture to achieve good performance. Special lantion on the first page. Copyrights for components of this work owned by others than guages and compilers have been developed to target these archithe author(s) must be honored. Abstracting with credit is permitted. To copy othertectures, such as CUDA [11] for NVIDIA GPUs and HIP [17] for wise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. AMD GPUs. Porting scientific codes to new hardware is not sus- Conference acronym ’XX, June 03–05, 2018, Woodstock, NY tainable as it costs valuable developer time due to the adoption of © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX" 2312.02763v1,"QCD sum rule studies on the possible double-peak structure of the X17 particle Hua-Xing Chen ∗ School of Physics, Southeast University, Nanjing 210094, China The X17 particle, discovered by Krasznahorkay et al. at ATOMKI [1], was recently confirmed in the γγ invariant mass spectra by Abraamyan et al. at JINR [2]. We notice with surprise and interest that the X17 seems to have a double-peak structure. This is in a possible coincidence with our QCD sum rule study of Ref. [3], where we interpreted the X17 as a tetraquark state composed of four bare ¯ and claimed that “A unique feature of this tetraquark assignment is that we predict quarks (uūd d), two almost degenerate states with significantly different widths”. These two different tetraquark states are described by two different chiral tetraquark currents ū L γ µ d L d ¯ L γ µ u L and ū L γ µ d L d ¯ R γ µ u R . To verify whether the tetraquark assignment is correct or not, we replace the up and down quarks by the strange quarks, and apply the QCD sum rule method to study the other four chiral tetraquark currents ū L γ µ s L s̄ L γ µ u L , ū L γ µ s L s̄ R γ µ u R , d ¯ L γ µ s L s̄ L γ µ d L , and d ¯ L γ µ s L s̄ R γ µ d R . We calculate their correlation functions, and find that non-perturbative QCD effects do not contribute much to them. Our results suggest that there may exist four almost degenerate tetraquark states with masses ¯ about 236 ∼ 296 MeV. Each of these states is composed of four bare quarks, either uūss̄ or d dss̄. Keywords: tetraquark state, bare quark, chiral symmetry, non-perturbative QCD, color confinement I. INTRODUCTION The hadron is a composite particle made of quarks and gluons bound together by the strong interaction. Take the proton as an example, it is composed of two valence up quarks and one valence down quark in the traditional quark model, but with the development of QCD as the theory of the strong interaction, we realize that the proton also contains numberless sea quarks and gluons [4]. Especially, there can be some sea quarks, whose combination is color singlet. The color confinement, as an essential property of QCD, demands that color-charged particles can not be isolated, and therefore, can not be directly observed in normal conditions below the Hagedorn temperature T ≈ 150 MeV. Now, a natural question arises: is the color-singlet combination of sea quarks confined in the hadron? In 2016 Krasznahorkay et al. studied the nuclear reaction 7 Li(p, e + e − ) 8 Be at ATOMKI, and observed an anomaly in the angular correlation of the e + e − emission from the excited 8 Be nucleus [1]. Later in 2019 and 2022 they observed the same anomaly in the decays of the excited 4 He and 12 C nuclei [5–7]. This anomaly was interpreted as the signature of a neutral boson with the mass about 17 MeV, called the “X17” particle, whose observations attracted much interest from theorists. Various explanations were proposed, such as a fifth force [8– 13], dark matter [14–19], nuclear physics models [20, 21], QCD axion [22–25], and QED meson [26, 27], etc. We refer to the reviews [28, 29] for detailed discussions, and note that the nature of the X17 particle is still far beyond our understanding. In 2020 we investigated the possible assignment of the X17 particle as a tetraquark state composed of four bare ∗ Electronic address: hxchen@seu.edu.cn quarks [3]. This state is similar to the color-singlet combination of sea quarks in some aspects. Assuming the two chiral tetraquark currents (detailed explanations will be given later) J LL = ū L γ µ d L d ¯ L γ µ u L , J LR = ū L γ µ d L d ¯ R γ µ u R , respectively couple to the two tetraquark states X LL and X LR , we used the QCD sum rule method to calculate their masses to be both about 17.3 +1.4 −1.7 MeV. We also studied their decay properties in Ref. [3], but found the width of X LR to be significantly smaller than that of X LL . Therefore, we arrived at the unique feature of our tetraquark assignment that “we predict two almost degenerate states with significantly different widths”. Very recently, Abraamyan et al. studied the pC, dC, and dCu collisions at JINR, and observed two enhanced structures in the γγ invariant mass spectra at about 17 MeV and 38 MeV [2]. This observation confirmed the occurrence of the X17 particle at different initial conditions and from different decay channels. We notice with surprise and interest that there seems to exist two peaks in the γγ invariant mass spectra at about 17 MeV. This indicates that the X17 may have a double-peak structure, which is in a possible coincidence with our QCD sum rule study of Ref. [3]. Although this may be just a coincidence, it demands us to make further predictions. In this paper we replace the up and down quarks of J LL and J LR by the strange quarks, and construct more chiral tetraquark currents ¯ with the quark contents uūss̄ and d dss̄. We apply the QCD sum rule method to study these currents. Especially, we find that the non-perturbative QCD effects, such as the quark and gluon condensates, do not contribute much to them. This allows us to choose some abnormal QCD sum rule parameters to arrive at the new prediction that there may exist four almost degenerate tetraquark states with masses about 236 ∼ 296 MeV. In" 2312.02764v1,"Experimental multi-scale characterization of mode-II interlaminar fracture in geometrically scaled stitched and unstitched resin-infused composites Dawson Ozborn 1 , Jackob Black 2 , Wayne Huberty 3 , Christopher Bounds 4 , Han-Gyu Kim 5 Mississippi State University, Mississippi State, MS 39762, USA This work is focused on investigating the impact of out-of-plane stitches on enhancing mode- II interlaminar fracture toughness (or energy) and characterizing damage progression and crack arrestment in stitched resin-infused composites. For the experimental work, End- Notched Flexure (ENF) quasi-isotropic specimens were manufactured using ±45 non-crimp carbon-fiber fabrics through a resin-infusion process. Both stitched and unstitched specimen sets were designed for comparison. For a size effect study, the ENF specimens were geometrically scaled with three scaling levels. Based on the load-displacement data (i.e., global analysis), the fracture energy of the specimen material was analyzed using the compliance calibration method and a size effect theory. The fracture energy values were compared between the stitched and unstitched cases to characterize the enhanced fracture toughness of stitched composites. For local analysis, two types of digital image correlation (DIC) systems were employed: microscopic and macroscopic (i.e., coupon-scale) DIC systems. By analyzing in-plane displacement through the thickness, separation development was characterized along predicted fracture process zones. The impact of out-of-plane stitches on separation propagation along fracture process zones was discussed based on the DIC analysis. This work will contribute to developing a high-fidelity damage model for stitched resin-infused composites in the form of a traction-separation for high-speed aircraft applications. I. Introduction Modern aircraft designs have extensively adopted composites for primary structures to achieve lightweight. The Boeing 787 (a subsonic commercial airliner) and the Lockheed F-35 (a supersonic fighter) are representative examples [1, 2]. Composite fuselage and wing structures in high-speed aircraft, however, are subjected to the extreme environments induced by aerothermodynamic couplings, which could lead to stress amplification and mode-II interlaminar failure [3]. To address this issue, the work herein is focused on investigating the impact of out-of-plane stitches on enhancing mode-II interlaminar fracture toughness (or energy) [4]. Characterizing damage progression and crack arrestment in stitched resin-infused composites on the microscopic scale using a through-thickness deformation analysis method [5] is of primary interest. For experimental characterization of the mode-II interlaminar fracture energy of composite materials, Davidson et al. [6, 7] proposed the compliance calibration method (CCM) based on the Linear Elastic Fracture Method (LEFM). This method has been adopted in the ASTM D7905/D7905M-19el testing manual [8]. Salviato et al. [9], however, experimentally characterized mode-II quasi-brittle fracture processes in geometrically scaled composites and showed that this LEFM-based method could estimate multiple fracture energies for a single material (i.e., higher fracture 1 Graduate Research Assistant, Department of Aerospace Engineering. Graduate Research Assistant, Department of Aerospace Engineering. 3 Associate Director, Advanced Composites Institute. 4 Director, Advanced Composites Institute. 5 Assistant Professor, Department of Aerospace Engineering. Corresponding author (hkim@ae.msstate.edu). 2 1" 2312.02803v1,"Leveraging Domain Adaptation and Data Augmentation to Improve Qur’anic IR in English and Arabic Vera Pavlova rttl.ai Dubai, UAE v@rttl.ai Abstract In this work, we approach the problem of Qur’anic information retrieval (IR) in Arabic and English. Using the latest state-of-the-art methods in neural IR, we research what helps to tackle this task more efficiently. Training retrieval models requires a lot of data, which is difficult to obtain for training in-domain. Therefore, we commence with training on a large amount of general domain data and then continue training on in-domain data. To handle the lack of in-domain data, we employed a data augmentation technique, which considerably improved results in MRR@10 and NDCG@5 metrics, setting the state-of-the-art in Qur’anic IR for both English and Arabic. The absence of an Islamic corpus and domainspecific model for IR task in English motivated us to address this lack of resources and take preliminary steps of the Islamic corpus compilation and domain-specific language model (LM) pre-training, which helped to improve the performance of the retrieval models that use the domain-specific LM as the shared backbone. We examined several language models (LMs) in Arabic to select one that efficiently deals with the Qur’anic IR task. Besides transferring successful experiments from English to Arabic, we conducted additional experiments with retrieval task in Arabic to amortize the scarcity of general domain datasets used to train the retrieval models. Handling Qur’anic IR task combining English and Arabic allowed us to enhance the comparison and share valuable insights across models and languages. 1 Introduction Recent advances in Natural Language Processing (NLP) have helped to improve search relevance and retrieval quality. Nevertheless, deep-learning techniques, specifically transformer-based approaches (Vaswani et al., 2017), are hardly employed in Quran’ic NLP (Bashir et al., 2023). In this work, Figure 1: Data augmentation technique that leverages correlation of Qur’anic verses for training retrieval models in-domain. we will utilize the latest state-of-the-art neural retrieval models to compare what works best for solving the IR task in the Islamic domain. Moreover, we proposed a data-augmentation technique to generate data for in-domain training appropriate for the IR task involving the Holy Qur’an (see Figure 1). We experimented with Arabic and English languages. Arabic, more precisely one of its variants, Classical Arabic (CA), is the language of the Holy Qur’an and is an integral component in tackling retrieval task using sacred scripture (Bashir et al., 2023). English is another popular language used for search in various domains, including the Islamic domain. Addressing the problem using Arabic and English allows for comparing the solutions and sharing insights across languages. English is a highresource language with a great choice of corpora and pre-trained LMs for diverse domains. At the same time, depending on the domain, Arabic can be considered a low- or medium-resource language (Xue et al., 2021; Abboud et al., 2022). However, Arabic is in more favorable conditions than English in the Islamic domain; in the case of the Arabic language, there are Islamic corpora like OpenITI (Romanov and Seydi, 2019) and domain-specific LMs (Malhas and Elsayed, 2022; Inoue et al., 2021)." 2312.02819v1,"Minseok Seo * SI Analytics Doyi Kim SI Analytics ehdrms903@gmail.com minseok.seo@si-analytics.ai doyikim@si-analytics.ai Yeji Choi SI Analytics Donghyeon Cho † Chungnam National University yejichoi@si-analytics.ai cdh12242@gmail.com Abstract 0 1. Introduction Weather is a critical variable that impacts various aspects of daily life, including aviation, logistics, agriculture, and transportation. To provide accurate weather forecasting, the numerical weather prediction (NWP) method has been * equal contribution † corresponding author Truncated Diffusion Probabilistic w/o DB Probabilistic w/ DB DGDM Ground Truth RaMViD Deterministic GT Weather forecasting requires not only accuracy but also the ability to perform probabilistic prediction. However, deterministic weather forecasting methods do not support probabilistic predictions, and conversely, probabilistic models tend to be less accurate. To address these challenges, in this paper, we introduce the Deterministic Guidance Diffusion Model (DGDM) for probabilistic weather forecasting, integrating benefits of both deterministic and probabilistic approaches. During the forward process, both the deterministic and probabilistic models are trained end-to-end. In the reverse process, weather forecasting leverages the predicted result from the deterministic model, using as an intermediate starting point for the probabilistic model. By fusing deterministic models with probabilistic models in this manner, DGDM is capable of providing accurate forecasts while also offering probabilistic predictions. To evaluate DGDM, we assess it on the global weather forecasting dataset (WeatherBench) and the common video frame prediction benchmark (Moving MNIST). We also introduce and evaluate the Pacific Northwest Windstorm (PNW)-Typhoon weather satellite dataset to verify the effectiveness of DGDM in high-resolution regional forecasting. As a result of our experiments, DGDM achieves state-of-the-art results not only in global forecasting but also in regional forecasting. The code is available at: https://github.com/DongGeun-Yoon/DGDM . Initial state TAU Donggeun Yoon * Chungnam National University Uncertainty Deterministic Guidance Diffusion Model for Probabilistic Weather Forecasting Data Space Figure 1. Comparison of uncertainty between probabilistic (RaMViD) and deterministic (TAU) models. The probabilistic model exhibits high diversity, making sample selection near GT challenging. On the other hand, the deterministic model produces a single output, which limits its ability to capture real-world weather variability and contrains its practical application. predominantly used for most weather forecasting since the 1950s [5, 7]. NWP employs a simulation-centric framework with vertical and horizontal grids (usually between 10 km and 25 km) that divide the Earth’s atmosphere. Each grid cell translates the governing atmospheric behavior into partial differential equations (PDEs), which are then solved using numerical integral methods. Even a single 10-day forecast simulation with the NWP model requires hours of computation on hundreds of supercomputer nodes. Despite these efforts, phenomena such as turbulent motion and tropical cumulus convection, which occur on a scale of a few kilometers horizontally, cannot be captured by a single deterministic prediction due to being smaller than the grid of NWP models. Also, the nonlinearity or randomness of atmospheric phenomena makes it difficult to conduct accurate simulations [19]. Therefore, NWP models add small random perturbations to the initial weather conditions and perform multiple sim-" 2312.02821v1,"RotaTR: Detection Transformer for Dense and Rotated Object Yuke Zhu, Yumeng Ruan, Lei Yang, Sheng Guo Mybank Technology {felix.yk, guosheng.guosheng}@mybank.cn Abstract detection problem. In contrast, the idea of end-to-end object detection has been favored by many researchers in conventional detection. A lot of methods have been proposed to design an end-to-end detector from the perspective of anchor free[13][28][17][35], NMS free[12][8][33][38][34] or the recent transformer[1][42][20] structure. However, in oriented detection, there are few works addressing this issue. Detecting the objects in dense and rotated scenes is a challenging task. Recent works on this topic are mostly based on Faster RCNN or Retinanet. As they are highly dependent on the pre-set dense anchors and the NMS operation, the approach is indirect and suboptimal. The endto-end DETR-based detectors have achieved great success in horizontal object detection and many other areas like segmentation, tracking, action recognition and etc. However, the DETR-based detectors perform poorly on dense rotated target tasks and perform worse than most modern CNN-based detectors. In this paper, we find the most significant reason for the poor performance is that the original attention can not accurately focus on the oriented targets. Accordingly, we propose Rotated object detection TRansformer (RotaTR) as an extension of DETR to oriented detection. Specifically, we design Rotation Sensitive deformable (RSDeform) attention to enhance the DETR’s ability to detect oriented targets. It is used to build the feature alignment module and rotation-sensitive decoder for our model. We test RotaTR on four challenging-oriented benchmarks. It shows a great advantage in detecting dense and oriented objects compared to the original DETR. It also achieves competitive results when compared to the state-of-the-art. The code will be released. Recently, DETR[1] and its followers[54][42][20] bring new insight into the detection paradigm. The DETR regards object detection as a sequence-to-sequence problem. It uses a set of object queries to probe into the image context and directly generates a set of predictions without the need for NMS. The new paradigm of DETR is general and has been successfully adapted to many other areas like instance segmentation[52][6][5], action recognition[46][21][31], multi-object tracking[41][14][43] etc. So, it is a natural thought that DETR-like structures can also be easily adapted to oriented object detection. Based on the idea, we design a simple oriented detector Deformable- DETR-O based on Deformable DETR[54] (detailed in Sec- 3.1) and test it on the common oriented benchmark. However, the results are frustrating. The adapted detector performs even inferior to Retinanet-O, which usually serves as the baseline method for most oriented detection methods (Shown in Table-1). The poor performance is especially significant for densely located targets. The phenomenon can also be supported by some observations from DAB- DETR[20], which reports a lot of failure cases in dense scenes. The recently published O2DETR[24] is the first attempt to design DETR-like oriented detector. It also reports low performance on such occasions. So far, no other work has attempted to explain the poor performance of DETR- like structures for oriented and densely located targets. To this end, we take a closer look at the cross-attention module in the transformer decoder. Specifically, the sampled locations of the deformable cross attention are visualized. The result shows that the sampled locations of the deformable attention (Shown in Figure-4(d) can hardly be aligned with the target geometry. It suggests that it is difficult for deformable attention to dynamically attend to arbitrarily ori- 1. Introduction Oriented object detection is a more general and challenging task than conventional horizontal detection. It has a wide range of applications in scene text detection[16][51], aerial object detection[44][22], faces and retail scenes[32][4]. Nowadays, most state-of-the-art methods[48][9][7][45] on oriented detection are based on Faster RCNN[29] or Retinanet[19]. They highly depend on pre-set dense anchors for box regression and non-maximum suppression (NMS) for duplicate removal. These two hand-crafted modules lead to a tedious and redundant detection process, which is an indirect and sub-optimal solution to the oriented 1" 2312.02828v1,"Convergence Rates for Stochastic Approximation: Biased Noise with Unbounded Variance, and Applications Rajeeva L. Karandikar and M. Vidyasagar ∗ December 6, 2023 Abstract The Stochastic Approximation (SA) algorithm introduced by Robbins and Monro in 1951 has been a standard method for solving equations of the form f (θ) = 0, when only noisy measurements of f (·) are available. If f (θ) = ∇J(θ) for some function J(·), then SA can also be used to find a stationary point of J(·). At each time t, the current guess θ t is updated to θ t+1 using a noisy measurement of the form f (θ t )+ ξ t+1 . In much of the literature, it is assumed that the error term ξ t+1 has zero conditional mean, and that its conditional variance is bounded as a function of t (though not necessarily with respect to θ t ). Also, for the most part, the emphasis has been on “synchronous” SA, whereby, at each time t, every component of θ t is updated. Over the years, SA has been applied to a variety of areas, out of which two are the focus in this paper: Convex and nonconvex optimization, and Reinforcement Learning (RL). As it turns out, in these applications, the above-mentioned assumptions do not always hold. In zero-order methods, the error neither has zero mean nor bounded conditional variance. In popular RL algorithms such as Temporal Difference Learning and Q-learning, only one component of θ t is updated at each t, known as “asynchronous” SA. In the present paper, we extend SA theory to encompass errors with nonzero conditional mean and/or unbounded conditional variance, and also asynchronous SA. In addition, we derive estimates for the rate of convergence of the algorithm. Then we apply the new results to problems in nonconvex optimization, and to Markovian SA, a recently emerging area in RL. We prove that SA converges in these situations, and compute the “optimal step size sequences” to maximize the estimated rate of convergence. 1 Introduction 1.1 Brief Literature Review Since its introduction in 1951 in [27], the Stochastic Approximation (SA) algorithm has become one of the standard probabilistic methods for solving equations of the form f (θ) = 0, when only noisy measurements of f (·) are available. Over the years, SA has been applied to a variety of areas, including the two topics addressed here, namely: convex and nonconvex optimization, and Reinforcement Learning (RL). In this paper, we present several new directions and results in the theory of stochastic approxiation (SA), along with their applications to the above-mentioned two topics. As the literature in these topics is vast, we mention only those sources that are directly relevant to the contents of this paper. RLK is Professor Emeritus at the Chennai Mathematical Institute; Email: rlk@cmi.ac.in. MV is National Science Chair at Indian Institute of Technology Hyderabad; Email: m.vidyasagar@iith.ac.in. The research of MV was supported by the Science and Engineering Research Board, India. ∗ 1" 2312.02829v1,"MIMONets: Multiple-Input-Multiple-Output Neural Networks Exploiting Computation in Superposition Nicolas Menet 1,2∗ menetn@ethz.ch Michael Hersche 1,2 her@zurich.ibm.com Luca Benini 2 lbenini@iis.ee.ethz.com 1 Geethan Karunaratne 1 kar@zurich.ibm.com Abu Sebastian 1 ase@zurich.ibm.com Abbas Rahimi 1 abr@zurich.ibm.com IBM Research – Zurich, 2 ETH Zurich Abstract With the advent of deep learning, progressively larger neural networks have been designed to solve complex tasks. We take advantage of these capacity-rich models to lower the cost of inference by exploiting computation in superposition. To reduce the computational burden per input, we propose Multiple-Input-Multiple- Output Neural Networks (MIMONets) capable of handling many inputs at once. MIMONets augment various deep neural network architectures with variable binding mechanisms to represent an arbitrary number of inputs in a compositional data structure via fixed-width distributed representations. Accordingly, MIMONets adapt nonlinear neural transformations to process the data structure holistically, leading to a speedup nearly proportional to the number of superposed input items in the data structure. After processing in superposition, an unbinding mechanism recovers each transformed input of interest. MIMONets also provide a dynamic trade-off between accuracy and throughput by an instantaneous on-demand switching between a set of accuracy-throughput operating points, yet within a single set of fixed parameters. We apply the concept of MIMONets to both CNN and Transformer architectures resulting in MIMOConv and MIMOFormer, respectively. Empirical evaluations show that MIMOConv achieves ≈ 2 – 4× speedup at an accuracy delta within [+0.68, −3.18]% compared to WideResNet CNNs on CI- FAR10 and CIFAR100. Similarly, MIMOFormer can handle 2–4 inputs at once while maintaining a high average accuracy within a [−1.07, −3.43]% delta on the long range arena benchmark. Finally, we provide mathematical bounds on the interference between superposition channels in MIMOFormer. Our code is available at https://github.com/IBM/multiple-input-multiple-output-nets. 1 Introduction Driven by the successes of deep learning in image and natural language processing tasks, increasingly large neural network models have been developed to reach state-of-the-art performance [1–4]. These large models, however, increase computational complexity in terms of operation count for every event of input processing. One viable option to reduce the computational cost of processing per input is to create a compositional data structure where a variable number of input items (i.e., values) can be bound to corresponding protection keys, creating key-value pairs that can coexist and be processed ∗ Research conducted at IBM Research – Zurich. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.02835v1,"RASTI 000, 1–15 (2023) Preprint 6 December 2023 Compiled using rasti L A TEX style file v3.0 Design and performance of a Collimated Beam Projector for telescope transmission measurement using a broadband light source K. Sommer , 1★ J. Cohen-Tanugi , 1,2 B. Plez , 1 M. Betoule , 3 S. Bongard , 3 L. Le Guillou , 3 J. Neveu , 3,4 E. Nuss, ,1 E. Sepulveda, 3 T. Souverin, 3 M. Moniez , 4 and C. W. Stubbs , 5,6 1 Laboratoire Univers et Particules de Montpellier, Université de Montpellier, CNRS, Montpellier, France 2 Laboratoire de Physique de Clermont, Université Clermont Auvergne, CNRS, F-63000 Clermont-Ferrand, France 3 Sorbonne Université, CNRS, Université de Paris, LPNHE, 75252 Paris Cedex 05, France 4 Université Paris-Saclay, CNRS, IJCLab, 91405, Orsay, France 5 Department of Physics, Harvard University, 17 Oxford street, Cambridge, MA 02143, USA 6 Department of Astronomy, Harvard University, and Center for Astrophysics, 60 Garden Street, Cambridge, MA 02143, USA Accepted XXX. Received YYY; in original form ZZZ ABSTRACT Type Ia supernovae are one such cosmological probe to study dark energy, for which the dominant source of systematic uncertainties is the accuracy of the photometric calibration. To address this, recent advancements introduce Collimated Beam Projectors (CBP), aiming to enhance calibration by precisely measuring a telescope’s throughput as a function of wavelength. This work describes the performance of a prototype portable CBP. The experimental setup consists of a broadband Xenon light source replacing a more customary but much more demanding high-power laser source, coupled with a monochromator emitting light inside an integrating sphere monitored with a photodiode and a spectrograph. Light is injected at the focus of the CBP telescope projecting a collimated beam onto a solar cell whose quantum efficiency has been obtained by comparison with a NIST-calibrated photodiode. The throughput and signal-to-noise ratio achieved by comparing the photocurrent signal in the CBP photodiode to the one in the solar cell are computed. We prove that the prototype, in its current state of development, is capable of achieving 1.2 per cent and 2.3 per cent precision on the integrated g and r bands of the ZTF photometric filter system respectively, in a reasonable amount of integration time. Central wavelength determination accuracy is kept below ∼ 0.91 nm and ∼ 0.58 nm for g and r bands, respectively. The expected photometric uncertainty caused by filter throughput measurement is approximately 5 mmag on the zero-point magnitude. Several straightforward improvement paths are discussed to upgrade the current setup. Key words: instrumentation: calibration – techniques: photometric – standards – telescopes 1 INTRODUCTION Type 1a supernovae (SNe Ia) are a class of supernovae that are thought to result from the explosion of a white dwarf (WD) star in a binary system (see Hillebrandt & Niemeyer (2000) and Mazzali et al. (2007) for detailed reviews of SNe Ia physics). Their uniform intrinsic brightness at the 15 per cent level after standardization and their luminosity around 10 10 𝐿 ⊙ make them particularly useful for cosmology, in particular, to accurately measure the expansion rate 𝐻 (𝑡) and to study the properties of dark energy with the determination of the equation of state parameter 𝑤 (Garnavich et al. 1998; Efstathiou 1999; Copeland et al. 2006). As the number of surveys increases, the statistical uncertainty on cosmological parameters measured with SNe Ia diminishes (Brout et al. 2022). For instance, the Vera Rubin Observatory will observe over 10,000 SNe Ia in its 10-year survey (LSST Science Collaboration 2009). Systematic uncertainties thus become predominant, as demonstrated by Scolnic et al. (2018). These include SNe Ia models, bias selections, galactic extinction, peculiar ★ E-mail: kelian.sommer@umontpellier.fr © 2023 The Authors velocities, local environment, and not the least calibration errors. Indeed, instrumental photometric flux calibration represents the main source of uncertainty for the estimated distances of SNe Ia (Stubbs & Brown 2015) and for cosmological parameters inferred with this probe. We refer the reader to Goobar & Leibundgut (2011) for a review of SNe Ia cosmology and to Betoule et al. (2014); Scolnic et al. (2014) for a review of calibration uncertainties. This flux calibration issue can be split in two different components: (i) the terrestrial atmospheric transmission, and (ii) the wavelengthdependent instrumental throughput. The first component can be determined by comparing the measured flux of reference stars in the field of view for each photometric band with catalogs of spectrophotometric reference stars. These ultimately rely on 3 pure hydrogen white dwarfs primary CALSPEC standards (Bohlin et al. 2020) for which physical models describe very accurately the spectra (Narayan et al. 2019). Models are internally consistent with Hubble Space Telescope photometry to better than 1 per cent (see Bohlin et al. (2014) for an extended review of absolute calibration methods). To isolate the uncertainty component due to the instrument throughput, multiple efforts with in situ artificial methods have emerged for" 2312.02897v1,"Perspectives from Naive Participants and Social Scientists on Addressing Embodiment in a Virtual Cyberball Task Tao Long † tl468@cornell.edu Cornell University Ithaca, New York, USA Figure 1: Scene 1: Welcome Message Figure 4: Scene 4: Exclusive Game (This shows the 3rd person POV version) Swati Pandita ‡ sp2333@cornell.edu Cornell University Ithaca, New York, USA Andrea Stevenson Won asw248@cornell.edu Cornell University Ithaca, New York, USA Figure 2: Scene 2: Avatar Customization Figure 3: Scene 3: Close-up of Final Avatar Figure 5: Scene 5: Inclusive Game (This shows the 1st person POV version) ABSTRACT We describe the design of an immersive virtual Cyberball task that included avatar customization, and user feedback on this design. We first created a prototype of an avatar customization template and added it to a Cyberball prototype built in the Unity3D game engine. Then, we conducted in-depth user testing and feedback sessions with 15 Cyberball stakeholders: five naive participants with no prior knowledge of Cyberball and ten experienced researchers with extensive experience using the Cyberball paradigm. We report the divergent perspectives of the two groups on the following design † Currently affiliated with Columbia University. This work was his undergrad research honors thesis at Cornell: Designing a Virtual Cyberball Task for Social Science Research. ‡ Currently affiliated with California Institute of Technology. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CSCW ’23 Companion, October 14–18, 2023, Minneapolis, MN, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0129-0/23/10. . . $15.00 https://doi.org/10.1145/3584931.3607014 Figure 6: Scene 6: Finish Message insights; designing for intuitive use, inclusivity, and realistic experiences versus minimalism. Participant responses shed light on how system design problems may contribute to or perpetuate negative experiences when customizing avatars. They also demonstrate the value of considering multiple stakeholders’ feedback in the design process for virtual reality, presenting a more comprehensive view in designing future Cyberball prototypes and interactive systems for social science research. CCS CONCEPTS • Human-centered computing → Empirical studies in HCI; Virtual reality. KEYWORDS virtual reality; cyberball task; social science paradigm; walkthrough; avatar customization; qualitative research; semi-structured interviews; user experience; multi-stakeholders; inclusive design; games ACM Reference Format: Tao Long, Swati Pandita, and Andrea Stevenson Won. 2023. Perspectives from Naive Participants and Social Scientists on Addressing Embodiment in a Virtual Cyberball Task. In Computer Supported Cooperative Work and Social Computing (CSCW ’23 Companion), October 14–18, 2023, Minneapolis, MN, USA. 6 pages. https://doi.org/10.1145/3584931.3607014" 2312.02913v1,"Let the LLMs Talk: Simulating Human-to-Human Conversational QA via Zero-Shot LLM-to-LLM Interactions Zahra Abbasiantaeb Yifei Yuan University of Amsterdam Amsterdam, The Netherlands z.abbasiantaeb@uva.nl The Chinese University of Hong Kong Hong Kong, Hong Kong SAR yfyuan@se.cuhk.edu.hk Evangelos Kanoulas Mohammad Aliannejadi University of Amsterdam Amsterdam, The Netherlands e.kanoulas@uva.nl University of Amsterdam Amsterdam, The Netherlands m.aliannejadi@uva.nl ABSTRACT Conversational question-answering (CQA) systems aim to create interactive search systems that effectively retrieve information by interacting with users. To replicate human-to-human conversations, existing work uses human annotators to play the roles of the questioner (student) and the answerer (teacher). Despite its effectiveness, challenges exist as human annotation is time-consuming, inconsistent, and not scalable. To address this issue and investigate the applicability of large language models (LLMs) in CQA simulation, we propose a simulation framework that employs zero-shot learner LLMs for simulating teacher–student interactions. Our framework involves two LLMs interacting on a specific topic, with the first LLM acting as a student, generating questions to explore a given search topic. The second LLM plays the role of a teacher by answering questions and is equipped with additional information, including a text on the given topic. We implement both the student and teacher by zero-shot prompting the GPT-4 model. To assess the effectiveness of LLMs in simulating CQA interactions and understand the disparities between LLM- and human-generated conversations, we evaluate the simulated data from various perspectives. We begin by evaluating the teacher’s performance through both automatic and human assessment. Next, we evaluate the performance of the student, analyzing and comparing the disparities between questions generated by the LLM and those generated by humans. Furthermore, we conduct extensive analyses to thoroughly examine the LLM performance by benchmarking state-of-the-art reading comprehension models on both datasets. Our results reveal that the teacher LLM generates lengthier answers that tend to be more accurate and complete. The student LLM generates more diverse questions, covering more aspects of a given topic. CCS CONCEPTS • Information systems → Evaluation of retrieval results. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). WSDM ’24, March 4th-8th, 2024, Mérida, Yucatán © 2024 Copyright held by the owner/author(s). ACM Reference Format: Zahra Abbasiantaeb, Yifei Yuan, Evangelos Kanoulas, and Mohammad Aliannejadi. 2024. Let the LLMs Talk: Simulating Human-to-Human Conversational QA via Zero-Shot LLM-to-LLM Interactions. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4th-8th, 2024, Mérida, Yucatán. ACM, New York, NY, USA, 10 pages. 1 INTRODUCTION Over the years, the information retrieval (IR) community has strived to create an interactive and iterative search system that effectively retrieves information [4, 9, 13, 21]. Recent advancements in conversational question-answering (CQA) systems have been successful in achieving this goal by retrieving relevant information and engaging in back-and-forth interactions with users to fully understand their information needs [34, 38]. Under this case, existing work captures the iterative dynamics of conversations, where a set of annotators play the role of the questioner (student) and the answerer (teacher) over a pre-defined search topic [11, 24, 49]. Despite the effectiveness of previous efforts in this task, several drawbacks exist. One major challenge is the maintenance of a large team of annotators to generate a substantial number of conversations. This process can be time-consuming, resource-intensive, and expensive. Additionally, relying solely on human annotators may introduce variations in the quality and consistency of the generated conversations. Also, in many cases, the human student cannot effectively explore a given topic that is out of their background knowledge. For example, a person who has expertise in geography can better explore a related topic rather than a person who does not. In contrast, large language models (LLMs) can leverage their vast background knowledge to effectively play the role of a geography expert in a conversation. Therefore, it is crucial to explore automated approaches that can generate simulated conversations, reducing the dependency on human annotators and making the process more efficient and scalable. User simulation is an important emerging research frontier for conversational search development and evaluation [7, 28], where the focus mainly is on simulating the user behavior under a certain condition, such as responding to system’s actions [47], answering clarifying questions [42], and giving feedback on system answer [28]. The main drawback of existing research on user simulation is its reactive nature, where the simulated user just passively respond to the system’s utterance. In real-world scenarios, however, users’ actions are a mix of proactive and reactive actions, initiating" 2312.02917v1,"1 PMUT-Powered Photoacoustic Detection: Revolutionizing Microfluidic Concentration Measurements Kaustav Roy 1 , Akshay Kumar 2 , Vijayendra Shastri 3 , Isha Munjal 4 , Kritank Kalyan 5 , Anuj Ashok 6 , Anthony Jeyaseelan 7 , Jaya Prakash 4† , and Rudra Pratap 2† Abstract— This report introduces a novel optofluidic platform based on piezo-MEMS technology, capable of identifying subtle variations in the fluid concentration. The system utilizes piezoelectric micromachined ultrasound transducers (PMUTs) as receivers to capture sound waves produced by nanosecond photoacoustic (PA) pulses emanating from a fluid target housed in PDMS microchannels. Additionally, a dedicated low-noise single-channel amplifier has been developed to extract the minute analog voltage signals from the PMUTs, given the inherently weak ultrasound signals generated by fluid targets. The PMUTs' proficiency in detecting changes in fluid concentration under both static and time-varying conditions has been documented and verified, confirming the platform's efficacy in monitoring fluid concentrations. Index Terms—MEMS, Ultrasound, Photoacoustics, Microfluidics, PMUT This work was funded from the grant – STARS/APR2019/NS/653/FS from the MOE. K. R. was with the Centre for Nano Science and Engineering, Indian Institute of Science, Bangalore, 560012, India (e-mail: kaustav@alum.iisc.ac.in). A. K. is with the Centre for Nano Science and Engineering, Indian Institute of Science, Bangalore, 560012, India (e-mail: akshaykumar1@iisc.ac.in). V. S. is with the Department of Precision and Microsystems Engineering, TU Delft, 2628 CD Delft, Netherlands (e-mail: V.U.Shastri@tudelft.nl). I. M. is with the Department of Instrumentation and Applied Physics, Indian Institute of Science, Bangalore, 560012, India (e-mail: isha17774@iisc.ac.in). K. K. is with the Singh Center for Nanotechnology, University of Pennsylvania, PA 19104, US (e-mail: kritank@upenn.edu). A. A. is with the Elmore Family School of Electrical and Computer Engineering, Purdue University, IN 47907, US (e-mail: anujashok@gmail.com). A. J. is with the Centre for Nano Science and Engineering, Indian Institute of Science, Bangalore, 560012, India (e-mail: antonya@iisc.ac.in). J. P. is with the Department of Instrumentation and Applied Physics, Indian Institute of Science, Bangalore, 560012, India (e-mail: jayap@iisc.ac.in). R. P. is with the Centre for Nano Science and Engineering, Indian Institute of Science, Bangalore, 560012, India (e-mail: pratap@iisc.ac.in). †: Corresponding author L I. I NTRODUCTION IQUIDS are prevalent in numerous sectors including pharmaceuticals, oil and gas, petrochemicals, automotive, and various processing industries, serving diverse practical needs. The dye industry, a significant player, produces and utilizes liquids in the creation of dyes for multiple applications like food, textiles, photography, and leather. This industry relies on solvents to adjust dye concentrations. However, it's known that the concentration of the colorant in a dye-solvent combination diminishes over time [1]. Consequently, monitoring dye concentration is crucial, yet there are only a handful of studies addressing this issue [2]. The realm of transducers has experienced multiple transformative phases, one of which was sparked by the advent of nanotechnology. This innovation facilitated the production of ultra-small transducers having submicron dimensions. This breakthrough, coupled with advanced material studies, led to the emergence of microelectromechanical systems (MEMS) [3]. This transition marked a shift from the macroscopic sensor world to a microscale one, prompting a surge in demand within the field. Nowadays, MEMS inertial systems are a common feature in the majority of smartphones [4]. Furthermore, MEMS has had a groundbreaking impact on ultrasound technology, culminating in the development of exceedingly small ultrasound transducers. Commonly referred to as micromachined ultrasound transducers (MUTs), these devices" 2312.02931v1,"WhisBERT: Multimodal Text-Audio Language Modeling on 100M Words Lukas Wolf Q Klemen Kotar S Greta Tuckute M Eghbal Hosseini M Tamar I. Regev M Ethan Gotlieb Wilcox Q Alex Warstadt Q Q ETH Zürich M MIT S Stanford University {wolflu, warstadt, ethan.wilcox}@ethz.ch klemen@allenai.org {gretatu, ehoseini, tamarr}@mit.edu Abstract Training on multiple modalities of input can augment the capabilities of a language model. Here, we ask whether such a training regime can improve the quality and efficiency of these systems as well. We focus on text–audio and introduce WhisBERT, which is inspired by the text–image approach of FLAVA (Singh et al., 2022). In accordance with BabyLM (Warstadt et al., 2023) guidelines, we pretrain WhisBERT on a dataset comprising only 100 million words plus their corresponding speech from the wordaligned version of the People’s Speech dataset (Galvez et al., 2021). To assess the impact of multimodality, we compare versions of the model that are trained on text only and on both audio and text simultaneously. We find that while WhisBERT is able to perform well on multimodal masked modeling and surpasses the BabyLM baselines in most benchmark tasks, it struggles to optimize its complex objective and outperform its text-only WhisBERT baseline. https://github.com/lu-wo/whisbert 1 Introduction Recent advances in language modeling and their downstream applications have been driven, in large part, by bigger models, with respect to both model size and amounts of training data. Larger and larger pretraining datasets highlight the gap between humans and deep learning models in terms of learning efficiency —while state-of-the-art language models need billions of examples to approach human-level language performance, people learn their language from experience with about 100 million words or less (Warstadt and Bowman, 2022; Frank, 2023). We hypothesize that one major reason for this data efficiency gap is the different inputs that humans and current deep learning systems receive. Human language learning involves multiple modalities, including both visual and auditory input. In contrast, typical language models are trained on representations of text alone. For this BabyLM submission, we ask whether training on inputs of multiple modalities can increase language models’ training efficiency, with a focus on text-audio multimodal input. We conjecture that multimodal data sources have the potential to enrich the language learning process, enabling models to leverage complementary information from different modalities and thus augment their learning capacity (Baltrušaitis et al., 2017). Multimodal language modeling has experienced a noteworthy surge in research productivity lately, in applications such as image retrieval, semantic embeddings, and image generation (Driess et al., 2023; Koh et al., 2023; Yasunaga et al., 2023) However, text-audio multimodal language modeling (e.g. (Chuang et al., 2019; Lakhotia et al., 2021)) remains largely unexplored, especially in low-resource settings such as the 100 million training regime we employ here. As a first step towards a text-audio language model, we introduce Whis- BERT, a novel masked language model (MLM) architecture inspired by vision-text models such as FLAVA (Singh et al., 2022). The core idea is that WhisBERT is trained in a multitask setting on both unimodal (i.e. text- or audio-only) and multimodal objectives. In multimodal objectives, the model receives matched text-audio segments, and it can use information from one modality to learn representations for the other. To accommodate the specific requirements of the BabyLM challenge (Warstadt et al., 2023), we pretrain WhisBert on a dataset of matched audio and text transcripts comprising 100 million words sampled from the People’s Speech dataset (Galvez et al., 2021). We use an improved version of the audio-text-aligned training data, a subset of an upcoming speech production dataset release (see Section 3). This commitment to using high-quality pretraining data is in line with the data efficiency objectives of the BabyLM challenge." 2312.02934v1,"WoVoGen: World Volume-aware Diffusion for Controllable Multi-camera Driving Scene Generation Jiachen Lu Ze Huang Jiahui Zhang Zeyu Yang School of Data Science, Fudan University Li Zhang B https://github.com/fudan-zvg/WoVoGen World volume generation Multi-camera driving scene generation 𝒕 𝟏 𝒕 𝟐 𝒕 𝟑 𝒕 𝟒 HD MAP OCCUPANCY FRONT LEFT FRONT FRONT RIGHT BACK RIGHT BACK BACK LEFT Figure 1. Our WoVoGen is crafted to predict the ambient environment and generate reasonable visual feedback in response to the driving maneuvers of the ego vehicle. To unleash the power of generative models that come in leaps and bounds, we encode structured traffic information into a regular grid framework, i.e. world volume and devise a novel latent diffusion-based world model to autoregressively perform world volume prediction. Abstract quences, and (ii) generating multi-camera videos, informed by this envisioned 4D temporal world volume and sensor interconnectivity. The incorporation of the 4D world volume empowers WoVoGen not only to generate high-quality street-view videos in response to vehicle control inputs but also to facilitate scene editing tasks. Generating multi-camera street-view videos is critical for augmenting autonomous driving datasets, addressing the urgent demand for extensive and varied data. Due to the limitations in diversity and challenges in handling lighting conditions, traditional rendering-based methods are increasingly being supplanted by diffusion-based methods. However, a significant challenge in diffusion-based methods is ensuring that the generated sensor data preserve both intra-world consistency and inter-sensor coherence. To address these challenges, we combine an additional explicit world volume and propose World Volume-aware Multi-camera Driving Scene Generator (WoVoGen). This system is specifically designed to leverage 4D world volume as a foundational element for video generation. Our model operates in two distinct phases: (i) envisioning the future 4D temporal world volume based on vehicle control se- 1. Introduction The burgeoning field of vision-based autonomous driving perception [20, 23, 25] underscores the need for highquality multi-camera street-view datasets [2]. With the notorious costs of labeling in autonomous driving datasets, there is a significant demand for generating high-quality multi-camera street-view videos that accurately mirror realworld 3D data distributions and maintain consistency across multiple sensors. Recent driving scene content synthesis techniques can be categorized into two main groups: rendering-based [9, B Corresponding to lizhangfd@fudan.edu.cn 1" 2312.02943v1,"STRIKING THE BALANCE: LIFE INSURANCE TIMING AND ASSET ALLOCATION IN FINANCIAL PLANNING AN CHEN ∗ AND GIORGIO FERRARI † AND SHIHAO ZHU ‡ Abstract. This paper investigates the consumption and investment decisions of an individual facing uncertain lifespan and stochastic labor income within a Black-Scholes market framework. A key aspect of our study involves the agent’s option to choose when to acquire life insurance for bequest purposes. We examine two scenarios: one with a fixed bequest amount and another with a controlled bequest amount. Applying duality theory and addressing free-boundary problems, we analytically solve both cases, and provide explicit expressions for value functions and optimal strategies in both cases. In the first scenario, where the bequest amount is fixed, distinct outcomes emerge based on different levels of risk aversion parameter γ: (i) the optimal time for life insurance purchase occurs when the agent’s wealth surpasses a critical threshold if γ ∈ (0, 1), or (ii) life insurance should be acquired immediately if γ > 1. In contrast, in the second scenario with a controlled bequest amount, regardless of γ values, immediate life insurance purchase proves to be optimal. Keywords: Portfolio Optimization; Consumption Planning; Life Insurance; Optimal Stopping; Stochastic Control. MSC Classification: 91B70, 93E20, 60G40. JEL Classification: G11, E21, I13. 1. Introduction In the literature on optimal consumption and investment decisions, as discussed in [Richard, 1975] and the literature review provided in the penultimate paragraph of this introduction, there has been thorough exploration of integrating life insurance. The emphasis is on investigating the demand for life insurance and comprehending its influence on consumption and portfolio choices across an individual’s life cycle. Nevertheless, in alignment with the groundbreaking work of Date: December 6, 2023. ∗ Institute of Insurance Science, Ulm University, Helmholtzstr. 20, 89069 Ulm, Germany (an.chen@uni- ulm.de). † Center for Mathematical Economics (IMW), Bielefeld University, Universitätsstrasse 25, 33615, Bielefeld, Germany (giorgio.ferrari@uni-bielefeld.de). ‡ Corresponding author. Center for Mathematical Economics (IMW), Bielefeld University, Universitätsstrasse 25, 33615, Bielefeld, Germany (shihao.zhu@uni-bielefeld.de). 1" 2312.02974v1,"Describing Differences in Image Sets with Natural Language Lisa Dunlap ∗ UC Berkeley Yuhui Zhang ∗ Stanford Xiaohan Wang Stanford Ruiqi Zhong UC Berkeley lisabdunlap@berkeley.edu yuhuiz@stanford.edu xhanwang@stanford.edu ruiqi-zhong@berkeley.edu Trevor Darrell † UC Berkeley Jacob Steinhardt † UC Berkeley Joseph E. Gonzalez † UC Berkeley Serena Yeung-Levy † Stanford trevordarrell@berkeley.edu jsteinhardt@berkeley.edu jegonzal@berkeley.edu syyeung@stanford.edu 𝑫 𝑨 … 𝑫 𝑩 … 𝐷 ! contains more... ""People posing for a picture” Output Figure 1. Set difference captioning. Given two sets of images D A and D B , output natural language descriptions of concepts which are more true for D A . In this example, D A and D B are images from the “Dining Table” class in ImageNetV2 and ImageNet, respectively. Abstract and V2), and discovering what makes images memorable. Using VisDiff, we are able to find interesting and previously unknown differences in datasets and models, demonstrating its utility in revealing nuanced insights. 1 How do two sets of images differ? Discerning set-level differences is crucial for understanding model behaviors and analyzing datasets, yet manually sifting through thousands of images is impractical. To aid in this discovery process, we explore the task of automatically describing the differences between two sets of images, which we term Set Difference Captioning. This task takes in image sets D A and D B , and outputs a description that is more often true on D A than D B . We outline a two-stage approach that first proposes candidate difference descriptions from image sets and then re-ranks the candidates by checking how well they can differentiate the two sets. We introduce VisDiff, which first captions the images and prompts a language model to propose candidate descriptions, then re-ranks these descriptions using CLIP. To evaluate VisDiff, we collect VisD- iffBench, a dataset with 187 paired image sets with ground truth difference descriptions. We apply VisDiff to various domains, such as comparing datasets (e.g., ImageNet vs. ImageNetV2), comparing classification models (e.g., zeroshot CLIP vs. supervised ResNet), characterizing differences between generative models (e.g., StableDiffusionV1 1. Introduction What kinds of images are more likely to cause errors in one classifier versus another [11, 18]? How do visual concepts shift from a decade ago to now [20, 33, 53]? What types of images are more or less memorable for humans [17]? Answering these questions can help us audit and improve machine learning systems, understand cultural changes, and gain insights into human cognition. Although these questions have been independently studied in prior works, they all share a common desideratum: discovering differences between two sets of images. However, discovering differences in many, potentially very large, sets of images is a daunting task for humans. For example, one could gain insights into human memory by discovering systematic differences between memorable images and forgettable ones, but finding these differences may 1 Project page available at https://understanding-visualdatasets.github.io/VisDiff-website/. * Equal contribution. † Equal advising. Both orders decided by coin flip. 1" 2312.02977v1,"Exploring the nonclassical dynamics of the “classical” Schrödinger equation David Navia, Ángel S. Sanz ∗ Department of Optics, Faculty of Physical Sciences, Universidad Complutense de Madrid Pza. Ciencias 1, 28040 Madrid, Spain Abstract The introduction of nonlinearities in the Schrödinger equation has been considered in the literature as an effective manner to describe the action of external environments or mean fields. Here, in particular, we explore the nonlinear effects induced by subtracting a term proportional to Bohm’s quantum potential to the usual (linear) Schrödinger equation, which generates the so-called “classical” Schrödinger equation. Although a simple nonlinear transformation allows us to recover the well-known classical Hamilton- Jacobi equation, by combining a series of analytical results (in the limiting cases) and simulations (whenever the analytical treatment is unaffordable), we find an analytical explanation to why the dynamics in the nonlinear “classical” regime is still strongly nonclassical. This is even more evident by establishing a one-to-one comparison between the Bohmian trajectories associated with the corresponding wave function and the classical trajectories that one should obtain. Based on these observations, it is clear that the transition to a fully classical regime requires extra conditions in order to remove any trace of coherence, which is the truly distinctive trait of quantum mechanics. This behavior is investigated in three paradigmatic cases, namely, the dispersion of a free propagating localized particle, the harmonic oscillator, and a simplified version of Young’s two-slit experiment. Key words: Nonlinear Schrödinger equations, classical Schrödinger equation, Bohmian dynamics, interference, induced self-focusing 1. Introduction Typically, the emergence of the classical world from the quantum one is associated with the action of decoherence [1–5]. Accordingly, the constant interaction with an environment is what eventually leads a given (quantum) system of interest to loose its quantumness (its ability to display genuine quantum features, such as interference, for instance), and hence to behave like the objects that we observe in our everyday life. The ∗ Corresponding author Email addresses: junavia@ucm.es (David Navia), a.s.sanz@fis.ucm.es (Ángel S. Sanz)" 2312.03003v1,"Explore, Select, Derive, and Recall: Augmenting LLM with Human-like Memory for Mobile Task Automation Sunjae Lee School of Computing, KAIST Republic of Korea sunjae1294@kaist.ac.kr Hojun Choi School of Computing, KAIST Republic of Korea hchoi@kaist.ac.kr Junyoung Choi Jungjae Lee School of Computing, KAIST Republic of Korea joonchoi518@kaist.ac.kr School of Computing, KAIST Republic of Korea dlwjdwo00701@kaist.ac.kr Steven Y. Ko Sangeun Oh Simon Fraser University Canada steveyko@sfu.ca Ajou University Republic of Korea sangeunoh@ajou.ac.kr Insik Shin School of Computing, KAIST Republic of Korea ishin@kaist.ac.kr Abstract The advent of large language models (LLMs) has opened up new opportunities in the field of mobile task automation. Their superior language understanding and reasoning capabilities allow users to automate complex and repetitive tasks. However, due to the inherent unreliability and high operational cost of LLMs, their practical applicability is quite limited. To address these issues, this paper introduces Memo- Droid , an innovative LLM-based mobile task automator enhanced with a unique app memory. MemoDroid emulates the cognitive process of humans interacting with a mobile app— explore, select, derive, and recall. This approach allows for a more precise and efficient learning of a task’s procedure by breaking it down into smaller, modular components that can be re-used, re-arranged, and adapted for various objectives. We implement MemoDroid using online LLMs services (GPT- 3.5 and GPT-4) and evaluate its performance on 50 unique mobile tasks across 5 widely used mobile apps. The results indicate that MemoDroid can adapt learned tasks to varying contexts with 100% accuracy and reduces their latency and cost by 69.22% and 77.36% compared to a GPT-4 powered baseline. 1 Introduction As smartphones have grown from simple call-making bricks to pocket-sized powerhouses, they have become integral to our daily lives. Today, we rely on a whole universe of mobile apps to manage tasks ranging from communication to home security. Consequently, the need for efficient task automation in the mobile environment has become increasingly important, to alleviate digital fatigue from repetitive and complex digital interactions that often overwhelm many users today [9, 15]. Unsurprisingly, there have been a number of approaches to achieve task automation. API-based approaches like Siri [2] and Google Assistant [13] enable users to interact with specific functionality of a mobile app using natural language conversation. However, they require developers’ substantial coding efforts, where they have to manually configure new logic for each new task. Demonstration-based methods [22, 26, 27, 29] empower end-users to custom-program automation. However, as it heavily relies on human demonstrations, it suffers from scalability issues. Similarly, learningbased approaches [17, 25, 30, 59, 60] require a large corpus of human-annotated datasets, hampering the widespread application. Most recently, LLMs [1, 37, 41], equipped with high reasoning and generalization abilities, have been a game-changer. LLM-based task automators [39, 44, 56, 66] enable task automation to be fully autonomous and generally applicable, sidestepping the labor-intensive manual development, demonstration, and training that previous methods required. However, this approach also comes with its own limitations. First, due to the inherent non-deterministic nature of LLMs, the reliability of task automation can be compromised. LLMs might not only produce incorrect responses but can also yield different outputs for the same query. Such unreliability is critical in mobile environments as many mobile tasks nowadays involve sensitive and private actions. Second, leveraging LLMs for task automation can be costly, both in terms of budget and time. We observed that tasks that would take just over 30" 2312.03008v1,"Deep Reinforcement Learning for Community Battery Scheduling under Uncertainties of Load, PV Generation, and Energy Prices Jiarong Fan 1 , Hao Wang 1,2* 1 Department of Data Science and AI, Faculty of IT, Monash University, Melbourne, VIC 3800, Australia 2 Monash Energy Institute, Monash University, Melbourne, VIC 3800, Australia Abstract—In response to the growing uptake of distributed energy resources (DERs), community batteries have emerged as a promising solution to support renewable energy integration, reduce peak load, and enhance grid reliability. This paper presents a deep reinforcement learning (RL) strategy, centered around the soft actor-critic (SAC) algorithm, to schedule a community battery system in the presence of uncertainties, such as solar photovoltaic (PV) generation, local demand, and real-time energy prices. We position the community battery to play a versatile role, in integrating local PV energy, reducing peak load, and exploiting energy price fluctuations for arbitrage, thereby minimizing the system cost. To improve exploration and convergence during RL training, we utilize the noisy network technique. This paper conducts a comparative study of different RL algorithms, including proximal policy optimization (PPO) and deep deterministic policy gradient (DDPG) algorithms, to evaluate their effectiveness in the community battery scheduling problem. The results demonstrate the potential of RL in addressing community battery scheduling challenges and show that the SAC algorithm achieves the best performance compared to RL and optimization benchmarks. Index Terms—Community battery, solar photovoltaic, energy management, uncertainties, reinforcement learning. I. I NTRODUCTION In recent years, community batteries have been increasingly recognized as a pivotal solution to the challenges arising from the growing uptake of distributed energy resources (DERs), in particular residential solar photovoltaic (PV) systems. Defined as a system with community ownership, community batteries generate collective socio-economic benefits, such as hosting more renewable energy, increasing higher self-consumption of renewables, and reducing electricity bills [1]. Different from behind-the-meter batteries, community batteries can provide shared storage for multiple households. Such a battery sharing paradigm has been demonstrated to be more cost-effective than residential behind-the-meter batteries in existing studies, such as [2], [3]. In Australia, both federal and state governments, such as Victoria and Western Australia, have been supporting the development of community batteries, which are expected to store and share excess solar power in residential communities and shave peak load on distribution networks. This work was supported in part by the Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) under Grant DE230100046. *Corresponding author: Hao Wang (hao.wang2@monash.edu). Community batteries can serve multiple roles in the distribution system by integrating local renewables, optimizing energy consumption, and enhancing the reliability of distribution networks. The key to unlocking the value of community batteries lies in the scheduling of charge and discharge of community batteries under uncertainties in the systems. Therefore, developing effective scheduling strategies for community batteries becomes a critical area of research. A large body of literature has explored various optimization techniques for community battery scheduling. For example, a model predictive control method was applied in [4] to optimize an energy system of two townhouses with grid-connected PV systems and a community battery. A receding predictive horizon method was proposed in [5] for periodic optimization of community battery systems. Specifically, this method involves the load and PV generation prediction, followed by updating the optimal scheduling of community battery systems hourly to adapt to changing future predictions. Similar methods for community battery system optimization was presented in another study [6]. The optimal operation of an energy community was studied in [7], which formulated an optimization problem to compute the battery charging/discharging policies and the set points of flexible loads and controllable generators. In addition to minimizing costs or optimizing economic performance, some other studies considered different objectives. For example, [8] used a community battery to reduce grid congestion and control the voltage and current within the network. In [9], the battery control problem was formulated as a linear optimization problem and solved by a receding horizon method. In addition, different energy storage options and optimization objectives (e.g., energy minimization, cost minimization and electricity self-sufficiency) were considered. Another study using multi-objective optimization method was presented in [10] to minimize voltage deviation for distribution network operators, while maximizing the utilization of DERs on the demand side. The existing studies above [4]–[10] primarily focused on optimization techniques, which can contribute to the operation of community batteries in systems with load and PV generation. However, these methods often fall short in the face of various uncertainties in the operation of community battery systems. Specifically, renewable energy generation, such as residential" 2312.03012v1,"A Waddington landscape for prototype learning in generalized Hopfield networks Nacer Eddine Boukacem a,b , Allen Leary a,c , Robin Thériault a,d , Felix Gottlieb a , Madhav Mani e,f , and Paul François 1 b,g a Rutherford Physics Building, McGill University, Montréal, QC, Canada; b Département de Biochimie et Medecine Moléculaire, Université de Montréal, Montréal, QC, Canada; Regeneron Pharmaceuticals,777 Old Saw Mill River Rd, Tarrytown, NY 10591, USA; d Scuola Normale Superiore di Pisa, Piazza dei Cavalieri, 7 - 56126 Pisa. Italy; e Engineering Sciences and Applied Mathematics, Northwestern University, Evanston, IL, USA; f NSF-Simons Center for Quantitative Biology, Northwestern University, Evanston, IL, USA; g MILA Québec, Montréal, QC, Canada; 1 To whom correspondence should be addressed. E-mail: paul.francois@umontreal.ca c Networks in machine learning offer examples of complex high-dimensional dynamical systems reminiscent of biological systems. Here, we study the learning dynamics of Generalized Hopfield networks, which permit a visualization of internal memories. These networks have been shown to proceed through a ’feature-to-prototype’ transition, as the strength of network nonlinearity is increased, wherein the learned, or terminal, states of internal memories transition from mixed to pure states. Focusing on the prototype learning dynamics of the internal memories we observe a strong resemblance to the canalized, or low-dimensional, dynamics of cells as they differentiate within a Waddingtonian landscape. Dynamically, we demonstrate that learning in a Generalized Hopfield Network proceeds through sequential ’splits’ in memory space. Furthermore, order of splitting is interpretable and reproducible. The dynamics between the splits are canalized in the Waddington sense – robust to variations in detailed aspects of the system. In attempting to make the analogy a rigorous equivalence, we study smaller subsystems that exhibit similar properties to the full system. We combine analytical calculations with numerical simulations to study the dynamical emergence of the feature-to-prototype transition, and the behaviour of splits in the landscape, saddles points, visited during learning. We exhibit regimes where saddles appear and disappear through saddle-node bifurcations, qualitatively changing the distribution of learned memories as the strength of the nonlinearity is varied – allowing us to systematically investigate the mechanisms that underlie the emergence of Waddingtonian dynamics. Memories can thus differentiate in a predictive and controlled way, revealing new bridges between experimental biology, dynamical systems theory, and machine learning. machine learning | Waddington Landscape | Low-dimensions | Bifurcations | Hopfield Networks | canalization T he field of machine learning offers fascinating examples of networks with self-organizing dynamics. During learning, network parameters change and qualitatively novel regimes appear (1, 2). The dynamics through qualitatively distinct learning regimes open up new possibilities for their optimization and, thus, training. Task optimization in very high dimensions is now seen as ’easy’ as the very high dimensionality of the networks generally ensures that at least one eigenvalue is positive at critical points – there is always a direction in which the loss can be further reduced. This suggests that only saddle points (or saddles) are met during optimization driven by gradient descent (3), so that the learning dynamics consist of transitions between saddles (which can itself be sped up using various standard methods). However, the quantitative and qualitative natures of the saddles themselves might be irreproducible, depending on details of the system. Such a view of learning, with potentially a huge number of (random) critical points, contrasts more coarse-grained observations of the typical learning dynamics observed in neural networks. To this end, in the limit of very high dimensionality, or number of parameters, exact results on the biases and errors of learning dynamics have been derived using tools inspired by random matrix theory and statistical mechanics (4, 5). In addition, information theory metrics have further shown structured and reproducible coarse-grained dynamics during learning (6, 7). with mathematical modeling have established that the dynamics of high-dimensional biological networks can often be captured by low-dimensional representations, at least locally. Examples of such a modeling paradigm can be found within diverse biological contexts, including differentiating cells (10), developing systems (11), embryonic mechanics (12), and for specific brain decisions (13). The dimensionality reduction inherent to the above approaches is concordant, perhaps inspired, by a classical proposal by Conrad Waddington in the context of cellular differentiation. Waddington introduced the notion of an ’epigenetic landscape’, where the evolution of cellular states is represented by a ball rolling in canalized valleys (14). Such valleys can subsequently split, which in a dynamical systems context are referred to as saddles, accounting for binary commitments, eventually leading to a multiplicity of terminal cellular fates. Despite the qualitative nature of such descriptions, Waddingtons’ view leads to multiple predictions: for instance, cellular decisions should typically be binary (i.e. between at most two fates), and one should observe sequences of well-defined ’progenitor’ or ’stem’ states leading to multiple fates. Such predictions have been largely verified experimentally (15), thus confirming Waddington’s intuition and explaining its broad impact on developmental biology. While the landscape paradigm was qualitative, more rigorous theories have been proposed over the years. In a pioneering work, ’classical’ Hopfield networks themselves have been used to reverse-engineer an epigenetic landscape (16), and further revealed a 1D reaction coordinate during cellular reprogramming (17). In addition, low-dimensional models of cell differentiation, based on catastrophe theory, have been Together, these studies suggest the emergence of universal, and thus, simpler, regimes of learning, echoing what is observed in other self-organizing dynamical systems, in particular in biological contexts (8, 9). Case in point: the advances in high throughput quantitative data in biology combined 1" 2312.03015v1,"PartSLIP++: Enhancing Low-Shot 3D Part Segmentation via Multi-View Instance Segmentation and Maximum Likelihood Estimation Yuchen Zhou * Jiayuan Gu * Xuanlin Li Minghua Liu UC San Diego Abstract Yunhao Fang Hao Su functionality. It plays a crucial role in various applications, including robotics, AR/VR, and shape analysis and synthesis [2, 20, 26, 43]. Remarkable progress has been made in developing diverse data-driven approaches for 3D part segmentation [22, 32, 42, 45]. However, standard supervised training necessitates a substantial volume of finely-annotated 3D training shapes, the collection and annotation of which are typically labor-intensive and time-consuming. For instance, the Part- Net dataset [27], which is the most extensive publicly available 3D part dataset, comprises 26,000 objects but covers only 24 common everyday categories. Such limited training categories often hinders supervised methods from effectively tackling open-world scenarios and handling outof-distribution test shapes (e.g., unseen classes). Contrary to 3D data, 2D images accompanied by text descriptions are more readily available, contributing significantly to the recent advancements in large-scale imagelanguage models [1, 13, 18, 33–35, 48]. A recent work, PartSLIP [21], thus capitalizes on this by utilizing the rich 2D priors and the robust zero-shot capabilities of the imagelanguage model to address the 3D part segmentation task in a zero or few-shot fashion. PartSLIP begins by rendering multi-view images for an input 3D point cloud. These images, along with a text prompt, are fed into the GLIP [18] model, known for its proficiency in open-world 2D detection. To translate the 2D bounding boxes detected by GLIP into 3D semantic and instance segmentation masks, Part- SLIP introduces a heuristic pipeline involving superpoint generation, 3D voting, and 3D grouping. While PartSLIP has shown impressive zero-shot and few-shot performance, it does have some notable drawbacks: (a) the 2D bounding boxes generated by GLIP can be coarse, lacking pixel-level accurate part annotations; (b) the heuristic pipeline might not yield the most accurate 3D segmentation; (c) the heuristic relies on multiple hyperparameters, making the final results sensitive to their specific settings. In this work, we propose PartSLIP++, a novel method designed to surpass the aforementioned limitations and further enhance its performance. This method primarily incorporates two significant modifications. Firstly, we gener- Open-world 3D part segmentation is pivotal in diverse applications such as robotics and AR/VR. Traditional supervised methods often grapple with limited 3D data availability and struggle to generalize to unseen object categories. PartSLIP, a recent advancement, has made significant strides in zero- and few-shot 3D part segmentation. This is achieved by harnessing the capabilities of the 2D open-vocabulary detection module, GLIP, and introducing a heuristic method for converting and lifting multiview 2D bounding box predictions into 3D segmentation masks. In this paper, we introduce PartSLIP++, an enhanced version designed to overcome the limitations of its predecessor. Our approach incorporates two major improvements. First, we utilize a pre-trained 2D segmentation model, SAM, to produce pixel-wise 2D segmentations, yielding more precise and accurate annotations than the 2D bounding boxes used in PartSLIP. Second, PartSLIP++ replaces the heuristic 3D conversion process with an innovative modified Expectation-Maximization algorithm. This algorithm conceptualizes 3D instance segmentation as unobserved latent variables, and then iteratively refines them through an alternating process of 2D-3D matching and optimization with gradient descent. Through extensive evaluations, we show that PartSLIP++ demonstrates better performance over PartSLIP in both low-shot 3D semantic and instance-based object part segmentation tasks. We finally showcase the versatility of PartSLIP++ in enabling applications like semi-automatic part annotation and 3D Instance Proposal Generation. Code released at https: //github.com/zyc00/PartSLIP2. 1. Introduction 3D part segmentation focuses on dividing a 3D shape into distinct parts, which necessitates a comprehensive understanding of the object’s structure, semantics, mobility, and * Equal contributions; Corresponding Authors: yuz256@ucsd.edu, jigu@ucsd.edu 1" 2312.03019v1,"Towards Optimizations of Quantum Circuit Simulation for Solving Max-Cut Problems with QAOA Yu-Cheng Lin Chuan-Chi Wang Chia-Heng Tu Shih-Hao Hung National Taiwan University Taipei, Taiwan r11922015@csie.ntu.edu.tw National Taiwan University Taipei, Taiwan d10922012@ntu.edu.tw National Cheng Kung University Tainan, Taiwan chiaheng@ncku.edu.tw National Taiwan University Taipei, Taiwan hungsh@csie.ntu.edu.tw ABSTRACT Quantum approximate optimization algorithm (QAOA) is one of the popular quantum algorithms that are used to solve combinatorial optimization problems via approximations. QAOA is able to be evaluated on both physical and virtual quantum computers simulated by classical computers, with virtual ones being favored for their noise-free feature and availability. Nevertheless, performing QAOA on virtual quantum computers suffers from a slow simulation speed for solving combinatorial optimization problems which require large-scale quantum circuit simulation (QCS). In this paper, we propose techniques to accelerate QCS for QAOA using mathematical optimizations to compress quantum operations, incorporating efficient bitwise operations to further lower the computational complexity, and leveraging different levels of parallelisms from modern multi-core processors, with a study case to show the effectiveness on solving max-cut problems. The experimental results reveal substantial performance improvements, surpassing a state-of-the-art simulator, QuEST, by a factor of 17 on a virtual quantum computer running on a 16-core, 32-thread AMD Ryzen 9 5950X processor. We believe that this work opens up new possibilities for accelerating various QAOA applications. 1 INTRODUCTION Combinatorial optimization searches for an optimal solution from a finite set of feasible solutions, where an objective function is used to calculate and explore the possible solutions under given constraints. Examples of combinatorial optimization problems include maximum cut problem [2], portfolio optimization [3], and route planning [7]. Combinatorial optimization has important applications in different fields, such as auction theory, IC design, and software engineering. Many combinatorial optimization problems (e.g., the max-cut problem) cannot be solved in polynomial time. In such a case, it is a common method to resort to approximation algorithms (e.g., genetic algorithm [13], Monte Carlo simulation [10], and simulated annealing [17]) to generate good solutions for such problems in polynomial time. With the advancements in quantum computing, quantum algorithms offer promising alternatives for solving combinatorial optimization problems, where a target problem can be mapped onto a quantum circuit model to be run on a quantum computer to solve the problem. Popular quantum algorithms includes quantum annealing [1], quantum approximate optimization algorithm (QAOA) [5], quantum adiabatic algorithm [6], Shor’s algorithm [14], and variational quantum eigensolver [12]. QAOA belongs to the class of quantum-classical algorithms, and this algorithm can exploit classical optimization on quantum operations to tweak an objective function. As illustrated in Fig. 1, a problem is mapped to the quantum circuit (e.g., the unitary operations, 𝑈 (𝛾) and 𝑈 (𝛽)) that adjusts the angles of parameterized quantum gate operations to optimize the expected value of the problem, and the relevant parameter optimization is performed on classical computers. As the updating process iterates, the solution is expected to progressively improve. A QAOA algorithm can be adopted to solve a max-cut problem either on a physical or virtual quantum computer. As a physical quantum computer has a relatively higher cost and is susceptible to noise (leading to errors in the obtained results), a virtual counterpart established by computer simulations is a more preferable alternative, especially for the early stage of the algorithm development because it is free from the noise, if desired. Unfortunately, while a quantum circuit simulator (e.g., QuEST [9], Quantum++ [8], qHiPSTER [15], projectQ [16], and Cirq [4]) can serve as the platform to evaluate the QAOA algorithm (e.g., to approximate the result for a max-cut problem), its simulation speed is slow and the simulation time grows almost linearly when a more accurate result is desired (refer to Section ?? for theoretical background and Section 3.4 for experimental results). This work aims to accelerate the simulations of the QAOA circuit for solving a max-cut problem. Our proposal is a comprehensive approach as it covers the optimizations on both quantum and classical computing. That is, we propose the mathematical analysis to compress the quantum operations of the standard QAOA algorithm (Section 2.2), adopting the bitwise operations to further lower the computation complexity (Section 2.3), and exploiting different levels of parallelisms to unlash the computing power of multicore/manycore processors (Section 2.4). The experimental results show that our work outperforms the standard QAOA algorithm running with the state-of-the-art simulator (QuEST [9]) by a factor of 17.1 and 8.3 on the multicore processor and the manycore processor, respectively. We believe this work can be further generalized to support the acceleration of QAOA algorithms targeting various problems. The contributions made by this work are summarized as follows. (1) A comprehensive approach is proposed to optimize the QAOA simulation for a max-cut problem from both quantum and classical computing perspectives as described above. To the best of our knowledge, we are unaware of any other work that serves such a purpose with data analysis. (2) An open-source implementation of the proposed optimizations is online available 1 and there are two versions, one 1 https://anonymous.4open.science/r/QAOA_simulator-8FF3" 2312.03024v1,"Role of Uncertainty in Anticipatory Trajectory Prediction for a Ping-Pong Playing Robot Nima Rahmanian Michael Gupta Renzo Soatto University of California, Berkeley University of California, Berkeley University of California, Berkeley nimsi@berkeley.edu guptamvjm@berkeley.edu renzo@berkeley.edu Srisai Nachuri Michael Psenka Yi Ma University of California, Berkeley University of California, Berkeley University of California, Berkeley srisainachuri@berkeley.edu psenka@eecs.berkeley.edu yima@eecs.berkeley.edu S. Shankar Sastry University of California, Berkeley sastry@coe.berkeley.edu Abstract of space with sharp colors contrasting different objects – which allows for easier visual analysis. However, visual modeling and control remains a difficult challenge due to the highly dynamic game state and fine visual details that determine the outcome of a player’s hit. As a result, many of recent advancements in ping-pong robotics have been reinforcement or deep learning focused [7, 9, 11, 17, 22]. These techniques enable robots to improve their skills through practice, much like a human player. However, despite these technological strides, ping-pong robots still face notable limitations, particularly when playing against human opponents who employ diverse and adversarial strategies. Winning a point in ping-pong is not just about reacting to the ball; it involves strategic planning throughout the full game, adapting to the opponent’s play style, and exploiting their weaknesses. While work has been done on anticipatory planning before the robot’s opponent hits the ball [21], such work and frameworks currently do not return confidence measures to inform a controller how much it should rely on a prediction. Robotic interaction in fast-paced environments presents a substantial challenge, particularly in tasks requiring the prediction of dynamic, non-stationary objects for timely and accurate responses. An example of such a task is pingpong, where the physical limitations of a robot may prevent it from reaching its goal in the time it takes the ball to cross the table. The scene of a ping-pong match contains rich visual information of a player’s movement that can allow future game state prediction, with varying degrees of uncertainty. To this aim, we present a visual modeling, prediction, and control system to inform a ping-pong playing robot utilizing visual model uncertainty to allow earlier motion of the robot throughout the game. We present demonstrations and metrics in simulation to show the benefit of incorporating model uncertainty, the limitations of current standard model uncertainty estimators, and the need for more verifiable model uncertainty estimation. Our code is publicly available. Uncertainty estimation of neural models is a widely studied area [10], and reliable uncertainty estimation is a cornerstone of neuro-symbolic computing and interpretable deep learning [18, 20]. Uncertainty estimation is practically crucial for advancing high-speed robotics, where computations and predictions must be made as early and frequently as possible in order to give a robotic controller enough time to reach the intended target. Scaling controller speed based on predicted uncertainty of the visual model then gives a concrete, measurable way to determine the effectiveness of an uncertainty estimation method. Further, we see from results presented in this paper that reliable model uncertainty esti- 1. Introduction Ping-pong robotics offers a rich testbed for algorithmic strategies in highly dynamical games with competitive adversaries. Ping-pong has been a challenging domain of AI and robotics for almost half a century [2], as we still do not have robots able to beat ping-pong masters like we have for board games such as Chess or Go [19]. There are many visual aspects of the ping-pong setting – an indoor setting played by two players who occupy non-overlapping regions 1" 2312.03026v1,"Uni3DL: Unified Model for 3D and Language Understanding Xiang Li 1,∗ , Jian Ding 1, * , Zhaoyang Chen 2† , Mohamed Elhoseiny 1 1 King Abdullah University of Science and Technology 2 Ecole Polytechnique {xiang.li.1,jian.ding,zhaoyang.chen,mohamed.elhoseiny}@kaust.edu.sa 0.82 It is a ‘L' shaped table. its corner is round off. a red ford mustang muscle car. 0.75 The table is a thin and tall, brown would table. 3D captioning 3D semantic segmentation 3D instance segmentation 3D cross-modality retrieval Uni3DL 3D Classification airplane chair 3D referring segmentation A sink is attached close to wall. lamp a light colored toilet with a bath tub on the right. Figure 1: With a unified architecture, Uni3DL supports diverse 3D vision-language understanding tasks, including semantic segmentation, object detection, instance segmentation, grounded segmentation, captioning, text-3D cross-modality retrieval, (zero-shot) 3D object classification. Abstract enjoys seamless task decomposition and substantial parameter sharing across tasks. Uni3DL has been rigorously evaluated across diverse 3D vision-language understanding tasks, including semantic segmentation, object detection, instance segmentation, visual grounding, 3D captioning, and text-3D cross-modal retrieval. It demonstrates performance on par with or surpassing state-of-the-art (SOTA) task-specific models. We hope our benchmark and Uni3DL model will serve as a solid step to ease future research in unified models in the realm of 3D and language understanding. Project page: https://uni3dl.github.io/. In this work, we present Uni3DL, a unified model for 3D and Language understanding. Distinct from existing unified vision-language models in 3D which are limited in task variety and predominantly dependent on projected multi-view images, Uni3DL operates directly on point clouds. This approach significantly expands the range of supported tasks in 3D, encompassing both vision and vision-language tasks in 3D. At the core of Uni3DL, a query transformer is designed to learn task-agnostic semantic and mask outputs by attending to 3D visual features, and a task router is employed to selectively generate task-specific outputs required for diverse tasks. With a unified architecture, our Uni3DL model 1. Introduction 3D perception technology stands as a fundamental element in the automatic understanding and operation within the * Equal contribution † This work was done when Zhaoyang Chen was an intern at KAUST. 1" 2312.03099v1,"The influence of frequency and gravity on the orientation of active metallodielecric Janus particles translating under a uniform applied alternating-current electric field Alicia Boymelgreen,* a Golak Kunti b,c Pablo Garcia Sanchez d , Gilad Yossifon e * Corresponding author. Email: aboymelg@fiu.edu a. Department of Mechanical and Materials Engineering, Florida International University, Miami, Florida, USA, 33174. b. Faculty of Mechanical Engineering, Indian Institute of Technology Delhi, New Delhi, India, 110016. c. Faculty of Mechanical Engineering, Technion – Israel Institute of Technology, Technion City, Haifa, 3200003, Israel † Footnotes relating to the title and/or authors should appear here. d. . Departamento de Electrónica y Electromagnetismo, Facultad de Física, Universidad de Sevilla, Avda. Reina Mercedes, Sevilla, Spain. e. School of Mechanical Engineering, Tel Aviv University, Ramat Aviv 6997801, Israel Abstract Theoretical and numerical models of active Janus particles commonly assume that the metallo-dielectric interface is parallel to the driving applied electric field. However, our experimental observations indicate that the equilibrium angle of orientation of electrokinetically driven Janus particles varies as a function of the frequency and voltage of the applied electric field. Here, we quantify the variation of the orientation with respect to the electric field and demonstrate that the equilibrium position represents the interplay between gravitational, electrostatic and electrohydrodynamic torques. The latter two categories are functions of the applied field (frequency, voltage) as well as the height of the particle above the substrate. Maximum departure from the alignment with the electric field occurs at low frequencies characteristic of inducedcharge electrophoresis and at low voltages where gravity dominates the electrostatic and electrohydrodynamic torques. The departure of the interface from alignment with the electric field is shown to decrease particle mobility through comparison of freely suspended Janus particles subject only to electrical forcing and magnetized Janus particles in which magnetic torque is used to align the interface with the electric field. Consideration of the role of gravitational torque and particle-wall interactions could account for some discrepancies between theory, numerics and experiment in active matter systems. Introduction The field of active matter is an emerging area of interest with applications as broad as the fundamental understanding of non-equilibrium complex systems 1 to targeted drug delivery and diagnostics 2,3 . An active system is characterized by the ability of a single element to draw energy from its surroundings and convert it into mechanical motion. An isolated active object will translate independently along an individual path line, while the interaction of multiple elements will lead to collective motion such as swarming and flocking 4 . Such examples abound in nature and biology but more recently, interest has turned to synthetic active colloids whose mobility and interactions can be controlled through particle composition or geometry. In accordance with the scallop theorem 5 , a key requirement for these particles to attain net motion is symmetry breaking at the particle level. One of the most commonly used symmetry-broken geometries is the Janus sphere – named after the Roman god of two faces due to their being comprised of two different chemical or material properties. For example, a Janus sphere where one hemisphere is coated in platinum while the other is an inert plastic will self-propel when placed in a solution containing hydrogen peroxide due to an asymmetric catalytic reaction at the platinum hemisphere 6 . External fields can also induce active motion, provided the propulsive mechanism is generated at the particle level 4 .This motion is differentiated from ‘phoresis’ more commonly associated with external fields (e.g., dielectrophoresis, diffusiophoresis) wherein all elements are transported in a single direction under an externally applied gradient and the motion is not considered ‘active’. Of specific relevance here is the motion of metallodielectric Janus spheres with one metallic and one dielectric hemisphere under uniform AC electric fields due to induced-charge electrophoresis (ICEP) 7 or self-dielectrophoresis (sDEP) depending on the frequency of the applied field 8 . The most common method of fabricating the Janus particles (JPs) to be used as synthetic active colloids is through deposition of a series of coatings over one hemisphere of commercially available, homogenous silica or polystyrene microparticles. The weight of this metal coating tends to cause the particles to rapidly sediment, indicating that the role of gravity is not in fact negligible even as it is commonly neglected in modelling due to the small size of the particles. Moreover, before swimming is initiated (either through the addition of the catalyst for selfpropulsion or an applied field), the Janus sphere will orient with the metallic hemisphere facing downwards (  = 0 ) (Figure 1) signifying that the material nonuniformity of the Janus gives rise to a gravitational torque." 2312.03127v1,"Article Early Galaxy Formation and the Hubble Tension Stacy McGaugh 1 1 Citation: McGaugh, S. Hubble Tension. Preprints 2022, 1, 0. https://doi.org/ Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affil- iations. Copyright: © 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Department of Astronomy, Case Western Reserve University; stacy.mcgaugh@case.edu Abstract: A tension between the expansion rate of the universe obtained from direct measurements and that inferred from fits to the acoustic power spectrum of the Cosmic Microwave Background (CMB) radiation has emerged as higher multipoles have been incorporated into CMB fits. This temporal evolution is suggestive of a systematic effect at fine angular scales, and may be related to the observation of unexpectedly massive galaxies at high redshift. Such objects could cause anomalous gravitational lensing of the surface of last scattering, which in turn may affect the best-fit value of H 0 . If so, the Hubble tension may be the result of a systematic effect in the fitting of CMB data rather than a systematic error in local measurements. Keywords: Early universe; Galaxy formation; Large-scale structure of the universe 1. Concordance Cosmology The concordance cosmology (ΛCDM) emerged in the 1990s thanks to observational advances that constrained a broad variety of cosmological parameters [1,2]. These led to the surprising recognition that the mass density was less than the critical density [3], in conflict with then-standard SCDM cosmology and Inflationary theory. Retaining the latter implied a second surprise in the form of the cosmological constant such that Ω m + Ω Λ = 1, which in turn predicted that the expansion rate of the universe would currently be accelerating [4]. This unlikely-seeming prediction was subsequently observed in the Hubble diagram of Type Ia SN [5,6]. This picture was further corroborated by the location of the first peak of the acoustic power spectrum of the CMB being consistent with a flat (Ω k = 0) Robertson-Walker geometry [7,8]. The range of concordance parameters narrowed with the completion of the Hubble Space Telescope Key Project to Measure the Hubble Constant [9], and a ‘vanilla’ set of ΛCDM parameters emerged with 1 h = 0.7 and Ω m = 0.3 [10] some twenty years ago. Since that time, a tension [11–13] has emerged between direct measurements of the Hubble constant [9,14–20] and that obtained from fits to the acoustic power spectrum of the cosmic microwave background obtained by the Planck mission [21]. This tension was not present in earlier data from WMAP [22]. Indeed, one of the most persuasive arguments in favor of vanilla ΛCDM was the concordance of WMAP cosmological parameters with other observations, especially H 0 . Now that a tension has emerged, it is natural to ask when and where things went amiss. To this end, it is interesting to update the Ω m -H 0 concordance diagram that was pivotal in establishing ΛCDM in the first place [2]. Figure 1 shows modern values of the same constraints used in Ref. [2] nearly three decades ago. These include the SH0ES direct measurement of the Hubble constant H 0 = 73.04 ± 1.04 km s − 1 Mpc − 1 [19], the shape parameter Γ = Ω m h = 0.168 ± 0.016 from large scale structure [23], the baryon fraction of clusters of galaxies Ω m h 1/2 = 0.221 ± 0.031 [24], and the age of the globular cluster M92, 13.80 ± 0.75 Gyr [25]. For the age constraint, we assume a flat geometry as an open universe without a cosmological constant would be too young to have a concordance region. For simplicity, we also assume the age of the universe is indistinguishable from the age of the globular cluster, which presumably formed very early, and surely within the first 750 Myr (the uncertainty in its age). Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). 1 h = H 0 / ( 100 km s − 1 Mpc − 1 ) ." 2312.03132v1,"Mon. Not. R. Astron. Soc. 000, 000–000 (0000) Printed 7 December 2023 (MN L A TEX style file v2.2) The ALMaQUEST Survey XI: A strong but non-linear relationship between star formation and dynamical equilibrium pressure. Sara L. Ellison 1 , Hsi-An Pan 2 , Asa F. L. Bluck 3 , Mark R. Krumholz 4,5 , Lihwai Lin 6 , Leslie Hunt 7 , Edvige Corbelli 7 , Mallory D. Thorp 1,8 , Jorge Barrera-Ballesteros 9 , Sebastian F. Sánchez 9 , Jillian M. Scudder 10 , Salvatore Quai 11,12 1 Department of Physics & Astronomy, University of Victoria, Finnerty Road, Victoria, British Columbia, V8P 1A1, Canada 2 Department of Physics, Tamkang University, No.151, Yingzhuan Road, Tamsui District, New Taipei City 251301, Taiwan 3 Department of Physics, Florida International University, 11200 SW 8th Street, Miami, FL, USA 4 Research School of Astronomy and Astrophysics, Australian National University, Canberra ACT 2600, Australia 5 ARC Center of Excellence for Astronomy in Three Dimensions (ASTRO-3D), Canberra ACT 2600, Australia 6 Institute of Astronomy & Astrophysics, Academia Sinica, Taipei 10617, Taiwan 7 INAF— Osservatorio Astrofisico di Arcetri, Largo E. Fermi 5, I-50125, Florence, Italy 8 Argelander-Institut für Astronomie, Universität Bonn, Auf dem Hügel 71, 53121, Bonn, Germany 9 Instituto de Astronomı́a, Universidad Nacional Autonoma de Mexico, A. P. 70-264, C.P. 04510, Mexico, D.F., Mexico 10 Department of Physics and Astronomy, Oberlin College, Oberlin, Ohio, OH 44074, USA 11 INAF-Osservatorio di Astrofisica e Scienze dello Spazio di Bologna, Via Gobetti 93/3, I-40129 Bologna, Italy 12 Dipartimento di Fisica e Astronomia ‘Augusto Righi’, Universita degli Studi di Bologna, Via Gobetti 93/2, I-40129 Bologna, Italy 7 December 2023 ABSTRACT We present the extended ALMA MaNGA QUEnching and STar formation survey, a combination of the original 46 ALMaQUEST galaxies plus new ALMA observations for a further 20 interacting galaxies. Three well-studied scaling relations are fit to the 19,999 star-forming spaxels in the extended sample, namely the resolved Schmidt-Kennicutt (rSK) relation, the resolved star forming main sequence (rSFMS) and the resolved molecular gas main sequence (rMGMS). We additionally investigate the relationship between the dynamical equilibrium pressure (P DE ) and star formation rate surface density (Σ SFR ), which we refer to as the resolved P DE (rPDE) relation. Contrary to previous studies that have focussed on normal star-forming galaxies and found an approximately linear rPDE relation, the presence of more vigourously star-forming galaxies in the extended ALMaQUEST sample reveals a marked turnover in the relation at high pressures. Although the scatter around the linear fit to the rPDE relation is similar to the other three relations, a random forest analysis, which can extract non-linear dependences, finds that P DE is unambiguously more important than either Σ H 2 or Σ ⋆ for predicting Σ SFR . We compare the observed rPDE relation to the prediction of the pressure-regulated feedback-modulated (PRFM) model of star formation, finding that galaxies residing on the global SFMS do indeed closely follow the rPDE relation predicted by the PRFM theory. However, galaxies above and below the global SFMS show significant deviations from the model. Galaxies with high SFR are instead consistent with models that include other contributions to turbulence in addition to the local star formation feedback. Key words: Galaxies: evolution, galaxies: interactions, galaxies: starburst, galaxies: star formation, galaxies: ISM 1 INTRODUCTION Scaling relations provide a valuable tool for understanding the underlying drivers in physical processes. In astronomy, correlations such as the Faber-Jackson relation (Faber & Jackson 1976), the M − σ relation (Ferrarese & Merritt 2000) and the mass metallicity relation (Lequeux et al. 1979), have been used as both theoretical © 0000 RAS supports and interpretative tools for various aspects of galaxy evolution. Examining the dependence on additional variables (e.g. Ellison et al. 2008b; Mannucci et al. 2010; Peng et al. 2010; Hunt et al. 2020; Morselli et al. 2020) provides further insight, with machine learning techniques now being employed to distinguish ‘fundamental’ relations from mere correlations (e.g. Teimoorinia et al. 2016; Dey et al. 2019; Bluck et al. 2020; Baker & Maiolino 2023)." 2312.03137v1,"The Role of Net-Zero Energy Residential Buildings in Florida’s Energy Transition: Economic Analysis and Technical Benefits Hamed Haggi, James M. Fenton a Florida Solar Energy Center, University of Central Florida, Cocoa, Florida, USA Abstract Net-zero emission policies, coupled with declining costs of renewables, battery storage, and electric vehicles, require both direct and indirect electrification (such as green hydrogen) of the energy infrastructure to address climate change impacts, improve resilience, and lower energy expenses. In this paper, a comprehensive techno-economic analysis was performed that integrated net-zero energy buildings within the context of Florida’s energy transition by the year 2050. The analysis compares the monthly cost savings of owning photovoltaic (PV) on the roof, battery storage, and Electric Vehicle (EV) to the cost of buying electricity from the grid for both existing and newly built Orlando homes. The impact of income tax credits (ITC) and energy efficiency improvements on monthly savings was taken into account. The levelized cost of electricity for residential PV and PV + battery systems was determined and extended to provide a cost equivalent to gasoline for an average EV. Rooftop solar fueling an EV for 10,000 miles saves $100 per month over purchasing gasoline. Today, Florida residents can save on their monthly costs of electricity and gasoline if they have both PV on their roof and a battery system (sized for average daily residence load), and benefit from the federal ITC. Florida residents can cost-effectively transition to their own solar, battery storage, and electric vehicle to home systems. Allowing utility-scale solar to be used for on-site EV fast-charging and hydrogen production through electrolysis for fuel cell vehicles or blending with natural gas, minimizing the need for electricity transmission and distribution costs across the power grids. Keywords: Battery Energy Storage, Cost-Benefit Analysis, Electric Vehicles, Florida, Hydrogen Cost, Net-Zero Energy Buildings, PV, Residential Solar 1. Introduction The global energy system currently accounts for approximately 75% of greenhouse gas emissions, making it a pivotal factor in addressing society’s greatest challenge: averting the worst effects of climate change [1]. Achieving Net Zero Emissions (NZE) by 2050, which is essential to limit the long-term increase in average global temperatures to 1.5°C [2] [3], necessitates a comprehensive transformation in how to produce, transport, and consume energy in both the United Email address: hamed@ucf.edu, jfenton@fsec.ucf.edu (Hamed Haggi, James M. Fenton) Preprint submitted to Elsevier December 7, 2023" 2312.03139v1,"A Bayesian Skew-heavy-tailed modelling for loss reserving William L. Leão 1 and Viviana G. R. Lobo 1∗ 1 Instituto de Matemática, Departamento de Métodos Estatı́sticos Universidade Federal do Rio de Janeiro, Brazil Abstract This paper focuses on modelling loss reserving to pay outstanding claims. As the amount liable on any given claim is not known until settlement, we propose a flexible model via heavytailed and skewed distributions to deal with outstanding liabilities. The inference relies on Markov chain Monte Carlo via Gibbs sampler with adaptive Metropolis algorithm steps allowing for fast computations and providing efficient algorithms. An illustrative example emulates a typical dataset based on a runoff triangle and investigates the properties of the proposed models. Also, a case study is considered and shows that the proposed model outperforms the usual loss reserving models well established in the literature in the presence of skewness and heavy tails. Keywords: bayesian inference; heavy-tailed; skewness; loss reserving; adaptive MCMC 1 Introduction 1.1 Background An insurance policy guarantees the payment provided by an insurer to the policyholder if a loss occurs conditionally on a premium payment. However, in some cases, insurance companies often do not settle outstanding claims immediately because some claims are reported with some delay, which means that claims should be paid with a time delay of months, years, or decades. In this context, is crucial for the insurance company be the ability to predict as accurately as possible the amount necessary to compose the reserve for claims that incurred but not yet reported (IBNR, which means the liabilities that have arisen but are reported after the accounting date) or settled to maintain their solvency. Traditionally, some of the existing statistical approaches for dealing with the problem, such as the chain ladder method (Taylor (1984)), Bornhuetter–Ferguson algorithms (Bornhuetter and Ferguson (1972)) and Mack method (Mack (1993)) to compute loss reserves are not able to provide satisfactory performance, because is based on deterministic methods that return a pointwise estimate and do not take into account stochastic uncertainties involved. Also, the usual techniques are not flexible to capture irregular and extreme claims in the dataset. ∗ Corresponding author: Viviana G R Lobo, Departamento de Métodos Estatı́sticos, Instituto de Matemática, Universidade Federal do Rio de Janeiro, Av. Athos da Silveira Ramos, Centro de Tecnologia, Bloco C, CEP 21941- 909. E-mail: viviana@dme.ufrj.br. Homepage: https://sites.google.com/site/dme/viviana 1" 2312.03147v1,"Neural parameter calibration and uncertainty quantification for epidemic forecasting Thomas Gaskin 1,2,⋆ Tim Conrad 3 Grigorios A. Pavliotis 2 Christof Schütte 3,4 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge CB3 0WA, United Kingdom; 2 Department of Mathematics, Imperial College London, London SW7 2AZ, United Kingdom; 3 Zuse Institute Berlin, Berlin, Germany; 4 Department of Mathematics and Computer Science, Freie Universität Berlin, Berlin, Germany ⋆ To whom correspondence should be addressed: trg34@cam.ac.uk Abstract The recent COVID-19 pandemic has thrown the importance of accurately forecasting contagion dynamics and learning infection parameters into sharp focus. At the same time, effective policy-making requires knowledge of the uncertainty on such predictions, in order, for instance, to be able to ready hospitals and intensive care units for a worst-case scenario without needlessly wasting resources. In this work, we apply a novel and powerful computational method to the problem of learning probability densities on contagion parameters and providing uncertainty quantification for pandemic projections. Using a neural network, we calibrate an ODE model to data of the spread of COVID-19 in Berlin in 2020, achieving both a significantly more accurate calibration and prediction than Markov-Chain Monte Carlo (MCMC)-based sampling schemes. The uncertainties on our predictions provide meaningful confidence intervals e.g. on infection figures and hospitalisation rates, while training and running the neural scheme takes minutes where MCMC takes hours. We show convergence of our method to the true posterior on a simplified SIR model of epidemics, and also demonstrate our method’s learning capabilities on a reduced dataset, where a complex model is learned from a small number of compartments for which data is available. Keywords: Epidemic modelling, neural networks, parameter estimation, uncertainty quantification, COVID-19 Contents Introduction..................................................................................................................................................... 2 Methodology.................................................................................................................................................... 3 Modelling the spread of COVID-19 in Berlin .......................................................................................... 6 Discussion......................................................................................................................................................... 10 Supporting Information ................................................................................................................................ 14 1" 2312.03155v1,"Algorithmic Fairness with Feedback John W. Patty * Elizabeth Maggie Penn † December 7, 2023 Abstract The field of algorithmic fairness has rapidly emerged over the past 15 years as algorithms have become ubiquitous in everyday lives. Algorithmic fairness traditionally considers statistical notions of fairness algorithms might satisfy in decisions based on noisy data. We first show that these are theoretically disconnected from welfare-based notions of fairness. We then discuss two individual welfare-based notions of fairness, envy freeness and prejudice freeness, and establish conditions under which they are equivalent to error rate balance and predictive parity, respectively. We discuss the implications of these findings in light of the recently discovered impossibility theorem in algorithmic fairness (Kleinberg, Mullainathan and Raghavan (2016), Chouldechova (2017)). W ORKING P APER : C OMMENTS , S UGGESTIONS , AND C RITICISMS W ELCOME ! * Professor of Political Science and Quantitative Theory & Methods, Emory University. Email: jwpatty@gmail.com. † Professor of Political Science and Quantitative Theory & Methods, Emory University. Email: elizabeth.m.penn@gmail.com. 1" 2312.03171v1,"Combining Counting Processes and Classification Improves a Stopping Rule for Technology Assisted Review Reem Bin-Hezam α,β and Mark Stevenson α Department of Computer Science, University of Sheffield, United Kingdom β Information Systems Department, Princess Nourah bint Abdulrahman University, Saudi Arabia rybinhezam@pnu.edu.sa , mark.stevenson@sheffield.ac.uk α Abstract Technology Assisted Review (TAR) stopping rules aim to reduce the cost of manually assessing documents for relevance by minimising the number of documents that need to be examined to ensure a desired level of recall. This paper extends an effective stopping rule using information derived from a text classifier that can be trained without the need for any additional annotation. Experiments on multiple data sets (CLEF e-Health, TREC Total Recall, TREC Legal and RCV1) showed that the proposed approach consistently improves performance and outperforms several alternative methods. 1 1 Background Information Retrieval (IR) systems often return large numbers of documents in response to user queries and screening them for relevance represents a significant effort. This problem is particularly acute in applications where it is important to identify most (or all) of the relevant documents, for example, systematic reviews of scientific literature (Higgins et al., 2019) and legal eDiscovery (Oard et al., 2018). Technology Assisted Review (TAR) develops methods that aim to reduce the effort required to screen a collection of documents for relevance, such as stopping rules that inform reviewers that a desired level of recall has been reached (and no further documents need to be examined) (Li and Kanoulas, 2020; Yang et al., 2021a). One of the most commonly applied approaches to developing stopping rules is to identify when a particular level of recall has been reached by estimating the total number of documents in the collection (either directly or indirectly). The majority of algorithms using this approach operate by obtaining manual judgements for a sample of the unobserved documents and inferring the total number of relevant documents, e.g. (Shemilt 1 Code to reported results available from https://github. com/ReemBinHezam/TAR_Stopping_CP_CLF et al., 2014; Howard et al., 2020; Callaghan and Müller-Hansen, 2020). However, these approaches may not account for the fact that most relevant documents appear early in the ranking, information shown to be useful for stopping algorithms (Cormack and Grossman, 2016a; Li and Kanoulas, 2020), so they may examine more documents than necessary. Counting Processes Counting processes, stochastic models of the number of occurrences of an event within some interval (Cox and Isham, 1980), can naturally model changes to the frequency of relevant document occurances within a ranking. They have been used to develop stopping rules that ensure that a desired level of recall is reached while also minimising the number of documents that need to be reviewed and found to outperform a range of alternative approaches (Sneyd and Stevenson, 2019, 2021; Stevenson and Bin-Hezam, to appear). However, in these methods the estimate of the total number of relevant documents is only based on the examined initial portion of the ranking and no information is used from the remaining documents. Classification Another approach has been to use a text classifier to estimate the total number of relevant documents (Yu and Menzies, 2019; Yang et al., 2021a). This method has the advantage of using information about all documents in the ranking by observing the classifier’s predictions for the documents that have not yet been examined. However, the classifier alone does not consider or model the occurrence rate at which relevant documents have already been observed. These methods were found to be effective, although each was only tested on a single dataset. This paper proposes an extension to stopping algorithms based on counting processes by using a text classifier to inform the estimate of the total number of relevant documents. This approach makes use of information about the relevance of documents from the entire ranking without increas-" 2312.03173v1,"A Comparative Study of AI-Generated (GPT-4) and Human-crafted MCQs in Programming Education Jacob Doughty ∗ Zipiao Wan ∗ Anishka Bompelli jadought@andrew.cmu.edu Carnegie Mellon University Pittsburgh, PA, USA zwan@andrew.cmu.edu Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Jubahed Qayum Taozhi Wang Juran Zhang Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Yujia Zheng Aidan Doyle Pragnya Sridhar Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Arav Agarwal Christopher Bogart Eric Keylor Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Can Kultur Jaromir Savelka Majd Sakr Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA Carnegie Mellon University Pittsburgh, PA, USA ABSTRACT KEYWORDS There is a constant need for educators to develop and maintain effective up-to-date assessments. While there is a growing body of research in computing education on utilizing large language models (LLMs) in generation and engagement with coding exercises, the use of LLMs for generating programming MCQs has not been extensively explored. We analyzed the capability of GPT-4 to produce multiple-choice questions (MCQs) aligned with specific learning objectives (LOs) from Python programming classes in higher education. Specifically, we developed an LLM-powered (GPT-4) system for generation of MCQs from high-level course context and module-level LOs. We evaluated 651 LLM-generated and 449 human-crafted MCQs aligned to 246 LOs from 6 Python courses. We found that GPT-4 was capable of producing MCQs with clear language, a single correct choice, and high-quality distractors. We also observed that the generated MCQs appeared to be wellaligned with the LOs. Our findings can be leveraged by educators wishing to take advantage of the state-of-the-art generative models to support MCQ authoring efforts. GPT-4, Large Language Models, LLMs, Learning Objectives, Automatic Generation, Curricular Development, Course Design Automation, Automated Content Generation CCS CONCEPTS • Social and professional topics → Computer science education; Software engineering education. ∗ Both authors contributed equally to this research. ACE 2024, January 29-February 2, 2024, Sydney, NSW, Australia © 2024 Copyright held by the owner/author(s). This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Australian Computing Education Conference (ACE 2024), January 29-February 2, 2024, Sydney, NSW, Australia, https://doi.org/10.1145/3636243.3636256. ACM Reference Format: Jacob Doughty, Zipiao Wan, Anishka Bompelli, Jubahed Qayum, Taozhi Wang, Juran Zhang, Yujia Zheng, Aidan Doyle, Pragnya Sridhar, Arav Agarwal, Christopher Bogart, Eric Keylor, Can Kultur, Jaromir Savelka, and Majd Sakr. 2024. A Comparative Study of AI-Generated (GPT-4) and Human-crafted MCQs in Programming Education. In Australian Computing Education Conference (ACE 2024), January 29-February 2, 2024, Sydney, NSW, Australia. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/ 3636243.3636256 1 INTRODUCTION Multiple-choice question (MCQ) tests are one of the most popular types of assessment in education [3, 52]. However, crafting high-quality MCQs that accurately target the intended learning objectives (LOs) requires valuable expertise, is time-consuming and, hence, expensive. This is especially true in technical domains such as computing education where developing effective MCQs poses distinct challenges, e.g., those related to inclusion of pieces of computer code. With changes in technology, growing interest in programming education, and low barriers for students to share past assessments, the demand on instructors to author novel highquality MCQs has never been higher. Recent developments in large language models (LLMs), such as generative pre-trained transformers (GPT), show tremendous potential for addressing this challenge. Leveraging the capabilities of LLMs, educators could potentially (semi-)automate the generation of MCQ assessments." 2312.03187v1,"FERGI: Automatic Annotation of User Preferences for Text-to-Image Generation from Spontaneous Facial Expression Reaction Shuangquan Feng * Junhua Ma * Virginia R. de Sa University of California San Diego, La Jolla, CA 92093 {s1feng,jum002,desa}@ucsd.edu Abstract scale datasets of human preference feedback on images generated by text-to-image models [32, 39, 71–73, 80] and proposed methods of fine-tuning the models with data of human preference feedback [21, 38, 73]. However, the scalability of human feedback collection has still been limited by its reliance on manual annotation. Therefore, we develop and test a system to automatically annotate user preferences for text-to-image generation from their spontaneous facial expression reaction to the generated images. This automatic annotation requires zero additional effort from the real users of text-to-image generators and is thus expected to increase the scalability of human preference feedback data collection. We present the Facial Expression Reaction to Generated Images (FERGI) dataset, which comprises video recordings of 33 participants’ facial expression reaction to 2827 images generated by Stable Diffusion v1.4 [58] based on 576 different self-drafted text prompts, along with their feedback on the generated images from manual input. We estimate the activation of facial action units (AUs), as defined in the Facial Action Coding System (FACS, a comprehensive system breaking down facial expressions into individual components of AUs of muscle movements [19]), in the facial expression reaction videos with a pre-trained model and show that the activations of multiple AUs are highly correlated with user evaluations of the generated images. We further propose a method of automatically annotating user preferences by detecting the activation of AU4 in the facial expression reaction to the generated images and show that this evaluation metric best reflects the user’s evaluation of the image fidelity, making it complementary to the state-of-theart scoring models, which are generally better at reflecting image-text alignment. Researchers have proposed to use data of human preference feedback to fine-tune text-to-image generative models. However, the scalability of human feedback collection has been limited by its reliance on manual annotation. Therefore, we develop and test a method to automatically annotate user preferences from their spontaneous facial expression reaction to the generated images. We collect a dataset of Facial Expression Reaction to Generated Images (FERGI) and show that the activations of multiple facial action units (AUs) are highly correlated with user evaluations of the generated images. Specifically, AU4 (brow lowerer) is most consistently reflective of negative evaluations of the generated image. This can be useful in two ways. Firstly, we can automatically annotate user preferences between image pairs with substantial difference in AU4 responses to them with an accuracy significantly outperforming state-of-the-art scoring models. Secondly, directly integrating the AU4 responses with the scoring models improves their consistency with human preferences. Additionally, the AU4 response best reflects the user’s evaluation of the image fidelity, making it complementary to the stateof-the-art scoring models, which are generally better at reflecting image-text alignment. Finally, this method of automatic annotation with facial expression analysis can be potentially generalized to other generation tasks. The code is available at https://github.com/ShuangquanFeng/FERGI, and the dataset is also available at the same link for research purposes. 1 Introduction The rapid recent advancements in text-to-image generative models have enabled the generation of high-fidelity images aligned with text prompts [50, 54, 56–59]. To better improve the fidelity of the generated images and their alignment with the text prompts, researchers collected large- 2 FERGI Dataset 2.1 Participants 39 participants were recruited from the SONA system of University of California San Diego (UCSD) and completed * Equal Contribution 1" 2312.03216v1,"SDSRA: A S KILL -D RIVEN S KILL -R ECOMBINATION A LGORITHM FOR E FFICIENT P OLICY L EARNING Eric H. Jiang and Andrew Lizarraga ∗ Department of Statistics and Data Science University of California, Los Angeles Los Angeles, CA 90095-1554 {ericjiang0318, andrewlizarraga}@g.ucla.edu A BSTRACT In this paper we introduce a novel algorithm-the Skill-Driven Skill Recombination Algorithm (SDSRA)—an innovative framework that significantly enhances the efficiency of achieving maximum entropy in reinforcement learning tasks. We find that SDSRA achieves faster convergence compared to the traditional Soft Actor-Critic (SAC) algorithm and produces improved policies. By integrating skill-based strategies within the robust Actor-Critic framework, SDSRA demonstrates remarkable adaptability and performance across a wide array of complex and diverse benchmarks. Code: https://github.com/ericjiang18/SDSRA/. 1 I NTRODUCTION Reinforcement Learning (RL) has significantly advanced, with the Soft Actor-Critic (SAC) algorithm, introduced by Haarnoja et al. (2018), standing out for efficient exploration in complex tasks. Despite its strengths, SAC, like other RL methods, faces challenges in more intricate environments. To address these issues, recent research, such as goal-enforced hierarchical learning Chane-Sane et al. (2021) and intrinsically motivated RL with skill selection Singh et al. (2004), focuses on enhancing RL frameworks. In this paper we address these issues and make the following contributions: • Innovative Framework: We introduce SDSRA a novel approach that surpasses SAC methods. • Integration of Intrinsic Motivation: SDSRA incorporates intrinsically motivated learning within a hierarchical structure, enhancing self-directed exploration and skill development which is lacking in SAC. • Enhanced Skill Acquisition and Dynamic Selection: Our method excels in acquiring and dynamically selecting a wide range of skills suitable for varying environmental conditions, offering greater adaptability. • Superior Performance and Learning Rate: We demonstrate faster performance and a quicker learning rate compared to conventional SAC methods, leading to improved rewards in various benchmarks. 1.1 R ELATED W ORK Reinforcement learning research is expanding, particularly in hierarchical structures and intrinsic motivation. Tang et al. (2021) developed a hierarchical SAC variant with sub-goals, yet lacks public code and detailed results. Ma et al. (2022) proposed ELIGN for predicting agent cooperation using intrinsic rewards, while Aubret et al. (2019) surveyed RL algorithms with intrinsic motivation. Other notable works include Laskin et al. (2022)’s skill learning algorithm combining intrinsic rewards and representation learning, Sharma et al. (2019)’s skill discovery algorithm, Bagaria & Konidaris (2020)’s skill discovery algorithm, and Zheng et al. (2018)’s intrinsic reward mechanism for Policy ∗ 1" 2312.03221v1,"Random walk models for the propagation of signalling molecules in one-dimensional spatial networks and their continuum limit Adel Mehrpooya a , Vivien J. Challis a and Pascal R. Buenzli a,∗ a School of Mathematical Sciences, Queensland University of Technology (QUT), Brisbane, Australia December 7, 2023 Abstract The propagation of signalling molecules within cellular networks is affected by network topology, but also by the spatial arrangement of cells in the networks. Understanding the collective reaction–diffusion behaviour in space of signals propagating through cellular networks is an important consideration for example for regenerative signals that convey positional information. In this work, we consider stochastic and deterministic random walk models of signalling molecules propagating and reacting within one-dimensional spatial networks with arbitrary node placement and connectivity. By taking a continuum limit of the random walk models, we derive an inhomogeneous reaction–diffusion–advection equation, where diffusivity and advective velocity depend on local node density and connectivity within the network. Our results show that large spatial variations of molecule concentrations can be induced by heterogeneous node distributions. Furthermore, we find that noise within the stochastic random walk model is directly influenced by node density. We apply our models to consider signal propagation within the osteocyte network of bone, where signals propagating to the bone surface regulate bone formation and resorption processes. We investigate signal-to-noise ratios for different damage detection scenarios and show that the location of perturbations to the network can be detected by signals received at the network boundaries. Key words: reaction–diffusion–advection on networks, signal propagation, damage detection, coarse-graining, inhomogeneous diffusivity 1 Introduction Biological tissues are composed of complex arrangements of cells in space that enable them to perform a variety of functions. To understand how these functions emerge from cell–cell interactions taking place in these complex arrangements, new quantitative approaches based on networks have been developed [1, 2, 3, 4]. These networks represent cell–cell communication pathways due for example to the adjacency of cells in plants and confluent epithelial cell layers [5, 6], or due to branching cellular dendrites connecting near and far cells, such as in the neural network in the brain [7, 8] and in the osteocyte network in bone [9, 10, 11, 12]. Distributed networks also arise in cardiovascular, respiratory, plant vascular and root ∗ Corresponding author. Email address: pascal.buenzli@qut.edu.au 1" 2312.03232v1,"1 Reynolds number effect on drag reduction in pipe flows by a transverse wall oscillation Daniel Coxe 1† , Yulia Peet 1 and Ronald Adrian 1 1 Arizona State University, School for Engineering of Matter Transport and Energy, Tempe, AZ 85281, USA (Received xx; revised xx; accepted xx) Key words: Turbulent Pipe Flow, Transverse wall oscillation, drag reduction, energy spectra, large-scale motions Direct numerical simulations of turbulent pipe flow with transverse wall oscillation (WWO) and with no transverse wall oscillation (NWO) are carried out at friction Reynolds numbers Re τ = 170, 360, and 720. The period and amplitude of the oscillation are selected to achieve high drag reduction in this Reynolds number range, and the effect of increasing Reynolds number on the amount of drag reduction achievable is analyzed. Of a particular interest in this study is the identification of the scales of motion most affected by drag reduction at different Reynolds numbers. To answer this question, both one-dimensional and two-dimensional spectra of different statistical quantities are analyzed with and without transverse wall oscillation. The effect of wall oscillation is found to suppress the intermediate- and large-scale motions in the buffer layer of the flow, while large-scale and very-large-scale motions in the log layer and the wake region are enhanced. While suppression of the near-wall turbulence promotes drag reduction, enhancement of the large-scale motions in the log and the wake region is found to oppose drag reduction. Since higher Reynolds number flows support development of a growing range of large-scale structures, it is suggested that their prevalence in the energy spectra combined with their negative effect on drag reduction account for a reduced effectiveness of wall oscillation as a drag reduction mechanism with increasing Reynolds numbers. 1. Introduction Reduction of skin friction drag in turbulent flows is a highly-sought outcome of passive and active flow control techniques, especially given that skin friction drag contributes approximately 50%, 90% and 100% of the total drag on airplanes, submarines and pipelines, respectively (Gad-el Hak 1994; Abbassi et al. 2017). Most of the studies on drag reduction, both numerical and experimental, were performed in a relatively low Reynolds number regime, typically around Re τ ∼ 200 − 400 in simulations, and Re τ < 2000 in experiments (Gatti & Quadrio 2016; Ricco et al. 2021; Marusic et al. 2021), where Re τ denotes the friction Reynolds number. In contrast, typical Reynolds numbers encountered in applications attain the values of Re τ = 4000 on a wind turbine blade or in a long-distance pipeline, 6000 at the mid-span of a Boeing 787 wing, and † Email address for correspondence: dcoxe@asu.edu" 2312.03236v1,"Multicoated and Folded Graph Neural Networks with Strong Lottery Tickets Jiale Yan, Hiroaki Ito, Ángel López García-Arias, Yasuyuki Okoshi, Hikari Otsuka, Kazushi Kawamura, Thiem Van Chu, Masato Motomura ∗ Tokyo Institute of Technology, Tokyo, Japan {yan.jiale, ito.hiroaki, lopez, okoshi.yasuyuki, otsuka.hikari, kawamura, thiem, motomura}@artic.iir.titech.ac.jp Abstract The Strong Lottery Ticket Hypothesis (SLTH) demonstrates the existence of high-performing subnetworks within a randomly initialized model, discoverable through pruning a convolutional neural network (CNN) without any weight training. A recent study, called Untrained GNNs Tickets (UGT), expanded SLTH from CNNs to shallow graph neural networks (GNNs). However, discrepancies persist when comparing baseline models with learned dense weights. Additionally, there remains an unexplored area in applying SLTH to deeper GNNs, which, despite delivering improved accuracy with additional layers, suffer from excessive memory requirements. To address these challenges, this work utilizes Multicoated Supermasks (M-Sup), a scalar pruning mask method, and implements it in GNNs by proposing a strategy for setting its pruning thresholds adaptively. In the context of deep GNNs, this research uncovers the existence of untrained recurrent networks, which exhibit performance on par with their trained feed-forward counterparts. This paper also introduces the Multi-Stage Folding and Unshared Masks methods to expand the search space in terms of both architecture and parameters. Through the evaluation of various datasets, including the Open Graph Benchmark (OGB), this work establishes a triple-win scenario for SLTH-based GNNs: by achieving high sparsity, competitive performance, and high memory efficiency with up to 98.7% reduction, it demonstrates suitability for energy-efficient graph processing. 1 Introduction Graph Neural Networks (GNNs) [1–5] have emerged as powerful models for graph-based learning tasks. Within this field, both shallow GNNs [1–3] and deep GNNs [4, 5] hold significant presence, each characterized by their distinct layers and intricate structural complexities. Their success is attributed to the synergistic combination of the neighborhood aggregation scheme and weight sharing. The neighborhood aggregation scheme effectively captures local graph structures and interdependencies, while weight sharing enables GNNs to generalize across nodes, extracting meaningful features from large-scale graphs. Unfortunately, computational overheads increase rapidly when fitting GNNs to large-scale graphs. To decrease the computational burden, studies [6–9] have utilized the Lottery Ticket Hypothesis (LTH) [10, 11] to identify graph lottery tickets, sparse subnetworks extracted from dense GNNs that can perform comparably to the original models. Among them, [6–8] simultaneously simplify the input graph and prune GNNs’ weights. These approaches belong to the Weak Lottery Ticket Hypothesis (WLTH) [12–17], as they require weight re-training. On the other hand, the Untrained GNNs Tickets (UGT) study [9] focuses on pruning GNNs’ weights and does not require any subsequent weight training, adhering to the Strong Lottery Ticket Hypothesis (SLTH) [18–22]. This paper primarily focuses on SLTH due to its potential as a hardware-friendly algorithm for GNNs. ∗ Corresponding author. Project URL: https://github.com/LouiValley/SLT-GNN J. Yan et al., Multicoated and Folded Graph Neural Networks with Strong Lottery Tickets. Proceedings of the Second Learning on Graphs Conference (LoG 2023), PMLR 231, Virtual Event, November 27–30, 2023." 2312.03251v1,"Electrically controlled interlayer trion fluid in electron-hole bilayers Ruishi Qi 1,2 , Qize Li 1 , Zuocheng Zhang 1 , Sudi Chen 1,2 , Jingxu Xie 1,2 , Yunbo Ou 3 , Zhiyuan Cui 1,2 , David D. Dai 4 , Andrew Y. Joe 5 , Takashi Taniguchi 6 , Kenji Watanabe 7 , Sefaattin Tongay 3 , Alex Zettl 1,2,8 , Liang Fu 4 , and Feng Wang 1,2,8,* 1 Department of Physics, University of California, Berkeley, CA 94720, USA 2 Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA 3 School for Engineering of Matter, Transport and Energy, Arizona State University, Tempe, AZ 85287, USA 4 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA 5 Department of Physics, University of California, Riverside, CA 92521, USA 6 International Center for Materials Nanoarchitectonics, National Institute for Materials Science, 1-1 Namiki, Tsukuba 305-0044, Japan 7 Research Center for Functional Materials, National Institute for Materials Science, 1-1 Namiki, Tsukuba 305-0044, Japan 8 Kavli Energy NanoSciences Institute, University of California Berkeley and Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA. * To whom correspondence should be addressed: fengwang76@berkeley.edu Abstract: The combination of repulsive and attractive Coulomb interactions in a quantum electron(e)-hole(h) fluid can give rise to novel correlated phases of multiparticle charge complexes such as excitons, trions and biexcitons. Here we report the first experimental realization of an electrically controlled interlayer trion fluid in two-dimensional van der Waals heterostructures. We demonstrate that in the strong coupling regime of electron-hole bilayers, electrons and holes in separate layers can spontaneously form three-particle trion bound states that resemble positronium ions in high energy physics. The interlayer trions can assume 1e-2h and 2e-1h configurations, where electrons and holes are confined in different transition metal dichalcogenide layers. We show that the two correlated holes in 1e-2h trions form a spin-singlet state with a spin gap of ~1meV. By electrostatic gating, the equilibrium state of our system can be continuously tuned into an exciton fluid, a trion fluid, an exciton-trion mixture, a trion-charge mixture or an electron-hole plasma. Upon optical excitation, the system can host novel high-order multiparticle charge complexes including interlayer four-particle complex (tetrons) and five-particle complex (pentons). Our work demonstrates a unique platform to study novel correlated phases of tunable Bose-Fermi mixtures and opens up new opportunities to realize artificial ions/molecules in electronic devices. Main In many-body systems composed of oppositely charged particles, the combination of repulsive and attractive Coulomb interactions can stabilize a wide variety of multiparticle bound states. For example, interacting electrons and nuclei lead to the formation of atoms and molecules, and interacting electrons and positrons can generate two-particle positronium and three-particle positronium ions. In semiconductors, interacting electrons and holes can form excitons, trions, and biexcitons 1 . These multiparticle electron-hole (e-h) states in semiconductors are usually generated transiently through optical excitation, which makes it difficult to explore their steady-state" 2312.03252v1,"1 Privacy-Preserving Task-Oriented Semantic Communications Against Model Inversion Attacks Yanhu Wang, Shuaishuai Guo, Senior Member, IEEE, Yiqin Deng, Member, IEEE, Haixia Zhang, Senior Member, IEEE, and Yuguang Fang, Fellow, IEEE Abstract—Semantic communication has been identified as a core technology for the sixth generation (6G) of wireless networks. Recently, task-oriented semantic communications have been proposed for low-latency inference with limited bandwidth. Although transmitting only task-related information does protect a certain level of user privacy, adversaries could apply model inversion techniques to reconstruct the raw data or extract useful information, thereby infringing on users’ privacy. To mitigate privacy infringement, this paper proposes an information bottleneck and adversarial learning (IBAL) approach to protect users’ privacy against model inversion attacks. Specifically, we extract task-relevant features from the input based on the information bottleneck (IB) theory. To overcome the difficulty in calculating the mutual information in high-dimensional space, we derive a variational upper bound to estimate the true mutual information. To prevent data reconstruction from task-related features by adversaries, we leverage adversarial learning to train encoder to fool adversaries by maximizing reconstruction distortion. Furthermore, considering the impact of channel variations on privacy-utility trade-off and the difficulty in manually tuning the weights of each loss, we propose an adaptive weight adjustment method. Numerical results demonstrate that the proposed approaches can effectively protect privacy without significantly affecting task performance and achieve better privacy-utility trade-offs than baseline methods. Index Terms—Semantic communications, preservation, information bottleneck, adversarial privacylearning. I. I NTRODUCTION R ECENTLY, deep learning (DL) has achieved tremendous breakthroughs, demonstrating exciting performance gain in computer vision, natural language processing, speech recognition, and so on. Inspired by all these successes, more and more researchers attempt to apply DL to communications. So far, there exist a large number of papers investigating DL-based joint source-channel coding (JSCC) [1], channel estimation [2], interference alignment [3], signal detection [4], wireless resource allocation [5], etc. Numerical results demonstrate that DL technology can effectively improve the performance of communication systems [6]. However, many emerging intelligent applications envisioned to be supported in 5G/6G systems, such as augmented/virtual reality (AR/VR), autonomous driving, and environmental monitoring, present Yanhu Wang, Shuaishuai Guo, Yiqin Deng, and Haixia Zhang are with School of Control Science and Engineering, Shandong University, Jinan, 250061, China (e-mail: yh-wang@mail.sdu.edu.cn, shuaishuai guo@sdu.edu.cn, yiqin.deng@email.sdu.edu.cn, haixia.zhang@s du.edu.cn). Yuguang Fang is with Department of Computer Science, City University of Hong Kong, Hong Kong, China (e-mail: my.fang@cityu.edu.hk). serious design challenges to these DL-based communication systems that aim to transmit data reliably. Taking autonomous driving as an example, during driving, the in-vehicle sensing system collects large amounts of data, mainly images, highdefinition videos, and point clouds [7]. If all data is directly transmitted to an edge server on the roadside for inference, it may cause excessive communication delays when effective decision-making strategies are used to save lives of passengers and other citizens. To address the above problem, task-oriented semantic communication has been proposed and recognized as a new communication paradigm for 6G mobile communications [8]– [10]. This new paradigm has received intensive attention lately, leading to the implementations of wireless image retrieval at the edge [11], [12], one-device edge inference [13], [14], and multi-device cooperative edge inference [7]. It enables low-latency inference by extracting and transmitting taskrelevant information at the transmitter. By transmitting the task-related features instead of the original data, task-oriented semantic communications can prevent privacy leakage to some extent. However, adversaries could still apply model inversion techniques [15]–[17] to recover the raw data or extract useful information, thereby infringing on users’ privacy. To our best knowledge, there hardly exists any work addressing privacy issues in task-oriented semantic communications. Privacy-preservation has been a research focus in mobile devices and wireless networks [18]. Many methods on privacypreservation have been proposed in the current literature, such as k-anonymity [19], l-diversity [20], and t-closeness [21]. However, most of them do not scale well to handle highdimensional data. Besides, they cannot be easily adapted to semantic communication systems. There are several reasons for this. Firstly, most semantic communication systems are based on autoencoder architectures, and training is carried out in an end-to-end manner. Directly transplanting existing privacy methods into semantic communication systems may result in the inability to train the semantic communication system. Secondly, it may significantly affect the performance of semantic communication systems, such as differential privacy methods (DP) [22], [23], which directly inject noise into transmission features. Motivated by the aforementioned issues, in this paper, we investigate privacy-preserving techniques for task-oriented semantic communications to prevent privacy breaches. In this paper, we propose IBAL - a scheme for privacypreserving task-oriented semantic communications. Since the IB theory [24] maximizes the mutual information between" 2312.03257v1,"Bayesian Functional Analysis for Untargeted Metabolomics Data with Matching Uncertainty and Small Sample Sizes ∗ Guoxuan Ma 1 , Jian Kang 1,* , and Tianwei Yu 2,3,4,* 1 Department of Biostatistics, University of Michigan, Ann Arbor, MI 48109, USA 2 School of Data Science, The Chinese University of Hong Kong – Shenzhen, Shenzhen, Guangdong 518172, China 3 Shenzhen Research Institute of Big Data, Shenzhen, Guangdong 518172, China 4 Guangdong Provincial Key Laboratory of Big Data Computing, Shenzhen 518172, China * To whom correspondence should be addressed: jiankang@umich.edu, yutianwei@cuhk.edu.cn Abstract Untargeted metabolomics based on liquid chromatography-mass spectrometry technology is quickly gaining widespread application given its ability to depict the global metabolic pattern in biological samples. However, the data is noisy and plagued by the lack of clear identity of data features measured from samples. Multiple potential matchings exist between data features and known metabolites, while the truth can only be one-to-one matches. Some existing methods attempt to reduce the matching uncertainty, but are far from being able to remove the uncertainty for most features. The existence of the uncertainty causes major difficulty in downstream functional analysis. To address these issues, we develop a novel approach for Bayesian Analysis of Untargeted Metabolomics data (BAUM) to integrate previously separate tasks into a single framework, including matching uncertainty inference, metabolite selection, and functional analysis. By incorporating the knowledge graph between variables and using relatively simple assumptions, BAUM can analyze datasets with small sample sizes. By allowing different confidence levels of feature-metabolite matching, the method is applicable to datasets in which feature identities are partially known. Simulation studies demonstrate that, compared with other existing methods, BAUM achieves better accuracy in selecting important metabolites that tend to be functionally consistent and assigning confidence scores to feature-metabolite matches. We analyze a COVID-19 ∗ This manuscript is under review of Briefings of Bioinformatics. 1" 2312.03259v1,"f -FERM: A Scalable Framework for Robust Fair Empirical Risk Minimization Sina Baharlouei ∗ baharlou@usc.edu Shivam Patel † shivamapatel2002@gmail.com Meisam Razaviyayn ∗ razaviya@usc.edu A BSTRACT Training and deploying machine learning models that meet fairness criteria for protected groups are fundamental in modern artificial intelligence. While numerous constraints and regularization terms have been proposed in the literature to promote fairness in machine learning tasks, most of these methods are not amenable to stochastic optimization due to the complex and nonlinear structure of constraints and regularizers. Here, the term “stochastic” refers to the ability of the algorithm to work with small mini-batches of data. Motivated by the limitation of existing literature, this paper presents a unified stochastic optimization framework for fair empirical risk minimization based on f -divergence measures (f -FERM). The proposed stochastic algorithm enjoys theoretical convergence guarantees. In addition, our experiments demonstrate the superiority of fairness-accuracy tradeoffs offered by f -FERM for almost all batch sizes (ranging from full-batch to batch size of one). Moreover, we show that our framework can be extended to the case where there is a distribution shift from training to the test data. Our extension is based on a distributionally robust optimization reformulation of f -FERM objective under ℓ p norms as uncertainty sets. Again in this distributionally robust setting, f -FERM not only enjoys theoretical convergence guarantees but also outperforms other baselines in the literature in the tasks involving distribution shifts. An efficient stochastic implementation of f -FERM is publicly available 3 . 1 Introduction Machine learning models are increasingly deployed in critical applications ranging from healthcare [Ahmad et al., 2018] to image processing [Krizhevsky et al., 2017], education to job recruitment [Boselli et al., 2018], and social networking to cybersecurity [Xin et al., 2018]. Machine learning practitioners have adopted learning algorithms to fathom inherently difficult and crucial problems. However, naı̈ve deployment of these models may lead to several serious shortcomings and ethical issues such as biased predictions against minority groups [Angwin et al., 2016, Buolamwini and Gebru, 2018], vulnerability to adversarial attacks [Madry et al., 2017, Carlini and Wagner, 2017, Baharlouei et al., 2023], and lack of generalizability to novel environments [Arjovsky et al., 2019]. Consequently, it is of utmost importance to have reliable and trustworthy models that are, in particular, fair and comply with equality norms and provisions worldwide [Act, 1964, Elford, 2023]. With the increasing concern for the trustworthiness of unchecked machine learning algorithms, a broad class of paradigms has been proposed to counteract and mitigate both the cause and effects of model unreliability. Imposing statistical independence between model output and particular input features is of interest in various domains, especially when the generalization of a trained model is based on a collection of spurious features present in the training dataset [Dwork et al., 2012, Hardt et al., 2016, Yan et al., 2017]. These could be sensitive features like gender, race, age, and/or income in the context of fairness, or could be confounding factors like environmental artifacts in the context of image classification [Arjovsky et al., 2019]. Existing literature on imposing statistical independence between selected ∗ Industrial and Systems Engineering Department, University of Southern, California, Los Angeles, CA 90089, USA Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai 400076, India 3 https://github.com/optimization-for-data-driven-science/f-FERM †" 2312.03265v1,"www.nature.com/scientificreports OPEN Generalized monodromy method in gauge/gravity duality Yuanpeng Hou The method of monodromy is an important tool for computing Virasoro conformal blocks in a twodimensional Conformal Field Theory (2d CFT) at large central charge and external dimensions. In deriving the form of the monodromy problem, which defines the method, one needs to insert a degenerate operator, usually a level-two operator, into the corresponding correlation function. It can be observed that the choice of which degenerate operator to insert is arbitrary, and they shall reveal the same physical principles underlying the method. In this paper, we exploit this freedom and generalize the method of monodromy by inserting higher-level degenerate operators. We illustrate the case with a level-three operator, and derive the corresponding form of the monodromy problem. We solve the monodromy problem perturbatively and numerically; and check that it agrees with the standard monodromy method, despite the fact that the two versions of the monodromy problem do not seem to be related in any obvious way. The forms corresponding to other higher-level degenerate operators are also discussed. We explain the physical origin of the coincidence and discuss its implication from a mathematical perspective. The AdS/CFT correspondence, also known as the gauge/gravity duality, is considered as an explicit realization of the holographic ­principle 1–3 . It claims that a weakly coupled quantum gravity theory in d + 1-dimensional asymptotic AdS spacetime is dual to a d-dimensional strongly coupled gauge field theory on the boundary of AdS spacetime. The first concrete realization of AdS/CFT correspondence was proposed in 1997 by Maldacena in the context of string theory: Type IIB string on A ­ dS 5 × ­S 5 is dual to N = 4U(N) Super Yang-Mills t ­ heory 4 . It was then followed by more realizations such as the A ­ dS 4 /CFT 3 version between ABJM theory and M t ­ heory 5 . By now there have accumulated reasonable grounds to suppose that the duality should hold in a more general context, even though it has not been proved apart from a few examples mentioned before, particularly due to the lack of understanding towards a full theory of quantum gravity. The AdS/CFT correspondence has been applied to gain novel understandings of many interesting physics, such as the study of black hole thermal ­dynamics 6 , non-Fermi liquids and quantum phase t ­ ransitions 7 , holographic entanglement e ­ ntropy 8,9 , energy conditions in quantum ­gravity 10–12 , etc., and continues to inspire new ideas in various fields. Among the various dimensions in which AdS/CFT has been formulated, A ­ dS 3 /CFT 2 is special due to additional ­simplifications 13–16 . In particular, the symmetry of a two-dimensional conformal field theory is enhanced to the infinite-dimensional Virasoro algebra, while the bulk gravitational dynamics is topological when bulk matters are not ­considered 15,17–20 . These features simplify the analysis significantly, and many computations can be performed with better control. In this correspondence, the central charge c of the Conformal Field Theory (CFT) is related to scale of AdS radius l in Newton’s constant G ­by 16 : c = 3l 2G (1) So the semi-classical limit of bulk gravity corresponds to the large c limit of CFT. The asymptotic symmetry of quantum gravity in ­AdS 3 is exactly the Virasoro algebra in 2d ­CFT 16 , in this sense and the energy–momentum tensor T in 2d CFT acting on the vacuum will create bulk states containing “Boundary Graviton” in ­AdS 3 . Contributions from these gravitons can be organized into Virasoro families, which are representations of Virasoro generators {L −n , n > 0} , in this way we have a better understanding in the boundary CFT of how to isolate the dynamics of bulk gravitons in A ­ dS 321–23 . Correlation functions play central roles in 2d CFT, they can reveal many important aspects of the theory. While the two-point and three-point functions are universally fixed by the symmetries of the CFTs, starting from four-point functions they contain richer information of the underlying CFT data such as the operator spectrum. 1 Xinjiang Astronomical Observatory, Chinese Academy of Sciences, 150 Science 1‑Street, Urumqi 830011, China. 2 Kavli Institute for Theoretical Sciences (KITS), University of Chinese Academy of Sciences, Beijing 100190, China. 3 School of Astronomy and Space Science, University of Chinese Academy of Sciences, Beijing 100049, China. email: houyuanpeng@xao.ac.cn Scientific Reports | (2022) 12:11988 | https://doi.org/10.1038/s41598-022-16054-0 1 Vol.:(0123456789)" 2312.03266v1,"SO-NeRF: Active View Planning for NeRF using Surrogate Objectives Keifer Lee 1 , Shubham Gupta 1 , Sunglyoung Kim 1,2 , Bhargav Makwana 1,2 , Chao Chen 1 , Chen Feng 1, * 1 New York University 2 Denotes Equal Contribution https://ai4ce.github.io/SO-NeRF PSNR: 28.8 Ours (SO-NeRF) Time: 10m 13s (i) Surface Coverage, C (iv) Textural Complexity, T Score = 0.5 SOARNet Baseline (ActiveNeRF) Time: 14h 10m PSNR: 27.6 Score = 0.2 (ii) Geometric Complexity, Q (iii) Ray Diversity, D (a) Computing SOAR Scores on Training Objects (b) Train SOARNet on SOAR Scores (c) Trajectory Planning (d) Radiance Fields Training Figure 1. Overview of SO-NeRF against a baseline, ActiveNeRF [33]. (a) Given any training mesh, we compute the individual surrogate objective scores C, Q, D and T, (b) train a model, SOARNet (c) for trajectory planning, without the need of prior visit of the candidate poses (unlike ActiveNeRF). (d) We can achieve comparable NeRF quality, but with a significant speed-up compared to the baseline. Abstract Despite the great success of Neural Radiance Fields (NeRF), its data-gathering process remains vague with only a general rule of thumb of “sampling as densely as possible”. The lack of understanding of what actually constitutes good views for NeRF makes it difficult to actively plan a sequence of views that yield the maximal reconstruction quality. We propose Surrogate Objectives for Active Radiance Fields (SOAR), which is a set of interpretable functions that evaluates the goodness of views using geometric and photometric visual cues - surface coverage, geometric complexity, textural complexity, and ray diversity. Moreover, by learning to infer the SOAR scores from a deep network, SOARNet, we are able to effectively select views in mere * The work is supported by NSF Awards 2238968 and 2322242. The corresponding author is Chen Feng cfeng@nyu.edu seconds instead of hours, without the need for prior visits to all the candidate views or training any radiance field during such planning. Our experiments show SOARNet outperforms the baselines with ∼80x speed-up while achieving better or comparable reconstruction qualities. We finally show that SOAR is model-agnostic, thus it generalizes across fully neural-implicit to fully explicit approaches. 1. Introduction A key aspect of a practical and intelligent embodied agent is the ability to dynamically respond and plan appropriately to an ever-changing environment - dubbed active perception [2]. Of course, one presupposes the ability to construct a reliable representation of the environment as a prior, and a class of approach has been found to be particularly efficacious in recent years - neural implicit representations" 2312.03268v1,"Design-based inference for generalized network experiments with stochastic interventions ∗ Ambarish Chattopadhyay † , Kosuke Imai ‡ , José R. Zubizarreta § December 7, 2023 Abstract A growing number of scholars and data scientists are conducting randomized experiments to analyze causal relationships in network settings where units influence one another. A dominant methodology for analyzing these network experiments has been design-based, leveraging randomization of treatment assignment as the basis for inference. In this paper, we generalize this design-based approach so that it can be applied to more complex experiments with a variety of causal estimands with different target populations. An important special case of such generalized network experiments is a bipartite network experiment, in which the treatment assignment is randomized among one set of units and the outcome is measured for a separate set of units. We propose a broad class of causal estimands based on stochastic intervention for generalized network experiments. Using a design-based approach, we show how to estimate the proposed causal quantities without bias, and develop conservative variance estimators. We apply our methodology to a randomized experiment in education where a group of selected students in middle schools are eligible for the anti-conflict promotion program, and the program participation is randomized within this group. In particular, our analysis estimates the causal effects of treating each student or his/her close friends, for different target populations in the network. We find that while the treatment improves the overall awareness against conflict among students, it does not significantly reduce the total number of conflicts. Keywords: bipartite network experiment; partial interference; peer effects; randomized experiment; spillover effects ∗ This work was supported through a grant from the Sloan Foundation (Economics Program; 2020-13946). Stanford Data Science, Stanford University, 450 Jane Stanford Way Wallenberg, Stanford, CA 94305; email: hsirabma@stanford.edu. ‡ Department of Government and Department of Statistics, Harvard University, 1737 Cambridge Street, Institute for Quantitative Social Science, Cambridge, MA 02138; email: imai@harvard.edu URL: https://imai.fas.harvard .edu § Departments of Health Care Policy, Biostatistics, and Statistics, Harvard University, 180 Longwood Avenue, Office 307-D, Boston, MA 02115; email: zubizarreta@hcp.med.harvard.edu. † 1" 2312.03274v1,"Journal Title Here , 2023, 1–22 doi: DOI HERE Advance Access Publication Date: Day Month Year Paper Empirical Bayes Covariance Decomposition, and a solution to the Multiple Tuning Problem in Sparse PCA Joonsuk Kang 1,∗ and Matthew Stephens 1,2,∗ 1 Department of Statistics, University of Chicago, IL, USA and 2 Department of Human Genetics, University of Chicago, IL, USA ∗ Correspondence should be sent to joonsukkang@uchicago.edu, and mstephens@uchicago.edu FOR PUBLISHER ONLY Received on Date Month Year; revised on Date Month Year; accepted on Date Month Year Abstract Sparse Principal Components Analysis (PCA) has been proposed as a way to improve both interpretability and reliability of PCA. However, use of sparse PCA in practice is hindered by the difficulty of tuning the multiple hyperparameters that control the sparsity of different PCs (the “multiple tuning problem”, MTP). Here we present a solution to the MTP using Empirical Bayes methods. We first introduce a general formulation for penalized PCA of a data matrix X, which includes some existing sparse PCA methods as special cases. We show that this formulation also leads to a penalized decomposition of the covariance (or Gram) matrix, X T X. We introduce empirical Bayes versions of these penalized problems, in which the penalties are determined by prior distributions that are estimated from the data by maximum likelihood rather than cross-validation. The resulting “Empirical Bayes Covariance Decomposition” provides a principled and efficient solution to the MTP in sparse PCA, and one that can be immediately extended to incorporate other structural assumptions (e.g. non-negative PCA). We illustrate the effectiveness of this approach on both simulated and real data examples. Key words: Covariance decomposition, Dimension Reduction, Empirical Bayes, Factor Analysis, Multiple Tuning Problem, Sparse Principal Component Analysis 1. Introduction Principal components analysis (PCA, Pearson, 1901) is a popular dimension reduction technique for revealing structure in data. However, when applied to large data sets, PCA results are often difficult to interpret. To address this, many authors have considered modifications of PCA that use sparsity, in some way, to help produce more interpretable results. Early versions of this idea arose in the literature on Factor analysis, where practitioners applied rotations to post-process results from PCA, or related techniques, to obtain sparse solutions; see Rohe and Zeng (2023) for interesting background and discussion. More recently, many authors have introduced “sparse PCA” (sPCA) methods that directly incorporate notions of sparsity into the inference problem (e.g. d’Aspremont et al., 2004; Zou et al., 2006; Witten et al., 2009; Journée et al., 2010; Ma, 2013). While many different sPCA methods exist, they can generally be categorized into two types: “singleunit” methods that sequentially estimate one PC at a time, and “block” methods that estimate multiple PCs © The Author 2023. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 1" 2312.03278v1,"A LMANAC : An API for Recommending Text Annotations For Time-Series Charts Using News Headlines Terrell Ibanez * Vidya Setlur † Maneesh Agrawala ‡ Stanford University Tableau Research Tableau Research Stanford University Figure 1: A time-series chart depicting the number of acres burned in various California Wildfires between 2013 and 2020. We used the A LMANAC API to identify the prominent visual features of this chart (i.e. the peaks) and then annotate them with headlines from the New York Times. The headlines correctly name the fire responsible for each labeled peak and link to the corresponding article, thereby providing explanatory context for the peak. In this case, we used the top-ranked headline identified by A LMANAC , but chart authors can manually choose lower-ranked headlines as well. The one peak left unlabeled did not return any suitable headline from the New York Times Archive because they did not cover the wildfire responsible for it. A BSTRACT Authors often add text annotations to charts to provide additional context for visually prominent features such as peaks, valleys, and trends. However, writing annotations that provide contextual information, such as descriptions of temporal events, often requires considerable manual effort. To address this problem, we introduce A LMANAC , a JavaScript API that recommends annotations sourced from the New York Times Archive of news headlines. A LMANAC consists of two independent parts: (1) a prominence feature detector and (2) a contextual annotation recommender. We demonstrate the utility of the API using D3.js and Vega-Lite to annotate a variety of time-series charts covering many different data domains. Preliminary user feedback shows that A LMANAC is useful to support the authoring of charts with more descriptive annotations. 1 I NTRODUCTION Text annotations play an important role in communicating insights about the data depicted in charts. Chart authors often include annotations to draw the readers’ attention to specific visual features (e.g., peaks, valleys, and trends) and to provide additional context [21, 24]. Such text is especially effective when it provides external information not directly present in the chart that explains the visually prominent features [15]. For example, Figure 1 shows a time series of acres burned in California wildfires from 2013 to 2020 [3], and the text annotations name the fire responsible for each peak while providing additional information about the damage they caused. Yet, authoring such contextual annotations for the visually prominent features in a chart requires considerable manual effort. Authors * e-mail: terrell.ibanez@stanford.edu † e-mail: vsetlur@tableau.com ‡ e-mail: maneesh@cs.stanford.edu have to identify the prominent features and examine a variety of external sources (e.g., news websites) to find relevant information. While researchers have developed prototype tools for automating chart annotation, the implementations have been fairly limited. For example, Contextifier [12] is limited to a set of 11 stocks and corresponding financial news articles for the years 2010-2012, limiting its applicability to more general data sets. In this work, we present A LMANAC , a JavaScript API for recommending contextual annotations from the New York Times (NYT) Archive [29], to any time-series data visualization that is designed to fit into the workflow of web-based chart design. A LMANAC provides two main components; (1) A prominence feature detector that identifies visually prominent peaks, valleys, and trends in an input time-series chart. While our built-in detector uses a topological persistence algorithm [10] to identify these features, the API is designed so that users can easily swap in other detectors or manually specify the prominent features to be annotated. (2) A contextual annotation recommender that takes as input a time-series chart and a visually prominent feature (specified as a point or time range) and suggests contextually relevant headlines. We demonstrate the utility of A L - MANAC by annotating a variety of time-series data sets in D3.js [4], Vega-Lite [25], Observable Notebooks [23] and Tableau [28]. 2 R ELATED W ORK Prior research has explored how authors add annotations to charts guiding a reader’s attention to visual features in the chart and explaining what the underlying data means with additional context [11, 26]. Kong and Agrawala developed techniques for analyzing charts to recover visually salient features of the data-encoding marks (e.g., min, max, mean values). Users could then interactively add graphical and text annotations or overlays to facilitate chart reading [19, 20]. Kandogan [14] introduced just-in-time descriptive analytics by employing statistics to generate annotations for clusters and outliers. Autotator is a semi-automatic chart annotation system that provides suggestions for three annotation tasks, i.e., (1) labeling a chart type, (2) annotating bounding boxes, and (3) associating a quantity [16]." 2312.03295v1,"SEMI-ANALYTIC PHYSICS INFORMED NEURAL NETWORK FOR CONVECTION-DOMINATED BOUNDARY LAYER PROBLEMS IN 2D ∗ GUNG-MIN GIE † , YOUNGJOON HONG ‡ , CHANG-YEOL JUNG § , AND DONGSEOK LEE ¶ Abstract. This research investigates the numerical approximation of the two-dimensional convection-dominated singularly perturbed problem on square, circular, and elliptic domains. Singularly perturbed boundary value problems present a significant challenge due to the presence of sharp boundary layers in their solutions. Additionally, the considered domain exhibits characteristic points, giving rise to a degenerate boundary layer problem. The stiffness of the problem is attributed to the sharp singular layers, which can result in substantial computational errors if not appropriately addressed. Traditional numerical methods typically require extensive mesh refinements near the boundary to achieve accurate solutions, which can be computationally expensive. To address the challenges posed by singularly perturbed problems, we employ physics-informed neural networks (PINNs). However, PINNs may struggle with rapidly varying singularly perturbed solutions over a small domain region, leading to inadequate resolution and potentially inaccurate or unstable results. To overcome this limitation, we introduce a semi-analytic method that augments PINNs with singular layers or corrector functions. Through our numerical experiments, we demonstrate significant improvements in both accuracy and stability, thus demonstrating the effectiveness of our proposed approach. Key words. boundary layer, physics-informed neural networks, singular perturbation, characteristic points MSC codes. 68T07, 76M45, 65L11 1. Introduction. The use of neural networks for approximating solutions to differential equations has gained significant attention in research [9, 15, 19, 5]. Various unsupervised neural network methods have been developed within this domain, including physics-informed neural networks (PINNs) [23], deep Ritz method (DRM) [29], and Galerkin Neural Network (GNN) [1]. These methods share a common characteristic of defining the loss function based on the residual of the differential equation being considered. PINNs, in particular, utilize collocation points in the space-time domain as inputs, making them well-suited for solving complex, time-dependent, multi-dimensional equations with intricate domain geometries [21, 25, 28, 24, 30, 18, 26]. They have become popular in scientific machine learning, facilitating the integration of physics-based and data-driven modeling in a deep learning framework. Nevertheless, the robustness of PINNs in certain problem types remains an ongoing concern. Notably, PINNs exhibit limitations in accurately capturing complex and highly nonlinear flow patterns such as turbulence, vortical structures, and boundary layers [7, 3, 8, 11]. Addressing this challenge holds great significance in scientific machine learning research, as the development of robust and reliable models is crucial for advancing the field. The robustness of PINNs is frequently tested when it comes to approximating boundary layers. Convergence issues for PINNs can arise in the context of singularly perturbed differential equations within bounded regions, mainly when the perturbation parameter is sufficiently small. These challenges also pose a hurdle for operator learning approaches like DeepONet and FNO [22, 20]. Overcoming these limitations is crucial for achieving more accurate and reliable predictions across a wide range of PINN applications. Various techniques have recently been proposed to address the approximation of singular problems. Fourier feature networks [27], cPINN [14], XPINN [6], and similar approaches have emerged to tackle the spectral bias of deep neural networks, which limits their capacity to learn high-frequency functions. However, none ∗ Submitted to the editors 07/31/2023. Funding: Gie was partially supported by Ascending Star Fellowship, Office of EVPRI, University of Louisville; Simons Foundation Collaboration Grant for Mathematicians; Research R-II Grant, Office of EVPRI, University of Louisville; Brain Pool Program through the National Research Foundation of Korea (NRF) (2020H1D3A2A01110658). Hong was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2021R1A2C1093579) and the Korea government(MSIT)(No. 2022R1A4A3033571). Jung was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2023R1A2C1003120). † Department of Mathematics, University of Louisville, Louisville, KY (gungmin.gie@louisville.edu). ‡ Department of Mathematical Sciences, KAIST, Korea (hongyj@kaist.ac.kr). § Department of Mathematical Sciences, Ulsan National Institute of Science and Technology, Ulsan, Korea (cjung@unist.ac.kr). ¶ Department of Mathematics, Sungkyunkwan University, Korea (lorakorea@g.skku.edu). 1" 2312.03297v1,"SoftMAC: Differentiable Soft Body Simulation with Forecast-based Contact Model and Two-way Coupling with Articulated Rigid Bodies and Clothes Min Liu 1 , Gang Yang 2 , Siyuan Luo 3 , Chen Yu 2 , and Lin Shao 2 Abstract— Differentiable physics simulation provides an avenue for tackling previously intractable challenges through gradient-based optimization, thereby greatly improving the efficiency of solving robotics-related problems. To apply differentiable simulation in diverse robotic manipulation scenarios, a key challenge is to integrate various materials in a unified framework. We present SoftMAC, a differentiable simulation framework coupling soft bodies with articulated rigid bodies and clothes. SoftMAC simulates soft bodies with the continuummechanics-based Material Point Method (MPM). We provide a forecast-based contact model for MPM, which greatly reduces artifacts like penetration and unnatural rebound. To couple MPM particles with deformable and non-volumetric clothes meshes, we also propose a penetration tracing algorithm that reconstructs the signed distance field in local area. Based on simulators for each modality and the contact model, we develop a differentiable coupling mechanism to simulate the interactions between soft bodies and the other two types of materials. Comprehensive experiments are conducted to validate the effectiveness and accuracy of the proposed differentiable pipeline in downstream robotic manipulation applications. Supplementary materials and videos are available on our project website at https://sites.google.com/view/softmac. I. INTRODUCTION Interactions between diverse materials are prevalent in the realm of robotic manipulation. For instance, the collision between glass and wine during a pouring task, or the perpetual interplay between a tortilla and its fillings when crafting a taco. As a number of differentiable physics engines emerge to tackle learning and control problems [1], [2], [3], [4], [5], [6], it is tempting to unify different materials in a single simulator, thus supporting a wide range of manipulation tasks. Nevertheless, developing a general physics simulation is nontrivial, as different types of materials often need different physical models due to the dominant physical behaviors [7]. Depending on their dynamical behaviors, most daily objects can be simulated as: 1) soft bodies, like elastic, plastic, elasto-plastic objects and liquid; 2) rigid bodies, either articulated or not; 3) clothes, as well as other objects with similar geometric and physical properties (e.g., tortilla). The interactions between these three modalities encompasses a wide spectrum of manipulation tasks. Rigid-clothes coupling has been extensively discussed in previous works [8], [9], [10]. Meanwhile, differentiable soft-cloth coupling remains 1 Min Liu is with the Machine Learning Department, Carnegie Mellon University, USA. minliu2@cs.cmu.edu 2 Gang Yang, Chen Yu and Lin Shao are with the Department of Computer Science, National University of Singapore, Singapore. yg.matinal@gmail.com, yuchen21@u.nus.edu and linshao@nus.edu.sg 3 Siyuan Luo is with miHoYo, China. siyuan.luo@mihoyo.com Fig. 1: To pour water into a glass in differentiable physics simulation, we need realistic contact model for soft-rigid coupling and correct gradient calculation. Then same applies to the interactions between soft bodies and clothes. a rarely explored topic in current literature, despite its prevalence in robotic manipulation scenarios such as making taco. A line of works propose methods for soft-rigid coupling. PlasticineLab [11] and FluidLab [4] deploys Material Point Method (MPM) to simulate plastic objects, but they are limited to one-way coupling, which suggests that force exerted on soft bodies cannot react on rigid bodies. Maniskill2 [12] introduces two-way dynamics coupling, but its pipeline is not differentiable. Besides, the contact models in these works suffer from artifacts like penetration and unnatural rebound. In this work, we present a differentiable pipeline to couple soft bodies with articulated rigid bodies and clothes. We adopt MPM for soft bodies due to its ability to simulate a large variety of deformable materials. Both rigid bodies and clothes are represented as meshes in coupling. To achieve realistic collision effects, we introduce a novel method called forecast-based contact model to manage boundary conditions for MPM. Unlike previous methods, our model takes a gridto-particle transfer to look ahead in grid operation stage. Specifically, the model computes particle velocities after transfer, imposes constraints on particles within the contact region, and then adjust grid velocity accordingly. Forecastbased contact model requires signed distance fields (SDFs) of" 2312.03298v1,"DiffPMAE: Diffusion Masked Autoencoders for Point Cloud Reconstruction Yanlong Li Chamara Madarasingha Kanchana Thilakarathna The University of Sydney University of New South Wales yali8838@uni.sydney.edu.au c.kattadige@unsw.edu.au Abstract kanchana.thilakarathna@sydney.edu.au Masked Autoencoding Visible patches Point cloud streaming is increasingly getting popular, evolving into the norm for interactive service delivery and the future Metaverse. However, the substantial volume of data associated with point clouds presents numerous challenges, particularly in terms of high bandwidth consumption and large storage capacity. Despite various solutions proposed thus far, with a focus on point cloud compression, upsampling, and completion, these reconstruction-related methods continue to fall short in delivering high fidelity point cloud output. As a solution, in DiffPMAE, we propose an effective point cloud reconstruction architecture. Inspired by self-supervised learning concepts, we combine Masked Auto-Encoding and Diffusion Model mechanism to remotely reconstruct point cloud data. By the nature of this reconstruction process, DiffPMAE can be extended to many related downstream tasks including point cloud compression, upsampling and completion. Leveraging ShapeNet-55 and ModelNet datasets with over 60000 objects, we validate the performance of DiffPMAE exceeding many state-of-the-art methods in-terms of auto-encoding and downstream tasks considered. Masked patches Encoder Original point cloud Diffusion process Latent code for visible Conditional input Predicted masked patches Figure 1. DiffPMAE inference process: MAE module first segments the point cloud to visible and masked regions and provides latent code for visible patches which is taken as a conditional input for the Diffusion process. DM reconstruct masked regions from noise which is combined with visible patches. There are many solutions proposed to date to address these issues such as point cloud compression algorithms including both statistical (e.g., octree, [16, 22, 28], kd-tree [1, 11, 26]) and deep learning [19, 21, 43, 47]) methods followed by upsampling [24, 25, 35, 53] to compress the data and reconstructing them before the user consumption. Though these methods can reduce the bandwidth and storage consumption, they still lack high fidelity reconstruction at high compression ratio. In the meantime, different point cloud completion solutions are proposed to reconstruct point cloud objects with limited available data [50, 55, 57]. However, they often fail to generate accurate output, if the missing regions of the point cloud are significant and highly random. Hence, there is a growing demand for efficient models for point cloud reconstruction, particularly when the available data for a given point cloud object is limited involving higher levels of compression or data losses. On the other hand, self-supervised learning (SSL) models have demonstrated outstanding performance in natural language processing through exceptional models such as GPT 1. Introduction Advancements in immersive multimedia technology, in particular the widespread availability of devices for generating and consuming 3D visual data, hold tremendous potential for realizing interactive applications and the future Metaverse. In light of that, point clouds have emerged as a prominent format for volumetric data facilitating 3D vision. As the use of point clouds continues to soar, various challenges have been already posed against providing high quality 3D content primarily due to its complexity which can grow to be millions of points bearing multiple attributes [10]. For example, efficient storage and transmission of point cloud has recently become a pressing concern [30, 36, 41] that are exacerbated by inevitable challenges such as data losses in network, limited storage and bandwidth with other competing applications, etc. 1" 2312.03304v1,"Recurrent Neural Network ODE Output for Classification Problems Follows the Replicator Dynamics Julian Barreiro-Gomez, Jorge I. Poveda Abstract— This letter establishes a novel relationship between a class of recurrent neural networks and certain evolutionary dynamics that emerge in the context of population games. Specifically, it is shown that the output of a recurrent neural network, in the context of classification problems, coincides with the evolution of the population state in a population game. This connection is established with dynamic payoffs and under replicator evolutionary dynamics. The connection provides insights into the neural network’s behavior from both dynamical systems and game-theoretical perspectives, aligning with recent literature that suggests that neural network outputs may resemble Nash equilibria of a suitable game. It also uncovers potential connections between the neural network classification problem and mechanism design. We present different numerical examples in the context of classification problems. Index Terms— Machine learning, game theory, recurrent neural networks, population games. I. I NTRODUCTION Recurrent neural networks (RNNs) belong to a class of neural networks (NNs) where the output of a previous step serves as an additional input in the recurrent step. As a result, RNNs are particularly suited for addressing problems with time dependencies. Moreover, they have been recently studied using tools from dynamical systems theory [1], such as neural ordinary differential equations (Neural ODEs) [2], leading to novel applications in control [3] and optimization [4]. More recently, connections with game theory [5], [6] have also been explored, triggering a new line of research that leverages the rich mathematical tools available in game theory for the study and understanding of RNNs [7]. When discussing the interplay between machine learning, control theory, and game theory, two primary approaches come to the forefront. On one hand, there is a research trend that focuses on leveraging machine learning techniques to tackle complex control and game-related challenges. We shall refer to this approach as NNs for game theory. On the other hand, other approaches focus on comprehending the functionality of machine learning techniques through the lens of game theory. This perspective is usually denoted as game theory for NNs. Regarding the former approach, numerous works have used machine learning techniques to learn and/or approximate solutions for both control and game theoretical problems [8], including optimal control [9], J. Barreiro-Gomez is with NYU AD Research Institute, New York University Abu Dhabi, PO Box 129188, UAE (e-mail: jbarreiro@nyu.edu ). J. I. Poveda is with the ECE Department, University of California, San Diego, CA USA. (e-mail: poveda@ucsd.edu ). J. Barreiro-Gomez was supported in part by the Center on Stability, Instability, and Turbulence, and Tamkeen under the NYU Abu Dhabi Research Institute grant CG002. J. I. Poveda was supported in part by NSF grant ECCS 2305756. mean-field games [10], and adversarial behavior in stochastic dynamical systems [11]. On the other hand, when studying game theory for NNs, several recent connections have been uncovered. For instance, in [12], [13] it was shown that the training of a class of deep NNs is related to the computation of the optimal flow in certain congestion games. Also, in [14] and [15], Generative Adversarial Networks (GAN) are studied as a min-max game, a connection that is also investigated in [16], using a two-agent sequential Stackelberg game approach. This paper narrows its focus to the second approach mentioned earlier, namely game theory for NNs. In particular, we establish a novel relationship between the output of certain RNNs and a class of evolutionary dynamics that emerge in population games [17]: the replicator dynamics. Such dynamics, well-known in the literature of biology and economics [18], have also been used for the synthesis and analysis of feedback controllers and optimization algorithms in different engineering applications [19]–[22]. Our main contributions are twofold: First, we establish a theoretical link between the output generated by RNN ODEs in classification problems and the solutions of the replicator dynamics. Specifically, we show that such output follows a replicator system with dynamic payoff functions characterized by the structure of the RNN ODE. We also show that the corresponding population game in the emerging evolutionary dynamics may incorporate either payoff dynamics or fixedmap payoff functions depending on the characteristic of the output layer in the RNN. This result also highlights potential connections with recent works on population games with dynamic payoffs, and it shows that the task performed by RNNs could similarly be accomplished via evolutionary dynamics and mechanism design. Moreover, it opens the door for the design and analysis of graph-dependent RNNs via tools from graphical population games [23]–[25]. Second, we present experimental validations of the theoretical results in different classification problems, highlighting the connections between the geometry of the replicator dynamics and the emerging properties of the RNN ODE. The rest of this letter is organized as follows. Section II presents the preliminaries, Section III presents the main result, Section IV presents numerical examples, and finally, Section V presents the conclusions. II. P RELIMINARIES A. Neural Networks Definition 1 (Set of Layers): Given d in , d out ∈ Z ≥1 , and σ : R → R, a set of layers from dimension d in to d out , with" 2312.03312v1,"OPTIMIZING TWO-PASS CROSS-LINGUAL TRANSFER LEARNING: PHONEME RECOGNITION AND PHONEME TO GRAPHEME TRANSLATION Wonjun Lee 1 , Gary Geunbae Lee 1,2 , Yunsu Kim 3 1 Department of Computer Science and Engineering, POSTECH, Republic of Korea 2 Graduate School of Artificial Intelligence, POSTECH, Republic of Korea 3 aiXplain Inc. Los Gatos, CA, USA {lee1jun, gblee}@postech.ac.kr, yunsu.kim@aixplain.com ABSTRACT This research optimizes two-pass cross-lingual transfer learning in low-resource languages by enhancing phoneme recognition and phoneme-to-grapheme translation models. Our approach optimizes these two stages to improve speech recognition across languages. We optimize phoneme vocabulary coverage by merging phonemes based on shared articulatory characteristics, thus improving recognition accuracy. Additionally, we introduce a global phoneme noise generator for realistic ASR noise during phoneme-to-grapheme training to reduce error propagation. Experiments on the Common- Voice 12.0 dataset show significant reductions in Word Error Rate (WER) for low-resource languages, highlighting the effectiveness of our approach. This research contributes to the advancements of two-pass ASR systems in low-resource languages, offering the potential for improved cross-lingual transfer learning. Index Terms— multilingual speech recognition, twopass speech recognition, cross-lingual, phoneme recognition 1. INTRODUCTION Automatic Speech Recognition (ASR) is essential in various applications, but the reliance on large labeled datasets poses challenges for low-resource languages. In these scenarios, end-to-end (E2E) systems may face limitations. We propose a phonetic-level approach that enhances phoneme recognition and phoneme-to-grapheme (P2G) translation models to address these challenges. Our two-pass ASR system first performs phoneme recognition and then translates the recognized phonemes into graphemes, allowing for improved performance in low-resource languages. When choosing modeling units for ASR, the decision often lies between grapheme [1, 2, 3] and phoneme sets [4, 5, 6]. Using grapheme units in multilingual ASR encounters challenges due to the lack of common graphemes across languages. In contrast, phoneme units facilitate the learning of shared phonetic representations, making cross-lingual transfer learning effective. The International Phonetic Alphabet 979-8-3503-0689-7/23/$31.00 ©2023 IEEE (IPA) [7] is well-suited for cross-lingual phoneme representation. Rather than relying on grapheme units, which may not leverage the advantages of cross-lingual transfer learning, we choose to utilize phoneme units as the final output of our ASR system. However, directly generating transcriptions using phoneme-based models presents challenges, requiring additional steps such as fine-tuning the output layers with grapheme units or employing additional neural network models to convert phoneme output into grapheme. To improve the accuracy of ASR, we incorporate a dedicated translation model that converts phoneme outputs into grapheme units. This approach offers several advantages, especially for low-resource languages with limited labeled speech data. By leveraging a substantial amount of text data, we can enhance the performance and applicability of our approach in such settings. However, this two-pass approach may still encounter potential challenges. The IPA used for cross-lingual phoneme representation may not efficiently capture the shared phonetic characteristics across languages. Moreover, phoneme recognition results can be inaccurate, leading to error propagation during the phoneme-to-grapheme (P2G) translation step. To address these challenges and optimize our two-pass ASR system, we focus on two key aspects: enhancing phoneme vocabulary coverage and mitigating error propagation. In this regard, we propose a novel approach called Pivot Phoneme Merging (PPM), which groups phonemes based on shared articulatory features. By facilitating improved vocabulary sharing across languages, our phoneme merging approach enhances the overall performance and effectiveness of the ASR system, particularly in scenarios where there are significant variations in phoneme vocabulary among different languages. In addition, we present a Global Phoneme Noise (GPN) generator. This noise generator enables the pseudo-labeling of external text corpora, incorporating realistic ASR noise into the training process for P2G translation. By leveraging this noise generator, we can effectively reduce error propa-" 2312.03318v1,"Complementary Benefits of Contrastive Learning and Self-Training Under Distribution Shift Saurabh Garg ˚ Carnegie Mellon University sgarg2@andrew.cmu.edu Amrith Setlur ˚ Carnegie Mellon University asetlur@andrew.cmu.edu Zachary C. Lipton Carnegie Mellon University zlipton@andrew.cmu.edu Sivaraman Balakrishnan Carnegie Mellon University sbalakri@andrew.cmu.edu Virginia Smith Carnegie Mellon University smithv@andrew.cmu.edu Aditi Raghunathan Carnegie Mellon University aditirag@andrew.cmu.edu Abstract Self-training and contrastive learning have emerged as leading techniques for incorporating unlabeled data, both under distribution shift (unsupervised domain adaptation) and when it is absent (semi-supervised learning). However, despite the popularity and compatibility of these techniques, their efficacy in combination remains unexplored. In this paper, we undertake a systematic empirical investigation of this combination, finding that (i) in domain adaptation settings, self-training and contrastive learning offer significant complementary gains; and (ii) in semi-supervised learning settings, surprisingly, the benefits are not synergistic. Across eight distribution shift datasets (e.g., BREEDs, WILDS), we demonstrate that the combined method obtains 3–8% higher accuracy than either approach independently. We then theoretically analyze these techniques in a simplified model of distribution shift, demonstrating scenarios under which the features produced by contrastive learning can yield a good initialization for self-training to further amplify gains and achieve optimal performance, even when either method alone would fail. 1 Introduction Even when faced with natural, non-adversarial distribution shifts, the performance of machine learning models may degrade [65, 83, 47, 29]. While we might hope to retrain such models on labeled samples from the new distribution, this option is often unavailable due to the expense or impracticality of collecting new labels. Consequently, researchers have investigated solutions to Unsupervised Domain Adaptation (UDA). Here, given labeled source data and unlabeled out-of-distribution (OOD) target data, the goal is to produce a classifier that performs well on the target. To address UDA in practice, two popular methods have emerged: self-training and contrastive pretraining. Self-training [75, 52, 79, 91, 87] and contrastive pretraining [13, 16, 94] were both proposed, initially, for traditional Semi-Supervised Learning (SSL) problems, where the labeled and unlabeled data are drawn from the same distribution. Here, the central challenge is statistical: to exploit the unlabeled data to learn a better predictor than one would get by training on the (small) labeled data alone. More recently, these methods have emerged as favored empirical approaches for UDA, demonstrating efficacy on many popular benchmarks [70, 30, 12, 76]. In self-training, one first learns a predictor using source labeled data. The predictor then produces pseudolabels for the unlabeled target data, and a new predictor is trained on the pseudolabeled data. Contrastive pretraining learns representations from unlabeled data by enforcing invariance to specified augmentations. These representations are ˚ Equal contribution. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.03367v1,"Lazy-k: Decoding for Constrained Information Extraction Arthur Hemmer ∗† , Mickaël Coustaty † , Nicola Bartolo ∗ , Jérôme Brachat, Jean-Marc Ogier † Shift Technology ∗ , Paris, France L3i † , La Rochelle, France {arthur.hemmer,nicola.bartolo}@shift-technology.com {arthur.hemmer,mcoustat,jmogier}@univ-lr.fr jerome.brachat@gmail.com Abstract We explore the possibility of improving probabilistic models in structured prediction. Specifically, we combine the models with constrained decoding approaches in the context of token classification for information extraction. The decoding methods search for constraintsatisfying label-assignments while maximizing the total probability. To do this, we evaluate several existing approaches, as well as propose a novel decoding method called Lazy-k. Our findings demonstrate that constrained decoding approaches can significantly improve the models’ performances, especially when using smaller models. The Lazy-k approach allows for more flexibility between decoding time and accuracy. The code for using Lazy-k decoding can be found here https://github.com/ ArthurDevNL/lazyk. 1 Introduction Much of today’s Information Extraction (IE) is done using probability-based token-classification models such as BERT (Devlin et al., 2018), RoBERTa (Liu et al., 2019), LayoutLM (Xu et al., 2020b,a; Huang et al., 2022) or LiLT (Wang et al., 2022). These models aim for the best results by increasingly stacking large amounts of parameters, which comes at the cost of increased computational requirements and training complexity. Typically, only the top-1 prediction is used, despite the fact that models produce probabilities for all tokenlabel combinations. Ideally, alternative, high-likelihood predictions are explored to improve predictions from existing models. This is especially interesting in structuredprediction tasks, where the model’s predictions are parsed into predefined structures. These structures Figure 1: Crop of a sample from the CORD dataset along with the highest probability predictions for the amounts. The model incorrectly predicts Total for the Cash amount. allow for defining constraints that evaluate whether a produced prediction adheres to the expected structure, which can then be used to iterate over multiple high probability predictions until a satisfying solution is found. A concrete example of such a structure is in the case of invoice information extraction. In this task, the model is given the outputs of an Optical Character Recognition (OCR) system and needs to predict which parts of the text correspond to the various elements in an invoice. For example, in Fig. 1, the model is expected to predict the total, cash and change amounts. However, the occlusion of the “CASH” text introduces noise into the model’s predictions, causing it to incorrectly label the cash amount as another total amount. Using the arithmetic semantics of invoices, we know that the total amount should equal the cash amount paid minus the change amount. As such, we know that the model’s best prediction is probably incorrect. Alternative, high-probability labelassignments can be explored to find a constraintsatisfying solution instead. Industrial document processing systems usually" 2312.03379v1,"A Text-to-Text Model for Multilingual Offensive Language Identification Tharindu Ranasinghe * Aston University Birmingham, UK t.ranasinghe@aston.ac.uk Abstract The ubiquity of offensive content on social media is a growing cause for concern among companies and government organizations. Recently, transformer-based models such as BERT, XL- NET, and XLM-R have achieved state-of-theart performance in detecting various forms of offensive content (e.g. hate speech, cyberbullying, and cyberaggression). However, the majority of these models are limited in their capabilities due to their encoder-only architecture, which restricts the number and types of labels in downstream tasks. Addressing these limitations, this study presents the first pretrained model with encoder-decoder architecture for offensive language identification with text-to-text transformers (T5) trained on two large offensive language identification datasets; SOLID and CCTK. We investigate the effectiveness of combining two datasets and selecting an optimal threshold in semi-supervised instances in SOLID in the T5 retraining step. Our pre-trained T5 model outperforms other transformer-based models fine-tuned for offensive language detection, such as fBERT and HateBERT, in multiple English benchmarks. Following a similar approach, we also train the first multilingual pre-trained model for offensive language identification using mT5 and evaluate its performance on a set of six different languages (German, Hindi, Korean, Marathi, Sinhala, and Spanish). The results demonstrate that this multilingual model achieves a new state-of-the-art on all the above datasets, showing its usefulness in multilingual scenarios. Our proposed T5-based models will be made freely available to the community. 1 Introduction The widespread of offensive posts on social media platforms can have detrimental effects on users’ mental health among other undesirable consequences. The relation between offensive language WARNING: This paper contains examples that are offensive in nature. Marcos Zampieri * George Mason University Fairfax, VA, USA mzampier@gmu.edu and mental health along with potential risks of self harm and depression has been widely addressed by previous studies (Bonanno and Hymel, 2013; Bannink et al., 2014; Bucur et al., 2021). To address this important issue, one of the most commonly employed strategies is to train systems to identify offensive content (Pavlopoulos et al., 2021a) mitigating its spread on social media platforms. By proactively identifying potentially harmful content, social media platforms aim to establish a safer and more inclusive environment for all users. Early approaches to identifying offensive language ranged from classical machine learning models, such as support vector machines (Malmasi and Zampieri, 2017, 2018), to deep learning models based on word embeddings (Hettiarachchi and Ranasinghe, 2019). With the introduction of BERT (Devlin et al., 2019), transformer models have shown excellent results in offensive language identification (Zia et al., 2022). More recently, domainspecific language models for offensive language identification, such as fBERT (Sarkar et al., 2021), HateBERT (Caselli et al., 2021), and ToxicBERT 1 . have provided state-of-the-art in multiple offensive language identification benchmarks. The aforementioned models can be grouped into two main categories following their training strategies. Models such as ToxicBERT have been trained using a classification objective by adding a classification layer on top of a BERT model and training on a large offensive language dataset. A clear limitation of this approach is that the trained model can only predict the classes that appear on the dataset. On the other hand, models such as fBERT (Sarkar et al., 2021) and HateBERT (Caselli et al., 2021) have been trained with a masked language modelling (MLM) objective. fBERT (Sarkar et al., 2021) has been trained on the offensive tweets in *The two authors contributed equally to this work. ToxicBERT is available at https://huggingface.co/ unitary/toxic-bert 1" 2312.03381v1,"manuscript submitted to JGR: Space Physics Geocoronal Solar Wind Charge Exchange Process Associated with the 2006-December-13 Coronal Mass Ejection Event Yu Zhou 1,3∗ , Noriko Y. Yamasaki 1,3 , Shin Toriumi 1 , and Kazuhisa Mitsuda 2,3 1 Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, 3-1-1 Yoshinodai, Sagamihara, Kanagawa 252-5210 2 National Astronomical Observatory of Japan, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 3 International Center for Quantum-field Measurement Systems for Studies of the Universe and Particles (WPI,QUP), High Energy Accelerator Research Organization, 1-1 Oho, Tsukuba, Ibaraki 300-3256 Key Points: We discover a solar wind charge exchange event with Suzaku X-ray satellite driven by the 2006-December-13th coronal mass ejection. • The SWCX occurence time coincides with the CME magnetic cloud arrival. It is a useful knowledge in space weather forecasting. • We modeled the light curve variation of the SWCX. The result indicates that the solar-wind flow is anisotropic in the cusp. • ∗ Current address: International Center for Quantum-field Measurement Systems for Studies of the Uni- verse and Particles, High Energy Accelerator Research Organization, 1-1 Oho, Tsukuba, Ibaraki 300-3256 Corresponding author: Yu Zhou, zhouyu@post.kek.jp –1–" 2312.03393v1,"PS 3 : Precise Patch Presence Test based on Semantic Symbolic Signature Xing Hu ∗ Qi Zhan Zhejiang University Hangzhou, China qizhan@zju.edu.cn Xin Xia Software Engineering Application Technology Lab, Huawei China xin.xia@acm.org Zhejiang University Ningbo, China xinghu@zju.edu.cn David Lo Singapore Management University Singapore davidlo@smu.edu.sg ABSTRACT During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security patch in every affected binary is crucial to ensure system security. Identifying whether a binary has been patched for a known vulnerability is challenging, as there may only be small differences between patched and vulnerable versions. Existing approaches mainly focus on detecting patches that are compiled in the same compiler options. However, it is common for developers to compile programs with very different compiler options in different situations, which causes inaccuracy for existing methods. In this paper, we propose a new approach named PS 3 , referring to precise patch presence test based on semantic-level symbolic signature. PS 3 exploits symbolic emulation to extract signatures that are stable under different compiler options. Then PS 3 can precisely test the presence of the patch by comparing the signatures between the reference and the target at semantic level. To evaluate the effectiveness of our approach, we constructed a dataset consisting of 3,631 (CVE, binary) pairs of 62 recent CVEs in four C/C++ projects. The experimental results show that PS 3 achieves scores of 0.82, 0.97, and 0.89 in terms of precision, recall, and F1 score, respectively. PS 3 outperforms the state-of-the-art baselines by improving 33% in terms of F1 score and remains stable in different compiler options. KEYWORDS Patch presence test, Binary analysis, Software security ∗ Corresponding Author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Zhiyang Li Zhejiang University Hangzhou, China misakalzy@zju.edu.cn Shanping Li Zhejiang University Hangzhou, China shan@zju.edu.cn ACM Reference Format: Qi Zhan, Xing Hu, Zhiyang Li, Xin Xia, David Lo, and Shanping Li. 2023. PS 3 : Precise Patch Presence Test based on Semantic Symbolic Signature. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn. nnnnnnn 1 INTRODUCTION Software vulnerabilities are security issues that can cause software systems to be attacked or abused by malicious users. Vulnerabilities may allow hackers or malware to invade the system and steal sensitive information, or allow attackers to remotely control the system and perform malicious operations [26]. The number of newly discovered vulnerabilities has increased rapidly in recent years, according to CVE data [14]. Applying patches is one of the most effective ways to combat vulnerabilities and improve system security [1]. Software developers continuously release patches to fix known vulnerabilities. In a large-scale software system, there may be thousands of binary files, which may be different versions and developed by various vendors or developers. Therefore, it is essential to ensure that these binary files have been patched for the corresponding vulnerabilities. The process to ensure this is referred to “patch presence test”. The concept of the patch presence test was first introduced by Zhang et al. [37] in 2018 to distinguish it from conventional vulnerability searching for binaries or binary function matching. We can formalize the concept of patch presence test by describing its input and output. The input consists of three parts: (1) information about a particular patch, usually a patch file that describes the code modification. (2) The source code or the reference binaries of the project. The reference binaries typically include a binary compiled from a vulnerable version of the project and another binary compiled from the patched version. (3) The target binary to be tested. The output of the patch presence test is a binary decision on whether the specific patch is present in the target binary or not. Determining whether a given binary file has been patched for a corresponding vulnerability is challenging. The semantic gap between the source code and the binary makes it difficult to directly correlate modifications in the source code with changes in the assembly code [37]. Additionally, patches are usually small and subtle. Li et al. [25] show that up to 50% of security patches only modify" 2312.03413v1,"A PPROXIMATING S OLUTIONS TO THE K NAPSACK P ROBLEM USING THE L AGRANGIAN D UAL F RAMEWORK T HE V ERSION OF R ECORD OF THIS CONTRIBUTION IS PUBLISHED IN L ECTURE N OTES IN C OMPUTER S CIENCE V OLUME 14471, AND IS AVAILABLE ONLINE AT HTTPS :// DOI . ORG /10.1007/978-981-99-8388-9_37 Mitchell Keegan University of Queensland m.keegan@uqconnect.edu.au Mahdi Abolghasemi University of Queensland m.abolghasemi@uq.edu.au A BSTRACT The Knapsack Problem is a classic problem in combinatorial optimisation. Solving these problems may be computationally expensive. Recent years have seen a growing interest in the use of deep learning methods to approximate the solutions to such problems. A core problem is how to enforce or encourage constraint satisfaction in predicted solutions. A promising approach for predicting solutions to constrained optimisation problems is the Lagrangian Dual Framework which builds on the method of Lagrangian Relaxation. In this paper we develop neural network models to approximate Knapsack Problem solutions using the Lagrangian Dual Framework while improving constraint satisfaction. We explore the problems of output interpretation and model selection within this context. Experimental results show strong constraint satisfaction with a minor reduction of optimality as compared to a baseline neural network which does not explicitly model the constraints. 1 Introduction The Knapsack Problem (KP) is a classic problem in combinatorial optimisation (CO). The core statement is as follows; there are n items, each with weight w i and value v i . The goal is to select a set of items which maximise the total value, such that the total weights of the chosen items is not greater than some capacity W . It is formally defined as an integer programming (IP) problem as shown below: x ∗ = argmax x s.t. n X i=1 n X x i v i x i w i ≤ W (1) i=1 x i ∈ {0, 1}, i = 1, ..., n where x i = 1 if the i th item is chosen or x i = 0 if not. KP and its variants find applications when limited resources must be allocated efficiently. Examples include cutting stock problems, investment allocation, and transport and logistics. There exists effective exact and approximate algorithms to solve KP including dynamic programming, branch and bound, and a variety of metaheuristic algorithms. A detailed treatment of these algorithms for KP and its many variants can be found in [1]. A common drawback of these methods for KP and other CO problems is that the solving time may be too slow in applications where solutions are required under strict time constraints. A promising remedy is to use fast inference machine learning models to approximate solutions [2, 3, 4]. The idea of applying machine learning to CO is not a new one, although recent years have seen a resurgence in interest with the rise of deep learning. An early example in 1985 was the use of Hopfield Networks to approximate the objective of the Travelling Salesman Problem [5]. The last decade has seen explosive advances in machine learning, with progress in deep learning providing practical solutions to problems in the field of computer vision and natural language" 2312.03423v1,"1 Markov Chain Monte Carlo Data Association for Sets of Trajectories Yuxuan Xia, Ángel F. Garcı́a-Fernández, and Lennart Svensson Abstract—This paper considers a batch solution to the multiobject tracking problem based on sets of trajectories. Specifically, we present two offline implementations of the trajectory Poisson multi-Bernoulli mixture (TPMBM) filter for batch data based on Markov chain Monte Carlo (MCMC) sampling of the data association hypotheses. In contrast to online TPMBM implementations, the proposed offline implementations solve a large-scale, multiscan data association problem across the entire time interval of interest, and therefore they can fully exploit all the measurement information available. Furthermore, by leveraging the efficient hypothesis structure of TPMBM filters, the proposed implementations compare favorably with other MCMC-based multi-object tracking algorithms. Simulation results show that the TPMBM implementation using the Metropolis-Hastings algorithm presents state-of-the-art multiple trajectory estimation performance. Index Terms—Multi-object tracking, smoothing, sets of trajectories, Markov chain Monte Carlo, Gibbs sampling, Metropolis- Hastings sampling. I. I NTRODUCTION Multi-object tracking (MOT) refers to the joint estimation of the number of objects and the object trajectories from noisy sensor measurements [1]–[3]. Previous works on MOT with trajectory estimation include vector-type methods and set-type methods using labels. The former describes the multi-object states by vectors and constructs trajectories by linking a state estimate with a previous one, while the latter forms trajectories by linking state estimates with the same label. Most of these works focus on the task of estimating the current object states based on all previous measurements, and the main challenge is to handle the data association problem, i.e. to determine the associations between measurements and objects. In this paper, our focus is on a batch formulation of MOT by exploiting all the measurement information in the time interval of interest. The fact that offline algorithms generally do not have to be as computationally efficient as online algorithms enables us to revisit and update data associations at previous time steps in light of new observations and thereby improve the estimation of past object states. These offline algorithms are important for trajectory analytics, with various applications Yuxuan Xia is with the Department of Electrical Engineering, Linköping University, 58183 Linköping, Sweden (e-mail: yuxuan.xia@liu.se). The work was done when Yuxuan Xia was with the Department of Electrical Engineering, Chalmers University of Technology. Lennart Svensson is with the Department of Electrical Engineering, Chalmers University of Technology, 41296 Gothenburg, Sweden (e-mail: lennart.svensson@chalmers.se). Ángel F. Garcı́a-Fernández is with the Department of Electrical Engineering and Electronics, University of Liverpool, L69 3BX Liverpool, U.K., and also with the ARIES research centre, Universidad Antonio de Nebrija, Madrid, Spain (e-mail: angel.garcia-fernandez@liverpool.ac.uk). in, e.g. cell tracking, sports athletes tracking, and training data collection for learning-based MOT algorithms. The main challenge in batch MOT implementations is to handle the data associations across the entire time interval of interest, where each such global data association can be interpreted as a parition of the sequence of sets of measurements into false alarms and clusters of measurements from different time steps originating from the same object. Finding the most likely global data association is a large-scale multidimensional assignment problem. Conventional solutions to this multi-scan data association problem mainly reply on binary programming solvers based on Lagrangian relaxation [4], [5]. However, these methods can generally only handle data associations up to a few time steps, and thus they typically consider sliding window implementations. A. Batch MOT with MCMC Sampling In this paper, we address this large scale multi-scan data association problem using Markov chain Monte Carlo (MCMC) sampling. Several MCMC methods have been developed for MOT with image sequences where the proposal distributions for drawing samples of data associations are tailored to image detections [6]–[9]. Different from these works, we focus on MOT with the standard multi-object models for point objects [10]. This means that each global data association represents a measurement partition where each cluster of measurements originating from the same object is a collection of at most one measurement at different time steps. An early work using MCMC sampling to solve the multiscan data association problem for point objects is [11], where the Metropolis-Hastings (MH) algorithm is used to iteratively sample data associations from well-designed proposal distributions, incorporated with certain domain-specific knowledge. The MCMC sampling method in [11] has later been combined with a particle Gibbs algorithm in [12] for model parameter estimation. The problem of MOT with modelling uncertainties was also addressed in [13] using MH sampling and the possibility theory [14]. The MCMC sampling method in [11] has also been extended in [15] to consider a particle filter-based implementation with more sophisticated proposal distributions. Recently, another MOT batch solution has been presented in [16], where the multi-scan data association problem is solved using Gibbs sampling [16]. In the above works, conditioned on a global data association hypothesis, objects have deterministic existences in the multiobject density representation. Therefore, object birth and death events need to be sampled to determine trajectory start and end" 2312.03426v1,"INTERNAL AND EXTERNAL CALCULI: ORDERING THE JUNGLE WITHOUT BEING LOST IN TRANSLATIONS TIM S. LYON a , AGATA CIABATTONI b , DIDIER GALMICHE c , DOMINIQUE LARCHEY-WENDLING c , DANIEL MÉRY c , NICOLA OLIVETTI d , AND REVANTHA RAMANAYAKE e a Technische Universität Dresden, Germany e-mail address: timothy stephen.lyon@tu-dresden.de b Vienna University of Technology, Austria e-mail address: agata@logic.at c Université de Lorraine, CNRS, LORIA, France e-mail address: Didier.Galmiche@loria.fr, dominique.larchey-wendling@loria.fr, Daniel.Mery@loria.fr d Aix-Marseille University, France e-mail address: nicola.olivetti@univ-amu.fr e University of Groningen, The Netherlands e-mail address: d.r.s.ramanayake@rug.nl Abstract. This paper gives a broad account of the various sequent-based proof formalisms in the proof-theoretic literature. We consider formalisms for various modal and tense logics, intuitionistic logic, conditional logics, and bunched logics. After providing an overview of the logics and proof formalisms under consideration, we show how these sequent-based formalisms can be placed in a hierarchy in terms of the underlying data structure of the sequents. We then discuss how this hierarchy can be traversed using translations. Translating proofs up this hierarchy is found to be relatively easy while translating proofs down the hierarchy is substantially more difficult. Finally, we inspect the prevalent distinction in structural proof theory between ‘internal calculi’ and ‘external calculi’. It is observed that these classes resist a rigorous separation, and we critically assess the properties that (calculi from) these classes are purported to possess. Introduction The widespread application of logical methods in computer science, epistemology, and artificial intelligence has resulted in an explosion of new logics. These logics are more expressive than classical logic, allowing finer distinctions and a direct representation of notions that cannot be well stated in classical logic. For instance, they are used to express different modes of truth (e.g. modal logics [BdRV01]) and to study different types of reasoning, e.g. hypothetical/plausible reasoning (e.g. conditional logics [Lew73]) or reasoning about the Key words and phrases: Bunched implication, Conditional logic, Display, External calculus, Hypersequent, Internal calculus, Intuitionistic logic, Labeled, Modal logic, Nested, Proof theory, Sequent, Tense logic. Preprint submitted to Logical Methods in Computer Science © T.S. Lyon et al. CC ⃝ Creative Commons" 2312.03428v1,"Crafting Realistic Virtual Humans: Unveiling Perspectives on Human Perception, Crowds, and Embodied Conversational Agents Rubens Montanha, Victor Araujo, Paulo Knob, Greice Pinho, Gabriel Fonseca, Vitor Peres, Soraia Raupp Musse Graduate Program in Computer Science Pontifical Catholic University of Rio Grande do Sul Porto Alegre, RS, Brazil Contact author: soraia.musse@pucrs.br Abstract—Virtual Humans (VHs) were first developed more than 50 years ago and have undergone significant advancements since then. In the past, creating and animating VHs was a complex task. However, contemporary commercial and freely available technology now empowers users, programmers, and designers to create and animate VHs with relative ease. These technologies have even reached a point where they can replicate the authentic characteristics and behaviors of real actors, resulting in VHs that are visually convincing and behaviorally lifelike. This paper explores three closely related research areas in the context of virtual humans and discusses the far-reaching implications of highly realistic characters within these domains. Index Terms—Virtual humans, Human perception, crowd simulation, embodied conversational agents. I. I NTRODUCTION During the last few years, Computer Graphics (CG) have advanced in different perspectives of modeling and animation of Virtual Humans (VHs). 1 From body scanning and use of body silhouettes [1], [2] to the use of highest fidelity realistic character using MetaHumans 2 [3], it is possible to create more realistic virtual humans using the new technologies. Having more realistic characters, we can produce complicated crowd scenarios [4], more realistic conversational agents with body animation and facial expressions [5]–[7] and investigate aspects regarding the human perception about virtual humans [8]. The presence of realistic virtual humans (VHs) can significantly enhance the anthropomorphic experience of users [9], influencing their emotional responses and improving the user experience. Users naturally seek a human-like representation in VHs, encompassing various traits [10], [11] such as movement, emotions, and gender, which helps foster a stronger sense of connection and comfort [8], [12] with these virtual beings. The more realistic and lifelike virtual humans (VHs) and their behaviors become, the more plausible and coherent the applications involving them become. One example is the crowd simulation area. From the pioneer works [13], [14] to 1 Draft version made for arXiv: https://arxiv.org/ 2 https://metahuman.unrealengine.com/ the most recent ones [15], [16], many techniques have allowed creating and simulating human crowds with emotion [17], crowds affected by fluid forces [18], abstractions of individual agents in a crowd to multi-level simulation [19], [20], a crowd estimated using machine learning methods [21], among others. Additionally, in this paper, we delve into the topic of Embodied Conversational Agents (ECA) and their application as realistic virtual humans. A considerable amount of research in this area is focused on health [22], [23] and skill training [24], [25]. Typically, an ECA is developed with a specific purpose in mind, such as conducting clinical interviews or facilitating skill training sessions. When considering the appearance and behavior of virtual humans (VH), verbal and non-verbal aspects are crucial. These aspects encompass eye movements [26], empathetic behavior [27], personality [28], memory [29], among others. Given that ECAs are designed to be user-friendly interfaces that incorporate empathy and foster excellent user interaction, pursuing more realistic VHs significantly impacts this field. This paper is organized as follows. In Section II, we discuss various aspects of visual perception, addressing topics like the Uncanny Valley and biases in virtual human perception. Section III focuses on the application areas of crowd simulation and embodied conversational agents. Both Sections II and III thoroughly explore the fundamentals and relevant literature in their respective domains. Finally, in Section IV, we present our concluding remarks, which encompass new emerging trends and potential future directions for further research and development. II. V ISUAL P ERCEPTION OF V IRTUAL H UMANS Perception, stemming from the Latin word meaning ”to apprehend” or ”to understand,” refers to the brain’s process of interpreting sensory information and giving it meaning and context [30]. In the context of CG, perception plays a crucial role in how virtual environments and characters are created and perceived by users. CG techniques often rely on understanding how the human visual system interprets visual stimuli to achieve more realistic and convincing results [31]." 2312.03437v1,"Data-Centric Digital Agriculture: A Perspective Ribana Roscher 1,2* , Lukas Roth 3 , Cyrill Stachniss 4 , Achim Walter 3 1* Data Science for Crop Systems, Forschungszentrum Jülich GmbH, Wilhelm-Johnen-Straße, Jülich, 52428, Germany. 2 Remote Sensing Group, University of Bonn, Niebuhrstr. 1a, Bonn, 53113, Germany. 3 Institute of Agricultural Sciences, ETH Zurich, Universitätstrasse 2, Zürich, 8092, Switzerland. 4 Photogrammetry & Robotics Lab, University of Bonn, Nussallee 15, Bonn, 53115, NRW, Germany. *Corresponding author(s). E-mail(s): r.roscher@fz-juelich.de; Contributing authors: lukas.roth@usys.ethz.ch ; cyrill.stachniss@igg.uni-bonn.de; achim.walter@usys.ethz.ch; Abstract In response to the increasing global demand for food, feed, fiber, and fuel, digital agriculture is rapidly evolving to meet these demands while reducing environmental impact. This evolution involves incorporating data science, machine learning, sensor technologies, robotics, and new management strategies to establish a more sustainable agricultural framework. So far, machine learning research in digital agriculture has predominantly focused on model-centric approaches, focusing on model design and evaluation. These efforts aim to optimize model accuracy and efficiency, often treating data as a static benchmark. Despite the availability of agricultural data and methodological advancements, a saturation point has been reached, with many established machine learning methods achieving comparable levels of accuracy and facing similar limitations. To fully realize the potential of digital agriculture, it is crucial to have a comprehensive understanding of the role of data in the field and to adopt data-centric machine learning. This involves developing strategies to acquire and curate valuable data and implementing effective learning and evaluation strategies that utilize the intrinsic value of data. This approach has the potential to create accurate, generalizable, and adaptable machine learning methods that effectively and sustainably address agricultural tasks such as yield prediction, weed detection, and early disease identification. Keywords: Digital agriculture, data-centric learning, data utilization 1" 2312.03443v1,"Data-driven Crop Growth Simulation on Time-varying Generated Images using Multi-conditional Generative Adversarial Networks Preprint, compiled December 7, 2023 ∗ Lukas Drees ID 1 , Dereje T. Demie ID 2 , Madhuri R. Paul ID 3 , Johannes Leonhardt ID 1 , Sabine J. Seidel ID 2 , Thomas F. Döring ID 3 , and Ribana Roscher ID 4,1 1 Remote Sensing Group, Institute of Geodesy and Geoinformation, University of Bonn, Germany Crop Science Group, Institute of Crop Science and Resource Conservation, University of Bonn, Germany 3 Agroecology and Organic Farming Group, Institute of Crop Science and Resource Conservation, University of Bonn, Germany 4 Data Science For Crop Systems, Forschungszentrum Jülich GmbH, Germany 2 Abstract Background: Image-based crop growth modeling can substantially contribute to precision agriculture by revealing spatial crop development over time, which allows an early and location-specific estimation of relevant future plant traits, such as leaf area or biomass. A prerequisite for realistic and sharp crop image generation is the integration of multiple growth-influencing conditions in a model, such as an image of an initial growth stage, the associated growth time, and further information about the field treatment. While image-based models provide more flexibility for crop growth modeling than process-based models, there is still a significant research gap in the comprehensive integration of various growth-influencing conditions. Further exploration and investigation are needed to address this gap. Methods: We present a two-stage framework consisting first of an image prediction model and second of a growth estimation model, which both are independently trained. The image prediction model is a conditional Wasserstein generative adversarial network (CWGAN). In the generator of this model, conditional batch normalization (CBN) is used to integrate different conditions along with the input image. This allows the model to generate time-varying artificial images dependent on multiple influencing factors of different kinds. These images are used by the second part of the framework for plant phenotyping by deriving plant-specific traits and comparing them with those of non-artificial (real) reference images. In addition, image quality is evaluated using multi-scale structural similarity (MS-SSIM), learned perceptual image patch similarity (LPIPS), and Fréchet inception distance (FID). During inference, the framework allows image prediction for any combination of conditions used in training; we call this prediction data-driven crop growth simulation. Results: Experiments are performed on three datasets of different complexity. These datasets include the laboratory plant Arabidopsis thaliana (Arabidopsis) and crops grown under real field conditions, namely cauliflower (GrowliFlower) and crop mixtures consisting of faba bean and spring wheat (MixedCrop). In all cases, the framework allows realistic, sharp image predictions with a slight loss of quality from short-term to long-term predictions. For MixedCrop grown under varying treatments (different cultivars, sowing densities), the results show that adding these conditions increases the prediction quality as measured by the estimated biomass. Simulations of varying growth-influencing conditions performed with the trained framework provide valuable insights into how such factors relate to crop appearances, which is particularly useful in complex, less explored crop mixture systems. Further results show that adding process-based simulated biomass as a condition increases the accuracy of the derived phenotypic traits from the predicted images. This demonstrates the potential of our framework to serve as an interface between an image- and process-based crop growth model. Conclusion: The image-based prediction of future plant appearances is adequately feasible by multi-conditional CWGAN. The presented framework complements process-based models and overcomes limitations, such as the reliance on assumptions and the low exact field-localization specificity, by realistic visualizations of the spatial crop development that directly lead to a high explainability of the model prediction. Keywords machine learning, image generation, conditional GAN, growth modeling, crop mixtures 1 Background Growing agricultural crops sustainably , i.e., producing sufficient output with high resource use efficiency and minimal negative impacts on ecosystems, requires complex optimization of crop management [1]. Decisions on the operations during the season include the timing and amounts of fertilization, irrigation, protection against pests and pathogens, weeding, the application 1∗ correspondence: ldrees@uni-bonn.de of growth regulations, and other activities. The optimality of most of these operations and their combinations depend on the phenology of crops, i.e., the growth stages and size of the plants. Complex and multiple interactions typically occur between different management factors, crop genotypes, and variable environmental factors, affecting crop performance differently at different growth stages. Because of this complexity, identifying optimized crop management is not trivial, and various ways have been developed to tackle this problem and to understand crop" 2312.03447v1,"Article Quantum-Inspired Neural Network Model of Optical Illusions Ivan S. Maksymov Artificial Intelligence and Cyber Futures Institute, Charles Sturt University, Bathurst, NSW 2795, Australia; imaksymov@csu.edu.au Abstract: Ambiguous optical illusions have been a paradigmatic object of fascination, research and inspiration in arts, psychology and video games. However, accurate computational models of perception of ambiguous figures have been elusive. In this paper, we design and train a deep neural network model to simulate the human’s perception of the Necker cube, an ambiguous drawing with several alternating possible interpretations. Defining the weights of the neural network connection using a quantum generator of truly random numbers, in agreement with the emerging concepts of quantum artificial intelligence and quantum cognition we reveal that the actual perceptual state of the Necker cube is a qubit-like superposition of the two fundamental perceptual states predicted by classical theories. Our results will find applications in video games and virtual reality systems employed for training of astronauts and operators of unmanned aerial vehicles. They will also be useful for researchers working in the fields of machine learning and vision, psychology of perception and quantum-mechanical models of human mind and decision-making. Keywords: artificial intelligence; deep neural network; machine learning; machine vision; Necker cube; optical illusion; quantum oscillator; quantum mind hypothesis; quantum random generator. 1. Introduction Citation: Maksymov, I.S. Quantum-Inspired Neural Network Model of Optical Illusions. Preprints XXXX, 1, 0. https://doi.org/ (https:// xxx/). xxx Optical illusions have fascinated humans since the ancient times [1–3] and served as both object of inspiration in arts [4,5] and paradigmatic topic of research in the fields of psychology and behavioural science [6–13]. Nowadays, when artificial intelligence (AI) is all around, a question arises whether a computer or robotic system can recognise optical illusions similarly to a human. Apart from a blue-skies research goal of creating a humanoid robot that both aesthetically resembles a human and can perceive the world as a human, a practicable model of human perception of optical illusions could revolutionise the way video games and spatial computing systems are designed [14], psychiatric illnesses are studied [15] and the effect of gravitation on cognition is investigated [16,17]. Moreover, establishing the psychological and physiological origin of perception of ambiguous figures promises to unlock the secrets of human decision-making [9], also revealing a longhypothesised but yet elusive link between human mental states and quantum mechanics [8,9,18–23]. Consider the Necker cube [2] shown in Figure 1a. A simple self-examination aimed to answer the question ‘Is the shaded face of the cube at the front or at the rear?’ will result in a series of possible interpretations that randomly switch between ‘front’ and ’rear’. When the sequence of the observed front-rear states, which in the following we denote as | 0 ⟩ and | 1 ⟩ , is recorded as a function of time as schematically shown in Figure 1b, one obtains a signal consisting of rectangular pulses of random duration. The temporal dynamics of the pulses will vary from one self-examination to another since the perception of optical illusions depends on the observer’s age and gender [24]. However, the general trend illustrated in Figure 1b will be similar for all observers. On the other hand, electroencephalograms recorded consistently with subjective inputs given by observers of the Necker cube and other ambiguous figures [25–27] suggest that the perception does not undergo an abrupt switching as sketched in Figure 1c but exhibits a rather continuous oscillation-like behaviour between the | 0 ⟩ and | 1 ⟩ states. Data speaking in favour of such a behaviour were also obtained in eye-tracking experiments, where both blink and movement of eye were associated with a perceptual reversal [6,28,29]." 2312.03459v1,"F 3 -Pruning: A Training-Free and Generalized Pruning Strategy towards Faster and Finer Text-to-Video Synthesis Sitong Su * , Jianzhi Liu * , Lianli Gao, Jingkuan Song University of Electronic Science and Technology of China (UESTC) sitongsu9796@gmail.com CogVideo (A lion is drinking water) CogVideo +F 3 Pruning (ours) Tune-A-Video (A cat is eating watermelon on the table) Tune-A-Video +F 3 Pruning (ours) Figure 1: Demonstration of some visual results comparison in Text-to-Video (T2V) synthesis. Our F 3 -Pruning is applied to the classic transformer-based method CogVideo and the typical diffusion-based method Tune-A-Video. Without any extra training, F 3 -Pruning not only boosts inference efficiency of T2V but also enhances video quality. On the public video dataset UCF-101, applying F 3 -Pruning to CogVideo makes it 1.35x faster and promotes video quality metrics FVD by 22%. Abstract Recently Text-to-Video (T2V) synthesis has undergone a breakthrough by training transformers or diffusion models on large-scale datasets. Nevertheless, inferring such large models incurs huge costs. Previous inference acceleration works either require costly retraining or are model-specific. To address this issue, instead of retraining we explore the inference process of two mainstream T2V models using transformers and diffusion models. The exploration reveals the redundancy in temporal attention modules of both models, which are commonly utilized to establish temporal relations among frames. Consequently, we propose a training-free and generalized pruning strategy called F 3 -Pruning to prune redundant temporal attention weights. Specifically, when aggregate temporal attention values are ranked below a certain ratio, corresponding weights will be pruned.1 Extensive experiments on three datasets using a classic transformer-based model CogVideo and a typical diffusion-based model Tune- A-Video verify the effectiveness of F 3 -Pruning in inference acceleration, quality assurance and broad applicability. 1 Introductions Text-to-Video (T2V) synthesis aims to generate high-quality and temporally coherent videos semantically aligned with text inputs. In the early stage of T2V, traditional generative models like GAN (Goodfellow et al. 2014) are trained on datasets of limited scale. Hence, the synthesized videos are restricted by limited semantics and low quality (Li et al. 2018; Pan et al. 2017). To tackle this challenge, recent T2V models utilize large and powerful generative models transformer or diffusion models to train on large-scale datasets (Ho et al. 2022b; Wu et al. 2022a). Alternately, other recent T2V models (Hong et al. 2023; Ho et al. 2022a; Wu et al. 2022b) build upon large-scale T2I models (Ding" 2312.03467v1,"Astronomy & Astrophysics manuscript no. ATOMIUM_lineIDs December 7, 2023 ©ESO 2023 ATOMIUM: Molecular inventory of 17 oxygen-rich evolved stars observed with ALMA ⋆ S. H. J. Wallström 1⋆⋆ , T. Danilovich 1, 2, 3 , H. S. P. Müller 4 , C. A. Gottlieb 5 , S. Maes 1 , M. Van de Sande 6 , L. Decin 1, 7 , A. M. S. Richards 8 , A. Baudry 9 , J. Bolte 10 , T. Ceulemans 1 , F. De Ceuster 1 , A. de Koter 11, 1 , I. El Mellah 12, 13 , M. Esseldeurs 1 , S. Etoka 8 , D. Gobrecht 14 , E. Gottlieb 15 , M. Gray 8, 16 , F. Herpin 9 , M. Jeste 17 , D. Kee 18 , P. Kervella 19 , T. Khouri 20 , E. Lagadec 21 , J. Malfait 1 , L. Marinho 9 , I. McDonald 8, 22 , K. M. Menten 18 , T. J. Millar 23 , M. Montargès 20 , J. A. Nuth 24 , J. M. C. Plane 7 , R. Sahai 25 , L. B. F. M. Waters 26, 27 , K. T. Wong 28, 29 , J. Yates 30 , and A. Zijlstra 8 (Affiliations can be found after the references) Received ; accepted ABSTRACT Context. The dusty winds of cool evolved stars are a major contributor of the newly synthesised material enriching the Galaxy and future gen- erations of stars. However, the details of the physics and chemistry behind dust formation and wind launching have yet to be pinpointed. Recent spatially resolved observations show the importance of gaining a more comprehensive view of the circumstellar chemistry, but a comparative study of the intricate interplay between chemistry and physics is still difficult because observational details such as frequencies and angular resolutions are rarely comparable. Aims. Aiming to overcome these deficiencies, ATOMIUM is an ALMA Large Programme to study the physics and chemistry of the circumstellar envelopes of a diverse set of oxygen-rich evolved stars under homogeneous observing conditions at three angular resolutions between ∼0.02 ′′ −1.4 ′′ . Here we summarize the molecular inventory of these sources, and the correlations between stellar parameters and molecular content. Methods. Seventeen oxygen-rich or S-type asymptotic giant branch (AGB) and red supergiant (RSG) stars have been observed in several tunings with ALMA Band 6, targeting a range of molecules to probe the circumstellar envelope and especially the chemistry of dust formation close to the star. We systematically assigned the molecular carriers of the spectral lines and measured their spectroscopic parameters and the angular extent of the emission of each line from integrated intensity maps. Results. Across the ATOMIUM sample, we detect 291 transitions of 24 different molecules and their isotopologues. This includes several first detections in oxygen-rich AGB/RSG stars: PO 3 = 1, SO 2 3 1 = 1 and 3 2 = 2, and several high energy H 2 O transitions. We also find several first detections in S-type AGB stars: vibrationally excited HCN 3 2 = 2, 3 and SiS 3 = 4, 5, 6, as well as first detections of the molecules SiC, AlCl, and AlF in W Aql. Overall, we find strong correlations between the following molecular pairs: CS and SiS, CS and AlF, NaCl and KCl, AlO and SO, SO 2 and SO, and SO 2 and H 2 O; meaning both molecules tend to have more detected emission lines in the same sources. The measured isotopic ratios of Si and S are found to be consistent with previous measurements, except for an anomalously high 29 Si/ 30 Si ratio of 4 ± 1 in the RSG VX Sgr. Conclusions. This paper presents the overall molecular inventory and an initial analysis of the large ATOMIUM dataset, laying the groundwork for future work deriving molecular abundances and abundance profiles using radiative transfer modeling which will provide more rigorous tests for chemical models. Key words. stars: AGB and post-AGB − supergiants − circumstellar matter − line: identification − instrumentation: interferometers − astro- chemistry 1. Introduction Cool evolved stars are a major contributor of the gas and dust returned to the interstellar medium (Tielens 2005) through their dusty winds which can reach mass-loss rates of up to 10 −4 M ⊙ yr −1 (Höfner & Olofsson 2018). Low- and intermediate-mass (∼0.8 – 8 M ⊙ ) asymptotic giant branch (AGB) stars are known to have dust-driven winds, while the mass-loss mechanism of the rarer, more massive red supergiant (RSG) stars remains uncertain. In both cases, however, the details of the physics and chemistry behind dust formation and wind launching have yet to be pinpointed, a vital step in understanding how newly synthesised material from AGB and RSG stars enriches the Galaxy and future generations of stars. ⋆ Tables A.1–A.5 are only available in electronic form at the CDS via anonymous ftp to cdsarc.cds.unistra.fr (130.79.128.5) or via https://cdsarc.cds.unistra.fr/cgi-bin/qcat?J/A+A/ ⋆⋆ email: sofia.wallstrom@kuleuven.be These AGB and RSG stars and their accompanying circumstellar envelopes (CSEs) provide useful chemical laboratories for studying dust and molecule formation due to their relatively simple overall spherical structure and their (mostly) radial velocity fields. Other chemically interesting cool environments, such as star-forming regions or (proto)planetary disks, tend to have more complex spatial and velocity structures, making it more difficult to disentangle the effects of chemistry. The overall chemical composition of an AGB CSE depends on the C/O ratio of the central star (see, for example, Habing & Olofsson 2003), as most of the less abundant element is locked up in CO. An oxygen-rich or M-type star (C/O < 1) has more free oxygen to form for example silicate dust and oxygen-bearing molecules – such as SO, TiO, AlO – while a carbon-rich star (C/O > 1) has more free carbon to form for example amorphous carbon dust and molecules such as HC 3 N and SiC 2 . Stars with C/O ∼ 1 are called S-type stars and have a mixed chemistry. The more massive RSGs are all oxygen-rich stars, due to extra nucleosynthesis Article number, page 1 of 42" 2312.03468v1,"Multiphase Science and Technology, x(x):1–12 (2023) CHARACTERIZATION OF A CAPILLARY DRIVEN FLOW IN MICROGRAVITY BY MEANS OF OPTICAL TECHNIQUE Domenico Fiorini, 1,2,∗ Louis Carbonnelle, 1 Alessia Simonini, 1 Johan Steelant, 3 David Seveno, 2 & Miguel Alfonso Mendez 1 1 von Karman Institute for Fluid Dynamics, Waterloosesteenweg 72, Sint-Genesius-Rode, 1640, Belgium 2 KU Leuven, Dept. of Materials Engineering, Leuven 3001, Belgium 3 ESTEC-ESA, Keplerlaan 1, Noordwijk, The Netherlands *Address all correspondence to: Domenico Fiorini, von Karman Institute for Fluid Dynamics, Waterloosesteenweg 72, Sint-Genesius-Rode, 1640, Belgium, E-mail: domenico.fiorini@vki.ac.be Original Manuscript Submitted: 02/20/2023; Final Draft Received: mm/dd/yyyy The motion of a gas-liquid interface along a solid wall is influenced by the capillary forces resulting from the interface’s shape and its interaction with the solid, where it forms a dynamic contact angle. Capillary models play a significant role in the management of cryogenic propellants in space, where surface tension dominates the behaviour of gas-liquid interfaces. Yet, most empirical models have been derived in configurations dominated by viscous forces. In this study, we experimentally investigate the wetting of a low-viscosity, highly wetting fluid in a reduced gravity environment. Our setup consisted of a transparent and diverging U-tube in which capillary forces sustain the liquid motion. Combining Particle Image Velocimetry (PIV) and high-speed backlighting visualization, the experimental campaign allowed for measuring the interface evolution and the velocity field within the liquid under varying gravity levels. This work reports on the preliminary results from the image velocimetry and shows that the velocity profile within the tube is close to parabolic until a short distance from the interface. Nevertheless, classic 1D models for capillary rise face difficulties reproducing the interface dynamics, suggesting that the treatment of the surface tension in these problems must be reviewed. KEY WORDS: Dynamic Wetting in Microgravity, Time-Resolved Particle Image Velocimetry, Interface dynamics in capillary tubes 1. INTRODUCTION Modelling the dynamics of a gas-liquid interface along a solid surface is fundamental in wetting and dewetting (e.g. inkjet printing), coating flows (e.g. slot die coating), and capillary-driven flows (e.g. capillary tubes). These applications have spurred much of the research on the topic and have often been analyzed using semi-empirical or theoretical correlations that link the contact angle at the wall to the contact-line dynamics. Classic empirical laws relate the contact angle to the velocity of the contact line through the 0276–1459/23/$35.00 © 2023 by Begell House, Inc. www.begellhouse.com 1" 2312.03471v1,"MNRAS 000, 1–7 (2023) Preprint 7 December 2023 Compiled using MNRAS L A TEX style file v3.0 Gamma-ray spectra of the Crab, Vela and Geminga pulsars fitted with SED of the emission from their superluminally moving current sheet Houshang Ardavan ★ Institute of Astronomy, University of Cambridge, Madingley Road, Cambridge CB3 0HA, United Kingdom Accepted XXX. Received YYY; in original form ZZZ ABSTRACT We show that the spectral energy distribution (SED) of the tightly focused radiation generated by the superluminally moving current sheet in the magnetosphere of a non-aligned neutron star fits the gamma-ray spectra of the Crab, Vela and Geminga pulsars over the entire range of photon energies so far detected by Fermi-LAT, MAGIC and H.E.S.S. from them: over 10 2 MeV to 20 TeV. While emblematic of any emission that entails caustics, the SED introduced here radically differs from those of the disparate emission mechanisms currently invoked in the literature to fit the data in different sections of these spectra. We specify, moreover, the connection between the values of the fit parameters for the analysed spectra and the physical characteristics of the central neutron stars of the Crab, Vela and Geminga pulsars and their magnetospheres. Key words: pulsars: individual: J0534+2200, J0835-4510, J0633+1746 – gamma-rays: stars – stars: neutron – methods: data analysis – radiation mechanisms: non-thermal 1 INTRODUCTION It is now firmly established that the magnetosphere of a non-aligned neutron star contains a rigidly rotating current sheet outside its light cylinder (see the review article Philippov & Kramer 2022 and the references therein). That this current sheet moves faster than light in vacuum is not incompatible with the requirements of special relativity because its superluminally moving distribution pattern is created by the correlated motion of subluminally moving charged particles (Bolotovskii & Bykov 1990). The field generated by a constituent volume element of this current sheet embraces a synergy between the superluminal version of the field of synchrotron radiation and the vacuum version of the field of Čerenkov radiation (Ardavan 2023, Section 2): the waves emanating from it possess a two-sheeted cusped envelope that spirals outward around the light cylinder all the way into the far zone (Ardavan 2023, Figs. 3a and 4). Only a single wave front propagates past an observer outside the envelope at any given time. But an observer inside the envelope receives three intersecting wave fronts, emanating from three distinct retarded positions of the source element simultaneously (Ardavan 2023, Figs. 3b and 4). On each sheet of the envelope, two of these wave fronts coalesce and interfere constructively to generate an infinitely large radiation field in the time domain (Ardavan 2021, Section 3.4). On the cusp locus of the envelope, where all three of these wave fronts (together with the three corresponding images of the source element) coalesce, the resulting radiation field has even a higher-order singularity (Ardavan 2023, Figs. 5 and 6). Divergence of the field of a source point on the envelope and its cusp, which stems from the relativistic restrictions inherent in electrodynamics, reflects the fact that no superluminal source can be point-like. Super- ★ Email address: ardavan@ast.cam.ac.uk © 2023 The Authors position of the contributions from the constituent volume elements of the current sheet results in a field that, while sharply peaked, is finite (Ardavan 2021, Section 4). The field of the entire volume of the source receives its main contributions from those volume elements that approach the observer along the radiation direction with the speed of light and zero acceleration at the retarded time (Ardavan 2021, Section 4.2). Phases of the waves emitted by such volume elements of the source possess two nearby stationary points that draw closer to each other the farther from the source they are (Ardavan 2023, Fig. 7) and eventually coalesce at infinity. As a result, the waves in question constitute progressively more focused pulses, which by virtue of having time-domain profiles whose peaks get narrower the farther the pulses propagate away from their source, embody the high-frequency component of the radiation from the current sheet (Ardavan 2021, Section 5). The lowerfrequency emission in the radio loud gamma-ray pulsars arises from the isolated stationary points of the phases of these waves (Ardavan 2021, Section 5.4). A detailed analysis of the radiation that is generated by the superluminally moving current sheet in the magnetosphere of a non-aligned neutron star can be found in Ardavan (2021). Heuristic accounts of the mathematical results of that analysis in more transparent physical terms are presented in Ardavan (2022) and Ardavan (2023, Section 2). We begin here by deriving the spectral energy distribution (SED) of the most tightly focused component of the radiation that is emitted by the magnetospheric current sheet (Section 2). We then specify the values of the free parameters in the derived expression for which this SED best fits the data on the observed gamma-ray spectra of the Crab, Vela and Geminga pulsars (Section 3). The specified values of the fit parameters will be used, in conjunction with the results of the analysis in Ardavan (2021), to determine certain attributes of the" 2312.03477v1,"From Detection to Action Recognition: An Edge-Based Pipeline for Robot Human Perception Petros Toupas, Georgios Tsamis, Dimitrios Giakoumis, Konstantinos Votis, Dimitrios Tzovaras Information Technologies Institute Centre for Research & Technology Hellas Thessaloniki, Greece {ptoupas,gtsamis,akargakos,dgiakoum,kvotis,Dimitrios.Tzovaras}@iti.gr Abstract—Mobile service robots are proving to be increasingly effective in a range of applications, such as healthcare, monitoring Activities of Daily Living (ADL), and facilitating Ambient Assisted Living (AAL). These robots heavily rely on Human Action Recognition (HAR) to interpret human actions and intentions. However, for HAR to function effectively on service robots, it requires prior knowledge of human presence (human detection) and identification of individuals to monitor (human tracking). In this work, we propose an end-to-end pipeline that encompasses the entire process, starting from human detection and tracking, leading to action recognition. The pipeline is designed to operate in near real-time while ensuring all stages of processing are performed on the edge, reducing the need for centralised computation. To identify the most suitable models for our mobile robot, we conducted a series of experiments comparing stateof-the-art solutions based on both their detection performance and efficiency. To evaluate the effectiveness of our proposed pipeline, we proposed a dataset comprising daily household activities. By presenting our findings and analysing the results, we demonstrate the efficacy of our approach in enabling mobile robots to understand and respond to human behaviour in realworld scenarios relying mainly on the data from their RGB cameras. Index Terms—Mobile Robots, Human Action Recognition, Pipeline, Activities of Daily Living I. I NTRODUCTION The integration of robots into human lives is increasingly common as people become more comfortable interacting with them. In healthcare, autonomous mobile service robots show great promise in supporting caregivers and family members responsible for patients. Moreover, ambient assisted living benefits from robotic companions that monitor the well-being of elderly or impaired individuals in various settings such as homes, nursing homes, and hospitals. To enable robots to comprehend and respond to human behaviour, human action recognition systems play a vital role. These systems allow robots to deduce information about a person’s state, behaviour, and intentions, ranging from providing emergency assistance to understanding daily activities. Nonetheless, before implementing such capabilities on service robots, certain preceding steps need to be addressed. In practice, HAR represents the final stage of a larger pipeline, as discussed in detail in Section III. The pipeline commences with user recognition and identification among multiple individuals. A tracking algorithm is then employed to follow the user within the robot’s operating space. Once these prerequisites are fulfilled, the action recognition algorithm accurately gathers user information [1]. In Autonomous Mobile Robot (AMR) applications, HAR is crucial as the robot’s behaviour depends on the activities of its human counterpart. For instance, a vision-based system should continuously recognise human actions in a live streaming scenario without prior knowledge of when actions start or end. Deploying human action recognition systems on mobile robots requires careful and precise design of their pipelines, along with the selection of lightweight algorithms for each stage. However, there are several challenges that arise when deploying vision-based HAR algorithms on mobile robots, as discussed in [2], [3]. These challenges include variations in point of view, illumination, shadows, and scale due to the different positions the robot may take while operating as discussed by Ahmad et al. [4]. Near real-time, on-device performance is a crucial requirement for such systems, enabling the robot to respond and plan accordingly to human actions. Furthermore, optimising resource utilisation is essential to avoid overburdening the system. Offloading part of the processing to a server or the cloud may restrict the system’s performance due to limited bandwidth or other communication barriers. This paper introduces an edge-based end-to-end human action recognition pipeline designed for mobile service robots. To achieve near real-time performance, we employ efficient and lightweight algorithms such as OpenPose and X3D at each stage of the pipeline. Extensive research and analysis have been conducted to select the most suitable HAR model, with a focus on minimising resource utilisation. To evaluate the effectiveness of our approach, we utilise a newly introduced dataset that comprises seven distinct actions. This dataset combines data from various publicly available datasets along with newly captured data from a demonstration infrastructure for rapid prototyping and novel technologies at our premises. The main contributions of this paper can be summarised as follows: • An end-to-end solution for recognising human actions via a mobile robot in near real-time with all processing in each stage performed on the edge utilising a 3D- based user tracking algorithm and an overlapping sliding window pre-processing technique for higher-quality HAR predictions. • The introduction of a dataset on daily activities that" 2312.03479v1,"JAMMIN-GPT: TEXT-BASED IMPROVISATION USING LLMS IN ABLETON LIVE Sven Hollowell Tashi Namgyal Paul Marshall Department of Computer Science, University of Bristol, Bristol, UK sven.hollowell@bristol.ac.uk ABSTRACT We introduce a system that allows users of Ableton Live to create MIDI-clips by naming them with musical descriptions. Users can compose by typing the desired musical content directly in Ableton’s clip view, which is then inserted by our integrated system. This allows users to stay in the flow of their creative process while quickly generating musical ideas. The system works by prompting ChatGPT to reply using one of several text-based musical formats, such as ABC notation, chord symbols, or drum tablature. This is an important step in integrating generative AI tools into pre-existing musical workflows, and could be valuable for content makers who prefer to express their creative vision through descriptive language. Code is available at 1 . 1. INTRODUCTION Digital Audio Workstations (DAWs) are the primary tool for music production. Ableton Live is a popular DAW that uses a clip-based workflow, where users create and edit musical ideas in short clips that can be launched in a grid (rows are ""scenes"", columns are ""tracks""). Typically, MIDI-clips would be created by drawing notes in a piano roll editor, or by playing notes on a MIDI keyboard. Music creation can be done in a variety of ways but is widely seen to be an iterative process [1, 2]. For example, with a ""flare and focus"" approach [3] where musicians successively expand upon and refine ideas. This often includes communicating with other musicians who have different roles, interaction styles and levels of grounding [4].According to Sawyer [5] “In group creativity, the performance must be constantly negotiated and constructed from moment to moment”. However traditional DAWs are tailored for solo creators, lacking the inherent spark of creativity that collaboration with a creative partner allows for. Using a virtual collaborator moves the user into the role of a producer who might give more general directions, e.g. “play that again but with more energy”. This process is 1 https://github.com/supersational/JAMMIN-GPT © S. Hollowell, T. Namgyal, and P. Marshall. Licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). Attribution: S. Hollowell, T. Namgyal, and P. Marshall, “JAMMIN-GPT: Text-based Improvisation using LLMs in Ableton Live”, in Extended Abstracts for the Late-Breaking Demo Session of the 22nd Int. Society for Music Information Retrieval Conf., Online, 2023. often done in natural language, and so LLMs are a natural go-to for emulating this part of the co-creation process. Another important aspect of composition is ’flow’ [6], where musicians enter a state of continuous inspiration. However, it is easier to break this state than to enter it and so AI tools that take users away from creative to administrative tasks should be avoided. For example, having to load special environments or wait for long training and/or inferences times. One solution is to embed interfaces within existing workflows, such as DAWs. We therefore propose JAMMIN-GPT, a natural language interface for music generation embedded within a DAW. 2. RELATED WORK There are many examples of AI-based composition tools being imported into DAWs as plugins, such as DrumNet [7], MMM4Live [8] and Magenta Studio [9]. These allow creation of MIDI clips by using a generative model such as MusicVAE [10], which can generate novel MIDI clips or variations of existing clips. The central disadvantage of this approach is that the user cannot specify the musical content of the clip, since the clip is generated from a latent space that is not always interpretable to humans. Another disadvantage is that the interface makes it awkward to select input and output clips, which must be selected from dropdown menus. Our approach improves on this as it built directly into the clip-view of Ableton Live. Text-conditioned generative models for audio have recently enabled users to generate clips of music from a text description, such as AudioLM [11], AudioLDM [12] and MusicGen [13]. However, generating directly in the audio domain makes it difficult for users to tweak model outputs compared to symbolic approaches. Language models have been used to generate symbolic music in various ways. Models can be trained solely on music data, solely on natural language, or trained on natural language and then fine-tuned on music data. For example Music Transformer [14] uses an LLM-like architecture trained specifically for music generation, but is smaller in scale than natural language models so is less expressive. There are many kinds of symbolic music representation, such as MIDI, that are not text-based and so are not present in the data used to train LLMs. However, these can be converted to a text format and used to fine-tune LLMs, for example fine-tuning GPT-2 to piano music [15]. Chat- GPT and GPT-3 models have been used by Tomoki [16] to" 2312.03487v1,"How to detect the spacetime curvature without rulers and clocks. II. Three-dimensional spacetime A. V. Nenashev 1, ∗ and S. D. Baranovskii 1, 2, † 1 Department of Physics and Material Sciences Center, Philipps-Universität Marburg, D-35032 Marburg, Germany 2 Department für Chemie, Universität zu Köln, Luxemburger Straße 116, 50939 Köln, Germany (Dated: December 7, 2023) We have generalized the results of the previous work [arXiv:2302.12209] to the case of threedimensional (3D) spacetime with two spatial and one temporal coordinates. We have found that the flat Minkowski 3D spacetime is “well-stitched”, which means that it possesses a structure described by 24 causal relations between 12 events. We have proved that a 3D spacetime is “well-stitched” if and only if it is conformally flat. The concept of a “well-stitched” spacetime does not rely on metrical information about lengths, times, etc., and does not belong to the metric geometry, but rather to geometry of incidence. We therefore have “translated” an important concept of a conformally-flat spacetime from the “metric” language of Riemannian geometry to the “non-metric” language of the geometry of incidence. The results of this paper provide a tool for detecting the curvature of the 3D spacetime on the basis of causal relations only, without any measurement instruments like rulers and clocks, provided that the spacetime is not conformally flat. I. INTRODUCTION A curved spacetime is a central concept of the general theory of relativity. Mathematical description of the curved spacetime is given in the language of differential geometry. Namely, one can define an infinitesimal interval ds 2 between two neighboring points as a quadratic form of the difference dx i between coordinates of the points: ds 2 = g ik dx i dx k , where g ik is a metric tensor. Dependence of the metric tensor on coordinates defines the pseudo-Riemannian geometry of the spacetime. (The prefix “pseudo” reflects that there is a time coordinate in addition to spatial ones.) From the metric tensor and its derivatives one can deduce the Riemann tenor of curvature R iklm . The Riemann tensor allows us to discriminate between a flat spacetime and a curved one: if the Riemann tensor is equal to zero in every point of the spacetime, than the spacetime is flat, otherwise it is curved. This straightforward way of determining the curvature demands infinite number of measuring of intervals between infinitely-close pairs of points (i. e., events) in the spacetime. However, one can detect the curvature with only finite number of measurements, see for example a “five-point curvature detector” considered by Synge [1, Chapter XI, §8]. As a simple illustration of this possibility, Fig. 1 shows a construction of eleven rods of equal lengths a on a two-dimensional surface. If the distance between points A and B is not equal to a, then the surface is curved. If, on the contrary, the distance between A and B is always equal to a for every placement of this ∗ On leave of absence from Rzhanov Institute of Semiconductor Physics and the Novosibirsk State University, Russia; nenashev isp@mail.ru † sergei.baranovski@physik.uni-marburg.de FIG. 1. A simple example of a finite set of measurements to detect the curvature of a surface. Blue rods, connecting points on a surface, have equal lengths a on a surface. If the surface is flat, then the distance between points A and B is equal to a. Conversely, if the distance AB differs from a, then it indicates that the surface is curved. construction on the surface and every choice of length scale a, then the surface is flat. In a recent paper [2], we addressed the question: what can be said about curvature of a spacetime after a finite number of measurements of causal relations between events? Is it possible to construct a scheme, analogous to that in Fig. 1, which allows one to detect that the spacetime is curved, but without relying on any metrical information? in other words: without using any measuring instruments like rulers and clocks? This question has been answered in the case of four-dimensional (three spatial + one temporal coordinates) spacetime. The aim of the present work is to generalize the results, obtained in Ref. [2], to the case of three-dimensional spacetime, which possesses two spatial and one temporal dimensions. The paper is organized as follows. In Section II, we somewhat refine the posed question: namely, we explain that causal relations can discriminate between conformally-flat and non-conformally flat spacetimes, rather" 2312.03489v1,"Decomposing Thermodynamic Dissipation of Neural Dynamics via Spatio-Temporal Oscillatory Modes Daiki Sekizawa ∗ Department of General Systems Studies, The University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8902, Japan Sosuke Ito † Department of Physics, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan and Universal Biology Institute, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan Masafumi Oizumi ‡ Department of General Systems Studies, The University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8902, Japan (Dated: December 7, 2023) Recent developments in stochastic thermodynamics have elucidated various relations between the entropy production rate (thermodynamics dissipation) and the physical limits of information processing in nonequilibrium dynamical systems, which have been actively used and opened new perspectives in the analysis of real biological systems. Even in neuroscience, the importance of quantifying the entropy production has attracted increasing attention to understand the properties of information processing in the brain. However, the relationships between entropy production rate and neural oscillations, such as delta, theta, and alpha waves, which are prevalent in the brain, are unclear. Here, we derive a novel decomposition of the entropy production rate. We show that one of the components of the entropy production rate, called the housekeeping entropy production rate, can be decomposed into independent positive contributions from spatio-temporal oscillatory modes. Our decomposition enables us to calculate the contribution to the housekeeping entropy production rate from oscillatory modes, as well as the spatial distribution of the contributions. To demonstrate the utility of our decomposition, we applied our decomposition to the electrocorticography (ECoG) dataset recorded during awake and anesthetized conditions in monkeys, where the properties of oscillations change drastically. We showed the consistent trends across different monkeys, i.e., the contributions of oscillatory modes from the delta band were larger in the anesthetized condition than in the awake condition, while those from the higher frequency bands, such as the theta band, were smaller. These results allow us to interpret the change in the neural oscillation in terms of stochastic thermodynamics and the physical limit of information processing. I. INTRODUCTION In the brain, oscillatory phenomena such as delta, theta, alpha, beta, and gamma waves are universally observed. Numerous experimental facts have demonstrated the relationship between these oscillations and information processing in the brain [1]. For example, oscillatory phenomena in the brain have been shown to be related to various brain functions such as visual processing [2, 3], attention [4, 5], working memory [6, 7], and motor processing [8, 9], as well as mechanisms that support these functions, such as cross-frequency coupling [10, 11], predictive coding [12, 13], and interregional communication within the brain [14, 15]. Despite this large body of experimental evidence suggesting a relationship between oscillations and various brain functions, how and to what ∗ sekizawa-daiki963@g.ecc.u-tokyo.ac.jp † s-sosuke.ito@g.ecc.u-tokyo.ac.jp ‡ c-oizumi@g.ecc.u-tokyo.ac.jp extent oscillations theoretically affect the brain’s information processing such as perception, decision making, and motor processing remains elusive. To address these questions, we use the entropy production rate in stochastic thermodynamics [16–18] because stochastic thermodynamics has elucidated various relationships between information processing and entropy production rate [19–21]. The entropy production rate is a thermodynamic dissipation and is a central quantity in stochastic thermodynamics. So far, several relationships between the entropy production rate and the physical limits of information processing have been discovered. For example, the entropy production rate can determine various theoretical limits of information processing, such as the speed limits of information processing [22–26], the limit of accuracy of information processing [20, 27, 28], and the limit of the performance of biochemical adaptation [29–32]. Due to various theoretical limits of information processing in stochastic thermodynamics, quantifying the entropy production rate in the brain is helpful in understanding information processing in the brain. In" 2312.03502v1,"Xun Xu 2† Kui Jia 3 Yongyi Su 1 * Haojie Zhang 1 * 1 South China University of Technology 2 Institute for Infocomm Research, A*STAR 3 School of Data Science, The Chinese University of Hong Kong, Shenzhen https://github.com/Zhang-Haojie/WeSAM SAM Pretraining Web-scale Source Data Abstract The success of large language models has inspired the computer vision community to explore image segmentation foundation model that is able to zero/few-shot generalize through prompt engineering. Segment-Anything (SAM), among others, is the state-of-the-art image segmentation foundation model demonstrating strong zero/few-shot generalization. Despite the success, recent studies reveal the weakness of SAM under strong distribution shift. In particular, SAM performs awkwardly on corrupted natural images, camouflaged images, medical images, etc. Motivated by the observations, we aim to develop a self-training based strategy to adapt SAM to target distribution. Given the unique challenges of large source dataset, high computation cost and incorrect pseudo label, we propose a weakly supervised self-training architecture with anchor regularization and low-rank finetuning to improve the robustness and computation efficiency of adaptation. We validate the effectiveness on 5 types of downstream segmentation tasks including natural clean/corrupted images, medical images, camouflaged images and robotic images. Our proposed method is task-agnostic in nature and outperforms pre-trained SAM and state-of-the-art domain adaptation methods on almost all downstream tasks with the same testing prompt inputs. Image Encoder Mask Encoder 🔥 Box Points Mask Initialize SAM Weights Downstream Data w/ Weak Supervision Improving the Generalization of Segmentation Foundation Model under Distribution Shift via Weakly Supervised Adaptation Image Encoder ❄ 🔥 LoRA Param. Box Points Mask 🔥 Prompt Encoder 🔥 SAM Adapta/on Mask Encoder ❄ Self-Training Losses Prompt ❄ Encoder Figure 1. Segment Anything Model was pre-trained on a largescale dataset but exhibits awkward performance on diverse downstream segmentation tasks. We adapt SAM through weak supervision to enhance its generalization capabilities. model with strong zero-shot generalization, the Segment- Anything model (SAM) [26] was developed by training on billions of annotated masks. Despite the overwhelming size of dataset used for training, SAM was found to behave awkwardly on certain out-of-distribution downstream tasks, including camouflaged segmentation, medical segmentation, adversarial attacks, visual corruptions, etc. [5, 21]. This is likely caused by the distribution shift between the training data, i.e. the SA-1B dataset [26], and the challenging testing datasets. These observations motivate us to explore tangible solutions to make SAM more robust against real-world and more diverse downstream tasks. Traditional paradigm towards improving model’s robustness and generalization often follows an expensive retraining practice. To defend against a particular type of domain shift, methods are often specifically tailored. For example, domain randomization was specifically developed for improving the generalization to different real testing domains [6] while adversarial training is often adopted to improve robustness against adversarial attacks [57]. Apply- 1. Introduction The success of large language models is partially attributed to the strong capability of zero-shot generalization. This has called for numerous attention into developing foundation model for computer vision tasks where one of the key concern also lies in the generalization ability [25, 43, 47]. In particular, as a promptable image segmentation foundation * Equal contribution. † Correspondence to Xun Xu: alex.xun.xu@gmail.com. 1" 2312.03506v1,"1 Task-Parameterized Imitation Learning with Time-Sensitive Constraints Julian Richter 1,2 , João Oliveira 3 , Christian Scheurer 1 , Jochen Steil 2 and Niels Dehio 1 Abstract—Programming a robot manipulator should be as intuitive as possible. To achieve that, the paradigm of teaching motion skills by providing few demonstrations has become widely popular in recent years. Probabilistic versions thereof take into account the uncertainty given by the distribution of the training data. However, precise execution of start-, via-, and end-poses at given times can not always be guaranteed. This limits the technology transfer to industrial application. To address this problem, we propose a novel constrained formulation of the Expectation Maximization algorithm for learning Gaussian Mixture Models (GMM) on Riemannian Manifolds. Our approach applies to probabilistic imitation learning and extends also to the wellestablished TP-GMM framework with Task-Parameterization. It allows to prescribe end-effector poses at defined execution times, for instance for precise pick & place scenarios. The probabilistic approach is compared with state-of-the-art learningfrom-demonstration methods using the KUKA LBR iiwa robot. The reader is encouraged to watch the accompanying video available at https://youtu.be/JMI1YxtN9C0. Index Terms—Learning from Demonstration, Task- Parameterization, Riemannian Manifolds, Constrained Motion Planning I. I NTRODUCTION Robot manufacturers seek to provide easy-to-use programming interfaces, allowing non-experts to teach robot skills intuitively. One common aim is to empower factory-floor workers in transmitting their tool-handling skills to the robot. This would enable small and medium-sized companies to automate repetitive processes with little effort, resulting in improved productivity and potential economic growth. Underlying these efforts is research in Learning from Demonstration (LfD) [1], [2], also referred to as Programming by Demonstration [3]–[5] or Imitation Learning [6]–[8]. At its core, the technology requires demonstration data, which is provided through collaborative hand-guiding [9], teleoperation [10], a handheld input device [11], or camera-based techniques [12]. The objective is to find suitable model parameters, that reproduce the demonstrations accurately. On top of single trajectory approaches, a Motion Skill Memory [13] or Memory of Motion [14] is trained for further generalization and skill interpolation. Through the resulting model, the robot is then controlled autonomously. Modern techniques furthermore allow the robot behavior to adapt to variations of the task, often referred to as Task-Parameterization [15]. 1 Technology and Innovation Center (TIC), KUKA Deutschland GmbH, Germany, e-mail: Julian.Richter@kuka.com 2 Institute of Robotics and Process Control (IRP), Technical University Braunschweig, Germany 3 IDMEC, Instituto Superior Técnico, Portugal This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. Fig. 1. Experimental setup for a scenario with task variance. Demonstrations are provided through hand-guiding. The variable motion skill includes picking up a board out of the non-stationary rack, holding it in front of a camera (left) and inserting it into the shelf in different bins (right). A task-parameterized motion skill is learned without need for writing program code. Many applications require additional motion properties to be guaranteed. Such verifiable safety certificates play a fundamental role in industrial production settings. Therefore, a wide range of research on learning state-dependent dynamical systems (DS) ẋ = f (x) focuses on enforcing Lyapunov stability at the desired attractor [2], [3], [7]. Note, however, that learning a DS may suffer from the high-dimensional input dimension and the restrictive stability constraints. For example, a globally stable first-order DS can not generate a trajectory that crosses its own path. On the contrary, timedependent systems x = f (t) provide more flexibility in representing arbitrarily shaped trajectories [6], [9], [16]. Probabilistic methods are often used in the context of LfD [1]. However, state-of-the-art Gaussian Mixture Regression (GMR) based on Expectation Maximization (EM) [17] fails when dealing with applications that require precise task execution at specific parts of the process. The main contribution of this paper is the generic formulation of a Constrained Expectation Maximization (CEM) algorithm on Riemannian Manifolds that enforces precision where required through prior task knowledge. In the case of probabilistic imitation learning for time-dependent systems, the novel CEM enforces timesensitive constraints (TSC). The approach also applies to the more generic Task-Parameterized Gaussian Mixture Model (TP-GMM) [15]. In this letter, we demonstrate probabilistic learning of precise pick & place motions in end-effector space, guaranteeing the exact reaching of desired positions and orientations. Our approach is validated with the KUKA LBR iiwa robot, see Fig. 1. Comparisons with state-of-the-art methods reveal the advantages of our contribution. The remainder of this work is structured as follows. We review state-of-the-art LfD techniques in Section II, and reit-" 2312.03511v1,"K ANDINSKY 3.0 T ECHNICAL R EPORT Vladimir Arkhipkin Igor Pavlov Andrei Filatov Julia Agafonova Viacheslav Vasilev Anastasia Maltseva Andrey Kuznetsov ∗ Said Azizov Denis Dimitrov ∗ Sber AI A BSTRACT We present Kandinsky 3.0, a large-scale text-to-image generation model based on latent diffusion, continuing the series of text-to-image Kandinsky models and reflecting our progress to achieve higher quality and realism of image generation. Compared to previous versions of Kandinsky 2.x, Kandinsky 3.0 leverages a two times larger U-Net[1] backbone, a ten times larger text encoder and removes diffusion mapping. We describe the architecture of the model, the data collection procedure, the training technique, and the production system of user interaction. We focus on the key components that, as we have identified as a result of a large number of experiments, had the most significant impact on improving the quality of our model compared to the others. By our side-by-side comparisons, Kandinsky becomes better in text understanding and works better on specific domains. The project is available at https://ai-forever.github.io/Kandinsky-3. 1 Introduction Recently, the quality of text-to-image generation models increased significantly, which became possible thanks to the invention of Diffusion Probabilistic Models [2, 3]. To date, the zoo of text-to-image generation models is extremely rich [4, 5, 6, 7, 8, 9, 10, 11]. Some of these systems provide users with opportunities for almost real-time inference, a high level of photorealism, an understanding of fantastic ideas and concepts not found in the real world, and many user-friendly web platforms and interfaces for a generation. Despite this, the task of text-to-image generating continues to pose serious challenges to researchers. The growing number of practical applications in commerce and design leads to a new unprecedented level of realism and alignment with complex textual descriptions. This paper presents Kandinsky 3.0, a new text-to-image generation model based on latent diffusion [6]. Earlier, we introduced other models of the Kandinsky family [12], the architecture of which is based on a two-stage pipeline using Diffusion Mapping between elements of latent vector spaces of images and text with subsequent decoding. In the Kandinsky 3.0 model, we focused on improving the text understanding, the image quality and simplifying the architecture by providing a single-stage pipeline in which generation takes place directly using text embeddings without any additional priors. The whole pipeline contains 11.9 billion parameters, almost three times more than the largest of the previous models of the Kandinsky family. Also, we integrated Kandinsky 3.0 into our user-friendly interaction system. We made our model completely public to promote the development of new technologies and openness in the scientific community. This technical report is arranged as follows: • Firstly, we describe the user interaction demo system; • Secondly, we describe the key components of the Kandinsky 3.0 model, datasets usage strategy, training techniques, and various applications; • Finally, we report the results of side-by-side comparisons based on human preferences and discuss the model limitations. ∗ Corresponding authors: Andrey Kuznetsov , Denis Dimitrov . The family of models is named after Wassily Kandinsky, the great Russian artist and an art theorist, the father of abstract art. ∗∗" 2312.03519v1,"Active Wildfires Detection and Dynamic Escape Routes Planning for Humans through Information Fusion between Drones and Satellites Chang Liu, Member, IEEE, Tamas Sziranyi, Senior Member, IEEE  Abstract— UAVs are playing an increasingly important role in the field of wilderness rescue by virtue of their flexibility. This paper proposes a fusion of UAV vision technology and satellite image analysis technology for active wildfires detection and road networks extraction of wildfire areas and real-time dynamic escape route planning for people in distress. Firstly, the fire source location and the segmentation of smoke and flames are targeted based on Sentinel 2 satellite imagery. Secondly, the road segmentation and the road condition assessment are performed by D-linkNet and NDVI values in the central area of the fire source by UAV. Finally, the dynamic optimal route planning for humans in real time is performed by the weighted A* algorithm in the road network with the dynamic fire spread model. Taking the Chongqing wildfire on August 24, 2022, as a case study, the results demonstrate that the dynamic escape route planning algorithm can provide an optimal real-time navigation path for humans in the presence of fire through the information fusion of UAVs and satellites. I. I NTRODUCTION Drone vision technology is being used in an increasing number of scenarios. In agriculture, drones equipped with high-resolution cameras or sensors can conduct aerial surveys of farmland to monitor the growth of crops, pests and diseases, and soil moisture conditions [1-3]. In the field of natural disaster rescue, drones are used to search, and rescue trapped people, monitor the situation in disaster areas, drop life-saving equipment and medical supplies to disaster areas, and provide first aid support [4-7]. In the field of logistics, drones can provide efficient courier and logistics services in urban and rural areas. They can quickly and accurately deliver packages from warehouses or sorting centers to their destinations, saving time and labor costs [8-9]. In the defense sector, swarms of drones can be used for missions such as target reconnaissance, intelligence gathering, border patrol, reconnaissance and surveillance [10-11]. And so on. For the application of drones in the field of natural disaster rescue, drones are a potentially efficient rescue tool when natural forest fires or man-made fires occur in the wild, and they have great flexibility and speed [12]. In addition to the time-sensitive drones, satellites can also provide us with more data on wildfires [13]. For example, the Sentinel 2 has 13 Chang Liu is with the Department of Networked Systems and Services, Budapest University of Technology and Economics, Műegyetem rkp. 3, H-1111 Budapest, Hungary and Machine Perception Research Laboratory of Institute for Computer Science and Control (SZTAKI), H-1111 Budapest, Kende u. 13-17, Hungary (corresponding author to provide phone: +36-30-526-4122; e-mail: changliu@hit.bme.hu). Tamas Sziranyi is with the Faculty of Transportation Engineering and Vehicle Engineering, Budapest University of Technology and Economics (BME-KJK), Műegyetem rkp. 3, H-1111 Budapest, Hungary and Machine Perception Research Laboratory of Institute for Computer Science and Control (SZTAKI), H-1111 Budapest, Kende u. 13-17, Hungary (e-mail: sziranyi.tamas@sztaki.hu). spectral bands, ranging from visible to near infrared to short-wave infrared, with spatial resolutions from 10 m to 60 m. Composed of two satellites, Sentinel 2A and Sentinel 2B, the temporal resolution of image acquisition is 10 days per satellite, with two complementary satellites and a revisit period of 5 days [14]. Usually, wildfires burn continuously for a period of time, days or even months, so the data provided by satellites is especially important at this time [15-17]. In this paper, we propose a fusion technique that cooperates the long-term data provided by satellites with the data collected by drones in the present moment in wildfires and finally provide dynamic optimal escape routes for humans in the active wildfire. First, based on the data provided by Sentinel 2 during the wildfire we can perform satellite image analysis, and based on the information provided by the different bands, we can roughly determine the location of the fire source and the direction of its spread. Secondly, the next role is played by the flexible drone fleet, they can quickly fly to the central area of the fire source for detection and rescue based on the location information from the previous step and carry out road network segmentation in the fire area through drone vision technology. Assessment of road conditions and navigation of the best dynamic escape routes is carried out through the road network maps acquired by the UAVs. The information fusion between the two makes wildfire detection and rescue efforts more efficient and accurate. The main contributions and innovations of this work are as follows:  Enabling information fusion between drones and satellites in wildfire rescue.  Incorporating a dynamic fire spread model into the UAV-extracted road network map.  Realizing the task of UAVs to plan dynamic escape paths in wildfire rescue in real time. In the subsequent sections, Section 2 describe the work that has been done. In Section 3, the overall system architecture and the core algorithms for the main dynamic optimal escape route planning are presented. In the next section, we present some results based on the mountain wildfires that occurred in Chongqing on August 24, 2022. Finally, we conclude this work with a summary and outlook. II. R ELATED W ORKS A. Sentinel 2 Satellite Image Wildfire Analysis Dedicated to supplying data for Copernicus services, Sentinel-2 carries a multispectral imager with a swath of 290 km. The imager provides a versatile set of 13 spectral bands spanning from the visible and near infrared to the shortwave infrared, featuring four spectral bands at 10 m, six bands at 20" 2312.03521v1,"Optimal Wildfire Escape Route Planning for Drones under Dynamic Fire and Smoke Chang Liu, Member, IEEE, Tamas Sziranyi, Senior Member, IEEE Abstract—In recent years, the increasing prevalence and intensity of wildfires have posed significant challenges to emergency response teams. The utilization of unmanned aerial vehicles (UAVs), commonly known as drones, has shown promise in aiding wildfire management efforts. This work focuses on the development of an optimal wildfire escape route planning system specifically designed for drones, considering dynamic fire and smoke models. First, the location of the source of the wildfire can be well located by information fusion between UAV and satellite, and the road conditions in the vicinity of the fire can be assessed and analyzed using multichannel remote sensing data. Second, the road network can be extracted and segmented in real time using UAV vision technology, and each road in the road network map can be given priority based on the results of road condition classification. Third, the spread model of dynamic fires calculates the new location of the fire source based on the fire intensity, wind speed and direction, and the radius increases as the wildfire spreads. Smoke is generated around the fire source to create a visual representation of a burning fire. Finally, based on the improved A* algorithm, which considers all the above factors, the UAV can quickly plan an escape route based on the starting and destination locations that avoid the location of the fire source and the area where it is spreading. By considering dynamic fire and smoke models, the proposed system enhances the safety and efficiency of drone operations in wildfire environments. Keywords— unmanned aerial vehicles (UAVs), Sentinel-2, optimal routes planning, weighted A* algorithm , wildfire rescue I. I NTRODUCTION In recent years, the frequent occurrence of wildland fires has posed an unprecedented and enormous challenge to humanity [1], especially wildland mountain fires that last up to several months and even destroy human homes [2]. As the modern world grapples with the consequences of increasingly severe wildfires, the utilization of UAVs has emerged as a promising avenue for enhancing the safety and efficacy of wildfire management [3]. Drones are potentially advantageous in responding to natural disasters because of their flexibility, such as providing the task of sending life jackets in the event of human drowning, among others [4]. It is well known that sentinel-2 satellites can detect the Chang Liu is with the Department of Networked Systems and Services, Budapest University of Technology and Economics, Műegyetem rkp. 3, H- 1111 Budapest, Hungary and Machine Perception Research Laboratory of HUN-REN Institute for Computer Science and Control (SZTAKI), H-1111 Budapest, Kende u. 13-17, Hungary (corresponding author to provide phone: +36-30-526-4122; e-mail: liu.chang@sztaki.hun-ren.hu). Tamas Sziranyi is with the Faculty of Transportation Engineering and Vehicle Engineering, Budapest University of Technology and Economics (BME-KJK), Műegyetem rkp. 3, H-1111 Budapest, Hungary and Machine Perception Research Laboratory of HUN-REN Institute for Computer Science and Control (SZTAKI), H-1111 Budapest, Kende u. 13-17, Hungary (e-mail: sziranyi.tamas@sztaki.hun-ren.hu) XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE occurrence of wildfires, and generally forest fires last for a long period of time [5], so after the satellite detects the occurrence of forest fires, it is necessary for human beings to take timely measures to minimize the damage. In this work, we propose the technique of fusion of 13- channel image information from Sentinel-2 satellite imagery and real-time image information captured by UAVs, and the cooperation between the two can accomplish the rescue mission in the event of wildfires more efficiently. First, the Sentinel-2 satellite can provide the UAVs system with information about the wildfire in advance, while the weather information of the area can also be pre-downloaded, and this step accomplishes wildfire detection and localization. Secondly, UAVs, due to their flexibility, can quickly reach the wildfire burning areas that are inaccessible to rescuers, search for humans in need of help through UAV vision technology, and utilize the real-time video sequences captured by them for the extraction of the road network, as well as the assessment of the road conditions of the road network in the area, where our previous works [6,7] have been well-prepared. Third, based on the road-map network information and road condition information extracted from the UAV in the previous step, dynamic fire and smoke spread models are added in this work, which affects the optimal path planning algorithm to go and change the best path in real time to avoid the location of the fire source and smoke, and to choose the best escape route with the best road condition for the people who are escaping. In the subsequent sections, Section 2 describes the related work that has been done. Section 3 describes the overall architecture of the proposed system, the dynamic fire and smoke models, and the algorithms for dynamic optimal escape route planning. In Section 4, we demonstrate the experimental comparison results with a case study of a mountain wildfire that occurred on August 24, 2022, in Chongqing. Finally, we summarize and outlook this work. II. RELATED WORKS A. Wildfire Detection and Localization by Drone and Satellite Fusion Technology Figure 1 illustrates wildfire detection and localization accomplished through the collaboration of Sentinel-2 satellites and UAVs. The figure is partially derived from the results of our previous work [8]. Sentinel-2 satellite carries a Multi-Spectral Imager (MSI) with a swath of 290 km. It provides a versatile set of 13 spectral bands spanning from the visible and near infrared to the shortwave infrared, featuring four bands at 10 m, six bands at 20 m and three bands at 60 m spatial resolution [9]. In full operational phase, the pair of S2 satellites will deliver data taken over all land" 2312.03523v1,"Sig-Networks Toolkit: Signature Networks for Longitudinal Language Modelling Talia Tseriotou 1∗ , Ryan Sze-Yin Chan 2∗ , Adam Tsakalidis 1,2 , Iman Munire Bilal 3 , Elena Kochkina 1‡ , Terry Lyons 2,4 , Maria Liakata 1,2,3 1 Queen Mary University of London, 2 The Alan Turing Institute, 3 University of Warwick, 4 University of Oxford t.tseriotou@qmul.ac.uk; rchan@turing.ac.uk Abstract We present an open-source, pip installable toolkit, Sig-Networks, the first of its kind for longitudinal language modelling. A central focus is the incorporation of Signaturebased Neural Network models, which have recently shown success in temporal tasks. We apply and extend published research providing a full suite of signature-based models. Their components can be used as PyTorch building blocks in future architectures. Sig-Networks enables task-agnostic dataset plug-in, seamless pre-processing for sequential data, parameter flexibility, automated tuning across a range of models. We examine signature networks under three different NLP tasks of varying temporal granularity: counselling conversations, rumour stance switch and mood changes in social media threads, showing SOTA performance in all three, and provide guidance for future tasks. We release the Toolkit as a PyTorch package 1 with an introductory video 2 , Git repositories for preprocessing 3 and modelling 4 including sample notebooks on the modeled NLP tasks. 1 Introduction Existing work on temporal and longitudinal modelling has largely focused on models that are taskoriented, including tracking mood changes in users’ linguistic content (Tsakalidis et al., 2022b,a), temporal clinical document classification (Ng et al., 2023), suicidal ideation detection on social media (Cao et al., 2019; Sawhney et al., 2021), real-time rumour detection (Liu et al., 2015; Kochkina et al., 2023). Transformer-based models struggle to outperform more traditional RNNs in such tasks, highlighting their limitations in temporal settings (Mul- * Indicates equal contribution. ‡Work done while at Queen Mary University of London. 1 https://pypi.org/project/sig-networks/ 2 http://youtu.be/lrjkdfYf8Lo 3 https://github.com/datasig-ac-uk/nlpsig/ 4 https://github.com/ttseriotou/sig-networks/ lenbach et al., 2018; Yuan et al., 2022). Inspired by the success of models with short- and long-term processing capabilities (Didolkar et al., 2022; Tseriotou et al., 2023) in producing compressed temporal representations, we develop a toolkit that applies Signature Network models (Tseriotou et al., 2023) to various longitudinal tasks. Path signatures are capable of efficient and compressed encoding of sequential data, sequential pooling in neural models, enhancement of short-term dependencies in linguistic timelines and encoding agnostic to task and time irregularities. We make the following contributions: • We release an open-source pip installable toolkit for longitudinal NLP tasks, Sig-Networks, including examples on several tasks to facilitate usability and reproducibility. • For data preprocessing for the Signature Networks models (Tseriotou et al., 2023), we introduce another pip installable library nlpsig which receives as input streams of textual data and returns streams of embeddings which can be fed into the models we discuss in this paper. • We showcase SOTA performance on three longitudinal tasks with different levels of temporal granularity, including a new task and dataset – longitudinal rumour stance, based on rumour stance classification (Zubiaga et al., 2016; Kochkina et al., 2018). We highlight best practices for adaptation to new tasks. • Our toolkit allows for flexible adaptation to new datasets, preprocessing steps, hyperparameter choices, external feature selection and benchmarking across several baselines. We provide the option of flexible building blocks such as Signature Window Network Units (Tseriotou et al., 2023) and their extensions, which can be used as a layer integrated in a new PyTorch model or as a stand-alone model for sequential NLP tasks. We share NLP-based examples via notebooks, where users can easily plug in their own datasets." 2312.03542v1,"Incorporating the algorithm for the boundary condition from FVM into the framework of Eulerian SPH Zhentong Wang, Oskar J. Haidn, Xiangyu Hu ∗ TUM School of Engineering and Design, Technical University of Munich, Garching, 85747, Germany Abstract Finite volume method (FVM) is a widely used mesh-based technique, renowned for its computational efficiency and accuracy but it bears significant drawbacks, particu- larly in mesh generation and handling complex boundary interfaces or conditions. On the other hand, smoothed particle hydrodynamics (SPH) method, a popular mesh- less alternative, inherently circumvents the mesh generation and yields smoother numerical outcomes but at the expense of computational efficiency. Therefore, nu- merous researchers have strategically amalgamated the strengths of both methods to investigate complex flow phenomena and this synergy has yielded precise and com- putationally efficient outcomes. However, algorithms involving the weak coupling of these two methods tend to be intricate, which has issues pertaining to versa- tility, implementation, and mutual adaptation to hardware and coding structures. Thus, achieving a robust and strong coupling of FVM and SPH in a unified frame- work is imperative. Wang [2] has integrated mesh-based FVM into the SPH library SPHinXsys. However, due to differing boundary algorithms between these methods in Wang’s work, the crucial step for establishing a strong coupling of both methods ∗ Corresponding author. Email addresses: zhentong.wang@tum.de (Zhentong Wang ), oskar.haidn@tum.de (Oskar J. Haidn), xiangyu.hu@tum.de (Xiangyu Hu ) Preprint submitted to Elsevier December 7, 2023" 2312.03543v1,"GPT-4 E NHANCED M ULTIMODAL G ROUNDING FOR A UTONOMOUS D RIVING : L EVERAGING C ROSS -M ODAL A TTENTION WITH L ARGE L ANGUAGE M ODELS Haicheng Liao ∗ University of Macau Macau SAR, China Huanming Shen ∗ UESTC Chengdu, China Zhenning Li † University of Macau Macau SAR, China yc27979@um.edu.mo HuanmingShen@outlook.com zhenningli@um.edu.mo Chengyue Wang University of Macau Macau SAR, China Guofa Li Chongqing University Chongqing, China Yiming Bie Jilin University Jilin, China Chengzhong Xu † University of Macau Macau SAR, China chengyuewang@um.edu.mo liguofa@cqu.edu.cn yimingbie@126.com czxu@um.edu.mo A BSTRACT In the field of autonomous vehicles (AVs), accurately discerning commander intent and executing linguistic commands within a visual context presents a significant challenge. This paper introduces a sophisticated encoder-decoder framework, developed to address visual grounding in AVs. Our Context-Aware Visual Grounding (CAVG) model is an advanced system that integrates five core encoders—Text, Image, Context, and Cross-Modal—with a Multimodal decoder. This integration enables the CAVG model to adeptly capture contextual semantics and to learn human emotional features, augmented by state-of-the-art Large Language Models (LLMs) including GPT-4. The architecture of CAVG is reinforced by the implementation of multi-head cross-modal attention mechanisms and a Region-Specific Dynamic (RSD) layer for attention modulation. This architectural design enables the model to efficiently process and interpret a range of cross-modal inputs, yielding a comprehensive understanding of the correlation between verbal commands and corresponding visual scenes. Empirical evaluations on the Talk2Car dataset, a real-world benchmark, demonstrate that CAVG establishes new standards in prediction accuracy and operational efficiency. Notably, the model exhibits exceptional performance even with limited training data, ranging from 50% to 75% of the full dataset. This feature highlights its effectiveness and potential for deployment in practical AV applications. Moreover, CAVG has shown remarkable robustness and adaptability in challenging scenarios, including long-text command interpretation, low-light conditions, ambiguous command contexts, inclement weather conditions, and densely populated urban environments. The code for the proposed model is available at our Github. Keywords Autonomous Driving · Visual Grounding · Cross-Modal Attention · Large Language Models · Human-Machine Interaction 1 Introduction While autonomous vehicles (AVs) herald a transformative era in urban mobility and have the potential to significantly reduce road accidents, their widespread acceptance remains hampered by public skepticism [1]. The root of this hesitancy often lies in concerns about trust and the perceived loss of control. These issues are exacerbated when AVs display indecisiveness or ambiguity in complex driving scenarios [2]. To address this trust gap, our research introduces a pioneering framework that augments human-AV interaction by effectively grounding natural language commands within visual contexts. Envision a scenario where a commander instructs an AV with a simple command like ""Park in a shaded ∗ Both authors contributed equally to this research; †Corresponding author." 2312.03557v1,"Article Momentum anisotropy generation in a hybrid approach † Niklas Götz 1,2 *, Lucas Constantin 1 and Hannah Elfner 3,1,2,4 1 2 3 4 * † Citation: Götz, N.; Constantin, L.; Elfner, H. Momentum anisotropy generation in a hybrid approach. Journal Not Specified 2023, 1, 0. https://doi.org/ Received: Revised: Accepted: Published: Copyright: © 2023 by the authors. Submitted to Journal Not Specified for possible open access publication under the terms and conditions of the Creative Commons Attri- bution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Goethe University Frankfurt, Department of Physics, Institute for Theoretical Physics, Frankfurt, Germany Frankfurt Institute for Advanced Studies, Ruth-Moufang-Strasse 1, 60438 Frankfurt am Main, Germany GSI Helmholtzzentrum für Schwerionenforschung, Planckstr. 1, 64291 Darmstadt, Germany Helmholtz Research Academy Hesse for FAIR (HFHF), GSI Helmholtz Center, Campus Frankfurt, Max-von-Laue-Straße 12, 60438 Frankfurt am Main, Germany Correspondence: goetz@fias.uni-frankfurt.de Presented at Hot Quarks 2022-Workshop for Young Scientists on the Physics of Ultrarelativistic Nucleus-Nucleus Collisions, Estes Park, USA, 11–17 October 2022. Abstract: Anisotropic flow emerges in all three of hybrid approaches: initial conditions, viscous relativistic hydrodynamics as well as hadronic transport. Previous works focus mainly on a constant or temperature dependent shear viscosity η/s. Here instead, we study qualitatively the effect of a generalized η/s ( T, µ B ) in the hybrid approach SMASH-vHLLE-hybrid. The parameterization takes into account the constraints of matching to the transport coefficients in the hadronic phase, as well as of recent Bayesian analysis results. We compare the effect of the different parameterizations in √ the intermediate energy region of s NN =7.7 – 39.0 GeV. We observe that using the energy density dependent parameterization decreases the effect of the point of particlization. In addition, we quantify the uncertainty due to different initial state profiles, including the SMASH initial conditions as well as TRENTo and IP-Glasma profiles. It can be shown that the initial state transverse momentum impacts final state momentum anisotropy. Keywords: relativistic heavy ion collisions; collective dynamics; hybrid approach; momentum anisotropy; shear viscosity; initial condition 1. Introduction There is an increasing interest in the theoretical description of heavy-ion collisions at finite baryon densities using hybrid approaches, which combine hadronic transport for the simulation of the early and late stages with relativistic hydrodynamics for the hot and dense stage. The inputs of the hydrodynamic evolution, especially the initial condition as well as the shear viscosity, determine the final state momentum anisotropy. Many theoretical predictions support a non-constant shear viscosity over entropy ratio η/s, with a minimum close to the phase transition [1–3]. Additionally, there also exists theoretical predictions of a dependence on the net baryochemical potential [4,5]. Existing studies focus mainly on a temperature dependence or even only a constant effective shear viscosity. Therefore, the following investigates the effects of including both a temperature and a baryochemical potential dependence in the shear viscosity on the evolution and observables of a hybrid simulation. A more in-depth examination of the dependence of the shear viscosity on the net baryon chemical potential can be found in [6]. Additionally, there exists significant theoretical uncertainty about the initial conditions of the hydrodynamic evolution. Due to the extremely short lifetime, the initial state of heavy ion collisions is experimentally not accessible, leading to a variety of initial state models to exist [7–10]. This limits the predictive strength of a Bayesian inference based on a singular initial state model. We compare in the following the effect of changing initial condition models in our framework. 2. Setup The following results were calculated from the hybrid approach SMASH-vHLLE- hybrid [10,11]. In order to create the SMASH initial condition, the hadronic transport Version December 7, 2023 submitted to Journal Not Specified https://www.mdpi.com/journal/notspecified" 2312.03559v1,"IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 18, NO. 9, OCTOBER 2020 1 MCAIMem: a Mixed SRAM and eDRAM Cell for Area and Energy-efficient on-chip AI Memory Duy-Thanh Nguyen, Abhiroop Bhattacharjee, Abhishek Moitra, and Priyadarshini Panda { duy-thanh.nguyen, abhiroop.bhattacharjee, abhishek.moitra, priya.panda } @yale.edu Department of Electrical Engineering, Yale University, USA Abstract—AI chips commonly employ SRAM memory as buffers for their reliability and speed, which contribute to high performance. However, SRAM is expensive and demands significant area and energy consumption. Previous studies have explored replacing SRAM with emerging technologies like nonvolatile memory, which offers fast-read memory access and a small cell area. Despite these advantages, non-volatile memory’s slow write memory access and high write energy consumption prevent it from surpassing SRAM performance in AI applications with extensive memory access requirements. Some research has also investigated eDRAM as an area-efficient on-chip memory with similar access times as SRAM. Still, refresh power remains a concern, leaving the trade-off between performance, area, and power consumption unresolved. To address this issue, our paper presents a novel mixed CMOS cell memory design that balances performance, area, and energy efficiency for AI memory by combining SRAM and eDRAM cells. We consider the proportion ratio of one SRAM and seven eDRAM cells in the memory to achieve area reduction using mixed CMOS cell memory. Additionally, we capitalize on the characteristics of DNN data representation and integrate asymmetric eDRAM cells to lower energy consumption. To validate our proposed MCAIMem solution, we conduct extensive simulations and benchmarking against traditional SRAM. Our results demonstrate that MCAIMem significantly outperforms these alternatives in terms of area and energy efficiency. Specifically, our MCAIMem can reduce the area by 48% and energy consumption by 3.4× compared to SRAM designs, without incurring any accuracy loss. Index Terms—AI, On-chip Memory, SRAM, eDRAM, Energy efficiency I. I NTRODUCTION Deep Neural Network (DNN) accelerators have become crucial components in various machine learning systems. DNNs store a large number of parameters to achieve high accuracy, resulting in high memory requirements. DNNs have proven their effectiveness in a wide range of applications, including image recognition [25], object detection [17], language translation [11], and autonomous driving [44]. State-of-the-art DNNs [11] require billions of operations and a huge memory to store activations and weights, as evidenced by the 240× increase in transformer size over two years [12]. Dedicated memory hierarchies have been designed to balance the lowcost storage provided by off-chip DRAMs and the energyefficient access offered by on-chip SRAMs [5]. This trend has Manuscript created October, 2023; This work was developed by the Yale University. This work is distributed under the L A TEX Project Public License (LPPL) ( http://www.latex-project.org/ ) version 1.3. A copy of the LPPL, version 1.3, is included in the base L A TEX documentation of all distributions of L A TEX released 2003/12/01 or later. The opinions expressed here are entirely that of the author. No warranty is expressed or implied. User assumes all risk. Fig. 1. (a) The breakdown of SRAM area and power in Eyeriss Chip [5] (Please note that, Eyeriss’ FIFO is implemented by SRAM), (b) Our proposed MCAIMem can reduce 48% area size and 3.4× power consumption compared to traditional 6T SRAM, and (c) eDRAM gain cell maintains its functionality even as the retention time diminishes at scaled technology nodes. led to an increase in the use of larger on-chip memory in cutting-edge DNN accelerators. For instance, SRAM accounts for 79.2% of the chip area and 42.5% of the power consumption in Eyeriss (as shown in Fig. 1.(a)), 67% of the chip area in chiplet designs like Simba [37], and the latest wafer-scale chips house up to 18 GB of on-chip memory [4]. Thus, we see that the use of on-chip SRAM memories results in higher power & area requirements. TABLE I E MBEDDED R ANDOM -A CCESS -M EMORY ( E RAM) C OMPARISON AT 65 NM CMOS TECHNOLOGY eRAM types SRAM Cell Size Avg. Static Power Refresh Leakage Additional Material 1× 1× No Ref. High No eDRAM (1T1C) 0.22× 0.2× Low Freq. Low Yes Symmetric eDRAM(3T) 0.47× 0.48× High Freq. Low No Asymmetric eDRAM(2T) 0.48× 0.19× High Freq. Low No 6T SRAMs have long been the preferred embedded memory choice because of their logic-compatible bit-cell, quick differential read, and static data retention [22]. However, their relatively large cell size and competing requirements for reading and writing at low operating voltages make scaling 6T SRAMs difficult in advanced CMOS technologies [22]. Recently, nonvolatile memories have captured the research community’s interest due to their small cell size, low cell leakage, and fast read access operation. Earlier studies [29], [35] have attempted" 2312.03573v1,"DATA-DRIVEN WASSERSTEIN DISTRIBUTIONALLY ROBUST NASH EQUILIBRIUM PROBLEMS ∗ GEORGE PANTAZIS † , BARBARA FRANCI ‡ , AND SERGIO GRAMMATICO § Abstract. We study stochastic Nash equilibrium problems subject to heterogeneous uncertainty on the cost functions of the individual agents. In our setting, we assume no prior knowledge of the underlying probability distribution of the uncertain variables. Adopting a data-driven distributionally robust approach, based on the so-called Wasserstein metric, where each agent constructs their own ambiguity set, we provide, under mild assumptions, finitesample guarantees on the probability that the data-driven distributionally robust Nash equilibrium is also robust with respect to the true probability distributions with high confidence. Furthermore, by recasting the game as a distributionally robust variational inequality, under appropriate conditions, we establish almost sure asymptotic convergence of the set of data-driven distributionally robust equilibria to the solution set of the original game. Finally, we recast the distributionally robust Nash game as a finite-dimensional Nash equilibrium problem. We illustrate the proposed distributionally robust reformulation via numerical experiments of stochastic Nash-Cournot games. Key words. Distributionally robust games, Stochastic optimization, Statistical Learning MSC codes. 68Q25, 68R10, 68U05 1. Introduction. A variety of applications in smart-grids [28], communication [29] and social networks [1] include self-interested interacting decision makers. An efficient analysis of such systems is typically achieved via game theory [3]. While the study of deterministic games can prove useful in various cases [29], [24], in the majority of applications, the decision problems are significantly affected by uncertainty, which needs to be explicitly incorporated into the models. A number of results in the literature have addressed uncertainty in a non-cooperative setting, on the basis of specific assumptions on the probability distribution [6], [32] and/or the geometry of the sample space of the uncertainty [2,19]. However, the uncertainty affecting the system might not exactly follow the imposed probabilistic model. Without an accurate knowedge of the underlying probability distributions that characterize the model uncertainty, sampling-based or data-driven techniques have shown the potential to provide satisfactory solutions. In [13, 14, 23] distribution-free probabilistic feasibility guarantees for randomised Nash equilibria were provided for the first time. These works were extended in [25] and [26], where a posteriori feasibility guarantees for the entire feasibility region were provided, thus also for sets of Nash equilibria. Following an approach similar to [25], the works [10, 11] provide tighter probabilistic feasibility guarantees by focusing only on sets of variational equilibria. The authors in [27] propose a methodology that provides tunable a priori robustness certificates for generalized Nash equilibrium problems with coupling uncertain constraints and possible strategic deviations from the equilibrium solution. Based on a different approach, the works [17, 18] propose equilibrium seeking algorithms for stochastic Nash equilibrium problems, formulating the cost functions with expected values. However, the aforementioned works do not incorporate into the game any form of robustness against variations in the distribution. As such, even if one is able to obtain a good estimate of the true probability distribution, this distribution might change over time, thus making the gathered data inadequate to provide good out-of sample generalization. This challenge becomes more pronounced in multi-agent settings with heterogeneous ∗ Submitted to the editors DATE. Funding: This work has been partially funded by the ERC under project COSMOS (802348). † Delft Center for Systems & Control, TU Delft (g.pantazis@tudelft.nl). ‡ Department of Advanced Computing Sciences in Maastricht University (b.franci@maastrichtuniversity.nl). § Delft Center for Systems & Control, TU Delft (s.grammatico@tudelft.nl). 1 This manuscript is for review purposes only." 2312.03577v1,"Improving Bias Mitigation through Bias Experts in Natural Language Understanding Eojin Jeon 1∗ , Mingyu Lee 1∗ , Juhyeong Park 1 , Yeachan Kim 1 , Wing-Lam Mok 1 , SangKeun Lee 1,2 1 Department of Artificial Intelligence 2 Department of Computer Science and Engineering Korea University, Seoul, Republic of Korea {skdlcm456, decon9201, johnida, yeachan, wlmokac, yalphy}@korea.ac.kr Abstract Biases in the dataset often enable the model to achieve high performance on in-distribution data, while poorly performing on out-ofdistribution data. To mitigate the detrimental effect of the bias on the networks, previous works have proposed debiasing methods that down-weight the biased examples identified by an auxiliary model, which is trained with explicit bias labels. However, finding a type of bias in datasets is a costly process. Therefore, recent studies have attempted to make the auxiliary model biased without the guidance (or annotation) of bias labels, by constraining the model’s training environment or the capability of the model itself. Despite the promising debiasing results of recent works, the multiclass learning objective, which has been naively used to train the auxiliary model, may harm the bias mitigation effect due to its regularization effect and competitive nature across classes. As an alternative, we propose a new debiasing framework that introduces binary classifiers between the auxiliary model and the main model, coined bias experts. Specifically, each bias expert is trained on a binary classification task derived from the multi-class classification task via the One-vs-Rest approach. Experimental results demonstrate that our proposed strategy improves the bias identification ability of the auxiliary model. Consequently, our debiased model consistently outperforms the state-ofthe-art on various challenge datasets. 1 1 Introduction Deep neural networks achieve state-of-the-art performances on a variety of multi-class classification tasks, including image classification (He et al., 2016) and natural language inference (Devlin et al., 2019). However, they are often biased towards spurious correlations between inputs and labels, which Main Model Main Model A B C Which class? Auxiliary Model A B C Class A? Class B? Class C? Bias Expert 1 Bias Expert 2 Bias Expert 3 Auxiliary Model Inputs Inputs (a) (b) Figure 1: Comparison between (a) existing debiasing methods and (b) our proposed framework. (a): identify biased examples by using an auxiliary model trained with the multi-class learning objective, the same as the main model. (b): introduce intermediate binary classifiers, called bias experts, between the auxiliary model and the main model. work well on a specific data distribution (Ribeiro et al., 2016; Zhu et al., 2017; Gururangan et al., 2018; McCoy et al., 2019). For instance, in natural language inference (NLI) tasks, neural networks are more likely to predict examples containing negation words as the contradiction class (Gururangan et al., 2018; Poliak et al., 2018). Ultimately, this unintended usage of bias results in poor model performance on out-of-distribution data or bias-conflicting 2 examples, where spurious correlations do not exist. Therefore, it is important to develop debiasing methods. Previous works have addressed the issue by guiding the main model to down-weight biased examples during training, which are identified by auxiliary models. The auxiliary models are models that intentionally learn bias features by utilizing human supervision (Kim et al., 2019; Schuster et al., 2019; Clark et al., 2019; Mahabadi et al., 2020) or ∗ These authors contributed equally to this work. Our code is available at https://github.com/jej127/ Bias-Experts. 1 2 Bias-conflicting examples indicate examples that cannot be correctly predicted by solely relying on biases." 2312.03585v1,"Xiaobo Yang Zhejiang University Hangzhou, China Xiaojin Gong Zhejiang University Hangzhou, China hal 42@zju.edu.cn gongxj@zju.edu.cn Image + GT Cls. CAM Seg. CAM Cls. Seed Seg. Seed 1. Introduction Weakly supervised semantic segmentation (WSSS) with image-level labels [1,39,42,49] has attracted a great amount of research interest due to its much lower annotation cost compared to fully supervised counterparts [3, 28, 38, 40]. Mainstream methods address this WSSS problem by obtaining reliable seeds and using them as pseudo labels to train an off-the-shelf segmentation network. Therefore, extensive efforts have been devoted to generating high-quality segmentation seeds. These methods often utilize class activation maps (CAMs) [35, 47] derived from image classi- person This work aims to leverage pre-trained foundation models, such as contrastive language-image pre-training (CLIP) and segment anything model (SAM), to address weakly supervised semantic segmentation (WSSS) using image-level labels. To this end, we propose a coarse-tofine framework based on CLIP and SAM for generating high-quality segmentation seeds. Specifically, we construct an image classification task and a seed segmentation task, which are jointly performed by CLIP with frozen weights and two sets of learnable task-specific prompts. A SAM- based seeding (SAMS) module is designed and applied to each task to produce either coarse or fine seed maps. Moreover, we design a multi-label contrastive loss supervised by image-level labels and a CAM activation loss supervised by the generated coarse seed map. These losses are used to learn the prompts, which are the only parts need to be learned in our framework. Once the prompts are learned, we input each image along with the learned segmentationspecific prompts into CLIP and the SAMS module to produce high-quality segmentation seeds. These seeds serve as pseudo labels to train an off-the-shelf segmentation network like other two-stage WSSS methods. Experiments show that our method achieves the state-of-the-art performance on PASCAL VOC 2012 and competitive results on MS COCO 2014. chair boat Abstract bird Foundation Model Assisted Weakly Supervised Semantic Segmentation Figure 1. Typical examples of the class activation maps (CAMs) and seed maps produced from the classification (Cls.) and segmentation (Seg.) tasks constructed in our coarse-to-fine framework. The CAMs only demonstrate the maps activated by a target class labelled on the left side, while the seed maps cover all foreground classes presented in the images. fication networks as initial seeds. However, the obtained CAMs tend to focus on the most discriminative parts rather than complete objects and may falsely activate the background. To improve them, various techniques such as adversarial erasing [19, 20, 39], saliency guidance [22, 45], affinity learning [1, 14, 42], and contrast learning [12, 49] have been exploited. Despite significant advancements achieved by these methods, the performance of WSSS still lags behind that of FSSS counterparts. Recently, pre-trained foundation models such as the contrastive language-image pre-training (CLIP) model [29] and the segment anything model (SAM) [17] have also been leveraged to improve the CAMs [16, 25, 41]. While these methods [16, 25, 41] have shown promising results, the way of using foundation models is still in its preliminary stage, leaving ample room for further exploration. For instance, in the adaptation of CLIP to WSSS, both CLIMS [41] and CLIP-ES [25] rely on manually-designed prompts, neglecting the potential benefits of using learnable prompts [48], which have demonstrated effectiveness in other vision tasks. Furthermore, when incorporating SAM into WSSS, a challenge arises as SAM commonly supports point- or box-" 2312.03593v1,"Streaming Algorithms for the k-Submodular Cover Problem Wenqi Wang a , Gregory Gutin b , Yaping Mao c , Donglei Du d , Xiaoyan Zhang a,∗ a School of Mathematical Science & Institute of Mathematics, Nanjing Normal University and Key Laboratory of Ministry of Education Numerical Simulation of Large Scale Complex Systems, Nanjing, 210023, China. b Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK, c School of Mathematics and Statistics and Academy of Plateau Science and Sustainability, Qinghai Normal University, Xining, Qinghai 810008, China d Faculty of Management, University of New Brunswick, Fredericton, New Brunswick, E3B9Y2, Canada, Abstract Given a natural number k ≥ 2, we consider the k-submodular cover problem (k-SC). The objective is to find a minimum cost subset of a ground set X subject to the value of a k-submodular utility function being at least a certain predetermined value τ . For this problem, we design a bicriteria algorithm with a cost at most O(1/ǫ) times the optimal value, while the utility is at least (1 − ǫ)τ /r, where r depends on the monotonicity of g. Keywords: k-submodular function; Submodular Cover; Approximation Algorithms; Streaming Algorithms; 1. Introduction Let R + denote the set of all non-negative real numbers. Given a ground set X , a set function g : 2 X → R + is called a submodular function if for any subset S, T ⊆ X , g(S) + g(T ) ≥ g(S ∪ T ) + g(S ∩ T ). The study of submodular set functions has attracted much attention due to their applications Corresponding author Email addresses: wenqiwangcc@nnu.edu.cn (Wenqi Wang), G.Gutin@rhul.ac.uk (Gregory Gutin), maoyaping@ymail.com (Yaping Mao), ddu@unb.ca (Donglei Du), zhangxiaoyan@njnu.edu.cn (Xiaoyan Zhang) ∗ Preprint submitted to Elsevier December 7, 2023" 2312.03594v1,"A Task is Worth One Word: Learning with Task Prompts for High-Quality Versatile Image Inpainting 1 Kai Chen 2 Junhao Zhuang * 1,2 Yanhong Zeng 2 Wenran Liu 2 Chun Yuan 1 2 Tsinghua Shenzhen International Graduate School, Tsinghua University Shanghai AI Laboratory {zhuangjunhao@mails, yuanc@sz}.tsinghua.edu.cn {zengyanhong, liuwenran, chenkai}@pjlab.org.cn Input + Mask Bald eagle Electric bulb Glass vase Gundam robot Hot air balloon Ice-cream Penguin Input + Mask SD-Inpainting Adobe Firefly PowerPaint Input + Mask Fitting degree: 𝛼𝛼 = 0.98 Input + Mask Fitting degree: 𝛼𝛼 = 0.5 Figure 1. PowerPaint is the first versatile image inpainting model that simultaneously achieves state-of-the-art results in various inpainting tasks such as text-guided object inpainting, context-aware image inpainting, shape-guided object inpainting with controllable shape-fitting, and outpainting. [Best viewed in color with zoom-in]. Abstract tility of the task prompt in PowerPaint by showcasing its effectiveness as a negative prompt for object removal. Additionally, we leverage prompt interpolation techniques to enable controllable shape-guided object inpainting. Finally, we extensively evaluate PowerPaint on various inpainting benchmarks to demonstrate its superior performance for versatile image inpainting. We release our codes and models on our project page: https://powerpaint.github.io/. Achieving high-quality versatile image inpainting, where user-specified regions are filled with plausible content according to user intent, presents a significant challenge. Existing methods face difficulties in simultaneously addressing context-aware image inpainting and text-guided object inpainting due to the distinct optimal training strategies required. To overcome this challenge, we introduce Power- Paint, the first high-quality and versatile inpainting model that excels in both tasks. First, we introduce learnable task prompts along with tailored fine-tuning strategies to guide the model’s focus on different inpainting targets explicitly. This enables PowerPaint to accomplish various inpainting tasks by utilizing different task prompts, resulting in stateof-the-art performance. Second, we demonstrate the versa- 1. Introduction Image inpainting aims to fill in user-specified regions in an image with plausible contents [4]. It has found widespread application in practical domains such as photo restoration [3, 17, 19] and object removal [21, 29, 35]. With the explosive popularity of text-to-image (T2I) models [24, 25, 27, 37], inpainting has become even more crucial, offering a flexible and interactive way to mask unsatisfied regions in generated 1 Work done during an internship in Shanghai AI Laboratory. Corresponding authors. 1" 2312.03596v1,"MMM: Generative Masked Motion Model Ekkasit Pinyoanuntapong, Pu Wang, Minwoo Lee Chen Chen University of North Carolina at Charlotte University of Central Florida {epinyoan, pwang13, Minwoo.Lee}@uncc.edu chen.chen@crcv.ucf.edu the figure walks in a counterclockwise circle, stopping at its starting point. a man puts both hands in the air a person walks forward in a straight line. a person crawls forward. the toon is crouched down on one knee, ... ___Transition___ a person jumps forward ___Transition___ a person balances on their left foot ... ___Transition___ a person reaches forward ... ___Transition___ a man walks in a circle ... ... a man rises from the ground, walks in a circle and sits back down on the ground. (a) Text to Motion (b) Upper Body Editing (c) Motion In-betweening (d) Long Sequence Generation Figure 1: MMM can generate precise human motions given fine-grained textual descriptions while enabling motion editing applications. Blue frames represent conditioned motion input and red frames are the generated motion. Motion in-betweening can be performed by filling the gaps between keyframes or major motion points, conditioned on text or without conditions. Upper body part editing is done by fixing the lower body motion generated by one text prompt and altering the upper body motion according to another input prompt. An arbitrary long motion sequence can be generated according to a story (i.e., a sequence of text prompts), where MMM generates the motion for each prompt (red frames), while “hallucinating” the nature and smooth motion transitions (blue frames) between neighboring prompts (without being explicitly trained on motion transition datasets) Abstract while guaranteeing smooth transitions between editing and non-editing parts. Extensive experiments on the HumanML3D and KIT-ML datasets demonstrate that MMM surpasses current leading methods in generating high-quality motion (evidenced by superior FID scores of 0.08 and 0.429), while offering advanced editing features such as body-part modification, motion in-betweening, and the synthesis of long motion sequences. In addition, MMM is two orders of magnitude faster on a single mid-range GPU than editable motion diffusion models. Our project page is available at https://exitudio.github.io/MMM-page. Recent advances in text-to-motion generation using diffusion and autoregressive models have shown promising results. However, these models often suffer from a trade-off between real-time performance, high fidelity, and motion editability. To address this gap, we introduce MMM, a novel yet simple motion generation paradigm based on Masked Motion Model. MMM consists of two key components: (1) a motion tokenizer that transforms 3D human motion into a sequence of discrete tokens in latent space, and (2) a conditional masked motion transformer that learns to predict randomly masked motion tokens, conditioned on the precomputed text tokens. By attending to motion and text tokens in all directions, MMM explicitly captures inherent dependency among motion tokens and semantic mapping between motion and text tokens. During inference, this allows parallel and iterative decoding of multiple motion tokens that are highly consistent with fine-grained text descriptions, therefore simultaneously achieving high-fidelity and high-speed motion generation. In addition, MMM has innate motion editability. By simply placing mask tokens in the place that needs editing, MMM automatically fills the gaps 1 Introduction Text-driven human motion generation has recently become an emerging research focus due to the semantic richness and user-friendly nature of natural language descriptions, with its broad applications in animation, film, VR/AR, and robotics. However, generating highfidelity motion that precisely aligns with text descriptors is challenging because of inherent differences between language and motion data distributions. To ad- 1" 2312.03619v1,"E VALUATION OF A CTIVE F EATURE A CQUISITION M ETHODS FOR S TATIC F EATURE S ETTINGS Henrik von Kleist 1,2,3 Alireza Zamanian 2,4 Ilya Shpitser 3 Narges Ahmidi 1,3,4 HENRIK . VONKLEIST @ HELMHOLTZ - MUNICH . DE ALIREZA . ZAMANIAN @ IKS . FRAUNHOFER . DE ISHPITS 1@ JHU . EDU NARGES . AHMIDI @ HELMHOLTZ - MUNICH . DE Institute of Computational Biology, Helmholtz Munich - German Research Center for Environmental Health, Neuherberg, Germany 2 TUM School of Computation, Information and Technology, Technical University of Munich, Garching, Germany 3 Department of Computer Science, Johns Hopkins University Baltimore, Baltimore, MD, USA 4 Fraunhofer Institute for Cognitive Systems IKS, Munich, Germany 1 A BSTRACT Active feature acquisition (AFA) agents, crucial in domains like healthcare where acquiring features is often costly or harmful, determine the optimal set of features for a subsequent classification task. As deploying an AFA agent introduces a shift in missingness distribution, it’s vital to assess its expected performance at deployment using retrospective data. In a companion paper, we introduce a semioffline reinforcement learning (RL) framework for active feature acquisition performance evaluation (AFAPE) where features are assumed to be time-dependent. Here, we study and extend the AFAPE problem to cover static feature settings, where features are time-invariant, and hence provide more flexibility to the AFA agents in deciding the order of the acquisitions. In this static feature setting, we derive and adapt new inverse probability weighting (IPW), direct method (DM), and double reinforcement learning (DRL) estimators within the semi-offline RL framework. These estimators can be applied when the missingness in the retrospective dataset follows a missing-at-random (MAR) pattern. They also can be applied to missing-not-at-random (MNAR) patterns in conjunction with appropriate existing missing data techniques. We illustrate the improved data efficiency offered by the semi-offline RL estimators in synthetic and real-world data experiments under synthetic MAR and MNAR missingness. Keywords active feature acquisition · semi-offline reinforcement learning · dynamic testing regimes · missing data · causal inference 1 Introduction Machine learning (ML) methods generally assume the ready availability of the complete set of input features at deployment, typically incurring little to no cost. However, this assumption does not hold universally, especially in scenarios where feature acquisitions are associated with substantial costs. In contexts like medical diagnostics, the cost of acquiring certain features, such as X-rays, biopsies, etc. encompasses not only financial costs but also poses potential risks to patient well-being. In such cases, the cost or harm of the feature acquisition should be balanced against the predictive value of the feature. Active feature acquisition (AFA) addresses this problem by training two AI components: i) the ""AFA agent,"" an AI system tasked with determining which features should be observed, and ii) an ML prediction model that undertakes the prediction task based on the acquired feature set. While missingness was effectively determined by, for example, a physician during the acquisition of the retrospective dataset, the missingness at deployment of the AFA agent is determined by the AFA agent, thereby leading to a missingness distribution shift. In our companion paper [1], we formulate the problem of active feature acquisition performance evaluation (AFAPE) which addresses the task of estimating the performance an AFA agent would have at deployment, from the retrospective dataset. Consequently, upon completing the AFAPE problem, the physician will be well-informed about expected rates of incorrect diagnoses and the average costs associated with feature acquisitions when the AFA system is put into operation. 1" 2312.03633v1,"Not All Large Language Models (LLMs) Succumb to the “Reversal Curse”: A Comparative Study of Deductive Logical Reasoning in BERT and GPT Models Da Wu 1* , Jingye Yang 1,2,* , Kai Wang 1,3,** 1 Raymond G. Perelman Center for Cellular and Molecular Therapeutics, Children's Hospital of Philadelphia, Philadelphia, PA 19104, USA 2 Department of Mathematics, University of Pennsylvania, Philadelphia, PA 19104, USA 3 Department of Pathology and Laboratory Medicine, University of Pennsylvania, Philadelphia, PA 19104, USA *: These authors contributed equally to this work. **: Correspondence should be addressed to: wangk@chop.edu" 2312.03635v1,"Towards Time Sensitive Networking on Smart Cities: Techniques, Challenges, and Solutions RUI LOPES, Instituto de Telecomunicações and Universidade de Aveiro, Portugal DUARTE RAPOSO, Instituto de Telecomunicações, Portugal SUSANA SARGENTO, Instituto de Telecomunicações and Universidade de Aveiro, Portugal The rapid proliferation of smart cities has transformed urban landscapes into dynamic ecosystems teeming with interconnected computational nodes and sensors. During this evolution, the search for seamless communication in time-critical scenarios has become evident. With the escalating complexity of urban environments, envisioning a future with a blend of autonomous and conventional systems, each demanding distinct quality-of-service considerations, services in smart cities vary criticality levels and necessitate differentiated traffic handling, prioritizing critical flows without compromising the network’s reliability or failing on hard real-time requirements. To tackle these challenges, in this article we propose a Time-Sensitive Networking (TSN) approach which, at the scale of a smart city network, presents multifaceted challenges, notably interoperability among diverse technologies and standards. Nonetheless, TSN emerges as a promising toolkit, encompassing synchronization, latency management, redundancy, and configuration functionalities crucial for addressing smart city challenges. Moreover, the article scrutinizes how TSN, predominantly utilized in domains like automotive and industry, can be tailored to suit the intricate needs of smart cities, emphasizing the necessity for adaptability and scalability in network design. This survey consolidates current research on TSN, outlining its potential in fortifying critical machine-to-machine communications within smart cities while highlighting future challenges, potential solutions, and a roadmap for integrating TSN effectively into the fabric of urban connectivity. CCS Concepts: • General and reference → Surveys and overviews; • Networks → Network structure; Mobile networks; Sensor networks; • Computer systems organization → Fault-tolerant network topologies. Additional Key Words and Phrases: Time-Sensitive Networks (TSN), Emergency Networks, Smart Cities ACM Reference Format: Rui Lopes, Duarte Raposo, and Susana Sargento. 2023. Towards Time Sensitive Networking on Smart Cities: Techniques, Challenges, and Solutions . ACM Comput. Surv. 0, 0, Article 0 (January 2023), 59 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The number of smart cities is increasing worldwide, with the number of people who live in cities rising dramatically in recent years, mostly from 2017 [106]. Several heterogeneous computational nodes and sensors are displaced to support the deployment of systems, covering the largest possible area of such urban locations. Authors’ addresses: Rui Lopes, ruieduardo.fa.lopes@ua.pt, Instituto de Telecomunicações and Universidade de Aveiro, Campus Universitário de Santiago, Aveiro, Portugal, 3810-868; Duarte Raposo, Instituto de Telecomunicações, Campus Universitário de Santiago, Aveiro, Portugal, 3810-868, draposo@av.it.pt; Susana Sargento, Instituto de Telecomunicações and Universidade de Aveiro, Campus Universitário de Santiago, Aveiro, Portugal, 3810-868, susana@ua.pt. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2312.03651v1,"MIRACLE : Inverse Reinforcement and Curriculum Learning Model for Human-inspired Mobile Robot Navigation Nihal Gunukula, Kshitij Tiwari and Aniket Bera Abstract—In emergency scenarios, mobile robots must navigate like humans, interpreting stimuli to locate potential victims rapidly without interfering with first responders. Existing socially-aware navigation algorithms face computational and adaptability challenges. To overcome these, we propose a solution, MIRACLE - an inverse reinforcement and curriculum learning model, that employs gamified learning to gather stimuli-driven human navigational data. This data is then used to train a Deep Inverse Maximum Entropy Reinforcement Learning model, reducing reliance on demonstrator abilities. Testing reveals a low loss of 2.7717 within a 400-sized environment, signifying humanlike response replication. Current databases lack comprehensive stimuli-driven data, necessitating our approach. By doing so, we enable robots to navigate emergency situations with human-like perception, enhancing their life-saving capabilities. I. I NTRODUCTION Mobile robots are being increasingly deployed in the workplace [1]–[3]. In these emergencies, the robots need to deal with partially-observable scenes- the location of the victim is unknown and it is up to the first responder to interpret the signs of life and localize the victim as accurately and rapidly as possible. Having a mobile robot perform this task would mean that the mobile robot must be able to respond to stimuli in a similar fashion as human beings. To do this, mobile robots need to employ adaptive and socially-aware navigation, i.e., the ability to interpret stimuli and navigate to the goal accordingly. The traditional approaches to address adaptive sociallyaware navigation were to utilize mathematical models [4], social forces [5], and probabilistic models [6]. These methods work by simulating human social navigation, which is then transferred to a mobile robot. With the recent advances in data-driven methods, machine learning has been the preferred approach because it allows the algorithm to learn, be flexible in new environments, and make real-time decisions while being generalizable across myriad conditions. In order to utilize machine learning, human navigation data, i.e., a compilation of trajectories that an individual takes in a given environment, is necessary to train the algorithm. The issue with this is that this data is typically gathered through observing real-world interactions and decisions which is tedious when trying to replicate a specific scenario to research. This method of real-world data collection also suffers from the fact that factors like urgency, prior understanding of the environment, comfort around other people, etc., can influence The authors are with the Department of Computer Science, Purdue University, USA, {ngunukul,tiwarik,ab}@purdue.edu Fig. 1. Illustrating the virtual environment (left) built for MIRACLE, alongside the UniTree GO1 mobile robot (right) that will replicate the stimulibased navigation behavior in the real world. navigational decisions, which can make it challenging to decipher which factors led to the resultant behavior. Another challenge with developing stimuli-driven navigation is the impact that demonstrators’ biases can have because a demonstrator’s poor decision, like colliding with a stationary object, would often be passed down to the mobile robot [7]. These biases can make the human navigational data convoluted for the algorithm, making it unable to discern what it should take away from the demonstration. To address this demonstrator’s bias issue, numerous learning techniques have been used, like the learning-relearning framework [7] and the adversarial inverse reinforcement model [8]. However, they both are too computationally expensive in comparison to the maximum entropy inverse reinforcement model, which uses entropy to embed variability in the algorithm to reduce demonstrator-induced bias [9]. On top of the aforementioned challenges, there is also a lack of real-world testing of stimuli-driven navigation algorithms on mobile robots [9]–[11]. Real-world testing is important because the real world is relatively more complex than simulation [12]. In this paper, we make the following novel contributions: • To easily gather large amounts of human stimulidriven navigational data, and allowing researchers to easily gather data for diverse scenarios, we utilize gamified learning to gather data regarding people’s response to stimuli in a controlled setting as shown in Fig. 1 (left). • To limit the impact of demonstrators’ bias, we developed a deep maximum entropy inverse reinforcement model to benefit from the variance that maximum entropy" 2312.03656v1,"Preprint. I NTERPRETABILITY I LLUSIONS IN THE G ENERALIZATION OF S IMPLIFIED M ODELS Dan Friedman 1,2∗ Andrew Lampinen 3 Lucas Dixon 1 Danqi Chen 2,3 Asma Ghandeharioun 1 Google Research 2 Princeton University 3 Google DeepMind dfriedman@cs.princeton.edu 1 A BSTRACT A common method to study deep learning systems is to use simplified model representations—for example, using singular value decomposition to visualize the model’s hidden states in a lower dimensional space. This approach assumes that the results of these simplifications are faithful to the original model. Here, we illustrate an important caveat to this assumption: even if the simplified representations can accurately approximate the full model on the training set, they may fail to accurately capture the model’s behavior out of distribution—the understanding developed from simplified representations may be an illusion. We illustrate this by training Transformer models on controlled datasets with systematic generalization splits. First, we train models on the Dyck balanced-parenthesis languages. We simplify these models using tools like dimensionality reduction and clustering, and then explicitly test how these simplified proxies match the behavior of the original model on various out-of-distribution test sets. We find that the simplified proxies are generally less faithful out of distribution. In cases where the original model generalizes to novel structures or deeper depths, the simplified versions may fail, or generalize better. This finding holds even if the simplified representations do not directly depend on the training distribution. Next, we study a more naturalistic task: predicting the next character in a dataset of computer code. We find similar generalization gaps between the original model and simplified proxies, and conduct further analysis to investigate which aspects of the code completion task are associated with the largest gaps. Together, our results raise questions about the extent to which mechanistic interpretations derived using tools like SVD can reliably predict what a model will do in novel situations. 1 I NTRODUCTION How can we understand deep learning models? Often, we begin by simplifying the model, or its representations, using tools like dimensionality reduction, clustering, and discretization. We then interpret the results of these simplifications—for example finding dimensions in the principal components that encode a task-relevant feature (e.g. Liu et al., 2022; Power et al., 2022; Zhong et al., 2023; Chughtai et al., 2023; Lieberum et al., 2023). In other words, we are essentially replacing the original model with a simplified proxy which uses a more limited—and thus easier to interpret—set of features. By analyzing these simplified proxies, we hope to understand at an abstract level how the system solves a task. Ideally, this understanding could help us to predict how the model will behave in unfamiliar situations, and thereby anticipate failure cases or potentially unsafe behavior. However, in order to arrive at understanding by simplifying a model, we have to assume that the result of the simplification is a relatively faithful proxy for the original model. For example, we need to assume that the principal components of the model representations, by capturing most of the variance, are thereby capturing the important details of the model’s representations for its computations. In this work, we question whether this assumption is valid. First, some model simplifications, like PCA, are not computed solely from the model itself; they are calculated with respect to the model’s representations for a particular collection of inputs, and therefore depend on the input data distribution. Second, even when a simplification does not explicitly depend on the training distribution, ∗ Work done while the author was a Student Researcher at Google Research. 1" 2312.03684v1,"Spontaneous Chirality Flipping in an Orthogonal Spin-Charge Ordered Topological Magnet H. Miao 1,*,# , J. Bouaziz 2,*,# , G. Fabbris 3,* , W. R. Meier 4 , F. Z. Yang 1 , H. X. Li 1,5 , C. Nelson 6 , E. Vescovo 6 , S. Zhang 7 , A. Christianson 1 , H. N. Lee 1 , Y. Zhang 4,8 , C. Bartista 4,9 , S. Blügel 2 1 2 Materials Science and Technology Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA Peter Grünberg Institut and Institute for Advanced Simulation, Forschungszentrum Jülich &JARA, D-52425 Jülich, Germany 3 4 5 Advanced Photon Source, Argonne National Laboratory, Argonne, Illinois 60439, USA Department of Physics and Astronomy, The University of Tennessee, Knoxville, Tennessee, 37996, USA Advanced Materials Thrust, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China 6 National Synchrotron Light Source II, Brookhaven National Laboratory, Upton, New York 11973, USA 7 8 Max-Planck-Institut fur Physik komplexer Systeme, Nothnitzer Straße 38, 01187 Dresden, Germany Min H. Kao Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, Tennessee 37996, USA 9 Quantum Condensed Matter Division and Shull-Wollan Center, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA *These authors are contributed equally. #Correspondence should be addressed to miaoh@ornl.gov; j.bouaziz@fz-juelich.de. The asymmetric distribution of chiral objects with opposite chirality is of great fundamental interests ranging from molecular biology to particle physics 1 . In quantum materials, chiral states can build on inversion-symmetry-breaking lattice structures or emerge from spontaneous magnetic ordering induced by competing interactions. Although the handedness of a chiral state can be changed through external fields 2,3 , a spontaneous chirality flipping has yet to be discovered. In this letter, we present experimental evidence of chirality flipping via changing temperature in a topological magnet EuAl 4 , which features orthogonal spin and charge density waves (SDW/CDW). Using circular dichroism of Bragg peaks in the resonant magnetic x-ray scattering, we find that the chirality of the helical SDW flips through a first order phase transition with modified SDW wavelength. Intriguingly, we observe that the CDW couples strongly with the SDW and displays a rare commensurate-to- incommensurate transition at the chirality flipping temperature. Combining with first" 2312.03694v1,"1 Parameter-Efficient Transfer Learning of Audio Spectrogram Transformers Umberto Cappellazzo, Graduate Student Member, IEEE, Daniele Falavigna, Alessio Brutti, Member, IEEE, and Mirco Ravanelli, Fellow, IEEE Abstract—The common modus operandi of fine-tuning large pre-trained Transformer models entails the adaptation of all their parameters (i.e., full fine-tuning). While achieving striking results on multiple tasks, this approach becomes unfeasible as the model size and the number of downstream tasks increase. In natural language processing and computer vision, parameter-efficient approaches like prompt-tuning and adapters have emerged as solid alternatives by fine-tuning only a small number of extra parameters, without sacrificing performance accuracy. Specifically, adapters, due to their flexibility, have recently garnered significant attention, leading to several variants. For audio classification tasks, the Audio Spectrogram Transformer model shows impressive results. However, surprisingly, how to efficiently adapt it to several downstream tasks has not been tackled before. In this paper, we bridge this gap and present a detailed investigation of common parameter-efficient methods, revealing that adapters consistently outperform the other methods across four benchmarks. This trend is also confirmed in few-shot learning settings and when the total number of trainable parameters increases, demonstrating adapters’ superior scalability. We finally study the best adapter configuration, as well as the role of residual connections in the learning process. Our code is available at: https://github.com/umbertocappellazzo/PETL AST. Index Terms—Parameter-efficient transfer learning, Audio Spectrogram Transformer, adapter, prompt-tuning, LoRA I. I NTRODUCTION Transfer learning from foundations models pre-trained on a vast amount of data is a well-established paradigm in machine learning, resulting in superb performance across various domains like natural language processing (NLP) [1], vision [2], and speech processing [3]. Typically, when the pre-trained model is adapted to downstream tasks, all its parameters are updated (i.e., full fine-tuning) [4], [5]. Despite its popularity, the full fine-tuning approach suffers some important drawbacks. First of all, given the ever-growing size of pre-trained models, such as GPT-3 [6] (up to 175 billion parameters) and Whisper Large [7] (1.55 billion parameters), fine-tuning the whole model is often exorbitantly expensive and could potentially result in overfitting, particularly when dealing with a limited-size downstream dataset. Second, this method is We acknowledge the support of the Digital Research Alliance of Canada (alliancecan.ca). Umberto Cappellazzo is with the University of Trento, Via Sommarive, 9, 38122 Povo TN, Italy (e-mail: umberto.cappellazzo@unitn.it). Daniele Falavigna and Alessio Brutti are with Fondazione Bruno Kessler, Via Sommarive, 18 - POVO 38123 Trento TN, Italy (e-mail: falavi@fbk.eu, brutti@fbk.eu). Mirco Ravanelli is with Concordia University, Montréal, QC H3G 1M8, Canada (e-mail: mirco.ravanelli@concordia.ca). storage-inefficient in that it needs to keep a replica of the pre-trained model for every downstream task. In light of these limitations, some lightweight alternatives, categorized as parameter-efficient transfer learning (PETL), have been introduced for Transformer models [8]. The general idea is to keep most of the pre-trained model’s parameters frozen and instead learn only a small amount of extra parameters. For example, a few task-specific learnable parameters (i.e., prompts) are prepended either to the input sequence (Prompt-tuning) [9], [10], or to the key and value matrices of the multi-head self-attention (MHSA) block at each Transformer layer (Prefix-tuning) [11]. Alternatively, Adaptertuning introduces small neural modules called adapters to all layers [12]. Typical implementations add the adapter after both the MHSA and fully connected feed-forward network (FFN) blocks (called Houlsby) [13], or only after the FFN (Pfeiffer) [14]. Another popular approach is LoRA [15], which learns low-rank matrices to approximate parameter updates and reduce the number of trainable parameters. While PETL methods have been originally proposed and investigated in NLP and vision domains, more recently they have also been adopted in the speech field. Specifically, prompttuning and adapters show competitive performance to full finetuning for various speech classification tasks [20], [21] and for Automatic Speech Recognition (ASR) [22], [23], [24]. For audio classification, the Audio Spectrogram Transformer (AST) [18] obtains superb results, standing out as the state-ofthe-art model for several downstream tasks. As for the Vision Transformer [17], the problem of how to efficiently transfer the knowledge of the AST is of crucial importance, especially given the typical computational and storage constraints of audio devices. Surprisingly, this topic has received minimal attention. Indeed, only the work in [25] carries out some preliminary experiments on PETL methods for AST, yet its focus is on parameter-efficient continual learning. Given the above arguments, in this paper, we provide an extensive investigation of the most common PETL approaches applied to the AST model for audio and speech downstream tasks. Our experiments reveal that adapter-tuning outperforms the other baselines by a consistent margin across multiple datasets, with the Houlsby configuration providing the best results. This trend is also confirmed when we vary the number of trainable parameters and when we consider a few-shot learning setting. Finally, we carry out ablation studies about adapter configuration design, showing that inserting the adapter in the MHSA block rather than FFN leads to better results and that residual connections play a key role in the final accuracy." 2312.03702v1,"universe Article Coulomb-Nuclear Interference in polarized pA scattering Boris Kopeliovich 1, *, Michal Krelina 2 , Irina Potashnikova 1 1 2 * Citation: Kopeliovich, Krelina, Potashnikova Coulomb-Nuclear Interference in polarized pA scattering. Universe 2023, 1, 0. https://doi.org/ Received: Accepted: Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article Universidad Técnica Federico Santa María, Avenida España 1680, Valparaíso, Chile Czech Technical University in Prague, FNSPE, Břehová 7, 11519 Prague, Czech Republic Correspondence: boris.kopeliovich@usm.cl Abstract: We made the first attempt to understand the observed unusual t-dependence of singlespin asymmetry observed in the HJET experiment at RHIC. On the contrary to the usual division of the interaction amplitudes to pure electromagnetic and strong interaction terms with Coulomb corrections (Coulomb phase), we combine Usually the interaction of hadrons is is presented as long-range Coulomb interaction and short-range strong interaction with Coulomb corrections. Such a division gives rise to a Coulomb phase of the hadronic term. On the contrary, here we consider short-range hadronic interaction as a correction to the long-range electromagnetic term, i.e. treat it as absorptive corrections. They significantly affect the Coulomb-nuclear interference, which is a source of single-spin azimuthal asymmetry at very small angles. Keywords: single spin asymmetry, Coulomb nuclear interference, Pomeron spin 1. Introduction Azimuthal asymmetry A N in polarized elastic hadronic scattering comes from interference of the spin-flip f s f and non-flip f n f amplitudes. The differential elastic cross sections and single-spin asymmetry A N ( t ) , where t is 4-momentum transfer squared, are expressed via these amplitudes as, dσ el dt dσ el A N dt   = π | f n f | 2 + | f s f | 2 ,   = − 2π Im f n f f s ∗ f . (1) (2) This is why polarization effects are usually considered as a sensitive tool for study of the hadron interaction dynamics [1,2]. In the Regge-pole model the pure hadronic asymmetry Eq. (2) vanishes because f s h f and f s h f have the same phase given by the signature factor. To maximize A N ( t ) one should combine hadronic and electromagnetic amplitudes [3]. While the former is predominantly imaginary, the latter is nearly real. Apparently, a sizable effect is expected at small momentum transfer squared t, where the Coulomb and hadronic amplitudes are of the same order. The t dependence of asymmetry in pp scattering is described in a simplified approximation [3] by, 4y 3/2 pp pp A N ( t ) = A N ( t p ) 2 , (3) 3y + 1 pp where y = − t/t p and distributed under the terms and pp t p = A N ( t p ) = conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Universe 2023, 1, 0. https://doi.org/10.3390/universe1010000 pp √ 8 3πα em ; pp σ tot p 3t p ( µ p − 1 ) . 4m p (4) (5) https://www.mdpi.com/journal/universe" 2312.03719v1,"Assessing AI Chatbots Performance in Comprehensive Standardized Test Preparation – A Case Study with GRE Mohammad Abu-Haifa 1 , Bara'a Etawi 2 , Huthaifa Alkhatatbeh 3 and Ayman Ababneh 4 * Correspondence: mabuh004@fiu.edu PhD, Senior Forensics Engineer, Thornton Tomasetti, Orlando, FL, USA 2 Former Student at Computer Engineering Department, Yarmouk University, Irbid, Jordan 3 Structural Engineer, Ministry of Municipal Affairs, Irbid, Jordan 4 Professor at Civil Engineering Department, Jordan University of Science and Technology, Irbid, Jordan 1 ABSTRACT This research paper presents a comprehensive evaluation of the performance of three artificial intelligence chatbots: Bing, ChatGPT, and GPT-4, in addressing standardized test questions. Graduate record examination, known as GRE, serves as a case study in this paper, encompassing both quantitative reasoning and verbal skills. A total of 137 quantitative reasoning questions, featuring diverse styles and 157 verbal questions categorized into varying levels of difficulty (easy, medium, and hard) were administered to assess the chatbots' capabilities. This paper provides a detailed examination of the results and their implications for the utilization of artificial intelligence in standardized test preparation by presenting the performance of each chatbot across various skills and styles tested in the exam. Additionally, this paper explores the proficiency of artificial intelligence in addressing image-based questions and illustrates the uncertainty level of each chatbot. The results reveal varying degrees of success across the chatbots, demonstrating the influence of model sophistication and training data. GPT-4 emerged as the most proficient, especially in complex language understanding tasks, highlighting the evolution of artificial intelligence in language comprehension and its ability to pass the exam with a high score. Keywords: Technology-based learning, Graduate record examination, Natural language processing, artificial intelligence chatbots 1" 2312.03722v1,"Leveraging AI-derived Data for Carbon Accounting: Information Extraction from Alternative Sources Olamide Oladeji 1,2 , Seyed Shahabeddin Mousavi 1,2 1 2 Department of Management Science & Engineering, Stanford University, Stanford, CA, USA Sustainable Finance Initiative, Precourt Institute for Energy, Stanford University, Stanford, CA, USA oladeji@stanford.edu, ssmousav@cs.stanford.edu Abstract Carbon accounting is a fundamental building block in our global path to emissions reduction and decarbonization, yet many challenges exist in achieving reliable and trusted carbon accounting measures. We motivate that carbon accounting not only needs to be more datadriven, but also more methodologically sound. We discuss the need for alternative, more diverse data sources that can play a significant role on our path to trusted carbon accounting procedures and elaborate on not only why, but how Artificial Intelligence (AI) in general and Natural Language Processing (NLP) in particular can unlock reasonable access to a treasure trove of alternative data sets in light of the recent advances in the field that better enable the utilization of unstructured data in this process. We present a case study of the recent developments on real-world data via an NLP-powered analysis using OpenAI’s GPT API on financial and shipping data. We conclude the paper with a discussion on how these methods and approaches can be integrated into a broader framework for AI-enabled integrative carbon accounting. Introduction The urgent need to mitigate climate change necessitates innovative approaches to track and manage greenhouse gas (GHG) emissions across various sectors, with effective carbon accounting being a critical step not only to track emissions but also for the achievement of global GHG emissions reduction goals. However, given the complex and dynamic nature of carbon emissions and sequestration, conventional methods often fall short in providing accurate, timely, and granular data (Brander, Gillenwater, and Ascui 2018) (Hayek and Miller 2021). The integration of Artificial Intelligence (AI) techniques can address these challenges, enhancing the efficacy and precision of carbon accounting. AI-derived data, as gleaned through the application of advanced machine learning methods, offers us unprecedented opportunities for refined, dynamic, and real-time carbon accounting. In particular, Natural Language Processing (NLP) and Computer Vision (CV) stand out as promising AI techniques that can significantly enhance the world of carbon ac- Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. counting. NLP techniques can aid in extracting meaningful data from voluminous and unstructured text, such as corporate filings or shipping records, that are imperative for understanding emissions across supply chains. At the same time, CV methods can enable the detection and tracking of significant carbon sources and sinks, such as wildfires and forests, via satellite imagery and remote sensing. Both techniques, especially when integrated into carbon accounting practices, can pave the way for more accurate and comprehensive monitoring and management of carbon emissions and sequestration across varied sectors and scales. This application of AI to carbon accounting is what we explore in this paper, with a particular emphasis on the illustrative use case of NLP for supply chain emissions tracking. The work presented in this paper aims to demonstrate the efficacy of NLP in extracting emissions related information from supply chain textual sources, thereby facilitating the creation and continuous updating of a comprehensive knowledge graph for emissions tracking and management. Conventional methods such as manual documentation and reporting may sometimes be inadequate for this task given its scale and complexity as such mapping may need to be undertaken for an entire industry. It is the scalability that makes NLP entity recognition and relationship extraction algorithms a promising approach. The approach we present in this paper involves applying these techniques to earnings calls transcript data and shipping data with the goal of generating a dynamic, detailed model of supply chain e-liabilities and inform mitigation efforts. These approaches, when integrated with an appropriate E-liability knowledge graph framework, could transform our understanding and management of carbon emissions within supply chains, thereby facilitating effective emissions liability management. Motivation and Related Work The complex task of managing carbon emissions within supply chains calls for a transformative approach that can process and extract insights from vast datasets. In this context, the utility of AI and Natural Language Processing (NLP) has been increasingly recognized (Stede and Patz 2021) (Islam et al. 2022). NLP, in particular, with its capability to parse textual data and extract meaningful content, has been adopted across various domains, such as sentiment analysis (Loureiro and Alló 2020) and automated summarization (Is-" 2312.03725v1,"SCStory: Self-supervised and Continual Online Story Discovery Susik Yoon Yu Meng Dongha Lee Jiawei Han UIUC susik@illinois.edu UIUC yumeng5@illinois.edu Yonsei University donalee@yonsei.ac.kr UIUC hanj@illinois.edu ABSTRACT We present a framework SCStory for online story discovery, that helps people digest rapidly published news article streams in realtime without human annotations. To organize news article streams into stories, existing approaches directly encode the articles and cluster them based on representation similarity. However, these methods yield noisy and inaccurate story discovery results because the generic article embeddings do not effectively reflect the storyindicative semantics in an article and cannot adapt to the rapidly evolving news article streams. SCStory employs self-supervised and continual learning with a novel idea of story-indicative adaptive modeling of news article streams. With a lightweight hierarchical embedding module that first learns sentence representations and then article representations, SCStory identifies story-relevant information of news articles and uses them to discover stories. The embedding module is continuously updated to adapt to evolving news streams with a contrastive learning objective, backed up by two unique techniques, confidence-aware memory replay and prioritized-augmentation, employed for label absence and data scarcity problems. Thorough experiments on real and the latest news data sets demonstrate that SCStory outperforms existing state-of-the-art algorithms for unsupervised online story discovery. CCS CONCEPTS • Information systems → Web searching and information discovery; Data stream mining; Document representation. KEYWORDS News Stream Mining, News Story Discovery, Document Embedding ACM Reference Format: Susik Yoon, Yu Meng, Dongha Lee, and Jiawei Han. 2023. SCStory: Selfsupervised and Continual Online Story Discovery. In Proceedings of the ACM Web Conference 2023 (WWW ’23), May 1–5, 2023, Austin, TX, USA. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3543507.3583507 1 INTRODUCTION These days, news articles covering real-time events are massively published through online platforms. Real-time discovery of news stories with articles under unique themes brings huge benefits not only for individuals to follow emerging news stories but also for Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WWW ’23, May 1–5, 2023, Austin, TX, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-9416-1/23/04. . . $15.00 https://doi.org/10.1145/3543507.3583507 organizations to make strategic decisions. This calls for practical solutions for online news story discovery, thereby enabling downstream tasks such as summarization and recommendation [12, 24, 45], event detection and tracking [34, 49, 50], and curation (e.g., Google News). Existing studies for online news story discovery embed articles and incrementally cluster them into stories. Some of them utilize external knowledge (e.g., entity or story labels) to train embedding and clustering models [26, 30, 33]. Another line of efforts adopts an unsupervised approach, which is more practical in an online scenario, with symbolic- or graph-based embedding based on keywords statistics and online clustering [1, 22, 36]. These studies, however, have fundamental limitations in capturing diversified and evolving context of news article streams, as they use static and explicit features for embedding and clustering. News articles often contain diverse descriptions depending on the reporters’ perspectives and writing styles, some of which may not directly indicate the major theme of the stories. This makes distinguishing stories more challenging because the same story may be reported with diverse themes by different media sources, whereas different stories from the same media source may contain overlapping themes. Moreover, the themes will gradually change over time as new articles with fresh stories are rapidly published. For instance, in Figure 1, news articles of two stories, A: Covid-19 Pandemic and B: Children with Hepatitis, are being published. When a new article is given, existing approaches indiscriminately encode the whole content based on keywords statistics or a static embedding model without considering its story-distinctiveness. While the two stories are clearly different, their articles contain common keywords (e.g., ‘children’, ‘covid’, and ‘infection’) and descriptions with too similar (e.g., ‘many children have caught ...’) or too specific (e.g., ‘her 9-year-old son, Jack, ...’) semantics. The keywords and semantics will also dynamically change as stories evolve, making it more difficult to cluster articles into correct stories. To tackle this problem and enable more effective online story discovery, we propose a novel idea called story-indicative adaptive modeling of news article streams. In Figure 1, the sentences highlighted in each article are more specifically relevant to the corresponding story than to another story. If one can identify and focus on such story-relevant information in each article in the context of concurrent stories, it becomes much clearer that the new article should fall in Story B. However, there are non-trivial technical challenges to achieve this goal: (1) Story-indicative semantics need to be identified from the unstructured and diverse contents (i.e., diversified local context). (2) The ever-changing distinctive themes shared among news articles in concurrent stories must be considered (i.e., evolving global context). (3) It is almost impossible to obtain human annotations due to the rapidly and massively published news articles (i.e., no supervision). (4) The model should be scalable and adaptable to such rapid and massive news article streams (i.e., efficient adaptation)." 2312.03735v1,"Advancing State of the Art in Language Modeling David Herel FEE, CTU CIIRC CTU david.herel@seznam.cz Tomas Mikolov CIIRC CTU tmikolov@gmail.com Abstract Generalization is arguably the most important goal of statistical language modeling research. Publicly available benchmarks and papers published with an open-source code have been critical to advancing the field. However, it is often very difficult, and sometimes even impossible, to reproduce the results fully as reported in publications. In this paper, we propose a simple framework that should help advance the state of the art in language modeling in terms of generalization. We propose to publish not just the code, but also probabilities on dev and test sets with future publications so that one can easily add the new model into an ensemble. This has crucial advantages: it is much easier to determine whether a newly proposed model is actually complementary to the current baseline. Therefore, instead of inventing new names for the old tricks, the scientific community can advance faster. Finally, this approach promotes diversity of ideas: one does not need to create an individual model that is the new state of the art to attract attention; it will be sufficient to develop a new model that learns patterns which other models do not. Thus, even a suboptimal model can be found to have value. Remarkably, our approach has yielded new state-ofthe-art results across various language modeling benchmarks up to 10%. 1 Introduction Statistical language modeling has been around since the work of Claude Shannon in 1950 (Shannon, 1951). For decades, it was believed that the state of the art in language modeling are the n-gram techniques. While dozens of more advanced approaches have been developed (including neural language models), it was believed that those alternatives only work on small datasets, and with increasing amount of data, the improvements over n-grams vanish (Goodman, 2001). This has changed and neural language models are the mainstream techniques now. However, de- Figure 1: This visualization illustrates the concept of ensemble application on a language modeling dataset. It enables easy identification of models that are either obsolete or complementary to the current state-of-theart. Notably, the models do not necessarily have to be state-of-the-art themselves; they simply need to complement the existing state-of-the-art models effectively. spite the almost exponential growth of interest in neural language modeling in the last decade, it is still very difficult to advance the state of the art. Many top language models today are simply too large and expensive to be explored efficiently in academia, especially their training phase. While there is a range of benchmarks that are more suitable for research purposes due to the limited training data, it is still very hard to reproduce the stateof-the-art results. Many projects are published with open-source code that doesn’t work as advertised in the papers, or with rather complex implementations that are very difficult to extend. Since the best published results often use several tricks together, any new idea faces a significant barrier which may prevent its publication: it may simply be too hard to show its value and impress the reviewers. In this paper, we propose to address this issue. We suggest that researchers should publish not just their papers with code, but also with probabilities" 2312.03743v1,"Easy Data Augmentation in Sentiment Analysis of Cyberbullying Alwan Wirawan Department of Informatics Faculty of Information Technology and Science Data Universitas Sebelas Maret Surakarta, Indonesia alwanwrwn@student.uns.ac.id Hasan Dwi Cahyono Department of Informatics Faculty of Information Technology and Science Data Universitas Sebelas Maret Surakarta, Indonesia hasandc@staff.uns.ac.id Winarno Department of Informatics Faculty of Information Technology and Science Data Universitas Sebelas Maret Surakarta, Indonesia win@staff.uns.ac.id Abstract—Instagram, a social media platform, has in the vicinity of 2 billion active users in 2023. The platform allows users to post photos and videos with one another. However, cyberbullying remains a significant problem for about 50% of young Indonesians. To address this issue, sentiment analysis for comment filtering uses a Support Vector Machine (SVM) and Easy Data Augmentation (EDA). EDA will augment the dataset, enabling robust prediction and analysis of cyberbullying by introducing more variation. Based on the tests, SVM combination with EDA results in a 2.52% increase in the k-Fold Cross Validation score. Our proposed approach shows an improved accuracy of 92.5%, 2.5% higher than that of the existing state-of-the-art method. To maintain the reproducibility and replicability of this research, the source code can be accessed at uns.id/eda_svm. A previous study has explored sentiment analysis to prevent cyberbullying and used the Support Vector Machine (SVM) [4]. Using 400 heterogeneous cases as the dataset, the SVM algorithm is used to carry out a sentiment analysis on comment objects on Instagram and reported to have a promising result with an accuracy of 90%. The performance of this model is promising and can potentially be improved, especially when the dataset is small (less than 1280 samples per class). With a small dataset for training, a model is more likely to learn the specifics of the training data than that of the underlying patterns, as the model has not seen enough examples of different ways to represent data and maintains the model generality on the testing dataset. Thus, understanding underlying patterns is essential when classifying new data [5]. Keywords—Cyberbullying, Support Vector Machine, Easy Data Augmentation, k-Fold Cross Validation To understand the patterns, two studies compare augmentation methods across various datasets. The first study [6] exercises a generative model that combines Variational Autoencoding (VAE) with prior and posterior sampling to produce fake data. The result of this study is a 0.04% and 2.02% increase in two different data sets. The second approach, employing a two-way language model to replace words with other words inferred from the context of sentences, led to an increase of 0.5% in five datasets [7]. To train a VAE or a two-way language model, however, the computational costs are high, which limits the implementation of these models. Easy Data Augmentation (EDA), which requires no model language training and external data sets, produces comparable results to the VAE and two-way language models while maintaining its computational simplicity [8] by creating new synthetic data. Synthetic data is instrumental in Natural Language Processing in which data can be scarce or difficult to obtain, while models must be able to handle multiple inputs and variations. I. I NTRODUCTION Instagram is a popular social media site enabling users to share photographs and videos. There are approximately 2 billion active Instagram users by 2023. The active users consist of various groups of ages, from children to adults. Further, the purpose of these users can vary, namely displaying personal profiles for ordinary people and artists and business promotion tools [1]. Regardless of the intention, the majority of Instagram users are still unaware that online interactions can be harmful and can cause cyberbullying – bullying that occurs on the internet. Even interactions in the form of ratings or comments can also be considered cyberbullying without the users of Instagram being aware of it by Instagram users. This lack of awareness warns users, parents, relatives, and governments to reduce this harmful behavior. According to UNICEF, at least 50% of teenagers in Indonesia have experienced cyberbullying. In fact, nearly 22.4% of the 161 violent cases reported to the Indonesian Child Protection Commission (KPAI) in 2018 involved cyberbullying [2]. To mitigate the impact of cyberbullying in social media, sentiment analysis is utilized to filter comments. Sentiment analysis will then determine which comments are good and which are not. A non-offensive comment contains positive words and has a positive purpose, while vice versa for an offensive comment. Comment filtering can be an effort to prevent cyberbullying victims from being exposed to harmful comments after being filtered. Thus, the emotional and psychological damage caused by cyberbullying can be minimized [3]. Therefore, in this research, we explore using SVM as a machine learning [4] and investigate the EDA method to augment the data. EDA will create a new sample by transforming the existing ones. To select the optimal results, sample transformations are also investigated, in particular by adding synonyms, swapping two words in one sentence, or deleting one of the words. By applying these techniques to the existing data, we can create new synthetic data that can be utilized to train models more effectively. II. R ELATED W ORK This research follows [4] for the classification of comment sentiment framework related to cyberbullying on Instagram using SVM. With training data composed of 50%" 2312.03749v1,"C ONCEPTUAL E NGINEERING U SING L ARGE L ANGUAGE M ODELS E XTENDED A BSTRACT , ACCEPTED FOR PRESENTATION AT THE 5 TH C ONFERENCE ON P HILOSOPHY OF A RTIFICIAL I NTELLIGENCE , E RLANGEN , 15 – 16 D ECEMBER 2023 Bradley P. Allen University of Amsterdam b.p.allen@uva.nl A BSTRACT We describe a method, based on Jennifer Nado’s definition of classification procedures as targets of conceptual engineering, that implements such procedures using a large language model. We then apply this method using data from the Wikidata knowledge graph to evaluate concept definitions from two paradigmatic conceptual engineering projects: the International Astronomical Union’s redefinition of PLANET and Haslanger’s ameliorative analysis of WOMAN. We discuss implications of this work for the theory and practice of conceptual engineering. The code and data can be found on GitHub 1 . Keywords Conceptual engineering · natural language processing · large language models 1 Introduction Conceptual engineering (CE) is a philosophical methodology concerned with the assessment and improvement of concepts [1]. Koch, Löhr and Pinder have surveyed recent work on the theory of CE, discussing different theories defining the targets of CE, i.e., ""what conceptual engineers are (or should be) trying to engineer"" [2]. In one such theory, Nado proposes as targets classification procedures, defined as abstract ’recipes’ which sort entities ""into an ’in’-group and an ’out’-group"" [3]. Our work builds on Nado’s idea by defining a method for implementing classification procedures consistent with this definition. A large language model (LLM) is a probabilistic model trained on a natural language corpus that, given a sequence of tokens from a vocabulary occurring in the corpus, generates a continuation of the input sequence. LLMs exhibit remarkable capabilities for natural language processing and generation [4]. Our work uses prompt engineering [5] of LLMs to implement classification procedures. A knowledge graph represents knowledge using nodes for entities and edges for relations [6]. Knowledge graphs are key information infrastructure for many Web applications [7]. Our work leverages knowledge graphs as a source of entities used to evaluate classification procedures. 2 Approach Figure 1 illustrates our method for implementing classification procedures as zero-shot chain-of-thought [8] classifiers. Given a concept’s name and intensional definition and an entity’s name and description, we prompt an LLM to generate a rationale arguing for or against the entity as an element of the concept’s extension, followed by a final ’positive’ or ’negative’ answer. To evaluate classification procedures built using this method, we sample positive and negative examples of a concept from the Wikidata collaborative knowledge graph [9], retrieving for each entity a summary of its Wikipedia page to use as its description. Next, we apply the classification procedure for a given definition of the concept to each example and compute a confusion matrix from the classifications, which provides performance metrics for the classification 1 https://github.com/bradleypallen/zero-shot-classifiers-for-conceptual-engineering" 2312.03751v1,"Which linguistic cues make people fall for fake news? A comparison of cognitive and affective processing BERNHARD LUTZ, University of Freiburg, Germany MARC ADAM, University of Newcastle, Australia STEFAN FEUERRIEGEL, LMU Munich, Germany NICOLAS PRÖLLOCHS, University of Giessen, Germany DIRK NEUMANN, University of Freiburg, Germany Fake news on social media has large, negative implications for society. However, little is known about what linguistic cues make people fall for fake news and, hence, how to design effective countermeasures for social media. In this study, we seek to understand which linguistic cues make people fall for fake news. Linguistic cues (e.g., adverbs, personal pronouns, positive emotion words, negative emotion words) are important characteristics of any text and also affect how people process real vs. fake news. Specifically, we compare the role of linguistic cues across both cognitive processing (related to careful thinking) and affective processing (related to unconscious automatic evaluations). To this end, we performed a within-subject experiment where we collected neurophysiological measurements of 42 subjects while these read a sample of 40 real and fake news articles. During our experiment, we measured cognitive processing through eye fixations, and affective processing in situ through heart rate variability. We find that users engage more in cognitive processing for longer fake news articles, while affective processing is more pronounced for fake news written in analytic words. To the best of our knowledge, this is the first work studying the role of linguistic cues in fake news processing. Altogether, our findings have important implications for designing online platforms that encourage users to engage in careful thinking and thus prevent them from falling for fake news. CCS Concepts: • Human-centered computing → Social media; Empirical studies in collaborative and social computing; • Applied computing → Psychology. Additional Key Words and Phrases: fake news; affective computing; neurophysiological measurements; regression analysis; social media 1 INTRODUCTION Fake news presents a major threat to social media integrity [65, 79], with negative implications for the opinions of individuals and society at large [5, 9, 44]. As examples, fake news has spread widely during the 2020 US Presidential Election [20, 60], the COVID-19 pandemic [13, 76], and the 2022 Russian invasion of Ukraine [24]. According to global surveys, 86 % of Internet users have at least once fallen for fake news [12]. To curb the spread, an important prerequisite is to understand why users fall for fake news. Prior research has aimed to understand how and why people engage with fake news. For example, research modeled the dynamics behind fake news sharing [16, 21, 63–65, 76, 90]. Other works look at the individual characteristics of fake news recipients and why some people are more likely to believe in fake news. Here, research has looked at different dimensions, such as political orientation [85], religious animosity [11], and trust in science [71]. Even others look at behavioral aspects such as the extent to which users engage in analytical thinking [6, 58, 61], as more extensive reasoning should make it easier to debunk false statements. A related stream focuses on how different forms of presentation (e.g., presenting the source of news) affect beliefs [e.g., 22, 37, 47, 77]. In contrast Authors’ addresses: Bernhard Lutz, bernhard.lutz@is.uni-freiburg.de, University of Freiburg, Rempartstr. 16, Freiburg, Germany; Marc Adam, marc.adam@newcastle.edu.au, University of Newcastle, Callaghan University Drive, Newcastle, Australia; Stefan Feuerriegel, LMU Munich, Geschwister-Scholl-Platz 1, Munich, Germany, feuerriegel@lmu.de; Nicolas Pröllochs, nicolas.proellochs@wi.jlug.de, University of Giessen, Licher Straße 74, Giessen, Germany; Dirk Neumann, dirk.neumann@is.uni-freiburg.de, University of Freiburg, Rempartstr. 16, Freiburg, Germany." 2312.03758v1,"Stock Movement and Volatility Prediction from Tweets, Macroeconomic Factors and Historical Prices Shengkun Wang 1 , YangXiao Bai 2 , Taoran Ji 3 , Kaiqun Fu 2 , Linhan Wang 1 , Chang-Tien Lu 1 1 Department of Computer Science, Virginia Tech 2 Department of Computer Science, South Dakota State University 3 Department of Computer Science, Texas A&M University - Corpus Christi shengkun@vt.edu, bai.yangxiao@sdstate.edu, taoran.ji@tamucc.edu, kaiqun.fu@sdstate.edu, linhan@vt.edu, ctlu@vt.edu Abstract—Predicting stock market is vital for investors and policymakers, acting as a barometer of the economic health. We leverage social media data, a potent source of public sentiment, in tandem with macroeconomic indicators as government-compiled statistics, to refine stock market predictions. However, prior research using tweet data for stock market prediction faces three challenges. First, the quality of tweets varies widely. While many are filled with noise and irrelevant details, only a few genuinely mirror the actual market scenario. Second, solely focusing on the historical data of a particular stock without considering its sector can lead to oversight. Stocks within the same industry often exhibit correlated price behaviors. Lastly, simply forecasting the direction of price movement without assessing its magnitude is of limited value, as the extent of the rise or fall truly determines profitability. In this paper, diverging from the conventional methods, we pioneer an ECON (A Framework Leveraging Tweets, Macroeconomic Indicators, and Historical Prices to Predict Stock Movement and Volatility). The framework has following advantages: First, ECON has an adept tweets filter that efficiently extracts and decodes the vast array of tweet data. Second, ECON discerns multi-level relationships among stocks, sectors, and macroeconomic factors through a self-aware mechanism in semantic space. Third, ECON offers enhanced accuracy in predicting substantial stock price fluctuations by capitalizing on stock price movement. We showcase the stateof-the-art performance of our proposed model using a dataset, specifically curated by us, for predicting stock market movements and volatility. Index Terms—stock market prediction, tweets extraction, time series forecasting, sentiment analysis, macroeconomic factors I. I NTRODUCTION The stock market, a vital mechanism for facilitating stock trading and crucial capital raising for companies, exerts a significant influence on other business sectors [1]. Over the past few years, the U.S. stock market capitalization-to-GDP ratio 1 nearly exceeded 200%, and despite a slight dip in 2023, it has stabilized at around 150%. This prominence underscores the stock market’s role as a key indicator of the U.S. economy. Blue-chip stocks 2 , serving 1 The ratio is a measure of the total value of all publicly traded stocks in a market divided by that economy’s gross domestic product (GDP). 2 A blue chip stock is stock issued by a large, well-established, financiallysound company with an excellent reputation. 979-8-3503-2445-7/23/$31.00 ©2023 IEEE as a microcosm of the stock market, become the focus of our research. Our study on the financial market employs a selection of 42 blue-chip stocks from 10 Global Industry Classification Standard (GICS) 3 Sectors, each deemed as investment-worthy 4 by both Moody’s and S&P. Acknowledging the inherent unpredictability of precise stock prices [2], our research leverages these blue-chip stocks to forecast future trends in stock price movement and volatility [3], [4]. Research within the realm of the stock market generally falls into two branches: technical analysis and fundamental analysis. Technical analysis employs historical stock prices as features to forecast future movements [5]. However, it is heavily reliant on past data, and often fails to account for abrupt market shifts triggered by unforeseen events. This methodology also assumes uniform rational market behavior, potentially leading to an echo chamber effect where trading signals self-reinforce, detaching from the underlying economic reality. Fundamental analysis, on the other hand, incorporates not only price features but also external information, such as social media data [6] and search engine data [7]. Mao et al. [8] shows the accuracy of predicting the S&P 500 closing price increases when Twitter 5 data is incorporated into their model. Commonly, these data sources often serve as valuable indicators, mirroring not just the financial market but also other key economic indicators. However, current fundamental analysis research predominantly focuses on the historical information of individual stock [9], overlooking the interplay between the macro-economy and the stock market. Moreover, the existing models are primarily focused on predicting whether trends will change [10], but overlook the significance of the magnitude of such changes. In reality, the extent of these changes constitutes an important part of stock behavior. In this paper, to address the aforementioned limita- 3 GICS is a method for assigning companies to a specific economic sector and industry group that best defines its business operations. 4 Investment-worthy refers to high-quality companies rated Baa or higher according to evaluations by Moody’s and Standard & Poor’s (S&P). 5 Although Twitter has recently been re-branded to “X”, this article continues to use the original name, “Twitter”." 2312.03761v1,"1 Learning High-Dimensional Differential Graphs From Multi-Attribute Data Jitendra K. Tugnait Abstract—We consider the problem of estimating differences in two Gaussian graphical models (GGMs) which are known to have similar structure. The GGM structure is encoded in its precision (inverse covariance) matrix. In many applications one is interested in estimating the difference in two precision matrices to characterize underlying changes in conditional dependencies of two sets of data. Existing methods for differential graph estimation are based on single-attribute (SA) models where one associates a scalar random variable with each node. In multiattribute (MA) graphical models, each node represents a random vector. In this paper, we analyze a group lasso penalized D- trace loss function approach for differential graph learning from multi-attribute data. An alternating direction method of multipliers (ADMM) algorithm is presented to optimize the objective function. Theoretical analysis establishing consistency in support recovery and estimation in high-dimensional settings is provided. Numerical results based on synthetic as well as real data are presented. Index Terms—Sparse graph learning; differential graph estimation; undirected graph; multi-attribute graphs. I. I NTRODUCTION RAPHICAL models provide a powerful tool for analyzing multivariate data [1], [2]. In a statistical graphical model, the conditional statistical dependency structure among p random variables x 1 , x 1 , · · · , x p , is represented using an undirected graph G = (V, E), where V = {1, 2, · · · , p} = [p] is the set of p nodes corresponding to the p random variables x i s, and E ⊆ V × V is the set of undirected edges describing conditional dependencies among the components of x. The graph G then is a conditional independence graph (CIG) where there is no edge between nodes i and j (i.e., {i, j} ̸∈ E) iff x i and x j are conditionally independent given the remaining p-2 variables x ℓ , ℓ ∈ [p], ℓ ̸ = i, ℓ ̸ = j. In particular, Gaussian graphical models (GGMs) are CIGs where x is multivariate Gaussian. Suppose x has positive-definite covariance matrix Σ with inverse covariance matrix Ω = Σ −1 . Then Ω ij , the (i, j)-th element of Ω, is zero iff x i and x j are conditionally independent. Such models for x have been extensively studied. Given n samples of x, in high-dimensional settings where p ≫ 1 and/or n is of the order of p, one estimates Ω under some sparsity constraints; see [3]–[6]. More recently there has been increasing interest in differential network analysis where one is interested in estimating the difference in two inverse covariance matrices [7]–[9]. Given observations x and y from two groups of subjects, G J.K. Tugnait is with the Department of Electrical & Computer Engineering, 200 Broun Hall, Auburn University, Auburn, AL 36849, USA. Email: tugnajk@auburn.edu . This work was supported by the National Science Foundation Grants ECCS- 2040536 and CCF-2308473. one is interested in the difference ∆ = Ω y − Ω x , where Ω x = (E{xx ⊤ }) −1 and Ω y = (E{yy ⊤ }) −1 . The associated differential graph is G ∆ = (V, E ∆ ) where {i, j} ∈ E ∆ iff ∆ ij ̸ = 0. It characterizes differences between the GGMs of the two sets of data. We use the term differential graph as in [10], [11] ( [7]–[9] use the term differential network). As noted in [9], in biostatistics, the differential network/graph describes the changes in conditional dependencies between components under different environmental or genetic conditions. For instance, one may be interested in the differences in the graphical models of healthy and impaired subjects, or models under different disease states, given gene expression data or functional MRI signals [3], [12], [13]. In the preceding graphs, each node represents a scalar random variable. In many applications, there may be more than one random variable associated with a node. This class of graphical models has been called multi-attribute (MA) graphical models in [14]–[17] and vector graphs or networks in [18]–[21]. In a gene regulatory network, one may have different molecular profiles available for a single gene, such as protein, DNA and RNA. Since these molecular profiles are on the same set of biological samples, they constitute multiattribute data for gene regulatory graphical models in [14], [16]. Consider p jointly Gaussian vectors z i ∈ R m , i ∈ [p]. We associate z i with the ith node of graph G = (V, E), V = [p], E ⊆ V ×V . We now have m attributes per node. Now {i, j} ∈ E iff vectors z i and z j are conditionally independent given the remaining p-2 vectors {z ℓ , ℓ ∈ V \{i , j}}. Let x = [z 1 ⊤ z 2 ⊤ · · · z p ⊤ ] ⊤ ∈ R mp . Let Ω = (E{xx ⊤ }) −1 assuming E{xx ⊤ } ≻ 0. Define the m × m subblock Ω (ij) of Ω as [Ω (ij) ] rs = [Ω] (i−1)m+r,(j−1)m+s , r, s = 1, 2, · · · , m. Then we have the following equivalence [16, Sec. 2.1] {i, j} ̸∈ E ⇔ Ω (ij) = 0 . (1) This paper is concerned with estimation of differential graphs from multi-attribute data. Given independent and identically distributed (i.i.d.) samples x(t), t = 1, 2, · · · , n x , of x = [z 1 ⊤ z 2 ⊤ · · · z p ⊤ ] ⊤ ∈ R mp where z i ∈ R m , i ∈ [p], are jointly Gaussian, and similarly given samples y(t), t = 1, 2, · · · , n y , of y ∈ R mp , our objective is to estimate the difference ∆ = Ω y −Ω x , and determine the differential graph G ∆ = (V, E ∆ ) with edgeset E ∆ = {{k, ℓ} : ∥∆ (kℓ) ∥ F ̸ = 0}. A. Related Work All prior work on high-dimensional differential graph estimation from i.i.d. samples addresses single-attribute (SA) models where each node represents a scalar random variable. One naive approach would be to estimate the two precision" 2312.03765v1,"Linear extensions of Baire-one and Borel functions Waldemar Sieg Kazimierz Wielki University, Institute of Mathematics, Powstańców Wielkopolskich 2, 85-090 Bydgoszcz, Poland Abstract Let X and Y be the Hausdorff topological spaces and let A be both an F σ - and G δ - subset of X. Let also f : A → Y be a function for which the inverse image of every open subset U ⊂ Y is F σ in X. We show that f can be linearly extended to a function with the same property defined on X. A similar result is proved for Baire-one function defined on an analogous subset of R. We give also an answer when the extension map is (with a supremum norm) an isometry. Keywords: Borel function, Baire one function, Isometry, Linear extension, Retraction, Hausdorff space, Perfectly normal space. 1. Introduction Let X, Y , A and f have the same meaning as in the abstract. The mapping r : X → A is an algebraic retraction if r(x) = x for every x ∈ A. Recall that B 1 (X, Y ) is the space of pointwise limits of sequences of continuous functions X → Y . We say that a function f : X → Y is • piecewise continuous, if there is an S increasing sequence (X n ) ⊂ X of ∞ nonempty closed sets such that X = n=0 X n and the restriction f ↾X n is continuous for each n ∈ N; • of the first Borel class, if the f -inverse image of every open subset of Y is F σ in X (see [2, p. 1]); • of the first level Borel class, if the f -inverse image of every F σ subset of Y is F σ in X (see [2, p. 1]). Note that in the last definition, the words ”F σ subset of Y ” may be equivalently replaced by ”closed subset of Y ”. The symbols P(X, Y ), fcBor(X, Y ) and flB(X, Y ) stand for the families of piecewise continuous, first Borel class and first level Borel class of functions X → Y , respectively. The inclusion Email address: waldeks@ukw.edu.pl (Waldemar Sieg) 2010 Mathematics subject classification. Primary: 26A15; 54C20; Secondary: 26A21; 54C30. Preprint submitted to Elsevier December 8, 2023" 2312.03798v1,"Single Image Reflection Removal with Reflection Intensity Prior Knowledge Dongshen Han 1 Seungkyu Lee 1 Chaoning Zhang 1 Heechan Yoon 1 2 2 Hyukmin Kwon HyunCheol Kim HyonGon Choo 2 1 Kyunghee University 2 Electronics and Telecommunications Research Institute {han-0129, seungkyu}@khu.ac.kr Abstract Single Image Reflection Removal (SIRR) in real-world images is a challenging task due to diverse image degradations occurring on the glass surface during light transmission and reflection. Many existing methods rely on specific prior assumptions to resolve the problem. In this paper, we propose a general reflection intensity prior that captures the intensity of the reflection phenomenon and demonstrate its effectiveness. To learn the reflection intensity prior, we introduce the Reflection Prior Extraction Network (RPEN). By segmenting images into regional patches, RPEN learns non-uniform reflection prior in an image. We propose Prior-based Reflection Removal Network (PRRN) using a simple transformer U-Net architecture that adapts reflection prior fed from RPEN. Experimental results on real-world benchmarks demonstrate the effectiveness of our approach achieving state-of-the-art accuracy in SIRR. 1 Introduction The phenomenon of reflection can be seen everywhere in daily life on window glass surfaces where reflected scene is superimposed on transmitted scene. Frequently, such superimposed reflection of other objects of surroundings works as confusing noise in the capturing quality of transmitted scene image. To address the problem, reflection removal methods model reflection image as a weighted additive composition of a transmission image (T) and a reflection image (R) as formulated by the following equation [35]: I = g(T) + f(R), (1) where g(·) and f(·) represent diverse image degradations that occur on the glass surface during light transmission and reflection such as image blur, light absorption and refraction, multiple offsets, and depth of field (DoF) [25]. The presence of unknown content-free variables makes single image reflection removal task ill-posed and highly challenging problem. To address the problem, different prior assumptions have been utilized for retrieving transmission layer information including image gradient sparsity [17] and domain [5], ghosting cues [23], relative smoothness [19], as well as earlier methods such as handcrafted priors [16]. Prior assumption reasonably work with strong and dominant transmission image (T) and weak reflection image (R) [18]. These prior assumptions have been shown to assist the network in recognizing reflection image and roughly locate reflection region to some extent [5]. However, since the amount of real-world data available for single-image reflection removal (SIRR) is still insufficient, researchers have resorted to creating synthetic SIRR datasets by artificially adding noise and ghosting [34, 7]. This has led to many models being designed and trained heavily relying on the specific priors [34, 5, 27]. There are also many methods that aim to decompose superimposed image into reflection and transmission images allowing them to supervise each other during the generation process [18, 11, 30]. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.03801v1,"Generalization to New Sequential Decision Making Tasks with In-Context Learning Sharath Chandra Raparthy 1,∗ , Eric Hambro 1 , Robert Kirk 1,2 , Mikael Henaff 1,† , Roberta Raileanu 1,2,† 1 FAIR at Meta, 2 UCL † Joint advising Training autonomous agents that can learn new tasks from only a handful of demonstrations is a long-standing problem in machine learning. Recently, transformers have been shown to learn new language or vision tasks without any weight updates from only a few examples, also referred to as in-context learning. However, the sequential decision making setting poses additional challenges having a lower tolerance for errors since the environment’s stochasticity or the agent’s actions can lead to unseen, and sometimes unrecoverable, states. In this paper, we use an illustrative example to show that naively applying transformers to sequential decision making problems does not enable in-context learning of new tasks. We then demonstrate how training on sequences of trajectories with certain distributional properties leads to in-context learning of new sequential decision making tasks. We investigate different design choices and find that larger model and dataset sizes, as well as more task diversity, environment stochasticity, and trajectory burstiness, all result in better in-context learning of new out-of-distribution tasks. By training on large diverse offline datasets, our model is able to learn new MiniHack and Procgen tasks without any weight updates from just a handful of demonstrations. Date: December 8, 2023 Correspondence: Sharath Chandra Raparthy at sharathraparthy@meta.com 1 Introduction For many real-world application domains such as robotics or virtual assistants, collecting large amounts of data for training an agent can be time consuming, expensive, or even dangerous. Hence, the ability to learn new tasks from a handful of demonstrations is crucial for enabling a wider range of use cases. However, current deep learning agents often struggle to learn new tasks from a limited number of demonstrations. Prior work attempts to address this problem using meta-learning (Schmidhuber, 1987; Duan et al., 2016; Finn et al., 2017; Pong et al., 2022; Mitchell et al., 2021; Beck et al., 2023) but these methods tend to be difficult to use in practice and require more than a handful of demonstrations or extensive fine-tuning. In contrast, large transformers trained on vast amounts of data can learn new tasks from only a few examples without any parameter updates (Brown et al., 2020; Kaplan et al., 2020; Olsson et al., 2022a; Chan et al., 2022a). This emergent phenomenon is called few-shot or in-context learning (ICL), and is achieved by simply conditioning the model’s outputs on a context containing a few examples for solving the task (Brown et al., 2020; Ganguli et al., 2022; Wei et al., 2022). While in-context learning has been observed in multiple domains from language (Brown et al., 2020) to vision (Chan et al., 2022a), it has not yet been extensively studied in sequential decision making settings. The sequential decision making problem poses additional challenges that do not appear in the supervised or self-supervised settings. For example, this setting tends to have a lower tolerance for errors since the environment’s stochasticity or the agent’s actions can lead to unseen, and sometimes unrecoverable, states. In this paper, we study in-context learning of sequential decision making tasks. To test our approach, we consider a challenging setting where the train and the test task distributions are disjoint with different states, actions, dynamics, and reward functions. For example, on Procgen we train on 12 of the games and test on 1" 2312.03813v1,"Improving Activation Steering in Language Models with Mean-Centring Ole Jorgensen 1 * 1 Dylan Cope 1,2 Imperial College London Abstract Recent work in activation steering has demonstrated the potential to better control the outputs of Large Language Models (LLMs), but it involves finding steering vectors. This is difficult because engineers do not typically know how features are represented in these models. We seek to address this issue by applying the idea of mean-centring to steering vectors. We find that taking the average of activations associated with a target dataset, and then subtracting the mean of all training activations, results in effective steering vectors. We test this method on a variety of models on natural language tasks by steering away from generating toxic text, and steering the completion of a story towards a target genre. We also apply mean-centring to extract function vectors, more effectively triggering the execution of a range of natural language tasks by a significant margin (compared to previous baselines). This suggests that mean-centring can be used to easily improve the effectiveness of activation steering in a wide range of contexts. 1 Nandi Schoots 1,2 Introduction Large Language Models (LLMs) have become increasingly capable over the past few years across a diverse range of tasks (Peters et al. 2018; Radford et al. 2019; OpenAI 2023). However, in part due to a lack of understanding of how these capabilities are implemented, we are unable to address issues such as social biases (Abid, Farooqi, and Zou 2021). Some approaches to mitigating these issues modify the weights of the LLM (Ilharco et al. 2023; Meng et al. 2022), but these techniques either require fine-tuning or have only been applied to editing factual associations encoded in the model. A recent approach to controlling LLMs is activation steering (Turner et al. 2023; Li et al. 2023; Subramani, Suresh, and Peters 2022), or similarly representation engineering (Zou et al. 2023). Activation steering aims to extract features from language models to better control their outputs. It typically does this by making inference-time modifications to some activations of the model. In this work, we apply activation steering to incorporate some behaviour exhibited by an arbitrary dataset D into the output of a language model. This introduces a simple pipeline for modifying language model behaviour, which current activation steering methods do not allow for in full generality. They either require the identification of an opposite behaviour * ojorgensen1417@gmail.com 2 Murray Shanahan 1 King’s College London (Counterbalanced Subtractions in Turner et al. (2023)), succinctly describing the pertinent behaviour of the dataset (LAT Scans in Zou et al. (2023)), or are computationally expensive (training a sparse autoencoder on language model activations (Cunningham et al. 2023; Bricken et al. 2023)). Our paper aims to address these issues by applying a simple processing technique to steering vectors, in the spirit of similar work in word representations (Mu and Viswanath 2018). Our technique, which we call mean-centring, successfully incorporates properties of datasets into the outputs of LLMs, whilst maintaining coherence. This provides a simple method for changing model behaviour using only a dataset, making it easier to apply activation steering in a wider range of contexts. In summary: • In Section 3 we introduce mean-centring as a method for creating better steering vectors. • In Section 4.1 we demonstrate the efficacy of meancentring by controlling a language model to generate non-toxic continuations of toxic comments. • In Section 4.2 we show that mean-centring increases the range of tasks for which steering can be applied as compared to methods that require a counterbalancing concept. We demonstrate the efficacy of mean-centring by influencing the genres of stories as they are generated. • In Section 4.3 we demonstrate the efficacy of meancentring by extracting more effective function vectors, compared to non mean-centred approaches. This leads to significant improvements in accuracy over previous baselines. 2 2.1 Related Work Linear Representation Hypothesis The linear representation hypothesis (Elhage et al. 2022) proposes that many human-interpretable high-level concepts are represented linearly as directions in the residual stream of language models. There is significant evidence for the linear structure of neural network representations, including linear operations on Word2Vec embeddings capturing semantic meaning (Mikolov, Yih, and Zweig 2013). There is strong evidence in the context of language models specifically, due to the success of linear probes and edits locating information" 2312.03814v1,"Pearl: A Production-Ready Reinforcement Learning Agent Zheqing Zhu*, Rodrigo de Salvo Braz, Jalaj Bhandari, Daniel Jiang, Yi Wan, Yonathan Efroni, Liyuan Wang, Ruiyang Xu, Hongbo Guo, Alex Nikulkov, Dmytro Korenkevych, Urun Dogan, Frank Cheng, Zheng Wu, Wanqiao Xu Applied Reinforcement Learning Team, AI at Meta December 8, 2023 Abstract Reinforcement Learning (RL) offers a versatile framework for achieving long-term goals. Its generality allows us to formalize a wide range of problems that real-world intelligent systems encounter, such as dealing with delayed rewards, handling partial observability, addressing the exploration and exploitation dilemma, utilizing offline data to improve online performance, and ensuring safety constraints are met. Despite considerable progress made by the RL research community in addressing these issues, existing open-source RL libraries tend to focus on a narrow portion of the RL solution pipeline, leaving other aspects largely unattended. This paper introduces Pearl, a Production-ready RL agent software package explicitly designed to embrace these challenges in a modular fashion. In addition to presenting preliminary benchmark results, this paper highlights Pearl’s industry adoptions to demonstrate its readiness for production usage. Pearl is open sourced on Github at github.com/facebookresearch/pearl and its official website is located at pearlagent.github.io. Keywords: Reinforcement learning, open-source software, python, pytorch 1 Introduction The field of reinforcement learning (RL) has achieved significant successes in recent years. These accomplishments encompass a range of achievements, from surpassing human-level performance in Atari Games (Mnih et al., 2015) and Go (Silver et al., 2017), to controlling robots to in complex manipulation tasks (Mnih et al., 2015; Peng et al., 2018; Levine et al., 2016). Moreover, the practical applications of these advancements extend into real-world systems, including recommender systems (Xu et al., 2023) and large language models (Ouyang et al., 2022). In addition to these successful RL systems, significant progress has been made in designing open-resource libraries that enable developing RL systems easily. These libraries include RLLib (Liang et al., 2018), Stable-Baselines 3 (Raffin et al., 2021), and Tianshou (Weng et al., 2022), to name a few. In addition to tackling the core issues of delayed rewards and downstream consequences, successful RL agents must address several significant challenges. One of them is the delicate balance between exploration and exploitation. An RL agent must actively engage in exploration to gather information about actions and their outcomes. This challenge is compounded by the fact that the environment may not always offer complete transparency regarding its internal state, requiring the agent to infer the current state from its interaction history. In order to avoid catastrophic situations or accommodate other preferences, an RL agent may also need to incorporate additional constraints, such as safety considerations or risk requirements, throughout the course of learning. While the importance of these challenges is widely acknowledged by the RL community, existing open source RL libraries often do not address them adequately. For example, important features like exploration, safe/constrained policy learning, credit assignment for long-horizon delayed-reward * Corresponding author. Please email: billzhu@meta.com 1" 2312.03817v1,"Diffusion Illusions: Hiding Images in Plain Sight Ryan Burgert Xiang Li Abe Leite Kanchana Ranasinghe Stony Brook University Michael S. Ryoo rburgert@cs.stonybrook.edu Flip Illusion Rotation Overlay Illusion Cat Hidden Overlay Illusion Man Puppies 180° rotate �㷐 Base�㷑 0° 90° = Woman Dog 180° == 270° === stack �㷍 Rotator © stack �㷍 Another Rotation Overlay Illusion Example Man in Suit Winter Woman Wine and Grapes Santa Woman and Christmas Tree d 1 : 0° d 2 : 90° d 3 : 180° d 4 : 270° stack �㷍 p 1 : Base (Fixed) p 2 : Rotator Another Hidden Overlay Illusion Example Playground Playground Playground Playground p 1 = d 1 p 2 = d 2 p 3 = d 3 p 4 = d 4 Prime Images = First Four Derived Images Scannable QR Code Arrangement: Stack Secret Image d 5 Figure 1. Diffusion Illusions are a new class of automatically generated optical illusions. The images on top demonstrate the three major types of illusions we discuss in this paper: Flip Illusions, Rotation Overlay Illusions, and Hidden Overlay Illusions. (Terminology is formally defined in Sec. 2). The bottom showcases an example of Hidden Overlay Illusions: four images (prime images p 1...4 ) that when stacked on top of each other (arrangement) reveal a new fifth image (derived image d 5 ). Please note that these illustrations are all photographs of the generated images physically fabricated in the real world. Abstract study three types of illusions, each where the prime images are arranged in different ways and optimized using the aforementioned losses such that images derived from them align with user-chosen text prompts or images. We conduct comprehensive experiments on these illusions and verify the effectiveness of our proposed method qualitatively and quantitatively. Additionally, we showcase the successful physical fabrication of our illusions — as they are all designed to work in the real world. Our code and examples are publicly available at our interactive project website: https://diffusionillusions.com We explore the problem of computationally generating special ‘prime’ images that produce optical illusions when physically arranged and viewed in a certain way. First, we propose a formal definition for this problem. Next, we introduce Diffusion Illusions, the first comprehensive pipeline designed to automatically generate a wide range of these illusions. Specifically, we both adapt the existing ‘score distillation loss’ and propose a new ‘dream target loss’ to optimize a group of differentially parametrized prime images, using a frozen text-to-image diffusion model. We 1" 2312.03827v1,"Dynamics of spin-momentum entanglement from superradiant phase transitions Oksana Chelpanova, 1 Kushal Seetharam, 2, 3 Rodrigo Rosa-Medina, 4 Nicola Reiter, 4 Fabian Finger, 4 Tobias Donner, 4 and Jamir Marino 1 1 Institut für Physik, Johannes Gutenberg-Universität Mainz, D-55099 Mainz, Deutschland Department of Electrical Engineering, Massachusetts Institute of Technologies, Cambridge, Massachusetts 02139, USA 3 Department of Physics, Harvard University, Cambridge MA, 02138, USA 4 Institute for Quantum Electronics, ETH Zürich, 8093 Zürich, Switzerland (Dated: December 8, 2023) Exploring operational regimes of many-body cavity QED with multi-level atoms remains an exciting research frontier for their enhanced storage capabilities of intra-level quantum correlations. In this work, we propose an extension of a prototypical many-body cavity QED experiment from a two to a four-level description by optically addressing a combination of momentum and spin states of the ultracold atoms in the cavity. The resulting model comprises a pair of Dicke Hamiltonians constructed from pseudo-spin operators, effectively capturing two intertwined superradiant phase transitions. The phase diagram reveals regions featuring weak and strong entangled states of spin and momentum atomic degrees of freedom. These states exhibit different dynamical responses, ranging from slow to fast relaxation, with the added option of persistent entanglement temporal oscillations. We discuss the role of cavity losses in steering the system dynamics into such entangled states and propose a readout scheme that leverages different light polarizations within the cavity. Our work paves the way to connect the rich variety of non-equilibrium phase transitions that occur in many-body cavity QED to the buildup of quantum correlations in systems with multi-level atom descriptions. (b) INTRODUCTION The coupling between spin and motional degrees of freedom lies at the root of several rich phenomena in quantum physics, including fine structure splitting of atoms [1] and the spin Hall effect [2], which, in turn, allow the realization of topological phases of matter [3, 4] and open the possibility of topological quantum computing [5, 6]. Spin-momentum entanglement resulting from such coupling has increasingly become relevant in a variety of research areas, ranging from materials science to photonics and atomic systems [7–9]. In this work, we propose a protocol for engineering entanglement between the spin and momentum degrees of freedom of ultracold atoms coupled to an optical cavity. Our approach exploits a non-equilibrium superradiant phase transition in the system realized by coupling four atomic modes, which comprise two internal (spin) and external (momentum) states of the atom. Many-body cavity QED experiments with ultracold atoms are among the most versatile quantum simulators of driven-dissipative phases of matter [10]. The combination of tunable photon-mediated long-range interatomic interactions, along with strong cooperative effects and control on cavity losses, offers a wide range of possibilities, encompassing non-equilibrium transitions [11– 20], dynamical control of correlations [21–26], realization of dark states [27–29], and the exploration of collective phenomena purely driven by engineered dissipation [30–32]. Oftentimes, the effective atomic degrees of freedom in state-of-art experiments are a pair of momentum states or internal levels, optically addressed by external laser drives inducing cavity-assisted two-photon transitions [12, 33–35]. Recently, a few cavity QED ex- (a) ω c η b (c) a z η r | 3⟩ | 2⟩ | 1⟩ | 0⟩ BEC e z κ e y y z Wea k Non ent., -inv. read -out W In eak v. re en ad t., -o ut I. Momentum coupling 2 , nt. g e out on - Str read . Inv No ent. Strong ent., Non-inv. read-out Spin-momentum coupling x FIG. 1. (a) Sketch of the cavity QED setup and (b) of the atomic level scheme. (c) Cartoon of the dynamical phase diagram as a function of the couplings between spin and momentum degrees of freedom. periments and theory works have shown how to couple the momentum and internal spin degrees of freedom of ultracold atoms using intra-cavity light, demonstrating novel self-organized phases [11, 36–39]. In this paper, we generalize such protocols to show that spin-momentum entanglement can be synthesized, controlled, and steered in experiments by coupling motional and internal degrees of freedom. We consider a cavity QED platform, cf. Fig. 1(a), which is described by a minimal model with two different spin states and two different momentum states, meaning that each atom can occupy one of these four hybrid spin-momentum states shown in Fig. 1(b). We demonstrate that this system exhibits superradiant phase transitions related to the selforganization of the atoms in the cavity, concomitantly with the dynamical buildup of spin-momentum entanglement. By varying the spin-momentum coupling, one" 2312.03839v1,"Prepared for submission to JCAP Perturbing Fast Neutrino Flavor Conversion Marie Cornelius, a Shashank Shalgar, a and Irene Tamborra a a Niels Bohr International Academy and DARK, Niels Bohr Institute, University of Copen- hagen, Blegdamsvej 17, 2100, Copenhagen, Denmark E-mail: marie.cornelius@nbi.ku.dk, shashank.shalgar@nbi.ku.dk, tamborra@nbi.ku.dk Abstract. The flavor evolution of neutrinos in dense astrophysical sources, such as core- collapse supernovae or compact binary mergers, is non-linear due to the coherent forward scattering of neutrinos among themselves. Recent work in this context has been addressed to figure out whether flavor equipartition could be a generic flavor outcome of fast flavor conversion. We investigate the flavor conversion physics injecting random perturbations in the neutrino field in two simulation setups: 1. a spherically symmetric simulation shell without periodic boundaries, with angular distributions evolving dynamically thanks to non-forward scatterings of neutrinos with the background medium, and neutrino advection; 2. a periodic simulation shell, with angular distributions of neutrinos defined a priori and neutrino advection. We find that, independent of the exact initial flavor configuration and type of perturbations, flavor equipartition is generally achieved in the system with periodic boundaries; in this case, perturbations aid the diffusion of flavor structures to smaller and smaller scales. However, flavor equipartition is not a general outcome in the simulation shell without periodic boundaries, where the inhomogeneities induced perturbing the neutrino field affect the flavor evolution, but do not facilitate the diffusion of flavor waves. This work highlights the importance of the choice of the simulation boundary conditions in the exploration of fast flavor conversion physics." 2312.03849v1,"LEGO: Learning EGOcentric Action Frame Generation via Visual Instruction Tuning Bolin Lai 1,2 † Xiaoliang Dai 1 Lawrence Chen 1 Guan Pang 1 James M. Rehg 3 Miao Liu 1 1 GenAI, Meta 2 Georgia Institute of Technology 3 University of Illinois Urbana-Champaign {xiaoliangdai,lawrencechen,gpang,miaoliu}@meta.com jrehg@illinois.edu Actions in Existing Egocentric Datasets User Prompt “Can you provide instructions on how to wash the trouser with the brush in my current situation?” “1. Check the Care Label: Check the care label on your trousers for any specific washing instructions. 2. Prep the Area: Find a clean and flat surface to work on, such as a table or countertop. “1. You should submerge the trouser in the water. 2. Use the brush to scrub the trouser, focusing on any stains or areas that may require extra attention. 3. Once the trouser is clean, you should rinse it.” 3. Spot Check Stains:” … … bolin.lai@gatech.edu (a) LLM Response (b) Visual LLM Response (c) Our model (LEGO) Response Figure 1. When the user queries for instructions on acquiring specific skills, large language models (LLMs) tend to provide general instructions that may not be readily applicable to the user’s current situation. While visual large language models (VLLMs) can generate more specific guidance based on visual prompt capturing the user’s context, the generated textual instructions still lack clarity and ease for the user to interpret. In contrast, we present a novel model — LEGO, which takes the user’s query and an egocentric image captured from user’s perspective as inputs. It then generates an egocentric action frame that vividly illustrates the execution of the query action. Abstract scriptions to address our proposed problem. Moreover, we propose to Learn EGOcentric (LEGO) action frame generation using image and text embeddings from VLLM as additional conditioning. We validate our proposed model on two egocentric datasets – Ego4D and Epic-Kitchens. Our experiments show prominent improvement over prior image manipulation models in both quantitative and qualitative evaluation. We also conduct detailed ablation studies and analysis to provide insights on our method. Generating instructional images of human daily actions from an egocentric viewpoint serves a key step towards efficient skill transfer. In this paper, we introduce a novel problem – egocentric action frame generation. The goal is to synthesize the action frame conditioning on the user prompt question and an input egocentric image that captures user’s environment. Notably, existing egocentric datasets lack the detailed annotations that describe the execution of actions. Additionally, the diffusion-based image manipulation models fail to control the state change of an action within the corresponding egocentric image pixel space. To this end, we finetune a visual large language model (VLLM) via visual instruction tuning for curating the enriched action de- 1. Introduction The emergence of Large Language Models (LLMs) [6, 10, 66, 99], such as ChatGPT, has revolutionized the transfer of knowledge. However, an LLM alone is not a sufficient † This work was done during Bolin’s internship at GenAI, Meta. 1" 2312.03857v1,"1 Population Monte Carlo with Normalizing Flow Soumyasundar Pal, Antonios Valkanas, and Mark Coates Abstract—Adaptive importance sampling (AIS) methods provide a useful alternative to Markov Chain Monte Carlo (MCMC) algorithms for performing inference of intractable distributions. Population Monte Carlo (PMC) algorithms constitute a family of AIS approaches which adapt the proposal distributions iteratively to improve the approximation of the target distribution. Recent work in this area primarily focuses on ameliorating the proposal adaptation procedure for high-dimensional applications. However, most of the AIS algorithms use simple proposal distributions for sampling, which might be inadequate in exploring target distributions with intricate geometries. In this work, we construct expressive proposal distributions in the AIS framework using normalizing flow, an appealing approach for modeling complex distributions. We use an iterative parameter update rule to enhance the approximation of the target distribution. Numerical experiments show that in high-dimensional settings, the proposed algorithm offers significantly improved performance compared to the existing techniques. Index Terms—Bayesian inference, Importance sampling, Monte Carlo methods, Normalizing flow, Population Monte Carlo I. I NTRODUCTION Monte Carlo (MC) methods [1], [2] have numerous applications in statistical signal processing, communications, and machine learning. For example, in the Bayesian setting, the statistical inference of an unknown parameter is carried out by computing the posterior distribution conditioned on the observed data [3]. However, in many practical problems of interest, the posterior distribution does not have an analytic form, and approximation via MC methods becomes necessary. Markov Chain Monte Carlo (MCMC) [4] algorithms have been a popular approach for addressing posterior inference problems. They involve constructing a Markov process whose stationary distribution is the same as the target posterior. Several efficient MCMC algorithms [5], [6] have been developed which obtain state-of-the-art results in many high dimensional scenarios. Adaptive versions of MCMC algorithms [7], [8] are often used for accelerating the mixing of the Markov chain. Despite the effectiveness of the MCMC techniques, there are several disadvantages of these algorithms. In higher dimensions, they often result in very high computational costs and/or slow mixing. In this setting, an importance sampling (IS) based methodology can provide an alternative approach. Importance sampling is a class of Monte Carlo methods, where the target distribution is approximated by the weighted samples from another proposal distribution [1]. In highdimensional applications, the design of an effective proposal distribution is crucial since a greater mismatch between the Soumyasundar Pal is with Huawei Noah’s Arc Lab, Montréal, Québec, Canada. Antonios Valkanas and Mark Coates are with the Dept. of Electrical and Computer Engineering, McGill University, Montréal, Québec, Canada. (e-mail: soumyasundarpal@gmail.com; antonios.valkanas@mail.mcgill.ca; mark.coates@mcgill.ca) Code to reproduce our experiments is available at https://github.com/soumyapal91/AIS flow target and the proposal distributions leads to a high variance of the IS estimator. Several proposal distributions can be used for efficient exploration of state space of complicated target distributions; this approach is referred to as multiple IS (MIS) [9]. Although the use of multiple proposals can be beneficial in some cases, adaptation of the proposal distributions [10] can be more advantageous for inference of higher dimensional target distributions. In adaptive IS (AIS) schemes, iterative adaptation of the proposal distributions is performed to improve the approximation of the target distribution. Generally, an iteration of an AIS scheme is composed of three different steps [10]: a) sampling from a set of proposals (sampling), b) computing importance weights for the samples (weighting), and c) updating (adapting) the parameters of the proposals for the next iteration. There are numerous variants of the AIS algorithms, and the differences among them arise from consideration of how the three aforementioned steps are implemented. For example, the standard Population Monte Carlo (PMC) algorithm [11] draws only one sample from each proposal at each iteration, whereas the more recent schemes [12]–[15] use multiple samples. The weighting of the samples is not uniform in the literature either. [11] uses individual proposals in the denominator of the importance weight computation step, whereas [12], [13] use a deterministic mixture (DM-PMC) to compute the weights, as this leads to lower variance estimates (albeit at the cost of additional complexity). A detailed comparison of related algorithms in terms of their similarities and differences is provided in [10]. From a practical point of view, the most crucial step in an AIS algorithm is proposal adaptation. Earlier works like [11] and its variants [12], [16] use resampling of the samples to adapt the location parameters of the proposal distributions, which is inefficient in higher dimensions. More effective resampling strategies are considered in [12]. Intuitively the goal of the adaptation step is to move the proposals in a way such that they are placed in the high-density regions of the target distribution. One way to achieve this is to use the gradient of the target to adapt the location parameters of the proposals [13], [14], [17], [18], although other strategies like minimizing KL divergence [19], employing MCMC steps [20]–[22], performing moment matching [23] or using stochastic optimization [15] can also be used. While these techniques offer improvement in performance, the application of AIS algorithms in high dimensions remains challenging. A major limitation of the existing AIS algorithms is their use of simple proposal distributions. Most of these methods use isotropic Gaussian distributions as proposals for ease of sampling and density evaluation. Despite the presence of an effective adaptation rule, such a choice might be sub-optimal" 2312.03867v1,"1 Multi-Group Fairness Evaluation via Conditional Value-at-Risk Testing Lucas Monteiro Paes, Ananda Theertha Suresh, Alex Beutel, Flavio P. Calmon, and Ahmad Beirami Abstract Machine learning (ML) models used in prediction and classification tasks may display performance disparities across population groups determined by sensitive attributes (e.g., race, sex, age). We consider the problem of evaluating the performance of a fixed ML model across population groups defined by multiple sensitive attributes (e.g., race and sex and age). Here, the sample complexity for estimating the worst-case performance gap across groups (e.g., the largest difference in error rates) increases exponentially with the number of group-denoting sensitive attributes. To address this issue, we propose an approach to test for performance disparities based on Conditional Value-at-Risk (CVaR). By allowing a small probabilistic slack on the groups over which a model has approximately equal performance, we show that the sample complexity required for discovering performance violations is reduced exponentially to be at most upper bounded by the square root of the number of groups. As a byproduct of our analysis, when the groups are weighted by a specific prior distribution, we show that Rényi entropy of order 2/3 of the prior distribution captures the sample complexity of the proposed CVaR test algorithm. Finally, we also show that there exists a non-i.i.d. data collection strategy that results in a sample complexity independent of the number of groups. Index Terms multi-group fairness, intersectional fairness, hypothesis testing, intersectionality I. I NTRODUCTION Machine learning (ML) algorithms are increasingly used in domains of consequence such as hiring [1], lending [2], [3], policing [4], and healthcare [5], [6]. These algorithms may display performance disparities across groups determined by legally protected attributes [7], [8] (e.g., sex and race). Discovering and reducing performance disparities across population groups is a recognized desideratum in ML. Over the past decade, hundreds of fairness interventions have been proposed to close performance gaps in a range of prediction and classification tasks while preserving overall accuracy [9]–[16]. While there are many notions of fairness in ML [17], we focus on group fairness [13], [18]–[20]. Group fairness is usually concerned with a small number (e.g., two) of pre-determined demographic groups G and requires a certain performance metric to be approximately equal across the groups in G — different choices of performance metric lead to different notions of fairness. For example, equal opportunity [13], a popular variation of group fairness, requires that false positive rates (FPR) be approximately equal across groups in G. A widely accepted mathematical formalization of group fairness is the largest gap between a model’s performance for a group in G and its average performance across the entire population. We refer to such worst-case group fairness metrics as max-gap fairness metrics. Multi-group fairness notions aim to increase the granularity of groups in G for which model performance is measured and compared [21]–[25]. Multi-group fairness metrics answer recent calls for testing for The work of Lucas Monteiro Paes and Flavio P. Calmon was supported in part by the National Science Foundation under grants CAREER 1845852, CIF 2312667, FAI 2040880, and also in part by a gift from Google. Lucas Monteiro Paes and Flavio P. Calmon are with the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02134, USA (e-mail: lucaspaes@g.harvard.edu; flavio@seas.harvard.edu). Ananda Theertha Suresh and Ahmad Beirami are with Google Research, New York, NY 10011, USA (e-mail: theertha@google.com; beirami@google.com). Alex Beutel contributed to this research while at Google Research, New York, NY 10011, USA. He is currently with OpenAI (e-mail: alexb@openai.com) ." 2312.03868v1,"1 Uncertainty-Informed Renewable Energy Scheduling: A Scalable Bilevel Framework Dongwei Zhao, Vladimir Dvorkin, Stefanos Delikaraoglou, Alberto J. Lamadrid L., and Audun Botterud Abstract—This work proposes an uncertainty-informed bid adjustment framework for integrating variable renewable energy sources (VRES) into electricity markets. This framework adopts a bilevel model to compute the optimal VRES day-ahead bids. It aims to minimize the expected system cost across dayahead and real-time stages and approximate the cost efficiency of the stochastic market design. However, solving the bilevel optimization problem is computationally challenging for largescale systems. To overcome this challenge, we introduce a novel technique based on strong duality and McCormick envelopes, which relaxes the problem to a linear program, enabling largescale applications. The proposed bilevel framework is applied to the 1576-bus NYISO system and benchmarked against a myopic strategy, where the VRES bid is the mean value of the probabilistic power forecast. Results demonstrate that, under high VRES penetration levels (e.g., 40%), our framework can significantly reduce system costs and market-price volatility, by optimizing VRES quantities efficiently in the day-ahead market. Furthermore, we find that when transmission capacity increases, the proposed bilevel model will still reduce the system cost, whereas the myopic strategy may incur a much higher cost due to over-scheduling of VRES in the day-ahead market and the lack of flexible conventional generators in real time. Index Terms—Renewable energy, electricity markets, uncertainty management, bilevel optimization, unit commitment, scalability, McCormick envelope N OMENCLATURE A. Sets and Indexes Λ Ω I I FS I SL K N T (·) n Set of transmission lines, indexed by (n, m), where n/m is sending/receiving end of a transmission line Set of VRES generation scenarios, indexed by ω Set of conventional units, indexed by i or j Subset of I with fast-startup generation units Subset of I with slow-startup generation units Set of VRES generation units, indexed by k Set of grid buses, indexed by n Set of market operation time slots, indexed by t mapping of (·) into the set of buses B. Parameters C i Variable generation cost of conventional units The information, data, or work presented herein was funded by the Advanced Research Projects Agency-Energy (ARPA-E), U.S. Department of Energy, under Award Number DE-AR0001277. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. Parts of the results have appeared in a conference paper [1]. Dongwei Zhao and Vladimir Dvorkin are with the Energy Initiative and Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA, USA (e-mail: {zhaodw, dvorkin}@mit.edu). Stefanos Delikaraoglou and Audun Botterud are with the Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA, USA (e-mail: sdelikaraoglou@gmail.com, audunb@mit.edu). Alberto J. Lamadrid L. is with the Department of Economics and Department of Industrial and Systems Engineering, Lehigh University, Bethlehem, PA, USA (e-mail: ajlamadrid@lehigh.edu). C i 0 No-load cost of conventional units C i SU Start-up cost of conventional units C sh Cost of load shedding (value of lost load) C i U/D Real-time up-/downward re-dispatch costs F n,m Transmission line capacities L n,t Day-ahead load forecast L n,t,ω Real-time demand realization P i Maximum generation capacity of conventional units P i Minimum generation capacity of conventional units R i U/D Upward/downward ramping capacity of conventional units f k,t,ω Real-time VRES power realization W W k VRES power capacity x n,m Transmission line reactance C. Decision Variables DA δ n,t DA c i,t p C i,t p W k,t u DA i,t W k,t RT δ n,t,ω RT c i,t,ω sh l n,t,ω p W,cr k,t,ω U/D r i,t,ω u RT i,t,ω Day-ahead voltage angle Day-ahead start-up cost of conventional units Day-ahead generation of conventional units Day-ahead generation of VRES units Day-ahead commitment status of conventional units Day-ahead bidding quantity of VRES units Real-time voltage angle Real-time start-up cost of conventional units Real-time shedding of electrical loads Real-time VRES power curtailment Real-time up-/downward re-dispatch of conventional units Real-time commitment status of conventional units I. I NTRODUCTION The appeal for a transition to zero-carbon power systems has motivated the large-scale deployment of variable renewable energy sources (VRES). From 2010 to 2020, the globally installed solar PV capacity increased from about 40 GW to 760 GW, while the wind energy capacity grew from about 200 GW to 740 GW [2]. In many regions, this transition takes place in restructured electricity markets. For instance, in the USA, New York Independent System Operator (NYISO) is mandated to reach 70% renewable electricity by 2030 [3] and California Independent System Operator (CAISO) is taking actions to align with the state’s policy to supply 100% zeroemission electricity by 2045 [4]. The existing electricity market design is tailored to the technical and economic characteristics of dispatchable fossilfueled generators. However, the increasing levels of VRES pose challenges to achieving market efficiency and reliability due to inherent variability and uncertainty. As a result, there are ongoing discussions around revisiting the electricity market design to address these challenges [5]." 2312.03875v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Data-driven state-space and Koopman operator models of coherent state dynamics on invariant manifolds C. Ricardo Constante-Amores, Michael D. Graham† Department of Chemical and Biological Engineering, University of Wisconsin-Madison, Madison WI 53706, USA The accurate simulation of complex dynamics in fluid flows demands a substantial number of degrees of freedom, i.e. a high-dimensional state space. Nevertheless, the swift attenuation of small-scale perturbations due to viscous diffusion permits in principle the representation of these flows using a significantly reduced dimensionality. Over time, the dynamics of such flows evolve towards a finite-dimensional invariant manifold. Using only data from direct numerical simulations, in the present work we identify the manifold and determine evolution equations for the dynamics on it. We use an advanced autoencoder framework to automatically estimate the intrinsic dimension of the manifold and provide an orthogonal coordinate system. Then, we learn the dynamics by determining an equation on the manifold by using both a function space approach (approximating the Koopman operator) and a state space approach (approximating the vector field on the manifold). We apply this method to exact coherent states for Kolmogorov flow and minimal flow unit pipe flow. Fully resolved simulations for these cases require O(10 3 ) and O(10 5 ) degrees of freedom respectively, and we build models with two or three degrees of freedom that faithfully capture the dynamics of these flows. For these examples, both the state space and function space time evaluations provide highly accurate predictions of the long-time dynamics in manifold coordinates. 1. Introduction The Navier-Stokes equations (NSE) are dissipative partial differential equations (PDE) that describe the motion of fluid flows. When they have complex dynamics, their description requires a large number of degrees of freedom -a high state space dimensionto accurately resolve their dynamics. However, due to the fast damping of small scales by viscous diffusion, the long-time dynamics relax to a finite-dimensional surface in state space, an invariant manifold M of embedding dimension d M (Temam 1989; Foias et al. 1988; Zelik 2022). The long-time dynamics on M follow a set of ordinary differential equations in d M dimensions; since M is invariant under the dynamics, the vector field defined on M remains tangential to M. Classical data-driven methods for dimension reduction, such as Proper Orthogonal Decomposition (POD), approximate this manifold as a flat surface, but for complex flows, this linear approximation is severely limited (Holmes et al. 2012). Deep neural networks have been used to discover the invariant manifold coordinates for complex chaotic systems such as the Kuramoto–Sivashinsky equation, channel flow, Kolmogorov flow or turbulent planar Couette flow (Milano & Koumoutsakos 2002; Page et al. 2021; Linot & Graham 2020; Pérez De Jesús & Graham 2023; Zeng & Graham 2023; Linot & Graham 2023; Floryan & Graham 2022). (In the present work we consider global coordinates in the embedding dimension of the manifold; † Email address for correspondence: mdgraham@wisc.edu" 2312.03901v1,"Received , ; Revised , ; Accepted , DOI: xxx/xxxx CASE STUDY Redrawing the 2012 map of the Maryland congressional districts Noah Lee 1 | Hyunwoo Park 2 | Sangho Shim* 3 1 North Allegheny Senior High School, Pennsylvania, USA 2 Graduate School of Data Science, Seoul National University, Seoul, Republic of Korea 3 School of Engineering, Mathematics and Science, Robert Morris University, Pennsylvania, USA Correspondence *Sangho Shim, 6001 University Blvd, Moon Twp, PA 15108, USA. Email: shim@rmu.edu Present Address 6001 University Blvd, Moon Twp, PA 15108, USA. 1 Abstract Gerrymandering is the practice of drawing biased electoral maps that manipulate the voter population to gain an advantage. The most recent time gerrymandering became an issue was 2019 when the U.S. Federal Supreme Court decided that the court does not have the authority to dictate how to draw the district map and state legislators are the ones who should come up with an electoral district plan. We solve the political districting problem and redraw the 2012 map of Maryland congressional districts which raised the issue in 2019. KEYWORDS: high school operations research, management science, political districting, gerrymandering, democracy INTRODUCTION Gerrymandering is the practice of drawing biased electoral maps that manipulate the voter population to gain an advantage. It is an issue that is relatively unknown despite its vast importance and relevance to the modern American political landscape. The maps are drawn in a way that isolates or weakens opposition to the point where it is virtually impossible for an opposing party to have a significant win. Gerrymandering has been an issue that has plagued democracy in America for nearly its entire history. Many cite Governor Elbridge Gerry as the source of this issue; in March of 1812, Elbridge drew an electoral map of Massachusetts that twisted and turned so drastically that it was called “a new species of monster...the Gerry mander” by the Boston Gazette. 10 The nickname was derived from the salamander-like shape of the recently drawn map and Elbridge Gerry’s last name. This map, massively favoring the Jeffersonian Republicans, is memorialized as the origin of the term gerrymandering. However, gerrymandering has existed far before this fateful incident. The origins of this issue can be traced to 18th century England, and following the English movement to the New World, gerrymandering began almost immediately in the new colonies. Gerrymandering continued to persist and even grew in prevalence following the South’s defeat in the Civil War. 10 African Americans winning their civil rights, namely voting rights, was seen as a massive threat to white dominance in the South. Gerrymandering was employed by Southern politicians as a way of minimizing the impact of African Americans votes; this method of voter suppression eventually fell off in favor of other methods such as the infamous Jim Crow laws. Gerrymandering has still remained throughout all these years and with the aid of new methods has become a mainstay issue in modern politics. Preventive measures were passed in the 1960s by the Supreme Court. Led by Chief Justice Earl Warren, the Supreme Court ruled that electoral districts must be roughly equal in population and must be redrawn every 10 years based on the census. There are two types of Gerrymandering: cracking and packing. Packing refers to the practice of drawing electoral lines that group people of similar political views into one region. 7 This method weakens its victim’s strength in other districts by placing the majority in one single district; critically, a single district win will not win a state. North Carolina’s 12th district was a prime example of this technique; the primary issue of the map was that Republican lawmakers packed Democrat voters into the 12th" 2312.03903v1,"Adaptive Dependency Learning Graph Neural Networks Abishek Sriramulu a,∗ , Nicolas Fourrier b , Christoph Bergmeir a abishek.sriramulu@monash.edu, nfourrier@gmail.com, christoph.bergmeir@monash.edu a Department of Data Science & Artificial Intelligence, Monash University, Clayton VIC 3800, Australia. b Léonard de Vinci Pôle Universitaire, Research Center, 92 916 Paris La Défense, France. Abstract Graph Neural Networks (GNN) have recently gained popularity in the fore- casting domain due to their ability to model complex spatial and temporal patterns in tasks such as traffic forecasting and region-based demand forecast- ing. Most of these methods require a predefined graph as input, whereas in real-life multivariate time series problems, a well-predefined dependency graph rarely exists. This requirement makes it harder for GNNs to be utilised widely for multivariate forecasting problems in other domains such as retail or energy. In this paper, we propose a hybrid approach combining neural networks and sta- tistical structure learning models to self-learn the dependencies and construct a dynamically changing dependency graph from multivariate data aiming to enable the use of GNNs for multivariate forecasting even when a well-defined graph does not exist. The statistical structure modeling in conjunction with neural networks provides a well-principled and efficient approach by bringing in causal semantics to determine dependencies among the series. Finally, we demonstrate significantly improved performance using our proposed approach on real-world benchmark datasets without a pre-defined dependency graph. Keywords: Multivariate Forecasting, Graph Neural Networks, Dynamic Graph Learning, Time Series ∗ Postal Address: Faculty of Information Technology, P.O. Box 63 Monash University, Victoria 3800, Australia. E-mail address: abishek.sriramulu@monash.edu Preprint submitted to Elsevier December 8, 2023" 2312.03932v1,"Stochastic Gravitational Wave Background Detection through NANOGrav 15-year Data Set in the View of Massive Gravity Chris Choi, 1, ∗ Jacob Magallanes, 1, † Murman Gurgenidze, 1, 2, ‡ and Tina Kahniashvili 3, 2, 4, § 1 2 Department of Physics, Carnegie Mellon University, Pittsburgh, PA 15213, USA School of Natural Sciences and Medicine, Ilia State University, 0194 Tbilisi, Georgia 3 McWilliams Center for Cosmology and Department of Physics, Carnegie Mellon University, Pittsburgh, PA 15213, USA 4 Abastumani Astrophysical Observatory, Tbilisi, GE-0179, Georgia (Dated: December 8, 2023) Convincing evidence of a stochastic gravitational wave background has been found by the NANOGrav collaboration in the 15-Year data set. From this signal, we can evaluate the possibility of its source being from the early universe through the tensor perturbations induced by a massive spin-2 graviton field. We consider a time dependent model of the minimal theory of massive gravity, and find values of the graviton mass, mass cutoff time, and Hubble rate of inflation that amplify the energy spectra of primordial gravitational waves sufficiently to reproduce the signal from the NANOGrav data within 1-3 standard deviation. However, a suppression mechanism for high frequency modes must be introduced to conservatively obey the big bang nucleosynthesis (BBN) bound. While there are regions of the parameter space that reproduces the signal, it remains a challenge to simultaneously respect the BBN and cosmic microwave background (CMB) bounds without making the graviton mass cutoff time too deep into the matter dominated era. I. INTRODUCTION Evidence supporting the existence of a stochastic gravitational wave background (SGWB) has been found by 15 years of observation of pulsars by the North American Nanohertz Observatory for Gravitational Waves (NANOGrav) collaboration [1], and after confirmed by the Chinese Pulsar Timing Array (CPTA) [2], the European Pulsar Timing Array (EPTA) [3, 4], and the Parkes Pulsar Timing Array (PPTA) [5, 6]. We investigate alternatives to the astrophysical explanation (like inspiraling supermassive black hole binaries (SMBHBs) [7–9]), such as the time dependent model of massive gravity proposed in Ref. [10]. Compared to astrophysical origins, more exotic explanations lie in cosmological sources of the SGWB [11–19]. Such cosmological explanations for the source include cosmic strings [20–23], domain walls [24, 25], first-order phase transitions in the early universe [26– 36], primordial gravitational waves [37–43], and scalarinduced gravitational waves [44–54] generated by primordial black holes [55–69] formed by scalar-tensor inflation. The NANOGrav and EPTA collaborations have considered some of these aforementioned new physics sources [70, 71]. In this paper, we consider the primordial gravitational wave hypothesis, with an amplification due to massive gravity. Primordial gravitational waves generated during cosmic inflation, freely propagating in the radiationdominated plasma, are predicted by theory [37–41]. It ∗ minyeonc@andrew.cmu.edu † jmagalla@andrew.cmu.edu ‡ mgurgeni@andrew.cmu.edu § tinatin@andrew.cmu.edu is possible that the signatures of these waves we detect could differ from what we expect based on GR. In fact, the propagation of these primordial gravitational waves could very well be modified by alternate theories of gravity, including massive gravity (MG), first introduced by Fierz and Pauli in 1939 [72]. Since then, many attempts have been made to construct a consistent non-linear theory of MG. Any purely linear theory suffers from the van Dam-Veltman- Zakharov (vDVZ) discontinuity [73, 74], which prevents the theory from reducing to GR in the massless limit. Attempts have been made to address this, like the nonlinear extensions to the Fierz-Pauli theory that exhibit the Vainshtein mechanism [75]. This has its own set of problems, like the Boulware-Deser ghost and other ghost degrees of freedom [76, 77]. This presents a significant obstacle for trying to come up with a consistent theory. Recently, attempts have been made to provide ghostfree nonlinear MG theories, such as the deRham- Gabadaze-Tolley (dRGT) theory [78–81]. An alternative approach is to do away with Lorentz invariance, allowing gravitons to form a 3D rotation group, e.g. [77, 82–88]. This no longer requires the theory to have five degrees of freedom, and one such model has been proposed on these grounds: the minimal theory of massive gravity (MTMG) [89, 90]. This has two propagating degrees of freedom, just like in GR, and this is the model we will consider in this paper. Another benefit of this model is that we no longer have to consider the Higuchi bound, which ordinarily requires that the ratio of the mass of the graviton to the Hubble scale of inflation be up to an order of unity [91]. In this paper, we will consider a time-dependent MTMG model of massive gravity, specifically one in which the graviton mass is a step-function of time as described in Ref. [10] (hereafter the Step Function Mass" 2312.03958v1,"On Distributed Nonconvex Optimisation Via Modified ADMM Behnam Mafakheri 1 , Jonathan H. Manton 1 and Iman Shames 2 Abstract— This paper addresses the problem of nonconvex nonsmooth decentralised optimisation in multi-agent networks with undirected connected communication graphs. Our contribution lies in introducing an algorithmic framework designed for the distributed minimisation of the sum of a smooth (possibly nonconvex and non-separable) function and a convex (possibly nonsmooth and non-separable) regulariser. The proposed algorithm can be seen as a modified version of the ADMM algorithm where, at each step, an “inner loop” needs to be iterated for a number of iterations. The role of the inner loop is to aggregate and disseminate information across the network. We observe that a naive decentralised approach (one iteration of the inner loop) may not converge. We establish the asymptotic convergence of the proposed algorithm to the set of stationary points of the nonconvex problem where the number of iterations of the inner loop increases logarithmically with the step count of the ADMM algorithm. We present numerical results demonstrating the proposed method’s correctness and performance. I. I NTRODUCTION While distributed solutions to large-scale convex optimisation problems have been studied extensively in the last two decades, the same cannot be said about the nonconvex variant [15, 14]. We propose a distributed algorithm for solving problems of the following archetypal form: minimize f (x) := p x∈R n X f i (x) + g(x), (1) i=1 where each f i represents smooth (possibly nonconvex, nonseparable) functions, while g is a convex (possibly nonsmooth) function. The objective is to have n agents cooperate in solving the optimisation problem over an underlying fixed communication graph. It is assumed that each agent i privately possesses knowledge of the local objective function f i (x) and the function g(x), where g is used to impose desired structures on the solution (e.g., ℓ 1 norm for sparsity) and/or used to enforce certain constraints. In machine learning applications, this controls the complexity of the model to avoid over-fitting in the training process [3]. The distributed algorithms aimed at solving (1) can be classified into either (sub)gradient-based methods or operator splitting-based methods, applied to either the primal or dual problems. In this work, we explore the Alternating Direction Method of Multipliers (ADMM), a powerful *This work was supported by the Australian Research Council under the Discovery Projects funding scheme (DP210102454). 1 B. Mafakheri and J. H. Manton are with Department of Electrical and Electronic Engineering, University of Melbourne, VIC 3010, Australia {mafakherib, jmanton}@unimelb.edu.au 2 I. Shames is with the The CIICADA Lab, School of Engineering, The Australian National University, Canberra, ACT 2601, Australia iman.shames@anu.edu.au operator splitting-based method widely recognised for its effectiveness in numerically solving optimisation problems [2, 4, 7]. However, existing distributed ADMM algorithms face limitations in their applicability, as they either assume a communication network structured as a star graph with a central node or overlook the role of the regularizing function g. In scenarios where a central node is present in the graph, previous works [7, 3, 5] have shown that ADMM converges in asynchronous settings to a stationary point of the problem with a sublinear rate. Modified ADMM versions tailored for arbitrary connected communication graphs have been proposed by authors in [6, 18]. Specifically, the Prox- PDA algorithm in [6] achieves sublinear convergence to a stationary point of the problem (1) with g ≡ 0. In a similar problem context, [18] proves the convergence of a modified ADMM version to the global minimum under the condition that the global cost function satisfies the Polyak-Łojasiewicz condition. However, it is crucial to emphasize that these existing schemes and convergence analyses are not directly transferable to address our specific problem (1) when g ̸ = 0, as they do not consider the presence of the regulariser function, potentially rendering the objective function nonsmooth. To overcome this limitation, our work introduces an ADMM-based algorithm explicitly designed to decentralise the optimisation algorithm. This enables the algorithm’s applicability to arbitrarily connected communication graphs while accommodating convex regulariser functions g. Our contributions can be summarised as follows: The proposed algorithm is applicable to any arbitrary graph that is connected and extends to problems with convex regulariser functions g. • We prove the algorithm’s convergence to the set of stationary points of the problem, provided that the f i ’s are smooth and g is a closed convex function. • Instead of assuming a central node in the graph, we propose that nodes emulate the existence of such a central node by approximating the information that would have been provided through interactions with their immediate neighbours. • The remainder of this paper is organised as follows: Section II introduces the necessary notation and preliminary definitions. The main results and the proposed algorithm are discussed in Section III, while Section IV is dedicated to the accompanying proofs. Section V provides the numerical results, validating the effectiveness and efficiency of the proposed approach. In Section VI, we summarise our contributions and outline future research directions." 2312.03976v1,"ERGODIC MEASURES IN MINIMAL GROUP ACTIONS WITH FINITE TOPOLOGICAL SEQUENCE ENTROPY XIANGTONG WANG AND LEIYE XU Abstract. Let G be an infinite discrete countable group and (X, G) be a minimal G-system. In this paper, we prove of topological sequence entropy P the supremum ∗ of (X, G) is not less than log( µ∈M e (X,G) e h µ (X,G) ). If additionally G is abelian then there is a constant K ∈ N ∪ {∞} with log K ≤ h ∗ top (X, G) such that ν({y ∈ H : |π −1 (y)| = K}) = 1 where (H, G) is the maximal equicontinuous factor of (X, G), π : (X, G) → (H, G) is the factor map and ν is the Haar measure of H. 1. Introduction Throughout this paper, we always assume that G is an infinite discrete countable group, unless we state explicitly in some places. Moreover, we always assume that X is a compact metric space with metric d(·, ·) and B X is the Borel σ-algebra of (X, d). Recall that by a G-system we mean a pair (X, G), where G act on X continuously. By a G-measure preserving system we mean a triple (X, µ, G), where (X, G) is a G-system and µ is a G-invariant Borel probability measure on X. The topological sequence entropy for a Z-system was firstly introduced by Goodman [11]. A system is null if the sequence entropy of the system is zero for any sequence. It was showed that if a minimal Z-system is null then it is uniquely ergodic, has discrete spectrum, mean equicontinuous and is an almost one to one extension of its maximal equicontinuous factor [13]. Sequence entropy for a measure was introduced by Kushnirenko [22], it was shown that an ergodic measure preserving transformation has discrete spectrum if and only if its sequence entropy is zero for any sequence. The definition of topological sequence entropy (resp. measure theoretic sequence entropy) for G-systems (resp. G-measure preserving system) is similar. The supremum of topological sequence entropy for G-system is log K for some K ∈ N ∪ {∞} [13, 17]. In the case G is amenable, the supremum of measure theoretic sequence entropy for G-system is is log K for some K ∈ N ∪ {∞} [17, 23]. In [26], Qiu shown that if a minimal Z-system has the supremum of topological sequence entropy log K for some K ∈ N, then there is k ≤ K such that ν({y ∈ H : |π −1 y| = k}) = 1 where (H, Z) is the maximal equicontinuous factor, π is the factor map and ν is the Haar measure on H. The following result generalize Qiu’s result to abelian group actions. 2020 Mathematics Subject Classification. Primary: 28D20, 37A35. Key words and phrases. Sequence entropy, Ergodic measure, Minimal, Independent set . 1" 2312.03977v1,"RIS-Aided Interference Cancellation for Joint Device-to-Device and Cellular Communications Ly V. Nguyen and A. Lee Swindlehurst Center for Pervasive Communications and Computing, University of California, Irvine, CA, USA Email: vanln1@uci.edu, swindle@uci.edu Abstract—Joint device-to-device (D2D) and cellular communication is a promising technology for enhancing the spectral efficiency of future wireless networks. However, the interference management problem is challenging since the operating devices and the cellular users share the same spectrum. The emerging reconfigurable intelligent surfaces (RIS) technology is a potentially ideal solution for this interference problem since RISs can shape the wireless channel in desired ways. This paper considers an RIS-aided joint D2D and cellular communication system where the RIS is exploited to cancel interference to the D2D links and maximize the minimum signal-to-interference plus noise (SINR) of the device pairs and cellular users. First, we adopt a popular alternating optimization (AO) approach to solve the minimum SINR maximization problem. Then, we propose an interference cancellation (IC)-based approach whose complexity is much lower than that of the AO algorithm. We derive a representation for the RIS phase shift vector which cancels the interference to the D2D links. Based on this representation, the RIS phase shift optimization problem is transformed into an effective D2D channel optimization. We show that the AO approach can converge faster and can even give better performance when it is initialized by the proposed IC solution. We also show that for the case of a single D2D pair, the proposed IC approach can be implemented with limited feedback from the single receive device. I. I NTRODUCTION With the proliferation of mobile users and devices, joint device-to-device (D2D) and cellular communication has been envisioned as a promising technology for enhancing spectral efficiency in future wireless networks [1]. In this technology, devices and cellular users operate on the same spectrum, and therefore significantly improve the network spectral efficiency. However, the interference management problem is very challenging due to spectrum sharing between the operating devices and cellular users [2]–[4]. Fortunately, the D2D interference problem can be effectively addressed by reconfigurable intelligent surfaces (RISs)–a recent innovative technology capable of shaping the wireless channel in desired ways [5], [6]. For example, the works in [7]–[9] show that an RIS can be used to effectively null out or mitigate interference in D2D systems. While the work in [7] considers a conventional passive RIS structure which can only change the phase of the incoming signal, the authors in [8], [9] show that a hybrid RIS structure with the capability of simultaneously changing the phase and amplitude of the incoming signal can provide This work was supported by the National Science Foundation under grants CNS-2107182 and ECCS-2030029. better interference cancellation performance. However, these prior works all consider systems with only D2D links, i.e., there were no active co-channel cellular users present. RIS-assisted joint D2D and cellular communication has been studied in several recent papers. For example, the works in [10] and [11] perform analyses for RIS-assisted D2D communications under Rician and Nakagami-m fading channels, respectively. The study in [10] investigates the effective capacity and performs mode selection to determine whether the D2D communication is established through an RIS or a base station (BS). The authors of [11] derived closed-form expressions for the outage probability of the D2D links and the resulting diversity order. Unlike [10], [11] which perform system analysis, some other recent papers focus on system design and optimization [12]–[17]. In particular, the sum-rate maximization problem was considered in [12]–[15] and deep reinforcement learning was used in [12], [14]. However, the works in [12], [14] assume that the BS is equipped with only one antenna and only one D2D pair is allowed to share the spectrum with a single cellular user. Multiple D2D pairs sharing the same spectrum with a cellular user were considered in [13], [15], but it was still assumed that the BS has only one antenna. The sum-rate maximization problem for systems with a multi-antenna BS was studied in [16], [17], but again they assume only one D2D pair sharing the spectrum with one cellular user. Unlike the aforementioned works which consider the sumrate maximization problem with relaxed system assumptions, we study a different problem that takes into account the fairness by maximizing the minimum signal-to-interferenceplus-noise ratio (SINR) over the cellular users and devices. We also consider a more challenging RIS-assisted joint D2D and cellular communication system where multiple cellular users share the same spectrum with multiple D2D pairs and the BS is also equipped with multiple antennas. The contributions of our paper is summarized as follows: First, we adopt a popular alternating optimization (AO) approach and the semi-definite relaxation (SDR) technique to optimize the combining matrix at the BS and the RIS phase shift vector that maximize the minimum SINR over the cellular users and devices. • Next, we propose an interference cancellation (IC)-based approach whose complexity is much lower than that of the AO algorithm. More specifically, we first derive a •" 2312.03989v1,"Rapid detection of rare events from in situ X-ray diffraction data using machine learning Weijian Zheng, † Jun-Sang Park, † Peter Kenesei, Ahsan Ali, Zhengchun Liu, Ian T. Foster, Nicholas Schwarz, Rajkumar Kettimuthu, Antonino Miceli, Hemant Sharma ∗ Argonne National Laboratory, 9700 S Cass Ave, Lemont, IL, USA ∗ To whom correspondence should be addressed: hsharma@anl.gov † Equal contributions December 8, 2023 Abstract High-energy X-ray diffraction methods can non-destructively map the 3D microstructure and associated attributes of metallic polycrystalline engineering materials in their bulk form. These methods are often combined with external stimuli such as thermo-mechanical loading to take snapshots over time of the evolving microstructure and attributes. However, the extreme data volumes and the high costs of traditional data acquisition and reduction approaches pose a barrier to quickly extracting actionable insights and improving the temporal resolution of these snapshots. Here we present a fully automated technique capable of rapidly detecting the onset of plasticity in high-energy X-ray microscopy data. Our technique is computationally faster by at least 50 times than the traditional approaches and works for data sets that are up to 9 times sparser than a full data set. This new technique leverages self-supervised image representation learning and clustering to transform massive data into compact, semantic-rich representations of visually salient characteristics (e.g., peak shapes). These characteristics can be a rapid indicator of anomalous events such as changes in diffraction peak shapes. We anticipate that this technique will provide just-in-time actionable information to drive smarter experiments that effectively deploy multi-modal X-ray diffraction methods that span many decades of length scales. 1 Introduction Metals play a significant role in modern society. They are used in a wide range of applications such as transportation; construction; energy generation, storage and delivery; and security. The performance requirements for these polycrystalline engineering materials have pushed the diversity and complexity of 1" 2312.04003v1,"Tracker behaviour of quintom dark energy and the Hubble tension Nandan Roy 1, ∗ and L. Arturo Ureña-López 2, † 1 Centre for Theoretical Physics & Natural Philosophy, Mahidol University, Nakhonsawan Campus, Phayuha Khiri, Nakhonsawan 60130, Thailand 2 Departamento de Fı́sica, DCI, Campus León, Universidad de Guanajuato, 37150, León, Guanajuato, México (Dated: December 8, 2023) We study the dynamics of the quintom dark energy model using state-of-the-art cosmological observations. The set of equations has been converted into an autonomous system using suitable transformations of the variables. We have discussed the fixed points of the model and the general phase-space behavior, in particular, in finding the existence of the tracker solutions for this model. The observations suggest that at late times the phantom field should dominate the dark energy sector with an approximately 15% share to the quintessence counterpart, and with both fields tracking the background at early times. A Bayesian model comparison with LambdaCDM has also been done by computing the Bayes factor and a positive preference has been obtained for the quintom model. Although not fully resolved, the Hubble tension can be reduced to 2.6σ when compared with the value of H 0 reported in [1] and to 1.6σ when compared with that of [2]. I. INTRODUCTION Although the cosmological constant is the simplest and most consistent explanation for the accelerated expansion of the universe [3–5], its constant nature gives rise to some famous problems in cosmology, such as the fine-tuning problem and the cosmological constant problem [6–8]. Furthermore, as cosmology enters the era of ultra-precision measurement, the constraint on some key cosmological parameters puts the cosmological constant in more challenges. Currently, the most significant tension in cosmology is the Hubble tension. There is a discrepancy between the measurements of the Hubble parameter from early universe data [5, 9, 10] and late-time data [11–14] at the level of 5σ. For a more in-depth discussion of this topic, see [15, 16]. One solution to the problems associated with the cosmological constant is considering dynamical dark energy models that evolve over time [17–20]. The equation of state (EOS) for dark energy is fixed at −1 for the cosmological constant, whereas for dynamical dark energy models it varies over time. This has also been supported by the fact that the current estimated value of EoS of dark energy is w DE ≤ −1 [5]. Quite a large number of dynamical dark energy models have been proposed as alternatives to the cosmological constant. Scalar fields with different types of kinetic terms and potentials are often considered candidates of the dynamical dark energy [19] as, for example, quintessence, phantom, K-essence, etc. Moreover, a wide variety of other models have been suggested that can reduce or alleviate Hubble tension, such as the early dark energy model [21], the running vacuum model [22–25], phantom-crossing models [26, 27], etc. For quintessence scalar field models in which a canonical scalar field is minimally coupled to gravity, the allowed value of the EOS of dark energy is −1 ≤ w DE ≤ 0 [28, 29]. A value of EOS w DE < −1 is not allowed for quintessence models. The consideration of a phantom scalar field or K-essence models can allow us to achieve an EOS that is ∗ nandan.roy@mahidol.ac.th (Corresponding Author) † lurena@ugto.mx less than −1 [30–33] but crossing the critical limit w DE = −1 cannot also be achieved in these models. Studies have suggested that w DE crosses over at −1 [27, 34–36] which means that at present w DE ≤ −1 but in the past w DE > −1. In order to achieve a phantom barrier crossing, one possible solution is to incorporate both quintessence and phantom scalar fields as components of the universe. These phenomenological models are referred to as quintom models [37–42]. These models have been successful in replicating the phantom divider crossing behavior of w DE [39, 43], suggesting that quintom models may be able to address the Hubble tension. However, a comprehensive comparison with recent cosmological observations is necessary to confirm this. In this work, we have considered a general quintom model without any specific form of the potential. Instead, we have considered the general parameterization of the potentials proposed in [44] and later used in [45–48] to study quintessence and phantom models. We have constructed an autonomous system considering the appropriate transformation of variables. As shown in our previous work for the quintessence field [47] we have considered the polar transformation and for the phantom field, we have considered the hyperbolic transformation [46]. Similarly to the previous work, we can identify the existence of the tracker solutions for the quintom field with four different scenarios. Tracker solutions are important in alleviating scalar-field dark energy models from coincidence and fine-tuning problems [28, 49]. These solutions have a remarkable property where the energy density of the scalar field follows the background energy density, behaves like an attractor solution for a wide range of initial conditions. We have used recent cosmological observations to constrain the cosmological parameters. To compare the performance of our model with the ΛCDM model, we have used the concept of Bayesian model selection by calculating the Bayes factor. Additionally, we have provided an update on the current status of the Hubble tension in this model. The paper is structured as follows. Section II deals with the mathematical setup of the quintom model with general parameterization of the potentials. Section III describes the critical points and the behavior of the tracker solutions and the estimation of the initial condition. The constraint" 2312.04006v1,"A representation theorem for set-valued submartingales Luc T. Tuyen a,˚ , Vu T. Luan b,a a b Institute of Information Technology, Vietnam Academy of Science and Technology Department of Mathematics and Statistics, Mississippi State University, 410 Allen Hall, 175 President’s Circle, Mississippi State, MS, 39762, USA Abstract The integral representation theorem for martingales has been widely used in probability theory. In this work, we propose and prove a general representation theorem for a class of set-valued submartingales. We also extend the stochastic integral representation for non-trivial initial set-valued martingales. Moreover, we show that this result covers the existing ones in the literature for both degenerated and non-degenerated set-valued martingales. Keywords: Set-valued integrals, Set-valued martingales, Random sets, Set-valued stochastic processes, Interval-Valued martingale, Martingale representation theorem 1. Introduction Martingales (i.e., the single-valued case) have played an important role in many statistical applications [7]. In the random sets (or set-valued) framework, the definitions of set-valued martingales, sub-martingales and supermartingales have been introduced by Hiai and Umegaki [8]. In recent years, the limit theorems of such type of martingales in the discrete setting have been extended and represented in [18] and [17]. While the applications of stochastic processes in general and of martingales in particular have been widely used long time ago in many statistical fields, applications of set-valued Corresponding author Email addresses: tuyenlt@ioit.ac.vn (Luc T. Tuyen), luan@math.msstate.edu (Vu T. Luan) ˚" 2312.04007v1,"Restoring cosmological concordance with axion-like early dark energy and dark matter characterized by a constant equation of state? Yan-Hong Yao ∗ School of Physics and Astronomy, Sun Yat-sen University, 2 Daxue Road, Tangjia, Zhuhai, People’s Republic of China Xin-He Meng School of Physics, Nankai University, Tianjin, 300071, People’s Republic of China The Hubble tension persists as a challenge in cosmology. Even early dark energy (EDE) models, initially considered the most promising for alleviating the Hubble tension, fall short of addressing the issue without exacerbating other tensions, such as the S 8 tension. Considering that a negative dark matter (DM) equation of state (EoS) parameter is conducive to reduce the value of σ 8 parameter, in this paper, we extend the axion-like EDE model in this paper by replacing the cold dark matter (CDM) with DM characterized by a constant EoS w dm (referred as WDM hereafter). We then impose constraints on this axion-like EDE extension model, along with three other models: the axion-like EDE model, ΛWDM, and ΛCDM. These constraints are derived from a comprehensive analysis incorporating data from the Planck 2018 cosmic microwave background (CMB), baryon acoustic oscillations (BAO), the Pantheon compilation, as well as a prior on H 0 (i.e., H 0 = 73.04 ± 1.04, based on the latest local measurement by Riess et al.) and a Gaussianized prior on S 8 (i.e., S 8 = 0.766 ± 0.017, determined through the joint analysis of KID1000+BOSS+2dLenS). We find that although the new model maintains the ability to alleviate the Hubble tension to ∼ 1.4σ, it still exacerbate the S 8 tension to a level similar to that of the axion-like EDE model. I. INTRODUCTION Although scrutinized by a plethora of observational data across various scales in the past, the Lambda Cold Dark Matter (ΛCDM) model is currently facing skepticism regarding its internal inconsistencies. The Hubble tension, i.e. disagreement between direct [1] and indirect measurements [2] of the Hubble constant H 0 , is a major factor contributing to this outcome. Although, up to this point, we can’t exclude the possibility of systematics as the origin of the Hubble tension, many cosmologists are beginning to address the tension by introducing new physics. Generally speaking, solutions for resolving the Hubble tension in a theoretical manner can be categorized into two types: early-time solutions and late-time solutions, based on the introduction of new physics before and after recombination. Early-time solutions, such as early dark energy (EDE) models [3–12], which introduce an exotic dark sector that acts as a cosmological constant before a critical redshift z c around 3000 but whose density then dilutes faster than radiation, and dark radiation models [13–18], which include extra relativistic degrees of freedom that doesn’t interact with photons and baryons, are considered to play a important role in resolving the Hubble tension. Nevertheless, as pointed out by the author of Ref. [19], early-time new physics alone will always fall short of fully solving the Hubble tension. On the other hand, late-time solutions, such as late dark energy (DE) models [20–26] and interacting DE models [27–39], are also considered to be incapable of fully resolving the ∗ Electronic address: yaoyh29@mail.sysu.edu.cn Hubble tension, since consistency with Baryon Acoustic Oscillation (BAO) and uncalibrated Type Ia supernovae (SN Ia) data requires new physics to be introduced before recombination, in order to reduce the sound horizon by ∼ 7% [40–44]. Among all early-time solutions, EDE models may be the most promising category. However, similar to other early-time solutions, EDE models is incapable of fully resolving the Hubble tension, one of the primary reasons for this is that considering a non-zero EDE fractions f EDE (z c ) near the matter-radiation equality would increase the dark matter (DM) density ω cdm compared to that of ΛCDM. A higher value p of ω cdm would lead to a higher value of the S 8 = σ 8 Ω m /0.3 parameter (where Ω m is the matter density parameter and σ 8 is the matter fluctuation amplitude on scales of 8h −1 Mpc) if the value of σ 8 undergoes little variation, leading to a more significant S 8 tension between Cosmic Microwave Background (CMB) data and weak lensing (WL) as well as Large-Scale Structure (LSS) data [45–62]. However, it is still possible that an extension of an EDE model would mitigate the need for an increase in the ω cdm , or alternatively compensate the associated increase in the amplitude of fluctuations. In fact, various extensions of EDE models have been proposed by researchers guided by this idea in order to simultaneously alleviate the H 0 tension and the S 8 tension. See e.g. Refs. [63–70]. These models employ various methods to supplement or modify the cold dark matter (CDM) paradigm, including the introduction of the total neutrino mass M ν as a free parameter [63, 65, 70], the inclusion of ultra-light axions that comprises five percent of DM [64], the proposal to replace CDM with decaying DM [69], the consideration of DM coupled with EDE [66–68]. Since the nature of" 2312.04012v1,"INT-PUB-23-046 Weyl fermions on a finite lattice David B. Kaplan 1, ∗ and Srimoyee Sen, 2, † 2 1 Institute for Nuclear Theory, Box 351550, Seattle, Washington 98195-1550 Department of Physics and Astronomy, Iowa State University, Ames IA 50011 (Dated: December 2023) The phenomenon of unpaired Weyl fermions appearing on the sole 2 n-dimensional boundary of a ( 2 n + 1 )-dimensional manifold with massive Dirac fermions was recently analyzed in Ref. [1]. In this Letter we show that similar unpaired Weyl edge states can be seen on a finite lattice. In particular, we consider the discretized Hamiltonian for a Wilson fermion in (2+1) dimensions with a 1+1 dimensional boundary and continuous time. We demonstrate that the low lying boundary spectrum is indeed Weyl-like: it has a linear dispersion relation, definite chirality, and circulates only in one direction around the boundary. We comment on how our results are consistent with Nielsen-Ninomiya theorem. This work removes one potential obstacle facing the program outlined in [1] for regulating chiral gauge theories. Understanding how to regulate chiral gauge theories on the lattice has been a longstanding challenge, brought into focus by the early work on anomalies by Kaarsten and Smit [2] and the no-go theorem of Nielsen and Ninomiya [3]. The decades of failed attempts might have been enough to stop research in the field if it weren’t for the fact that the world is well described by a chiral gauge theory (the Standard Model) – albeit perturbatively in the weak interactions, and we need understand better how it works nonperturbatively and how it can be well-defined. Furthermore, strongly coupled chiral gauge theories are expected to display many interesting phenomena, such as massless composite fermions, and would be interesting to simulate. Recently it was proposed that Weyl fermions could appear as edge states on a finite five dimensional manifold with a single boundary, and that a chiral gauge theory could be constructed on the four dimensional boundary by gauging the exact vector-like symmetry in the five-dimensional world. In particular, the Dirac equation on a 2-d disc was analyzed in the continuum and shown to support massless 4d Weyl fermions on the boundary, which for large disc radius could be identified with one of our spatial dimensions, the remaining spacetime dimensions playing a less interesting role [1]; earlier related work by Aoki and Fukaya on domain wall fermions on manifolds with a single boundary can be found in Ref. [4]. The proposal [1] exploits the fact that massless fermion edge states appear at the boundary between two different topological phases, and as such are not a result of fine-tuning [5–7]. Furthermore, it is clear that there exist nonlocal interactions in such a theory with a coefficient proportional to the gauge anomaly, so that it would be automatic that an anomalous local 4d chiral gauge theory could never be constructed using this method. There are several speculative components to the idea, and here we address one of the simplest: whether the free fermion spectrum discussed in the continuum in ∗ dbkaplan@uw.edu † srimoyee08@gmail.com Ref. [1] can be realized on a lattice. The answer is yes, and that Weyl edge state modes are ubiquitous in extremely simple lattice theories of free fermions. It is not obvious that the analysis on the disc in the continuum should apply to the lattice. As a technical issue, the chiral nature of the edge state on the disc follows from the need to discard solutions to the Dirac eigenvalue equation which diverge at the center of the disc. If one considered an annulus with a hole in the center instead of a disc, in place of a single Weyl fermion edge state in the spectrum there would have been two of opposite chirality, the second solution circling the interior boundary of the annulus with level splitting set by 1 /R ′ , the inner radius. Since a lattice is full of holes, it is hard to imagine such mirror states being absent when space is discretized, potentially ruining the mechanism. However, if we consider the lattice to be like the disc, but with holes at the scale of the lattice spacing R ′ ∼ a, it may be reasonable to expect such mirror states to appear, but to be gapped at the lattice cutoff. This gapping mechanism does not break the exact U ( 1 ) symmetry (or U (N f ) for multiple flavors), in which we hope to embed a chiral gauge group, as it does not result from a mass for the unwanted Weyl mode but instead from forcing it to have high angular momentum. We show here that in fact such a picture is realized. This also addresses exactly which assumption underlying the Nielsen-Ninomiya theorem is being violated. As seen in the continuum example, the chiral symmetry of the edge states on the disc descend directly from the exact fermion number symmetry of the higher dimension theory, and this is true on the lattice as well. Therefore a violation of chiral symmetry in the lattice version is not the loophole, as it is with Ginsparg-Wilson fermions. The Nielsen-Ninomiya theorem basically states that a continuous, period spectrum cannot cross zero an odd number of times, where a single crossing is what is required to describe a single Weyl fermion. What we find here is that a very standard lattice theory can describe a left-handed fermion bound on the outer rim of lattice manifold, which develops a continuous spectrum as the size of the lattice is taken to be large, while the states one might iden-" 2312.04059v1,"Comparing Large Language Model AI and Human-Generated Coaching Messages for Behavioral Weight Loss Zhuoran Huang, BA 1 , Michael P. Berry, MS 1,2 , Christina Chwyl, MS 1,2 , Gary Hsieh, Ph.D. 3 , Jing Wei, MASc 4 , Evan M. Forman, Ph.D. 1,2 1 Center for Weight, Eating, and Lifestyle Science, Drexel University, 3141 Chestnut Street Stratton Hall, Philadelphia, PA 19104, United States 2 Department of Psychological and Brain Sciences, Drexel University, 3141 Chestnut Street Stratton Hall, Philadelphia, PA 19104, United States 3 Department of Human Centered Design & Engineering, University of Washington, Seattle, WA 98195, United States 4 School of Computing and Information Systems, The University of Melbourne, Parkville VIC 3052, Australia Corresponding Author: Zhuoran Huang, BA Center for Weight, Eating, and Lifestyle Science (WELL Center) Department of Psychological and Brain Sciences Drexel University 3201 Chestnut Street Philadelphia, PA USA Phone: 267.603.2390 Email: zh424@drexel.edu Disclaimers: All opinions and views expressed in this article are those of the authors and not those of the institution. Source(s) of support: NATIONAL INSTITUTE OF DIABETES AND DIGESTIVE AND KIDNEY DISEASES: R01DK125641 1" 2312.04063v1,"An unsupervised approach towards promptable defect segmentation in laser-based additive manufacturing by Segment Anything Israt Zarin Era 1 , Imtiaz Ahmed 1* , Zhichao Liu 1* , Srinjoy Das 1,2* 1 Industrial and Management Systems Engineering, West Virginia University, Morgantown, 26505, WV, USA. 2 School of Mathematical and Data Sciences, West Virginia University, Morgantown, 26505, WV, USA. *Corresponding author(s). E-mail(s): imtiaz.ahmed@mail.wvu.edu; zhichao.liu@mail.wvu.edu; srinjoy.das@mail.wvu.edu; Contributing authors: ie0005@mix.wvu.edu; Keywords: Laser-Based Additive Manufacturing, Segment Anything, Defect Segmentation, Visual Prompts Tuning, Anomaly Detection. Foundation models are currently driving a paradigm shift in computer vision tasks for various fields including biology, astronomy, and robotics among others, leveraging user-generated prompts to enhance their performance. In the manufacturing domain, accurate image-based defect segmentation is imperative to ensure product quality and facilitate realtime process control. However, such tasks are often characterized by multiple challenges including the absence of labels and the requirement for low latency inference among others. To address these issues, we construct a framework for image segmentation using a state-of-the-art Vision Transformer (ViT) based Foundation model (Segment Anything Model) with a novel multi-point prompt generation scheme using unsupervised clustering. We apply our framework to perform real-time porosity segmentation in a case study of laser base powder bed fusion (L-PBF) and obtain high Dice Similarity Coefficients (DSC) without the necessity for any supervised fine-tuning in the model. Using such lightweight foundation model 1" 2312.04069v1,"Markovian quantum master equation with Poincaré symmetry Kaito Kashiwagi ∗ and Akira Matsumura † Department of Physics, Kyushu University, Fukuoka, 819-0395, Japan Abstract We investigate what kind of Markovian quantum master equation (QME) in the Gorini-Kossakowski- Sudarshan-Lindblad (GKSL) form is realized under Poincaré symmetry. The solution of the Markovian QME is given by a quantum dynamical semigroup, for which we introduce invariance under Poincaré trans- formations. Using the invariance of the dynamical semigroup and applying the unitary representation of Poincaré group, we derive the Markovian QME for a relativistic massive spin-0 particle. Introducing the field operator of the massive particle and examining its evolution, we find that the field follows a dissipative Klein-Gordon equation. In addition, we show that any two local operators for spacelike separated regions commute with each other. This means that the microcausality condition is satisfied for the dissipative model of the massive particle. ∗ † Electronic address: kashiwagi.kaito.268@s.kyushu-u.ac.jp Electronic address: matsumura.akira@phys.kyushu-u.ac.jp 1" 2312.04118v1,"Caregiver Talk Shapes Toddler Vision: A Computational Study of Dyadic Play Timothy Schaumlöffel 1,2,∗ , Arthur Aubret 3,4,∗ , Gemma Roig 1,2,† , Jochen Triesch 1,3,† 1 Goethe University, Frankfurt am Main, Germany 2 The Hessian Center for Artificial Intelligence (hessian.AI), Darmstadt, Germany 3 Frankfurt Institute for Advanced Studies, Frankfurt am Main, Germany 4 Xidian-FIAS international Joint Research Center, Frankfurt am Main, Germany {schaumloeffel, roig}@em.uni-frankfurt.de {aubret, triesch}@fias.uni-frankfurt.de 1. Introduction Abstract Second-year toddlers are proficient learners of object representations that support the recognition of objects independently of viewpoint (object instance recognition) and the assignment of novel exemplars to learned categories (object categorization recognition). What learning mechanisms support this development? On one side, there is evidence that biological organisms learn similar representations for close-in-time visual inputs [19, 38]. This is called the slowness principle [37] and it supports the building of viewinvariant object representations during, e.g., object manipulations [18, 29]. On the other side, the acquisition of object names correlates with a stronger focus on global shape features relative to texture [13, 17, 28], which spurs performance in name-agnostic categorization tasks [9, 21], see also [14]. For learning object names, the synchronization of toddlers’ visual attention on the object and its naming by the caregivers is crucial [27]. Dyadic play could be particularly important for promoting the emergence of more semantic object representations, because both learning mechanisms are likely to cooccur during such play: the toddler extensively focuses on/manipulates objects and the caregiver frequently talks to the toddler about the present objects [26, 31]. However, naming utterances during such play are sparse [6] and ambiguous: they typically contain several words unrelated to the object. Furthermore, even though toddlers have biased attention towards held objects [39], they often play in contexts that admit several other objects in the background [3, 40], adding another potential source of confusion. In this paper, we investigate two what extent dyadic play sessions can support the emergence of semantic object representations in toddlers. We tackle this question by proposing a computational model of toddlers’ learning during dyadic play. First, we introduce the Dyadic Play Infants’ ability to recognize and categorize objects develops gradually. The second year of life is marked by both the emergence of more semantic visual representations and a better understanding of word meaning. This suggests that language input may play an important role in shaping visual representations. However, even in suitable contexts for word learning like dyadic play sessions, caregivers utterances are sparse and ambiguous, often referring to objects that are different from the one to which the child attends. Here, we systematically investigate to what extent caregivers’ utterances can nevertheless enhance visual representations. For this we propose a computational model of visual representation learning during dyadic play. We introduce a synthetic dataset of ego-centric images perceived by a toddler-agent that moves and rotates toy objects in different parts of its home environment while “hearing” caregivers’ utterances, modeled as captions. We propose to model toddlers’ learning as simultaneously aligning representations for 1) close-in-time images and 2) cooccurring images and utterances. We show that utterances with statistics matching those of real caregivers give rise to representations supporting improved category recognition. Our analysis reveals that a small decrease/increase in object-relevant naming frequencies can drastically impact the learned representations. This affects the attention on object names within an utterance, which is required for efficient visuo-linguistic alignment. Overall, our results support the hypothesis that caregivers’ naming utterances can improve toddlers’ visual representations. Code and dataset are available at: https://github.com/neuroaiarena/ToddlerVisionLearning.git * Equal contribution † Shared last authorship 1" 2312.04119v1,"A Multilevel Guidance-Exploration Network and Behavior-Scene Matching Method for Human Behavior Anomaly Detection Guoqing Yang 1 Zhiming Luo 1 Jianzhe Gao 1 Yingxin Lai 1 1 2 1 Kun Yang Yifan He Shaozi Li 1 2 Xiamen University,Xiamen, China; Reconova Technologies, China Abstract Human behavior anomaly detection aims to identify unusual human actions, playing a crucial role in intelligent surveillance and other areas. The current mainstream methods still adopt reconstruction or future frame prediction techniques. However, reconstructing or predicting lowlevel pixel features easily enables the network to achieve overly strong generalization ability, allowing anomalies to be reconstructed or predicted as effectively as normal data. Different from their methods, inspired by the Student- Teacher Network, we propose a novel framework called the Multilevel Guidance-Exploration Network(MGENet), which detects anomalies through the difference in high-level representation between the Guidance and Exploration network. Specifically, we first utilize the pre-trained Normalizing Flow that takes skeletal keypoints as input to guide an RGB encoder, which takes unmasked RGB frames as input, to explore motion latent features. Then, the RGB encoder guides the mask encoder, which takes masked RGB frames as input, to explore the latent appearance feature. Additionally, we design a Behavior-Scene Matching Module(BSMM) to detect scene-related behavioral anomalies. Extensive experiments demonstrate that our proposed method achieves state-of-the-art performance on ShanghaiTech and UBnormal datasets, with AUC of 86.9 % and 73.5 %, respectively. The code will be available on https://github.com/moluggg/GENet. 1 1. Introduction Human behavior anomaly detection aims to temporally or spatially localize the abnormal actions of the person within a video. It plays a significant role in enhancing public security [30, 37]. Detecting such anomalies presents a challenge due to the infrequent occurrence and the various types of abnormal events [43]. As a result, most typical methods [6, 16, 20, 25, 33, 42], employ unsupervised learning 1 ygq qingdao@163.com Figure 1. Comparison of different methods using various features. (a) Reconstruction-based method, using the autoencoder to reconstruct the previous T frames f 1:t . (b) Prediction-based method, predicting the t + 1 frame f t+1 from the prior T frames. Both of them detect anomalies based on reconstruction or prediction errors. (c) Our Multilevel Guidance-Exploration framework, includes two similar levels. For instance, in the 1-st level, Encoder-B learns another type of feature under the guidance of a pre-trained network (Encoder-A), detecting anomalies based on the similarity of latent output features. approaches using only normal data for training. In these approaches, including our method, behaviors that the model identifies as outliers are considered anomalies. Many unsupervised methods often use reconstruction or future frame prediction methods combined with various features to detect human behavior anomalies. The reconstruction-based framework [14, 21, 25, 26, 35], illustrated in Figure 1(a), utilizes autoencoders trained on normal data, detecting anomalies based on elevated reconstruction errors. [35] propose a new autoencoder model, named Spatio-Temporal Auto-Trans-Encoder, to enhance consecutive frame reconstruction. As depicted in Figure 1(b), the prediction-based methods [4, 6, 17, 20, 21, 42] typically predict pixel-level features for the next frame using previous frames. [6] propose an Appearance-Motion Memory Consistency Network based on autoencoders, explicitly considering the endogenous consistency semantics between" 2312.04173v1,"Contract Wallet Using Emails Sora Suegami Kyohei Shibano Dept. of Information and Communication Engineering The University of Tokyo Tokyo, Japan suegamisora@g.ecc.u-tokyo.ac.jp Dept. of Technology Management for Innovation The University of Tokyo Tokyo, Japan shibano@tmi.t.u-tokyo.ac.jp Abstract—We proposed a new construction for contract wallets, smart contract applications that allow users to control their crypto assets. Users can manipulate their crypto assets by simply sending emails with no need to manage keys. These emails are verified using zero-knowledge proof (ZKP) along with their attached digital signatures that the sender domain server (SDS) generates according to DomainKeys Identified Mail. Unless the SDS forges the emails, the crypto assets remain secure in the proposed system. Moreover, the existing SDSs can be used as is by outsourcing additional work to a third party that is not necessarily trusted. The system supports various functions to manipulate crypto assets. We produced a tool for variable-regex mapping (VRM) that enables developers to build a new function without ZKP skills. For example, using the tool, we built a demo application where users can exchange crypto assets via Uniswap only with emails. The published version of this paper is available at https://doi.org/10.1109/ICBC56567.2023.10174932. Index Terms—contract wallet, account abstraction, zeroknowledge proof I. I NTRODUCTION In Ethereum blockchain, contract wallets hold users’ crypto assets and provide more functional management of these assets than standard wallet services such as MetaMask. For example, some contract wallets require multiple digital signatures to transfer crypto assets [1]. However, most of them require users to install new software or access new web pages. In other words, users cannot manipulate their crypto assets with existing familiar tools, e.g., email. To solve this problem, we proposed Email Wallet, a contract wallet that enables users to manage their crypto assets by simply sending emails. Our system is based on a technique in [2] and [3] that verifies the sender domain of emails with zeroknowledge proof (ZKP). The crypto assets stored in our system are secure unless the SDS forges the user’s email, and the user needs to manage no private keys. Additional work for our system can be outsourced to a third party called an aggregator, which is neither a user nor an SDS, and not necessarily trusted. Our new technique, variable-regex mapping (VRM), allows a developer to build a new function to manipulate assets without ZKP skills. II. S YSTEM OVERVIEW Our system is one of the contract wallets operated by users, aggregators, and the Ethereum blockchain. Users are identified 978-8-3503-1019-1/23/$31.00 ©2023 IEEE by their email addresses. They deposit their crypto assets in a smart contract, called a wallet contract, by specifying their email addresses and transferring the assets to the contract address. The deposited assets are manipulated according to functions defined as manipulation rules. Each manipulation rule consists of an ID, a regular expression (regex), and another smart contract called a manipulation contract that implements the manipulation method. The regex (e.g., “Transfer \d{1,20} wei Ether.”) is decomposed into fixed parts (e.g., “Transfer”) and variable parts (e.g., “\d{1,20}”), and the manipulation contract has access to the latter values. The user specifies the ID of the manipulation rule in the email title and writes the email body to match the corresponding regex. The user’s email is processed by the SDS that supports DomainKeys Identified Mail (DKIM) and an aggregator (Figure 1). Herein, we assume that a public key of the SDS is published in the domain name system and is previously registered in the wallet contract. We suppose the SDS follows pkcs1-v1 5 defined as RFC 3447 [4]: it computes a hash value of the email with SHA256 and generates an RSA digital signature for that value. It is also assumed that the SDS does not change the public key or forge the user’s email and the aggregator publishes its own email address. 1) The user sends an email to the aggregator’s email address. 2) The SDS attaches a digital signature to the email according to the DKIM protocol. 3) The aggregator uses the ID in the email title to search for a manipulation rule and checks that the email content satisfies the corresponding regex. 4) The aggregator generates a proof with the received email. Then, it creates a transaction including the proof, sender’s email address, RSA public key, ID, and values of the variable parts of the regex and submits it to the wallet contract. The wallet contract verifies the proof with the other submitted data and checks that the SDS’s public key matches the one registered in the contract. If the verification succeeds, the wallet contract invokes the manipulation contract corresponding to the ID to manipulate the crypto assets of that user. A. Implementation Our implementation consists of a ZKP circuit, smart contracts, and the tool for the VRM. The circuit was built with" 2312.04181v1,"Cell segmentation of in situ transcriptomics data using signed graph partitioning Axel Andersson*, Andrea Behanova*, Carolina Wählby, and Filip Malmberg Centre for Image Analysis, Department of Information Technology and SciLifeLab BioImage Informatics Facility, Uppsala University, Sweden ∗ These authors contributed equally {axel.andersson, andrea.behanova, carolina.wahlby, filip.malmberg}@it.uu.se Abstract. The locations of different mRNA molecules can be revealed by multiplexed in situ RNA detection. By assigning detected mRNA molecules to individual cells, it is possible to identify many different cell types in parallel. This in turn enables investigation of the spatial cellular architecture in tissue, which is crucial for furthering our understanding of biological processes and diseases. However, cell typing typically depends on the segmentation of cell nuclei, which is often done based on images of a DNA stain, such as DAPI. Limiting cell definition to a nuclear stain makes it fundamentally difficult to determine accurate cell borders, and thereby also difficult to assign mRNA molecules to the correct cell. As such, we have developed a computational tool that segments cells solely based on the local composition of mRNA molecules. First, a small neural network is trained to compute attractive and repulsive edges between pairs of mRNA molecules. The signed graph is then partitioned by a mutex watershed into components corresponding to different cells. We evaluated our method on two publicly available datasets and compared it against the current state-of-the-art and older baselines. We conclude that combining neural networks with combinatorial optimization is a promising approach for cell segmentation of in situ transcriptomics data. The tool is open-source and publicly available for use at https://github. com/wahlby-lab/IS3G. Keywords: Cell segmentation · in situ transcriptomics · tissue analysis · mutex watershed. 1 Introduction Over the past years, a large number of techniques for spatially resolved multiplexed in situ transcriptomics (IST) have been developed [1, 2, 5, 6, 8, 10]. These techniques enable the mapping of hundreds of different mRNA molecules directly within tissue samples, allowing the dissection and analysis of cell type heterogeneity while preserving spatial information. These techniques produce large gigapixel-sized images of tissue sections with millions of different spatial biomarkers for various mRNA molecules. A single experiment can pinpoint the" 2312.04193v1,"Work in progress L ANGUAGE M ODEL K NOWLEDGE D ISTILLATION FOR E FFICIENT Q UESTION A NSWERING IN S PANISH Adrián Bazaga, Pietro Liò & Gos Micklem University of Cambridge {ar989,pl219,gm263}@cam.ac.uk A BSTRACT Recent advances in the development of pre-trained Spanish language models has led to significant progress in many Natural Language Processing (NLP) tasks, such as question answering. However, the lack of efficient models imposes a barrier for the adoption of such models in resource-constrained environments. Therefore, smaller distilled models for the Spanish language could be proven to be highly scalable and facilitate their further adoption on a variety of tasks and scenarios. In this work, we take one step in this direction by developing SpanishTinyRoBERTa, a compressed language model based on RoBERTa for efficient question answering in Spanish. To achieve this, we employ knowledge distillation from a large model onto a lighter model that allows for a wider implementation, even in areas with limited computational resources, whilst attaining negligible performance sacrifice. Our experiments show that the dense distilled model can still preserve the performance of its larger counterpart, while significantly increasing inference speedup. This work serves as a starting point for further research and investigation of model compression efforts for Spanish language models across various NLP tasks. 1 I NTRODUCTION In the last years, recent advancements in the field of NLP have panned the way for progress on a variety of downstream tasks, primarily by fine-tuning pre-trained language models (PLMs) (Vaswani et al., 2017; Devlin et al., 2019; Liu et al., 2019; Yang et al., 2019) on large-scale taskspecific datasets. These models are typically trained on large and high-quality annotated corpora, which are are usually scarce for languages other than English, posing a significant disadvantage for progressing multilingual NLP research. Therefore, resources for languages such as Spanish, the fourth most spoken language, remain underrepresented. Moreover, despite the fact that some language models are available for the Spanish language (Gutiérrez-Fandiño et al., 2022; Cañete et al., 2020; de la Rosa et al., 2022; Pérez et al., 2022), operating them in resource-constrained environments remains an under-explored challenge. To overcome this limitation, we propose employing knowledge distillation (Jiao et al., 2020; Boreshban et al., 2021) to transfer the intrinsic knowledge of a large Spanish RoBERTa language model into a much compact and efficient model, named as SpanishTinyRoBERTa, while maintaining its performance. In particular, we focus on the question answering task (Rajpurkar et al., 2016; Carrino et al., 2019), where the goal of the model is to provide an answer given a context and a question over that context. Our experiments show that SpanishTinyRoBERTa attains negligible performance reduction on the question answering task with respect to the teacher model, whilst increasing significantly inference speed and reducing resource requirements. The ultimate goal of our work is to facilitate efforts in the development of efficient language models for the Spanish language, thereby breaking down computational barriers and promoting adoption of NLP technologies. Our training implementation and the source code is available at https://github.com/AdrianBZG/tinyroberta-distillation-qa-es. 1" 2312.04197v1,"SAMBA: A Trainable Segmentation Web-App with Smart Labelling Preprint - December 8, 2023 Ronan Docherty ∗ 1 , Isaac Squires 2 , Antonis Vamvakeros 2 , and Samuel J. Cooper † 2 1 2 Department of Materials, Imperial College London, London SW7 2DB Dyson School of Design Engineering, Imperial College London, London SW7 2DB Abstract Segmentation is the assigning of a semantic class to every pixel in an image and is a prerequisite for various statistical analysis tasks in materials science, like phase quantification, physics simulations or morphological characterization. The wide range of length scales, imaging techniques and materials studied in materials science means any segmentation algorithm must generalise to unseen data and support abstract, user-defined semantic classes. Trainable segmentation is a popular interactive segmentation paradigm where a classifier is trained to map from image features to user drawn labels. SAMBA is a trainable segmentation tool that uses Meta’s Segment Anything Model (SAM) for fast, high-quality label suggestions and a random forest classifier for robust, generalizable segmentations. It is accessible in the browser (https://www.sambasegment.com/) without the need to download any external dependencies. The segmentation backend is run in the cloud, so does not require the user to have powerful hardware. 1 Statement of Need resilient against noise, varying exposure, and certain types of artefacts etc. SAM has been applied to cell Trainable segmentation tools like ilastik 4 and Trainable microscopy annotation and segmentation 1 , but not to Weka Segmentation 2 are popular options for image multi-phase segmentation. segmentation in biology and materials science due to SAMBA is also unique in being fully web-based, meantheir flexibility. Both apply common image process- ing it can be used without downloading a large binary, ing operations like blurs, edge detection, and texture installing libraries or requiring significant local comfilters to create a feature stack, then train a classifier putational power. An associated gallery page allows (usually a random forest ensemble) to map from the users to contribute to and view an open dataset of microstack to user drawn labels on a pixelwise basis. ilastix graphs, labels, segmentations and experimental metaoffers fast segmentations and a responsive live-view, data. It is designed to be usable by researchers regardwhereas Trainable Weka Segmentation is part of and less of prior programming or image analysis experiinteroperates with the FIJI ImageJ library 8 . ence. Accurate, representative labels are important for segmentation quality, but tooling is limited to polygons and/or pixel brushes which can make labelling boundaries time-consuming. SAMBA (Segment Anything Model Based App) uses the recent object-detecting foundation model Segment Anything Model 6 as a ‘Smart Labelling’ tool, which offers suggestions for associated objects as the cursor is moved which can then be added as labels. This ‘Smart Labelling’ can quickly pick out portions of the same phase and is ∗ † ronan.docherty18@imperial.ac.uk samuel.cooper@imperial.ac.uk 2 Design and Usage SAM is a promptable, open-source macroscopic object segmentation model, trained on 1 billion masks over 11 million images. It feeds a prompt (click, bounding box, mask or text) alongside an embedding of an image generated by a pretrained autoencoder 5 through a lightweight decoder network to produce a segmenta-" 2312.04204v1,"Wavelength-multiplexed Delayed Inputs for Memory Enhancement of Microring-based Reservoir Computing Bernard J. Giron Castro, 1* Christophe Peucheret, 2 and Francesco Da Ros 1 1 DTU Electro, Technical University of Denmark, 343 Ørsteds Plads, DK-2800 Kongens Lyngby, Denmark 2 Univ Rennes, CNRS, UMR6082 - FOTON, 22305 Lannion, France * bjgca@dtu.dk Abstract: We numerically demonstrate a silicon add-drop microring-based reservoir computing scheme that combines parallel delayed inputs and wavelength division multiplexing. The scheme solves memory-demanding tasks like time-series prediction with good performance without requiring external optical feedback. © 2023 The Author(s) 1. Introduction Photonic technologies are promising for boosting the performance of current computing architectures [1, 2]. Among their benefits is the potential for parallel processing using mature technologies such as wavelength division multiplexing (WDM) which has been applied to photonic neural networks [2]. In our previous study [3], we showed the potential of WDM to improve the computing capabilities of a reservoir computing (RC) scheme. RC is a relatively recent computing paradigm that uses random fixed weights and complex nonlinear dynamics to map the input data to a higher dimensional space. This process allows simplifying its training process, which is only required in its output layer (usually through linear or ridge regression). The performance of RC is highly related to the nonlinear dynamics of the nodes and the capability to buffer past inputs (memory) [1]. Nevertheless, photonic RC schemes may reduce their scalability if multiple photonic blocks are implemented as nonlinear nodes. An approach to address this issue is time-delay RC (TDRC), in which the (virtual) nodes are spatially and thus temporally distributed. Each virtual node is processed, one at a time, through a single physical nonlinear node, minimizing the hardware requirements [1]. Previous photonic TDRC implementations [3-6] have demonstrated that a silicon MRR can perform as the nonlinear node of an TDRC scheme when exploiting free-carrier dispersion and thermo-optic nonlinear effects. These nonlinear effects provide very short memory by themselves [6]. Therefore, a mechanism to enhance the memory capacity while not reducing the speed and scalability of the photonic TDRC is required [1]. To provide the necessary increase in memory and spatial distribution, the addition of delayed feedback by means of an external waveguide has been studied [4, 5]. However, the addition of the feedback delay is rather challenging for photonic integration. Additionally, due to the propagation of the optical signal through the feedback, the phase control and the compensation for losses are potential concerns in practical implementations. In this work, we use four optical frequency modes modulated by copies of the input sequence, each with a different but systematic amount of added delay. We demonstrate that it is possible to remove the physical delayed feedback in an MRR-based TDRC scheme while still achieving similar performance levels in a memory-demanding task such as NARMA-10. This offers the potential to improve the scalability of MRR-based TDRC schemes. 2. Setup and methodology The proposed scheme is shown in Fig 1. The nonlinear dynamics of the MRR considering 𝑀 optical pumps follow the temporal coupled-mode theory model described in [3], which is solved using a 4 th -order Runge-Kutta method with a step η = 2.0 ps. The 𝑀 copies of the same input sequence 𝑢(𝑛) linearly modulate each optical pump, where each i th copy has an added delay 𝜏 𝑖 = 𝑖 ⋅ 𝑆 𝑤 /𝜂 over the discretized sequence (in terms of the RK solver). 𝑆 𝑤 = 1.0 ns is the length of the symbol. Every sequence is multiplied by its respective (different seed) masking signal m i (n) with size N = 50 based on the delay input method studied in [7]. Each masking sequence is taken from a uniform distribution over the interval [0, 0.5] and determines the number of virtual nodes. An optimized task-independent bias 𝛽 is added to their product, as done in [3]. The resulting signal modulates the intensity of its respective optical carrier before being injected into the MRR using a WDM combiner. Notice that no external feedback is added to the MRR in this proposed scheme. At the drop port, the 𝑀 optical signals are wavelength-demultiplexed and detected by individual photodiodes. Subsequently, the sum of the detected signals is obtained. The computing process is described in Eq. (1), where ℱ represents the optoelectronic nonlinear transformation of each input sequence when processed through the MRR and 𝑋(𝑛) is the calculated response of the RC. The optical parameters of the setup are defined in [3, 4]. We consider the NARMA-10 task but the potential of MRR-based RC has been demonstrated for other time-series prediction tasks [5]. 3200 data points are used for training and 800 for testing. 𝑋(𝑛) is then used to train the weights" 2312.04205v1,"Nano-ARPES investigation of twisted bilayer tungsten disulfide Giovanna Feraco 1 , Oreste De Luca 1† , Przemysław Przybysz 1,2 , Homayoun Jafari 1 , Oleksandr Zheliuk 1 , Ying Wang 1 , Philip Schädlich 3 , Pavel Dudin 4 , José Avila 4 , Jianting Ye 1 , Thomas Seyller 3 , Paweł Dąbrowski 2 , Paweł Kowalczyk 2 , Jagoda Sławińska 1* , Petra Rudolf 1* , Antonija Grubišić- Čabo 1* . 1 Zernike Institute for Advanced Materials, University of Groningen, Nijenborgh 4, 9747 AG Groningen, The Netherlands Faculty of Physics and Applied Informatics, University of Łódź, Pomorska 149/153, 90-236 Łódź, Poland 2 3 Institut für Physik, Technische Universität Chemnitz, Reichenhainer Str. 70, 09126 Chemnitz, Germany 4 Synchrotron SOLEIL, Université Paris-Saclay, Saint Aubin, BP 48, 91192 Gif sur Yvette, France *Corresponding authors. E-mail: a.grubisic-cabo@rug.nl, p.rudolf@rug.nl , jagoda.slawinska@rug.nl. AGC and PR for ARPES measurements; JS for DFT calculations. † Current address: Dipartimento di Fisica, Università della Calabria, Via Pietro Bucci Cubo 31C, 87036 Arcavacata di Rende (CS), Italy" 2312.04212v1,"Quantum relativistic equation for a probability amplitude Yu.M. Poluektov ∗ National Science Center “Kharkov Institute of Physics and Technology”, 61108 Kharkov, Ukraine The relativistic quantum equation is proposed for the complex wave function, which has the meaning of a probability amplitude. The Lagrangian formulation of the proposed theory is developed. The problem of spreading of a wave packet in an unlimited space is solved. The relativistic correction to the energy levels of a harmonic oscillator is found, leading to a violation of their equidistance. Key words: Schrödinger equation, quantum mechanics, relativistic equation, wave function, probability amplitude, harmonic oscillator PACS numbers: 03.65.-w, 03.65.Pm, 03.65.Ca I. INTRODUCTION Fundamental issues related to the completeness of the description of reality in quantum mechanics were discussed long ago in well-known works [1,2] and then in many others. These discussions continue in present time. The Schrödinger equation for the complex wave function ψ, which, according to Born’s interpretation, has the meaning of a probability amplitude, is nonrelativistic. This means that the theory allows propagation of signals at arbitrarily high speeds. Perhaps, some of the discussed difficulties and paradoxes of quantum mechanics are related to this circumstance. It should also be noted that quantum theory is used in the description and interpretation of experiments with photons, which are relativistic objects. So far there is no generally accepted relativistic equation for the field, which could be interpreted as a probability amplitude and would allow a Born probabilistic interpretation. The probabilistic interpretation of the complex field within the framework of Dirac theory was discussed in works [3,4]. In this paper the relativistic equation is proposed for the complex scalar field, allowing its physical interpretation as a probability amplitude. The theory is formulated within the framework of the Lagrangian formalism. The spreading of a wave packet in an unlimited space is considered. The relativistic correction has been found in the theory of a harmonic oscillator, leading to a violation of the equidistance of levels. The issue of the completeness of the quantum description is not addressed in the paper. II. RELATIVISTIC EQUATION FOR THE COMPLEX SCALAR FIELD The recipe for the transition from the classical to the quantum mechanical equation consists, as is known [5], in replacing momentum and energy in the classical Hamiltonian H = p 2 /2m with the operators p → −i~∇ and H → i~ ∂/∂t, which act on the complex p function ψ. In the relativistic case, the relationship between energy and momentum is given by formula H = m 2 c 4 + c 2 p 2 , where m is the particle mass, c is the speed of light. Using the indicated substitution, we arrive at the relativistic equation p ∂ψ (1) i~ = σ m 2 c 4 − ~ 2 c 2 ∆ ψ, ∂t where ∆ is the Laplace operator, σ = ±1. This equation is inconvenient for a number of reasons. Firstly, the time and space coordinates enter here unequally, so that it does not have an explicitly covariant form. Secondly, because in Eq. (1) the Laplace operator appears under the sign of the root, and, therefore, this equation is nonlocal. In order to get rid of the noted formal shortcomings, the transition to the quantum mechanical equation is usually carried out in the expression for the square of energy H 2 = m 2 c 4 + c 2 p 2 , which leads to the Klein-Gordon-Fock equation   1 ∂ 2 −2 (2) ψ = 0, ∆ − 2 2 − λ c ∂t  where λ ≡ ~ mc is the Compton length. In notation, in which an  the following we will also use 4-dimensional  arbitrary 4-vector is B ≡ B µ ≡ B, B 4 = iB 0 , in particular x ≡ x µ ≡ x, x 4 = ix 0 = ict . The scalar product of two ∗ Electronic address: yuripoluektov@kipt.kharkov.ua (y.poluekt52@gmail.com)" 2312.04221v1,"Optimal quantum communication networks: capacitance versus security Lorenzo Cirigliano, 1, 2, 3 Valentina Brosco, 4, 1, 2, ∗ Claudio Castellano, 4, 2 Claudio Conti, 1 and Laura Pilozzi 4, 2 1 Dipartimento di Fisica Università “Sapienza”, P.le A. Moro, 2, I-00185 Rome, Italy. 2 Centro Ricerche Enrico Fermi, Piazza del Viminale, 1, I-00184 Rome, Italy 3 Departamento de Fı́sica da Universidade de Aveiro & I3N, Campus Universitário de Santiago, 3810-193 Aveiro, Portugal 4 Istituto dei Sistemi Complessi (ISC-CNR), Via dei Taurini 19, I-00185 Rome, Italy (Dated: December 8, 2023) The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure of the network, on its extension and on the nature of the communication channels. In this work we propose a strategy of network optimization that intertwines classical network approaches and quantum information theory. Specifically, by suitably defining a quantum efficiency functional, we identify the optimal quantum communication connections through the network by balancing security and the quantum communication rate. The optimized network is then constructed as the network of the maximal quantum efficiency connections and its performance is evaluated by studying the scaling of average properties as functions of the number of nodes and of the network spatial extension. I. INTRODUCTION Quantum communication networks [1] enable the realization of tasks beyond the reach of classical communication systems. Examples are unconditionally secure quantum key distribution [2, 3] (QKD), quantum teleportation [4], clock-synchronization [5], distributed quantum computing [6], to mention just a few. Characterizing and optimizing quantum communication networks have both a crucial relevance for the development of quantum cryptography applications [7] and for the potential to advance our understanding of fundamental quantum phenomena [8], such as entanglement percolation [9] or the emergence of non-local quantum correlations[10–12]. The performance of quantum networks is determined by the nature of the quantum communication channels and protocols [13, 14] and by the overall network topology. The optimization of quantum communication networks involves therefore the closing of security loopholes and the mitigation of the effect of losses through the development of quantum communication protocols, such as for example the measurement device independent QKD [15–17] and the twin-field QKD [18] protocols. But it is also pursued by optimizing the allocation of quantum resources for quantum sensing [19] and for distributed quantum computing [20] or by engineering optimal routing strategies [21–25], taking into account the peculiar features of the network elements and the network architecture. In the ideal case the ultimate properties of network elements, such as the quantum communication links, are dictated by the laws of quantum mechanics, enforcing their security but also imposing intrinsic bounds [26] on the rate of quantum information transmission. A particularly relevant example is the Pirandola, Laurenza, Ottaviani and Banchi [27] (PLOB) bound that prevents to ∗ valentina.brosco@cnr.it achieve simultaneously high rates and long distances in transferring quantum states and distributing entanglement or secret quantum keys through a quantum link. The global features of quantum communication networks are strongly dependent on the spatial distribution of the users. Recent theoretical works developed a random network approach to large-scale quantum communication networks based on optical fibers [28] or satellite links [29] and analyzed their connectivity, nodes distance and the presence of small world features [28, 29]. In this work we employ the tools of classical network science to devise a strategy of optimization of quantum communication networks. PLOB bound can be indeed circumvented by means of intermediate repeaters [13], either of quantum [30] or classical nature (trusted nodes [31, 32]), that help the communication between distant parties. With few notable exceptions [33], most field tests of metropolitan-scale quantum networks to date are based on point-to-point architecture and they involve trusted nodes, see Refs. [34–38]. Trusted nodes in general lower the security of the network [31, 39, 40]. Consequently, in designing a QKD network the following question arises naturally: given a set of QKD users, what is the optimal way to connect them to fulfill a given rate/security target, assuming that all trusted nodes have a certain probability p of being leaky? Here we address this optimization problem by introducing a quantum efficiency functional, that balances the quantum security and the quantum communication rate for each pair of users in the network. We develop an algorithm that maximizes the quantum efficiency and constructs the optimal network, that we refer to as maximal quantum efficiency network. We then investigate, for a random distribution of users in the plane, the average properties of these optimal networks. Their performance is evaluated by studying the scaling of average properties as a function of the number of nodes and of the network extension. While the quantum communication rate is linked to geometrical properties, such as the average distance between users," 2312.04228v1,"Nonlinear Corrections to the Momentum Sum Rule G.R.Boroun ∗ Department of Physics, Razi University, Kermanshah 67149, Iran (Dated: December 8, 2023) The importance of the nonlinear corrections on the momentum sum rule is investigated on the initial scale Q 20 . Nonlinear corrections are found to play an indispensable role in the singlet and gluon momentum sum rule in the high-order approximations in the parameterization groups for nucleons and light nuclei at low x in future colliders. In this way, we obtain a significantly different low x behavior of the singlet and gluon momentum sum rule at the hotspot point. 1. Introduction Sum rules are integrals over structure functions or parton distributions, which are extremely useful in calculating the lowest-mass hadronic bound states or determining effective coupling constants. The starting point for QCD sum rules is the operator-product expansion (OPE), which was formulated firstly by M.A.Shifmann, A.I.Vainshtein and V.I.Zakharov in Ref.[1]. The QCD sum rules are a phenomenological procedure for evaluating the matrix elements of the operators that occur, and OPE gives a general form for the quantities of interest [2]. The matrix elements of the operators in the OPE for the forward virtual Compton amplitude γ ∗ p→γ ∗ p correspond with the Mellin moments of the structure functions [3]. Sometimes the origin of a sum rule is more fundamental than the quantum parton model (QPM). We might call a sum rule an exact QCD sum rule if its result found within the context of the parton model is not altered by any radiative or non-perturbative correction [4,5]. The first one is the Adler [6] sum rule, where it is for the charged current structure functions and follows from the current conservation. The Bjorken [7] and Gross-Llewellyn [8] sum rules get a QCD correction, where the parton model results are modified by radiative corrections. The Gottfried [9] sum rule requires the assumption of an SU(2) symmetric sea and is affected by non-perturbative physics. The momentum sum rule (MSR) has been seen as a convenient constraint on the definition of the parton distribution functions (PDFs) rather than a basic QCD sum rule when going beyond leading order QCD. The sum of the fraction of the proton , s momentum carried by quarks must be less than unity and the remaining momentum is carried by the gluons. Botje in Ref.[10] was shown that integral over the PDFs quarks and gluons at the ini- R 1 for P tial scale Q 20 gives 0 dxx q (q(x)+q(x)) = 0.594±0.018 R 1 P and 0 dxxg(x) = 0.394±0.018 where q (q + q) is the ∗ Electronic address: boroun@razi.ac.ir flavor-singlet contribution and g is the gluon distribution. In fact the gluons carry the very large missing fraction of the proton momentum. The MSR from the second Mellin moment reads X  Z 1 2 2 2 dxx (q(x, Q 0 ) + q(x, Q 0 )) + g(x, Q 0 ) = 1, (1) 0 q and modified by the following form   Z 1 2 2 2 2 dxx u v (x, Q 0 ) + d v (x, Q 0 ) + S(x, Q 0 ) + g(x, Q 0 ) = 1,(2) 0 where the light quark sea contribution is defined as S≡2(u + d) + s + s. In order to make a precise determination of parton distribution sets (such as CTEQ, nCTEQ, MSTW, GRV, GJR and NNPDF Collaborations), one has to use a large set of data which together cover a large range of x and Q 2 and put stringent constraints on the various parton types within the proton. Usually the following parameterizations for gluon and sea quark distributions are used by the above groups at the initial scale Q 20 . As an example we have √ xf i (x, Q 20 ) = A i x δ i (1 − x) η i (1 + ǫ i x + γ i x). (3) The values of the parameters obtained from a global QCD fit and also the normalization parameters are fixed by the MSR and valence quark counting rules 1 . Differences in the results of different groups are made from many subjective choices in the selection of data sets and kinematic boundaries, together with the choice of the strong coupling constant and the correction for non-perturbative and target mass and nuclear effects of data from fixed target experiments [4]. In this paper we consider the nonlinear corrections (NLCs) to the momentum sum rule and show differences in the MSR due to PDF sets in LO, NLO and NNLO at α s for nucleons and nuclei. In the next section, 1 R 1 2 0 dx u v (x, Q 0 ) = 2 and R 1 2 0 dx d v (x, Q 0 ) = 1." 2312.04272v1,"Direct data-driven control of input saturated systems: a LMI-based approach F. Porcari ∗ V. Breschi ∗∗ L. Zaccarian ∗∗∗ S. Formentin ∗ ∗ Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milano, Italy (e-mail: federico.porcari@mail.polimi.it) ∗∗ Department of Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands ∗∗∗ LAAS-CNRS, University of Toulouse, Toulouse, France, and Dipartimento di Ingegneria Industriale, Università di Trento, Trento, Italy Abstract: In this paper, we revisit three intricate control challenges in the context of inputsaturated systems, adopting a direct data-driven perspective. Diverging from the traditional twostage process involving system identification and model-based control, our approach dispenses with the need for an explicit model description. By harnessing a combination of data-based closed-loop representation, Lyapunov theory, instrumental variables, and a generalized sector condition, we formulate data-driven linear matrix inequalities (LMIs). These LMIs are employed to maximize the basin of attraction, minimize the closed-loop reachable set with bounded disturbances, and propose a new data-driven ℓ 2 -gain minimization. Through demonstrations on benchmark examples, we shed light on the merits and limitations of transitioning from indirect to direct design strategies for input-saturated plants, emphasizing notable advantages in handling nonlinear dynamics. Keywords: Data-driven control, saturated systems, linear matrix inequalities 1. INTRODUCTION The growing availability of large datasets and the rising complexity of controlled systems have led to an increased interest in learning from data. Approaches for exploiting data in unknown or partially known controlled systems can be broadly categorized into two rationales. The first one, a well-established practice, involves system identification, where a model is learned from data to form the basis for model-based control design, guided by the certainty equivalence principle (Ljung (1999)). However, this twostage, indirect approach, while common, often consumes significant design time and may not explicitly prioritize the final control objective. In contrast, the direct data-driven paradigm aims at designing a controller directly from the collected data, without a separate identification step. This approach is particularly attractive in practical scenarios where the model is exclusively required for control design purposes (Formentin et al. (2014)). While the direct data-driven paradigm has been applied successfully to various control problems such as model reference (Sanfelici Bazanella et al. (2023); Breschi et al. (2021)), optimal (Dörfler et al. (2023)), and predictive control (e.g., Coulson et al. (2019); Berberich et al. (2021)), its application to address input-saturated systems has received limited attention. Existing model-reference, datadriven anti-windup approaches, as proposed in Breschi and Formentin (2020) and Breschi et al. (2020), effectively handle input saturation but lack closed-loop stability guarantees. Recent contributions (Breschi et al. (2023); Seuret and Tarbouriech (2023a,b)) have sought to translate established model-based design strategies (Tarbouriech et al., 2011) into the data-driven realm for input-saturated systems by leveraging Willems’ fundamental lemma (Willems et al. (2005)). Notably, these works, while pioneering the translation process, exclusively concentrate on the design of stabilizing state-feedback controllers. In this study, we present, for the first time, a data-driven perspective on three intricate control algorithms tailored for input-saturated systems. Our approach integrates the data-based closed-loop representation from De Persis and Tesi (2020), Lyapunov theory, instrumental variables for noise handling (as utilized in Breschi et al. (2023)), and the generalized sector condition proposed in da Silva and Tarbouriech (2005). These elements are employed to formulate data-driven linear matrix inequalities (LMIs), allowing us to (i) maximize an estimate of the origin’s basin of attraction with a prescribed convergence rate of the closed-loop state to the origin, (ii) minimize the closed-loop reachable set with an energy-bounded input, and (iii) propose an alternative data-driven formulation for the nonlinear ℓ 2 - gain minimization problem, as compared to the modelbased approach in Seuret and Tarbouriech (2023b). The effectiveness of our strategies is demonstrated on an openloop unstable benchmark (Breschi et al. (2023)), comparing the closed-loop performance with that of an oracle controller designed using the true system dynamics. By emphasizing the maximization of the estimate of the basin of attraction, we further compare the performance of our proposed data-driven solution with its indirect counterpart" 2312.04282v1,"Adaptive Recursive Query Optimization Anna Herlihy Guillaume Martres Anastasia Ailamaki ∗ Martin Odersky EPFL Switzerland anna.herlihy@epfl.ch EPFL Switzerland guillaume.martres@epfl.ch EPFL, Google Switzerland anastasia.ailamaki@epfl.ch EPFL Switzerland martin.odersky@epfl.ch applications. Most Datalog execution engines follow a bottomup evaluation [5] strategy, in which subqueries in the form of unions of conjunctive queries are repeatedly applied to relations. State-of-the-art Datalog execution engines provide manual or offline join-order optimizations for these subqueries, but require a profiling stage and cannot adapt if the real-time data does not match what was profiled. Abstract—Performance-critical industrial applications, including large-scale program, network, and distributed system analyses, are increasingly reliant on recursive queries for data analysis. Yet traditional relational algebra-based query optimization techniques do not scale well to recursive query processing due to the iterative nature of query evaluation, where relation cardinalities can change unpredictably during the course of a single query execution. To avoid error-prone cardinality estimation, adaptive query processing techniques use runtime information to inform query optimization, but these systems are not optimized for the specific needs of recursive query processing. In this paper, we introduce Adaptive Metaprogramming, an innovative technique that shifts recursive query optimization and code generation from compile-time to runtime using principled metaprogramming, enabling dynamic optimization and re-optimization before and after query execution has begun. We present a custom joinordering optimization applicable at multiple stages during query compilation and execution. Through Carac, we evaluate the optimization potential of Adaptive Metaprogramming and show unoptimized recursive query execution time can be improved by three orders of magnitude and hand-optimized queries by 4x. To avoid error-prone cardinality estimation [6], adaptive query processing (AQP) uses runtime information to tune query optimization [7]. This can be combined with codegenerating data management systems [8]–[10] that improve query execution performance by avoiding interpretation overhead by partially evaluating query plans into compiled executables. However, code-generating AQP systems do not regenerate and compile code at runtime, instead jumping between precompiled plans or code blocks to avoid the prohibitively high cost of invoking an optimizing compiler during query execution [11], [12]. Because recursive queries require repeated execution of subqueries for multiple iterations, the number of potential paths is prohibitively large to enumerate or compile ahead-of-time. Thus, there is a need for query optimization techniques that can leverage runtime information to meet the specific optimization criteria of recursive query processing. I. I NTRODUCTION The advanced algorithms powering contemporary applications require increasingly expressive query capabilities beyond traditional relational algebra, for example iterative or fixedpoint computations. This demand has led to a resurgence in the use of recursion in analytical queries, yet the development of recursive query optimization techniques lags behind those established for non-recursive queries. Support for recursion was added to the ANSI’99 SQL standard, and yet most relational data management systems are not optimized for the specific needs of recursive queries: during the execution of a single recursive query, resulting relations from the current iteration are fed as input into the next iteration of query evaluation. As a result, the relation cardinalities can change unpredictably and the number of iterations required to execute the query is not known ahead of time. Existing cardinality estimation techniques assume input relation cardinalities do not change during execution, so cannot guarantee high-quality join orders after the initial iteration. Instead, developers turn to Datalog for high-performance recursive query processing. Datalog is a popular query language for recursive queries that has been used for Java program analysis [1], TensorFlow [2], Ethereum Virtual Machine [3], AWS network analysis [4], and other performance-critical ∗ To address these challenges, this work introduces Adaptive Metaprogramming, a novel technique for runtime optimization and repeated re-optimization of recursive queries. We implement and evaluate the design in Carac, a system that tightly integrates a specialized Datalog execution engine with a general-purpose programming language and leverages Multi-Stage Programming [13], a known technique from the Programming Languages community, to support runtime code generation. This paper makes the following contributions: We introduce Adaptive Metaprogramming, a technique that combines the power of code-generating just-in-time data management systems with Multi-Stage Programming to enable adaptive, continuous query re-optimization by regenerating code at runtime. • We leverage Adaptive Metaprogramming to enable a custom optimization for Datalog queries to select efficient join orders of conjunctive subqueries at different stages in the lifetime of the query: from ahead-of-time, when only queries are available, to just-in-time, where runtime statistics like relation cardinalities are available. • Work done in its entirety at EPFL. 1" 2312.04286v1,"Effects of multiple edge cracks, shear force, elastic foundation, and boundary conditions on bucking of small-scale pillars † Hossein Darban a , Raimondo Luciano b , Michał Basista a1 a Institute of Fundamental Technological Research, Polish Academy of Sciences, Pawińskiego 5B, 02-106 Warsaw, Poland b Department of Engineering, University of Naples Parthenope, 80133, Naples, Italy Abstract The buckling instability of micro- and nanopillars can be an issue when designing intelligent miniaturized devices and characterizing composite materials reinforced with beam-like particles on the small-scale. Analytical modeling of the buckling of miniaturized pillars is especially important due to the difficulties in conducting experiments. Here, a well-posed stress-driven nonlocal model is developed, which allows the calculation of the critical loads and buckling configurations of the miniaturized pillars on an elastic foundation and with arbitrary numbers of edge cracks. The discontinuities in bending slopes and deflection at the damaged cross-sections due to the edge cracks are captured through the incorporation of both rotational and translational springs. A comprehensive analysis is conducted to investigate the instability of pillars containing a range of one to four cracks. This analysis reveals interesting effects regarding the influence of crack location, nonlocality, and elastic foundation on the initial and subsequent critical loads and associated buckling configurations. The main findings are: (i) the shielding and amplification effects related to a system of cracks become more significant as the dimensions of pillars reduce, (ii) the influence of the shear force at the damaged cross-section related to the translational spring must not be neglected when dealing with higher modes of buckling and long cracks, (iii) an elastic foundation decreases the effects of the cracks and size dependency on the buckling loads, and (iv) the effects of the edge cracks on the critical loads and buckling configurations of the miniaturized pillars are highly dependent on the boundary conditions. Keywords: Miniaturized pillars; Edge crack; Spring model; Size effect; Instability. † †Published in International Journal of Damage Mechanics. 2023. doi:10.1177/10567895231215558. 1 - Corresponding author: Michał Basista E-mail address: mbasista@ippt.pan.pl Tel.: (+48) 22 828 53 74 Co-authors’ e-mail addresses: hdarban@ippt.pan.pl (H. Darban), raimondo.luciano@uniparthenope.it (R. Luciano) 1" 2312.04299v1,"The Extremely Large Telescope Paolo Padovani and Michele Cirasuolo European Southern Observatory, Karl-Schwarzschild-Str. 2, D-85748 Garching bei München, Germany ARTICLE HISTORY Received 4 July 2023 Accepted 25 September 2023 ABSTRACT Extremely large telescopes (ELTs) are considered worldwide to be one of the highest priorities in ground-based astronomy. The European Southern Observatory (ESO) is developing an ELT that will have a 39 m main mirror and will be the largest visible and infrared light telescope in the world. The ELT will be equipped with a lineup of cutting-edge instruments, designed to cover a wide range of scientific possibilities. The leap forwards with the ELT can lead to a paradigm shift in our perception of the Universe, much as Galileo’s telescope did 400 years ago. We illustrate here the various components of the ELT, including the dome and main structure, the five mirrors, and the telescope systems. We then describe the ELT instrumentation and some of the astronomical topics it will address. We then conclude by examining the synergies with other astronomical facilities. KEYWORDS ELT; Extremely Large Telescopes; science; astronomy; technology; telescopes; solar system; exoplanets; stars; black holes; galaxies; cosmology; dark matter; fundamental physics. 1. Introduction The past decade has brought astronomical discoveries that have excited people from all walks of life, from finding planets around Proxima Centauri, the nearest star to the Sun, to the first image of a black hole, namely that at the centre of M 87, a giant elliptical galaxy in the Virgo constellation. In the next epoch of astronomy, the ELT 1 , with the other two extremely large telescopes, the 24.5 m Giant Magellan Telescope 2 and the Thirty Meter Telescope 3 , will tackle some of the biggest scientific challenges of our time. The ELT will track down Earth-like planets around other stars, and could become the first telescope to find evidence of life outside of our Solar System. It will also probe the furthest reaches of the cosmos, revealing the properties of the very earliest galaxies and the nature of the dark Universe. On top of this, astronomers are also planning for the unexpected – new and unforeseeable questions that will surely arise, given the new capabilities of the ELT. CONTACT Paolo Padovani. Email: ppadovan@eso.org 1 https://elt.eso.org/ 2 https://giantmagellan.org/ 3 https://www.tmt.org" 2312.04301v1,"ICTS-USTC/PCFT-23-39 The appearance of the regular black hole with a stable Cauchy horizon Li-Ming Cao a ,b∗ , Long-Yue Li b† , Xia-Yuan Liu b ‡ , and Yu-Sen Zhou b§ a b Peng Huanwu Center for Fundamental Theory, Hefei, Anhui 230026, China and Interdisciplinary Center for Theoretical Study and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China (Dated: December 8, 2023) The strong cosmic censorship conjecture, which states that the evolution of generic initial data will always produce a globally hyperbolic spacetime, is hard to be tested by astronomical observations. In this paper, we study the appearance of the regular black hole without mass inflation, which violates the strong cosmic censorship conjecture. Since the Cauchy horizon is stable, the photons entering the two horizons of the regular black hole in the preceding companion universe can come out from the white hole in our universe. These rays create a novel multi-ring structure, which is significantly different from the image of the Schwarzschild black hole. This serves a potential method to test the strong cosmic censorship conjecture. I. INTRODUCTION It has been years since the images of the supermassive objects at the center of M87 [1] and Milky Way galaxies [2] was captured by the Event Horizon Telescope (EHT). These provide the evidence for the existence of black holes. In these images, the dark area is surrounded by a bright ring-like structure, which is illuminated dominantly by the direct emission of the accretion disk. In theoretical calculations, there is a narrow bright ring besides the direct emission from the accretion disk [3]. This is so called lensed ring, which is constituted by the ray deflected at least half an orbit around the object. When the impact parameter approaches the critical value, the photons will rotate several times around the black hole before creating a curve on the observer’s image plane. As the impact parameter reaches its critical limit, the number of rotations increases infinitely, causing the light ray to approach the critical curve. Consequently, these rays form the photon ring. However, it is so close to the lensed ring that it can not be distinguished, and its contribution to the overall intensity is negligible. Although the critical curve and the photon ring are fully determined by the background geometry, the optical appearance of a compact object is heavily influenced by the position and profile of light source. This gives us a window through which we can get the background geometry and accretion disk information from the black hole image. Last century, Hawking and Penrose demonstrated that singularities occur unavoidably in general relativity (GR) [4, 5]. Weak cosmic censorship conjecture (WCCC) [6] postulate that singularities, where physical laws break down, always hide behind the horizon. Furthermore, the presence of the singularity, i.e., the existence of incomplete geodesics, threatens the predictability of GR. Therefore, regular black holes without singularities, which are constructed by relaxing some conditions in the singularity theorem, attract much attention. Following Bardeen’s work [7], many regular black holes were discovered, such as the loop black hole [8], the Hayward black hole [9], the quantum-corrected black hole [10] and so on [11, 12]. Regular black holes are usually constructed by replacing the central singularity with a non-singular core. They are classified as de Sitter core and Minkowski core according to the asymptotic behavior near r = 0. Even though regular black holes avoid singularities at their centers, most of them possess an unstable Cauchy horizon. In fact, all spherically symmetric regular black holes have inner horizons [13]. If the spacetime can extend beyond the Cauchy horizon, then it allows the infinite repetitions within the Penrose diagram of the spacetime. For example, the Penrose diagram of the Reissner-Nordström (RN) black hole is consisted of countless repeated identical universes. This will break down the predictability of GR, and the classical determinism is lost. Fortunately, most of these inner horizons of regular black holes are unstable, which are caused by mass inflation and will convert into null singularities [14–16]. The instability of the inner horizon prevents the spacetime extending beyond it, and thus avoid the problem of predictability. This picture supports the strong cosmic censorship conjecture (SCCC), which states that a physical spactime is always globally hyperbolic [17, 18]. In the modern language of partial differential equations, the evolution of generic initial data will always produce a globally hyperbolic spacetime. In other words, a stable Cauchy horizon is in contradiction with the SCCC. Examination of the SCCC is an important topic in mathematical physics nowadays [19–23]. However, it is challenging to verify this conjecture through astronomical observations due to the lack of proper ways. The image of the regular black hole has been studied in recent years [24, 25]. Their shapes are similar to the case of the Schwarzschild black hole, except for some differences in intensity, position of the photon ring and so on. Because the images of the regular black holes in [24, 25] and the Schwarzschild black hole are mainly determined by the direct emission, which is strongly influenced by the accretion disk, it is not easy to distinguish the images of regular black holes with the Schwarzschild one. It is exciting that the quantum-corrected black hole may have a novel image [26]. This is a regular black hole proposed ∗ e-mail address: caolm@ustc.edu.cn † e-mail address: lily26@mail.ustc.edu.cn ‡ e-mail address: liuxiayuan@mail.ustc.edu.cn § e-mail address: zhou ys@mail.ustc.edu.cn" 2312.04337v1,"Multi-View Unsupervised Image Generation with Cross Attention Guidance Llukman Cerkezi ∗ Aram Davtyan ∗ Sepehr Sameni Paolo Favaro Computer Vision Group, Institute of Computer Science, University of Bern, Switzerland ce earan r app fe Trans CompCars MIRAGE OOD car from EPFL cars MIRAGE SD Armchairs {llukman.cerkezi, aram.davtyan, sepehr.sameni, paolo.favaro}@unibe.ch MIRAGE MIRAGE MIRAGE Figure 1. Examples of novel views generated by MIRAGE on several datasets. Abstract specific object parts. The pose-conditioned diffusion model, trained on pose labels, and equipped with cross-frame attention at inference time ensures cross-view consistency, that is further aided by our novel hard-attention guidance. Our model, MIRAGE, surpasses prior work in novel view synthesis on real images. Furthermore, MIRAGE is robust to diverse textures and geometries, as demonstrated with our experiments on synthetic images generated with pretrained Stable Diffusion. The growing interest in novel view synthesis, driven by Neural Radiance Field (NeRF) models, is hindered by scalability issues due to their reliance on precisely annotated multi-view images. Recent models address this by fine-tuning large text2image diffusion models on synthetic multi-view data. Despite robust zero-shot generalization, they may need post-processing and can face quality issues due to the synthetic-real domain gap. This paper introduces a novel pipeline for unsupervised training of a poseconditioned diffusion model on single-category datasets. With the help of pretrained self-supervised Vision Transformers (DINOv2), we identify object poses by clustering the dataset through comparing visibility and locations of 1. Introduction In recent years, the field of novel view synthesis has gained significant interest, primarily due to advancements in Neural Radiance Field (NeRF) models [2, 33, 35, 65]. While NeRFs have demonstrated remarkable capabilities in gen- * Equal contribution. 1" 2312.04339v1,"Merging by Matching Models in Task Subspaces Derek Tam dtam@cs.toronto.edu University of Toronto Vector Institute Mohit Bansal mbansal@cs.unc.edu University of North Carolina Chapel Hill Colin Raffel craffel@gmail.com University of Toronto Vector Institute Abstract Model merging aims to cheaply combine individual task-specific models into a single multitask model. In this work, we view past merging methods as leveraging different notions of a “task subspace” in which models are matched before being merged. We connect the task subspace of a given model to its loss landscape and formalize how this approach to model merging can be seen as solving a linear system of equations. While past work has generally been limited to linear systems that have a closed-form solution, we consider using the conjugate gradient method to find a solution. We show that using the conjugate gradient method can outperform closed-form solutions, enables merging via linear systems that are otherwise intractable to solve, and flexibly allows choosing from a wide variety of initializations and estimates for the “task subspace“. We ultimately demonstrate that our merging framework called “Matching Models in their Task Subspace” (MaTS) achieves state-of-the-art results in multitask and intermediate-task model merging. We release all of the code and checkpoints used in our work. 1 1 Introduction The widespread fine-tuning of public pre-trained models has produced a huge number of specialized models. For example, the Stable Diffusion XL model (Podell et al., 2023) forms the basis of over a thousand specialized image generation models on the Hugging Face Model Hub. How can we recycle these specialized models to create better base models (Choshen et al., 2022; Ramé et al., 2022)? Model merging (Wortsman et al., 2022b; Matena & Raffel, 2022) aims to tackle this problem by combining specialized models into a single model that retains the individual models’ capabilities. While merging via simple parameter averaging can work well for models that share an architecture and initialization (McMahan et al., 2017; Stich, 2018), recent merging methods improve over simple averaging by considering parameter importance (Matena & Raffel, 2022), matching activations (Jin et al., 2022), omitting the contribution of the pre-trained model (Ilharco et al., 2022), or resolving interference across models (Yadav et al., 2023). In our work, we show how several recent merging methods can be viewed as finding a single model that matches task-specific models in their respective “task subspaces”. We define a task subspace as the subspace implicitly used by a given merging method that aims to correspond to the important dimensions in parameter space for the task. To match models in their task subspace, merging methods upweight each model in its task subspace, which aims to ensure that the task-relevant components of a given model will not be washed 1 https://github.com/r-three/mats 1" 2312.04343v1,"Causality and Explainability for Trustworthy Integrated Pest Management Ilias Tsoumas ∗ 1,2 Vasileios Sitokonstantinou ∗4 Georgios Giannarakis 1 Evagelia Lampiri 3 Christos Athanassiou 3 Gustau Camps-Valls 4 Charalampos Kontoes 1 Ioannis Athanasiadis 2 1 BEYOND Centre, IAASARS, National Observatory of Athens 2 Wageningen University & Research 3 University of Thessaly 4 Image Processing Laboratory (IPL), Universitat de València {i.tsoumas, giannarakis, kontoes}@noa.gr {ilias.tsoumas, ioannis.athanasiadis}@wur.nl {elampiri, athanassiou}@uth.gr {sitokons, gustau.camps}@uv.es Abstract Pesticides serve as a common tool in agricultural pest control but significantly contribute to the climate crisis. To combat this, Integrated Pest Management (IPM) stands as a climate-smart alternative. Despite its potential, IPM faces low adoption rates due to farmers’ skepticism about its effectiveness. To address this challenge, we introduce an advanced data analysis framework tailored to enhance IPM adoption. Our framework provides i) robust pest population predictions across diverse environments with invariant and causal learning, ii) interpretable pest presence predictions using transparent models, iii) actionable advice through counterfactual explanations for in-season IPM interventions, iv) field-specific treatment effect estimations, and v) assessments of the effectiveness of our advice using causal inference. By incorporating these features, our framework aims to alleviate skepticism and encourage wider adoption of IPM practices among farmers. 1 Introduction Conventional pest management has been shown to contribute to climate change. Raising temperatures, intensifying ultraviolet radiation, and reducing relative humidity, are expected to increase pest outbreaks and undermine the efficacy of pest control methods like host-plant resistance, bio-pesticides, and synthetic pesticides [37, 41]. Pervasive pesticide use in agriculture, despite climate experts’ warnings, adversely affects public health [9] and contributes to the climate crisis. This impact includes: i) greenhouse gas (GHG) emissions from pesticide production, packaging, and transportation [6], ii) compromised soil carbon sequestration [48], iii) elevated GHG emissions from soil [27, 18, 42], and iv) contamination of adjacent soil and water ecosystems, resulting in biodiversity loss [35]. Thus, a vicious cycle has been established between pesticides and climate change [36]. In response, the European Commission (EC) has taken action for the reduce of all chemical and high-risk pesticides by 50% by 2030. Achieving such reductions requires adopting integrated pest management (IPM), which promotes sustainable agriculture and agroecology. IPM consists of 8 principles inspired by the Food and Agriculture Organization (FAO) description. The authors in [8] condense these principles ∗ Equal contribution. Tackling Climate Change with Machine Learning: workshop at NeurIPS 2023." 2312.04363v1,"Refined analysis of Ω − Ω̄ + polarization in electron-positron annihilation process Zhe Zhang, 1, ∗ Jiao Jiao Song, 2, † and Ya-jin Zhou 1, ‡ 1 Key Laboratory of Particle Physics and Particle Irradiation (MOE), Institute of Frontier and Interdisciplinary Science, Shandong University, Qingdao, Shandong 266237, China 2 School of Physics, He’nan Normal University, Xinxiang, Henan 453007, China We investigate the production of spin-3/2 hyperon pairs, Ω − Ω̄ + , in electron-positron anni- hilation within the helicity amplitude formalism. A refined selection of helicity basis matri- ces is proposed to relate polarization expansion coefficients and spin density matrix elements and to illuminate their inherent physical interpretations and symmetrical properties. With a novel parametrization scheme of helicity amplitudes, we perform an analysis of polarization correlation coefficients for double-tag Ω − Ω̄ + pairs. We present three sets of expressions to describe the decay of Ω − hyperons, and further address the existing tension in the measure- ments of its decay parameters, particularly ϕ Ω . The method and the framework developed in this paper can also be applied to studies of the production and decay mechanisms of other spin-3/2 particles. ∗ zhangzhe@mail.sdu.edu.cn songjiaojiao@ihep.ac.cn ‡ zhouyj@sdu.edu.cn †" 2312.04364v1,"DemoCaricature: Democratising Caricature Generation with a Rough Sketch Dar-Yen Chen Subhadeep Koley Aneeshan Sain Pinaki Nath Chowdhury Tao Xiang Ayan Kumar Bhunia Yi-Zhe Song SketchX, CVSSP, University of Surrey, United Kingdom. {s.koley, a.sain, p.chowdhury, t.xiang, a.bhunia, y.song}@surrey.ac.uk https://democaricature.github.io ID Sketch 1 ID Sketch Ours Style Sketch 2 Ours Ours ID ID Sketch Sketch Style Ours Ours 330 Figure 1. Given an abstract freehand sketch and an image depicting the facial identity of a person, our method transforms the deformed sketch into a plausible-looking caricature while maintaining identity-fidelity and imitating the exaggerations portrayed in the input sketch. Additionally, it can seamlessly transmit the look-and-feel of a given style-image into the output caricature. Abstract tity and style features. Crucially, our aim is not to replace artists but to eliminate accessibility barriers, allowing enthusiasts to engage in the artistry. In this paper, we democratise caricature generation, empowering individuals to effortlessly craft personalised caricatures with just a photo and a conceptual sketch. Our objective is to strike a delicate balance between abstraction and identity, while preserving the creativity and subjectivity inherent in a sketch. To achieve this, we present Explicit Rank-1 Model Editing alongside single-image personalisation, selectively applying nuanced edits to cross-attention layers for a seamless merge of identity and style. Additionally, we propose Random Mask Reconstruction to enhance robustness, directing the model to focus on distinctive iden- 1. Introduction Ever wondered when you would finally decide to get that personalised caricature created, perhaps during a holiday? Look no further, this paper is for you – we strive to democratise caricature [3, 23, 24] generation for everyone! With a portrait of yourself and a conceptual sketch of how you envision your caricature, we will automatically generate a high-fidelity caricature that unmistakably captures 1" 2312.04379v1,"The CONCATENATE workshop at the ACM/IEEE International Conference on Human-Robot Interaction 2023 How much informative is your XAI? A decision-making assessment task to objectively measure the goodness of explanations Marco Matarese 1,2 1 Francesco Rea 2 Alessandra Sciutti 2 University of Genoa 2 Italian Institute of Technology marco.matarese, francesco.rea, alessandra.sciutti@iit.it Abstract tion context. Unfortunately, most of these evaluations rely on subjective or indirect measurements (e.g., questionnaires or performance). However, the main aim of an XAI system is to provide the user with information about the functioning of the underlying AI model. So far, the amount of information an XAI system provides has been assessed through indirect measures, such as users’ ability to simulate the AI behaviour. Indeed, recent surveys (Mohseni, Zarei, and Ragan 2018) and systematic reviews (Nauta et al. 2022) highlight the need for more objective and quantitative measures to assess the goodness of XAI techniques. In our opinion, it is worth taking a step back and measuring the goodness of XAI systems from the information they can provide to users. Although measuring how much information a system can generate could be challenging, we can focus on the amount of new knowledge that such flow of information creates in the users’ mental models. Hence, if we let only non-expert users interact with XAI systems, we can state that the knowledge they acquired arose from the interaction with the system. Finally, if such knowledge is quantifiable, we can assess how much the system has been informative. In this paper, we aim to propose an assessment task to objectively and quantitatively measure the goodness of XAI systems during human-AI decision-making tasks intended as how much they are informative to non-expert users. Moreover, we plan to use such a task to study the effectiveness of user-centred XAI in HRI scenarios. In particular, we are interested in understanding whether a user-centred XAI approach is more informative than a classical one. There is an increasing consensus about the effectiveness of user-centred approaches in the explainable artificial intelligence (XAI) field. Indeed, the number and complexity of personalised and user-centred approaches to XAI have rapidly grown in recent years. Often, these works have a two-fold objective: (1) proposing novel XAI techniques able to consider the users and (2) assessing the goodness of such techniques with respect to others. From these new works, it emerged that user-centred approaches to XAI positively affect the interaction between users and systems. However, so far, the goodness of XAI systems has been measured through indirect measures, such as performance. In this paper, we propose an assessment task to objectively and quantitatively measure the goodness of XAI systems in terms of their information power, which we intended as the amount of information the system provides to the users during the interaction. Moreover, we plan to use our task to objectively compare two XAI techniques in a human-robot decision-making task to understand deeper whether user-centred approaches are more informative than classical ones. Introduction The number and complexity of user-centred approaches to XAI have been increasing in recent years (Williams 2021). The application contexts of such approaches are various. They go from computer applications aiming at providing personalised teaching (Embarak 2022)(Cohausz 2022) to human-robot interaction (HRI) contexts in which the robot maintains users’ models to provide explanations tailored to them (Matarese, Rea, and Sciutti 2021)(Stange et al. 2022). These works show a clear trend: user-centred XAI positively affects the interaction between users and systems. It brings to higher users’ willingness to reuse the system (e.g., with recommendation systems (Conati et al. 2021)), robots’ persuasiveness during human-robot decision-making tasks and human-AI teams performance (Schemmer et al. 2022b). One of the reasons why the XAI research field is moving toward user-centred approaches is to improve the goodness of the explanations. Alongside producing personalised XAI, recent works also aim to evaluate the goodness of the explanation produced. What is meant for “XAI goodness” is still under debate; nonetheless, there is a broad consensus about the dependency of this concept on the applica- Related work Several works assessed XAI systems’ properties through user studies. The more interesting ones, in our opinion, are addressed to non-expert users (Janssen et al. 2022). These latter used tasks that only some people know about. For example, authors in (Lage et al. 2019) used two application domains: an artificial alien’s food preferences based on the meals’ recipes, and clinical diagnosis. Those in (Wang and Yin 2021) also used two peculiar decision-making tasks: a recidivism prediction and a forest cover prediction task. Further, authors in (van der Waa et al. 2021) used a diabetes self-management use-case where naive users and the system 1" 2312.04383v1,"Elastic Recoil Imprinted on Free-electron Radiation 1 Xihang Shi 1 , Lee Wei Wesley Wong 2 , Sunchao Huang 2 , Liang Jie Wong 2 and Ido Kaminer 1 † Solid State Institute and Faculty of Electrical and Computer Engineering, Technion – Israel Institute of Technology, Haifa 3200003, Israel 2 School of Electrical and Electronic Engineering, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798, Singapore † Corresponding Author: kaminer@technion.ac.il Abstract Free-electron radiation phenomena are treated almost exclusively with classical electrodynamics, despite the intrinsic interaction being that of quantum electrodynamics. The lack of quantumness arises from the vast disparity between the electron energy and the much smaller photon energy, creating a small cross-section that makes quantum effects negligible. Here we identify a fundamentally distinct phenomenon of electron radiation that bypasses this energy disparity, and thus displays extremely strong quantum features. This phenomenon arises from free-electron elastic recoil, which can influence fundamental radiation processes in ways thought so far to necessitate inelastic scattering. The underlying reason for the quantum radiation features, which have no counterparts in classical theory, is the entanglement between each elastically recoiled electron and the photons it emitted. We show that this phenomenon is more accessible than all other types of quantum features in free-electron radiation and can be detected in current experimental setups such as electron microscopes. These quantum radiation features could guide the development of compact coherent X-ray sources facilitated by nanophotonics and quantum optics. Introduction Despite the fundamental electron-photon interaction being at the core of quantum electrodynamics, the broad range of free-electron radiation effects is to a large part captured using just classical electrodynamics 1–3 . The underlying reason for the lack of quantumness is the intrinsic weakness of electron-photon interactions: small cross-section and negligible inelastic electron recoil by photon emission. Once the inelastic recoil energy becomes comparable to or larger than the uncertainty in the electron energy, quantum effects appear in the electron dynamics, but the P a g e 1 | 23" 2312.04388v1,"CTPU-PTC-23-52 Cosmological domain walls from the breaking of S 4 flavor symmetry Adil Jueid, 1 Mohamed Amin Loualidi, 2 Salah Nasri, 2, 3 and Mohamed Amine Ouahid 4 1 Particle Theory and Cosmology Group, Center for Theoretical Physics of the Universe, Institute for Basic Science (IBS), 34126 Daejeon, Republic of Korea ∗ 2 Department of physics, United Arab Emirates University, Al-Ain, UAE † 3 The Abdus Salam International Centre for Theoretical Physics, Strada Costiera 11, I-34014, Trieste, Italy ‡ 4 LPHE-Modeling and Simulations, Faculty of Science, Mohammed V University in Rabat, Morocco and Centre of Physics and Mathematics, CPM-Morocco § In this work, we delve into the often-overlooked cosmological implications of spontaneous breaking of non-Abelian discrete groups, specifically focusing on the formation of domain walls in the case of S 4 flavor symmetry. In particular, we investigate three interesting breaking patterns of the S 4 group and study the structure of the domain walls in the broken phase for three possible residual symmetries. The presentation of domain walls in the case of multiple vacua is usually complicated, which therefore implies that most of the analyzes only approximate their presentation. Here, we propose a subtle way to represent the S 4 domain wall networks by presenting the vacua in each breaking pattern as vectors with their components corresponding to their coordinates in the flavon space. Then, through the properties of the obtained vectors, we find that the domain wall networks can be represented by Platonic or Archimedean solids where the vertices represent the degenerate vacua while the edges correspond to the domain walls that separate them. As an illustration, we propose a type-II seesaw model that is based on the S 4 flavor symmetry, and study its phenomenological implications on the neutrino sector. To solve the domain wall problem within this toy model, we consider an approach based on high-dimensional effective operators induced by gravity that explicitly break the structure of the induced vacua favoring one vacuum over the others. I. INTRODUCTION In the past two decades, non-Abelian discrete symmetries have become more prominent in flavor model building. This interest grew particularly following the observation of large leptonic mixing angles from various neutrino oscillation experiments (see Refs. [1–3] for updated global fits). Non-Abelian discrete groups are increasingly employed to tackle the flavor problem which is connected to the lack of a mechanism within the Standard Model (SM) that explains the mass hierarchies of the different fermions and their mixing. Nevertheless, in order to achieve realistic predictions for the fermion masses and mixing angles at low energies, it is imperative to break the non-Abelian group due to the fact that the charged leptons and the three massive neutrinos are inherently distinct in the symmetric phase of the underlying flavor group. This breaking takes place when scalar fields called flavons, which are singlets under the SM gauge group, acquire nonzero vacuum expectation values (VEVs) along specific directions within the flavon space. On the other hand, the spontaneous symmetry breaking (SSB) of the discrete groups gives rise to multiple degenerate vacua separated by surface-like topological defects referred to as domain walls (DWs) [4, 5]. The number of the vacua and DWs depends on the order of the broken group. Generally, these ∗ Electronic address: adiljueid@ibs.re.kr † Electronic address: ma.loualidi@uaeu.ac.ae ‡ Electronic address: snasri@uaeu.ac.ae, salah.nasri@cern.ch § Electronic address: mohamedamine˙ouahid@um5.ac.ma multiple vacua can be understood as the constituents of a topologically nontrivial vacuum manifold, defined by disconnected points in space with the same energy [6]. Once the field responsible for SSB stabilizes at one of these points —no point is preferred over any other— it cannot transition to any of the remaining points [7]. The regions between the degenerate ground states represent the DWs which, if proven to be stable, are disfavored by cosmological observations. To illustrate why this is an issue, notice that DWs are expected to enter a regime of dynamical scaling such that the number of defects is constant per Hubble horizon [8–10]. In this scaling regime, we have the property H −1 ∼ L ∼ R where H −1 is the Hubble radius, L is the distance between two neighboring walls and R is the wall curvature radius which is proportional to the cosmological expansion factor a(t). The energy density of DWs in this regime scales as a −1 , decreasing more slowly than radiation or matter which scales as a −4 or a −3 respectively [4–6]. As a result, DWs could eventually dominate the Universe at small redshift which is disfavored by the current cosmological observations; this is known as the domain wall problem [4]. Indeed, Zel’dovich, Kobzarev and Okun pointed out that stable DWs would cause a fast expansion of the Universe dramatically affecting the formation of galaxies and reducing the production rates of light elements during primordial Nucleosynthesis [4]. Moreover, the presence of the walls in the current Universe would create unacceptable distortions in the cosmic microwave background (CMB) radiation that would violate the present limits on its homogeneity and isotropy [7]." 2312.04397v1,"Corneal retardation time as an ocular hypertension disease indicator Oscar del Barco 1,∗ , Francisco J Ávila 2 , Concepción Marcellán 2 and Laura Remón 2 1 Laboratorio de Óptica, Instituto Universitario de Investigación en Óptica y Nanofísica, Universidad de Murcia, Campus de Espinardo, E-30100, Murcia, Spain 2 Departamento de Física Aplicada, Universidad de Zaragoza, E-50009, Zaragoza, Spain ∗ Author to whom any correspondence should be addressed. E-mail: obn@um.es Abstract. Objective. A detailed analysis of the corneal retardation time τ as a highly related parameter to the intraocular pressure (IOP), and its plausible role as an indicator of ocular hypertension disease. Approach. A simple theoretical expression for τ is derived within the corneal viscoelastic model of Kelvin-Voigt with 3 elements. This retardation time can be easily calculated from the well-known signal and pressure amplitudes of non-contact tonometers like the Ocular Response Analyzer (ORA). Then, a population-based study was performed where 100 subjects aged from 18 to 30 were analyzed (within this group, about 10% had an elevated IOP with more than 21 mmHg). Main results. A clear relationship between the corneal retardation time and the corneal-compensated intraocular pressure (IOP cc ) was found, underlying the risk for ocular hypertensive (OHT) subjects with lower τ values to develop hypertension illnesses (due to the inability of poorly viscoelastic corneas to absorb IOP fluctuations, resulting in probable optic nerve damage). Significance. Our results might provide an useful tool to systematically discern which OHT patients (and even those with normal IOP values) are more likely to suffer glaucoma progression and, consequently, ensure an early diagnosis. Keywords: Corneal viscoelastic models, non-contact tonometry, ocular hypertension diseases, glaucoma" 2312.04401v1,"Competing d xy and s ± Pairing Symmetries in Superconducting La 3 Ni 2 O 7 emerge from LDA+FLEX Calculations Griffin Heier 1 , Kyungwha Park 2 , Sergey Y. Savrasov 1 1 Department of Physics, University of California, Davis, CA 95616, USA and 2 Department of Physics, Virginia Tech, Blacksburg, Virginia 24061, USA (Dated: December 8, 2023) With recent discoveries of superconductivity in infinite–layer nickelates, and in La 3 Ni 2 O 7 under high pressure, new opportunities appeared that yet another family of high–temperature superconductors based on Ni element may exist in Nature as was previously the case of cuprates and iron based materials. With their famous strong Coulomb correlations among 3d electrons and the proximity to antiferromagnetic instability these systems represent a challenge for their theoretical description, and most previous studies of superconductivity relied on the solutions of simplified few–orbital model Hamiltonians. Here, on the other hand, we use a recently developed combination of density functional theory with momentum and frequency resolved self–energies deduced from the so–called Fluctuational–Exchange (FLEX)–type Random Phase Approximation (RPA) to study spin fluctuation mediated pairing tendencies in La 3 Ni 2 O 7 under pressure. This methodology uses first–principle electronic structures of an actual material and is free of tight–binding parametrizations employed in model Hamiltonian approach. Based on our numerical diagonalization of the BCS Gap equation we show that competing d xy and s ± pairing symmetries emerge in superconducting La 3 Ni 2 O 7 with the corresponding coupling constants becoming very large in the proximity of spin density wave instability. The results presented here are discussed in light of numerous other calculations and provide on–going experimental efforts with predictions that will allow further tests of our understanding of unconventional superconductors. PACS numbers: Opportunities to realize high –temperature superconductivity have always been a subject of enormous research interest, and recent discoveries of superconducting nickelates[1, 2] is not an exception. Despite numerous theoretical and experimental efforts in the past [3–8], infinite–layer Nd 2 NiO 2 were shown to exhibit superconductivity at 8K only a few years ago [1, 9, 10] but just discovered 80K superconductivity in bulk La 3 Ni 2 O 7 under applied pressures over 14GPa[2] has brought nickelates into focus of becoming a new addition to the famous family of high–temperature superconducting cuprates and ironates[12–14]. This breakthrough has inspired a large–scale theoretical effort to understand the nature of superconductivity in La 3 Ni 2 O 7 . First principles electronic structure calculations based on Density Functional Theory (DFT) and Local Density Approximation (LDA)[18] reveal the dominant role of Ni 3d x 2 −y 2 orbitals and, in addition, of Ni 3d 3z 2 −r 2 orbitals [2, 16, 17]. Correlation effects beyond DFT have been studied [19–21] using combinations of LDA and GW methods with dynamical mean field theory (LDA+DMFT and GW+DMFT)[15] . Two–orbital bilayer models for the bands near the Fermi level have been proposed to describe the low energy physics of this material [22, 23]. Many–body simulations of model Hamiltonians with Quantum Monte Carlo[24] and density matrix renormalization group[25] techniques have also recently appeared. Focusing on the superconducting state, the s ± pairing symmetry with sign changing order parameter on different sheets of the Fermi surface has been put forward in a series of recent works[19, 20, 22, 26–31]. Such calculations frequently rely on the so–called spin fluctuational mechanism of superconductivity that has been proposed to understand properties of heavy fermion systems many years ago [32, 33]. Diagrammatically, this includes particle–hole ladder and bubble diagrams and is known as Random Phase Approximation (RPA) [34, 35]. The inclusion to these series of particle–particle ladder diagrams has also been proposed in the past, which was entitled as the Fluctuational Exchange Approximation (FLEX) [36]. This contribution was however found to be not essential in the proximity to magnetic instability where the most divergent terms are described by the particle–hole ladders[37]. We have recently implemented a combination of density functional electronic structure theory with momentum– and energy–dependent self–energy deduced from the above mentioned FLEX–RPA method[38]. This LDA+FLEX(RPA) approach evaluates dynamical charge and spin susceptibilities of the electrons in a Hilbert space restricted by correlated orbitals only, similar to popular LDA+U[40] and LDA+DMFT approaches[15]. Evaluations of superconducting pairing interactions describing scattering of the Cooper pairs at the Fermi surface in a realistic material framework became possible using this method. Our most recent calculations of HgBa 2 CuO 4 [39], a prototype single–layer cuprate superconductor, where a much celebrated d x 2 −y 2 symmetry of the order parameter was easily recovered with" 2312.04415v1,"Flux-Tunable Josephson Diode Effect in a Hybrid Four-Terminal Josephson Junction M. Coraiola, 1 A. E. Svetogorov, 2 D. Z. Haxell, 1 D. Sabonis, 1 M. Hinderling, 1 S. C. ten Kate, 1 E. Cheah, 3 F. Krizek, 1, 3, ∗ R. Schott, 3 W. Wegscheider, 3 J. C. Cuevas, 2, 4 W. Belzig, 2 and F. Nichele 1, † 1 IBM Research Europe—Zurich, 8803 Rüschlikon, Switzerland Fachbereich Physik, Universität Konstanz, D-78457 Konstanz, Germany 3 Laboratory for Solid State Physics, ETH Zürich, 8093 Zürich, Switzerland 4 Departamento de Fı́sica Teórica de la Materia Condensada and Condensed Matter Physics Center (IFIMAC), Universidad Autónoma de Madrid, E-28049 Madrid, Spain (Dated: December 8, 2023) 2 We investigate the direction-dependent switching current in a flux-tunable four-terminal Josephson junction defined in an InAs/Al two-dimensional heterostructure. The device exhibits the Josephson diode effect, with switching currents that depend on the sign of the bias current. The superconducting diode efficiency, reaching a maximum of |η| ≈ 34%, is widely tunable—both in amplitude and sign—as a function of magnetic fluxes and gate voltages. Our observations are supported by a circuit model of three parallel Josephson junctions with non-sinusoidal current–phase relation. With respect to conventional Josephson interferometers, phase-tunable multiterminal Josephson junctions enable large diode efficiencies in structurally symmetric devices, where local magnetic fluxes break both time-reversal and spatial-inversion symmetries. Our work establishes a pathway to develop Josephson diodes with wide-range tunability and that do not rely on exotic materials or externally applied magnetic fields. Nonreciprocal transport phenomena play a key role in modern electronics, with semiconductor diodes serving as the fundamental components for numerous devices [1]. In analogy to the semiconductor diode, whose electrical resistance strongly depends on the current direction, a superconducting diode allows a larger supercurrent to flow in one direction compared to the other [2]. Nonreciprocal supercurrents were recognized already in the 1970s in superconducting quantum interference devices (SQUIDs) based on superconducting bridges [3] and tunnel Josephson junctions (JJs) [4, 5], arising as a consequence of the finite loop inductance. Direction-dependent switching currents were also observed in conventional superconducting thin films and interpreted as a manifestation of microscopic asymmetries in the device geometry [6]. More recently, the superconducting diode effect (SDE) has sparked renewed interest, driven by its connection to fundamental properties of a diverse range of superconducting systems, where the breaking of both inversion and time-reversal symmetries is required for the effect to occur. Since its observation in artificial superlattices [7], the SDE has been the subject of thorough experimental and theoretical investigation, both in junction-free thin films [8–13] and JJs based on semiconductors with spin–orbit coupling [14–17], finite-momentum superconductors [18–20] or multilayered materials, realizing sizeable asymmetries even without external magnetic fields [21–28]. An alternative platform proposed to achieve the SDE in Josephson devices—where it is usually referred to as Josephson diode effect (JDE)—relies on a super- ∗ Present address: Institute of Physics, Czech Academy of Sciences, 162 00 Prague, Czech Republic † fni@zurich.ibm.com current interferometer, where two JJs with nonsinusoidal current–phase relations (CPRs) are combined in a SQUID [29, 30]. Such CPRs, containing contributions from higher harmonics than the conventional 2π-periodic component, are routinely attained in highquality superconductor–semiconductor planar materials [31–34], where hybrid JJs host Andreev bound states (ABSs) characterized by high transmission. Key ingredients for the JDE to occur in this system are the different harmonic content between the two JJs, and a magnetic flux threading the SQUID loop [29], as recently demonstrated in two-dimensional (2D) electron [35, 36] and hole [37] systems, obtaining large diode efficiencies at equilibrium up to approximately 30%. Furthermore, threeterminal Josephson devices without phase control were shown to realize the JDE by exploiting high harmonic terms in the CPR [38], multiple bias currents [39, 40] and Andreev molecules [41, 42]. In this work, we report on the superconducting transport properties of a superconductor–semiconductor fourterminal JJ (4TJJ) embedded in a double-loop geometry. Supercurrents are tuned by magnetic fluxes threading the superconducting loops and by gate electrodes that control the number and transmissions of ABSs. We find strong JDE, tunable in both efficiency and sign with gate voltages and two independent superconducting phases— controlled via integrated flux-bias lines, without the need for external magnetic fields—reaching a peak efficiency of ±34%. One of the loops was further controlled by gating an additional JJ with large critical current, enabling operation of the device in a single-loop configuration. We provide an in-depth explanation of the JDE in our system by means of a simple circuit model, which maps our device to the combination of two SQUIDs, or a bi-SQUID. Simulations are performed both in an idealized case with minimal assumptions, and in an extended" 2312.04422v1,"Robust Topological Bound States in the Continuum in a Quantum Hall Bar with an Anti-dot Ricardo Y. Díaz and Carlos Ramírez* Departamento de Física, Facultad de Ciencias, Universidad Nacional Autónoma de México, Apartado Postal 70542, Ciudad de México 04510, México *Corresponding author e-mail address: carlos@ciencias.unam.mx Abstract Bound states in the continuum (BICs) are quantum states with normalizable wave functions and energies that lie within the continuous spectrum for which extended or dispersive states are also available. These special states, which have shown great applicability in photonic systems for devices such as lasers and sensors, are also predicted to exist in electronic low-dimensional solid-state systems. The non-trivial topology of materials is within the known mechanisms that prevent the bound states to couple with the extended states. In this work we search for topologically protected BICs in a quantum Hall bar with an anti-dot formed by a pore far from the borders of the bar. The bound state energies and wavefunctions are calculated by means of the Recursive S-Matrix method. The resulting bound state energies coexist with extended states and exhibit a pattern complimentary to the Hofstadter butterfly. A symmetry-breaking diagonal disorder was introduced, showing that the BICs with energies far from the Landau levels remain robust. Moreover, the energy difference between consecutive BICs multiplied by the anti-dot perimeter follows the same curve despite disorder. Finally, a BIC-mediated current switching effect was found in a multi-terminal setup, which might permit their experimental detection. Keywords: Bound states in the continuum, Chiral edge states, Topological Insulators, Quantum Hall effect. Introduction In 1929, Wigner and von Neumann introduced a potential in the Schrödinger equation that leads to quantum states with normalizable wavefunctions that coexist with the continuum energy spectrum of extended states [1]. These special states are called Bound States in the Continuum (BICs) and for many years they were considered a mathematical curiosity. In recent years, BICs emerged as a valuable area of research due to their appearance, both theoretically and in the experiment, in photonic [2–12], acoustic [13–17], mechanical [18,19], electronic [20–25] and anyonic [26] systems. Since their observation, BICs have been proposed as the working principle of devices such as lasers [27–30], transductors [19] and filters [31]. They have also been proposed for qubit encryption [32], as well as for optical [33–35], thermal [36] and biological [37] sensors. Electronic BICs have been predicted in low-dimensional solid-state 1" 2312.04423v1,"S CALABLE K NOWLEDGE G RAPH C ONSTRUCTION AND I NFERENCE ON H UMAN G ENOME V ARIANTS A P REPRINT Shivika Prasanna University of Missouri-Columbia Columbia, MA 65201 spn8y@umsystem.edu Deepthi Rao University of Missouri-Columbia Columbia, MA 65201 raods@health.missouri.edu Eduardo Simoes University of Missouri-Columbia Columbia, MA 65201 simoese@health.missouri.edu Praveen Rao University of Missouri-Columbia Columbia, MA 65201 praveen.rao@missouri.edu December 8, 2023 A BSTRACT Real-world knowledge can be represented as a graph consisting of entities and relationships between the entities. The need for efficient and scalable solutions arises when dealing with vast genomic data, like RNA-sequencing. Knowledge graphs offer a powerful approach for various tasks in such large-scale genomic data, such as analysis and inference. In this work, variant-level information extracted from the RNA-sequences of vaccine-naïve COVID-19 patients have been represented as a unified, large knowledge graph. Variant call format (VCF) files containing the variant-level information were annotated to include further information for each variant. The data records in the annotated files were then converted to Resource Description Framework (RDF) triples. Each VCF file obtained had an associated CADD scores file that contained the raw and Phred-scaled scores for each variant. An ontology was defined for the VCF and CADD scores files. Using this ontology and the extracted information, a large, scalable knowledge graph was created. Available graph storage was then leveraged to query and create datasets for further downstream tasks. We also present a case study using the knowledge graph and perform a classification task using graph machine learning. We also draw comparisons between different Graph Neural Networks (GNNs) for the case study. Keywords knowledge graphs · variant-level genomic information · RNA-seq human genome variants · graph machine learning · graph neural networks 1 Introduction The Human Genome project 1 aimed to sequence the entire human genome, resulting in an official gene map. The gene map has offered crucial insights into the human blueprint, accelerating the study of human biology and advancements in medical practices. This information has been represented in Variant Calling Format (VCF) files that store small-scale information or genetic variation data. Variants are genetic differences between healthy and diseased tissues or between individuals of a population. Analyzing variants can tremendously help prevent, diagnose, and even treat diseases. The process of analyzing these genetic differences or variations in DNA sequences and categorizing their functional significance is called variant analysis. RNA sequencing is similar to DNA sequencing but differs in its extraction. RNA is extracted from a sample and then reverse transcribed to produce what is known as copy or complementary DNA called cDNA. This cDNA is then 1 https://www.genome.gov/human-genome-project" 2312.04434v1,"Density-functional theory for clustering of two-dimensional hard particle fluids Yuri Martínez-Ratón ∗ Grupo Interdisciplinar de Sistemas Complejos (GISC), Departamento de Matemáticas, Escuela Politécnica Superior, Universidad Carlos III de Madrid, Avenida de la Universidad 30, E-28911, Leganés, Madrid, Spain Enrique Velasco † Departamento de Física Teórica de la Materia Condensada, Instituto de Física de la Materia Condensada (IFIMAC) and Instituto de Ciencia de Materiales Nicolás Cabrera, Universidad Autónoma de Madrid, E-28049, Madrid, Spain (Dated: December 8, 2023) Fluids made of two-dimensional hard particles with polygonal shapes may stabilize symmetries which do not result directly from the particle shape. This is due to the formation of clusters in the fluid. Entropy alone can drive these effects, which represent a challenge for standard theories. In this article we present a general density-functional theory for clustering effects in fluids of hard particles in two dimensions. The theory combines a free-energy functional of the angular distribution function with an association energy term which qualitatively reproduces the clustering tendencies of the particles found in Monte Carlo simulations. Application is made to a fluid of hard right-angled triangles. I. INTRODUCTION Hard particle models continue to attract great interest in the theory of phase transitions and colloidal physics [1]. The hard-sphere model in two and three dimensions demonstrated for the first time the existence of a crystal phase due solely to purely repulsive interactions [2, 3], with important implications in colloidal science [4]. Anisotropic models have also proved useful to explain mesogenic formation involving both translational and orientational order [5–12]. The appearance of order in these systems is obviously due to entropic interactions driving the system to ordered or partially ordered configurations where the free volume available to the particles is maximized. The role of entropy in the formation of colloidal crystals has recently been emphasised and explained in terms of the concept of entropic bonding [13]. In systems of identical particles, the extra volume available to each particle is usually shared equally among all the particles. However, in some systems this extra volume is not so trivially split [14]. The configurational space is reorganized into internal coordinates, associated to the formation of clusters, which internally loose entropy, while the gain in entropy of collective coordinates associated to the cluster centers of mass more than compensates the former entropy loss. The net effect is the formation of differently shaped superparticles which can favour the stability of high-order symmetries, not evident from the particle shape alone, in the fluid. This effect may be especially important in twodimensional (2D) systems made of polygonally-shaped particles. Some particle shapes seem to be more prone ∗ Electronic address: yuri@math.uc3m.es † Electronic address: enrique.velasco@uam.es to exhibit these entropic clustering effects, which have a huge impact on the stability of highly-symmetric fluid phases. The compartmentalization of entropy between low- and high-entropy subsystems has been invoked to design host-guest chemical systems with important consequences for nanoparticle storage [15, 16] in colloidal crystals. A general theory to describe storage and encapsulation in equilibrium mixtures of tailored hard particles has been proposed recently [17]. However, there is evidence that the entropy-driven self-assembly of identical hard particles into clusters is also at work in 2D onecomponent liquid-crystal, as opposed to crystal phases or mixtures [18, 19]. Many-body effects leading to self-assembly in 2D oriented fluids represent a challenge for standard theories for liquid crystals [20]. These theories, the most successfully of which is Scaled-Particle Theory (SPT), are based on the Onsager theory [5], whose central ingredient is the volume (area) excluded to a particle by another particle. This is totally equivalent to considering a virial expansion truncated at second order, i.e. at two-body correlations. However, the formation of clusters of particles necessarily involve higher-order correlations. Some proposals of extended theories that incorporate these correlations systematically, in the context of 2D oriented fluids, have been made [21]. The effect of third- and fourth-order correlations on the stability of the tetratic (T) phase in fluids of hard rectangles and hard right-angled triangles have been analysed, with relatively disappointing results in the latter case [20]. In particular, Monte Carlo (MC) simulations reveal a T phase with strong octatic (eightfold or 8-atic, O) correlations for right-angled triangles [14, 22], but the extended theories only predict a uniaxial nematic (N) in the whole density range. Even a theory containing the exact fourth virial coefficient, which would seem at first glance as an essential ingredient to capture the formation of square dimers and tetramers" 2312.04447v1,"Privacy-preserving quantum federated learning via gradient hiding Changhao Li, 1, ∗ Niraj Kumar, 1 Zhixin Song, 1 Shouvanik Chakrabarti, 1 and Marco Pistoia 1 1 Global Technology Applied Research, JPMorgan Chase, New York, NY 10017 USA Distributed quantum computing, particularly distributed quantum machine learning, has gained substantial prominence for its capacity to harness the collective power of distributed quantum resources, transcending the limitations of individual quantum nodes. Meanwhile, the critical concern of privacy within distributed computing protocols remains a significant challenge, particularly in standard classical federated learning (FL) scenarios where data of participating clients is susceptible to leakage via gradient inversion attacks by the server. This paper presents innovative quantum protocols with quantum communication designed to address the FL problem, strengthen privacy measures, and optimize communication efficiency. In contrast to previous works that leverage expressive variational quantum circuits or differential privacy techniques, we consider gradient information concealment using quantum states and propose two distinct FL protocols, one based on private inner-product estimation and the other on incremental learning. These protocols offer substantial advancements in privacy preservation with low communication resources, forging a path toward efficient quantum communication-assisted FL protocols and contributing to the development of secure distributed quantum machine learning, thus addressing critical privacy concerns in the quantum computing era. I. INTRODUCTION Quantum computing has experienced rapid advancements in recent years, and within this dynamic landscape, distributed quantum computing including quantum machine learning (QML) [1–9], has garnered considerable attention due to its remarkable capability to harness the collective power of distributed quantum resources, surpassing the limitations of individual quantum nodes. Distributed quantum computation usually involves generating and transmitting quantum states across multiple nodes leveraging the advancements in quantum communication technologies [10]. Remarkably, distributed quantum computing protocols offer a ray of hope in addressing privacy concerns in the presence of adversaries [10–14], while traditional classical methods have struggled to ensure the confidentiality of sensitive information during distributed processes. These adversaries not only involve third-party attacks that can be tackled with well-celebrated quantum communication technologies such as quantum key distribution [10, 11], but also include privacy concerns with untrusted computing nodes [12, 13]. A critical example of this vulnerability indeed lies in classical federated learning (FL) [15, 16], where multiple clients collaboratively train a machine learning model to optimize a given task while keeping their training data distributed without being moved to a single server or data center. A central server is assigned the responsibility of aggregating the client model updates, typically the model cost function gradients generated by the clients using their local data. However, this opens up a possibility of leaking client’s sensitive data to the server using gradient inversion attacks [17–21]. While techniques ∗ changhao.li@jpmchase.com employing homomorphic encryption or differential privacy [22, 23] have been introduced to tackle the problem, they usually demand additional computational and communication overhead or come at the expense of reduced model accuracy. To this end, quantum technologies could provide a natural embedding of privacy. To counteract the gradient inversion attack, one recent proposal [9] replaced the classical neural network in the FL model with variational quantum circuits built using expressive quantum feature maps such that the problem of a successful attack is reduced to solving high-degree multivariate Chebyshev equations. Other quantum-based proposals include adding a certain level of noise to the gradient values to reduce the probability of a successful gradient inversion attack [24], leveraging blind quantum computing [25], and others [26–29]. An alternative to the aforementioned methods is to encode the client’s classical gradient values into quantum states and leverage quantum communication between the clients and server to transmit the states. This provides opportunities to hide the gradient values of individual clients from the server while allowing the server to perform the model aggregation using appropriate quantum operations on their end. In this case, the transmitted quantum states offer an inherent advantage in terms of privacy even without additional privacy mechanisms, as the classical information can be encoded in logarithmic number of qubits and using Holevo’s bound, the server could extract at most logarithmic number bits of classical information during each round of communication [6]. Moreover, we remark that the approach can be naturally integrated with quantum cryptographic techniques [10, 30] to become robust against third-party attacks. In this work, we introduce protocols for the above approach, aiming to advance the capability of distributed quantum computing with quantum communication in the context of FL. Specifically, we propose two types of protocols: one based on private inner-product estimation to" 2312.04448v1,"Relativistic materials from an alternative viewpoint Ann E. Mattsson ∗ and Daniel A. Rehn † Computational Physics Division, Los Alamos National Laboratory, Los Alamos, NM 87545 (Dated: December 8, 2023) Electrons in materials containing heavy elements are fundamentally relativistic and should in principle be described using the Dirac equation. However, the current standard for treatment of electrons in such materials involves density functional theory methods originally formulated from the Schrödinger equation. While some extensions of the Schrödinger-based formulation have been explored, such as the scalar relativistic approximation with or without spin-orbit coupling, these solutions do not provide a way to fully account for all relativistic effects of electrons, and the language used to describe such solutions are still based in the language of the Schrödinger equation. In this article, we provide a different method for translating between the Dirac and Schrödinger viewpoints in the context of a Coulomb potential. By retaining the Dirac four-vector notation and terminology in taking the non-relativistic limit, we see a much deeper connection between the Dirac and Schrödinger equation solutions that allow us to more directly compare the effects of relativity in the angular and radial functions. Through this viewpoint, we introduce the concepts of densitals and Dirac spherical harmonics that allow us to translate more easily between the Dirac and Schrödinger solutions. These concepts allow us to establish a useful language for discussing relativistic effects in materials containing elements throughout the full periodic table and thereby enable a more fundamental understanding of the effects of relativity on electronic structure. I. INTRODUCTION Solid state materials containing heavy elements are currently studied using computational methods based on the Schrödinger equation (SE). Among the most popular approaches is density functional theory (DFT), [1, 2] which was originally developed as a reformulation of the Schrödinger equation. For heavy elements, however, relativistic effects are known to play an essential role in determining materials properties. While some extensions of SE-based DFT such as the scalar relativstic (SR) [3] and SR with spin-orbit coupling (SR+SO) are frequently used, these methods do not include all relativistic effects and introduce approximations that so far have not been adequately assessed. On the other hand, the relativistic formulation of DFT based on the Dirac equation was developed nearly 40 years ago in the work of Rajagopal and Galloway [4, 5], and also by MacDonald and Vosko. [6] This relativistic formulation, which we refer to as RDFT, has not been used or implemented extensively in the context of solid state materials, though some codes have done so using various methodologies. [7–15] On the other hand, the quantum chemistry community frequently uses methods based on the Dirac equation for the study of heavy elements. [16–24] In order to advance our predictive capabilities for materials containing heavy elements and assess the SR and SR+SO approximations in the context of solids, we need to move towards the RDFT formulation and solve the corresponding Dirac-Kohn-Sham equations in order to establish a baseline from which to assess the approximations made with existing methods. However, to do ∗ aematts@lanl.gov † rehnd@lanl.gov this, we must also address the fact that a significant language barrier exists in moving between the Dirac and Schrödinger solutions. This language barrier originates from the way we refer to states in the Dirac and SE solutions to the hydrogen-like atom, i.e., an isolated ion (nucleus) with nuclear charge Z and one electron. The SE solutions give us a quantum number n describing the energy, and quantum numbers l and m giving the orbital angular momentum, as well as a spin index s =↑, ↓. On the other hand, the Dirac equation applied to the same problem gives us a different set of quantum numbers, N , κ, j, and j 3 , defined below. While l also appears in the Dirac equation, it depends on the value of κ or j and is not a good quantum number. In addition, the spin index in the Dirac solutions arises naturally in the Dirac four-vector notation, along with the two positron spin solutions. These fundamental differences in quantum numbers make it important to develop a language and methodology for translating between the SE and Dirac pictures. The primary focus of this article is to establish a new language for translating between the Dirac and SE solutions. We do this by focusing on the hydrogen-like atom, deriving analytic solutions to the problem with the Dirac equation, and then taking the non-relativistic limit in a particular way that allows the SE solutions to be understood in the context of the four-vector solutions to the Dirac equation. In doing so, we define two concepts that establish a language for translating: densitals and Dirac spherical harmonics. We then use these concepts to analyze states in the SE and Dirac solutions. These concepts also allow us to translate from the traditional SE terminology (e.g., s, p, d, f states) to the more general Dirac terminology we define below. The benefit of this approach is that it enables a much more direct and informative comparison of the effects of relativity on any" 2312.04459v1,"On the Role of Charge Transfer Excitations in Non-Fullerene Acceptors for Organic Photovoltaics Samuele Giannini,* a,g Daniel J. C. Sowood, b Jesús Cerdá, a Siebe Frederix, c Jeannine Grüne, d Giacomo Londi, a,h Thomas Marsh, b Pratyush Ghosh, b Ivan Duchemin, f Neil C. Greenham, b Koen Vandewal, c Gabriele D’Avino, e Alexander J. Gillett,* b David Beljonne* a a) b) c) d) e) f) g) Laboratory for Chemistry of Novel Materials, University of Mons, Mons 7000, Belgium. Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge, CB3 0HE, U.K. Instituut voor Materiaalonderzoek (IMO-IMOMEC), Hasselt University, Diepenbeek, Belgium Julius Maximilian University of Würzburg Am Hubland, Würzburg 97074, Würzburg, Germany Grenoble Alpes University, CNRS, Grenoble INP, Institut Néel, 38042 Grenoble, France Grenoble Alpes University, CEA, IRIG-MEM-L_Sim, 38054 Grenoble, France Present address: Institute of Chemistry of OrganoMetallic Compounds, National Research Council (ICCOM- CNR), I-56124 Pisa, Italy h) Present address: Dipartimento di Chimica e Chimica Industriale, Universitá di Pisa, 56124 Pisa, Italy. e-mail: samuele.giannini@umons.ac.be, ajg216@cam.ac.uk, david.beljonne@umons.ac.be Highlights • • • A detailed analysis of the steady-state and transient optical absorption spectra of the nonfullerene acceptor Y6 thin films reveals clear evidence for mixing between localized Frenkel and intermolecular charge-transfer excitations resulting in a broad density of states. These hybrid states are in dynamic equilibrium with bound polaron pairs that predominantly recombine on timescales much shorter than that for charge separation in blends of Y6 with polymer donors. Our combined experimental-theoretical study clarifies the origin for the limited charge generation yield in single component Y6 organic solar cells and highlights the importance of molecular packing in defining the nature of the primary photoexcitations in non-fullerene molecular acceptors. Abstract Through the development of new non-fullerene electron acceptor (NFA) materials, such as Y6 and its molecular derivatives, the power conversion efficiencies of organic photovoltaics (OPVs) have now exceeded 19%. However, despite this rapid progress, our fundamental understanding of the unique optical and electronic properties of these Y-series NFAs is lacking, and this currently limits progress in material design. In this work, we provide a detailed computational-experimental characterisation of the archetypal NFA, Y6. To explain the significant broadening and red shift of the absorption spectrum observed when moving from the solution phase to the solid state, we first rule out more typical causes, such as J-aggregation. Instead, by considering the role of charge transfer (CT) excitations and their mixing with Frenkel exciton (FE) states, we can computationally reproduce the experimental absorption spectra of Y6 with excellent accuracy. Using transient absorption spectroscopy, we provide evidence for this dense manifold of FE-CT hybrid electronic excitations in Y6 through the prominent sub-picosecond relaxation events following supra band gap excitation. Furthermore, through sub band gap excitation, we also find states with polaronic character in Y6 that are in a dynamic equilibrium with the FE-CT hybrid states. Magnetic resonance spectroscopies reveal that these polaronic states are 1" 2312.04463v1,"Leveraging Transformer-based Language Models to Automate Requirements Satisfaction Assessment Amrit Poudel, Jinfeng Lin, Jane Cleland-Huang University of Notre Dame Notre Dame, IN { apoudel, jling, janeclelandhuang } @nd.edu Abstract—Requirements Satisfaction Assessment (RSA) evaluates whether the set of design elements linked to a single requirement provide sufficient coverage of that requirement – typically meaning that all concepts in the requirement are addressed by at least one of the design elements. RSA is an important software engineering activity for systems with any form of hierarchical decomposition – especially safety or mission critical ones. In previous studies, researchers used basic Information Retrieval (IR) models to decompose requirements and design elements into chunks, and then evaluated the extent to which chunks of design elements covered all chunks in the requirement. However, results had low accuracy because many critical concepts that extend across the entirety of the sentence were not well represented when the sentence was parsed into independent chunks. In this paper we leverage recent advances in natural language processing to deliver significantly more accurate results. We propose two major architectures: Satisfaction BERT (Sat-BERT), and Dual-Satisfaction BERT (DSat-BERT), along with their multitask learning variants to improve satisfaction assessments. We perform RSA on five different datasets and compare results from our variants against the chunk-based legacy approach. All BERT-based models significantly outperformed the legacy baseline, and Sat-BERT delivered the best results returning an average improvement of 124.75% in Mean Average Precision. I. I NTRODUCTION Complex systems are typically refined into multiple layers of requirements and design [1], [2], such that artifacts at one level in the hierarchy are refined or decomposed by lower level artifacts at the next level. As depicted in Figure 1, the layering of requirements and design continues down to the leaf nodes at which point design elements are realized through lower level models or implemented code. In order to demonstrate that toplevel artifacts have been satisfactorily addressed, the lowerlevel artifacts in each layer are linked back to the higher-level artifacts from which they are derived. These trace links are typically stored in a document known as the Requirements Traceability Matrix (RTM) [3], [4]. While trace links can be created manually, they require significant cost and effort to create and maintain; therefore much research effort has been vested in automating the process through the use of information retrieval (e.g., [5], [6] and more recently, deeplearning techniques [7], [8], [9]. The majority of prior work on automated tracing techniques has focused on the primitive task of generating a link between pairs of related artifacts – for example, determining whether a given design artifact should be linked to a specific requirement. Very little research effort R1 Design describes how Requirement is satisfied D1.1 D1.2 R2.1 R2.1 R2.n D2.2 D2.n Requirements describe how design is realized at subsystem level Design describes how Requirement is satisfied D2.1 D1.n Fig. 1: Requirements and design are refined into layers, in which lower level artifacts must fully refine (or satisfy) the higher level artifact to which they are linked. has focused on the more challenging traceability-related task of RSA which determines whether a requirement has been fully satisfied by its set of lower-level artifacts. The process of determining whether a set of natural language design element/s linked to a natural language requirement provides sufficient coverage to satisfy the requirement is termed Requirements Satisfaction Assessment (RSA) [10]. From an automation perspective, we consider a requirement to be satisfied when all the major semantic concepts that it contains are present in the set of design elements. While satisfaction assessment has remained relatively understudied for the last decade, it is of great importance in safety, or mission critical systems [11] where identifying requirements that are not fully satisfied by their related design elements can reduce the need for costly redesign efforts, and help to ensure that all identified hazards have been satisfactorily addressed. Organizations therefore often hire analysts or even external evaluators to validate and verify that all specified requirements are fully addressed by their respective design elements [12]. This activity is often supported through the creation of a Requirements Trace Matrix, which maps requirements to design elements via trace links [13]. The trace matrix is then used by safety analysts and external certifiers to help assess whether requirements, especially safety-related ones, are satisfied in the designed and deployed system. The fact that the process is time-consuming and error-prone makes the use of automation" 2312.04464v1,"Horizon-Free and Instance-Dependent Regret Bounds for Reinforcement Learning with General Function Approximation Jiayi Huang ∗ Han Zhong † Liwei Wang ‡ Lin F. Yang § December 8, 2023 Abstract To tackle long planning horizon problems in reinforcement learning with general function approximation, we propose the first algorithm, termed as UCRL-WVTR, that achieves both horizon-free and instance-dependent, since it eliminates the polynomial dependency on the planning horizon. The derived regret bound is deemed sharp, as it matches the minimax lower bound when specialized to linear mixture MDPs up to logarithmic factors. Furthermore, UCRL-WVTR is computationally efficient with access to a regression oracle. The achievement of such a horizon-free, instance-dependent, and sharp regret bound hinges upon (i) novel algorithm designs: weighted value-targeted regression and a high-order moment estimator in the context of general function approximation; and (ii) fine-grained analyses: a novel concentration bound of weighted non-linear least squares and a refined analysis which leads to the tight instance-dependent bound. We also conduct comprehensive experiments to corroborate our theoretical findings. 1 Introduction Reinforcement Learning (RL) plays a pivotal role in solving complex decision-making problems, where an agent interacts with the environment to learn a policy that maximizes cumulative rewards. In the context of time-homogeneous episodic RL, where the total rewards are bounded by 1, an open question arises concerning whether episodic RL is more difficult than bandits problems (Jiang and Agarwal, 2018). While numerous research endeavors have been dedicated to the development of algorithms with up to poly-logarithmic dependence on the planning horizon, thus are horizon-free, these efforts are restricted to either tabular (Wang et al., 2020a; Zhang et al., 2021a; Li et al., 2022; Zhang et al., 2022) or linear mixture Markov Decision Processes (MDPs) (Zhang et al., 2021b; Kim et al., 2022; Zhou and Gu, 2022; Zhao et al., 2023). Consequently, this open question persists as a formidable challenge, necessitating further exploration and innovation to address a broader family of RL problems. ∗ Peking University. Email: jyhuang@stu.pku.edu.cn. Peking University. Email: hanzhong@stu.pku.edu.cn. ‡ Peking University. Email: wanglw@cis.pku.edu.cn. § University of California, Los Angles. Email: linyang@ee.ucla.edu. † 1" 2312.04469v1,"Preprint O N THE L EARNABILITY OF W ATERMARKS FOR L ANGUAGE M ODELS Chenchen Gu, Xiang Lisa Li, Percy Liang, Tatsunori Hashimoto Stanford University {cygu, xlisali, thashim}@stanford.edu, pliang@cs.stanford.edu A BSTRACT Watermarking of language model outputs enables statistical detection of modelgenerated text, which has many applications in the responsible deployment of language models. Existing watermarking strategies operate by altering the decoder of an existing language model, and the ability for a language model to directly learn to generate the watermark would have significant implications for the real-world deployment of watermarks. First, learned watermarks could be used to build open models that naturally generate watermarked text, allowing for open models to benefit from watermarking. Second, if watermarking is used to determine the provenance of generated text, an adversary can hurt the reputation of a victim model by spoofing its watermark and generating damaging watermarked text. To investigate the learnability of watermarks, we propose watermark distillation, which trains a student model to behave like a teacher model that uses decoding-based watermarking. We test our approach on three distinct decoding-based watermarking strategies and various hyperparameter settings, finding that models can learn to generate watermarked text with high detectability. We also find limitations to learnability, including the loss of watermarking capabilities under fine-tuning on normal text and high sample complexity when learning low-distortion watermarks. 1 1 I NTRODUCTION As large language models (LLMs) become more capable and widely used, watermarking language model outputs becomes increasingly important to mitigate potential harms and misuses of LLMs. Watermarking enables statistical detection of model-generated text, which enables enforcing policies around LLM usage, e.g., removing LLM-generated disinformation from social media platforms or detecting academic dishonesty. Another proposed use case of watermarking is identifying text provenance, i.e., tracing a text back to the specific LLM that generated it (Abdelnabi & Fritz, 2021; Kuditipudi et al., 2023). Recent works have demonstrated that it is possible for an LLM provider to inject specific, known watermark patterns into text using specialized decoding algorithms (Kirchenbauer et al., 2023a; Aaronson, 2023; Kuditipudi et al., 2023), but little is known about whether these watermarks are learnable by a model. The learnability of watermarks has significant implications for the real-world deployment of watermarks, as it could enable downstream applications and adversarial attacks. In this work, we study the learnability of watermarks by studying weights-based watermarking, which involves learning parameters for a language model that cause it to generate watermarked text under its natural sampling distribution, without using a special decoding-time watermark algorithm. Our investigation is motivated by its relevant implications for two applications: developing watermarking for open language models and the possibility of watermark spoofing attacks. Existing watermarking methods depend upon using a specialized decoding algorithm. This makes them too brittle for open models, as users will use a variety of decoding algorithms due to user choice, different inference infrastructures and environments, etc. Weights-based watermarking removes the reliance on a specialized decoder and is robust to changes in decoding algorithm, making 1 We release code at https://github.com/chenchenygu/watermark-learnability. 1" 2312.04491v1,"Electric Field and SAR Reduction in High Impedance RF Arrays by Using High Permittivity Materials for 7T MR Imaging Aditya A Bhosale 1 , Yunkun Zhao 1 , Xiaoliang Zhang 1,2* Department of Biomedical Engineering, State University of New York at Buffalo, Buffalo, NY, United States 2 Department of Electrical Engineering, State University of New York at Buffalo, Buffalo, NY, United States * Corresponding Author: xzhang89@buffalo.edu 1 Abstract— Higher frequencies and shorter wavelengths present significant design issues at ultra-high fields, making multi-channel array setup a critical component for ultra-high field MR imaging. The requirement for multichannel arrays, as well as ongoing efforts to increase the number of channels in an array, are always limited by the major issue known as inter-element coupling. This coupling affects the current and field distribution, noise correlation between channels, and frequency of array elements, lowering imaging quality and performance. To realize the full potential of UHF MRI, we must ensure that the coupling between array elements is kept to a minimum. Highimpedance coils allow array systems to completely realize their potential by providing optimal isolation while requiring minimal design modifications. These minor design changes, which demand the use of low capacitance on the conventional loop to induce elevated impedance, result in a significant safety hazard that cannot be overlooked. High electric fields are formed across these low capacitance lumped elements, which may result in higher SAR values in the imaging subject, depositing more power and, ultimately, providing a greater risk of tissue heating-related injury to the human sample. We propose an innovative method of utilizing high-dielectric material to effectively reduce electric fields and SAR values in the imaging sample while preserving the B1 efficiency and inter-element decoupling between the array elements to address this important safety concern with minimal changes to the existing array design comprising highimpedance coils. image, but more channels also present a technical challenge known as inter-element coupling [13-18]. Inter-element coupling impacts the current and B1 field distribution and contributes to correlated noise that degrades SNR and parallel imaging performance [19-25]. It is critical to keep inter-element coupling to a minimum to preserve imaging performance. Numerous efforts have been made to reduce inter-element coupling between array elements while maintaining the present element count. One well-known example is overlapping neighboring elements in arrays to minimize interaction between the surrounding components [26]. In receive-only arrays, this method is generally used together with a low input impedance pre-amplifier decoupling method to reduce interaction between non-adjacent elements although it is not readily feasible for transceiver arrays [13, 26]. Capacitive/inductive decoupling networks constitute additional methods for improving interelement isolation between array elements [27-29]. Other attempts have been made to reduce coupling by utilizing the metamaterial substrate to reduce or eliminate the induced currents [30-41]. All of the aforementioned approaches provide excellent inter-element isolation, which improves imaging performance but also increases the complexity of array designs due to the added decoupling circuitry. The high-impedance coil design is another decoupling solution that has been revisited and further investigated recently [26, 42-46]. This method not only improves inter-element isolation but also simplifies array construction by eliminating the need for additional circuitry, Index Terms— Decoupling, high impedance, RF array, RF coil, SAR, Ultrahigh field MRI. I. INTRODUCTION M ulti-channel arrays outweigh volume coils in terms of improved signal-to-noise ratio and faster acquisition when used in combination with parallel imaging techniques [1-7]. At ultra-high-field magnetic resonance imaging (7T and above), the Larmor frequency increases and the wavelength decreases, making it challenging to develop larger imaging coils, such as volume coils [8-12]. The addition of the channel count in a multi-channel array is regarded as advantageous due to the positive impact of higher channel numbers on the signal-to-noise ratio (SNR), consequently leading to an enhancement in the magnetic resonance (MR) Figure 1. (a) Circuit schematic of a high-impedance coil (b) Surface electric field distribution over the single high-impedance coil element. Higher electric fields are observed over the low-value lumped capacitor placed opposite the port." 2312.04493v1,"Incoherent diffractive dijet production and gluon Bose enhancement in the nuclear wave function Tiyasa Kar ∗ Department of Physics, North Carolina State University, Raleigh, NC 27695, USA Alexander Kovner † Physics Department, University of Connecticut, 2152 Hillside Road, Storrs, CT 06269, USA Ming Li ‡ Department of Physics, The Ohio State University, Columbus, OH 43210 , USA Vladimir V. Skokov § Department of Physics, North Carolina State University, Raleigh, NC 27695, USA We investigate the effect of gluon Bose enhancement in the nuclear wave function on the dijet production in incoherent diffractive processes in DIS and ultraperipheral collisions. We demonstrate that Bose enhancement leads to an enhancement of diffractive dijet production cross section when the transverse momenta of the two jets are aligned at zero relative angle. This enhancement is maximal when the magnitude of the transverse momenta of the two jets are equal, and disappears rather quickly as a function of the ratio of the two momenta. We study both the dilute limit and fully nonlinear dense regime where the nuclear wave function is evolved with the leading order JIMWLK equation. In both cases we observe a visible effect, with it being enhanced by the evolution due to the dynamical generation of the color neutralization scale. I. INTRODUCTION The investigation of dijet production in Deep Inelastic Scattering (DIS) is one of the key measurements [1] of the upcoming Electron-Ion Collider (EIC), as it provides insights into the phenomenon of gluon saturation at high energies [2–8]. Most of the studies so far, with rare exceptions [9], have been concerned with the nearly back-to-back dijets [9–31]. Recently the dijet calculation in DIS in the Color Glass Condensate (CGC) formalism was extended to NLO order in Refs. [32–34] with particular attention to understanding the interplay of high energy evolution and the Sudakov suppression. In this paper we are interested in a particular aspect of dijet production, namely can it be used as a probe of Bose enhancement of gluons in the nuclear wave function. This prompts us to consider both inclusive and diffractive dijet production [9, 31, 35–44]; and also to go beyond the back-to-back kinematics. In two recent papers [45, 46], we have studied an observable that allows to directly probe Bose-Einstein correlations between gluons in the nucleus [47–49]. These correlations are very interesting since they provide nontrivial information about two particle correlations in the nuclear wave function [50–54] which may significantly extend our understanding beyond the conventional single particle distributions traditionally probed in DIS experiments [9, 18, 24, 37]. The observable we considered was rather challenging experimentally, as it requires the measurement of three jets and correlations between them. In this work, we argue that gluon Bose-Einstein correlations can be measured in a simpler setup in diffractive dijet production. Quantum statistics that is responsible for the universal source of correlations between (identical) gluons is Bose enhancement. In the hadron wave function this effect leads to the amplification in the number of pairs of gluons with the same quantum numbers and small relative momentum, see more in Ref. [47–49]. The reason we expect dijet production to be sensitive to the Bose correlation is rather transparent. At high energy, in the infinite momentum frame, the virtual photon fluctuates into a quark-antiquark pair (dipole) with transverse momenta q 1 and q 2 , which scatters on the gluon field of the fast-moving hadron target. In the final state this leads ∗ Electronic address: tkar@ncsu.edu † Electronic address: alexander.kovner@uconn.edu ‡ Electronic address: li.13449@osu.edu § Electronic address: VSkokov@ncsu.edu" 2312.04517v1,"Prepared for submission to JHEP D-terms in Generalised Complex Geometry Vincent Menet Laboratoire de Physique Théorique et Hautes Energies - LPTHE Sorbonne Université, 4 Place Jussieu, 75005 Paris, France E-mail: vmenet@lpthe.jussieu.fr Abstract: Generalised Complex Geometry provides a natural interpretation of the N = 1 supersymmetry conditions for warped solutions of type II supergravity as differential equations on polyforms on the internal manifold. Written in this language the supersymmetry conditions correspond to calibration conditions for probe D-branes: D-string, domain-wall or space-filling branes, depending on the directions they span in the non-compact fourdimensional space. The BPS condition corresponding to the calibration of space-filling D-branes has been reformulated by Tomasiello, eliminating the explicit dependence on the metric. We generalise this derivation to the case of non-supersymmetric backgrounds violating the domain-wall and D-string calibration conditions. We use this reformulation to derive constraints that the ten-dimensional solutions with BPS space-filling sources must respect in order to dimensionally reduce to solutions of four-dimensional N = 1 supergravity with non-vanishing F-terms and potentially non-vanishing D-terms. We give the equations of motion for the class of type II vacua satisfying these constraints in the language of pure spinors. We investigate how restrictive these constraints are for the class of type IIB SU(3) backgrounds with BPS space-filling O5-planes." 2312.04524v1,"RAVE: Randomized Noise Shuffling for Fast and Consistent Video Editing with Diffusion Models Ozgur Kara 1 * Bariscan Kurtkaya 2 *† 1 Hidir Yesiltepe 4 James M. Rehg 1,3 Pinar Yanardag 4 Georgia Tech 2 KUIS AI Center 3 UIUC 4 Virginia Tech okara7@gatech.edu, bkurtkaya23@ku.edu.tr, hidir@vt.edu, jrehg@uiuc.edu, pinary@vt.edu Project Webpage: https://rave-video.github.io Input Input ""a white cat"" ""an ancient Egyptian pharaoh is typing"" ""a bear"" ""a zombie"" ""a dinosaur"" ""a man wearing a glitter jacket is typing"" Figure 1. RAVE is a lightweight and fast video editing method that enhances temporal consistency in video edits, utilizing pre-trained text-to-image diffusion models. It is capable of modifying local attributes, like changing a person’s jacket (bottom right), and can also handle complex shape transformations, such as turning a wolf into a dinosaur (bottom left). Abstract a text prompt to produce high-quality videos while preserving the original motion and semantic structure. It employs a novel noise shuffling strategy, leveraging spatio-temporal interactions between frames, to produce temporally consistent videos faster than existing methods. It is also efficient in terms of memory requirements, allowing it to handle longer videos. RAVE is capable of a wide range of edits, from local attribute modifications to shape transformations. In order to demonstrate the versatility of RAVE, we create a comprehensive video evaluation dataset ranging from objectfocused scenes to complex human activities like dancing Recent advancements in diffusion-based models have demonstrated significant success in generating images from text. However, video editing models have not yet reached the same level of visual quality and user control. To address this, we introduce RAVE, a zero-shot video editing method that leverages pre-trained text-to-image diffusion models without additional training. RAVE takes an input video and * Joint co-author. † B. Kurtkaya worked on this project as an intern at Virginia Tech. 1" 2312.04564v1,"EAGLES: Efficient Accelerated 3D Gaussians with Lightweight EncodingS Sharath Girish Kamal Gupta Abhinav Shrivastava sgirish@cs.umd.edu kampta@cs.umd.edu abhinav@cs.umd.edu University of Maryland, College Park Figure 1. Our method significantly reduces the memory footprint of Gaussian splatting by an order of magnitude while offering further speed ups in training time and rendering FPS all while maintaining the reconstruction quality. Abstract Recently, 3D Gaussian splatting (3D-GS) has gained popularity in novel-view scene synthesis. It addresses the challenges of lengthy training times and slow rendering speeds associated with Neural Radiance Fields (NeRFs). Through rapid, differentiable rasterization of 3D Gaussians, 3D-GS achieves real-time rendering and accelerated training. They, however, demand substantial memory resources for both training and storage, as they require millions of Gaussians in their point cloud representation for each scene. We present a technique utilizing quantized embeddings to significantly reduce memory storage requirements and a coarse-to-fine training strategy for a faster and more stable optimization of the Gaussian point clouds. Our approach results in scene representations with fewer Gaussians and quantized representations, leading to faster training times and rendering speeds for real-time rendering of high resolution scenes. We reduce memory by more than an order of magnitude all while maintaining the reconstruction quality. We validate the effectiveness of our approach on a variety of datasets and scenes preserving the visual quality while consuming 10-20× less memory and faster training/inference speed. Project page and code is available here. 1. Introduction Neural Radiance Fields [28] (NeRF) have become widespread in their use as 3D scene representations achieving high visual quality by training implicit neural networks via differentiable volume rendering. They however come at the cost of high training and rendering costs. While more recent works such as Plenoxels [13] or Multiresolution Hashgrids [29] have significantly reduced the training times, they are still slow to render for high resolution scenes and do not reach the same visual quality as NeRF methods such as [2, 3]. To overcome these issues, 3D Gaussian splatting [21] (3D-GS) proposed an approach to learn 3D gaussian point clouds as scene representations. Unlike the slow volume rendering of NeRFs, they utilize a fast differentiable rasterizer, to project the points on the 2D plane for rendering views. They achieve state-of-the-art (SOTA) reconstruction quality while still obtaining similar training" 2312.04571v1,"SwarMer: A Decentralized Localization Framework for Flying Light Specks Hamed Alimohammadzadeh, Shahram Ghandeharizadeh University of Southern California Los Angeles, California, USA {halimoha,shahram}@usc.edu ABSTRACT Swarm-Merging, SwarMer, is a decentralized framework to localize Flying Light Specks (FLSs) to render 2D and 3D shapes. An FLS is a miniature sized drone equipped with one or more light sources to generate different colors and textures with adjustable brightness. It is battery powered, network enabled with storage and processing capability to implement a decentralized algorithm such as SwarMer. An FLS is unable to render a shape by itself. SwarMer uses the inter-FLS relationship effect of its organizational framework to compensate for the simplicity of each individual FLS, enabling a swarm of cooperating FLSs to render complex shapes. SwarMer is resilient to both FLSs failing and FLSs leaving to charge their battery. It is fast, highly accurate, and scales to remain effective when a shape consists of a large number of FLSs. Source code available at https://github.com/flyinglightspeck/ SwarMer. See https://youtu.be/BIiBxD_aUz8 for a MATLAB demonstration of SwarMer, https://youtu.be/Lh11tWWOP5Y for two relative localization techniques as SwarMer plugins. SwarMer is able to transition FLSs from illuminating one point cloud to the next point cloud, see https://youtu.be/4GhhlSq4UrM. It may start with a random pattern and illuminate a shape, see https://youtu.be/ cZrz0e61txU. The reported implementation of SwarMer localizes FLSs into a Hat (https://youtu.be/y_xHdz5bs5M), a Dragon (https: //youtu.be/PRyjdmw8NVc), and a Skateboard (https://youtu.be/ a0fFu0z6BU0). 1 INTRODUCTION An FLS is a miniature sized drone equipped with one or more light sources to generate different colors and textures with adjustable brightness. Synchronized swarms of FLSs will illuminate objects in a pre-specified 3D volume, an FLS display [29, 30]. The display may be a cuboid that sits on a table [2] or hangs on a wall, the dashboard of a self-driving vehicle, a room, etc. It will render static 2D or 3D point clouds by assigning the coordinates of their points to different FLSs to illuminate. An FLS display has diverse multimedia applications ranging from entertainment to healthcare. With entertainment, a photographer may capture 3D point clouds using a depth camera, e.g., Intel RealSense D455, and view them using an FLS display. With healthcare, a physician may illuminate and examine 3D MRI scans of a patient in real time using an FLS display. Localizing FLSs to render a 2D or a 3D point cloud is non-trivial for several reasons. First, in an indoor setting, FLSs may lack line of sight with GPS satellites to position themselves. Even if GPS was available, it would be too coarse [29, 46, 70]. The best some GPS devices claim is a 3 meter accuracy 95% of the time [46, 76]. Second, a dead-reckoning technique that requires an FLS to fly to its assigned position is known to suffer from errors that increase as a function of the distance traveled by a drone [12, 13, 17, 72]. Greater distances result in higher errors, distorting the final rendering. To illustrate, Figure 1.b shows rendering of three 2D point clouds of Figure 1.a (ground truth) using dead reckoning with 5 degrees of error. (See Section 4.1 for a formal definition of the degree of error.) The FLSs are deployed by a dispatcher at the origin, (0, 0). Each FLS uses a collision free path [4, 5, 7, 11, 14, 18, 19, 25, 26, 35, 36, 38, 43, 51, 52, 54, 61, 62, 75, 77, 80–83, 98] to travel to its coordinate. With dead reckoning, the wing of the butterfly farthest from (closest to) the origin is least (most) accurate because FLSs travel a greater (shorter) distance. With 5 degrees of error, the butterfly wing farthest from the origin is distorted completely, see Figure 1.b. In general, dead reckoning is challenged with realizing symmetrical geometric shapes as simple as a straight line, e.g., the cat’s tail which is close to the dispatcher. The challenge is to design and implement a general purpose framework that localizes FLSs to render any 2D or 3D shape with an arbitrary amount of dead-reckoning error. This challenge constitutes the focus of this paper. The ideal framework must be: • Fast. It should localize FLSs as they are deployed. This results in an incremental rendering where portions of a shape become recognizable as other FLSs are deployed to render the remainder of the shape. • Highly accurate. A rendering should match the intended point cloud. With some applications, this may be an overkill because the human eye may not detect one FLS out of its place even with small point clouds consisting of one hundred FLSs, e.g., compare Figure 1.c with 1.a. • Continuous. Drones are known to drift [27, 48]. FLSs must be able to execute the algorithm continuously to compensate for both their drift and those of their neighbors. • Resilient to FLS failures and departures. FLSs are mechanical devices that may fail [29]. Moreover, their battery has a fixed flight time. An FLS must be allowed to fly back to a charging station once its battery is depleted per an algorithm such as STAG [30]. The substituting FLS must be able to localize itself. • Scalable to render shapes consisting of a large number of FLSs, tens of thousands if not millions. • Minimal, requiring as few sensors as possible from the display to enhance its flexibility and reduce its cost. Swarm-Merging, SwarMer, addresses these requirements for 2D and 3D point clouds. It is designed for an in-door 3D display that lacks line of sight with GPS satellites. It is a relative localization system instead of an absolute one, e.g., the teapot of Figure 1.c is" 2312.04578v1,"Towards a Psychological Generalist AI: A Survey of Current Applications of Large Language Models and Future Prospects Tianyu He *a , Guanghui Fu *b , Yijing Yu a , Fan Wang a , Jianqiang Li c , Qing Zhao c , Changwei Song c , Hongzhi Qi c , Dan Luo a , Huijing Zou a , and Bing Xiang Yang a a Center for Wise Information Technology of Mental Health Nursing Research, School of Nursing, Wuhan University, Wuhan, China b Sorbonne Université, Institut du Cerveau - Paris Brain Institute - ICM, CNRS, Inria, Inserm, AP-HP, Hôpital de la Pitié Salpêtrière, Paris, France c School of Software Engineering, Beijing University of Technology, Beijing, China ABSTRACT The complexity of psychological principles underscore a significant societal challenge, given the vast social implications of psychological problems. Bridging the gap between understanding these principles and their actual clinical and real-world applications demands rigorous exploration and adept implementation. In recent times, the swift advancement of highly adaptive and reusable artificial intelligence (AI) models has emerged as a promising way to unlock unprecedented capabilities in the realm of psychology. This paper emphasizes the importance of performance validation for these large-scale AI models, emphasizing the need to offer a comprehensive assessment of their verification from diverse perspectives. Moreover, we review the cutting-edge advancements and practical implementations of these expansive models in psychology, highlighting pivotal work spanning areas such as social media analytics, clinical nursing insights, vigilant community monitoring, and the nuanced exploration of psychological theories. Based on our review, we project an acceleration in the progress of psychological fields, driven by these large-scale AI models. These future generalist AI models harbor the potential to substantially curtail labor costs and alleviate social stress. However, this forward momentum will not be without its set of challenges, especially when considering the paradigm changes and upgrades required for medical instrumentation and related applications. Keywords: Generalist AI, Mental health, Large language model, Psychology, Foundation model 1. INTRODUCTION Mental health conditions are prevalent across the globe. However, many societies and their corresponding health and social systems overlook mental health, failing to offer the requisite care and support. Consequently, countless individuals worldwide endure these challenges silently, face human rights violations, or encounter adversities in their daily lives. 1 Psychological well-being and understanding are of paramount importance in today’s rapidly evolving world. Across the globe, individuals grapple daily with the dynamic nature of their psychological states, influenced by both external and internal factors. Whether it’s individuals expressing their sentiments on social media, 2 students and teachers confronting mental health challenges in academic settings, 3 or the overarching demand for professional psychological counselors, 4 the implications are evident—mental health matters. Prompt interventions, especially in critical situations such as potential suicides, can save lives. 5, 6 Moreover, timely support and guidance can ameliorate numerous other psychological challenges, ensuring healthier communities. 7 The realm of artificial intelligence (AI) has witnessed tremendous advancements in recent years, offering promising tools to address these pressing psychological concerns. 8, 9 Deep learning techniques, backed by expert annotations, have been heralded for their impressive performance in various applications. 10, 11 Yet, the heavy reliance on extensive annotations introduces significant costs, which often becomes a barrier for many institutions and researchers. 12 * These authors contributed to the work equllly and should be regarded as co-first authors. Further author information: (Send correspondence to yangbx@whu.edu.cn) 1" 2312.04579v1,"zkFDL: An efficient and privacy-preserving decentralized federated learning with zero knowledge proof 1 st Mojtaba Ahmadi 2 nd Reza Nourmohammadi Shahid Beheshti University Tehran, Iran mojtaba27ahmadi@gmail.com The University Of British Columbia Kelowna, Canada reza.nourmohammadi@ubc.ca Abstract—Federated leaning (FL) has been frequently used in various field of studies and businesses. Traditional centralized FL systems suffer from serious issues. To address these concerns, decentralized federated learning (DFL) systems have been introduced in recent years in which with the help of blockchains, try to achieve more integrity and efficiency. On the other hand, privacypreserving is an uncovered part of these systems. To address this, and also scaling the blockchain-based computations, we propose a zero knowledge proof (ZKP) based aggregator (zkDFL) that allows clients to share their large-scale model parameters with a trusted centralized server without revealing their individual data to other clients. We utilize blockchain technology to manage the aggregation algorithm via smart contracts. The server performs a ZKP algorithm to prove to the clients that the aggregation is done according to the accepted algorithm. The server can also prove that all inputs of clients have been used. We evaluate our measure through a public dataset about wearable internet of things. As demonstrated by numerical evaluations, zkDFL introduces verifiability of correctness of aggregation process and enhances the privacy protection and scalability of DFL systems, while the gas cost has declined significantly. Index Terms—federated learning, blockchain, zero knowledge proof, aggregator algorithm, scaling systems I. I NTRODUCTION Machine learning in recent years has become a major topic in research and businesses [1]. Some of the implementation challenges of current machine learning are cost of data gathering, training computations, and communication overhead [2]. Another issue is protecting the privacy of private data while using client’s data [3]. Federated learning (FL) is one of the machine learning frameworks addressing the mentioned issues [4]. FL systems try to preserve the privacy of clients by delegating the training process to clients. To be more specific, each client trains the local model with its own data and sends the local model instead of sending the data. The server aggregates the total clients’ models and obtains a global updated model. By doing so, the privacy issue would be satisfied, as well as preventing the sending of huge amounts of data to a central server. FL systems still include one central server that is honest-butcurious and can see all clients’ data. They can enhance privacy by adding noise to data, as reported in [5]. On the other hand, although FL frameworks have significant features, the clients still need to assume that the server is honest and does aggregate correctly, while the aggregation process is not done in a transparent way. This can lead to a global aggregation attack in which, for instance, the server might not use all clients’ data to save computation cost or even weight some clients’ models higher than others. To address the concern of a central server, blockchain-based FL systems are introduced for both permissioned blockchains [6], [7] and public blockchains [8], [9]. Generally, they try to delegate the server’s tasks to a smart contract on-chain. While there are a variety of studies on merging blockchain with FL, not enough research have been conducted on handling large-scale models using smart contracts. For instance, CNN models can reach over millions of parameters which can not be stored in blockchain. High gas cost of blockchain due to heavy computations [10] in addition to visibility of clients’ data are the major obstacles in using blockchain for real-world FL applications. In this paper, we propose a novel federated learning framework for handling large-scale models, using a zero-knowledge prove system for proving the correctness of the aggregation algorithm and also for avoiding the leakage of clients’ model data. Furthermore, with the help of blockchain and smart contracts, clients can verify the correctness of the total process. In summary, our contributions are as follows: • a decentralized federated learning framework is proposed in which the central server aggregates clients’ local models. Then using a ZKP algorithm, the server proves the correctness of the aggregation. • To hide the clients’ models from others, the server calculate the hashes of the models and proves that the hash values have been calculated correctly. Also verification of the proofs is performed by the deployed smart contracts and the clients are able to check the correctness of the claimed computations. • This framework utilizes blockchain to ensure integrity, and can deal with large-scale models via a verifiable central server as well." 2312.04586v1,"Automated SELinux RBAC Policy Verification Using SMT DIVYAM PAHUJA, The Australian National University, Australia ALVIN TANG, The Australian National University, Australia KLIM TSOUTSMAN, The Australian National University, Australia Security-Enhanced Linux (SELinux) is a Linux kernel module that allows for a role-based access control (RBAC) mechanism. It provides a fine-grained security framework enabling system administrators to define security policies at the system and application level. Whilst SELinux offers robust security features through a customisable, powerful RBAC model, its manual policy management is prone to error, leaving the system vulnerable to accidental misconfigurations or loopholes. We present a tool to automate the conversion of SELinux policies into satisfiability modulo theories (SMT), enabling the verification of the intended security configurations using automated theorem proving. Our tool is capable of flagging common policy misconfigurations by asserting consistency between supplied RBAC policies and the intended specification by the user in SMT. RBAC policies are inherently complicated to verify entirely. We envision that the automated tool presented here can be further extended to identify an even broader range of policy misconfigurations, relieving the burden of managing convoluted policies on system administrators. 1 INTRODUCTION To manage the permissions to access and modify files and directories, various access control models are developed and implemented in operating systems. As remarked by Denning [1982], access controls safeguard against accidental and spiteful threats to secrecy, authenticity and system availability. Since a computer system may be accessed by a considerable number of users, there is a risk of information falling into the wrong hands. To mitigate this risk, access control limits the activity of legitimate users in conjunction with the use of reference monitors [Sandhu 1994]. Typical Linux distributions utilise a discretionary access control (DAC) model, where the permissions to read, write and execute files are determined individually by their owners. Notwithstanding its power to prevent malicious parties from gaining unauthorised access [Li 2008], the model may be inadequately sophisticated in certain fields, such as defence, medical organisations and intelligence agencies, with complex security procedures. Security-Enhanced Linux (SELinux), a set of kernel-level security features in the Linux operating system, provides more fine-grained access control models to achieve several cyber security principles, such as the least privilege principle and compartmentalisation of applications. Consequently, SELinux is extensively used in Android and a wide variety of other Linux distributions (e.g., CentOS) by default [Smalley and Craig 2013]. SELinux encompasses mandatory access control which employs a centrally controlled methodology of permission management. In particular, it allows for a role-based access control (RBAC), where the permissions are determined not only by users’ identity but also their relevant security context. In this research, we focus on RBAC considering its popularity in enterprise environments that utilise hierarchies of roles amongst different individuals and processes in complex environments. Despite a wide range of features offered by RBAC in SELinux, system administrators find it onerous to accurately maintain the policies manually. There is a risk of security vulnerabilities when the implications of policies differ from the system administrators’ actual intentions. According to the Vocabulary for Event Recording and Incident Sharing (VERIS) database, such access control policy misconfigurations accounted for nearly 8% of the total data breaches in 2022. Hence, if this manual, error-prone policy verification process can be automated, it will allow for the policy misconfigurations within a system to be detected efficiently. Authors’ addresses: Divyam Pahuja, The Australian National University, Canberra, Australia, divyam.pahuja@anu.edu.au; Alvin Tang, The Australian National University, Canberra, Australia, alvin.tang@anu.edu.au; Klim Tsoutsman, The Australian National University, Canberra, Australia, u7655549@anu.edu.au." 2312.04596v1,"Feature Analysis of Encrypted Malicious Traffic Anish Singh Shekhawat ∗ † Fabio Di Troia ∗ ‡ Mark Stamp ∗ § Abstract In recent years there has been a dramatic increase in the number of malware attacks that use encrypted HTTP traffic for self-propagation or communication. Antivirus software and firewalls typically will not have access to encryption keys, and therefore direct detection of malicious encrypted data is unlikely to succeed. However, previous work has shown that traffic analysis can provide indications of malicious intent, even in cases where the underlying data remains encrypted. In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work. We then consider the problem of feature analysis in some detail. Previous work has often relied on human expertise to determine the most useful and informative features in this problem domain. We demonstrate that such feature-related information can be obtained directly from machine learning models themselves. We argue that such a machine learning based approach to feature analysis is preferable, as it is more reliable, and we can, for example, uncover relatively unintuitive interactions between features. 1 Introduction Malicious software, or malware, can be defined as a program that is designed to damage a computer system (Aycock, 2006). Malware is, arguably, the greatest threat to information security today. It is estimated that more than 90% of small-to-medium sized businesses have recently experienced an increase in the number of malware detected, with some experiencing an increase of 500% in March 2017 alone (Malwarebytes, 2017). Real-time malware detection based on network traffic has the potential to greatly reduce malware propagation on the network. ∗ Department of Computer Science, San Jose State University, San Jose, California, USA anish.s.shekhawat@gmail.com ‡ fabio.ditroia@sjsu.edu § mark.stamp@sjsu.edu † 1" 2312.04601v1,"Estimating Fréchet bounds for validating programmatic weak supervision Felipe Maia Polo ∗ Department of Statistics University of Michigan Moulinath Banerjee Department of Statistics University of Michigan Mikhail Yurochkin MIT-IBM Watson AI Lab Subha Maity Department of Statistics University of Michigan Yuekai Sun Department of Statistics University of Michigan Abstract We develop methods for estimating Fréchet bounds on (possibly high-dimensional) distribution classes in which some variables are continuous-valued. We establish the statistical correctness of the computed bounds under uncertainty in the marginal constraints and demonstrate the usefulness of our algorithms by evaluating the performance of machine learning (ML) models trained with programmatic weak supervision (PWS). PWS is a framework for principled learning from weak supervision inputs (e.g. crowdsourced labels, knowledge bases, pre-trained models on related tasks etc.), and it has achieved remarkable success in many areas of science and engineering. Unfortunately, it is generally difficult to validate the performance of ML models trained with PWS due to the absence of labeled data. Our algorithms address this issue by estimating sharp lower and upper bounds for performance metrics such as accuracy/recall/precision/F1 score. 1 Introduction Consider a random vector (X, Y, Z) ∈ X × Y × Z is drawn from an unknown distribution P . We assume X ⊂ R d is arbitrary while Y and Z are finite. In this work, we develop and analyze the statistical properties of a method for estimating Fréchet bounds [39, 40] of the form L ≜ inf π∈Π E π [g(X, Y, Z)] and U ≜ sup π∈Π E π [g(X, Y, Z)] (1.1) when g is a fixed bounded function, with Π being the set of distributions π for (X, Y, Z) such that the marginal π X,Z (resp. π Y,Z ) is identical to the prescribed marginal P X,Z (resp. P Y,Z ). Our proposed method can efficiently obtain estimates for the bounds by solving convex programs, with the significant advantage that the computational complexity of our algorithm does not scale with the dimensionality of X, making it well-suited for applications dealing with high-dimensional data. In previous work, for example, Fréchet bounds were studied in the financial context (e.g., see [41, 5]). However, our focus is on applying our methods of estimating Fréchet bounds to the problem of assessing predictors trained using programmatic weak supervision (PWS). PWS is a modern learning paradigm that allows practitioners to train their supervised models without the immediate need for observable labels Y [37, 35, 34, 36, 43, 47]. In PWS, practitioners first acquire cheap and abundant weak labels Z through heuristics, crowdsourcing, external APIs, and pretrained models, which serve as proxies for Y . Then, the practitioner fits a label model, i.e., a graphical model for P Y,Z [37, 36, 17, 12], which, under appropriate modeling assumptions, can be fitted without requiring Y ’s. ∗ felipemaiapolo@gmail.com Accepted to the Optimal Transport and Machine Learning Workshop at NeurIPS 2023." 2312.04646v1,"DESY-23-203 Constraints on the trilinear and quartic Higgs couplings from triple Higgs production at the LHC and beyond Panagiotis Stylianou 1, ∗ and Georg Weiglein 1, 2, † 1 Deutsches Elektronen-Synchrotron DESY, Notkestr. 85, 22607 Hamburg, Germany 2 II. Institut für Theoretische Physik, Universität Hamburg, Luruper Chaussee 149, 22761 Hamburg, Germany Experimental information on the trilinear Higgs boson self-coupling κ 3 and the quartic selfcoupling κ 4 will be crucial for gaining insight into the shape of the Higgs potential and the nature of the electroweak phase transition. While Higgs pair production processes provide access to κ 3 , triple Higgs production processes, despite their small cross sections, will provide valuable complementary information on κ 3 and first experimental constraints on κ 4 . We investigate triple Higgs boson production at the HL-LHC, employing efficient Graph Neural Network methodologies to maximise the statistical yield. We show that it will be possible to establish bounds on the variation of both couplings from the HL-LHC analyses that significantly go beyond the constraints from perturbative unitarity. We also discuss the prospects for the analysis of triple Higgs production at future high-energy lepton colliders operating at the TeV scale. I. INTRODUCTION Since the discovery of a Higgs boson with a mass of about 125 GeV in 2012 [1, 2], a tremendous and ongoing effort has been enacted in order to gain insights into the properties and interactions of the detected state. Its couplings with third generation fermions and weak gauge bosons, as well as the loop-induced couplings with gluons and photons, have been investigated in detail, indicating agreement with the predictions of the Standard Model (SM) within the present experimental and theoretical uncertainties. In view of the plethora of possible connections of the detected Higgs boson to sectors of physics beyond the SM (BSM), probing the Higgs interactions with respect to possible effects of BSM physics will be of central importance at the present and future runs at the LHC and at any future collider. In this context the Higgs boson self-couplings are of particular relevance, while experimentally these couplings are very difficult to access. Experimental information about the trilinear and quartic Higgs couplings is needed to gain insights about the shape of the Higgs potential, which will have implications for a better understanding of the electroweak phase transition in the early universe and may be instrumental for explaining the observed asymmetry between matter and anti-matter in the universe. In the SM the Higgs potential is given by V (Φ) = λ(Φ † Φ) 2 − µ 2 Φ † Φ (1) in terms of the single Higgs doublet field Φ. In extended scalar sectors the potential can have a much richer structure. While the cubic and quartic Higgs couplings arising from Eq. (1) are correlated in the SM and can be predicted in terms of the known experimental values of the ∗ Electronic address: panagiotis.stylianou@desy.de † Electronic address: georg.weiglein@desy.de mass of the detected Higgs boson and the vacuum expectation value, large deviations from the SM predictions for the Higgs self-couplings are possible even in scenarios where the other couplings of the Higgs boson at 125 GeV are very close to the SM predictions (see e.g. Ref. [3] for a recent discussion of this point for the case of the trilinear Higgs coupling). Experimental constraints on the trilinear and quartic Higgs self-couplings can be expressed in terms of the so-called κ-framework, where κ 3 (κ 4 ) denotes the coupling modifier of the cubic (quartic) coupling from its SM value at lowest order, i.e. κ i = g i /g i SM , where g i denotes the value of the coupling and g i SM its lowest-order SM prediction, and i = 3, 4. The most direct probe of the trilinear Higgs coupling at the LHC is the production of a pair of Higgs bosons, where κ 3 enters at leading order (LO). Both the AT- LAS [4] and CMS [5] collaborations determine the limits on κ 3 from both gluon fusion and weak boson fusion (WBF) from different decay channels of the Higgs boson. At next-to-leading order (NLO), the trilinear Higgs coupling contributes to the Higgs-boson self-energy and also enters in additional one-loop and two-loop diagrams in WBF and gluon fusion, respectively, enabling the possibility of an indirect measurement through single-Higgs production [6–10]. The inclusion of single-Higgs information by the ATLAS collaboration results in the most stringent bound to date on κ 3 : [−0.4, 6.3]. Triple-Higgs production is known to suffer from very small cross sections, but yields additional information on κ 3 which could be used in combination with the aforementioned searches. Furthermore, it can provide the first experimental constraints on the quartic Higgs coupling κ 4 . The paper is structured as follows. In Sect. II we discuss the allowed values of κ 3 and κ 4 from the perspective of perturbative unitarity and show that sizeable contributions to κ 4 can occur, especially if κ 3 deviates from the SM value. We explore in Sect. III how well the HL- LHC will be able to constrain κ 3 and κ 4 from the 6b and 4b2τ channels. Lepton colliders are additionally explored" 2312.04648v1,"E NHANCING P OLYNOMIAL C HAOS E XPANSION B ASED S URROGATE M ODELING USING A N OVEL P ROBABILISTIC T RANSFER L EARNING S TRATEGY A P REPRINT Wyatt Bridgman Sandia National Laboratories, Livermore, California 95391, USA Jiefu Chen University of Houston, Houston, Texas, 77081, USA Uma Balakrishnan Sandia National Laboratories, Livermore, California 95391, USA Xuqing Wu University of Houston, Houston, Texas, 77081, USA Yueqin Huang University of Houston, Houston, Texas, 77081, USA Reese Jones Sandia National Laboratories, Livermore, California 95391, USA Cosmin Safta Sandia National Laboratories, Livermore, California 95391, USA Mohammad Khalil ∗ Sandia National Laboratories, Livermore, California 95391, USA A BSTRACT In the field of surrogate modeling, polynomial chaos expansion (PCE) allows practitioners to construct inexpensive yet accurate surrogates to be used in place of the expensive forward model simulations. For black-box simulations, non-intrusive PCE allows the construction of these surrogates using a set of simulation response evaluations. In this context, the PCE coefficients can be obtained using linear regression, which is also known as point collocation or stochastic response surfaces. Regression exhibits better scalability and can handle noisy function evaluations in contrast to other non-intrusive approaches, such as projection. However, since over-sampling is generally advisable for the linear regression approach, the simulation requirements become prohibitive for expensive forward models. We propose to leverage transfer learning whereby knowledge gained through similar PCE surrogate construction tasks (source domains) is transferred to a new surrogate-construction task (target domain) which has a limited number of forward model simulations (training data). The proposed transfer learning strategy determines how much, if any, information to transfer using new techniques inspired by Bayesian modeling and data assimilation. The strategy is scrutinized using numerical investigations and applied to an engineering problem from the oil and gas industry. Keywords Transfer Learning, Polynomial Chaos Surrogates, Bayesian calibration, Subsurface characterization 1 Introduction Obtaining cheap, accurate surrogates for complex physics models is paramount in addressing a broad spectrum of research challenges. For example, they can illuminate high-dimensional relationships between input parameters and model responses [1], which makes them invaluable for model calibration [2, 3], uncertainty quantification (UQ), optimization [4], and decision-making under uncertainty. Hence, surrogates serve as a powerful toolset, enabling a deeper understanding of intricate system behaviors and paving the way for robust and informed decision-making in the face of uncertainty [5, 6, 7]. A wide variety of approaches for surrogate modeling exist and span intrusive, physics-based methods, like reducedorder models, to data-driven neural network surrogates [8, 9]. In the context of surrogate modeling, polynomial chaos ∗ corresponding:mkhalil@sandia.gov" 2312.04649v1,"PyThaiNLP: Thai Natural Language Processing in Python † ♦ † Wannaphong Phatthiyaphaibun , Korakot Chaovavanich , Charin Polpanumas , ‡ ♦ §¶ Arthit Suriyawongkul , Lalita Lowphansirikul , Pattarawat Chormai , ♦ ♣ ♦ Peerat Limkonchotiwat , Thanathip Suntorntip , Can Udomcharoenchaikit ♦ † ‡ VISTEC, PyThaiNLP, Trinity College Dublin, § ¶ ♣ Technische Universität Berlin, Max Planck School of Cognition, Wisesight wannaphong.p_s21@vistec.ac.th Abstract We present PyThaiNLP, a free and open-source natural language processing (NLP) library for Thai language implemented in Python. It provides a wide range of software, models, and datasets for Thai language. We first provide a brief historical context of tools for Thai language prior to the development of PyThaiNLP. We then outline the functionalities it provided as well as datasets and pre-trained language models. We later summarize its development milestones and discuss our experience during its development. We conclude by demonstrating how industrial and research communities utilize PyThaiNLP in their work. The library is freely available at https://github.com/ pythainlp/pythainlp. 1 Introduction In recent years, the field of natural language processing has witnessed remarkable advancements, catalyzing breakthroughs for various applications. However, Thai has remained comparatively underserved due to the challenges posed by limited language resources (Arreerard et al., 2022). Thai is the de facto national language of Thailand. It belongs to Tai linguistic group within the Kra-Dai language family. According to Ethnologue (Eberhard et al., 2023), there are 60.2 million users of Central Thai, of which 20.8 million are native (2000). If including the Northern (6 million, 2004), Northeastern (15 million, 1983), and Southern (4.5 million, 2006) variants, there are estimated 85.7 million users of Thais speakers around the world. Thai is a scriptio continua or has neither spaces nor other marks between the words or sentences in its most common writing style (Sornlertlamvanich et al., 2000). The lack of clear word and sentence boundaries leads to ambiguity that cannot be disambiguated using merely just grammatical knowledge (Supnithi et al., 2004). Although many closed-source open APIs for 1 NLP have an ability to process Thai language , we believe that an open-source toolbox is essential for both researchers and practitioners to not only access the NLP capabilities but also gain full transparency and trust on both training data and 2 algorithms. This allows the community to adapt and further develop the functionalities as needed, making a crucial step towards democratizing NLP. This paper introduces PyThaiNLP, an opensource Thai natural language processing library written in Python programming language. Its features span from a simple dictionary-based word tokenizer, to a statistical named-entity recognition, and an instruction-following large language model. The library was released in 2016 under an Open Source Initiative-approved Apache License 2.0 that allows free use and modification of software, including commercial use. 2 Open-source Thai NLP before PyThaiNLP Before PyThaiNLP started in 2016, some free and open-source software do exist for different Thai NLP tasks, but there were no unified open-source toolkits that unified multiple tools or tasks in a single library, and the number of available Thai NLP datasets was low compared to high-resource languages like Chinese, English, or German. Natural Language Toolkit (NLTK) (Bird and Loper, 2004), one of the most comprehensive and most popular NLP libraries in Python at the time, did not support Thai. OpenNLP, another popular free and open-source NLP toolkit written in Java, 1 Such as those provided by commercial cloud service providers and “AI for Thai”, the government-funded Thai AI service platform at https://aiforthai.in.th/. 2 For a discussion about concentrated power and the political economy of the ‘open’ AI, see Widder et al. (2023)." 2312.04655v1,"ECLIPSE: A Resource-Efficient Text-to-Image Prior for Image Generations Maitreya Patel, Changhoon Kim, Sheng Cheng, Chitta Baral, Yezhou Yang Arizona State University 1. Introduction Diffusion models [12, 35, 37, 42] have demonstrated remarkable success in generating high-quality images conditioned on text prompts. This Text-to-Image (T2I) generation paradigm has been effectively applied to various downstream tasks such as subject/segmentation/depth-driven image generation [3, 5, 9, 20, 29]. Central to these advancements are two predominant text-conditioned diffusion models: Latent Diffusion Models (LDM) [37], also known as 1 Our strategy, ECLIPSE, draws an analogy from the way a smaller prior model, akin to a celestial entity, offers a glimpse of the grandeur within the larger pre-trained vision-language model, mirroring how an eclipse reveals the vastness of the cosmos. 72% Reduction ent SDXL SDv2.1 provem Text-to-image (T2I) diffusion models, notably the un- CLIP models (e.g., DALL-E-2), achieve state-of-the-art (SOTA) performance on various compositional T2I benchmarks, at the cost of significant computational resources. The unCLIP stack comprises T2I prior and diffusion image decoder. The T2I prior model alone adds a billion parameters compared to the Latent Diffusion Models, which increases the computational and high-quality data requirements. We introduce ECLIPSE 1 , a novel contrastive learning method that is both parameter and dataefficient. ECLIPSE leverages pre-trained vision-language models (e.g., CLIP) to distill the knowledge into the prior model. We demonstrate that the ECLIPSE trained prior, with only 3.3% of the parameters and trained on a mere 2.8% of the data, surpasses the baseline T2I priors with an average of 71.6% preference score under resource-limited setting. It also attains performance on par with SOTA big models, achieving an average of 63.36% preference score in terms of the ability to follow the text compositions. Extensive experiments on two unCLIP diffusion image decoders, Karlo and Kandinsky, affirm that ECLIPSE priors consistently deliver high performance while significantly reducing resource dependency. Project page: https://eclipset2i.vercel.app/ ECLIPSE Karlo DALLE-2 Kandinsky v2.2 Kandinsky v2.1 Data Size (M) Abstract 55% Im {maitreya.patel, kch, scheng53, chitta, yz.yang}@asu.edu SDv1.4 Wurstchen 5 Figure 1. Comparison between SOTA text-to-image models with respect to their total number of parameters and the average performance on the three composition tasks (color, shape, and texture). ECLIPSE achieves better results with less number of parameters without requiring a large amount of training data. The shown ECLIPSE trains a T2I prior model (having only 33M parameters) using only 5M image-text pairs with Kandinsky decoder. Stable Diffusion, and unCLIP models [35]. The LDM, notable for its open-source availability, has gained widespread popularity within the research community. On the other hand, unCLIP models have remained under-studied. Both model types fundamentally focus on training the diffusion models conditioned on text prompts. The LDM contains a singular text-to-image diffusion model, while unCLIP models have a text-to-image prior, and a diffusion image decoder. Both model families work within the vector quantized latent space of the image [43]. In this paper, we focus on unCLIP models because they consistently outperform other SOTA models in various composition benchmarks such as T2I-CompBench [13] and HRS-Benchmark [1]. These T2I models, typically large in parameter count, require massive amounts of high-quality image-text pairs for training. unCLIP models like DALL-E-2 [35], Karlo [7], and Kandinsky [36], feature prior module containing approximately 1 billion parameters, resulting in a significant increase in overall model size (≥ 2B) compared to LDMs. These unCLIP models are trained on 250M, 115M, and 177M image-text pairs, respectively. Therefore, two critical" 2312.04687v1,"LLM4TDD: Best Practices for Test Driven Development Using Large Language Models Sanyogita Piya Allison Sullivan The University of Texas at Arlington Arlington, TX, USA sanyogita.piya@mavs.uta.edu The University of Texas at Arlington Arlington, TX, USA allison.sullivan@uta.edu ABSTRACT In today’s society, we are becoming increasingly dependent on software systems. However, we also constantly witness the negative impacts of buggy software. Program synthesis aims to improve software correctness by automatically generating the program given an outline of the expected behavior. For decades, program synthesis has been an active research field, with recent approaches looking to incorporate Large Language Models to help generate code. This paper explores the concept of LLM4TDD, where we guide Large Language Models to generate code iteratively using a test-driven development methodology. We conduct an empirical evaluation using ChatGPT and coding problems from LeetCode to investigate the impact of different test, prompt and problem attributes on the efficacy of LLM4TDD. ACM Reference Format: Sanyogita Piya and Allison Sullivan. 2023. LLM4TDD: Best Practices for Test Driven Development Using Large Language Models. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Our lives are increasingly dependent on software systems. However, these same systems, even safety-critical ones, are notoriously buggy. While there are a plethora of software testing and verification techniques, software failures continue to grow in number. A 2022 study found that software failures cost US companies a staggering $2.41 trillion annually, up from $2.08 trillion in 2020 [5]. Therefore, there is a growing need to find ways to produce reliable software. One avenue to improve software accuracy is to use program synthesis techniques to automatically generate code that, by design, will adhere to user-provided specifications of intended behavior. Program synthesis has existed for decades [20, 25, 27] and has remained an active research field [3, 13, 14, 26]. Recently, the program synthesis community has considered how to utilize Large Language Models (LLMs) to help generate code [1, 11, 18]. In this paper, we explore a human-in-the-loop synthesis framework that modifies test driven development (TDD) to incorporate LLMs. Our insight is that test code is conceptually easier to write Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn than implementation code. In particular, while the implementation code must accurately reflect the intricate logic needed to satisfy the system’s specifications, test code only needs to compare that a given input produces the expected output. Using this insight, we outline a TDD framework in which the user writes a unit test, a LLM generates code such that this unit test now passes, and then the user provides another unit test and the cycle repeats. While tests are largely regarded as an approximation of intended behavior, which can provide issues for traditional program synthesis techniques, the human-in-the-loop design of our TDD framework enables the user to incrementally guide code generation and course correct the synthesis process through seeding a behavior correcting test to the LLM. To evaluate the efficacy of this development process, we perform an empirical study using LeetCode programs and ChatGPT. Specifically, we make the following contributions: LLM4TDD: We outline a code generation framework that modifies test driven development to incorporate LLMs. Evaluation: We investigate LLM4TDD over a range of LeetCode problems to determine the impact different attributes of the problem space have on the success of LLM4TDD. Best Practices: Based on our experiments, we destill a series of guidelines for how best leverage our LLM4TDD framework to incrementally generate code. Dataset for TDD in LLMs: We establish a dataset consisting of LeetCode problems, test suites and prompts: https://github.com/ SanyogitaPiya/LLM4TDD/tree/main. 2 TEST DRIVEN DEVELOPMENT In this section, we provide an overview of the traditional test driven development process. Test driven development is an incremental software development methodology that focuses on creating tests before the implementation. Specifically, for a given iteration, a software developer considers a test, if it fails, then the developer adds just enough functionality to the code such that the test case now passes. Then, the process restarts with a new test under consideration. As needed, between iterations, the underlying code is refactored. As an example, consider building a calculator program and starting with a test that adds 2 and 3 together. The first iteration of TDD would produce: def test_add_positives assert add(2,3) == 5 def add(x, y): return 5 The minimal code the user needs to create in order for this test to pass is to simply have the add method directly return “ 5 .”" 2312.04699v1,"Simulations of Non-Integer Upconversion in Resonant Six-Wave Scattering A. Griffith, 1, a) K. Qu, 1 and N. J. Fisch 1 Princeton University, Astrophysical Sciences (Dated: 11 December 2023) Resonant upconversion through a sixth order relativistic nonlinearity resulting in a unique resonance was recently proposed [V. M. Malkin and N. J. Fisch, Physical Review E 108, 045208 (2023)]. The high order resonance is a unique non-integer multiple of a driving pump frequency resulting in a frequency upshift by a factor of ≈ 3.73. We demonstrate the presence, unique requirements, and growth of this mode numerically. Through tuning waves to high amplitude, in a mildly underdense plasma, the six-photon process may grow more than other non-resonant, but lower order processes. The growth of the high frequency mode remains below the nonlinear growth regime. However, extending current numerical results to more strongly coupled resonances with longer pulse propagation distances suggests a pathway to significant upconversion. I. INTRODUCTION The falloff in available laser power below the optical is severe, 1 and producing high intensity UV, XUV, or X-ray pulses remains a challenge with current electron beam driven 2,3 or laser driven sources. 1,4–6 Recent proposals detail using resonant interactions in plasma to upconvert high fluence sources, such as the National Ignition Facility, 7 to shorter wavelength. 8–11 This paper details a first numerical test of higher order plasma mediated wave mixing for upconversion. 12 Wave mixing builds off of a long history of using plasmas components to replicate the behavior of well known solid state parts, but which operate at higher laser intensity. Pulse amplification can be done with electron plasma waves, 13–19 ion acoustic waves, 20–22 or magnetized waves. 23 Ion acoustic waves might also enable beam combination. 24–26 Plasmas could serve as polarizers, 27,28 q-plates, 18 lenses, 29 or gratings. 30 Mildly relativistic wave-mixing to upconvert optical light with high efficiency to much shorter wavelengths is a more recent proposal. Pump photons are combined into a higher frequency output through nonlinear coupling. The nonlinear coupling arises from corrections to the plasma frequency at significant electron Lorentz factor. 8 This coupling contrasts with previous work in that it can be resonant, without requiring a modulated plasma density. 31 The lowest order nonlinearity results in four photon coupling. A simple colinear alignment between pump and seed beams requires a complex set of resonance conditions 9,10 and non-colinear arrangements result in difficulties for amplification. 11 A higher order, sixphoton, process addresses both of these problems. 12 This six photon scattering process consumes four input photons with frequency ω to produce at frequencies of √ a pair of photons √ approximately (2 + 3)ω and (2 − 3)ω. This unique noninteger multiple frequency shift from the six photon process could allow for large changes in wavelength if it were to be cascaded multiple times. We present a numerical investigation which demonstrates a) arbg@princeton.edu the unique six-photon resonance. In contrast to previous work, here the resonance is not assumed in a reduced (slowly varying envelope) and expanded model. Instead we consider a model, equivalent to a cold relativistic electron fluid, in which the full wave dynamics are evolved without the resonance embedded. As the resonance is of higher order, coupling must be maximized to generate observable effects. Thus, we consider the dynamics without expanding in either normalized plasma −2 ω 2 , for laser frequency ω and plasma density, n 0 /n c = ω pe 2 2 frequency ω pe = 4πe 2 n 0 m −1 e , or wave amplitude, a = eA/mc , for laser vector potential A. When both parameters are not ≪ 1, which is required to achieve significant coupling, there may be large errors in any expansion of nonlinear terms to finite order. Numerical experimentation is used to examine the fundamental physics at play and validate the viability of relativistic six wave mixing for upconversion. The exposition of our numerical results on relativistic sixwave mixing in plasmas is outlined as follows. In Section II we review the dynamics and resonances available for the coupling between mildly relativistic waves, a < 1, in an underdense, ω pe < ω plasma. In Section III we describe the choice of the particular numerical tools used to examine this regime. In Section IV we demonstrate the unique resonance proposed in by Malkin and Fisch. In Section V we discuss the applicability of this work to the aim of achieving significant upconversion, review our work, and discuss possible avenues for continued exploration. II. BACKGROUND We review and reformulate how the coupling of electromagnetic waves may be achieved through relativistic corrections to electron dynamics in strong electromagnetic waves. The model in which the coupling occurs is that of an electron fluid which is driven purely by electromagnetic forces, neglecting electron temperature and pressure along with any ion dynamics. Thus the fluid is strictly described by Maxwell’s equations and the coupled electron quantities of density and velocity. Working in the Coulomb gauge, the dynamics may be described by non-dimensionalized vector potential, a = eA/m e c 2 , electrostatic potential φ = eΦ/m e c 2 , and electron" 2312.04712v1,"Error Discovery By Clustering Influence Embeddings Fulton Wang ∗ Meta Julius Adebayo ∗ Prescient Design / Genentech Sarah Tan Cornell University Diego Garcia-Olano Meta Narine Kokhlikyan Meta Abstract We present a method for identifying groups of test examples—slices—on which a model under-performs, a task now known as slice discovery. We formalize coherence—a requirement that erroneous predictions, within a slice, should be wrong for the same reason—as a key property that any slice discovery method should satisfy. We then use influence functions to derive a new slice discovery method, InfEmbed, which satisfies coherence by returning slices whose examples are influenced similarly by the training data. InfEmbed is simple, and consists of applying K-Means clustering to a novel representation we deem influence embeddings. We show InfEmbed outperforms current state-of-the-art methods on 2 benchmarks, and is effective for model debugging across several case studies. 2 1 Introduction Error analysis is a longstanding challenge in machine learning [Pope, 1976, Amershi et al., 2015, Sculley et al., 2015, Chung et al., 2019, Chakarov et al., 2016, Cadamuro et al., 2016, Kearns et al., 2018, Kim et al., 2019, Zinkevich Martin, 2020]. Recently, Eyuboglu et al. [2022b] formalized a type of error analysis termed the slice discovery problem. In the slice discovery problem, given a multi-class classification model and test data, the goal is to partition the test data into a set of slices—groups of test examples—by model performance. An effective slice discovery method (SDM) should satisfy two desiderata: 1. Error surfacing: Identify under-performing slices, i.e. slices with low accuracy, if they exist. 2. Coherence: Return slices that are coherent in the following sense: Erroneous predictions in a given slice should have the same root cause, i.e. be “wrong for the same reason”. To illustrate, suppose we have a pre-trained model that detects hip fractures from an x-ray, trained on data from one hospital, that is now deployed in a new hospital. The model might err frequently on two groups: 1) examples containing a spurious signal like the frequency signature of the scanner from the first hospital [Badgeley et al., 2019], and 2) examples from patients not represented in the new hospital. An effective SDM should uncover these two groups. The slice discovery problem has taken on renewed importance given that models trained via empirical risk minimization exhibit degraded performance on certain data groups—slices—due to distribution shift [Koh et al., 2021], noisy labels [Northcutt et al., 2021], and imbalanced data [Idrissi et al., 2022]. In developing a SDM, there are two key challenges. First, formalizing the coherence property, i.e., defining the root cause of an error, identifying whether two errors have similar root causes, and ultimately, defining whether a slice is coherent. Second, identifying the representation to use: ∗ 2 The two authors contributed equally. Correspondence to fultonwang@meta.com Code to replicate our findings is available at: https://github.com/adebayoj/infembed 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.04714v1,"The Impact of AI Innovations on U.S. Occupations Ali Akbar Septiandri 1 , Marios Constantinides 1 , and Daniele Quercia 1* 1 Nokia Bell Labs, Cambridge, United Kingdom * Address correspondence to: quercia@cantab.net Abstract AI’s impact has traditionally been assessed in terms of occupations. However, an occupa- tion is comprised of interconnected tasks, and it is these tasks, not occupations themselves, that are affected by AI. To evaluate how tasks may be impacted, previous approaches utilized subjective manual annotations or coarse-grained matching with patents. Leveraging recent ad- vancements in machine learning, we replace coarse-grained matching with more precise deep learning approaches. Introducing the AI Impact (AII) measure, we employ Deep Learning Nat- ural Language Processing to automatically identify AI patents that impact various occupational tasks at scale. Our methodology relies on a comprehensive dataset of 19,498 task descriptions and quantifies AI’s impact through analysis of 12,984 AI patents filed with the United States Patent and Trademark Office (USPTO) between 2015 and 2020. Our observations reveal that the impact of AI on occupations defies simplistic categorizations based on task complexity, challenging the conventional belief that the dichotomy between basic and advanced skills alone explains the effects of AI. Instead, the impact is intricately linked to specific skills, whether basic or advanced, associated with particular tasks. For instance, while basic skills like scanning items may be affected, others like cooking may not. Similarly, certain advanced skills, such as image analysis in radiology, may face impact, while skills involving interpersonal relationships may remain unaffected. Furthermore, the influence of AI extends beyond knowledge-centric regions. Regions in the U.S. that heavily rely on industries susceptible to AI changes, often characterized by economic inequality or a lack of economic diversification, will experience notable AI impact. 1 Introduction The rapid advancement of Artificial Intelligence (AI) has undeniably created new business oppor- tunities [1] but has also reshaped the labor market [2–5], simultaneously reducing hiring in non-AI positions and altering the skill requirements of remaining job postings [6]. Exemplifying this phe- nomenon, the manufacturing sector has witnessed the automation of previously human-intensive assembly line tasks, while chatbots and virtual assistants have taken over routine inquiries and sup- port functions in customer services [7]. Recent AI advances, including generative AI, may further (re)shape occupations over the long term, fuelling growth in certain sectors and eroding others [8]. AI automation has not only streamlined processes but has also generated economic benefits [9], 1" 2312.04715v1,"Deep Emotions Across Languages: A Novel Approach for Sentiment Propagation in Multilingual WordNets Jan Kocoń Department of Artificial Intelligence Wrocław University of Science and Technology, Poland jan.kocon@pwr.edu.pl Abstract—Sentiment analysis involves using WordNets enriched with emotional metadata, which are valuable resources. However, manual annotation is time-consuming and expensive, resulting in only a few WordNet Lexical Units being annotated. This paper introduces two new techniques for automatically propagating sentiment annotations from a partially annotated WordNet to its entirety and to a WordNet in a different language: Multilingual Structured Synset Embeddings (MSSE) and Cross-Lingual Deep Neural Sentiment Propagation (CLDNS). We evaluated the proposed MSSE+CLDNS method extensively using Princeton WordNet and Polish WordNet, which have many inter-lingual relations. Our results show that the MSSE+CLDNS method outperforms existing propagation methods, indicating its effectiveness in enriching WordNets with emotional metadata across multiple languages. This work provides a solid foundation for large-scale, multilingual sentiment analysis and is valuable for academic research and practical applications. Index Terms—Sentiment Analysis, Multilingual WordNets, Multilingual Structured Synset Embeddings, Cross-Lingual Sentiment Propagation, Deep Neural Networks I. I NTRODUCTION Sentiment analysis, the process of analyzing human emotions through text, has become increasingly popular in the age of widespread online communication. Whether it’s consumer reviews, social media conversations, or news articles, recognizing and interpreting emotional tone automatically is no longer just a technological feat but a necessity for society [1]–[12]. Although deep learning techniques such as BERT [13]–[16] have significantly improved the field, achieving state-of-theart results in various NLP tasks, the need for high-quality, annotated resources remains a crucial factor for performance [17]–[20]. This is especially challenging for under-resourced languages and cross-lingual sentiment analysis tasks. Big Data has raised concerns about methodology and scalability. While large language models like GPT-3 and GPT-4 are impressive, they are not practical for specialized tasks like sentiment analysis. These models require significant resources and cannot replace high-quality, domain-specific training data [21]. Additionally, their monolithic size and one-size-fitsall approach are not efficient for customized solutions like sentiment propagation in multilingual WordNets. In this paper, we introduce two new techniques, Multilingual Structured Synset Embeddings (MSSE) and Cross-Lingual Deep Neural Sentiment Propagation (CLDNS), which aim to Fig. 1. Propagation of the emotional annotation from one WordNet to another. Example WordNets are connected at the level of synsets and lexical units with inter-lingual relations (Fig. generated with the assistance of DALL·E 3). address existing gaps in sentiment annotations. These techniques help propagate sentiment annotations from a partially annotated WordNet to its entirely unannotated counterpart and a WordNet in a different language. We thoroughly evaluated the techniques using Princeton WordNet and Polish WordNet, which share a significant set of inter-lingual relations. The results showed that MSSE+CLDNS outperforms current sentiment propagation methods significantly. This improvement leads to enriching WordNets across multiple languages with high-quality emotional metadata. Our study offers an overview of sentiment analysis resources for the Polish language. We assessed current WordNet sentiment methods and contrasted them with our new approaches. Our main contributions are: (1) introducing a new embedding technique, MSSE, capturing human emotions in graph-based databases; (2) presenting CLDNS, a method for emotion propagation in multilingual WordNets using MSSE; (3) aiming to harmonize modern NLP computational needs with the detailed demands of sentiment analysis in different languages." 2312.04718v1,"Dynamic Online Modulation Recognition using Incremental Learning Ali Owfi ∗ , Ali Abbasi † , Fatemeh Afghah ∗ , Jonathan Ashdown ‡ , Kurt Turck ‡ ∗ Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA Emails: {aowfi, fafghah}@clemson.edu † Computer Science Department, Vanderbilt University, Nashville, TN, USA Email: ali.abbasi@vanderbilt.edu ‡ Air Force Research Laboratory, Rome, NY, USA Emails: {jonathan.ashdown,kurt.turck}@us.af.mil Abstract—Modulation recognition is a fundamental task in communication systems as the accurate identification of modulation schemes is essential for reliable signal processing, interference mitigation for coexistent communication technologies, and network optimization. Incorporating deep learning (DL) models into modulation recognition has demonstrated promising results in various scenarios. However, conventional DL models often fall short in online dynamic contexts, particularly in class incremental scenarios where new modulation schemes are encountered during online deployment. Retraining these models on all previously seen modulation schemes is not only time-consuming but may also not be feasible due to storage limitations. On the other hand, training solely on new modulation schemes often results in catastrophic forgetting of previously learned classes. This issue renders DL-based modulation recognition models inapplicable in realworld scenarios because the dynamic nature of communication systems necessitate the effective adaptability to new modulation schemes. This paper addresses this challenge by evaluating the performance of multiple Incremental Learning (IL) algorithms in dynamic modulation recognition scenarios, comparing them against conventional DL-based modulation recognition. Our results demonstrate that modulation recognition frameworks based on IL effectively prevent catastrophic forgetting, enabling models to perform robustly in dynamic scenarios. Index Terms—Modulation Recognition, Incremental Learning, Deep Learning, Online Learning. I. I NTRODUCTION Modulation recognition is vital in wireless communications for its role in enabling efficient communication, spectrum sharing, and RF fingerprinting. It ensures reliable data transmission, facilitates spectrum allocation in shared environments, and helps identify and secure wireless networks by distinguishing unique RF signatures, making it an indispensable tool in modern wireless systems. In the recent years, deep learning (DL) has led to substantial progress in various fields. Its exceptional ability to derive meaningful information from complex datasets has been particularly influential. This capability has also found effective utilization in communication systems, notably in modulation and signal recognition tasks. In modulation recognition, DL models have demonstrated higher accuracy than traditional methods, particularly in scenarios characterized by significant noise, fading, and impairments [1]. This underscores the invaluable role of deep learning in enhancing modulation detection within communication systems, even in challenging operational conditions. This material is based upon work supported by the Air Force Office of Scientific Research under award number FA9550-20-1-0090 and the National Science Foundation under Grant Numbers CNS- 2318726, and CNS-2232048. DISTRIBUTION STATEMENT A: Approved for Public Release; distribution unlimited AFRL-2023-5606 on Nov. 06, 2023. While DL-based techniques have yielded notable outcomes in signal recognition, their practical adoption within communication systems remains limited due to several significant challenges. One of the main obstacles, is the lack of generalization and adaptability of the DL models in varying scenarios, which necessitates continuous retraining and refinement to accommodate new tasks or classes. Furthermore, the requirement for fresh and relevant data adds complexity, leading to computational constraints and time limitations for the retraining process. Addressing these challenges is essential to fully harness the potential of DL methods and integrate them effectively into communication systems. Most of the previously proposed DL-based solutions for modulation recognition are based on an isolation paradigm, meaning that given a dataset, the DL model is trained, and then tested on the same dataset. This approach does not aim at preserving the acquired knowledge for future learning endeavors and only focuses on the end result. The assumptions used in this paradigm makes it only suitable for static tasks in closed environments, which is far from the dynamic nature of communication systems with a multitude of varying parameters. In this paper, we are specifically focusing on a proposing a capable DL-based modulation detection model for a more realistic and dynamic scenario where the receiver encounters signals with new types of modulation (i.e. new classes) as the time grows. In such as scenario, a conventionally trained DL-based modulation detection model has three options, not adjusting the weights for the new classes, retraining on just the new classes, and retraining on all previously seen classes plus the new ones. Option one will simply cause the model to not be able to correctly classify the new classes, and thus, lower its accuracy. Option two will result in catastrophic forgetting [2], drastic degradation of accuracy on previously learned information when new information is introduced to the model.Lastly, option three is not efficient as it is time and resource consuming and requires memory to keep all the previously seen data, which might not be possible at all depending on the application and circumstances. None of these options are suitable which renders conventional DL-based modulation detection models inapt for the mentioned scenario. IL is a machine learning approach designed to continually update and enhance a model’s knowledge and performance as it encounters new data over time. Its primary purpose is to enable models to adapt to changing environments and evolving datasets without the need for complete retraining and without losing previously learned information. To overcome the afore-" 2312.04724v1,"Purple Llama C YBER S EC E VAL : A Secure Coding Benchmark for Language Models Manish Bhatt ∗ , Sahana Chennabasappa ∗ , Cyrus Nikolaidis ∗ , Shengye Wan ∗ , Ivan Evtimov † , Dominik Gabi † , Daniel Song † , Faizan Ahmad, Cornelius Aschermann, Lorenzo Fontana, Sasha Frolov, Ravi Prakash Giri, Dhaval Kapil, Yiannis Kozyrakis, David LeBlanc, James Milazzo, Aleksandar Straumann, Gabriel Synnaeve, Varun Vontimitta, Spencer Whitman, Joshua Saxe ∗ ∗ Co-equal primary author , † Core contributor This paper presents C YBER S EC E VAL , a comprehensive benchmark developed to help bolster the cybersecurity of Large Language Models (LLMs) employed as coding assistants. As what we believe to be the most extensive unified cybersecurity safety benchmark to date, C YBER S EC E VAL provides a thorough evaluation of LLMs in two crucial security domains: their propensity to generate insecure code and their level of compliance when asked to assist in cyberattacks. Through a case study involving seven models from the Llama 2, Code Llama, and OpenAI GPT large language model families, C YBER S EC E VAL effectively pinpointed key cybersecurity risks. More importantly, it offered practical insights for refining these models. A significant observation from the study was the tendency of more advanced models to suggest insecure code, highlighting the critical need for integrating security considerations in the development of sophisticated LLMs. C YBER S EC E VAL , with its automated test case generation and evaluation pipeline covers a broad scope and equips LLM designers and researchers with a tool to broadly measure and enhance the cybersecurity safety properties of LLMs, contributing to the development of more secure AI systems. Date: December 7, 2023 Correspondence: Joshua Saxe at joshuasaxe@meta.com Code: https://github.com/facebookresearch/PurpleLlama/tree/main/CybersecurityBenchmarks Blogpost: https://ai.meta.com/llama/purple-llama 1 Introduction Large Language Models (LLMs) have shown tremendous progress on a variety of tasks related to human cognition but they have stood out in their ability to write functional code in response to natural language requests. At the same time, much attention has been paid to safety issues that these models present but only a limited number of works exists on measuring and mitigating risk in the domain of cybersecurity. In this work, we identify two major cybersecurity risks posed by LLMs, develop measurement approaches for each, and open source C YBER S EC E VAL , the most comprehensive cybersecurity safety measurement suite to date. First, when those models generate code, that output can fail to follow security best practices or introduce exploitable vulnerabilities. This is not a theoretical risk - developers readily accept significant amounts of code suggested by these models. In a recent publication GitHub revealed that 46% of the code on its platform is autogenerated by CoPilot, its code suggestion tool backed by an LLM (Dohmke, 2023). Similarly, A study of large-scale deployment of the CodeCompose model at Meta claimed that developers accept its suggestions 22% of the time (Murali et al., 2023). In addition, previous studies with hand-written tests (Pearce et al., 2022) have found 40% of code suggestions to be vulnerable. User studies have indicated that developers may accept buggy code suggested by an LLM up to 10% more often than they write it themselves (Sandoval et al., 2023). In order to ultimately mitigate this kind of risk, C YBER S EC E VAL is designed to integrate into the development and testing processes of those designing code-producing large language models. By identifying insecure coding practices in LLM output across many languages, C YBER S EC E VAL can help identify risks and offer clear directions for improvement. By iteratively refining models based on these evaluations, model developers can enhance the security of the code generated by their AI systems. 1" 2312.04735v1,"Influence of Trotterization error on single-particle tunneling Anton V. Khvalyuk ∗ LPMMC, University Grenoble-Alpes, France Kostyantyn Kechedzhi, Vadim S. Smelyansky, and Lev. B Ioffe Google Research, Mountain View, CA, USA (Dated: December 11, 2023) Simulation of the single-particle tunneling problem by means of the Suzuki-Trotter approximation (STA) is analyzed. The target system describes a particle hopping across a chain of sites with position-dependent potential profile. The latter is assumed to be smooth and posses several local minima separated by a potential barrier, arranging a tunneling problem between the localized states in different minima. The STA error is found to manifest itself in three ways: i) perturbative energy shifts, ii) nonperturbartive renormalization of the tunneling rates, and iii) perturbative leakage of total probability to other states. In the general case, the first type of error is the most essential, as the emerging detuning of the tunneling resonance has to be compared with exponentially small tunneling rates. In absence of detuning (e.g. if the resonance is protected by symmetry), STA is found to cause exponential enhancement of the tunneling rates. The last type of error classifies the overall defect in the wave function and thus delineates the region of sufficiently weak distortion of the wave function due to STA. The conducted analysis confirms the naive criteria of applicability max{T, P } ≪ δt −1 (with T, P being the typical scales of kinetic and potential terms, respectively), while also revealing the structure of error and its actual behavior with system parameters. Analysis of the case of large Trotter step is also performed, with the main result being the reconstruction of the low-energy spectrum due to coupling between states with energy difference close to 2π/δt. The connection of the obtained results with the rigorous upper error bounds on the STA error is discussed, with particular emphasis on the reasons for the fact that these rigorous bounds are not always saturated. We also point out that the proposed problem can be directly implemented on existing quantum devices [1]. In particular, we give a detailed description of an experimental design that demonstrates the described physics. I. INTRODUCTION Simulating many-body quantum systems is a notoriously difficult problem that is often beyond the capabilities of even the most powerful classical supercomputers. In addressing this challenge, developing well-controlled quantum system that can further be used to simulate a wide range of other quantum systems has been a promising approach [2]. One example of such devices is given by superconducting systems [3, 4] that realize a 2D grid of two-level systems (qubits) with the possibility to apply any unitary operation involving one or two spatially adjacent qubits. These unitary operations (so-called gates) can be applied simultaneously for nonintersecting sets of qubits, which in the main idea behind all applications. In particular, such devices are a natural platform for simulating 1D and 2D spin-1/2 systems, as several prominent examples demonstrate [1, 5], but other computationally expensive tasks can also executed [3]. However, several main obstacles stand in the way of practical applications of these devices [1]: i) dephasing and decoherence of many-body state caused by noise from coupling to external devices, ii) errors in unitary gates and in readout of the final state, and iii) representation of Hamiltonian evolution in terms of local unitary gates, with the latter being the topic of the present paper. The primary challenge in simulating the evolution of a system with Hamiltonian H is that the evolution operator Û = e −itH is generally truly nonlocal unitary operator, whereas any unitary gate available on existing platforms is ∗ anton.khvalyuk@lpmmc.cnrs.fr local, so the exact evolution can only be restored with infinite number of gates. However, numerous algorithms [6] have been proposed to tackle this problem. All such algorithms essentially represent a cleverly designed sequence of local one- and two-qubit gates whose combined action U appr approaches that of the target evolution operator Û as the number of elementary steps in the sequence M is increased. The convergence towards Û with the increase M is established by deriving a rigorous upper bound on the error measured, e.g., as the spectral norm distance ∥U − U appr ∥. These schemes can also be viewed as quantum-mechanical analogs of Hamiltonian-blind symplectic integrators of Hamiltonian equations of motion that guarantees an upper bound on the error of the result. Ref [6] provides a concise review of existing approaches and the associated expressions for the upper bounds. Although it can be proved that any single algorithm cannot perform accurate simulation of all Hamiltonians with number of gates that growth slower than linearly with the required simulation time and\or system size [7, 8], the available algorithms are capable of coming arbitrarily close to the optimal linear scaling [6]. It is often the case, however, that the analytical upper bounds are not saturated by the actual evolution [6, 9, 10], so the natural question of the true value of the error emerges. Moreover, the total error in the wave function (measured e.g. as the square norm distance) does not necessarily translate to a comparable error in physical observables, as those might be largely insensitive to the sectors of the Hilbert space that host the largest part of the error. On the other hand, the idea of quantum simulations is beneficial for analysis of behavior of the systems that are not amenable for classical simulation, in which case it is also crucial to gain qualitative understanding of the errors" 2312.04739v1,"Journal of Machine Learning Research (2023) 1-20 Submitted 12/07; Published Unnatural Algorithms in Machine Learning Christian Goodbrake christian.goodbrake@oden.utexas.edu Oden Institute for Computational Engineering and Sciences University of Texas Austin, TX 78712, USA Editor: Abstract Natural gradient descent has a remarkable property that in the small learning rate limit, it displays an invariance with respect to network reparameterizations, leading to robust training behavior even for highly covariant network parameterizations. We show that optimization algorithms with this property can be viewed as discrete approximations of natural transformations from the functor determining an optimizer’s state space from the diffeomorphism group if its configuration manifold, to the functor determining that state space’s tangent bundle from this group. Algorithms with this property enjoy greater efficiency when used to train poorly parameterized networks, as the network evolution they generate is approximately invariant to network reparameterizations. More specifically, the flow generated by these algorithms in the limit as the learning rate vanishes is invariant under smooth reparameterizations, the respective flows of the parameters being determined by equivariant maps. By casting this property a natural transformation, we allow for generalizations beyond equivariance with respect to group actions; this framework can account for non-invertible maps such as projections, creating a framework for the direct comparison of training behavior across non-isomorphic network architectures, and the formal examination of limiting behavior as network size increases by considering inverse limits of these projections, should they exist. We introduce a simple method of introducing this naturality more generally and examine a number of popular machine learning training algorithms, finding that most are unnatural. Keywords: natural gradient descent, natural transformation, reparameterization invariance, group equivariance 1 Introduction Drawing from the world of information geometry, the “natural gradient descent” (Amari, 1998, 2010) has been proposed and widely studied as an alternative to the traditional gradient descent algorithm for training neural networks. In this approach, the Fisher information matrix is used to endow the network’s parameter space with a Riemannian structure. With this added structure, the step taken at each update is in the direction of the steepest descent relative to the space of realizable distributions, rather than with respect to the network’s parameters. The Fisher information matrix is used to “correct” the ordinary gradient to account for the the geometry of the network’s parameters, and it has been shown that this can improve convergence by accounting for covariance between network parameters analogous to signal whitening (Sohl-Dickstein, 2012). Remarkably, this structure is invariant under reparameterizations of the network, as the components of the Fisher information matrix ©2023 Christian Goodbrake. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/v/.html." 2312.04743v1,"Hiding Functions within Functions: Steganography by Implicit Neural Representations Jia Liu* Peng Luo Yan Ke 1Information Security Lab Engineering University of PAP Xi’an, China liujia1022@gmail.com 2Information Security Lab Engineering University of PAP Xi’an, China 1786667219@qq.com 3Information Security Lab Engineering University of PAP Xi’an, China 15114873390@163.com Abstract—Deep steganography utilizes the powerful capabilities of deep neural networks to embed and extract messages, but its reliance on an additional message extractor limits its practical use due to the added suspicion it can raise from steganalyzers. To address this problem, we propose StegaINR, which utilizes Implicit Neural Representation (INR) to implement steganography. StegaINR embeds a secret function into a stego function, which serves as both the message extractor and the stego media for secure transmission on a public channel. Recipients need only use a shared key to recover the secret function from the stego function, allowing them to obtain the secret message. Our approach makes use of continuous functions, enabling it to handle various types of messages. To our knowledge, this is the first work to introduce INR into steganography. We performed evaluations on image and climate data to test our method in different deployment contexts. Index Terms—Steganography, Implicit Neural Representation, Continuous Function I. I NTRODUCTION Steganography is a technique used for secret communication, where confidential information is hidden within a seemingly innocuous cover data and transmitted through a public channel [1]. The cover data can take various forms, such as digital text, audio, images, videos, or 3D data. Traditional steganographic methods primarily focus on designing algorithms to subtly modify [3] or select [2] the cover media in order to embed the secret information. However, it is challenging to achieve a good balance between concealment [4] [5] and embedding capacity. Recently, deep neural network-based steganography schemes have been proposed, which generally exhibit superior performance in comparison to traditional approaches. In deep steganography, the sender of the message employs an encoding network to embed confidential information into the cover medium, while the receiver of the message makes use of a message decoder to recover the secret information from the cover medium. However, deploying these deep steganography methods in practical applications poses two critical issues. Firstly, these methods necessitate the transmission of a large decoder to the message recipient, but it is insecure to transmit the secret decoder for another transmission. Secondly, a more concealed and serious problem arises when the decoder is present at the recipient’s end, which may arouse suspicion from analysts regarding the steganographic behavior. Fig. 1. We introduce the new problem of INR steganography: hiding function into function. Our proposed framework, StegaINR, can embed and recover multimodal data through INR to implement secure covert communication. One possible solution is to treat the message decoder as ordinary binary data and hide it in a popular cover data such as an image or video using existing steganography schemes. However, due to the relatively large size of the message decoder, traditional steganography schemes require a significant amount of cover data to meet the limited capacity, which imposes a significant communication burden. Another solution [49] [50] is to embed the decoder network into another deep neural network that performs other tasks, such as image classification or segmentation. However, this stego network is even larger than the message extractor and also causes a communication burden. In addition to the concealed transmission of the message decoder, both of these solutions require the transmission of the stego data. To address the covert issue of message decoders, we propose a novel steganographic scheme based on implicit neural representation. Implicit neural representations (INR) parameterize the signal as a continuous function. In our scheme, as shown in Fig. 1, (1) we first represent the secret message as a continuous secret function. (2) By using a shared key, we extend the secret function (network) to construct a new network structure. (3) With fixed parameters of the secret function, we parameterize cover data using the extended function to obtain a stego function. The stego function serves as both an extractor and a" 2312.04745v1,"A Brief Tutorial on Sample Size Calculations for Fairness Audits Harvineet Singh †∗ , Fan Xia † , Mi-Ok Kim † , Romain Pirracchio † , Rumi Chunara ‡ , Jean Feng † † University of California, San Francisco; ‡ New York University ∗ fnu.harvineetsingh@ucsf.edu Abstract In fairness audits, a standard objective is to detect whether a given algorithm performs substantially differently between subgroups. Properly powering the statistical analysis of such audits is crucial for obtaining informative fairness assessments, as it ensures a high probability of detecting unfairness when it exists. However, limited guidance is available on the amount of data necessary for a fairness audit, lacking directly applicable results concerning commonly used fairness metrics. Additionally, the consideration of unequal subgroup sample sizes is also missing. In this tutorial, we address these issues by providing guidance on how to determine the required subgroup sample sizes to maximize the statistical power of hypothesis tests for detecting unfairness. Our findings are applicable to audits of binary classification models and multiple fairness metrics derived as summaries of the confusion matrix. Furthermore, we discuss other aspects of audit study designs that can increase the reliability of audit results. 1 Introduction Disparities in machine learning models’ performance across demographic groups, subsequently referred to as unfairness, have been highlighted by audits in multiple domains including criminal justice [1], face image analysis [2], lending [3], online advertising [4], hiring [5], and care management [6]. Such audits have been influential to rollback products or advocate for improvements [7]. Thus, fairness audits are an important mechanism for ensuring accountability for models. Frameworks exist that provide guidance on how to define, execute, and report audits of algorithmic systems [8, 9]. However, statistical aspects of fairness audits are largely overlooked except by a few studies [10–13]. Audits produce estimates of unfairness based on limited samples collected in the audit study. Therefore, standard considerations for making statistical inferences apply such as representativeness of the study sample to the target population, specification of the hypotheses being tested, and communicating uncertainty or statistical power of the tests. However, previous work often does not report uncertainties in the unfairness estimates (e.g. [1, 2], ostensibly because the evaluation datasets used in such studies are large). Importantly, there is not enough guidance on how to design audits such that they are sufficiently powered to detect model unfairness. Previous guidances on sample sizes (e.g. [14–16]) focus on evaluation metrics such as calibration slope or area under the ROC curve which differ from the commonly-used fairness metrics such as false positive/negative rate disparity, and hence are not directly applicable. Even though guidance exists for measures of differences between groups in the clinical trial [17] and health disparities [18] literature, we are not aware of works that present the formulae directly relevant to fairness metrics. Sample size calculations are important to plan resources required to collect data since audits may not have existing data to validate the models. This is often the case in external, independent audits where the model developer might not be willing to share data (e.g. [19]). Auditors may require conducting Workshop on Regulatable Machine Learning at the 37th Conference on Neural Information Processing Systems (RegML @ NeurIPS 2023)." 2312.04749v1,"Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler Simon Luo Adrian Herrera The University of New South Wales Australia simon.luo@unsw.edu.au Australian National University Australia Paul Quirk Michael Chase Defence Science & Technology Group Australia Damith C. Ranasinghe Salil S. Kanhere University of Adelaide Australia The University of New South Wales Australia ABSTRACT Fuzzing is an industry-standard software testing technique that uncovers bugs in a target program by executing it with mutated inputs. Over the lifecycle of a fuzzing campaign, the fuzzer accumulates inputs inducing new and interesting target behaviors, drawing from these inputs for further mutation and generation of new inputs. This rapidly results in a large pool of inputs to select from, making it challenging to quickly determine the “most promising” input for mutation. Reinforcement learning (RL) provides a natural solution to this seed scheduling problem—a fuzzer can dynamically adapt its selection strategy by learning from past results. However, existing RL approaches are (a) computationally expensive (reducing fuzzer throughput), and/or (b) require hyperparameter tuning (reducing generality across targets and input types). To this end, we propose T-Scheduler, a seed scheduler built upon multiarmed bandit theory to automatically adapt to the target. Notably, our formulation does not require the user to select or tune hyperparameters and is therefore easily generalizable across different targets. We evaluate T-Scheduler over 35 CPU-yr fuzzing effort, comparing it to 11 state-of-the-art schedulers. Our results show that T-Scheduler improves on these 11 schedulers on both bug-finding and coverage-expansion abilities. CCS CONCEPTS • Security and privacy → Software and application security; • Computing methodologies → Machine learning. KEYWORDS Fuzzing, Software Testing, Thompson Sampling, Reinforcement Learning, Multi-Armed Bandits ACM Reference Format: Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, and Salil S. Kanhere. 2024. Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. AsiaCCS ’24, July 01–05, 2024, Singapore © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX In Proceedings of The 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS ’24). ACM, New York, NY, USA, 17 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION “Make out like a bandit”. Idiom. To make a large profit. Merriam-Webster Dictionary Fuzzing is a software testing technique for automatically finding bugs and vulnerabilities in a target program. Fuzzers find bugs by mutating inputs to induce new behavior in the target. Intuitively, mutated inputs are more likely to exercise corner cases in the target’s behaviors, leading to bugs. While most of these mutations do not lead to anything interesting, there remains a chance that the mutated input induces new and interesting target behaviors. Intelligently selecting which inputs to mutate is critical for maximizing fuzzer effectiveness; inputs more likely to uncover new behaviors should be prioritized for mutation. This prioritization of inputs is known as seed scheduling 1 [27, 40]. Seed schedulers typically use heuristics to determine an input’s position in the fuzzer’s queue. In a coverage-guided greybox fuzzer—the most common type of fuzzer—seed scheduling can be driven by a combination of: (i) code coverage (inputs leading to new code uncover new behaviors); (ii) input size (smaller inputs are faster to mutate); (iii) execution time (inputs with shorter execution time mean more fuzzer iterations); (iv) the number of times the input has been previously selected (avoiding local optima); and (v) similarity with other inputs (improving diversity). However, seed scheduling is challenging because of a combination of the (a) large number of inputs generated via mutation (and thus requiring prioritization), (b) large search space of the target, and (c) computational requirements (e.g., CPU time, memory, and storage). Machine learning (ML)—in particular, reinforcement learning (RL)—is commonly applied to solve challenges in fuzzing [9, 11, 12, 16, 20, 25, 31, 32, 39, 40, 42, 50]. Notably, RL has been used to adaptively learn seed scheduling strategies more likely to lead to increased code coverage. In turn, this increases the likelihood of uncovering new bugs (after all, one cannot find bugs in code that is never executed). However, integrating RL into fuzzing introduces two challenges: performance tradeoffs and hyperparameter tuning. 1 We use the term “seed scheduling”, rather than “seed selection”, to disambiguate it from the (offline) process of selecting an initial set of inputs to bootstrap the fuzzer." 2312.04753v1,"Pulsed voltage cold atmospheric plasma jet and gold nanoparticles enhance cytotoxic anticancer effect I Schweigert 1,⋆ , M Biryukov 1,2 , A Polyakova 1,2 , N Krychkova 1,2 , E Gorbunova 1,2 , A Epanchintseva 2 , I Pyshnaya 2 , Dm Zakrevsky 1,3 , E Milakhina 1,3 , O Koval 1,2 1 Khristianovich Institute of Theoretical and Applied Mechanics, Novosibirsk, Russia Institute of Chemical Biology and Fundamental Medicine, Novosibirsk, Russia 3 Novosibirsk State Technical University, Novosibirsk, Russia 2 E-mail: ⋆ ischweig@yahoo.com August 2023 Abstract. Efficient and biologically safe mode of cold atmospheric plasma jet (CAPJ) is crucial for the development of CAPJ-based anticancer therapy. In the experiment and numerical simulations, by changing the pulse duration of a positive-pulsed voltage, we found the optimal CAPJ mode with regular streamer propagation. CAPJ regimes with a maximum discharge current at a temperature T <42 ◦ C substantially suppressed the viability of cancer cells. To enhance cell killing, gold nanoparticles (NPs) were added to the cells before and after the CAPJ exposure. Combination of CAPJ, generated with positivepulsed voltage, and gold nanoparticles decreased viability of NCI-H23 epithelial-like lung adenocarcinoma, A549 lung adenocarcinoma, BrCCh4e-134 breast adenocarcinoma and uMel1 uveal melanoma cells. Polyethylene glycol-modified nanoparticles with attached fluorescent label were used to visualize the uptake of NPs. We demonstrated that NPs efficiently entered the cells when were added to the cells just before CAPJ exposure or up to two hours afterwards. The efficiency of NPs penetration into cells positively correlated with the induced cytotoxic effect: it was maximal when NPs was added to cells right before or immediately after CAPJ exposure. Summarizing, the treatment with optimal CAPJ modes in combination with modified NPs, bearing the cancer-addressed molecules and therapeutics may be next strategy of strengthening the CAPJ-based antitumor approaches." 2312.04757v1,"FERMILAB-CONF-23-751-CMS-PPD Induced Generative Adversarial Particle Transformers Anni Li ∗ Venkat Krishnamohan ∗ Raghav Kansal † Rounak Sen Steven Tsan Zhaoyu Zhang Javier Duarte University of California, San Diego La Jolla, CA 92093, USA {a5li,vkrishnamohan,rkansal,r2sen,stsan,zhz057,jduarte}@ucsd.edu Abstract In high energy physics (HEP), machine learning methods have emerged as an effective way to accurately simulate particle collisions at the Large Hadron Collider (LHC). The message-passing generative adversarial network (MPGAN) was the first model to simulate collisions as point, or “particle”, clouds, with state-ofthe-art results, but suffered from quadratic time complexity. Recently, generative adversarial particle transformers (GAPTs) were introduced to address this drawback; however, results did not surpass MPGAN. We introduce induced GAPT (iGAPT) which, by integrating “induced particle-attention blocks” and conditioning on global jet attributes, not only offers linear time complexity but is also able to capture intricate jet substructure, surpassing MPGAN in many metrics. Our experiments demonstrate the potential of iGAPT to simulate complex HEP data accurately and efficiently. 1 Introduction In high energy physics (HEP), jets—sprays of particles produced at high energy collisions at the Large Hadron Collider (LHC), serve as a vital bridge between theoretical research and experimental observations. The intricate patterns in jets make them invaluable for understanding quantum chromodynamics (QCD), identifying rare particles like the Higgs boson, and conducting quantitative analyses of particle properties and interactions. Machine learning methods, such as generative adversarial networks (GANs), have recently emerged as effective and efficient approaches to simulating such high-energy collisions, reducing the computational burden of traditional methods. The message-passing GAN (MPGAN) [1], in particular, represented a significant leap forward, being able to capture the complex global structure of jets and handle variable-sized particle clouds using fully-connected graph neural networks. However, this fully-connected nature means its memory and time complexity scale quadratically with the number of particles per jet. The generative adversarial particle transformer (GAPT) [2] was recently introduced to improve the efficiency of MPGAN using self-attention, but GAPT does not match MPGAN’s performance. Others have also studied normalizing flows [3], other types of transformers [4, 5], diffusion models [6, 7], and equivariant networks [8] for the same generative task. In this paper, we introduce the induced GAPT (iGAPT), featuring “induced particle attention blocks” incorporating physics-informed inductive biases of jets, to offer linear time complexity and improve output fidelity. We investigate its performance and timing compared to MPGAN and alternative architecture choices on highmomentum jets. ∗ † Equal contribution. Also at Fermi National Accelerator Laboratory. Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.04758v1,"1 Physics-Informed Convolutional Autoencoder for Cyber Anomaly Detection in Power Distribution Grids Mehdi Jabbari Zideh, Student Member, IEEE, Sarika Khushalani Solanki, Senior Member, IEEE Abstract—The growing trend toward the modernization of power distribution systems has facilitated the installation of advanced measurement units and promotion of the cyber communication systems. However, these infrastructures are still prone to stealth cyber attacks. The existing data-driven anomaly detection methods suffer from a lack of knowledge about the system’s physics, lack of interpretability, and scalability issues hindering their practical applications in real-world scenarios. To address these concerns, physics-informed neural networks (PINNs) were introduced. This paper proposes a multivariate physics-informed convolutional autoencoder (PIConvAE) to detect stealthy cyberattacks in power distribution grids. The proposed model integrates the physical principles into the loss function of the neural network by applying Kirchhoff’s law. Simulations are performed on the modified IEEE 13-bus and 123-bus systems using OpenDSS software to validate the efficacy of the proposed model for stealth attacks. The numerical results prove the superior performance of the proposed PIConvAE in three aspects: a) it provides more accurate results compared to the data-driven ConvAE model, b) it requires less training time to converge c) the model excels in effectively detecting a wide range of attack magnitudes making it powerful in detecting stealth attacks. Index Terms—Physics-informed neural networks, cyber anomaly detection, power distribution grids, unsupervised datadriven methods, convolutional autoencoder, false data injection attacks. I. I NTRODUCTION The recent advancement in smart grid monitoring technology has introduced the extensive installation of phasor measurement units (PMUs) and µPMUs to increase the situational awareness of power system operators [1], [2]. This improvement in the system observability has exposed smart grids to various types of cyber-attacks threatening the grids’ cyber-physical infrastructures [3]. As the behavior and patterns of the cyber anomalies are unknown and unpredictable, their detection is a challenging task to ensure secure and reliable operation of the system [4]. Machine learning methods as powerful techniques are applied to various aspects of power systems including forecasting [5], power market operation [6], [7], power flow calculations [8], and cyber-physical security analysis [9]. More specifically, in the task of anomaly detection, several research investigations have applied deep neural networks (DNNs) to distinguish abnormal data from the normal data patterns within the sensor data. Authors in [10] applied discrete wavelet transform Authors are with the Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26505 USA (e-mail: mj00021@mix.wvu.edu, skhushalanisolanki@mail.wvu.edu) (DWT) and a recurrent neural network (RNN) to detect cyber attacks. A similar methodology was proposed in [11] to detect and classify high-impedance faults in power grids. The work in [12] proposed a generative adversarial network (GAN) model for event detection in µPMU measurements. A multivariate long short-term memory (LSTM) autoencoder-based model was employed in [13] for cyber anomaly detection in power distribution systems. Despite their impressive performance, ML models mainly suffer from poor extrapolation capabilities, scalability constraints, and lack of understanding of the system’s physical laws. Consequently, this reduces their reliability as the system operators often struggle to interpret their implications. To address the aforementioned challenges and enhance the performance of the learning algorithms with lower computational effort, physics-informed neural networks (PINNs) were introduced integrating the fundamental physical principles of the systems into NN models [14]. The works in [15] and [16] extensively reviewed the applications of PINN methods in the cyber-power domain and power systems, respectively. Recently a growing number of research studies have applied PINN methods for anomaly detection in power systems. Authors in [17] applied the physics-based inequality constraints to the isolation forest algorithm to detect falsification attacks on wind generation signals. The work in [18] proposed a combined autoencoder with a graph neural network (GNN) model which learns the spatial structure of µPMU data through a weighted adjacency matrix to detect events in power distribution grids. A new framework for combining model-based and NN methods is proposed in [19] where the prediction residuals of variational autoencoder (VAE), LSTM, and state estimation are fed to a DNN model for attack detection. A physics-informed method is employed in [20] for attack detection utilizing the information of transmission system topology structure and node features in graph edgeconditioned convolutional networks (GECCN). In [21], the physical relationships are integrated into the NN loss function through dynamical swing equations for the detection of loadaltering attacks. In this paper, we propose a novel PINN model for cyberanomaly detection in power distribution systems. More specifically, the contributions of this work are threefold: 1) We present a physics-informed convolutional autoencoder (PI- ConvAE) model by encoding the physics-based equations of µPMU measurements into the loss function of the model to detect cyber attacks; 2) The proposed model works in an" 2312.04799v1,"An Overview of MLCommons Cloud Mask Benchmark: Related Research and Data Version 1.0 Gregor von Laszewski † Ruochen Gu laszewski@gmail.com University of Virginia Charlottesville, VA, USA bill.ruochen.gu@gmail.com Shanghai, CN Abstract Cloud masking is a crucial task that is well-motivated for meteorology and its applications in environmental and atmospheric sciences. Its goal is, given satellite images, to accurately generate cloud masks that identify each pixel in image to contain either cloud or clear sky. In this paper, we summarize some of the ongoing research activities in cloud masking, with a focus on the research and benchmark currently conducted in MLCommons Science Working Group. This overview is produced with the hope that others will have an easier time getting started and collaborate on the activities related to MLCommons Cloud Mask Benchmark. CCS Concepts: • Applied computing → Earth and atmospheric sciences; • Computing methodologies → Image representations; • Information systems → Test collections; • Hardware → Testing with distributed and parallel systems. Keywords: cloudmask, cloudmesh, datasets, MLCommons, benchmark 1 ∗ MLCommons Cloud Mask Activities The Cloud Mask Benchmark is part of the research currently conducted by MLCommons [2] Science Working Group [7]. We hope that others will contribute to this document to enhance its scope. Please contact Gregor von Laszewski (laszewski@gmail.com) so that we can coordinate with you. As of this moment, we are aware of several activities regarding MLCommons Cloud Mask Benchmark. 1. The original benchmark was contributed by Samuel Jackson and Juri Papaya [3, 12] from Rutherford Labs. The reference implementation is based on U-Net [8]. 2. A cloud mask benchmark activity by Junji Yin on PEARL [12]. 3. A number of activities carried out by Gregor von Laszewski on Rivanna, University of Virginia’s High Performance Computing Cluster. This activity contains significant contributions: ∗ https://github.com/laszewski/papers/raw/master/vonLaszewski- cloudmask-related.pdf † MLCommons authorized submitting author 1 a. Introduction of a README to showcase how to run the code that has been reused and modified successfully by others. b. Introduction of target directories that showcase how to use templates to run cloudmask benchmarks on various HPC machines, DGX station, and a Linux desktop with an NVIDIA card. c. Introduction of enhanced timers to measure execution time for different parts of the benchmark program. d. Usage of Cloudmesh StopWatch to provide easy human readable timers that can be parsed with little effort through exports as CSV data. e. Development and usage of a hyper-parameter permutation framework that enables the cloud mask model to be experimented with different hyper-parameters, including epochs, batch sizes, learning rates, etc. This work is also reused in other MLCommons Science Benchmarks [15]. The work simplies benchmark results following the FAIR principal while integrating the hyperparameters as metadata. f. Development of a workflow system that enables the use of hybrid compute resources through templates [17]. g. Application of the aforementioned work to education [18]. h. Hosting of a development repository for MLCommons Cloud Mask Benchmark code base, as part of MLCommons Science Working Group [14]. i. Execution of a substantial number of benchmark experiments. 4. A number of activities by New York University (""NYU"") AI for Scientific Research (AIFSR) Benchmark Team on Greene, NYU High Performance Computing Cluster. a. Modification of reference implementation to include early stoppage into model training, built onto the activities from Rutherford Labs and UVA. b. Implementation of a new accuracy metric introduced by Samuel Jackson, Juri Papaya, and Gregor von Laszewski. c. Coordinated the benchmark experiments with bash script that replicates a small number of features" 2312.04806v1,"RL Dreams: Policy Gradient Optimization for Score Distillation based 3D Generation Aradhya N. Mathur * IIITD Phu Pham * Purdue University Aniket Bera Purdue University aradhyam@iiitd.ac.in pham84@purdue.edu aniketbera@purdue.edu Ojaswa Sharma IIITD ojaswa@iiitd.ac.in Abstract proaches that transcend traditional boundaries, unlocking new domains of exploration. One such frontier lies in bridging the gap between vision and language, a pursuit that holds the potential to transform how we interpret and engage with the visual world. Recently, the advent of diffusion models [43, 46, 50] has played a pivotal role in extending the capabilities of this interdisciplinary field, enabling the seamless translation of textual descriptions into 2D representations. However, as we dive into the realm of three-dimensional (3D) reconstructions, a notable challenge emerges. Despite the development made in 2D translation, the transition from text to 3D remains a formidable task, primarily attributed to the scarcity of comprehensive 3D datasets. This scarcity not only hinders the training of robust models but also underscores the pressing need for innovative methodologies to overcome the inherent challenges in this dimensionally complex domain. The capability of diffusion models to approximate distributions has accelerated the synthetic data generation process, thus becoming the mainstream generative modeling technique. Diffusion models have demonstrated effective and high-quality generation of image, audio, video, and several other modalities. Beyond their initial training objectives, these models have surpassed their limitations and evolved into fundamental frameworks, extending their utility to a range of downstream tasks, including but not limited to image composition, in-painting, and image editing, as demonstrated in notable works like [21, 29, 35, 59]. Recently, pre-trained large diffusion models have been utilized for 3D shape generation techniques due to the advantages that they offer in terms of the vast knowledge base that they serve as, which can be distilled into neural radiance fields (NeRFs) for rendering [37, 39, 53]. Recent techniques such as score distillation sampling and variational score distillation have demon- 3D generation has rapidly accelerated in the past decade owing to the progress in the field of generative modeling. Score Distillation Sampling (SDS) based rendering has improved 3D asset generation to a great extent. Further, the recent work of Denoising Diffusion Policy Optimization (DDPO) demonstrates that the diffusion process is compatible with policy gradient methods and has been demonstrated to improve the 2D diffusion models using an aesthetic scoring function. We first show that this aesthetic scorer acts as a strong guide for a variety of SDS-based methods and demonstrates its effectiveness in text-to-3D synthesis. Further, we leverage the DDPO approach to improve the quality of the 3D rendering obtained from 2D diffusion models. Our approach, DDPO3D, employs the policy gradient method in tandem with aesthetic scoring. To the best of our knowledge, this is the first method that extends policy gradient methods to 3D score-based rendering and shows improvement across SDS-based methods such as DreamGaussian, which are currently driving research in text-to-3D synthesis. Our approach is compatible with score distillation-based methods, which would facilitate the integration of diverse reward functions into the generative process. Our project page can be accessed via https://ddpo3d.github.io. 1. Introduction The intersection of computer vision and graphics has experienced significant advancements in recent years, unveiling novel possibilities for advancing our understanding of visual data [2, 3, 32, 60]. The combination of these two disciplines has given rise to innovative ap- * denotes equal contribution by the authors 1" 2312.04809v1,"Navigating the Path of Women in So�ware Engineering: From Academia to Industry Tatalina Oliveira Ann Barcomb Ronnie de Souza Santos CESAR School Recife, PE, Brazil tcso@cesar.org.br University of Calgary Calgary, AB, Canada ann@barcomb.org University of Calgary Calgary, AB, Canada ronnie.desouzasantos@ucalgary.ca Helda Barros Maria Teresa Baldassarre César França CESAR School Recife, PE, Brazil hbo@cesar.org.br Università di Bari Bari, BA, Italy mariateresa.baldassarre@uniba.it ABSTRACT Context. Women remain signi�cantly underrepresented in software engineering, leading to a lasting gender gap in the software industry. This disparity starts in education and extends into the industry, causing challenges such as hostile work environments and unequal opportunities. Addressing these issues is crucial for fostering an inclusive and diverse software engineering workforce. Aim. This study aims to enhance the literature on women in software engineering, exploring their journey from academia to industry and discussing perspectives, challenges, and support. We focus on Brazilian women to extend existing research, which has largely focused on North American and European contexts. Method. In this study, we conducted a cross-sectional survey, collecting both quantitative and qualitative data, focusing on women’s experiences in software engineering to explore their journey from university to the software industry. Findings. Our �ndings highlight persistent challenges faced by women in software engineering, including gender bias, harassment, work-life imbalance, undervaluation, low sense of belonging, and impostor syndrome. These di�culties commonly emerge from university experiences and continue to a�ect women throughout their entire careers. Conclusion. In summary, our study identi�es systemic challenges in women’s software engineering journey, emphasizing the need for organizational commitment to address these issues. We provide actionable recommendations for practitioners. LAY ABSTRACT. Women in software engineering confront enduring underrepresentation, creating a gender gap evident from education to industry. Increasing the participation of women in the software industry is essential for the development of systems that re�ect the diversity of our society. This study explores women’s journey within software engineering, highlighting challenges and proposing strategies for software companies to address gender imbalance e�ectively. KEYWORDS women, software development, STEM, survey, gender ICSE’2024, April 2014, Lisbon, Portugal 2023. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn CESAR School Recife, PE, Brazil franssa@cesar.org.br ACM Reference Format: Tatalina Oliveira, Ann Barcomb, Ronnie de Souza Santos, Helda Barros, Maria Teresa Baldassarre, and César França. 2023. Navigating the Path of Women in Software Engineering: From Academia to Industry. In Proceedings of 46th International Conference of Software Engineering (ICSE’2024). ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Throughout the years, there has been a rise in research e�orts aimed at tackling the issue of equity, diversity, and inclusion in the �eld of software engineering [51]. Studies conducted in both educational and industry settings have consistently revealed that software engineering remains unwelcoming to individuals from various underrepresented groups [2, 16]. Disturbingly, these individuals face various forms of prejudice, ranging from toxic work environments to deliberate discrimination [15, 17, 55]. The e�ects of this imbalance extend to the software products being released to our naturally diverse society. In this context, women continue to be signi�cantly underrepresented in software engineering [67]. Despite progress in promoting gender diversity in various industries, the software industry continues to grapple with a substantial gender gap. This underrepresentation starts from early education, with a small percentage of girls pursuing computer science and engineering degrees compared to their male counterparts [47]. This lack of gender diversity deprives the industry of diverse perspectives and perpetuates a discouraging cycle that dissuades potential female talent from pursuing or maintaining careers in software engineering [26, 27]. In the academic environment, beyond the issue of underrepresentation, girls pursuing software engineering may encounter many challenges: exposure to gender stereotypes; experiencing a lack of mentorship tailored to their needs; feeling as if they do not belong; having limited access to internships, research projects, or leadership positions; su�er from the absence of diverse and inclusive curriculum; and feel discomfort in male-dominated classrooms [34, 44, 45, 47]. After entering the software industry, certain challenges may persist, including underrepresentation and male-dominated teams. However, women encounter a range of additional obstacles, such as doubting their abilities and contributions (impostor syndrome), contending with hostile work environments, and facing a lack" 2312.04829v1,"Metamaterial-Controlled Parity-Time Symmetry in Non-Hermitian Wireless Power Transfer Systems Hanwei Wang, Joshua Yu, Xiaodong Ye, and Yang Zhao ∗ Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Urbana, IL, US. † (Dated: December 11, 2023) Inductive wireless power transfer (WPT) systems can be effectively described as non-Hermitian systems using the coupled-mode theory. In these systems, parity-time (PT)-symmetric states facilitate efficient power transfer. Traditionally, passive resonators have been used as relay devices in such systems to extend transmission distance; however, this approach may induce additional eigenstates with broken PT symmetry, particularly when specific spatial arrangements of the relay resonators, dependent on the positions of the transmitting (Tx) and receiving (Rx) resonators, are not maintained. This limitation hampers applications like free-positioning WPT. To address this challenge, we introduce a multibody WPT system employing metamaterial-controlled PT symmetry, which circumvents the constraints of physical arrangement. We utilize inverse design to configure the metamaterial, targeting a specific resonance mode that controls the effective coupling coefficients. Our approach ensures that a PT-symmetric state emerges when these coefficients, relating to the metamaterial and both the Tx and Rx resonators, are balanced. We confirm the stability of this state in a strong coupling regime, both theoretically and experimentally. Our experiments demonstrate the formation of PT-symmetric states governed by the metamaterial’s resonant mode, achievable even with varying sizes and positions of the Tx and Rx in relation to the metamaterial. Moreover, we show that the PT-symmetric state is attainable with different spatial configurations of the Rx resonator. This finding underscores our system’s potential for free-positioning WPT, significantly broadening its applicability. I. INTRODUCTION Wireless power transfer (WPT) technologies are broadly divided into two main categories, radiative [1, 2] and non-radiative [3]. Non-radiative WPT, which primarily uses the magnetic near-field to transmit energy, is preferred for its high-power volume and safety features [4]. The transmitting (Tx) and receiving (Rx) resonators couple through magnetic mutual induction [5]. These inductive WPT systems can be modeled as non-Hermitian systems using the coupled-mode theory [6]. Efficient power transfer in these systems is achieved by forming PT-symmetric states [7, 8], especially in the strong coupling regime when the physical symmetry is maintained [9]. However, a challenge arises in the weak coupling regime typically when the Tx-Rx separation increases. In such scenarios, spontaneous symmetry breaking occurs, leading to the formation of anti-PT-symmetric resonant states [10]. To enhance the overall coupling and extend the strong coupling range, relay resonators have been employed to increase the maximum separation distance between Tx and Rx [11, 12]. However, a significant challenge with relay resonators is their propensity to involve high-order resonant states, many of which exhibit anti-PT symmetry [13]. To avoid these states, it is essential to maintain a symmetric spatial arrangement of the relay resonators ∗ yzhaoui@illinois.edu † Also at Holonyak Micro and Nanotechnology Laboratory, Uni- versity of Illinois at Urbana-Champaign, Urbana, IL, US. and ensure identical geometries for the Tx and Rx resonators [14]. Yet, such stringent requirements are impractical in many applications, particularly in scenarios requiring free-positioning WPT. Metamaterials, known for their exceptional ability in manipulating the wavefront and near-field distribution of electromagnetic and acoustic fields and waves [15–19], hold significant promise in addressing these challenges in WPT systems. Prior research has successfully harnessed metamaterials to control the PT symmetry in photonics, leading to developments like asymmetric phase modulation [20], isotropic negative refractive index [21], nanoscale sensing [22–24], and coherent perfect absorption [25]. However, applying these concepts to WPT systems is hindered by difficulties in controlling the metamaterial’s resonance mode. In our previous work, we have successfully demonstrated a metamaterial that can achieve on-demand field-shaping, applicable in magnetic resonance imaging [26] and WPT [27, 28]. In this letter, we show that the controllable metamaterial mode allows for fine-tuning the coupling coefficients relative to the Tx and the Rx resonators. We theoretically study the states of the system and show that a PT-symmetric state is attainable by configuring the metamaterial. Notably, the sizes of the Tx and Rx need not be identical, and their physical positioning is flexible, provided they function within the strong coupling regime. This advancement offers a significant step forward in overcoming the positional constraints of the Tx and Rx, paving the way for a new paradigm in the design of multibody WPT systems." 2312.04832v1,"Exposing Algorithmic Discrimination and Its Consequences in Modern Society: Insights from a Scoping Study Ramandeep Singh Dehal Cape Breton University Sydney, NS, Canada CBU22CLST@cbu.ca Mehak Sharma Cape Breton University Sydney, NS, Canada CBU22CLMP@cbu.ca ABSTRACT Algorithmic discrimination is a condition that arises when datadriven software unfairly treats users based on attributes like ethnicity, race, gender, sexual orientation, religion, age, disability, or other personal characteristics. Nowadays, as machine learning gains popularity, cases of algorithmic discrimination are increasingly being reported in several contexts. This study delves into various studies published over the years reporting algorithmic discrimination. We aim to support software engineering researchers and practitioners in addressing this issue by discussing key characteristics of the problem. LAY ABSTRACT. In recent years, data bias has posed signi�cant challenges for minority groups, leading to systems and algorithms discriminating against Women, Black communities, people with disabilities, and LGBTQIA+ individuals. Recognizing this bias is the crucial �rst step toward devising solutions. This study maps and discusses instances of algorithmic discrimination across various societal domains. KEYWORDS algorithmic discrimination, software development, machine learning ACM Reference Format: Ramandeep Singh Dehal, Mehak Sharma, and Ronnie de Souza Santos. 2023. Exposing Algorithmic Discrimination and Its Consequences in Modern Society: Insights from a Scoping Study. In Proceedings of 46th International Conference of Software Engineering (ICSE’2024). ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Modern society is diverse, multicultural, multifaceted, and highly dependent on computational solutions implemented under software engineering [1, 17]. Yet, despite the increasing emphasis on equity, diversity, and inclusion across many disciplines, software engineering still struggles with the challenges of producing software products that e�ectively represent this diversity [1]. Consequently, various types of data-driven algorithms and systems often discriminate against individuals from underrepresented groups [4, 12, 25]. Recently, researchers from various �elds have highlighted instances of systematic bias in data-driven algorithms and systems that are causing discrimination. Examples include criminal justice algorithms disproportionately targeting Black individuals, and restricting their access to health and �nancial services [6, 14, 21]. In ICSE’2024, April 2014, Lisbon, Portugal 2023. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Ronnie de Souza Santos University of Calgary Calgary, AB, Canada ronnie.desouzasantos@ucalgary.com social media, digital �lters have inadvertently altered skin tones and misidenti�ed non-white individuals [15]. Another example is applications perpetuating stereotypes and limiting the experience of LGBTQIA+ individuals [23]. These cases represent just a fraction of the damage caused by biases originating in algorithms, which then reverberate through systems and a�ect the users. Now, as with any other engineering, software engineering is concerned with the application of knowledge for the creation of wealth and quality of life in our society [24]. Hence, it is essential to thoroughly understand the harm algorithms in�ict on individuals and utilize the reported problems to enhance software engineering methods, practices, and guidelines aiming to deliver inclusive and unbiased software; otherwise, wealth and quality of life will be restricted to some groups [1]. In this sense, this study provides a meta-synthesis of research from various disciplines highlighting the problems stemming from algorithmic discrimination. To address this topic, we conducted a scoping study aiming to answer the following research question: What do we currently know about harms caused by algorithmic discrimination? From this introduction, our study is organized as follows. Section 2 explores concepts around algorithmic bias. In Section 3, we outline our methodology, while Section 4 presents the �ndings from our meta-synthesis. Section 5 discusses our �ndings and presents the implications of our study. Lastly, Section 6 summarizes our contributions. 2 BACKGROUND Algorithmic discrimination is a condition in which data-driven software contributes to unfair treatment of users based on their background, which includes attributes like ethnicity, race, gender, sexual orientation, religion, age, national origin, disability, or any other personal characteristic [12, 18]. This problem is intricately tied to biases existing in the data used within the system, as these biases can sustain or amplify preconceived prejudices, leading to discrimination, with a particular impact on individuals from underrepresented groups [13]. Biases in data-driven systems are particularly worrisome when they in�uence critical social decisions, such as determining eligibility for release from incarceration, access to loans, allocation of healthcare resources, job hiring decisions or experiences on the internet [2, 4, 10, 12, 16, 19, 25]. For this reason, algorithmic discrimination is recognized as a collective concern that transcends technology since it a�ects not only computer science and software engineering but also disciplines such as law, sociology, health, ethics, and beyond [9]. Currently, within the domain of software engineering, signi�cant e�orts are underway to tackle algorithmic discrimination. These" 2312.04838v1,"Learning Generalizable Perceptual Representations for Data-Efficient No-Reference Image Quality Assessment Suhas Srinath ∗ Shankhanil Mitra ∗ Shika Rao Rajiv Soundararajan Indian Institute of Science Bengaluru, India 560012 {suhass12, shankhanilm, shikarao, rajivs}@iisc.ac.in Abstract No-reference (NR) image quality assessment (IQA) is an important tool in enhancing the user experience in diverse visual applications. A major drawback of state-of-the-art NR-IQA techniques is their reliance on a large number of human annotations to train models for a target IQA application. To mitigate this requirement, there is a need for unsupervised learning of generalizable quality representations that capture diverse distortions. We enable the learning of low-level quality features agnostic to distortion types by introducing a novel quality-aware contrastive loss. Further, we leverage the generalizability of vision-language models by fine-tuning one such model to extract high-level image quality information through relevant text prompts. The two sets of features are combined to effectively predict quality by training a simple regressor with very few samples on a target dataset. Additionally, we design zero-shot quality predictions from both pathways in a completely blind setting. Our experiments on diverse datasets encompassing various distortions show the generalizability of the features and their superior performance in the data-efficient and zero-shot settings. 1. Introduction The increasing number of imaging devices, including cameras and smartphones, has significantly increased the volume of images captured, edited, and shared on a global scale. As a result, there is a necessity to assess the quality of visual content to enhance user experience. Image Quality Assessment (IQA) is generally divided into two categories: full-reference (FR) and no-reference (NR) IQA. While FR- IQA relies on pristine reference images for quality assessment, NR-IQA is more relevant and challenging due to the absence of clean references for user-captured images. * Equal contribution. § https://github.com/suhas-srinath/GRepQ Most successful NR IQA methods are deep-learning based, and require a large number of images with human opinion scores for training. As imaging systems evolve, the distortions also evolve, making it difficult to keep creating large annotated datasets for training NR IQA models. This motivates the study of limited data or data-efficient NR IQA models which can be trained on a target IQA application (or database) with limited labels. Such an approach works best if the learned quality representations can generalize well across different distortion types for various IQA tasks. These representations can then be mapped to quality using a simple linear model [16, 25] using the limited labels on a target application. Further, it is desirable that we learn these representations without requiring any human annotations of image quality. The goal of our work is to learn generalizable image quality representations through self-supervised learning to design data-efficient NR models for a target IQA application. In this regard, while DEIQT [22] studies the dataefficient IQA problem, they train the entire network with millions of parameters, which still requires a reasonable number of labeled training images. On the other hand, recent methods such as CONTRIQUE [16], Re-IQA [25], and QPT [4] focus on self-supervised contrastive learning to learn quality features, which can potentially yield superior performance with limited labels. However, these methods do not consider that images with different distortions could have the same quality, thereby limiting the generalizability of their image features across varied distortions. Our main contribution is the design of Generalizable Representations for Quality (GRepQ) that can predict quality by training a simple linear model with few annotations. We present two sets of features, one to capture the local low-level quality variations and another to predict quality using the global context. To capture low-level quality features, we propose a quality-aware contrastive learning strategy guided by a perceptual similarity measure between distorted versions of an image. In particular, we bring similarquality images closer in the latent space irrespective of their" 2312.04853v1,"DiffCMR: Fast Cardiac MRI Reconstruction with Diffusion Probabilistic Models † † Tianqi Xiang 1 , Wenjun Yue 1,2 , Yiqun Lin 1 , Jiewen Yang 1 , ∗ Zhenkun Wang 3 , and Xiaomeng Li 1 1 The Hong Kong University of Science and Technology, Hong Kong, China eexmli@ust.hk 2 HKUST Shenzhen Research Institute, Shenzhen, China 3 Southern University of Science and Technology, Shenzhen, China Abstract. Performing magnetic resonance imaging (MRI) reconstruction from under-sampled k-space data can accelerate the procedure to acquire MRI scans and reduce patients’ discomfort. The reconstruction problem is usually formulated as a denoising task that removes the noise in under-sampled MRI image slices. Although previous GAN-based methods have achieved good performance in image denoising, they are difficult to train and require careful tuning of hyperparameters. In this paper, we propose a novel MRI denoising framework DiffCMR by leveraging conditional denoising diffusion probabilistic models. Specifically, DiffCMR perceives conditioning signals from the under-sampled MRI image slice and generates its corresponding fully-sampled MRI image slice. During inference, we adopt a multi-round ensembling strategy to stabilize the performance. We validate DiffCMR with cine reconstruction and T1/T2 mapping tasks on MICCAI 2023 Cardiac MRI Reconstruction Challenge (CMRxRecon) dataset. Results show that our method achieves state-ofthe-art performance, exceeding previous methods by a significant margin. Code is available at https://github.com/xmed-lab/DiffCMR. Keywords: Under-sampled MRI · Cardiac MRI · MRI reconstruction · Denoising diffusion probabilistic models 1 Introduction Magnetic resonance imaging (MRI) is an important non-invasive imaging technique that visualizes internal anatomical structures without radiation doses. However, the acquisition time for MRI is significantly longer than X-ray-based imaging since a series of data points should be collected in the k-space. Particularly, cardiac magnetic resonance imaging (CMR) requires more time for acquisition as the heart beats uncontrollably and the data acquisition period should cover several heartbeat cycles. Long scanning time for MRI usually brings † ∗ These authors contributed equally. Corresponding author." 2312.04863v1,"Information divergences of Markov chains and their applications Youjia Wang ∗1 and Michael C.H. Choi †2 1 Department of Statistics and Data Science, National University of Singapore, Singapore 2 Department of Statistics and Data Science and Yale-NUS College, National University of Singapore, Singapore December 11, 2023 Abstract In this paper, we first introduce and define several new information divergences in the space of transition matrices of finite Markov chains which measure the discrepancy between two Markov chains. These divergences offer natural generalizations of classical information-theoretic divergences, such as the f -divergences and the Rényi divergence between probability measures, to the context of finite Markov chains. We begin by detailing and deriving fundamental properties of these divergences and notably gives a Markov chain version of the Pinsker’s inequality and Chernoff information. We then utilize these notions in a few applications. First, we investigate the binary hypothesis testing problem of Markov chains, where the newly defined Rényi divergence between Markov chains and its geometric interpretation play an important role in the analysis. Second, we propose and analyze information-theoretic (Cesàro) mixing times and ergodicity coefficients, along with spectral bounds of these notions in the reversible setting. Examples of the random walk on the hypercube, as well as the connections between the critical height of the low-temperature Metropolis-Hastings chain and these proposed ergodicity coefficients, are highlighted. Keywords: Markov chains; f -divergences; Rényi divergence; ergodicity coefficients; mixing times; Metropolis-Hastings AMS 2020 subject classification: 60J10, 60J20, 94A15, 94A17 ∗ † Email: e1124868@u.nus.edu Email: mchchoi@nus.edu.sg 1" 2312.04866v1,"Understanding oscillating features of the time-like nucleon electromagnetic form factors within the extending vector meson dominance model Bing Yan, 1, 2 Cheng Chen, 1, 3 Xia Li, 2 and Ju-Jun Xie 1, 3, 4, ∗ 1 Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, China College of Mathematics and Physics, Chengdu University of Technology, Chengdu 610059, China 3 School of Nuclear Sciences and Technology, University of Chinese Academy of Sciences, Beijing 101408, China 4 Southern Center for Nuclear-Science Theory (SCNT), Institute of Modern Physics, Chinese Academy of Sciences, Huizhou 516000, Guangdong Province, China 2 We investigate the nonmonotonic behavior observed in the time-like nucleon electromagnetic form factors. Using a phenomenological extending vector meson dominance model, where the ground states ρ and ω and their excited states ρ(2D), ω(3D), and ω(5S) are taken into account, we have successfully reproduced the cross sections of e + e − → pp̄ and e + e − → nn̄ reactions. Furthermore, we have derived the nucleon electromagnetic form factors in the time-like region, and it is found that the so-called periodic behaviour of the nucleon effective form factors is not confirmed. However, there are indeed nonmonotonic structures in the line shape of nucleon effective form factors, which can be naturally reproduced by considering the contributions from the low-lying excited vector states. I. INTRODUCTION Nucleons (proton and neutron) are composite particles consisting of three valence quarks (uud and udd) and a neutral sea of strong interaction. Despite the discovery of the proton over 100 years ago, an exact theoretical description of its internal structure has not been achieved within the framework of quantum chromodynamics (QCD) theory. This is due to the non-perturbative nature of QCD in the energy regime of the nucleon. On the theoretical side, the nucleon electromagnetic structure can be described by the electromagnetic form factors (EMFFs), which depends on squared of the fourmomentum (q 2 ) of the exchanged virtual photon. The EMFFs in the space-like region (q 2 < 0) are real and they can be associated with the charge and magnetic distribution of the nucleons [1]. However, in the time-like region (q 2 > 0), the EMFFs become complex, providing information on the time evolution of the nucleon’s charge and magnetic moments at the nucleonantinucleon pair formation point [2–5]. On the experimental side, the EMFFs of nucleons were measured by both the e − N → e − N elastic scattering [6–10] and e + e − → N N̄ annihilation reactions [11–20]. One can obtain the space-like form factors from the former process and the time-like form factors from the latter process, respectively. Traditionally, most experimental data on electromagnetic form factors have been collected in the space-like region through electro-proton elastic scattering. However, a new era has begun with the introduction of electron-positron annihilation reactions [21–23], where a nucleon-antinucleon pair is formed by a virtual photon. Over the past decade, the BESIII Collaboration has made significant advancements in studying the timelike effective form factors of nucleons. Within the theoretical formula proposed in Refs. [4, 5], it is found that not only the effective form factor of proton, but also the effective form factor of neutron has the periodic structures after subtracting a dipole or modified dipole contributions [18], leading to the discovery of an intriguing phenomenon known as oscillation behavior. This phenomenon has been further confirmed by recent measurements conducted by the SND Collaboration [20]. However, these new measurements conflict with previously fitted results in the energy region below 2 GeV. A comprehensive analysis of the nucleon’s electromagnetic form factors in both the space- and time-like regions using dispersion theory is conducted in Ref. [24]. For the periodic behaviour of the nucleon’s electromagnetic form factors, it has been studied in Refs. [25–33], using various phenomenological methods. It is worthy mentioning that the periodic behaviour of the nucleon’s electromagnetic form factors are induced by those broad vector mesons according to the studies in Ref. [25]. However, these vector mesons couple to N N̄ pair very weekly. In fact, a unified description of the timeand space-like electromagnetic form factors of nucleons was proposed in Ref. [34], where these low-lying vector mesons were taken into account. Meanwhile, in the time-like region, a revised Breit-Wigner formulas with momentum-dependent widths are needed for these vector resonances [34]. Indeed, the contributions of these vector mesons are important to the reactions of e + e − annihilation into light hadrons [35–43]. The vector meson dominance (VMD) model is a successful approach for studying the baryon EMFFs, in both spacelike and time-like regions [44–47]. And, within the vector meson dominance model for studying the electromagnetic form factors of baryons, there is a phenomenological intrinsic form factor g(s), which is a characteristic of valence quark structure. From these studies of the nucleon and hyperon EMFFs [44–50], it is found that a better choice of g(s) is the dipole form g(s) = ∗ Electronic address: xiejujun@impcas.ac.cn 1 , (1 − γs) 2 with γ = 1.41 GeV −2 for the case of nucleon. (1)" 2312.04882v1,"Classification of Human- and AI-Generated Texts for English, French, German, and Spanish Kristina Schaaff and Tim Schlippe and Lorenz Mindner IU International University of Applied Sciences, Germany. kristina.schaaff@iu.org; tim.schlippe@iu.org Abstract In this paper we analyze features to classify human- and AI-generated text for English, French, German and Spanish and compare them across languages. We investigate two scenarios: (1) The detection of text generated by AI from scratch, and (2) the detection of text rephrased by AI. For training and testing the classifiers in this multilingual setting, we created a new text corpus covering 10 topics for each language. For the detection of AI- generated text, the combination of all proposed features performs best, indicating that our features are portable to other related languages: The F1-scores are close with 99% for Spanish, 98% for English, 97% for German and 95% for French. For the detection of AI-rephrased text, the systems with all features outperform systems with other features in many cases, but using only document features performs best for German (72%) and Spanish (86%) and only text vector features leads to best results for English (78%). 1 generated text. As AI algorithms improve, detecting AI-generated content accurately becomes increasingly challenging, posing issues such as plagiarism, fake news generation, and spamming. Thus, tools that can differentiate between humanand AI-generated content are crucial. In Mindner et al. (2023), we explored a large number of innovative features such as text objectivity, list lookup features, and error-based features for the detection of English (EN) text generated by ChatGPT. However, in the current study, we extended this research to Spanish (ES), German (DE), and French (FR). We selected these languages, as these are amongst the most frequently used languages in the world (Ethnologue, 2023). Consequently, our contributions are as follows: • We proved, that the features we investigated in Mindner et al. (2023) can be successfully ported to other languages. • We extended our Human-AI-Generated Text Corpus 1 with FR, DE and ES articles which cover 10 topics, providing a benchmark corpus for the detection of AI-generated texts in EN, FR, DE and ES. Introduction In recent years, chatbots have gained popularity and are now widely used in everyday life (Pelau et al., 2021). These systems are designed to simulate human-like conversations and provide assistance, information, and emotional support (Dibitonto et al., 2018; Arteaga et al., 2019; Falala-Séchet et al., 2019; Adiwardana et al., 2020). OpenAI’s ChatGPT has emerged as one of the most commonly used tool for text generation (Taecharungroj, 2023). Within a short span of only five days after its release, over one million users registered (Taecharungroj, 2023). The application scenarios are manifold, ranging from children seeking help with their homework to individuals seeking medical advice or companionship. As the use of chatbots like ChatGPT becomes more prevalent in our daily lives, it is important to differentiate between human-generated and AI- • Our best systems significantly outperform the state-of-the-art system for the detection of AI- generated text ZeroGPT. 2 Related Work In the this section, we will describe the related work concerning ChatGPT and the classification of human- and AI-generated texts. 2.1 ChatGPT Since its release by OpenAI in late 2022, ChatGPT has revolutionized the field of AI (Mesko, 2023) and several other generative AIs such as Google’s Bard 2 or Llama 3 (Touvron et al., 2023) have been 1 https://github.com/LorenzM97/human-AI- generatedTextCorpus 2 https://bard.google.com 3 https://ai.meta.com/llama" 2312.04925v1,"The inertia bound is far from tight Matthew Kwan ∗ Yuval Wigderson † Abstract The inertia bound and ratio bound (also known as the Cvetković bound and Hoffman bound) are two fundamental inequalities in spectral graph theory, giving upper bounds on the independence number α(G) of a graph G in terms of spectral information about a weighted adjacency matrix of G. For both inequalities, given a graph G, one needs to make a judicious choice of weighted adjacency matrix to obtain as strong a bound as possible. While there is a well-established theory surrounding the ratio bound, the inertia bound is much more mysterious, and its limits are rather unclear. In fact, only recently did Sinkovic find the first example of a graph for which the inertia bound is not tight (for any weighted adjacency matrix), answering a longstanding question of Godsil. We show that the inertia bound can be extremely far from tight, and in fact can significantly underperform the ratio bound: for example, one of our results is that for infinitely many n, there is an n-vertex graph for which even the unweighted ratio bound can prove α(G) ≤ 4n 3/4 , but the inertia bound is always at least n/4. In particular, these results address questions of Rooney, Sinkovic, and Wocjan–Elphick–Abiad. 1 Introduction Spectral graph theory contains a wide array of deep and surprising results which relate certain combinatorial graph parameters to linear-algebraic parameters of associated matrices. Of particular importance are those results which bound the independence number α(G) of a graph G in terms of its spectrum, as such results have many applications in other areas of combinatorics (see e.g. the monographs [7, 8, 21, 22]). Probably the most famous such result is the ratio bound (also known as the Hoffman bound ). To state it, we need some notation. If G is a graph with vertex set {1, . . . , n}, we say that A is a weighted adjacency matrix of G if A ij = 0 whenever ij is not an edge of G. In other words, we can obtain A by starting with the adjacency matrix of G, and ∗ Institute of Science and Technology Austria (ISTA), 3400 Klosterneuburg, Austria. Email address: matthew.kwan@ist.ac.at. Supported by ERC Starting Grant “RANDSTRUCT” No. 101076777. † Institute for Theoretical Studies, ETH Zürich, 8092 Zürich, Switzerland. Email address: yuval.wigderson@eth-its.ethz.ch. Supported by Dr. Max Rössler, the Walter Haefner Foundation, and the ETH Zürich Foundation. 1" 2312.04926v1,"A CCELERATING C ONVOLUTIONAL N EURAL N ETWORK P RUNING VIA S PATIAL A URA E NTROPY Muşat Bogdan Transilvania University of Braşov, Romania, Department of Electrical Engineering and Computer Science, bogdan musat adrian@yahoo.com Andonie Răzvan Central Washington University, USA, Department of Computer Science razvan.andonie@cwu.edu December 11, 2023 A BSTRACT In recent years, pruning has emerged as a popular technique to reduce the computational complexity and memory footprint of Convolutional Neural Network (CNN) models. Mutual Information (MI) has been widely used as a criterion for identifying unimportant filters to prune. However, existing methods for MI computation suffer from high computational cost and sensitivity to noise, leading to suboptimal pruning performance. We propose a novel method to improve MI computation for CNN pruning, using the spatial aura entropy. The spatial aura entropy is useful for evaluating the heterogeneity in the distribution of the neural activations over a neighborhood, providing information about local features. Our method effectively improves the MI computation for CNN pruning, leading to more robust and efficient pruning. Experimental results on the CIFAR-10 benchmark dataset demonstrate the superiority of our approach in terms of pruning performance and computational efficiency. Keywords Convolutional Neural Networks, Pruning, Mutual Information, Spatial Aura Entropy, Visualization 1 Introduction Deep Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance on a wide range of computer vision tasks, such as image classification, object detection, and semantic segmentation [1, 2, 3]. These models typically consist of a large number of parameters, making them computationally expensive and memory-intensive to deploy on resource-limited devices, such as mobile phones and embedded systems. Training these models requires significant computational resources and time, which limits the ability to explore large-scale architectures and hyperparameters [4]. One promising approach to alleviate these challenges is pruning, which refers to the process of reducing the size of a neural network by removing unimportant weights, neurons, or filters, without significant loss in accuracy [5]. Pruning can result in more efficient models that require fewer parameters, consume less memory, and have faster inference time. This can be particularly important for real-time applications, where latency and energy consumption are critical factors [6]. Pruning techniques can be classified into two main categories: weight pruning and structured pruning. Weight pruning involves setting small weights to zero, which can lead to sparse connectivity patterns [7]. On the other hand, structured pruning removes entire neurons or filters, which preserves the dense connectivity patterns but reduces the model size [8]. Several recent works have explored different pruning methods, such as magnitude-based pruning [7], sensitivitybased pruning [9], and filter pruning [8], among others. These techniques can be applied during or after training and can be combined with other compression methods, such as quantization, to further reduce the model size [10]. Despite the potential benefits of pruning, there are also some challenges that need to be addressed. For example, pruning can lead to a significant increase in the number of training iterations required to recover the accuracy of the original model, which can offset the benefits of the reduced model size [11]. Moreover, the choice of the pruning" 2312.04938v1,"Beyond spin models in orbitally-degenerate open-shell nanographenes J. C. G. Henriques, 1, 2 D. Jacob, 3, 4 A. Molina-Sánchez, 5 G. Catarina, 6 A. T. Costa, 1 and J. Fernández-Rossier 1, ∗ 1 International Iberian Nanotechnology Laboratory (INL), Av. Mestre José Veiga, 4715-330 Braga, Portugal 2 Universidade de Santiago de Compostela, 15782 Santiago de Compostela, Spain 3 Departamento de Polı́meros y Materiales Avanzados: Fı́sica, Quı́mica y Tecnologı́a, Universidad del Paı́s Vasco UPV/EHU, Av. Tolosa 72, E-20018 San Sebastián, Spain 4 IKERBASQUE, Basque Foundation for Science, Plaza Euskadi 5, E-48009 Bilbao, Spain 5 Institute of Materials Science (ICMUV), University of Valencia, Catedrático Beltrán 2, E-46980 Valencia, Spain 6 nanotech@surfaces Laboratory, Empa—Swiss Federal Laboratories for Materials Science and Technology, 8600 Dübendorf, Switzerland (Dated: December 11, 2023) The study of open-shell nanographenes has relied on a paradigm where spins are the only lowenergy degrees of freedom. Here we show that some nanographenes can host low-energy excitations that include strongly coupled spin and orbital degrees of freedom. The key ingredient is the existence of orbital degeneracy, as a consequence of leaving the benzenoid/half-filling scenario. We analyze the case of nitrogen-doped triangulenes, using both density-functional theory and Hubbard model multiconfigurational and random-phase approximation calculations. We find a rich interplay between orbital and spin degrees of freedom that confirms the need to go beyond the spin-only paradigm, opening a new venue in this field of research. The prediction that graphene fragments, graphene quantum dots or graphene islands, could have an open shell ground state, with finite electronic spin S, goes back many decades [1, 2]. Their experimental study has been hampered by their large chemical reactivity, so that only ensemble measurements with paramagnetic resonance could be used. With the advent of on-surface synthesis [3], combined with surface scanning probes, the study of the magnetic properties of these fascinating systems has undergone a revolution [4–8]. It is now possible to study supramolecular structures where open-shell nanographenes, such as triangulenes, assemble to form dimers [9, 10], rings [11, 12], chains [11], and two-dimensional lattices [13]. The magnetic properties of these structures can be accounted for by spin models [11, 14–16] that feature exotic properties such as fractionalization and symmetry protected topological order [11]. Here we enhance this paradigm to address the case of molecules whose ground state has a degeneracy larger than 2S + 1 on account of their orbital degeneracy. This is motivated in part by the recent synthesis of nitrogen doped triangulenes [17–21] for which orbital degeneracy can be expected, as we discuss below. This situation has long been studied in the context of transition metal oxides [22, 23], and it is known to bring new electronic phenomena, such as quantum melting of magnetic order [24], solitonic phases [25], and spin-orbital entanglement [26]. The observation of orbital Kondo effect in carbon nanotubes [27], and proposal to use coupled spinorbital qubits in that system [28], provide additional motivation for the present work. In Fig. 1a we show a regular [3]-triangulene, together with its single particle spectrum, that features two C 3 symmetric degenerate levels at zero energy. Depicted in Fig. 1b are examples of molecules that, ignoring Jahn- Teller (JT) distortion [29], host a ground state with both orbital and spin degeneracy. This prediction is based on the existence of an odd number of electrons, that ensures a minimum spin degeneracy of 2, corresponding to S z = 1/2, and the two-fold orbital degeneracy of the highest occupied molecular orbital, predicted by tightbinding calculations. In the cases considered here, two main ingredients are at play. First, C 3 symmetry leads to vanishing of the zero mode wave functions at the central atoms and thus prevents the lifting of the degeneracy of the orbital doublets. Second, molecules with an odd number of electrons, obtained, for example, via functionalization of the molecule through the substitution of a carbon by a boron or a nitrogen atom (an alternative, not addressed here, is the presence of non-benzenoid rings). Importantly, in both cases the Ovchinnikov-Lieb rule[2, 30, 31] cannot be applied to these systems. Lieb theorem applies for the Hubbard model in bipartite lattices at half filling. In functionalized benzenoid molecules, the addition/removal of an electron takes the system away from half-filling (and for non-benzenoid molecules, the lattice is no longer bipartite). Hence, the spin of the ground state of these molecules cannot be easily anticipated. Exactly as in the case of transition metal oxides, JT distortions do occur when a single molecule is considered. In dimers, however, the orbital degeneracy is slightly lifted by intermolecular hybridization (see Fig. 1c) protecting the symmetry of the molecules from JT distortions, and preserving the availability of extra orbital states that entangle with the spin degrees of freedom. The central question that we address in this work is the following: what are the low-energy properties of supramolecular structures made with the orbitally degen-" 2312.04977v1,"Prediction of P cc states in quark model Ye Yan 1 , ∗ Hongxia Huang 1 , † Xinmei Zhu 2 , ‡ and Jialun Ping 1§ 1 School of Physics and Technology, Nanjing Normal University, Nanjing 210097, People’s Republic of China and 2 Department of Physics, Yangzhou University, Yangzhou 225009, People’s Republic of China Inspired by the observation of hidden-charm pentaquark P c and P cs states by the LHCb Collaboration, we explore the qqcc̄c (q = u or d) pentaquark systems in the quark delocalization color screening model. The interaction between baryons and mesons and the influence of channel coupling are studied in this work. Three compact qqcc̄c pentaquark states are obtained, whose masses are 5259 MeV with I(J P ) = 0(1/2 − ), 5396 MeV with I(J P ) = 1(1/2 − ), and 5465 MeV with I(J P ) = 1(3/2 − ). Two molecular states are obtained, which are I(J P ) = 0(1/2 − ) Λ c J/ψ with 5367 MeV and I(J P ) = 0(5/2 − ) Ξ ∗ cc D̄ ∗ with 5690 MeV. These predicted states may provide important information for future experimental search. PACS numbers: I. INTRODUCTION In the recent years, regarding the exotic hadron studies, one of the most noteworthy experimental progresses is the observation of the hidden-charm pentaquark states, which brings great interest in pentaquark investigations. In 2015, the LHCb Collaboration reported two states P c (4380) and P c (4450) in the J/ψp invariant mass spectrum of Λ 0 b → J/ψK − p [1]. Subsequently, the LHCb Collaboration updated their results in 2019, a new states P c (4312) was proposed, and the P c (4450) was split to P c (4440) and P c (4457) [2]. Before the LHCb collaboration’s observations, several theoretical works have predicted the existence of the hidden-charm pentaquark states [3–6]. After the experimental report, a wide range of theoretical researches on these P c states were initiated [7–74]. These states have been investigated using the QCD (Quantum Chromodynamics) sum rules [7–17], light-cone QCD sum rules [18], effective Lagrangian approach [19–26], chiral Lagrangian approach [27, 28], chiral perturbation theory [29], quasipotential Bethe–Saltpeter approach [30, 31], chiral unitary approach [32], effective field theory [33, 34], heavy quark spin symmetry [35–38], triangle singularity [39–41], Gürsey-Radicati inspired mass formula [42], constituent quark model [43–51], one-boson exchange model [52–55], color flux-tube model [56], topological soliton model [57], color-magnetic interaction model [58, 59], molecular models [60–64], and various other models [65–67]. In addition, the production mechanism of these states is also investigated in Refs. [68–71]. Given the near-threshold nature of the P c states, most of the theoretical works interpret them as molecular states. For instance, in Ref. [54], the authors performed a di- ∗ Electronic address: 221001005@njnu.edu.cn † Electronic address: hxhuang@njnu.edu.cn(Corresponding author) ‡ E-mail: xmzhu@yzu.edu.cn(Corresponding author) § Electronic address: jlping@njnu.edu.cn rect calculation using the one-boson exchange model and explicitly demonstrated that the P c (4312), P c (4440) and P c (4457) correspond to the loosely bound Σ c D̄ with (I = 1/2, J P = 1/2 − ), Σ c D̄ ∗ with (I = 1/2, J P = 1/2 − ), and Σ c D̄ ∗ with (I = 1/2, J P = 3/2 − ), respectively. More detailed reviews on the P c states can also be found in Refs. [75–77]. In 2020, the LHCb Collaboration reported a 3σ hiddencharm strange pentaquark structure P cs (4459) in the Ξ − → J/ψΛK − decay [78]. In 2022, the LHCb b Collaboration reported their results about the B − → J/ψΛp̄ decay, which indicates the existence of a new hidden-charm strange pentaquark state P cs (4338) [79]. Given that the mass of the P cs (4459) and P cs (4338) is close to the threshold of Ξ c D̄ ∗ and Ξ c D̄, respectively, it has led to various theoretical studies on the P cs states[80–118]. These states have been investigated in the framework of the QCD sum rules [80–85], lightcone QCD sum rules [86–88], effective field theory [89– 92], effective Lagrangian approach [93–96], quasipotential Bethe-Salpeter equation approach [97, 98], triangle singularity [99], heavy quark spin symmetry [100], coupled channel unitary approach [101], constituent quark model [102–105], one-boson exchange model [106–109], the color-magnetic interaction model [110], color fluxtube model [111], zero-range model and the Flatté model [112], and other models [113–117]. One of the focuses of these theoretical works is to determine the structure of the P cs states. For the P cs (4459), conclusion of molecular configuration is supported in Refs. [80, 83, 89, 92–95, 97, 100, 101, 103, 105–108], while there are also theoretical works that interpret the P cs (4459) as a compact pentaquark [81, 82, 110, 111]. For the P cs (4338), molecular configuration is preferred in Refs. [84, 85, 92, 98, 100, 103, 108, 113]. However, it can be interpreted as udscc̄ compact pentaquark state according to Ref. [110]. Determining the structure of different states in the same theoretical framework is a meaningful subject. According to the QCD sum rules results of Refs. [82, 85], the compact pentaquark nature of diquark-diquark-antiquark form with J P = 1/2 − is" 2312.04982v1,"Boosting Prompt-Based Self-Training With Mapping-Free Automatic Verbalizer for Multi-Class Classification Yookyung Kho, Jaehee Kim, Pilsung Kang Korea University, Seoul, Republic of Korea {yookyung_kho, jaehee_kim, pilsung_kang}@korea.ac.kr Abstract Recently, prompt-based fine-tuning has garnered considerable interest as a core technique for few-shot text classification task. This approach reformulates the fine-tuning objective to align with the Masked Language Modeling (MLM) objective. Leveraging unlabeled data, prompt-based self-training has shown greater effectiveness in binary and three-class classification. However, prompt-based self-training for multi-class classification has not been adequately investigated, despite its significant applicability to real-world scenarios. Moreover, extending current methods to multi-class classification suffers from the verbalizer that extracts the predicted value of manually pre-defined single label word for each class from MLM predictions. Consequently, we introduce a novel, efficient verbalizer structure, named Mappingfree Automatic Verbalizer (MAV). Comprising two fully connected layers, MAV serves as a trainable verbalizer that automatically extracts the requisite word features for classification by capitalizing on all available information from MLM predictions. Experimental results on five multi-class classification datasets indicate MAV’s superior self-training efficacy. 1 1 Introduction The language model has demonstrated impressive results in numerous practical applications by undergoing extensive pre-training using objectives such as masked language modeling and autoregressive language modeling (Peters et al., 2018; Radford and Narasimhan, 2018; Devlin et al., 2019). Recently, the prompting approach, as proposed by Radford et al. (2019) and Brown et al. (2020), has played a critical role in addressing the fewshot scenario in various natural language processing tasks (Chen et al., 2022; Ma et al., 2022; Liu et al., 2023). Schick and Schütze (2021) and Gao 1 Our code is publicly available at https://github.com/ yookyungkho/MAV. et al. (2021a) introduced a novel prompt-based fine-tuning methodology, known as PET 2 and LM- BFF 3 , which applied prompting to encoder-only models such as BERT (Devlin et al., 2019) and RoBERTa (Liu et al., 2019). Their research demonstrated the efficacy of prompt-based fine-tuning in few-shot text classification tasks, as it significantly outperformed standard fine-tuning methods. To address the scarcity of labeled data, semisupervised learning approaches have also been extensively researched by leveraging unlabeled data, which often contain sufficient contextual information (Xie et al., 2020; Chen et al., 2020; Li et al., 2021). Recent studies (Schick and Schütze, 2021; Chen et al., 2021; Zhao and Yao, 2022; Wang et al., 2022b) have experimentally demonstrated the efficacy of combining prompt-based fine-tuning with self-training. However, existing research on prompt-based self-training has focused on addressing binary classification (e.g., Sentiment Analysis) or three-class classification (e.g., Natural Language Inference) tasks (Chen et al., 2021; Wang et al., 2022b). Although leveraging unlabeled data has been a crucial aspect of multi-class classification (Song et al., 2011; Li et al., 2019; Tang et al., 2022), prompt-based self-training approaches for multi-class classification remain under-explored. The challenge in applying conventional promptbased self-training approaches to multi-class classification arises from the verbalizer. In promptbased fine-tuning, a given input sentence x (e.g., “I am happy.”) is wrapped with a pre-defined natural language sequence including [MASK] token, called template (e.g., “x: It is [MASK].”). Subsequently, verbalizer, a mapping from a label word (e.g., “good”) to a specific class (e.g., positive), extracts predicted value of the label word from the MLM prediction to generate the final predictive probability distribution. That is, the probability 2 3 Pattern Exploiting Training Better Few-shot Fine-tuning of Language Models" 2312.05002v1,"Filomat xx (yyyy), zzz–zzz (will be added later) Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Additive and multiplicative properties of Drazin inverse under a new weakly commutativity condition Rounak Biswas 1, , Falguni Roy 1 National Institute of Technology Karnataka, India Abstract. Given a complex Banach space X, let B(X) be the collection of all bounded linear operators on X. For A, B ∈ B(X) we define A, B are A-weakly commutative if there exists C ∈ B(X) satisfying AB = CA and BA = AC. The objective of this paper is to study the Drazin invertibility of A + B and AB, when A, B ∈ B(X) D are A and B-weakly commutative. Consequently, this extends some of the additive and multiplicative results established by Huanyin and Marjan Sheibani (Linear and Multilinear Algebra 70.1 (2022): 53-65) for a distinct family of elements. Moreover, we also establish these additive and multiplicative properties for g-Drazin inverses in a complex Banach algebra. 1. Introduction Throughout this paper we consider X as a complex Banach space and B(X) represents the collection of all bounded linear operators on X. For A ∈ B(X), the notations N(A), R(A) and σ(A) denotes the null space, range space, and spectrum of the operator A, respectively. The set of all invertible operators in B(X) will be denoted by B(X) inv , and I represents the identity operator on X. An operator A ∈ B(X) is Drazin invertible if there exists an operator A D ∈ B(X) such that AA D = A D A, A D AA D = A D and A(I − AA D ) ∈ B(X) nil , (1) where B(X) nil represent the collection of all nilpotent operators in B(X). The operator A D satisfying (1) is   k the Drazin inverse of A, and the least non-negative integer k satisfying A(I − AA D ) = 0 is the index of A, denoted by i(A). B(X) D stands for the collection of Drazin invertible operators in B(X) and for A ∈ B(X) D , A π denote the spectral idemoptent I − AA D . If A ∈ B(X) is a Drazin invertible operator with index k, then the Banach space X has the decomposition [14, Theorem 12.1.2] X = R(A k ) ⊕ N(A k ) = R(AA D ) ⊕ N(AA D ), 2020 Mathematics Subject Classification. 15A09; 47A05; 47L10 Keywords. Drazin inverse; g-Drazin inverse; weakly commutativity; additive properties; multiplicative properties. Received: dd Month yyyy; Accepted: dd Month yyyy Communicated by name of the Editor, mandatory * Corresponding author Email addresses: xyzrounak3@gmail.com (Rounak Biswas), royfalguni@nitk.edu.in (Falguni Roy) (2)" 2312.05029v1,"Challenges, Strengths, and Strategies of Software Engineers with ADHD: A Case Study Grischa Liebel grischal@ru.is School of Technology, Reykjavik University Reykjavik, Iceland Noah Langlois noahlanglois@hotmail.com ISAE-ENSMA Poitiers, France ABSTRACT Neurodiversity describes brain function variation in individuals, including Attention deficit hyperactivity disorder (ADHD) and Autism spectrum disorder. Neurodivergent individuals both experience challenges and exhibit strengths in the workplace. As an important disorder included under the neurodiversity term, an estimated 5.0% to 7.1% of the world population have ADHD. However, existing studies involving ADHD in the workplace are of general nature and do not focus on software engineering (SE) activities. To address this gap, we performed an exploratory qualitative case study on the experiences of people with ADHD working in SE. We find that people with ADHD struggle with several important SE- related activities, e.g., task organisation and estimation, attention to work, relation to others. Furthermore, they experience issues with physical and mental health. In terms of strengths, they exhibit, e.g., increased creative skills, perform well when solving puzzles, and have the capability to think ahead. Our findings align well with existing clinical ADHD research, and have important implications to SE practice. Lay Abstract – Neurodiversity describes brain function variation in individuals, such as Attention deficit hyperactivity disorder (ADHD) and Autism spectrum disorder. People included under this term often experience problems in their work, e.g., due to differences in communication or behaviour, but also exhibit strengths compared to people without these disorders. To better include them, it is essential that we understand how these challenges and strengths manifest in different professions. There is currently only initial research on how neurodiversity affects professionals in software engineering (SE), an environment characterised by a rapid pace, frequent change, and intense collaborative work. Therefore, we studied the strengths, challenges, and strategies of SE professionals with ADHD, a disorder affecting approximately 5.0% to 7.1% of the world population. We find that these professionals perceive many common SE activities as challenging, e.g., estimating how long tasks take, or maintaining focus. Interestingly, they also exhibit a number of strengths that are highly relevant to the SE industry, such as increased creativity and systems thinking. Based on our findings, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE ’24, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Kiev Gama kiev@cin.ufpe.br Federal University of Pernambuco (UFPE) Recife, Brazil we provide several recommendations on how SE companies can better support employees with ADHD. CCS CONCEPTS • Software and its engineering → Software creation and management; Collaboration in software development; • Human-centered computing → Empirical studies in collaborative and social computing; • Social and professional topics → People with disabilities. KEYWORDS Neurodiversity, ADHD, Inclusion, Diversity, Case Study ACM Reference Format: Grischa Liebel, Noah Langlois, and Kiev Gama. 2018. Challenges, Strengths, and Strategies of Software Engineers with ADHD: A Case Study. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (ICSE ’24). ACM, New York, NY, USA, 12 pages. https: //doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Neurodiversity describes variation in brain function among individuals, including conditions such as Attention deficit hyperactivity disorder (ADHD) and Autism spectrum disorder (ASD). Neurodivergent individuals face substantial barriers in society, e.g., due to difficulties or differences in communication, reading or writing difficulties, or reduced attention span [15]. However, the concept of neurodiversity emphasises the value and strengths of individuals with neurological differences rather than focusing on their weaknesses [14]. While computer-related jobs are often considered fitting for neurodivergent individuals or matching their interest profiles [4], there is only initial understanding of how they perform in software engineering (SE) [18, 31]. These preliminary studies provide a broader perspective on neurodiversity, without investigating more deeply any of those disorders. To improve inclusion in SE, the particular challenges and strengths of each group need to be better understood. For instance, in terms of creativity, individuals who report higher rates of ADHD symptoms outperform those with lower self-reported ADHD symptoms in divergent thinking tasks [22]. As an important disorder included under the neurodiversity term, an estimated 5.0% to 7.1% of the world population [37, 51] have ADHD. In the 2022 Stack Overflow Developer Survey [45], the top rank on the neurodiversity question consisted of 10.57% of respondents (70K developers) indicating they have a concentration and/or memory disorder (e.g., ADHD). Although limited compared to studies with children, research on ADHD in adults has grown in recent" 2312.05036v1,"Bell test of quantum entanglement in attosecond photoionization Marco Ruberti, 1, 2, ∗ Vitali Averbukh, 1 and Florian Mintert 1, 3 1 Physics Department, Blackett Laboratory, Imperial College London, Prince Consort Road, SW7 2AZ, London, United Kingdom 2 Max-Born-Institut, Max-Born-Str. 2A, 12489, Berlin, Germany 3 Helmholtz-Zentrum Dresden-Rossendorf, Bautzner Landstraße 400, 01328 Dresden, Germany (Dated: December 11, 2023) Attosecond physics enables the study of ultrafast coherent electron dynamics in matter upon photoexcitation and photoionization, revealing spectacular effects such as hole migration and coherent Auger dynamics in molecules. In the photoionization scenario, there has been a strong focus on probing the physical manifestations of the internal quantum coherence within the individual parent ion and photoelectron systems. However, quantum correlations between these two subsystems emerging from the attosecond photoionization event have thus far remained much more elusive. In this work, we design theoretically and model numerically a direct probe of quantum entanglement in attosecond photoionization in the form of a Bell test. We simulate from first principles a Bell test protocol for the case of noble gas atoms photoionized by ultrashort, circularly polarized infrared laser pulses in the strong-field regime predicting robust violation of the Bell inequality. This theoretical result paves the way to the direct observation of entanglement in the context of ultrafast photoionization of many-electron systems. Our work provides a different perspective on attosecond physics directed towards the detection of quantum correlations between systems born during attosecond photoionization and unravelling the signatures of entanglement in the ultrafast coherent molecular dynamics, including in the chemical decomposition pathways of molecular ions. Keywords: Attosecond Physics, Photoionization, Quantum Entanglement, Bell Test I. INTRODUCTION Entanglement is one of the most iconic manifestations of the laws of quantum mechanics. It is a type of correlation between different constituents of a quantum system that has no real analog in classical physics [1], and is a key ingredient for quantum information science [2], where it can be used as a resource for quantum computation, metrology and imaging [1–6]. Quantum entanglement has also received much attention in the context of atomic and molecular physics, with particular focus on the properties of the emitted entangled photons [7–9]. However, the role played by quantum entanglement in the electron dynamics in atoms and molecules remains largely unexplored and its effect on the physical processes occurring on the natural electronic, i.e. attosecond, timescale is yet to be understood. The main goal of attosecond physics is to resolve ultrafast electron dynamics in a wide variety of atomic, molecular, and condensed phase systems [10]. Following the recent spectacular advances in the synthesis and characterization of ultrashort laser pulses [11, 12], of time duration ranging from few tens of femtoseconds down to hundreds of attoseconds, a large variety of spectroscopic and imaging techniques reaching attosecond time resolution have been developed including methods based on strongfield light-matter interaction such as high-order harmonic generation (HHG) spectroscopy [13], laser-induced elec- ∗ Corresponding Author e-mail address: m.ruberti11@imperial.ac.uk tron diffraction [14], photoelectron holography [15] attosecond streaking [16] and attosecond pump-probe spectroscopy [17–19]. The key physical process that lies in the basis of these techniques, whether relying on HHG sources [20] or on X-ray free electron lasers [21], is photoionization. While photoionization is certainly one of the universally acknowledged manifestations of the quantum nature of matter that led, for example, to the discovery of energy quanta, it is far less widely appreciated that it also bears the mark of quantum entanglement [22–27]. During the photoionization process, an originally bound many-electron quantum system, such as an atom or a molecule, is broken up, in the simplest scenario, into two subsystems: the emitted photoelectron and its parent ion. In the cases where, for example, the parent ion can be found in multiple quantum states, one can expect such multi-channel photoionization to result in an entangled state of the photoelectron and the ion, in which neither of the produced spatially separated particles can be assigned particular values of the physical observables, such as energy, angular momentum or spin. The most immediate consequence of the presence of entanglement between the photoelectron and the parent ion upon photoionization is that each subsystem is in general characterized by a mixed quantum state possessing a reduced degree of internal quantum coherence [24, 28–30]. A pioneering work was able to demonstrate the reduced coherence of the ionic system by predicting theoretically and characterizing experimentally the density matrix of atomic krypton ions emerging from strong field ionization [24], while the experimental reconstruction of the photoelectron’s density matrix upon atomic photoionization has also been reported more recently [31]." 2312.05046v1,"MuVieCAST: Multi-View Consistent Artistic Style Transfer Nail Ibrahimli, Julian F. P. Kooij, Liangliang Nan Delft University of Technology Julianalaan 134, Delft 2628BL, The Netherlands {n.ibrahimli, j.f.p.kooij, liangliang.nan}@tudelft.nl Abstract We introduce MuVieCAST, a modular multi-view consistent style transfer network architecture that enables consistent style transfer between multiple viewpoints of the same scene. This network architecture supports both sparse and dense views, making it versatile enough to handle a wide range of multi-view image datasets. The approach consists of three modules that perform specific tasks related to style transfer, namely content preservation, image transformation, and multi-view consistency enforcement. We extensively evaluate our approach across multiple application domains including depth-map-based point cloud fusion, mesh reconstruction, and novel-view synthesis. Our experiments reveal that the proposed framework achieves an exceptional generation of stylized images, exhibiting consistent outcomes across perspectives. A user study focusing on novel-view synthesis further confirms these results, with approximately 68% of cases participants expressing a preference for our generated outputs compared to the recent state-of-the-art method. Our modular framework is extensible and can easily be integrated with various backbone architectures, making it a flexible solution for multi-view style transfer. More results are demonstrated on our project page: muviecast.github.io 1. Introduction Style transfer has gained popularity in computer vision for its ability to create unique and visually appealing images [5, 13, 14, 21, 25, 28, 31, 33, 35, 46, 54, 64]. Conventional style transfer techniques [13, 21, 25] involve transforming an input image to mimic the style of a reference image. 3D stylization methods instead transfer styles between 3D scene representations [2, 18, 20, 22, 30, 65]. These methods typically operate on input formats such as point clouds [2, 20, 30], meshes [18], or neural radiance fields [22, 65] to generate style transfers for a single 3D scene representation. In this work, we address multi-view style transfer, i.e. the challenge of maintaining consistency across multiple views of a static scene or object. We aim for a universal solution that works well in diverse 3D scene representation domains, removes the need for groundtruth data or precomputed 3D information, and can adapt to different datasets and view coverages [50]. More concretely, we seek a function, f (I, C, S), that takes a set of calibrated multi-view images of the scene, I = I 1 , I 2 , ..., I N , with corresponding camera parameters, C = C 1 , C 2 , ..., C N , and a style image, S, and outputs styled images that maintain both photometric and style consistency across all views. In practice, we can use Structure from Motion (SfM) [40, 41, 49] to estimate camera parameters from input images when they are not available. Formally, we define this function as f (I, C, S) = I ′ , where f transforms each input image I i to I i ′ to adopt the style of image S. The function should capture the knowledge of both the 3D geometry and 2D image structure, while retaining the input image’s content and applying the desired style, ultimately generating multi-view consistent images. To address these challenges, we propose MuVieCAST, a modular framework for consistent, flexible, and fast style transfer between multiple views of the scene. MuVieCAST comprises multiple modules to execute various tasks including feature extraction, style transfer, and consistency enforcement. Its modular design enables integration with different computer vision backbones. It offers unconstrained and pretrained options for style transfer, giving flexibility in choosing styles. Furthermore, we present multiple backbone options for customized network architectures, such as geometry learning [15, 55], feature extraction [51], and image transformation [21, 47]. In summary, our modular multi-view consistent style transfer framework offers a fast, versatile, and robust solution that accommodates both sparse and dense views, provides flexibility in terms of arbitrary and pretrained options for style transfer, and provides multiple backbone options, making it suitable for a diverse range of tasks and applications, such as novel-view synthesis, point cloud reconstruction, and mesh reconstruction." 2312.05047v1,"Converting Epics/Stories into Pseudocode using Transformers Gaurav Kolhatkar Akshit Madan SCTR’s Pune Institute of Computer Technology Pune, India gauravk403@gmail.com SCTR’s Pune Institute of Computer Technology Pune, India akmadan17@gmail.com Nidhi Kowtal Satyajit Roy SCTR’s Pune Institute of Computer Technology Pune, India kowtalnidhi@gmail.com SCTR’s Pune Institute of Computer Technology Pune, India satyajit12.roy@gmail.com Sheetal Sonawane Associate Professor SCTR’s Pune Institute of Computer Technology Pune, India sssonawane@pict.edu Abstract—The conversion of user epics or stories into their appropriate representation in pseudocode or code is a timeconsuming task, which can take up a large portion of the time in an industrial project. With this research paper, we aim to present a methodology to generate pseudocode from a given agile user story of small functionalities so as to reduce the overall time spent on the industrial project. Pseudocode is a programming language agnostic representation of the steps involved in a computer program, which can be easily converted into any programming language. Leveraging the potential of Natural Language Processing, we want to simplify the development process in organizations that use the Agile Model of Software Development. We present a methodology to convert a problem described in the English language into pseudocode. This methodology divides the Text to Pseudocode conversion task into two stages or subtasks, each of which is treated like an individual machine translation task. Stage 1 is Text to Code Conversion and Stage 2 is Code to Pseudocode Conversion. We find that the CodeT5 model gives the best results in terms of BLEU score when trained separately on the two subtasks mentioned above. BLEU score is a metric that is used to measure the similarity between a machine-translated text and a set of reference translations. Index Terms—Text to code generation, Code to Pseudocode generation, Transformers I. I NTRODUCTION Efficiency of work is of the highest importance in modern organizations and businesses. A majority of the workplaces today use the Agile Model for software development. Agile is a software development approach based on iterative development, wherein tasks are divided into smaller iterations or sprints. In Agile project management tools such as Jira are used to document the user requirements in the form of epics or user stories. Developers need to understand these requirements and write code for the same. However, a significant amount of development time and efforts can be saved by automating the process of code/pseudo code generation, especially for simple or repetitive problems that have been solved before. The motivation of our research paper is to simplify the work of developers so that they can focus on more complex tasks and in the process, to optimize the software development lifecycle. Jira is a software application used for issue tracking and project management. It is widely used by agile development teams to track bugs, stories, epics, and other tasks. Epics are large bodies of work that can be broken down into a number of smaller tasks (called stories). Stories, also called “user stories,” are short requirements or requests written from the perspective of an end user. Our aim is to convert epics/stories to pseudo code. Despite the advantages of the Agile Model, developing software may still be a difficult and drawn-out process, especially when it comes to translating user requirements into functional code. Developers often translate user epics or stories manually into code as part of this process, which can take a lot of time and work. Our study intends to investigate the potential of utilising machine learning methods and natural language processing to automate the process of generating code and pseudocode from user stories in order to address this difficulty. By doing this, we hope to streamline developers’ tasks, enhance the software development lifecycle, and boost the effectiveness of the entire industrial project. Recent advancements in the field of natural language" 2312.05071v1,"SMEFT analysis of charged lepton flavor violating B-meson decays Md Isha Ali ∗ , Utpal Chattopadhyay † , N Rajeev ‡ and Joydeep Roy § School of Physical Sciences, Indian Association for the Cultivation of Science, 2A & 2B, Raja SC Mallick Rd, Jadavpur, Kolkata - 700032, India Abstract Charged lepton flavor violation (cLFV) processes, potentially important for various Beyond the Standard Model Physics scenarios are analyzed in the Standard Model Effective Field Theory (SMEFT) framework. We consider the most relevant 2 quark-2 lepton (2q2ℓ) operators for the leptonic and semi-leptonic LFV B-decay (LFVBD) processes B s → µ + e − , B + → K + µ + e − , B 0 → K ∗0 µ + e − , and B s → ϕµ − e + . We analyse the interplay among the Wilson coefficients responsible for these LFVBDs and other cLFV processes like CR(µ → e), ℓ i → ℓ j γ, ℓ i → ℓ j ℓ k ℓ m and Z → ℓ i ℓ j , to find the maximal possible LFV effects in B-meson decays. We probe the scale of new physics in relation to the constraints imposed by both classes of the LFV decays while considering both the present bounds and future expectations. In view of proposed experiments at LHCb-II and Belle II to study charged LFV processes, we have also provided the upper limits on the indirect constraints on such LFVBDs. For the processes where B meson is decaying to µ ± and e ∓ , we show that new physics can be constrained by an enhancement of 2-4 orders of magnitude on the current sensitivities of the BRs of B + → K + µ + e − , B 0 → K ∗0 µ + e − and B s → ϕµ ± e ∓ . 1 Introduction The Standard Model (SM) [1] has been extraordinarily successful in elucidating the fundamental interactions between constituent particles. It has made precise predictions that have been verified by experiments at accelerators such as LEP [2], Tevatron [3], and the LHC [4]. The discovery of the Higgs boson at the LHC in 2012 [5] was the last missing piece of the SM puzzle, and it firmly establishes the SM as the appropriate theory for the energy range we have explored. However, SM is still far from becoming a comprehensive account of particle physics [6]. There are several experimental facts and theoretical questions that cannot be addressed by staying within the SM ∗ isha.ali080@gmail.com tpuc@iacs.res.in ‡ spsrn2733@iacs.res.in § spsjr2729@iacs.res.in † 1" 2312.05087v1,"Experimental characterization of traction-separation laws for interlaminar fracture in geometrically-scaled composites using progressive digital image correlation and through-thickness deformation analysis Han-Gyu Kim a,∗ , Ryan Howe b , Richard Wiebe c , S. Michael Spottswood d , Patrick J. O’Hara d , Marco Salviato e a Department of Aerospace Engineering, Mississippi State University, Mississippi State, MS 39762, USA b 56th Fighter Wing, 310th Fighter Squadron, Luke AFB, U.S. Air Force, Glendale, AZ 85309, USA c Department of Civil and Environmental Engineering, University of Washington, Seattle, WA 98195, USA d Structural Sciences Center, Air Force Research Laboratory, AFRL/RQHF, Wright-Patterson AFB, OH 45433, USA e Department of Aeronautics and Astronautics, University of Washington, Seattle, WA 98195, USA Abstract This work is focused on the experimental characterization of traction-separation laws for cohesive modeling of mode-II interlaminar fracture in composites. For the experimental investigation, damage progression in end-notched flexure specimens under three-point bending was captured using microscopic and macroscopic Digital Image Correlation (DIC) techniques. The specimens were geometrically scaled with three scaling levels for a size effect study. The fracture energy of the material was analyzed based on both linear elastic fracture mechanics and Bažant’s type-II size effect law for comparison. For damage modeling, tractionseparation laws were built from the experimental data, and the fracture process zones of the specimens were modeled using cohesive interactions. Difficulties in characterizing traction-separation laws merely relying on load-displacement curves (i.e., global behaviors) were demonstrated and discussed through extensive simulations. To address this issue, through-thickness deformation analysis and progressive DIC methods were proposed and implemented in this work. The observations and proposed methods herein will contribute to characterizing a single traction-separation law for a given composite material by capturing global and local fracture behaviors on any geometric scale. Keywords: traction-separation law; cohesive zone model; Bažant’s type-II size effect law; digital image correlation; mode-II interlaminar fracture; compliance calibration method 1. Introduction 1.1. Quasibrittle fracture process and size effect in composites The anisotropy and heterogeneity of composites lead to complex damage progression compared to fracture and fatigue in isotropic and homogeneous materials [1]. The fracture process in composites shows quasibrittle characteristics, which are compared with well-known brittle and ductile cases in Fig. 1 for mode-I fracture. The degree of brittleness and ductility of materials is dictated by the size of Fracture Process Zones (FPZs) in front of crack tips [2]. The size of FPZs in brittle materials (see Fig. 1a) is so small that Linear Elastic Fracture Mechanics (LEFM) are applicable, while a large nonlinear plastic (or yielding) zone is observed in the form of a horizontal yield plateau (see Fig. 1b) in the FPZs of ductile or elastoplastic materials (mainly metals). The quasibrittle fracture process (see Fig. 1c) does not demonstrate notable plastic behaviors due to its negligible hardening area; however, quasibrittle materials can deliver large cracking opening displacements with the formation of extensive softening areas compared to brittle materials. ∗ Corresponding author. Email address: hkim@ae.msstate.edu (Han-Gyu Kim) Preprint submitted to Composite Structures December 11, 2023" 2312.05103v1,"TMID: A Comprehensive Real-world Dataset for Trademark Infringement Detection in E-Commerce Tongxin Hu 1,a , Zhuang Li 2,a , Xin Jin 1 , Lizhen Qu 2,b , Xin Zhang 1 Ant Group 1 , Monash University 2 1 {tongxin.htx, king.jx, evan.zx}@antgroup.com 2 {zhuang.li1, lizhen.qu}@monash.edu Abstract Annually, e-commerce platforms incur substantial financial losses due to trademark infringements, making it crucial to identify and mitigate potential legal risks tied to merchant information registered to the platforms. However, the absence of high-quality datasets hampers research in this area. To address this gap, our study introduces TMID, a novel dataset to detect trademark infringement in merchant registrations. This is a real-world dataset sourced directly from Alipay, one of the world’s largest e-commerce and digital payment platforms. As infringement detection is a legal reasoning task requiring an understanding of the contexts and legal rules, we offer a thorough collection of legal rules and merchant and trademark-related contextual information with annotations from legal experts. We ensure the data quality by performing an extensive statistical analysis. Furthermore, we conduct an empirical study on this dataset to highlight its value and the key challenges. Through this study, we aim to contribute valuable resources to advance research into legal compliance related to trademark infringement within the e-commerce sphere. The dataset is available at https://github.com/ emnlpTMID/emnlpTMID.github.io. 1 Introduction E-commerce companies are required to register in an online platform before conducting any business activities in that platform. However, the registration information may breach trademark laws if e.g. their registration names are similar to protected trademarks. However, it is expensive and timeconsuming to check registration information manually when the number of daily registrations is large. To avoid trademark infringements and reduce manual costs, it is desirable for those online platforms to build tools to check legal compliance of the regis- a b The authors contribute equally to this work. Corresponding author. tration information automatically. However, there is no dataset to evaluate such tools rigorously. A trademark is an easily recognizable combination of signs, designs, letters, words and sounds that differentiates products or services of a company from those of others in a marketplace (Act, 2000). Detecting trademark infringement in a registration requires understanding the trademark laws in the corresponding country, identifying relevant issues and legal rules based on the understanding of the registration and relevant merchant information, and perform reasoning to draw a conclusion if there is an infringement or not. However, prior studies on trademark infringement simplify it either as a task of recognizing similar logos (Trappey et al., 2020) without considering any contexts and laws or focus on constructing trademark ontologies from precedents (Trappey et al., 2021b). The recently released large language models (LLMs) demonstrate strong abilities in reasoning and document understanding (Huang and Chang, 2022). Hence, they are applied to tackling a variety of legal tasks (Katz et al., 2023). However, researchers find out that LLMs often yield different or wrong intermediate reasoning steps than humans despite the outcomes being the same (Tang et al., 2023; Paul et al., 2023). Although it is crucial for the users of infringement detection systems to understand how and why models draw particular conclusions, it lacks studies to understand the alignments between LLMs and human experts w.r.t. legal reasoning for trademark infringement. To promote the research in the areas of trademark protection and legal reasoning, we build the first dataset on trademark infringement detection in registrations, coined TMID. The dataset consists of 17,365 pairs of merchant registration and trademark data, collected from Alipay, an e-commerce and online payment platform that primarily operates in China. Additionally, it includes a comprehensive database of auxiliary information relevant to mer-" 2312.05129v1,"Evidence for vertical line nodes in Sr 2 RuO 4 from nonlocal electrodynamics J. F. Landaeta, 1, 2 K. Semeniuk, 2 J. Aretz, 2 K. Shirer, 2 D. A. Sokolov, 2 N. Kikugawa, 3 Y. Maeno, 4 I. Bonalde, 5 J. Schmalian, 6, 7 A. P. Mackenzie, 2, 8 and E. Hassinger 1, 2, ∗ 1 Institute of Solid State and Materials Physics, TU Dresden, 01069, Dresden, Germany 2 Max Planck Institute for Chemical Physics of Solids, 01187 Dresden, Germany 3 National Institute for Materials Science, Tsukuba, 305-0003, Japan 4 5 Toyota Riken - Kyoto University Research Center (TRiKUC), Kyoto 606-8501, Japan 5 Centro de Física, Instituto Venezolano de Investigaciones Científicas, Apartado 20632, Caracas 1020-A, Venezuela 6 Institute for Theoretical Condensed Matter Physics, Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany 7 Institute for Quantum Materials and Technologies, Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany 8 Scottish Universities Physics Alliance, School of Physics and Astronomy, University of St. Andrews, St. Andrews KY16 9SS, United Kingdom (Dated: December 11, 2023) By determining the superconducting lower and upper critical fields H c1 (T ) and H c2 (T ), respectively, in a high-purity spherical Sr 2 RuO 4 sample via ac-susceptibility measurements, we obtain the temperature dependence of the coherence length ξ and the penetration depth λ down to 0.04 T c . Given the high sample quality, the observed T 2 dependence of λ at low temperatures cannot be explained in terms of impurity effects. Instead, we argue that the weak type-II superconductor Sr 2 RuO 4 has to be treated in the non-local limit. In that limit, the penetration depth data agree with a gap structure having vertical line nodes, while horizontal line nodes cannot account for the observation. INTRODUCTION Understanding the superconductivity of Sr 2 RuO 4 is a challenge that has now spanned nearly three decades [1]. The high purity of the crystals available for study, combined with the relatively simple and well-understood normal state [2] mean that this should be a soluble problem, and it has become a milestone for the whole field of unconventional superconductivity [3–9]. Progress is hindered by the lack of a complete understanding of its superconducting order parameter. Recent studies of the spin susceptibility in the superconducting state have called into question the long-held paradigm of a spintriplet, odd-parity order parameter, and provided strong evidence for a spin singlet, even-parity state[10–12]. The question of whether the order parameter breaks time-reversal symmetry or not is also the subject of ongoing investigations [13– 16]. To further inform the rejuvenated theoretical effort that these new results have stimulated, it is important to find new ways to address one of the other issues about which there is apparently conflicting information: the nodal structure of the superconducting gap. It is widely agreed, on the basis of, for example, ultrasound [17], penetration depth [18], heat capacity [19–21] and thermal conductivity [22–24] that the gap in Sr 2 RuO 4 has nodes, but different conclusions have been reached about whether these are horizontal [20, 25] or vertical [19, 22, 24]. Any information on this issue is important, because horizontal line nodes would imply mechanisms incorporating inter-plane or inter-orbital pairing [26–29], while vertical line nodes would be consistent with pairing states formed from in-plane electronic states[29–32], the latter being natural for a quasi-2D material. In this paper, we approach the problem using a technique that has not so far been employed in the study of Sr 2 RuO 4 . We perform magnetic susceptibility measurements on a nearly spherical sample sculpted from an ultra high purity single crystal with T c = 1.5 K for µ 0 H ∥ c. The measurements enable a quantitative determination of the temperature dependence of both the lower and upper critical fields, H c1 and H c2 . From this information we derive the temperature dependence of the in-plane penetration depth λ and the superconducting coherence length ξ . From the former we show that non-local electrodynamics, proposed in Ref. [33] for nodal superconductors, must be used to analyse the penetration depth results in Sr 2 RuO 4 with this level of purity. Calculations in this nonlocal limit distinguish the responses from vertical and horizontal line nodes, and our results are shown to be consistent with the prediction for vertical nodes. EXPERIMENTAL RESULTS To study the critical fields of Sr 2 RuO 4 , we measured the magnetic field dependence of the ac-susceptibility at different temperatures with the external magnetic field µ 0 H applied parallel to the crystallographic c axis. We used a high-purity sample cut into a sphere with a diameter of 470 µm using focussed ion beam (FIB) milling as shown in Fig. 1(a) (for details, see Ref. [34]). The spherical shape gives a well-defined demagnetization factor independent of the magnetic field direction and removes uncertainties from other shapes that can strongly influence the measured field values, particularly that of H c1 . The temperature dependence of the real part of the magnetic ac-susceptibility χ ′ (T ) at H = 0 is shown in Fig. 1(a). The superconducting critical temperature T c = 1.5 K reveals a high sample purity, comparable to samples having the highest T c values[35] . Figure 1(b) shows the field dependence of the ac susceptibility χ ′ (H) at 100 mK. These are the up" 2312.05132v1,"Prog. Theor. Exp. Phys. 2015, 00000 (11 pages) DOI: 10.1093/ptep/0000000000 Relativistic Faddeev 3D Equations for Three-Body Bound States Without Two-Body t−Matrices M. Mohammadzadeh 1 , M. Radin 1 , and M. R. Hadizadeh 2,3 1 Department of Physics, K. N. Toosi University of Technology, P.O.Box 163151618, Tehran, Iran, 2 College of Engineering, Science, Technology and Agriculture, Central State University, Wilberforce, OH 45384, USA, 3 Department of Physics and Astronomy, Ohio University, Athens, OH 45701, USA, ∗ E-mail: mhadizadeh@centralstate.edu ............................................................................... This paper explores a novel revision of the Faddeev equation for three-body (3B) bound states, as initially proposed in Ref. [1]. This innovative approach, referred to as t−matrix-free in this paper, directly incorporates two-body (2B) interactions and completely avoids the 2B transition matrices. We extend this formalism to relativistic 3B bound states using a three-dimensional (3D) approach without using partial wave decomposition. To validate the proposed formulation, we perform a numerical study using spin-independent Malfliet-Tjon and Yamaguchi interactions. Our results demonstrate that the relativistic t−matrix-free Faddeev equation, which directly implements boosted interactions, accurately reproduces the 3B mass eigenvalues obtained from the conventional form of Faddeev equation, referred to as t−matrix-dependent in this paper, with boosted 2B t−matrices. Moreover, the proposed formulation provides a simpler alternative to the standard approach, avoiding the computational complexity of calculating boosted 2B t−matrices and leading to significant computational time savings. .............................................................................................. Subject Index xxxx, xxx 1. Introduction Studying few-body quantum mechanical systems using the Faddeev-Yakubovsky (FY) scheme requires rigorous mathematical formalism and advanced computational techniques. The FY equations provide a non-perturbative formulation of the Schrödinger equation for three- and four-body problems, offering a reliable means to obtain converged and unique solutions. The solution of FY equations for bound and scattering systems across different sectors of physics, including atomic, nuclear, and particle physics, has been the subject of numerous studies in both momentum [1–20] and configuration [21–28] spaces. The inputs for the FY equations are 2B transition matrices t(ϵ), which are obtained by solving the inhomogeneous Lippmann-Schwinger (LS) equation for positive (scattering) or negative (bound states) 2B subsystem energies ϵ. However, solving the LS equation for positive energies can be numerically challenging due to singularities. When dealing with negative energies, it necessitates solving the LS equation for 2B subsystem energies determined by the Jacobi © The Author(s) 2012. Published by Oxford University Press on behalf of the Physical Society of Japan. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by-nc/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited." 2312.05137v1,"UVAROV PERTURBATIONS FOR MATRIX ORTHOGONAL POLYNOMIALS GERARDO ARIZNABARRETA, JUAN C. GARCÍA-ARDILA 1,✠ , MANUEL MAÑAS 2,† , AND FRANCISCO MARCELLÁN 3,† Abstract. Additive perturbations, specifically, matrix Uvarov transformations for matrix orthogonal polynomials, are under consideration. Christoffel–Uvarov formulas are deduced for the perturbed biorthogonal families, along with their matrix norms. These formulations are expressed in terms of the spectral jets of the Christoffel–Darboux kernels. 1. Introduction In this paper, we extend the analysis previously conducted on Christoffel and Geronimus perturbations, as well as their combinations explored in [1, 2, 3], by examining the case of additive perturbations to a given matrix of measures and the corresponding matrix orthogonal polynomials. The polynomial ring C p×p [x] serves as a free bimodule over the ring of matrices C p×p with the canonical basis {I p , I p x, I p x 2 , . . . }, where I p ∈ C p×p is the identity matrix. Noteworthy free bisubmodules include the sets C p×p m [x] of matrix polynomials of degree less than or equal to m. A basis for C p×p m [x], m with a cardinality of m + 1, is given by {I p , I p x, . . . , I p x }. Since C possesses the invariant basis number (IBN) property, so does C p×p (see [6]). 1 Departamento de Matemática Aplicada a la Ingenierı́a Industrial, Universidad Politécnica de Madrid, E.T.S. Ingenieros Industriales, José Gutiérrez Abascal 2, 28006 Madrid, Spain 2 Departamento de Fı́sica Teórica, Universidad Complutense de Madrid, Ciudad Universitaria, Plaza de Ciencias 1, 28040 Madrid, Spain 3 Departamento de Matemáticas, Universidad Carlos III de Madrid, Avd/ Universidad 30, 28911 Leganés, Spain E-mail addresses: juancarlos.garciaa@upm.es, manuel.manas@ucm.es, pacomarc@ing.uc3m.es. 2020 Mathematics Subject Classification. 42C05,15A23. Key words and phrases. Matrix biorthogonal polynomials, spectral theory of matrix polynomials, quasidefinite matrix of generalized kernels, Gauss–Borel factorization, matrix Uvarov transformations, Christoffel type formulas. ✠ Acknowledges financial support from Comunidad de Madrid multiannual agreement with the Universidad Rey Juan Carlos under the grant Proyectos I+D para Jóvenes Doctores, Ref. M2731, project NETA-MM. † Acknowledges financial support from Spanish “Agencia Estatal de Investigación” research project [PID2021- 122154NB-I00], Ortogonalidad y Aproximación con Aplicaciones en Machine Learning y Teorı́a de la Probabilidad. 1" 2312.05148v1,"Journal of Machine Learning for Biomedical Imaging 2023:017 vol. 2, pp. 527–546 Submitted 04/2023 Published 12/2023 Shape-aware Segmentation of the Placenta in BOLD Fetal MRI Time Series S. Mazdak Abulnaga abulnaga@mit.edu CSAIL/EECS, Massachusetts Institute of Technology, Cambridge, MA, USA MGH/HST Martinos Center for Biomedical Imaging, Harvard Medical School, Boston, MA, USA Neel Dey dey@mit.edu CSAIL, Massachusetts Institute of Technology, Cambridge, MA, USA Sean I. Young siyoung@mgh.harvard.edu MGH/HST Martinos Center for Biomedical Imaging, Harvard Medical School, Boston, MA, USA CSAIL, Massachusetts Institute of Technology, Cambridge, MA, USA Eileen Pan eileenp@mit.edu CSAIL/EECS, Massachusetts Institute of Technology, Cambridge, MA, USA Katherine I. Hobgood khobgood@mit.edu CSAIL, Massachusetts Institute of Technology, Cambridge, MA, USA Clinton J. Wang clintonw@csail.mit.edu CSAIL/EECS, Massachusetts Institute of Technology, Cambridge, MA, USA P. Ellen Grant Ellen.Grant@childrens.harvard.edu Fetal-Neonatal Neuroimaging and Developmental Science Center, Boston Children’s Hospital, Harvard Medical School, Boston, MA, USA Esra Abaci Turk Esra.AbaciTurk@childrens.harvard.edu Fetal-Neonatal Neuroimaging and Developmental Science Center, Boston Children’s Hospital, Harvard Medical School, Boston, MA, USA Polina Golland polina@csail.mit.edu CSAIL/EECS, Massachusetts Institute of Technology, Cambridge, MA, USA Abstract Blood oxygen level dependent (BOLD) MRI time series with maternal hyperoxia can assess placental oxygenation and function. Measuring precise BOLD changes in the placenta requires accurate temporal placental segmentation and is confounded by fetal and maternal motion, contractions, and hyperoxia-induced intensity changes. Current BOLD placenta segmentation methods warp a manually annotated subject-specific template to the entire time series. However, as the placenta is a thin, elongated, and highly non-rigid organ subject to large deformations and obfuscated edges, existing work cannot accurately segment the placental shape, especially near boundaries. In this work, we propose a machine learning segmentation framework for placental BOLD MRI and apply it to segmenting each volume in a time series. We use a placental-boundary weighted loss formulation and perform a comprehensive evaluation across several popular segmentation objectives. Our model is trained and tested on a cohort of 91 subjects containing healthy fetuses, fetuses with fetal growth restriction, and mothers with high BMI. Biomedically, our model performs reliably in segmenting volumes in both normoxic and hyperoxic points in the BOLD time series. We further find that boundary-weighting increases placental segmentation performance by 8.3% and 6.0% Dice coefficient for the cross-entropy and signed distance transform objectives, respectively. Keywords: Placenta, Fetus, Segmentation, BOLD MRI, Shape ©2023 Abulnaga et al.. License: CC-BY 4.0 https://doi.org/10.59275/j.melba.2023-g3f8" 2312.05161v1,"TriHuman : A Real-time and Controllable Tri-plane Representation for Detailed Human Geometry and Appearance Synthesis HEMING ZHU, Max Planck Institute for Informatics, Saarland Informatics Campus, Germany FANGNENG ZHAN, Max Planck Institute for Informatics, Saarland Informatics Campus, Germany CHRISTIAN THEOBALT, Max Planck Institute for Informatics, Saarland Informatics Campus and Saarbrücken Research Center for Visual Computing, Interaction and AI, Germany MARC HABERMANN, Max Planck Institute for Informatics, Saarland Informatics Campus and Saarbrücken Research Center for Visual Computing, Interaction and AI, Germany Novel view Input: Skeletal motion + virtual camera Novel skeletal pose Seen skeletal pose Output: Photoreal renderings Novel skeletal pose Output: Detailed geometry Fig. 1. TriHuman renders photorealistic images of the virtual human and also generates high-fidelity and topology-consistent clothed human geometry given the skeletal motion and virtual camera view as input. Importantly, our method runs in real-time due to our efficient human representation and can be solely supervised on multi-view imagery during training. Creating controllable, photorealistic, and geometrically detailed digital doubles of real humans solely from video data is a key challenge in Computer Graphics and Vision, especially when real-time performance is required. Recent methods attach a neural radiance field (NeRF) to an articulated structure, e.g., a body model or a skeleton, to map points into a pose canonical space while conditioning the NeRF on the skeletal pose. These approaches typically parameterize the neural field with a multi-layer perceptron (MLP) leading to a slow runtime. To address this drawback, we propose TriHuman a novel humantailored, deformable, and efficient tri-plane representation, which achieves real-time performance, state-of-the-art pose-controllable geometry synthesis as well as photorealistic rendering quality. At the core, we non-rigidly warp global ray samples into our undeformed tri-plane texture space, which effectively addresses the problem of global points being mapped to the same tri-plane locations. We then show how such a tri-plane feature representation can be conditioned on the skeletal motion to account for dynamic appearance and geometry changes. Our results demonstrate a clear step towards higher quality in terms of geometry and appearance modeling of humans as well as runtime performance. Additional Key Words and Phrases: Neural human rendering, pose-dependent geometry, human modeling Project page: https://vcai.mpi-inf.mpg.de/projects/trihuman Authors’ addresses: Heming Zhu, Max Planck Institute for Informatics, Saarland Informatics Campus, Germany, hezhu@mpi-inf.mpg.de; Fangneng Zhan, Max Planck Institute for Informatics, Saarland Informatics Campus, Germany, fzhan@mpi-inf.mpg.de; Christian Theobalt, Max Planck Institute for Informatics, Saarland Informatics Campus and Saarbrücken Research Center for Visual Computing, Interaction and AI, Germany, theobalt@mpi-inf.mpg.de; Marc Habermann, Max Planck Institute for Informatics, Saarland Informatics Campus and Saarbrücken Research Center for Visual Computing, Interaction and AI, Germany, mhaberma@mpi-inf.mpg.de. 1 INTRODUCTION Digitizing real humans and creating their virtual double is a longstanding and challenging problem in Graphics and Vision with many applications in the movie industry, gaming, telecommunication, and VR/AR. Ideally, the virtual double should be controllable, it should contain highly-detailed and dynamic geometry, and respective renderings should look photoreal while computations should be real-time capable. However, so far, creating high-quality and photoreal digital characters requires a tremendous amount of work from experienced artists, takes a lot of time, and is extremely expensive. Thus, simplifying character creation by learning it directly from multi-view video and making it more efficient has become an active research area in recent years, especially with the advent of deep scene representations. Recent works [Li et al. 2022; Liu et al. 2021; Wang et al. 2022a] incorporate neural radiance fields (NeRFs) into the modeling of humans due to their capability of representing rich appearance details. These methods typically map points from a global space, or posed space, into a canonical space by transforming 3D points using the piece-wise rigid transform of nearby bones or surface points of a naked human body model or skeleton. The canonical point as well as some type of pose conditioning are fed into an MLP parameterizing the NeRF in order to obtain the per-point density and color, which is then volume rendered to obtain the final pixel color. However, most methods have to perform multiple MLP evaluations per ray, which makes real-time performance impossible. To overcome this, we present TriHuman , which is the first realtime method for controllable character synthesis that jointly models detailed, coherent, and motion-dependent surface deformations of" 2312.05163v1,"Unveiling new physics with discoveries at Intensity Frontier Oleksii Mikulenko, 1, ∗ Kyrylo Bondarenko, 2 Alexey Boyarsky, 1 and Oleg Ruchayskiy 3 1 Instituut-Lorentz, Leiden University, Niels Bohrweg 2, 2333 CA Leiden, The Netherlands 2 Nordita, KTH Royal Institute of Technology and Stockholm University, Hannes Alfvéns väg 12, 10691 Stockholm, Sweden 3 Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, DK-2010, Copenhagen, Denmark (Dated: 8 December 2023) The idea of feebly interacting particles (FIPs) has emerged as an important approach to address challenges beyond the Standard Model. The next generation of Intensity Frontier experiments is set to explore these particles in greater depth. While many experiments may detect FIP signals in unexplored regions of masses and couplings, interpretation of the properties of particles behind these signals is typically neglected. In this paper, we present a novel framework designed to systematically determine the models behind a potential signal. Our approach allows us to assess the scientific reach of experiments beyond the concept of sensitivity to the smallest coupling constant leading to a detectable signal. We clarify the potential impact such signals could have on particle physics models. This paper is complemented by a Python package for the presented framework, available at ‡ omikulen/modeltesting. I. INTRODUCTION The Standard Model of particle physics provides a thorough understanding of fundamental particles and their interactions. Its validity and precision have been affirmed through continuous operations and meticulous data analyses at major experimental facilities worldwide. Despite its significant achievements, certain phenomena and anomalies remain outside of its scope. These beyond the Standard Model (BSM) problems include the true nature of dark matter, the origin of neutrino masses, and the underlying causes of baryon asymmetry in the Universe. These puzzles suggest new sectors of physics that are yet to be uncovered. The absence of signals from new particles at the electroweak scale has pivoted the community’s attention toward alternative avenues for BSM physics. Over the past decade, the concept of “feebly interacting particles” (FIPs) has garnered increasing interest as a potential paradigm for addressing these challenges [1, 2]. This perspective includes hypothetical particles with masses at the GeV-scale with the interaction strength more feeble than the weak force. These properties make FIPs a prime candidate for exploration using modern experimental techniques and significantly fueled the advancement of the Intensity Frontier program. The list of the new proposed Intensity Frontier experiments includes beam dump facilities, such as SHiP [3–5], SHADOWS [6, 7], and HIKE dump [8] ∗ mikulenko@lorentz.leidenuniv.nl at CERN or DUNE [9, 10] and DarkQuest [11] at Fermilab; or experiments alongside LHC, featuring MATHUSLA [12] and FACET [13] at the CMS site; FASER [14], SND@LHC [15, 16], AdvSND, FASER2, and ANUBIS [17] associated with ATLAS; CODEX-b [18] accompanying LHCb and AL3X [19] at ALICE. This proliferation of the Intensity Frontier experiments has been aimed at maximizing the sensitivity of detecting a signal across as wide a range of models as possible. Typically, the science reach of Intensity Frontier projects has been assessed by their capacity to advance deeper into an unexplored parameter space. In this paper, we contend, however, that the genuine “discovery potential” should be evaluated by the insights that can be derived should a signal be detected. Many of the Intensity Frontier experiments have the potential to observe not few but hundreds or even thousands of events over the lifetime of the experiment. This plethora of data opens up the possibility of studying the particle “behind the signal” in depth. One can determine not only the basic particle’s properties like mass and spin but eventually progress towards evaluating whether this newfound particle might hold the key to unresolved BSM phenomena. Our paper is devoted to the systematic exploration of this question and expands the companion paper [20]. We present a systematic framework that allows (1) to confront any discovered signal with the wide variety of BSM models and to assess their compatibility; and (2) to evaluate the discovery po-" 2312.05166v1,"Multi-Agent Reinforcement Learning via Distributed MPC as a Function Approximator Samuel Mallick ⋆ , Filippo Airaldi, Azita Dabiri, Bart De Schutter Delft Center for Systems and Control, Delft University of Technology, Delft, The Netherlands Abstract This paper presents a novel approach to multi-agent reinforcement learning (RL) for linear systems with convex polytopic constraints. Existing works on RL has demonstrated the use of model predictive control (MPC) as a function approximator for the policy and value functions. The current paper is the first work to extend this idea to the multi-agent setting. We propose the use of a distributed MPC scheme as a function approximator, with a structure allowing for distributed learning and deployment, while maintaining the properties of centralized learning. The structured MPC scheme is introduced, and it is shown that the global policy and value functions can be approximated in a fully distributed manner. We then show that Q- learning updates can be performed distributively without introducing nonstationarity, by reconstructing a centralized learning update. The effectiveness of the approach is demonstrated on an academic example and a power systems case study. Key words: Multi-agent reinforcement learning, Distributed model predictive control, Q-learning, ADMM, Networked Systems 1 Introduction Reinforcement learning (RL) [27] has proven to be a popular approach for control of complex processes. The power of RL lies in its ability to learn a control policy using only observations of state transitions and costs, without relying on a model of the system dynamics or the environment. For large or continuous state and action spaces, function approximators are commonly used to learn representations of the policy. Deep neural networks (DNNs) [3] are a prevalent choice in this context. While being powerful and general, DNNs often lack interpretability and are not conducive to safety verification. Therefore, traditional DNN-based RL is not yet widely accepted in the control community due to its inability to formally verify stability and constraint satisfaction. Alternatively, model predictive control (MPC) is a popular and extremely successful control paradigm [22]. MPC involves formulating the control problem as ⋆ Corresponding author S. Mallick. This paper is part of a project that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 101018826 - CLariNet). Email addresses: s.h.mallick@tudelft.nl (Samuel Mallick), f.airaldi@tudelft.nl (Filippo Airaldi), a.dabiri@tudelft.nl (Azita Dabiri), b.deschutter@tudelft.nl (Bart De Schutter). Preprint submitted to Automatica an optimization problem that minimizes a performance cost over a prediction horizon, subject to constraints that enforce the known dynamics and physical limitations of the system. The sequence of optimal control inputs is determined, and the first of these control inputs is applied to the system. The process is then repeated at each time step in a receding horizon fashion. An extensive body of literature on the stability and performance of MPC controllers exists [19]. MPC is however entirely model-based, with its performance depending heavily on an accurate model of the underlying system. The integration of MPC and RL is a promising direction for achieving safe and interpretable learning-based control. In the literature, MPC controllers have been used as safety filters for RL-based controllers [14]. Alternatively, learning techniques have been applied to improve the performance of MPC by iteratively improving some of the components in the optimization problem [24]. MPC has also been proposed as a replacement for the DNN function approximators in RL [11]. In this context, the optimal control action and cost of the MPC optimization problem represent the policy and value function respectively. An MPC-based policy facilitates the use of the rich theory underlying MPC for obtaining insights into the policy, and allows to deliver certificates on the resulting behavior. The state of the art for integrating MPC and RL [1, 11, 12] however relies on a centralized approach with a single learning agent. This limits its ap- 11 December 2023" 2312.05173v1,"; revised . Binaural multichannel blind speaker separation with a causal low-latency and low-complexity approach Nils L. Westhausen 1 , Student Member, IEEE, Bernd T. Meyer 1 1 Communication Acoustics, Carl von Ossietzky University, Oldenburg, Germany Corresponding author: Nils L. Westhausen (email: nils.westhausen@uni-oldenburg.de). This work was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy – EXC 2177/1 - Project ID 390895286 and by - Project-ID 352015383 - SFB 1330. ABSTRACT In this paper, we introduce a causal low-latency low-complexity approach for binaural multichannel blind speaker separation in noisy reverberant conditions. The model, referred to as Group Communication Binaural Filter and Sum Network (GCBFSnet) predicts complex filters for filter-and-sum beamforming in the time-frequency domain. We apply Group Communication (GC), i.e., latent model variables are split into groups and processed with a shared sequence model with the aim of reducing the complexity of a simple model only containing one convolutional and one recurrent module. With GC we are able to reduce the size of the model by up to 83% and the complexity up to 73% compared to the model without GC, while mostly retaining performance. Even for the smallest model configuration, GCBFSnet matches the performance of a low-complexity TasNet baseline in most metrics despite the larger size and higher number of required operations of the baseline. INDEX TERMS binaural, low-latency, multi-channel, real-time, speaker-separation. I. Introduction Enhancing speech signals in reverberant multi-talker scenarios with additional noise is a challenging problem in the context of assistive listening devices. One approach for speech enhancement and improving speech perception is speaker separation, which could alleviate challenges that hearing-impaired listeners face in many-talker social interaction. Speaker separation has seen major breakthroughs in recent years when deep-learning strategies were applied to the problem, both in the time-frequency domain [1]– [3] or by performing time-domain audio separation [4]– [6]. However, most of the proposed algorithms are offline approaches, while causal low-latency algorithms are required for hearing aids. Further, in the context of assistive listening devices, which usually exhibit multiple microphones near the left and right ear, spatial multi-channel information could be exploited for improved source separation. A number of multichannel approaches for speech enhancement and speaker separation have been proposed [7]–[10]. All of the above-mentioned algorithms are based on architectures with a large computational footprint and are not compatible with small-footprint hardware, e.g., hearing aids. The majority of these solutions does not consider low-latency constraints [7], [9] and they are implemented as multiple input single output (MISO) system, while for binaural hearing aids, it would be favorable to use binaural, multiple input multiple output (MIMO) algorithms that could preserve spatial cues. Such algorithms were also proposed for binaural blind speaker separation [11] and speech enhancement [12]. However, these approaches use the causal ConvTasnet as a backend which has because of their convolutional layers with large receptive fields a large memory footprint originating from the large amount of required rolling buffers. This memory footprint can make the application on memory redistricted low-power devices difficult. In [13], Luo et al. refined the sub-band LSTM approach from [9] to a concept of grouping the latent representation and using a shared sequence model across groups for reducing size and complexity of models. To share information across parallel groups, a Group Communication module (GC) was proposed. It was shown that grouping with GC can strongly reduce the size and the complexity of models with only minor performance drops on various architectures [14]. Some of the above-mentioned algorithms have been tested as strategy in hearing-aid processing: In [15], Bramsløw et al. showed that single channel neural-network based speaker This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME , 1" 2312.05198v1,"Fluidic FlowBots: Intelligence embodied in the characteristics of recirculating fluid flow Maks Gepner, Jonah Mack, Francesco Giorgio-Serchi, Member IEEE and Adam A. Stokes ∗ , Member IEEE Abstract— The one-to-one mapping of control inputs to actuator outputs results in elaborate routing architectures that limit how complex fluidic soft robot behaviours can currently become. Embodied intelligence can be used as a tool to counteract this phenomenon. Control functionality can be embedded directly into actuators by leveraging the characteristics of fluid flow phenomena. Whilst prior soft robotics work has focused exclusively on actuators operating in a state of transient/no flow (constant pressure), or pulsatile/alternating flow, our work begins to explore the possibilities granted by operating in the closed-loop flow recirculation regime. Here we introduce the concept of FlowBots: soft robots that utilise the characteristics of continuous fluid flow to enable the embodiment of complex control functionality directly into the structure of the robot. FlowBots have robust, integrated, no-moving-part control systems, and these architectures enable: monolithic additive manufacturing methods, rapid prototyping, greater sustainability, and an expansive range of applications. Based on three FlowBot examples: a bidirectional actuator, a gripper, and a quadruped swimmer - we demonstrate how the characteristics of flow recirculation contribute to simplifications in fluidic analogue control architectures. We conclude by outlining our design and rapid prototyping methodology to empower others in the field to explore this new, emerging design field, and design their own FlowBots. I. I NTRODUCTION A. Embodied intelligence expands the capabilities of fluidic soft robots. The field of robotics has seen a plethora of developments in using fluid pressure (pneumatic and hydraulic) to actuate compliant, soft-bodied robots [1]; these soft-robots exhibit superior capabilities over their rigid counterparts in use cases requiring high dexterity and safety during operation with humans [2], [3]. Replacing electronic controls with fluidics has also opened up the possibility of deploying soft robots in extreme environments, thanks to the inherent high power density, and temperature and radiation resistance of fluidic systems [4]–[6]. There have been a range of notable advancements in recent years for controlling fluidic soft robots using hardware that mimics digital electronic devices and architectures [7]–[22]. Despite these advancements, scaling fluidic control system to higher degrees of complexity remains difficult; a large M. Gepner, J. Mack, F. Giorgio-Serchi, and A.A. Stokes (adam.stokes@ed.ac.uk) are with The School of Engineering and The Edinburgh Centre for Robotics at The University of Edinburgh, The King’s Buildings, West Mains Road, Edinburgh, Scotland, EH9 3FF. The authors gratefully acknowledge the supported of the EPSRC CDT-RAS EP/S023208/1 For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission. *Address all correspondence to this author. number of pressure control inputs is required, and routing control signals becomes an issue [4], [23]. Attempts at overcoming this “routing problem” have included fluidic demultiplexer chips [15], oscillators [13], fluidic matrix circuits [23], as well as analogue devices that forego the need for discretisation [14], [24]. An alternative approach involves embodied intelligence, whereby control features can be embedded directly into the robot. By exploiting the mechanics of the interaction of the robot with its physical operating environment as a form of sensory feedback, the need for external control inputs can be reduced [25]–[28]. B. Internal flow characteristics can embed functionality into the structure of the actuator. In most reported-cases, and for each of the actuators cited by Section I-A, the pressure is adjusted by pumping set quantities of fluid between the individual chambers of the actuator; this transition is carried out in a one-off, pulsatile, or cyclic manner. Due to the mechanical coupling between the fluid medium and the vessels/channels containing it, the behaviour of a fluidic actuator can be directly influenced by controlling the pressure of the fluid inside of it. During the pumping phase, the flow rate of the fluid is determined by its interaction with the flow channels; this mechanical coupling influences the rate of change of the pressure distribution inside the actuator, and, therefore, the deformation of the actuator. If the characteristics of the flow can be exploited, they can be used to control the actuator. Viscous energy losses lead to a decrease in the pressure of the flowing fluid. Previous work in the field has explored exploiting this phenomenon for control purposes [29]–[33]. In their recent work [34], Matia et al. used the resultant pressure asymmetries to control the gait of a walking robot. Matia et al. accurately modelled the relationship between the timing of viscous phenomena and the inertial coupling between the fluid and the actuator; therefore, they demonstrated how controlling the timing of transient fluid flows can serve as a form of embodied intelligence. Whilst there as several other notable examples of previous fluidic soft robots that used “pulsatile”, or “cyclic” modes of flow (such as [8], [19], [35]–[38]), a condition that has not yet been explored and well-characterised in the context of soft fluidic robots is a state of continuous flow recirculation. Figure 1 illustrates the difference between soft fluidic robots based on the “steady state”, “pulsatile/cyclic”, and “recirculating” modes of flow, as defined in this paper. Fluid can be recirculated in a system for example to achieve thermal" 2312.05202v1,"Article Emergent Time and Time Travel in Quantum Physics Ana Alonso-Serrano 1,2,† , Sebastian Schuster 3,† * 1 2 3 4 * † Citation: Alonso-Serrano, A.; Schuster, S.; Visser, M. Emergent Time and Time Travel in Quantum Physics. Preprints 2023, 1, 0. https://doi.org/ Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). and Matt Visser 4,† Institut für Physik, Humboldt-Universität zu Berlin, Zum Großen Windkanal 6, 12489 Berlin, Germany Max-Planck-Institut für Gravitationsphysik (Albert-Einstein-Institut), Potsdam Science Park, Am Mühlenberg 1, 14476 Potsdam, Germany; ana.alonso.serrano@aei.mpg.de Ústav Teoretické Fyziky, Matematicko-Fyzikální Fakulta, Univerzita Karlova, V Holešovičkách 747/2, 180 00 Praha 8, Czech Republic; sebastian.schuster@utf.mff.cuni.cz School of Mathematics and Statistics, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand; matt.visser@sms.vuw.ac.nz Correspondence: sebastian.schuster@utf.mff.cuni.cz These authors contributed equally to this work. Abstract: Entertaining the possibility of time travel will invariably challenge dearly held concepts of fundamental physics. It becomes relatively easy to construct multiple logical contradictions using differing starting points from various well-established fields of physics. Sometimes, the interpretation is that only a full theory of quantum gravity will be able to settle these logical contradictions. Even then, it remains unclear if the multitude of problems could be overcome. Yet as definitive as this seems to the notion of time travel in physics, such a recourse to quantum gravity comes with its own, long-standing challenge to most of these counter-arguments to time travel: These arguments rely on time, while quantum gravity is (in)famously stuck with and dealing with the problem of time. One attempt to answer this problem within the canonical framework resulted in the Page–Wootters formalism, and its recent gauge-theoretic re-interpretation—as an emergent notion of time. Herein, we will begin a programme to study toy models implementing the Hamiltonian constraint in quantum theory, with an aim towards understanding what an emergent notion of time can tell us about the (im)possibility of time travel. Keywords: Time travel; quantum gravity; minisuperspace; Page–Wootters formalism; emergent time; relational dynamics 1. Introduction As fascinating as the notion of time travel is, its long list of problematic issues—ranging from the classical [1,2], [3, p.212ff] to the quantum theoretical [4–7]—presents a very solid case against it, and its absence is effectively a feature of the universe accessible to human experience. Yet if one wants to look closely at these arguments, cracks and loopholes start to appear—many of which shall be mentioned in the following. To an extent, it almost seems as if the best evidence against any notion of time travel is that of our daily experienced notion of time and causality, our intuition. Still, the known universe is bigger than our day-to-day experience, and particularly the field of high energy physics is ripe with examples experimentally, observationally, or theoretically open to inquiry—in which various concepts or preconceived notions of human-scale physics have to be let go. In no field of theoretical physics is this more apparent than in the quest for quantum gravity. The field of contenders is large, and still growing: String theory, loop quantum gravity, quantum geometrodynamics, asymptotic safety, causal dynamical triangulation, causal set theory, Hořava–Lifshitz gravity, . . . Each comes with its own set of new notions beyond what can be experienced directly by human senses. Yet, these proposals still have to address, in one way or another, an issue plaguing quantum gravity from its beginning: Time. This problem of time, and its eventual resolution, then naturally will also impact what these theories have to say about (or against) time travel. Classically, the ‘problem of time’ in canonical gravity is settled by a careful, gaugetheoretic analysis [8] that distinguishes the different rôles played by the Hamiltonian, either in the constraint/gauge fixing or in the definition of observables, respectively. In quantum" 2312.05207v1,"Endorsing black holes with beyond Horndeski primary hair: An exact solution framework for scalarizing in every dimension Olaf Baake 1 , Adolfo Cisterna 2 , Mokhtar Hassaine 1 and Ulises Hernandez-Vera 1 1 Instituto de Matemática y Fı́sica, Universidad de Talca, Casilla 747,Talca, Chile and 2 Institute of Theoretical Physics, Faculty of Mathematics and Physics, Charles University, V Holesovickach 2, 180 00 Prague 8, Czech Republic ∗ Abstract This work outlines a straightforward mechanism for endorsing primary hair into Schwarzschild black holes, resulting in a unique modification within the framework of a special scalar-tensor theory, the so-called beyond Horndeski type. The derived solutions are exact, showcase primary hair with an everywhere regular scalar field profile, and continuously connect with the vacuum geometry. Initially devised to introduce primary hair in spherically symmetric solutions within General Relativity in any dimension, our investigation also explores the conditions under which spherically symmetric black holes in alternative gravitational theories become amenable to the endorsement of primary hair through a similar pattern. As a preliminary exploration, we embark on the process of endorsing primary hair to the Reissner-Nordström black hole. Subsequently, we extend our analysis to encompass spherically symmetric solutions within Lovelock and cubic quasitopological gravity theories. ∗ Electronic address: olaf.baake@gmail.com, adolfo.cisterna@mff.cuni.cz, hassaine@inst-mat.utalca.cl, uhernandez.vera@gmai i" 2312.05209v1,"HALO: An Ontology for Representing Hallucinations in Generative Models Navapat Nananukul 1 and Mayank Kejriwal 1 Information Sciences Institute, University of Southern California Marina del Rey CA 90292, USA {nananuku, kejriwal}@isi.edu Abstract. Recent progress in generative AI, including large language models (LLMs) like ChatGPT, has opened up significant opportunities in fields ranging from natural language processing to knowledge discovery and data mining. However, there is also a growing awareness that the models can be prone to problems such as making information up or ‘hallucinations’, and faulty reasoning on seemingly simple problems. Because of the popularity of models like ChatGPT, both academic scholars and citizen scientists have documented hallucinations of several different types and severity. Despite this body of work, a formal model for describing and representing these hallucinations (with relevant meta-data) at a fine-grained level, is still lacking. In this paper, we address this gap by presenting the Hallucination Ontology or HALO, a formal, extensible ontology written in OWL that currently offers support for six different types of hallucinations known to arise in LLMs, along with support for provenance and experimental metadata. We also collect and publish a dataset containing hallucinations that we inductively gathered across multiple independent Web sources, and show that HALO can be successfully used to model this dataset and answer competency questions. Keywords: Hallucinations · Generative AI · Large Language Model. Ontology https://bitly.ws/34Sdp Documentation: https://bitly.ws/34L6U GitHub: https://github.com/navapatn/halo-ontology License: CC BY 4.0 International DOI: https://doi.org/10.5281/zenodo.10279463 1 Introduction The recent advent of large language models (LLMs) [16,23,31] and other generative AI (GenAI) systems [19,30,35] has led to impressive success on a wide set of tasks, in communities ranging from natural language processing to computer vision [3,26,28]. While the success of these models is promising, concerns have been raised about their responsible use and deployment [36]. Like other deep learning models preceding them, such models can be prone to faulty (and often," 2312.05227v1,"Molecular Dynamics Simulation of Nanoporous Tungsten Author names and affiliations: Jarod Worden * , Celine Hin *,** *. ME department Northern Virginia Center, Virginia Polytechnic Institute 7054 Haycock Rd, Falls Church, VA 22043, United States **. MSE department Northern Virginia Center, Virginia Polytechnic Institute 7054 Haycock Rd, Falls Church, VA 22043, United States Corresponding Author E-mail address: jaworden@vt.edu (Jarod Worden) Postal Address: Northern Virginia Center, Virginia Polytechnic Institute 7054 Haycock Rd, Falls Church, VA 22043, United States Abstract Developing materials that can withstand the intense environments of nuclear fusion reactors is critical in developing long-term commercial viability for energy production. Tungsten is the primary candidate as a plasma facing material due to its exceptional resilience in extreme fusion settings. However, the continuous high energy helium and neutron damage threatens mechanical stability, calling into question the long time commercial reliability for fusion energy generation. In order to address these issues, novel methods of nanoporous structures have been shown to suppress and annihilate the accumulation of defects that leads to structural instability that can be applied to improve the reliability of tungsten as a plasma facing material. There is currently a lack of experimental data on nanoporous Tungsten that needs to be considered when choosing appropriate applications for this material. Molecular dynamic simulations were utilized in examining the mechanical and thermodynamic response of nanoporous tungsten systems under fusion reactor relevant conditions under compressive strain. Bicontinuous nanoporous structured Tungsten with small relative densities are shown to have outstanding thermodynamic and mechanical stability under compression compared to other Tungsten systems by possessing reduced defect densities and unique defect twinning." 2312.05245v1,"This work is licensed under a Creative Commons “Attribution 4.0 International” license. Dipolar coupled core-shell perpendicular shape anisotropy MTJ with enhanced write speed and reduced cross-talk N. Caçoilo , L. D. Buda-Prejbeanu , B. Dieny , O. Fruchart , and I. L. Prejbeanu ∗ Univ. Grenoble Alpes, CEA, CNRS, Grenoble-INP, SPINTEC, 38000 Grenoble, France (Dated: December 11, 2023) The concept of Perpendicular Shape-Anisotropy Spin-Transfer-Torque Magnetic Random-Access Memory tackles the downsize scalability limit of conventional ultrathin magnetic tunnel junctions (MTJ) below sub-20 nm technological nodes. This concept uses a thicker storage layer with a vertical aspect ratio, enhancing the thermal stability factor ∆ thanks to the favorable contribution of the shape anisotropy. However, the increased aspect ratio comes with an increase in switching time under applied voltage and the cross-over to non-uniform reversal mechanism at higher aspect ratio, limiting the gain in scalability. Additionally, the larger volume of the magnetic cell significantly increases the stray field acting on the neighboring devices compared to thin MTJs. In this work, we propose the use of a dipolar-coupled core-shell system as a storage layer. This improves both bottlenecks, as predicted by micromagnetic simulations for magnetisation reversal, and a macrospin model to estimate the stray field in a dense array. Keywords: Micromagnetism, Magnetic Tunnel Junction, Shape Anisotropy, Stray Field, Spin-Transfer Torque, Core-Shell, Dipolar Coupling I. INTRODUCTION Spin-Transfer-Torque Magnetic Random-Access Memory (STT-MRAM) is one of the most promising emerging nonvolatile memory technologies. It offers nonvolatility with very large write endurance, high speed, moderate write power, and zero off consumption [1]. The retention time is related to the stability factor ∆ of the device, defined as the ratio between the energy barrier (E B ) of the storage layer and the thermal energy (k B T, where k B is Boltzmann constant and T the operating temperature). The energy barrier for usual perpendicular magnetic tunnel junctions, made of a stack of ultra-thin layers with perpendicular magnetisation (p-MTJ), can be expressed as, assuming coherent reversal:   1 k s + µ 0 M s 2 (N xx − N zz ) + K u , (1) E B = AL L 2 where A is the device area of the magnetic storage layer, L its height, k s its surface anisotropy per unit area, µ 0 the vacuum permeability, M s the spontaneous magnetisation, N ii its demagnetising factors along the plane (xx) and out-of-plane (zz), and K u the bulk uniaxial anisotropy per unit volume. The latter is usually small in conventional p-MTJs, leaving a competition between surface and shape anisotropy. For conventional p-MTJ, the lateral dimension of the storage layer is much larger than its height, resulting in a negative and large contribution of the shape anisotropy. This lowers the stability ∗ lucian.prejbeanu@cea.fr of the out-of-plane state, which is only promoted by surface anisotropy. When the p-MTJ lateral dimension is reduced, the leading variation in Eq. 1 comes through the decrease of A, which decreases the stability. In practice, this limits the scalability of the p-MTJ to diameters of around 20 nm [2]. A proposal to pushback this limit is to provide an additional source of total anisotropy energy and thus energy barrier, via the use of a thicker storage layer. Inspecting Eq.(1), we see that this works out via two aspects: (1) Decrease, in absolute value, the negative and thus destabilising impact of the in-plane shape effect per unit volume (the right part, in brackets), or even make it positive for L/D > 0.89 (for a disk shape, with D the cell diameter and thus A = πD 2 /4) (2) Increase the volume prefactor AL, which has a beneficial impact to enhance the energy barrier in the case of perpendicular shape anisotropy, i.e. for L/D > 0.89. This concept has been proven to be effective to extend the range of stability down to sub-10 nm diameter [3, 4]. However, this comes at the expense of the need for a larger writing voltage for STT switching, and longer switching time, both being a handicap for applicability. In this manuscript, we propose an alternative approach to address the writing drawbacks associated with the thick PSA pillars required at small diameter, introducing a tubular magnetic shell around the storage layer. Making use of the strong dipolar coupling existing in this system thanks to its high vertical aspect ratio, it is possible to promote a core-shell synthetic ferrimagnetic state, with antiparallel storage layer (from now on described as magnetic core) and shell. The gain introduced by this design is twofold. First, antiparallel coupling enhances stability. This allows a decrease of the total height of" 2312.05248v1,"Topology-Based Reconstruction Prevention for Decentralised Learning Florine W. Dekker ∗‡ , Zekeriya Erkin ∗ , Mauro Conti †∗ ∗ Cyber Security Group, Delft University of Technology, the Netherlands † SPRITZ, Università di Padova, Italy Email: ‡ f.w.dekker@tudelft.nl Abstract—Decentralised learning has recently gained traction as an alternative to federated learning in which both data and coordination are distributed over its users. To preserve the confidentiality of users’ data, decentralised learning relies on differential privacy, multi-party computation, or a combination thereof. However, running multiple privacy-preserving summations in sequence may allow adversaries to perform reconstruction attacks. Unfortunately, current reconstruction countermeasures either cannot trivially be adapted to the distributed setting, or add excessive amounts of noise. In this work, we first show that passive honest-but-curious adversaries can reconstruct other users’ private data after several privacy-preserving summations. For example, in subgraphs with 18 users, we show that only three passive honestbut-curious adversaries succeed at reconstructing private data 11.0% of the time, requiring an average of 8.8 summations per adversary. The success rate is independent of the size of the full network. We consider weak adversaries, who do not control the graph topology and can exploit neither the workings of the summation protocol nor the specifics of users’ data. We develop a mathematical understanding of how reconstruction relates to topology and propose the first topologybased decentralised defence against reconstruction attacks. Specifically, we show that reconstruction requires a number of adversaries linear in the length of the network’s shortest cycle. Consequently, reconstructing private data from privacypreserving summations is impossible in acyclic networks. Our work is a stepping stone for a formal theory of decentralised reconstruction defences based on topology. Such a theory would generalise our countermeasure beyond summation, define confidentiality in terms of entropy, and describe the effects of (topology-aware) differential privacy. 1. Introduction Machine learning is used in a wide array of systems, including smartwatches [1], predictive text [2], and malware detection [3]. These systems require access to large amounts of reliable data in order to function accurately. In practice, the necessary data usually exist, but are distributed over many data owners. The naive approach for data collection is to have the data owners send their data to a central server, which trains a machine learning model on these data before deploying it. However, sharing private data may result in misuse, for example in the form of targeted advertising or harassment. In an age of increasing privacy awareness, data owners may be reluctant to share their data, threatening the viability of data-intensive machine learning applications. The emerging field of federated learning [4] addresses these privacy issues by distributing the training process over the data owners. Instead of submitting their data, each data owner first trains a machine learning model on their local data and then submits this model to a central server. This central server, called the aggregator, uses a privacypreserving summation protocol to combine the received models into a single global model. The central server then sends back the global model to the data owners, who apply another round of training, repeating the entire process until the global model has converged. A significant drawback of federated learning is that communication is a bottleneck, scaling quadratically [2] or poly-logarithmically [5] in the number of users. Decentralised learning, a variant of federated learning [6], removes this bottleneck by distributing both the data and the coordination between users. Training happens in a peerto-peer fashion, with users exchanging information only with their direct neighbours. This significantly reduces the communication complexity [7], allowing for cost-effective deployments without a central server. Furthermore, because communication is local, it becomes much harder for adversaries to observe the full network [8]. Unfortunately, while there has been a recent increase of interest in decentralised learning, many works do not consider privacy [7, 9, 10], or consider privacy only against honest-but-curious adversaries [11, 12, 13]. In a recent line of publications [14, 12, 10], the authors use differential privacy proportional to the size of the user’s dataset so that it “does not leak much information about any individual data point” [12]. However, as noted by the authors, it is not clear what safety guarantees their differential privacy approach provides when it is not a single record that should be protected but the user’s entire dataset. As such, these protocols may be vulnerable to passive reconstruction attacks [15, 16]. Other works [17, 18, 19] have proposed the use of blockchains to achieve privacy in a decentralised setting, but these solutions similarly rely on record-level differential privacy and may thus be vulnerable to the same attacks. A third class of solutions comes from the field of multi-party computation [11, 20, 21], which provides strong" 2312.05291v1,"GlitchBench: Can large multimodal models detect video game glitches? Mohammad Reza Taesiri University of Alberta mtaesiri@gmail.com Tianjun Feng University of Alberta robbie020428@gmail.com Cor-Paul Bezemer University of Alberta bezemer@ualberta.ca Anh Nguyen Auburn University anh.ng8@gmail.com Abstract Large multimodal models (LMMs) have evolved from large language models (LLMs) to integrate multiple input modalities, such as visual inputs. This integration augments the capacity of LLMs for tasks requiring visual comprehension and reasoning. However, the extent and limitations of their enhanced abilities are not fully understood, especially when it comes to real-world tasks. To address this gap, we introduce GlitchBench, a novel benchmark derived from video game quality assurance tasks, to test and evaluate the reasoning capabilities of LMMs. Our benchmark is curated from a variety of unusual and glitched scenarios from video games and aims to challenge both the visual and linguistic reasoning powers of LMMs in detecting and interpreting out-of-the-ordinary events. We evaluate multiple state-ofthe-art LMMs, and we show that GlitchBench presents a new challenge for these models. Code and data are available at: https://glitchbench.github.io/ 1. Introduction The video game industry boasts an estimated annual revenue of USD 217 billion [57] with a total of 3.2 billion gamers worldwide in 2022 [1]. Automatically detecting ingame glitches is, therefore, a highly demanding task, but that remains a long-standing challenge [12, 39, 51, 55, 56, 65, 66, 72, 83]. A glitch is an unexpected frame that occurs within a game due to either an unforeseen software bug, player actions, or unanticipated interactions between game elements and does not result in a program crash. From a computer vision perspective, glitch detection involves recognizing an extremely wide spectrum of long-tail video frames, from rendering (e.g., 3D objects with missing textures; Fig. 2f), unrealistic physics (e.g., two people sitting in an invisible car; Fig. 2b), to semantic errors (e.g., indoor GPT-4V fails to focus on the rain inside the room Question: What is wrong with this image? Ground truth: It is raining inside the building GPT-4V: There’s nothing inherently “wrong” with this image; however, if you’re referring to inconsistencies or peculiarities that might not align with the established Batman canon, the red Batman suit is unusual since Batman is traditionally known in black or very dark colors. The use of red could be an artistic choice for the game, an alternate suit available within the game’s universe, or indicative of a different character who takes on the Batman mantle. Figure 1. The image depicts a screenshot in which it rains inside a room. While the rain should be what is wrong with the image, GPT-4V fails to reason correctly and instead focuses on the color of Batman’s costume. Note that the ground truth is never presented as part of the prompt in our study. rain; Fig. 1). Unlike software bugs that can be caught by examining the code alone, glitches are more non-trivial to detect because they are mostly the result of a one-time event that unexpectedly happens in-game." 2312.05293v1,"MNRAS 527, 7036–7046 (2024) https://doi.org/10.1093/mnras/stad3642 Advance Access publication 2023 No v ember 23 Interferometric apodization by homothety – II. Experimental validation J. Chafi , 1 , 2 ‹ Y. El Azhari, 1 , 2 , 3 ‹ O. Azagrouze, 1 , 2 , 3 A. Jabiri, 1 , 2 A. Boskri , 1 , 2 Z. Benkhaldoun and A. Habib 1 , 2 , 3 1 , 2 1 LPHEA, Facult é des Sciences Semlalia, Universit é Cadi Ayyad, Av. Prince My Abdellah, BP 2390 Marr akec h, Morocco 3 Centre R égional des M étiers de l’Education et de la Formation de Marr akec h, 40000 Marr akec h, Morocco Accepted 2023 No v ember 22. Received 2023 October 25; in original form 2023 August 14 A B S T R A C T This work presents the results of experimental laboratory tests on the apodization of circular and rectangular apertures using the Interferometric Apodization by Homothety (IAH) technique. The IAH approach involves splitting the amplitude of the instrumental PSF into two equal parts. One of the two produced PSFs undergoes homothety to change its transverse dimensions while its amplitude is properly controlled. The two PSFs are then combined to produce an apodized image. The diffraction wings of the resulting PSF are subsequently reduced by some variable reduction factor, depending on an amplitude parameter γ and a spread parameter η. This apodization approach was implemented in the laboratory using an interferometric set-up based on the Mach–Zehnder Interferometer (MZI). The experimental results exhibit a strong agreement between theory and experiment. For instance, the average experimental contrast obtained at a low angular separation of 2.4 λ/ D does not exceed 5 × 10 −4 . This work also allowed us to study the influence on the apodizer’s performance of some parameters, such as the wavelength and the density of the neutral filters. Key words: instrumentation: high angular resolution – instrumentation: interferometers – techniques: high angular resolution – techniques: interferometric. 1 I N T RO D U C T I O N In high-dynamic range imaging, apodization is a commonly used technique for enhancing the performance of coronagraphs (Soummer 2005 ; Soummer et al. 2009 ). In the field of direct detection of exoplanets, the utility of apodized pupils has been studied by Nisenson & Papaliolios ( 2001 ). Aime, Soummer & Ferrari ( 2001 ) suggested using interferometry for pupil apodization, and later, Aime, Soummer & Ferrari ( 2002 ); Soummer, Aime & Falloon ( 2003 ) showed that the rejection produced by a Lyot coronagraph could be impro v ed by apodizing the entrance pupil with a prolate spheroidal function. Subsequently, Soummer ( 2005 ) demonstrated that for a random pupil, solutions based on prolate functions could also checked the performance of the Lyot coronagraph. Aime ( 2005 ) proposed apodizing a circular aperture using an MZI and employing thin lenses with opposite vergence to achieve apodization. This apodization technique was experimentally verified by El Azhari et al. ( 2005 ) and Azagrouze, El Azhari & Habib ( 2008 ) using a Michelson interferometer (MI), and also by Carlotti et al. ( 2008 ) using a MZI. Furthermore, N’diaye et al. ( 2012 ) explored the application of an apodization concept, the ‘Four Quadrant Zeroth Order Grating (4QZOG)’, developed by Mawet et al. ( 2005 ), in coronagraphy. They demonstrated that using coloured apodization applied before a ‘Dual Zone Phase Mask  E-mail: (YEA) chafi.jamal2@gmail.com (JC); youssef.elazhari@men.gov.ma (DZPM)’ coronagraph can enhance the contrast performance o v er a broader spectral band, thereby optimizing performance in the presence of various types of noise. The grey-scale apodizers were converted into binary masks for manufacturing reasons, leading to the emergence of Apodized Pupil Lyot Coronagraphs (APLC; N’Diaye et al. 2016 ; Zimmerman et al. 2016 ), used in instruments such as VLT/SPHERE (Guerri et al. 2011 ) and Gemini/GPI (Si v aramakrishnan et al. 2010 ). These coronagraphs are also planned for future space telescopes such as the Roman Space Telescope ( RST ; Zimmerman et al. 2016 ), LUVOIR-A, and LUVOIR-B (Stahl, Shaklan & Stahl 2015 ; Leboulleux et al. 2017 ; Stahl 2017 ; Leboulleux et al. 2018a ; Leboulleux et al. 2018b ; Laginja et al. 2019 ; The LUVOIR Team 2019 ; Laginja et al. 2020 ; Stahl, Nemati & Stahl 2020 ; Laginja et al. 2021 ; Juanola-Parramon et al. 2022 ). Second-generation ground-based imagers, such as the Planetary Camera and Spectrograph (PCS) for the ELT (Kasper, Verinaud & Mawet 2013 ), the Planetary Systems Imager (PSI) for the Thirty Meter Telescope (TMT; Fitzgerald et al. 2019 ) and GMagAO-X for the Giant Magellan Telescope (GMT; Males et al. 2018 ) will target fainter and closer planets to their host stars, ranging from young Jupiter’s to terrestrial planets. The Astro2020 Decadal Surv e y by NASEM (National Academies of Sciences, Engineering, and Medicine 2021 ) also supports the development of large space telescopes to observe Earth-like exoplanets, such as LUVOIR-B (The LUVOIR Team 2019 ) and Habitable Exoplanet (HabEx; Gaudi et al. 2020 ). Carlotti ( 2013 ) and Carlotti, Pueyo & Mawet ( 2014 ) focused their research on the apodization of vortex phase mask coronagraphs for © 2023 The Author(s). Published by Oxford University Press on behalf of Royal Astronomical Society. This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( https:// creativecommons.org/ licenses/ by/ 4.0/ ), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. Downloaded from https://academic.oup.com/mnras/advance-article/doi/10.1093/mnras/stad3642/7445003 by guest on 08 December 2023 2 Oukaimeden Observatory, Cadi Ayyad University, 40273 Marr akec h, Morocco" 2312.05326v1,"Regular Black Holes in D = 2 + 1 with f (R) Gravity A. C. L. Santos, 1, ∗ R. V. Maluf, 1, 2, † and C. R. Muniz 3, ‡ 1 Universidade Federal do Ceará (UFC), Departamento de Física, Campus do Pici, Fortaleza - CE, C.P. 6030, 60455-760 - Brazil. 2 Departamento de Física Teórica and IFIC, Centro Mixto Universidad de Valencia - CSIC. Universidad de Valencia, Burjassot-46100, Valencia, Spain. 3 Universidade Estadual do Ceará (UECE), Faculdade de Educação, Ciências e Letras de Iguatu, Av. Dário Rabelo s/n, Iguatu-CE, 63.500-00 - Brazil. (Dated: December 12, 2023) Abstract Despite the experimental success of general relativity in the scales it has been tested, there are still some inconsistencies, such as explaining the acceleration of the universe and singularities. f (R) gravity has emerged to provide corrections to the Ricci scalar, leading to new equations of motion that could explain this acceleration. On the other hand, Regular Black Holes, supported by non- linear electrodynamics, have well-defined curvature scalars but often violate energy conditions. In this work, we investigate how to obtain regular solutions in (2 + 1) dimensions by considering f (R) gravity and non-linear electrodynamics. Subsequently, we find that non-linear electrodynamics models that guarantee regular solutions in General Relativity do not produce regular solutions in f (R) theory. Finally, we observe that energy conditions are still violated in f (R) gravity. Keywords: Regular Black Holes. Non-linear Electrodynamics. Gravity Modified Theories. ∗ Electronic address: alanasantos@fisica.ufc.br † Electronic address: r.v.maluf@fisica.ufc.br ‡ Electronic address: celio.muniz@uece.br 1" 2312.05332v1,"Proceedings of Machine Learning Research vol vvv:1–15, 2024 Bridging the Gaps: Learning Verifiable Model-Free Quadratic Programming Controllers Inspired by Model Predictive Control Yiwen Lu Zishuo Li Yihan Zhou Na Li Yilin Mo LUYW 20@ MAILS . TSINGHUA . EDU . CN LIZS 19@ MAILS . TSINGHUA . EDU . CN ZHOUYH 23@ MAILS . TSINGHUA . EDU . CN NALI @ SEAS . HARVARD . EDU YLMO @ TSINGHUA . EDU . CN Abstract In this paper, we introduce a new class of parameterized controllers, drawing inspiration from Model Predictive Control (MPC). These controllers adopt a Quadratic Programming (QP) structure similar to linear MPC, with problem parameters being learned rather than derived from models. This approach may address the limitations of commonly learned controllers with Multi-Layer Perceptron (MLP) architecture in deep reinforcement learning, in terms of explainability and performance guarantees. The learned controllers not only possess verifiable properties like persistent feasibility and asymptotic stability akin to MPC, but they also empirically match MPC and MLP controllers in control performance. Moreover, they are more computationally efficient in implementation compared to MPC and require significantly fewer learnable policy parameters than MLP controllers. Practical application is demonstrated through a vehicle drift maneuvering task, showcasing the potential of these controllers in real-world scenarios. 1. Introduction Recent years have witnessed the development of Deep Reinforcement Learning (DRL) in the domain of control (Lillicrap et al., 2015; Duan et al., 2016; Haarnoja et al., 2018), with the locomotion control of agile robots (Xie et al., 2018; Li et al., 2021; Margolis et al., 2022; Rudin et al., 2022) being a notable example. Many successful control applications use Multi-Layer Perceptron (MLP) as the entirety or a part of the policy, which, despite their remarkable empirical performance, face limitations in terms of explainability (Agogino et al., 2019) and performance guarantees (Osinenko et al., 2022). Research efforts have been devoted to the stability verification of MLP controllers (Dai et al., 2021; Zhou et al., 2022), structured controller parameterizations (Srouji et al., 2018; Johannink et al., 2019; Sattar and Oymak, 2020; Ni et al., 2021), or a combination of both (Zinage and Bakolas, 2023), and the learning of explainable and verifiable controllers has remained an active topic. On the other hand, for ensuring stability and safety, Model Predictive Control (MPC) has been well-studied (Morari and Lee, 1999; Qin and Badgwell, 2003; Schwenzer et al., 2021). Recently, there has been a growing interest on augmenting MPC with learning, a large portion of which are focused on addressing the challenges in designing critical components of MPC like prediction models (Desaraju and Michael, 2016; Soloperto et al., 2018; Hewing et al., 2019), terminal costs and constraints (Brunner et al., 2015; Rosolia and Borrelli, 2017; Abdufattokhov et al., 2021), and stage costs (Englert et al., 2017; Menner et al., 2019); readers are referred to Hewing et al. (2020) for a comprehensive overview. Most of the methods follow a model-based framework – using data to estimate a model and then perform optimal control at each receding horizon. These methods still © 2024 Y. Lu, Z. Li, Y. Zhou, N. Li & Y. Mo." 2312.05334v1,"ProsDectNet: Bridging the Gap in Prostate Cancer Detection via Transrectal B-mode Ultrasound Imaging Sulaiman Vesal 1,2 , Indrani Bhattacharya 2 , Hassan Jahanandish 1 , Xinran Li 3 , Zachary Kornberg 1 , Steve Ran Zhou 1 , Elijah Richard Sommer 4 , Moon Hyung Choi 1 , Richard E. Fan 1 , Geoffrey A. Sonn 1,* , and Mirabela Rusu 1,2∗ 1 Department of Urology, Stanford University, Stanford, CA, 94305, USA Department of Radiology, Stanford University, Stanford, CA, 94305, USA 3 Institute for Computational and Mathematical Engineering, Stanford University, Stanford, CA, 94305, USA 4 School of Medicine, Stanford University, Stanford, CA, 94305, USA svesal@stanford.edu 2 Abstract Interpreting traditional B-mode ultrasound images can be challenging due to image artifacts (e.g., shadowing, speckle), leading to low sensitivity and limited diagnostic accuracy. While Magnetic Resonance Imaging (MRI) has been proposed as a solution, it is expensive and not widely available. Furthermore, most biopsies are guided by Transrectal Ultrasound (TRUS) alone and can miss up to 52% cancers, highlighting the need for improved targeting. To address this issue, we propose ProsDectNet, a multi-task deep learning approach that localizes prostate cancer on B-mode ultrasound. Our model is pre-trained using radiologist-labeled data and fine-tuned using biopsy-confirmed labels. ProsDectNet includes a lesion detection and patch classification head, with uncertainty minimization using entropy to improve model performance and reduce false positive predictions. We trained and validated ProsDectNet using a cohort of 289 patients who underwent MRI-TRUS fusion targeted biopsy. We then tested our approach on a group of 41 patients and found that ProsDectNet outperformed the average expert clinician in detecting prostate cancer on B-mode ultrasound images, achieving a patient-level ROC-AUC of 82%, a sensitivity of 74%, and a specificity of 67%. Our results demonstrate that ProsDectNet has the potential to be used as a computer-aided diagnosis system to improve targeted biopsy and treatment planning. 1 Introduction Transrectal ultrasound-guided (TRUS) biopsy procedures are commonly used for diagnosing prostate cancer [15]. While B-mode TRUS images enable urologists to guide the biopsy needle in real-time, their low sensitivity in detecting prostate cancer due to shadowing artifacts and low signal-to-noise ratio remains a challenge [7, 3]. Although MRI has improved the accuracy of prostate biopsies through fusion with TRUS, MRI remains underutilized due to limited accessibility and lack of interpretation expertise. Thereby, ultrasound remains the most common imaging modality for prostate cancer diagnosis [1], being used in 93% of biopsy procedures in the absence of MRI [7]. However, such TRUS-only biopsy procedures miss up to 52% of clinically significant cancers [1] due to systematic sampling of the prostate without targeting suspicious regions. Therefore, it is crucial to ∗ Equal contribution as senior authors. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.05342v1,"Occasionally Misspecified Jean-Jacques Forneron ∗ December 12, 2023 Abstract When fitting a particular Economic model on a sample of data, the model may turn out to be heavily misspecified for some observations. This can happen because of unmodelled idiosyncratic events, such as an abrupt but short-lived change in policy. These outliers can significantly alter estimates and inferences. A robust estimation is desirable to limit their influence. For skewed data, this induces another bias which can also invalidate the estimation and inferences. This paper proposes a robust GMM estimator with a simple bias correction that does not degrade robustness significantly. The paper provides finite-sample robustness bounds, and asymptotic uniform equivalence with an oracle that discards all outliers. Consistency and asymptotic normality ensue from that result. An application to the “Price-Puzzle,” which finds inflation increases when monetary policy tightens, illustrates the concerns and the method. The proposed estimator finds the intuitive result: tighter monetary policy leads to a decline in inflation. JEL Classification: C11, C12, C13, C32, C36. Keywords: Leveraged outliers, Structural Vector-Autoregression, Instrumental Variables. ∗ Department of Economics, Boston University, 270 Bay State Road, Boston, MA 02215 USA. Email: jjmf@bu.edu, Website: http://jjforneron.com. I would like to thank Richard Crump, Claire Labonne, participants at the CREST/PSE/Science Po and Wisconsin Econometrics seminars, and the BC/BU Greenline workshop for useful comments and suggestions." 2312.05353v1,"Exact solution of a lambda quantum system driven by a two-photon wavepacket W. Lopes 1 and D. Valente 1∗ 1 Instituto de Fı́sica, Universidade Federal de Mato Grosso, Cuiabá, MT, Brazil Three-level atoms in lambda configuration find diverse applications in quantum information processing, and a promising way to manipulate their quantum states is with single-photon pulses propagating in a waveguide (which can be theoretically regarded as a highly broadband regime of the Jaynes-Cummings model). Here, we analytically find the non-perturbative dynamics of a lambda atom driven by a two-photon wavepacket, propagating in a one-dimensional electromagnetic environment. As an application, we study the dynamics of a quantum state purification. By comparing our exact model with an approximated model of two cascaded single-photon wavepackets, we show how two-photon nonlinearities and stimulated emission affect the purification. I. INTRODUCTION Two-level quantum systems can play the role of qbits, i.e., quantum bits of information. Implementing a logical qbit within the two ground states of a three-level atom in Λ configuration has the advantage that the excited state provides an energetic barrier, blocking unwanted jumps between the two target states, thus increasing the stability of physical operations. This motivates various applications of the Λ atoms, such as in quantum memories [1, 2], quantum cloning [3–7], and quantum state purification [8, 9]. To achieve efficient manipulation of the atom, one can either employ optical cavities or one-dimensional (1D) waveguides. Waveguides are especially desirable if one wishes that a propagating single-photon wavepacket interacts with a single atom, for instance if the photon works as a flying qubit making distant atoms in a network to communicate [10–13]. From a theoretical viewpoint, these engineered 1D environments can be described as the highly broadband regime of the Jaynes-Cummings (JC) model [14–16]. This has unraveled a rich diversity of effects, including non- Markovianity [17], broadband photon-photon correlations [18–20], irreversible stimulated emission [5, 6, 21], as well as the application of quantum mirrors in Fabry-Perot [22] and Mach-Zehnder [23] interferometers. Here, our main motivation is to understand how the type of quantum state purification for a Λ atom as proposed in Ref.[8] is affected by a two-photon wavepacket. To that end, we present an exact non-perturbative solution, in realspace representation, for the dynamics of a two-photon wavepacket interacting with a single Λ system in a broadband one-dimensional environment. We describe light-matter interaction by employing the broadband JC model, and analytically compute the quantum state of the composite atom-plus-field system within the two-excitation subspace. We obtain the transition probability between the two ground states of the atom, depending on the initial two-photon pulse parameters. In order to highlight the presence of two-photon nonlinearities, we compare our exact results with the effective model of two cascaded (consecutive) single-photon wavepackets. II. MODEL We consider a global time-independent Hamiltonian of the system and its environment, H = H S + H I + H E . We model light-matter interaction via a dipole coupling, in the rotating-wave approximation [5, 6, 14–17], X H I = −iℏ (g a a ω σ a † + g b b ω σ b † − H.c.), (1) (2) ω where σ k = |k⟩⟨e| (for k = a, b) and H.c. is the Hermitian conjugate. Orthogonal polarization modes {a ω } and {b ω } respectively interact with transitions |a⟩ to |e⟩ and |b⟩ to |e⟩. This is a multi-mode Jaynes-Cummings model, and our interest is in the limit of a broadband continuum of frequencies, Z Z X → dωϱ ω ≈ ϱ dω, (3) ω ∗ Electronic address: valente.daniel@gmail.com" 2312.05376v1,"Realizing abstract simplicial complexes with specified edge lengths Matthew Ellison matthew.ellison.gr@dartmouth.edu Dartmouth College Abstract For finite abstract simplicial complex Σ, initial realization α in E d , and desired edge lengths L, we give practical sufficient conditions for the existence of a non-self-intersecting perturbation of α realizing the lengths L. We provide software to verify these conditions by computer and optionally assist in the creation of an initial realization from abstract simplicial data. Applications include proving the existence of a planar embedding of a graph with specified edge lengths or proving the existence of polyhedra (or higher-dimensional polytopes) with specified edge lengths. 1 Introduction Consider the problem of whether a finite abstract simplicial complex 1 may be realized in E d with flat faces, no self-intersection, and prescribed edge lengths. One resolution is to assign coordinates to the vertices so the edge lengths are exactly as prescribed. All faces are then fixed, and one may verify the realization is non-self-intersecting. More generally, any rigorous exact geometric construction resolves the problem. We pursue a different approach. Suppose we have an assignment of coordinates to the polytope vertices so the edge lengths are approximately correct. Such an assignment might be produced by computer simulation, or, perhaps, approximate physical construction and measurement. If one proved the existence of a perturbed assignment where (i) the edge lengths are exactly correct and (ii) the perturbated realization is non-self-intersecting, then the problem is also resolved. In this paper, we prove practical sufficient conditions for such a perturbation to exist. We also provide code, in the form of a Python3 package, which may be used to prove existence from abstract simplicial data, desired edge lenghts, and an approximate realization. The code can optionally assist in creating the approximate realization. See Section 5 for example applications. Related results include Steinitz’s Theorem ([7][3][9]), which gives necessary and sufficient conditions for a graph to be the net of a three-dimensional convex polyhedron; recent work by Abrahamsen at al ([1]) which establishes the NP-hardness of deciding whether a k-dimensional abstract simplicial complex admits a geometric embedding in R d for d ≥ 3 and k = d − 1, d; and work by Cabello, Demaine, and Rote ([6]) on the planar embedding of graphs with specified edge lengths. 2 Perturbing to obtain edge lengths In this section we provide sufficient conditions for the existence of a perturbed realization — possibly selfintersecting — with edge lengths exactly correct. We will address self-intersection in the following section. Let Σ be an finite abstract simplicial complex with vertex set V and edge set E. Higher dimensional structure is not relevant in this section. Consider the map l 2 : R d|V | → R |E| , which takes coordinates of vertices to square lengths of edges. 2 We choose square lengths of edges because we will be taking derivatives shortly. Let α ∈ R d|V | denote our initial approximate realization, and let l ∗ 2 ∈ R |E| denote our desired square edge lengths for Σ. 1 Recall an abstract simplicial complex is a set S of vertices together with a set of subsets ∆ corresponding to edges, triangular faces, tetrahedral volumes, etc. A simplex must contain all its faces, so ∆ must be closed under subsets. 2 Fixing, once and for all, an ordering of the vertex components and edges. 1" 2312.05391v1,"L OSS F UNCTIONS IN THE E RA OF S EMANTIC S EGMENTATION : A S URVEY AND O UTLOOK Reza Azad* Faculty of Electrical Engineering and Information Technology, RWTH Aachen University Aachen, Germany Moein Heidari* School of Electrical Engineering Iran University of Science and Technology Tehran, Iran Kadir Yilmaz* Faculty of Electrical Engineering and Information Technology, RWTH Aachen University Aachen, Germany Michael Hüttemann* Faculty of Electrical Engineering and Information Technology, RWTH Aachen University Aachen, Germany Sanaz Karimijafarbigloo* Faculty of Informatics and Data Science University of Regensburg Regensburg, Germany Yuli Wu Faculty of Electrical Engineering and Information Technology, RWTH Aachen University Aachen, Germany Anke Schmeink Faculty of Electrical Engineering and Information Technology, RWTH Aachen University Aachen, Germany Dorit Merhof Faculty of Informatics and Data Science University of Regensburg Regensburg, Germany dorit.merhof@ur.de A BSTRACT Semantic image segmentation, the process of classifying each pixel in an image into a particular class, plays an important role in many visual understanding systems. As the predominant criterion for evaluating the performance of statistical models, loss functions are crucial for shaping the development of deep learning-based segmentation algorithms and improving their overall performance. To aid researchers in identifying the optimal loss function for their particular application, this survey provides a comprehensive and unified review of 25 loss functions utilized in image segmentation. We provide a novel taxonomy and thorough review of how these loss functions are customized and leveraged in image segmentation, with a systematic categorization emphasizing their significant features and applications. Furthermore, to evaluate the efficacy of these methods in real-world scenarios, we propose unbiased evaluations of some distinct and renowned loss functions on established medical and natural image datasets. We conclude this review by identifying current challenges and unveiling future research opportunities. Finally, we have compiled the reviewed studies that have open-source implementations at our GitHub 1 . Keywords Loss functions; Deep learning · Image segmentation · Semantic segmentation · Medical imaging · Survey 1 Introduction Image segmentation plays a fundamental role in a wide range of visual understanding systems. Its primary objective is to generate a dense prediction for a given image, i.e., assigning each pixel a pre-defined class label (semantic segmentation) [1, 2], or associating each pixel with an object instance (instance segmentation) [3], or the mixture of both (panoptic segmentation) [4], which facilitates the organization of pixels with similar semantics into meaningful high-level concepts. Segmentation has a wide range of applications in a variety of domains including medical image analysis [5, 6], video 1 https://github.com/YilmazKadir/Segmentation_Losses * Equal contribution" 2312.05403v1,"Public policy for management of forest pests within an ownership mosaic Andrew R. Tilman 1* and Robert G. Haight 1 1 USDA Forest Service, Northern Research Station, St. Paul, MN, USA * Corresponding Author, Email: andrew.tilman@usda.gov December 8, 2023 Abstract The benefits of investments in sustainability are often public goods that accrue at broad scales and to many people. Urban forests exemplify this; trees supply ecosystem service benefits from local (in the case of shade) to global (in the case of carbon sequestration) scales. The complex mosaic of public and private ownership that typically defines an urban forest makes the public goods problem of investing in forest sustainability especially acute. This results in incentives for private tree owners to invest in tree care that typically fall short of those of a public forest manager aiming for the social optimum. The management of a forest pest, such as emerald ash borer, provides a salient focus area because pests threaten the provision of public goods from urban forests and pest management generates feedback that alters pest spread and shapes future risks. We study how managers can design policies to address forest pest outbreaks and achieve uniform management across a mosaic of ownership types. We develop a game theoretic model to derive optimal subsidies for the treatment of forests pests and evaluate the efficacy of these policies in mitigating the spread of forest pests with a dynamic epidemiological model. Our results suggest that a combination of optimal treatment subsidies for privately owned trees and targeted treatment of public trees can be far more effective at reducing pest-induced tree mortality than either approach in isolation. While we focus on the management of urban forests, designing programs that align private and public incentives for investment in public goods could advance sustainability in a wide range of systems. Keywords Public goods · Forest pests · Subsidy policy · Urban forests · Private landowners · Emerald ash borer The UN’s 2030 Agenda for Sustainable Development defines a set of interconnected global goals which includes transitioning toward renewable energy and creating resilient and green cities (United Nations, 2015). Realizing these objectives will require major investments by governments, companies, and individuals (Sachs et al., 2019). A challenge at the heart of spurring sustainability transitions, especially in urban areas, is that the benefits of individual investments often accrue at broad scales and thus to many people. In other words, there are public goods problems embedded within many potential sustainability solutions and private incentives for action will often fall short (Olson Jr, 1965; Bergstrom et al., 1986). Therefore, a general challenge for policy makers aiming for urban sustainability is crafting cost effective policies that support the private provision of public goods (Wichman, 2016). This challenge arises in many contexts. For example, increasing the sustainability of transportation could come from public investment in mass-transit systems or from individuals’ adoption of electric 1" 2312.05421v1,"Architecture Decisions in Quantum Software Systems: An Empirical Study on Stack Exchange and GitHub Mst Shamima Aktar a , Peng Liang a,∗ , Muhammad Waseem b , Amjed Tahir c , Aakash Ahmad d , Beiqi Zhang a , Zengyang Li e a School of Computer Science, Wuhan University, 430072 Wuhan, China b Faculty of Information Technology, University of Jyväskylä, FI-40014 Jyväskylä, Finland c School of Mathematical and Computational Sciences, Massey University, 4442 Palmerston North, New Zealand d School of Computing and Communications, Lancaster University Leipzig, 04109 Leipzig, Germany e School of Computer Science, Central China Normal University, Wuhan, China Abstract Context: Quantum computing provides a new dimension in computation, utilizing the principles of quantum mechanics to potentially solve complex problems that are currently intractable for classical computers. However, little research has been conducted about the architecture decisions made in quantum software development, which have a significant influence on the functionality, performance, scalability, and reliability of these systems. Objective: The study aims to empirically investigate and analyze architecture decisions made during the development of quantum software systems, identifying prevalent challenges and limitations by using the posts and issues from Stack Exchange and GitHub. Method: We used a qualitative approach to analyze the obtained data from Stack Exchange Sites and GitHub projects - two prominent platforms in the software development community. Specifically, we collected data from 151 issues (from 47 GitHub projects) and 43 posts (from three Stack Exchange sites) related to architecture decisions in quantum software development. Results: The results show that in quantum software development (1) architecture decisions are articulated in six linguistic patterns, the most common of which are Solution Proposal and Information Giving, (2) the two major categories of architectural decisions are Implementation Decision and Technology Decision, (3) Quantum Programming Framework is the most common application domain among the sixteen application domains identified, (4) Maintainability is the most frequently considered quality attribute, and (5) Design Issue and Performance Issue are the major limitations and challenges that practitioners face when making architecture decisions in quantum software development. Conclusions: Our results show that the limitations and challenges encountered in architecture decisionmaking during the development of quantum software systems are strongly linked to the particular features (e.g., quantum entanglement, superposition, and decoherence) of those systems. These issues mostly pertain to technical aspects and need appropriate measures to address them effectively. Keywords: Architecture Decision, Quantum Software System, Stack Exchange, GitHub, Empirical Study 1. Introduction Quantum computing is a rapidly developing technology that is a combination of physics, chemistry, mathematics, computer science, and information theory to revolutionize computation and problemsolving capabilities [1]. Quantum computing has largely been motivated by academic and industrial ∗ Corresponding author at: School of Computer Science, Wuhan University, China. Tel.: +86 27 68776137; fax: +86 27 68776027. Email addresses: shamima@whu.edu.cn (Mst Shamima Aktar), liangp@whu.edu.cn (Peng Liang), muhammad.m.waseem@jyu.fi (Muhammad Waseem), a.tahir@massey.ac.nz (Amjed Tahir), a.ahmad13@lancaster.ac.uk ( Aakash Ahmad), zhangbeiqi@whu.edu.cn (Beiqi Zhang), zengyangli@ccnu.edu.cn (Zengyang Li) Preprint submitted to Information and Software Technology December 12, 2023" 2312.05431v1,"Efficient Quantization Strategies for Latent Diffusion Models Yuewei Yang Xiaoliang Dai Jialiang Wang Meta GenAI Peizhao Zhang Hongbo Zhang {yueweiyang, xiaoliangdai, jialiangw, stzpz, hbzhang}@meta.com Abstract Latent Diffusion Models (LDMs) capture the dynamic evolution of latent variables over time, blending patterns and multimodality in a generative system. Despite the proficiency of LDM in various applications, such as text-toimage generation, facilitated by robust text encoders and a variational autoencoder, the critical need to deploy large generative models on edge devices compels a search for more compact yet effective alternatives. Post Training Quantization (PTQ), a method to compress the operational size of deep learning models, encounters challenges when applied to LDM due to temporal and structural complexities. This study proposes a quantization strategy that efficiently quantize LDMs, leveraging Signal-to-Quantization- Noise Ratio (SQNR) as a pivotal metric for evaluation. By treating the quantization discrepancy as relative noise and identifying sensitive part(s) of a model, we propose an efficient quantization approach encompassing both global and local strategies. The global quantization process mitigates relative quantization noise by initiating higher-precision quantization on sensitive blocks, while local treatments address specific challenges in quantization-sensitive and timesensitive modules. The outcomes of our experiments reveal that the implementation of both global and local treatments yields a highly efficient and effective Post Training Quantization (PTQ) of LDMs. Figure 1. Quantization introduces error between the outputs of full-precision model (θ f p ) and quantized model (θ q ). Evaluating relative quantization noise at different positions and times (∆ θ,t ) of the reverse diffusion process can identify quantization-sensitive blocks/modules. A more efficient quantization strategy can target identified problems. sampling blocks increase the spatial dimensions of the data to recover finer details for more accurate approximation. These blocks in LDMs capture finner and sparse details and generate high-quality outputs. Nonetheless, the generalization of LDMs is hindered by their extensive parameter count, posing challenges for deploying these large generative models on edge devices[49]. The pressing demand for practical usage on such devices necessitates a more efficient deployment for LDMs. Among various technique to enable an efficient deployment of large generative models, quantization reduces numerical precision to enhance efficiency, while post-training quantization (PTQ) fine-tunes this process after training for a balanced model size and computational efficiency. PTQ distinguishes itself from other efficiency methods like pruning and distillation [9, 27, 36, 41] by avoiding structural modifications to UNet [3, 9, 20, 28], bypassing the need for original training data [27, 36], and eliminating the requirement for model retraining [26, 30, 40]. While quantization on Large Language Models (LLMs) exhibits promising compression results [1, 48], its success in language generative models does not seamlessly extend to LDMs due to two main challenges. First, local down-and-up spatial compres- 1. Introduction Diffusion models (DMs) have a compelling ability to generate complex patterns via emulating dynamic temporal evolution in a data representation space. Latent diffusion models (LDMs) captures the temporal dynamics in a latent data representation space. With a combination of text encoder(s) and an image variational autoencoder[33, 34], the LDMs outperform other visual generative models in various computer vision applications [15, 19, 24, 42, 51]. Within a UNet denoising model [35], downsampling blocks reduce the spatial dimensions of the input data to capture high-level features and minimize computational complexity, and up- 1" 2312.05432v1,"Proceedings of Machine Learning Research vol vvv:1–13, 2024 Fusing Multiple Algorithms for Heterogeneous Online Learning DGADG 001@ UCR . EDU Darshan Gadginmath Shivanshu Tripathi Fabio Pasqualetti STRIP 008@ UCR . EDU FABIOPAS @ ENGR . UCR . EDU University of California, Riverside * Abstract This study addresses the challenge of online learning in contexts where agents accumulate disparate data, face resource constraints, and use different local algorithms. This paper introduces the Switched Online Learning Algorithm (SOLA), designed to solve the heterogeneous online learning problem by amalgamating updates from diverse agents through a dynamic switching mechanism contingent upon their respective performance and available resources. We theoretically analyze the design of the selecting mechanism to ensure that the regret of SOLA is bounded. Our findings show that the number of changes in selection needs to be bounded by a parameter dependent on the performance of the different local algorithms. Additionally, two test cases are presented to emphasize the effectiveness of SOLA, first on an online linear regression problem and then on an online classification problem with the MNIST dataset. 1. Introduction Multi-agent learning frequently involves scenarios in which agents gather disparate data at varying rates, collectively seeking to address an online optimization problem. Some instances include collaborative localization, search-and-rescue operations, coverage control, etc. Compounding the complexity of these scenarios is the constraint of limited data processing and computational capabilities, and the need for time-sensitive decision-making. Conventionally, either heterogeneous data or gradients are pooled Zhang et al. (2018); Esfandiari et al. (2021); Aketi et al. (2023), or heterogeneity is ignored and a distributed learning algorithm is deployed Le Bars et al. (2023); Zhu et al. (2021). The former approach raises privacy concerns, while the latter proves suboptimal due to the inherent heterogeneity of the data. Effectively addressing the heterogeneity of data and resource constraints in an online learning problem remains an unresolved challenge. An alternative approach to mitigate the challenges posed by data heterogeneity and resource constraints is to employ distinct algorithms tailored to the specific characteristics of the data, computation, and communication resources. Nevertheless, adopting distinct algorithms introduces the risk of underutilizing the available data. In this study, we present a systematic method to integrate updates provided by distinct algorithms to solve the heterogeneous online learning problem. 1.1. Problem Statement We seek to solve the following online minimization problem: min F (x, x M [ D i (t)). (1) i * This material is based upon work supported in part by awards ONR-N00014-19-1-2264, ARO W911NF-20-2-0267, and AFOSRFA9550-19-1-0235. © 2024 D. Gadginmath, S. Tripathi & F. Pasqualetti." 2312.05439v1,"Anti-symmetric and Positivity Preserving Formulation of a Spectral Method for Vlasov-Poisson Equations Opal Issan a,∗ , Oleksandr Koshkarov b , Federico D. Halpern c , Boris Kramer a , Gian Luca Delzanno b a Department of Mechanical and Aerospace Engineering, University of California San Diego, La Jolla, CA, USA b T-5 Applied Mathematics and Plasma Physics Group, Los Alamos National Laboratory, Los Alamos, NM, USA c General Atomics, P.O. Box 85608, San Diego, CA, USA December 12, 2023 Abstract We analyze the anti-symmetric properties of spectral discretization for the one-dimensional Vlasov- Poisson equations. The discretization is based on a spectral expansion in velocity with the symmetrically weighted Hermite basis functions, central finite differencing in space, and an implicit Runge Kutta integrator in time. The proposed discretization preserves the anti-symmetric structure of the advection operator in the Vlasov equation, resulting in a stable numerical method. We apply such discretization to two formulations: the canonical Vlasov-Poisson equations and their continuously transformed square-root representation. The latter preserves the positivity of the particle distribution function. We derive analytically the conservation properties of both formulations, including particle number, momentum, and energy, which are verified numerically on the following benchmark problems: manufactured solution, linear and nonlinear Landau damping, two-stream instability, and bump-on-tail instability. Keywords: Vlasov-Poisson equations, spectral methods, conservation laws, anti-symmetry 1. Introduction Many plasma physics phenomena require a kinetic description, rather than a fluid description, to accurately represent the system’s dynamics. Important examples include the Earth’s magnetosphere, the solar corona, galactic dynamics, and laboratory fusion devices. The kinetic Vlasov equation describes the evolution of the particle (e.g., ions, electrons, etc) distribution function in six-dimensional phase space (three spatial and three velocity coordinates) coupled to self-consistent electromagnetic fields. Numerically solving the Vlasov equation for collisionless plasmas is challenging since it is high dimensional, nonlinearly coupled to the Maxwell or Poisson equations, has a rich geometric structure, and has large spatial and temporal scale separation. The scale separation occurs in the microscopic setting since ions are typically at least three orders of magnitude heavier than electrons, and in the macroscopic setting since the system’s scales are much larger than the local plasma scales. For instance, in the solar corona the Debye length, a kinetic scale, is approximately 10m, whereas the solar corona’s system length scale is approximately 10 11 m [39]. Moreover, the Vlasov equation has infinitely many invariants due to its Hamiltonian structure. Retaining such conservation properties at the fully discrete level is an important yet nontrivial task. Numerically handling the high-dimensional phase space of the Vlasov equation is also an ongoing challenge. Standard grid discretization, such as finite differencing, of the six-dimensional phase space results in a prohibitively large number of degrees of freedom. For example, discretizing each direction in phase space using 10 3 grid points results in 10 18 ∗ Corresponding author Email address: oissan@ucsd.edu (Opal Issan) 1" 2312.05443v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Shock induced ignition and transition to detonation in the presence of mechanically induced non-linear acoustic forcing Wentian Wang 1 †, James McDonald 1 , and Matei Ioan Radulescu 1 1 Department of Mechanical Engineering, University of Ottawa, 161 Louis-Pasteur, Ottawa, K1N 6N5, Canada (Received xx; revised xx; accepted xx) We address the problem of shock induced ignition and transition to detonation in a reactive medium in the presence of mechanically induced fluctuations by a moving oscillating piston. For the inert problem prior to ignition, we provide a closed form model for the generation of the train of compression and expansions, their steepening into a train of N-shock waves and their reflection on the lead shock, as well as the distribution energy dissipation rate in the induction zone. The model is found in excellent agreement with numerics. Reactive calculations were performed for hydrogen and ethylene fuels using a novel high-fidelity numerical Lagrangian scheme. Different regimes of ignition and transition to detonation, controlled by the time scale of the forcing and the two time scales of the chemistry: the induction and reaction times. Two novel hot spot cascade mechanisms were identified. The first relies on the coherence between the sequence of hot spot formation set by the piston forcing and forward wave interaction with the lead shock, generalizing the classic runaway in fast flames. The second hot spot cascade is triggered by the feedback between the pressure pulse generated by the first generation hot spot cascade and the shock. For slow forcing, the sensitization is through a modification to the classic run-away process, while the high frequency regime leads to very localized subcritical hot-spot formation controlled by the cumulative energy dissipation of the first generation shocks at a distance comparable to the shock formation location. Key words: Detonation ignition, deflagration-to-detonation transition, hot spots, spontaneous wave, shock train, Lagrangian reactive gasdynamics 1. Introduction The process of deflagration to detonation transition (DDT) is central to both astrophysical reactive hydrodynamics, as it controls, for example, Supernovae explosions of white dwarfs, and terrestrial reactive hydrodynamics, as flames, given sufficient development time and appropriate boundary conditions, will eventually accelerate their volumetric burning rate until forming detonations. Detonations in reactive gases propagate at hypersonic speeds, with Mach numbers ranging from 5 to 8 and overpressures in the range of 10 to 20. Clearly, the transition phenomenon is to be avoided in the process industries, but can be beneficial in propulsion applications utilizing the tremendous power † Email address for correspondence: Wentian.Wang@uottawa.ca" 2312.05448v1,"Domain Adaptation of a State of the Art Text-to-SQL Model: Lessons Learned and Challenges Found Irene Manotas IBM Research irene.Manotas@ibm.com Octavian Popescu IBM Research o.popescu@us.ibm.com Ngoc Phuoc An Vo IBM Research ngoc.phuoc.an.vo@ibm.com Vadim Sheinin IBM Research vadims@us.ibm.com Abstract There are many recent advanced developments for the Text-to-SQL task, where the Picard model is one of the the top performing models as measured by the Spider dataset competition. However, bringing Text-to-SQL systems to realistic use-cases through domain adaptation remains a tough challenge. We analyze how well the base T5 Language Model and Picard perform on query structures different from the Spider dataset, we fine-tuned the base model on the Spider data and on independent databases (DB). To avoid accessing the DB content online during inference, we also present an alternative way to disambiguate the values in an input question using a rule-based approach that relies on an intermediate representation of the semantic concepts of an input question. In our results we show in what cases T5 and Picard can deliver good performance, we share the lessons learned, and discuss current domain adaptation challenges. 1 Introduction Semantic parsing is an important NLP task where natural language utterances are mapped to formal meaning representations. Text-to-SQL datasets and models have been built to support the semantic parsing for SQL, and are crucial to support building natural language interfaces to databases. Transfer Learning (TL), a technique where a pre-trained model on a data-rich task is then fine-tuned on a downstream task, has emerged as a powerful mechanism to train models for different NLP tasks, including Text-to-SQL. Leveraging the transformer architecture (Vaswani et al., 2017) several models have been able to achieve state of the art performance for the semantic parsing task, such as the BERT model (Devlin et al., 2019). Inspired by the success of pre-trained models on a data-rich task, Raffel et al. presented a unified approach to systematically study different TL approaches, treating every NLP problem as a ""text-to-text"" problem, and introducing the T5 model (Raffel et al., 2020). The Parsing Incrementally for Constrained Auto- Regressive Decoding (Picard) model, proposed by Scholak et al., enhances the output of pre-trained language models for the text-to-SQL task, like T5, by finding valid output sequences, and rejecting invalid tokens at each decoding step via incremental parsing. Picard is so far one of the top models on the Spider dataset, the largest cross-domain dataset for Tex-to-SQL. Domain generalization (a.k.a cross-domain generalization) is a realistic and important challenge in the Text-to-SQL task. It addresses whether a model being trained on a dataset and accompanied DBs, still can perform comparably well on questions from other independent dataset and DB. Especially it is practical in real scenarios whenever we want to use a Text-to-SQL model for a new DB without sufficient questions and SQL queries for training because of the cost associated with the annotation of new questions and SQL queries for new DBs. Although both T5 and Picard achieved remarkable performances on Spider, to the best of our knowledge, there has not been an attempt to evaluate these SOTA models on independent datasets and DBs outside of Spider. In this paper we evaluated how the pre-trained T5 model and the Picard model perform on independent DB that are different in terms of questions, queries, and schema, to those included in the popular Spider dataset (Yu et al., 2018). We empirically investigated and analyzed both the T5 and Picard models by evaluating them in a zero-shot setting and by fine-tuning the pre-trained Spider models on a set of independent schemas. Our results indicate that for queries having certain characteristics, T5 with Picard give the best performance, but there are still challenges with complex and realistic queries where using the T5 model without Picard performs better, e.g., with queries using SQL functions or with multiple conditions." 2312.05453v1,"Evidence of Gas Phase Nucleation of Nano Diamond in Microwave Plasma Assisted Chemical Vapor Deposition Tanvi Nikhar 1, a) and Sergey V. Baryshev 1, 2, b) 1) Department of Electrical and Computer Engineering, Michigan State University, 428 S. Shaw Ln., East Lansing, MI 48824, USA 2) Department of Chemical Engineering and Materials Science, Michigan State University, 428 S. Shaw Ln., East Lansing, MI 48824, USA The mechanism of ballas like nano crystalline diamond formation (NCD) still remains elusive, and this work attempts to analyze its formation in the framework of activation energy (E a ) of NCD films grown from H 2 /CH 4 plasma in a 2.45 GHz chemical vapor deposition system. The E a is calculated using the Arrhenius equation corresponding to the thickness growth rate while using substrate temperature (∼ 1000 − 1300 K) in all the calculations. While the calculated values match with the E a for nano diamond formation throughout the literature, these values of ∼10 kcal/mol are lower compared to ∼15 – 25 kcal/mol for standard single crystal diamond (SCD) formation, concluding thus far, that the energetics and processes involved are different. In this work, To further investigate this, the substrate preparation and sample collection method are modified while keeping the growth parameters constant. Unseeded Si substrates are physically separated from the plasma discharge by a molybdenum plate with a pinhole drilled in it. Small quantities of a sample substance are collected on the substrates. The sample is characterized by electron microscopy and Raman spectroscopy confirming it to be nano diamond, thus, suggesting that nano diamond self nucleates in the plasma and flows to the substrate which acts as a mere collection plate. It is hypothesized then, if nano diamond nucleates in gas phase, gas temperature has to be used in the Arrhenius analysis. The E a values for all the nano diamond films are re-calculated using the simulated gas temperature (∼ 1500 − 2000 K) obtained from a simple H 2 /CH 4 plasma model, giving values within the range characteristic to SCD formation. A unified growth mechanism for NCD and SCD is proposed concluding that the limiting reactions for NCD and SCD formation are the same. I. INTRODUCTION The growth of diamond through chemical vapor deposition (CVD) is reported extensively on an existing diamond structure, such as on a diamond substrate or on a diamond seed (achieved by various seeding processes performed on a non-diamond substrate), and a number of studies have been done hypothesizing the mechanism of adding C atoms from source gas to the base diamond structure that results in growth 1–6 . The precipitation of solid diamond from gaseous carbonaceous species without having an already defined diamond structure to grow on has also been reported 7–11 but analysis of the mechanism behind it is far less analyzed. To initiate growth without an existing diamond structure to replicate on, the reactive species from gas, at some point, need to form the first diamond structure – a nucleus, on which the replication (epitaxy) process may follow to form a diamond crystal. Without an existing diamond seed, this nucleation process is mainly understood to be originating at favorable nucleation sites on the surface of a substrate, such as on defects introduced by scratching the substrate with abrasives (including non-diamond materials that do not leave a diamond seed behind), carbide forming substrates, etc. 12 For mirror-polished surfaces, a) Electronic mail: nikharta@msu.edu b) Electronic mail: serbar@msu.edu a commonly used technique is bias-enhanced nucleation, where charged ions impinge upon the surface implanting C atoms in the upper layers of the substrate and these act as active sites for nucleation 13–15 . Hence, diamond nucleation is widely understood to be a surface phenomenon. In low-pressure CVD systems though, gas phase nucleation of diamond has been rarely discussed, but there are some reports, however scarce, discussing its possibility based on experimental observations. Mitura et al. 16 observed agglomerates of diamond particles separate from the rest of the cohesive film deposited in an RF methane plasma and concluded that these particles must have formed in the gas phase, separate from the film formed on the substrate surface. Howard et al. 17 reported the synthesis of diamond powder in the gas phase by microwave-assisted combustion of acetylene in oxygen at low pressures. Frenklach et al. 18 were successfully able to obtain diamond downstream in a low-pressure CVD reactor with mixtures of dichloromethane and oxygen hence definitely confirming that nucleation does not necessarily require a surface and is happening in the gas phase, although tedious post-treatment of the collected sample was required to reveal the presence of diamond grains. They were also able to achieve induced nucleation of diamond by adding diborane to a mixture of acetylene, hydrogen and argon. 19 Various theoretical studies as reviewed by Liu et al. 20 , have reported on the plausibility of gas phase nucleation of diamond. However, the high nucleation density necessary for the formation of a continuous film can only be attributed to surface nucleations. Hence, the importance" 2312.05464v1,"Preprint Identifying and Mitigating Model Failures through Few-shot CLIP-aided Diffusion Generation Atoosa Chegini atoocheg@umd.edu Department of Computer Science University of Maryland, College Park Soheil Feizi sfeizi@umd.edu Department of Computer Science University of Maryland, College Park Abstract Deep learning models can encounter unexpected failures, especially when dealing with challenging sub-populations. One common reason for these failures is the occurrence of objects in backgrounds that are rarely seen during training. To gain a better understanding of these failure modes, human-interpretable descriptions are crucial for further analysis and improvement which is expensive. In this study, we propose an end-to-end framework that utilizes the capabilities of large language models (ChatGPT) and vision-language deep models (CLIP) to generate text descriptions of failure modes associated with spurious correlations (e.g. rarely seen backgrounds) without human-in-the-loop intervention. These descriptions can be used to generate synthetic data using generative models, such as diffusion models. The model can now use this generated data to learn from its weaknesses and enhance its performance on backgrounds that are uncommon for each class of data. Our approach serves as a broad solution, promising progress in comprehending model failure modes and strengthening deep learning models across a wide range of failure scenarios (e.g. bacckgrounds, colors) automatically in a few-shot manner. Our experiments have shown remarkable improvements in accuracy (∼ 21%) on hard sub-populations (particularly for wrong background association) across 40 different models, such as ResNets, EfficientNets, DenseNets, Vision Transformer (ViT), SwAVs, MoCos, DINOs, and CLIPs on various datasets such as ImageNet-1000, CIFAR-10, and CIFAR-100. 1 Introduction The quality of training data directly impacts the performance and robustness of machine learning models. Despite careful curation of training data, models can still exhibit failure modes where their performance deteriorates in specific sub-populations of data, leading to misclassifications or inaccurate predictions Jiang et al. (2018); Arpit et al. (2017). The failure modes of deep networks can arise from various factors, such as noisy labels Sukhbaatar et al. (2014); Jiang et al. (2018); Reed et al. (2015), multi-labels Zhang et al. (2018b), and spurious correlations Zhou et al. (2020), particularly when it comes to distinguishing between objects and their backgrounds Kattakinda & Feizi (2021); Xiao et al. (2020). (See the figure 7 in appendix for examples of these failures.) Similar to how humans use image backgrounds as cues for object recognition, studies have shown that machine learning models also rely on backgrounds when making decisions. In some cases, models may prioritize backgrounds to the point of overlooking important object features for classification Zhang et al. (2007); Ribeiro et al. (2016); Sagawa et al. (2019). Various approaches have been attempted to address failure modes caused by spurious background associations, but many of them are inadequate in addressing all aspects of the problem. Some approaches involve 1" 2312.05491v1,"Using Captum to Explain Generative Language Models Vivek Miglani*, Aobo Yang*, Aram H. Markosyan, Diego Garcia-Olano, Narine Kokhlikyan Meta AI {vivekm, aoboyang, amarkos, diegoolano, narine}@meta.com Abstract Captum is a comprehensive library for model explainability in PyTorch, offering a range of methods from the interpretability literature to enhance users’ understanding of PyTorch models. In this paper, we introduce new features in Captum 1 that are specifically designed to analyze the behavior of generative language models. We provide an overview of the available functionalities and example applications of their potential for understanding learned associations within generative language models. 1 Introduction Model interpretability and explainability have become significantly more important as machine learning models are used in critical domains such as healthcare and law. It is insufficient to simply make a prediction through a black-box model and important to better understand why the model made a particular decision. Interest in Large Language Models (LLMs) has also grown exponentially in the past few years with the release of increasingly large and more powerful models such as GPT-4 (OpenAI, 2023). A lack of explainability continues to exist despite larger models, and with the use of these models expanding to more and more use-cases, it is increasingly important to have access to tooling providing model explanations. Captum is an open-source model explainability library for PyTorch providing a variety of generic interpretability methods proposed in recent literature such as Integrated Gradients, LIME, DeepLift, TracIn, TCAV and more (Kokhlikyan et al., 2020). In this work, we discuss newly open-sourced functionalities in Captum v0.7 to easily apply explainability methods to large generative language models, such as GPT-3. * 1 Denotes equal contribution https://captum.ai 2 Attribution Methods One important class of explainability methods is attribution or feature importance methods, which output a score corresponding to each input feature’s contribution or impact to a model’s final output. Formally, given a function f : R d → R, where f ∈ F and X ∈ R d is a single input vector consisting of d dimensions or features, an attribution method is defined as a function ϕ : F × R d → R d . Each element in the attribution output corresponds to a score of the contribution of corresponding feature i ∈ D, where D denotes the set of all feature indices D = {1, 2, ..., d}. Many attribution methods also require a baseline or reference input B ∈ R d defining a comparison input point to measure feature importance with respect to. We utilize the notation X S to denote selecting the feature values with indices from the set S ⊆ D and the remaining indices from B. Formally, the value of feature i in X S is (X S ) i = I i∈S X i + I i ∈S / B i , where I is the indicator function. In this section, we provide background context on attribution methods available in Captum. These methods can be categorized broadly into (i) perturbation-based methods, which utilize repeated evaluations of a black-box model on perturbed inputs to estimate attribution scores, and (ii) gradient-based methods, which utilize backpropagated gradient information to estimate attribution scores. Perturbation-based methods do not require access to model weights, while gradientbased models do. 2.1 2.1.1 Perturbation-Based Methods Feature Ablation The most straightforward attribution is feature ablation, where each feature is substituted with the corresponding element of the baseline feature vector to estimate the corresponding importance." 2312.05492v1,"CU SZ-I: High-Fidelity Error-Bounded Lossy Compression for Scientific Data on GPUs Jinyang Liu •(⋆) , Jiannan Tian ◦(⋆) , Shixun Wu •(⋆) , Sheng Di † , Boyuan Zhang ◦ , Yafan Huang § , Kai Zhao ‡ , Guanpeng Li § , Dingwen Tao ◦ , Zizhong Chen • , Franck Cappello † (⋆) Co-first Authors University of California, Riverside, Riverside, CA, USA ◦ Indiana University, Bloomington, IN, USA † Argonne National Laboratory, Lemont, IL, USA § The University of Iowa, Iowa City, IA, USA ‡ Florida State University, Tallahassee, FL, USA jliu447@ucr.edu, jti1@iu.edu, swu264@ucr.edu, sdi1@anl.gov, bozhan@iu.edu, yafan-huang@uiowa.edu, kzhao@cs.fsu.edu, guanpeng-li@uiowa.edu, ditao@iu.edu, chen@cs.ucr.edu, cappello@mcs.anl.gov • Abstract—Error-bounded lossy compression is a critical technique for significantly reducing scientific data volumes. Compared to CPU-based scientific compressors, GPU-accelerated compressors exhibit substantially higher throughputs, which can thus better adapt to GPU-based scientific simulation applications. However, a critical limitation still lies in all existing GPU-accelerated error-bounded lossy compressors: they suffer from low compression ratios, which strictly restricts their scope of usage. To address this limitation, in this paper, we propose a new design of GPU-accelerated scientific error-bounded lossy compressor, namely CU SZ-I, which has achieved the following contributions: (1) A brand new GPU-customized interpolation-based data prediction method is raised in CU SZ-I for extensively improving the compression ratio and the decompression data quality. (2) The Huffman encoding module in CU SZ-I has been improved for both efficiency and stability. (3) CU SZ-I is the first work to integrate the highly effective NVIDIA bitcomp lossless compression module to maximally boost the compression ratio for GPU-accelerated lossy compressors with nearly negligible speed degradation. In experimental evaluations, with the same magnitude of compression throughput as existing GPU-accelerated compressors, in terms of compression ratio and quality, CU SZ-I outperforms other stateof-the-art GPU-based scientific lossy compressors to a significant extent. It gains compression ratio improvements by up to 500% under the same error bound or PSNR. In several real-world use cases, CU SZ-I also achieves the optimized performance, having the minimized time cost for distributed lossy data transmission tasks and the highest decompression data visualization quality. I. I NTRODUCTION Large-scale scientific applications for advanced instruments produce vast data for post hoc analysis every day, creating exascale scientific databases in single or distributed supercomputing clusters. For instance, Hardware/Hybrid Accelerated Cosmology Code (HACC) [1, 2] may produce petabytes of data in hundreds of snapshots when simulating 1 trillion particles. Those extremely large databases raise tough challenges for the utility of those data. To this end, data reduction is becoming an effective method to resolve the big data issue for scientific databases. Although traditional methods of lossless data reduction can guarantee zero information loss, they suffer from limited compression ratios. Specifically, deduplication usually reduces the scientific data size by only 20% to 30% [3], and lossless compression by roughly 2:1 [4]. Over the past years, error-bounded lossy compressors have strived to address the high compression ratio requirements for scientific data: they not only get very high compression ratios (such as a magnitude of multi-hundred) [5, 6, 7, 8], but also perform strict control over the data distortion regarding various modes of user-set error bounds. With the development of computing hardware such as GPUs, modern scientific simulation has started to leverage that hardware, and their data throughput has risen a lot. In an LCLS-II laser [9] X-ray imaging use case, it tops at 250 GB/s [10]; such a kind of rate is far beyond the level that typical CPU-centric compressing systems can handle. To meet the high-throughput-compression need for modern scientific applications, especially for the ones on GPU platforms, several GPU-based error-bounded lossy compressors have been developed, such as CU SZ [11, 12], cuSZx [13], FZ-GPU [14], cuSZp [15], and cuZFP [16]. Those compressors can exhibit very high compression throughputs (from tens to hundreds of Gigabytes per second). Therefore, they can be well applied to more diverse use cases, such as streaming compression of data and fast data transfer between distributed data centers or databases. Nevertheless, to maintain the high throughputs, their data compression and reconstruction algorithms are quite sub-optimal in terms of data reduction rates, so they suffer from low compression ratio and fidelity, respectively. For example, as the GPU-based error-bound lossy compressor with the highest compression ratio among existing GPU-accelerated compressors, CU SZ can obtain a compression ratio that is only 10% to 30% of the CPU-based compressor SZ3 under the same PSNR. Thus, the requirement of high-fidelity error-bounded lossy compression for scientific data on GPU platforms has not yet been fulfilled by existing works. Taking the characteristics of existing error-bounded lossy compressors into account, we would like to take advantage of both CPU-based and GPU-based compressors meanwhile" 2312.05504v1,"Incidence Coalgebras: Automorphisms and Derivations Piotr Krylov 1 , Askar Tuganbaev 2 Abstract. We describe automorphisms and derivations of the incidence coalgebra Co(X, F ) of the partially ordered set X over a field F . In this case, the fact is significantly used that the dual algebra of the coalgebra Co(X, F ) is isomorphic to the incidence algebra I(X, F ) of the partially ordered set X over the field F . Key words: incidence coalgebra, incidence algebra, automorphism, derivation. MSC2020 database 16T15, 16W25 The study is supported by grants of Russian Science Foundation (=RSF), no. 23-21-00375, https://rscf.ru/en/project/23-21-00375/ (P.A. Krylov) and no. 22-11-00052, https://rscf.ru/en/project/22-11-00052 (A.A. Tuganbaev). Contents 1 Introduction 2 Chapter I. SUPPORTING RESULTS 2 Coalgebras and Dual Algebras 3 3 Algebra Dual to Coalgebra Co(X, F ) and Incidence Algebra I(X, F ) 4 On Group Aut(I(X, F )) 6 Chapter II. AUTOMORPHISM GROUP OF INCIDENCE COALGEBRAS 5 Group Aut C 9 6 Two Subgroups in Aut C 10 7 Inner Automorphisms of Coalgebra Co(X, F ) 11 1 National Research Tomsk State University, e-mail: krylov@math.tsu.ru . National Research University MPEI; Lomonosov Moscow State University; e-mail: tuganbaev@gmail.com . 2 1 5" 2312.05509v1,"RANK-TWO REFLEXIVE SHEAVES ON THE PROJECTIVE SPACE WITH SECOND CHERN CLASS EQUAL TO FOUR MARCOS JARDIM AND ALAN MUNIZ Abstract. We study rank-two reflexive sheaves on P 3 with c 2 = 4, expanding on previous results for c 2 ≤ 3. We show that every spectrum not previously ruled out is realized. Moreover, moduli spaces are studied and described in detail for c 1 = −1 or 0 and c 3 ≥ 8. Contents 1. Introduction 2. Spectrum and cohomology of rank-2 reflexive sheaves 3. Serre’s construction 4. Sheaves corresponding to extremal curves 5. A class of unobstructed reflexive sheaves 6. Examples of stable reflexive sheaves with c 1 = 0 and c 3 ≤ 6 7. Stable reflexive sheaves with c 1 = 0 and c 3 = 8 8. Stable reflexive sheaves with c 1 = 0 and c 3 = 10 9. Stable reflexive sheaves with c 1 = 0 and c 3 = 12 10. Examples of stable reflexive sheaves with c 1 = −1 and c 3 ≤ 6 11. Stable reflexive sheaves with c 1 = −1 and c 3 = 8 12. Stable reflexive sheaves with c 1 = −1 and c 3 = 10 13. Stable reflexive sheaves with c 1 = −1 and c 3 = 12 References 1 3 6 11 16 18 22 27 29 31 35 40 42 43 1. Introduction Stable rank-2 reflexive sheaves have been the subject of an influential article by Hartshorne [15] more than 40 years ago, and numerous authors have studied them since then. Most relevant for the present paper, Chang provided in [7] a complete description of the moduli spaces when the second Chern class c 2 ≤ 3. While Miró- Roig [26] and Chang [6] established existence results for sheaves with c 2 ≥ 4 and a given third Chern class. This work aims to study moduli spaces of stable rank-2 reflexive sheaves with c 2 = 4. (MJ, AM) Universidade Estadual de Campinas (UNICAMP), Instituto de Matemática, Estatı́stica e Computação Cientı́fica (IMECC), Departamento de Matemática, Rua Sérgio Buarque de Holanda, 651, 13083-970 Campinas-SP, Brazil E-mail addresses: jardim@unicamp.br, anmuniz@ime.unicamp.com, alannmuniz@gmail.com. Date: December 2023. 2020 Mathematics Subject Classification. 14F06, 14D20. Key words and phrases. Reflexive sheaf, moduli space, Serre correspondence. 1" 2312.05516v1,"Stateful Large Language Model Serving with Pensieve Lingfan Yu Jinyang Li New York University New York, NY, USA lingfan.yu@nyu.edu New York University New York, NY, USA jinyang@cs.nyu.edu Abstract to these work, in this paper, we take a step back and examine inefficiencies that arise in the context of a specific but very popular LLM use case today, aka as a multi-turn conversational chatbot. In the conversational setup, the user and the chatbot are engaged in a dialogue that may last many rounds. In order for the chatbot not to “lose memory” of what has been said so far when responding, the cumulative history of the dialogue must be part of the context for LLM’s autoregressive generation. As existing LLM serving systems are stateless across requests, clients send a growing log of conversation history alongside each new request as the input prompt to be processed from scratch. This causes much duplicate processing for multi-turn conversations. How to avoid duplicate processing of the chat history? To do so, the serving system can save any previously processed context data. When new requests from the same conversation arrive, the saved context data can be re-used and subsequently augmented. This can be done with best effort. Essentially, the serving system is allowed to keep some cached state containing processed context across requests. Doing so enables the serving system to exploit the opportunity that when users are actively chatting with an AI chatbot, follow-up requests usually arrive within a reasonably short time period to leverage cached state. Caching state across requests is straightforward at the high-level, but several challenges remain to make it really work. First, where to save the data? Keeping it in the GPU is the fastest, but is very constrained by the relatively small GPU memory size. Putting it on disk would incur much longer load latency, hurting the user experience. A two-tier caching solution spanning both GPU and CPU memory is promising, but care must be taken to cope with each tier’s capacity limit and to swap in/out the saved context data from/to the GPU without damaging performance. Second, how to re-use saved context data efficiently when processing a new request? When restoring a conversation’s context data from CPU to GPU, how to merge it with the conversation’s existing context that is already cached in the GPU? Furthermore, what has been saved might not be complete due to the cache limit. How to handle dropped cache? In this paper, we design a stateful LLM serving system, called Pensieve, to address the aforementioned challenges. Pensieve saves a conversation’s processed context in a twotier GPU-CPU cache. It evicts cached data to the next tier (or discards it) according to how long the conversation has Large Language Models (LLMs) have recently experienced great success, as evident in the widespread popularity of ChatGPT. Existing LLM serving systems are stateless across requests. Consequently, when LLMs are used in the common setting of multi-turn conversations, a growing log of the conversation history must be processed alongside any request by the serving system at each turn, resulting in repeated history processing. In this paper, we design 𝑃𝑒𝑛𝑠𝑖𝑒𝑣𝑒, a system optimized for multi-turn conversation LLM serving. 𝑃𝑒𝑛𝑠𝑖𝑒𝑣𝑒 maintains the conversation state across requests by caching previously processed history to avoid duplicate processing. 𝑃𝑒𝑛𝑠𝑖𝑒𝑣𝑒’s multi-tier caching strategy can utilize both GPU and CPU memory to efficiently store and retrieve cached data. 𝑃𝑒𝑛𝑠𝑖𝑒𝑣𝑒 also generalizes the recent PagedAttention kernel to support attention between multiple input tokens with a GPU cache spread over non-contiguous memory. Our evaluation shows that Pensieve is able to achieve 1.51-1.95x throughput compared to vLLM and reduce latency by 60-75%. 1 Introduction The world has recently witnessed the fast expansion of Large Language Models (LLMs). The most popular use of LLMs are for chatbots, with applications like ChatGPT demonstrating an astounding capability of chatting and answering questions like real humans. Other LLM-backed applications are also being applied to automate a variety of tasks, such as writing ads, responding to emails, doing literature review etc. As LLM continues its explosive growth, it is imperative to develop fast and efficient LLM serving systems. An LLM is an autoregressive DNN model based on Transformer [41] architecture. The model iteratively predicts the next output token based on the current context which includes the sequence of input prompt tokens followed by output tokens generated in the previous iterations. LLMs require very expensive computation due to two factors. One, LLMs have huge parameter sizes (10s or 100s of billions) and have a trend of growing even larger. Two, LLMs need to support a large context size (2K to 32K tokens) to be useful. There has been much related work which improve the performance of LLM inference/serving from various angles, including better batching [44], operation fusion [10], better GPU memory utilization [22], faster output generation [4, 23], low rank adaptation [16] and quantization [12] (see §8). In contrast 1" 2312.05523v1,"Functional Data Analysis: An Introduction and Recent Developments Jan Gertheiss * Department of Mathematics and Statistics School of Economics and Social Sciences Helmut Schmidt University, Hamburg, Germany David Rügamer Department of Statistics, LMU Munich Munich Center for Machine Learning, Munich, Germany Bernard X.W. Liew School of Sport, Rehabilitation and Exercise Sciences University of Essex, Essex, UK Sonja Greven Chair of Statistics School of Business and Economics Humboldt-Universität zu Berlin, Berlin, Germany Abstract Functional data analysis (FDA) is a statistical framework that allows for the analysis of curves, images, or functions on higher dimensional domains. The goals of FDA, such as descriptive analyses, classification, and regression, are generally the same as for statistical analyses of scalar-valued or multivariate data, but FDA brings additional challenges due to the high- and infinite dimensionality of observations and parameters, respectively. This paper provides an introduction to FDA, including a description of the most common statistical analysis techniques, their respective software implementations, and some recent developments in the field. The paper covers fundamental concepts such as descriptives and outliers, smoothing, amplitude and phase variation, and functional principal component analysis. It also discusses functional regression, statistical inference with functional data, functional classification and clustering, and machine learning approaches for functional data analysis. The methods discussed in this paper are widely applicable in fields such as medicine, biophysics, neuroscience, and chemistry, and are increasingly relevant due to the widespread use of technologies that allow for the collection of functional data. Sparse functional data methods are also relevant for longitudinal data analysis. All presented methods are demonstrated using available software in R by analyzing a data set on human motion and motor control. To facilitate the understanding of the methods, their implementation, and hands-on application, the code for these practical examples is made available on Github: https://github.com/davidruegamer/FDA_tutorial. 1 Introduction In functional data analysis (FDA), curves, images, or functions on higher dimensional domains constitute the observations and the objects of interest in the analysis [Ramsay and Silverman, 2005]. The goals of FDA, such as descriptive analyses, classification, regression, etc., are often the same as for statistical analyses of scalar-valued or multivariate data, and many corresponding methods have been transferred to function-valued data, while FDA also brings additional challenges including * Corresponding author: jan.gertheiss@hsu-hh.de 1" 2312.05525v1,"You Only Learn One Query: Learning Unified Human Query for Single-Stage Multi-Person Multi-Task Human-Centric Perception 1 Sheng Jin 1,2 * Shuhuai Li 2∗ Tong Li 2 Wentao Liu 2,3 Chen Qian 2 Ping Luo 1,3 The University of Hong Kong 2 SenseTime Research and Tetras.AI 3 Shanghai AI Laboratory {jinsheng, liuwentao, qianchen}@tetras.ai {lishuhuai, litong}@sensetime.com pluo@cs.hku.hk Abstract Human-centric perception (e.g. pedetrian detection, segmentation, pose estimation, and attribute analysis) is a long-standing problem for computer vision. This paper introduces a unified and versatile framework (HQNet) for single-stage multi-person multi-task human-centric perception (HCP). Our approach centers on learning a unified human query representation, denoted as Human Query, which captures intricate instance-level features for individual persons and disentangles complex multi-person scenarios. Although different HCP tasks have been well-studied individually, single-stage multi-task learning of HCP tasks has not been fully exploited in the literature due to the absence of a comprehensive benchmark dataset. To address this gap, we propose COCO-UniHuman benchmark dataset to enable model development and comprehensive evaluation. Experimental results demonstrate the proposed method’s state-of-the-art performance among multi-task HCP models and its competitive performance compared to task-specific HCP models. Moreover, our experiments underscore Human Query’s adaptability to new HCP tasks, thus demonstrating its robust generalization capability. Codes and data will be publicly accessible. Figure 1. Multi-person human-centric perception tasks can be categorized into 4 groups: classification, detection, segmentation and keypoint localization. to training models on various datasets for each HCP task, which can introduce certain limitations. Firstly, there is inherent scale variance across different datasets. For example, human detection datasets [46] consist of scene images with multiple interacting people, while attribute recognition datasets [52] typically contain images with a single cropped person. This hampers the development of singlestage multi-task algorithms that can comprehensively address various HCP tasks as a unified problem. Secondly, single-task datasets are often designed for specific application scenarios, resulting in strong dataset biases across different datasets. For example, some datasets [27] are captured in controlled lab environments, while some [52] are captured from a surveillance viewpoint. Naively training models on a combination of these datasets inevitably introduces dataset biases and hinders performance in realworld, unconstrained scenarios. Although there are separate benchmarks for individual HCP tasks, a comprehensive benchmark to simultaneously evaluate multiple HCP tasks is still lacking. To address this problem, we introduce a large-scale benchmark dataset called COCO-UniHuman, specifically designed for unified human-centric perceptions. 1. Introduction Human-centric visual perception (e.g. pedestrian detection, pose estimation 1 , human segmentation and human attribute recognition have attracted increasing research attention owing to their widespread industrial applications such as sports analysis, virtual reality, and augmented reality. The task of single-stage multi-person multi-task humancentric perception (HCP) has not been fully exploited in the literature due to the absence of a representative benchmark dataset. Consequently, previous studies [12] resorted * Equal contribution. 1 In this paper, we use “keypoint localization” and “pose estimation” interchangeably. 1" 2312.05563v1,"Administration 4.0: Administrative informatics as a customized and necessary educational platform for a modern IT-supported federal administration Uwe M. Borghoff 1 , Nicol Matzner-Vogel 2 and Siegfried Rapp 3 Abstract: Digitalization is conquering and stressing out the federal administration. Using selected large-scale ICT projects, we show how complex and interdisciplinary the tasks are. The federal administration's IT strategy requires well-trained specialists for all defined fields of action. This scarce resource is increasingly being trained academically in separate, tailor-made degree courses that are developed specifically for the needs of the German ministries and authorities. We use the example of administrative informatics courses to explain their necessity and success story. Using a Bachelor's/Master's program developed by the authors for the ITZBund and the BMF 4 , we look at a concrete implementation and justify two of our design decisions in the development of the course, namely transdisciplinarity and design thinking. We adopt a German perspective throughout the paper 5 . However, the conclusions also apply to other countries. Keywords: digitalization, large-scale ICT projects, IT strategy of the federal administration, central fields of action, recruitment of young talent, administrative informatics courses. 1 Introduction Digitalization is advancing in all areas of work, not only in business and industry, but also in the public sector [LEW21]. Public administrations are dependent on the smooth use of modern information technology, which is why information technology is becoming increasingly important. However, a modern administration is not sustainable without qualified personnel. Due to the enormous demand from the private sector for IT workers of all kinds, federal and state authorities and ministries are facing the challenge of recruiting young talent in a targeted manner by meeting the demand for junior staff in specially designed degree courses with a specialist focus on administrative informatics. This is not least a response to the experience gained from large, cost-intensive ICT (information and communication technology) projects run by the federal government, thereby contributing 1 Universität der Bundeswehr München, Institute for Software Technology & Campus Advanced Studies Center (CASC), 85577 Neubiberg, uwe.borghoff@unibw.de, https://orcid.org/0000-0002-7688-2367. 2 Universität der Bundeswehr München, Campus Advanced Studies Center (CASC), 85577 Neubiberg, nicol.matzner@unibw.de, https://orcid.org/0009-0008-9525-0008. 3 Universität der Bundeswehr München, Central Administration, 85577 Neubiberg, siegfried.rapp@unibw.de, https://orcid.org/0009-0004-3296-0732. 4 Federal Ministry of Finance. 5 This paper was presented at the practitioner session of the RVI 2023 conference in Dresden, Germany, on 26-27 October, see also https://www.rvi23.de/pages/programm.html (accessed 09.12.2023)." 2312.05571v1,"Frugal LMs Trained to Invoke Symbolic Solvers Achieve Parameter-Efficient Arithmetic Reasoning Subhabrata Dutta * 1 , Joykirat Sing * 2 , Ishan Pandey * 2 , Sunny Manchanda 3 , Soumen Chakrabarti 4 , Tanmoy Chakraborty 1 1 IIT Delhi, India, 2 IIIT Delhi, India, 3 DYSL-AI, India, 4 IIT Bombay, India subha0009@gmail.com, joykirat19166@iiitd.ac.in, ishan20304@iiitd.ac.in, manchanda.sunny@gmail.com, soumen@cse.iitb.ac.in, tanchak@ee.iitd.ac.in Abstract Large Language Models (LLM) exhibit zero-shot mathematical reasoning capacity as a behavior emergent with scale, commonly manifesting as chain-of-thoughts (CoT) reasoning. However, multiple empirical findings suggest that this prowess is exclusive to LLMs with exorbitant sizes (beyond 50 billion parameters). Meanwhile, educational neuroscientists suggest that symbolic algebraic manipulation be introduced around the same time as arithmetic word problems to modularize language-to-formulation, symbolic manipulation of the formulation, and endgame arithmetic. In this paper, we start with the hypothesis that much smaller LMs, which are weak at multi-step reasoning, can achieve reasonable arithmetic reasoning if arithmetic word problems are posed as a formalize-then-solve task. In our architecture, which we call S Y R E LM, the LM serves the role of a translator to map natural language arithmetic questions into a formal language (FL) description. A symbolic solver then evaluates the FL expression to obtain the answer. A small frozen LM, equipped with an efficient low-rank adapter, is capable of generating FL expressions that incorporate natural language descriptions of the arithmetic problem (e.g., variable names and their purposes, formal expressions combining variables, etc.). We adopt policy-gradient reinforcement learning to train the adapted LM, informed by the non-differentiable symbolic solver. This marks a sharp departure from the recent development in tool-augmented LLMs, in which the external tools (e.g., calculator, Web search, etc.) are essentially detached from the learning phase of the LM. S Y R E LM shows massive improvements (e.g., +30.65 absolute point improvement in accuracy on the SVAMP dataset using GPT-J 6B model) over base LMs, while keeping our testbed easy to diagnose, interpret and within reach of most researchers. 1 Introduction Large Language Models (LLMs) trained on giant corpora of text, code, reasoning chains, and dialogues have recently taken centerstage (ChatGPT 1 , BARD 2 ) in not only most NLP tasks but also arithmetic and logical reasoning (Brown et al. 2020; Kojima et al. 2022). Despite major recent strides, * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 https://chat.openai.com/ 2 https://bard.google.com/ LLMs, on their own, are resource-intensive, inefficient and unreliable devices for many rigorous tasks such as arithmetic, logic, calculus, or geometry. Indeed, one should not expect word sequence inputs and outputs to capture such domains and tasks. Moreover, folding such ‘skills’ into an opaque, massive LM resists diagnosis and interpretability. Therefore, LLMs are also being trained to invoke tools that can perform such tasks as subroutines (Paranjape et al. 2023; Schick et al. 2023; Wolfram 2023), with the LLM acting as a ‘glue’ between user utterances and these tools. Here, we focus on the interplay between symbolic and arithmetic reasoning tasks mediated by an LM. Educational neuroscientists have long detected a stronger correlation between dysfunctional word problem-solving capability and symbolic algebraic reasoning than between the former and arithmetic calculation abilities (Nathan, Kintsch, and Young 1992; Powell and Fuchs 2014). In light of fMRI evidence, this may not be surprising that different areas of the brain (Mahowald et al. 2023, §2.2.1, §2.2.2) are responsible for linguistic, analytical and logical processing. A common pedagogic trick employed by grade school teachers is to repeat arithmetic word problems with diverse numerals to see if a pupil understands the problem at the level of symbolic reasoning, as against numeric shortcuts. Beyond grade school, the correctness of SQL queries is checked by weeding out incorrect mutant queries using adversarially engineered database instances (Chandra et al. 2015). The above discussion naturally suggests that an LM that can call an arithmetic calculator tool to solve word problems can perform better (perhaps even with a smaller model size) if it also learns to translate the word problem to a logical form in a formal language (FL) and a symbolic solver to manipulate the FL specification. After all, the recipe often given to school children to solve word problems goes roughly like this (paraphrased for the current audience): 1. Read the word problem to allocate variables to quantities mentioned therein. 2. Parse the text to bind some subset of variables to constants grounded in the problem statement. 3. Further parse the text to extract arithmetic relationships and constraints between variables. 4. Identify the target variable(s) whose ground value(s) will answer the question. 5. Invoke a symbolic solver to express the target variable(s)" 2312.05574v1,"A simple model for the charm structure function of nuclei G.R.Boroun ∗ Department of Physics, Razi University, Kermanshah 67149, Iran (Dated: December 12, 2023) In this paper, we have investigated the importance of quark charm in nuclear structure functions in the color dipole model at small x. The charm structure function per nucleon F 2 cA /A for light and heavy nuclei in a wide range of transverse separations r with renormalization and factorization scales are considered. Bounds on the ratio F 2 cA /AF 2 A for nuclei are well described with respect to the electron-ion future colliders kinematic range, i.e, EIC and EIcC colliders. I. Introduction The study of nuclear structure function and its modification at small Bjorken x, is a very interesting subject in compared to those for free nucleon observed in deep inelastic scattering (DIS) [1]. At small values of the Bjorken variable x (for x < 0.01), the shadowing seen in nuclear DIS where the structure function F 2 per nucleon turns out to be smaller in nuclei than in a free nucleon. This effect manifests itself as an inequality F 2 A /(AF 2 N ) < 1, where A is the number of nucleons in a nuclear target. Indeed, unitarity driven nuclear shadowing becomes important at x≪x A = 1/(m N R A ) = 0.15A −1/3 where R A is the radius of the target nucleus and m N is the nucleon mass [2] 1 . The √ Fock state expansion of the virtual photon reads |γ ∗ >= z g Ψ qq |qq > +Φ qqg |qqg >, where Ψ qq and Φ qqg are the √ light-cone wavefunctions of the qq and qqg states. Here z g is the renormalization of the qqg state by the virtual radiative corrections for the qqg state. For the lowest |qq > Fock component of the photon, the interaction of qq dipole of transverse separation r with a nucleon represents with the dipole cross section σ qq (r) [3,4]. Indeed, the incoming virtual photon splits into a colorless qq pair long before reaching the nucleus, and this dipole interacts with typical hadronic cross sections which results in absorption. The key feature is the connection of the dipole-target amplitude to the integrated gluon density where, at very low x, the parton saturation models illuminate the behavior of the gluon density. The dipole cross section can be derived from the Balitsky-Kovchegov (BK) equation [7,8], which established a non-linear evolution equation to describe the high energy scattering of a qq dipole on a target in the fixed coupling case based on the concept of saturation. For the study of saturation of nuclei, those have an advantage over protons since they have more gluons to start with. Therefore, non-linear effects in the evolution of the nuclear gluon distribution should set in at much lower energy than for protons. DIS on heavy nuclei is expected to probe the color dipole cross section in a way different from DIS on nucleons. Specifically, the larger the dipole size is the stronger nuclear screening [9-13]. Unitarity constraints for deep-inelastic scattering on nuclei predicted in Ref.[14]. Evidently, the nuclear shadowing (screening) depends on high mass diffraction. It is expected that measurements over the extended x and Q 2 ranges, which would become possible for future experiments, in particular, for experiments at the Electron-Ion Collider (EIC) [15] and Electron-Ion Collider in China (EiCC) [16], will give more information in order to discriminate between the distinct models of shadowing of the QCD dynamics at small x 2 . One of the main physics goals of these future QCD laboratories at small x will be to unambiguously unveil the onset of the so-called gluon saturation regime of QCD, which is characterized by a transverse momentum scale, the saturation scale Q s (x), at which non-linearities become of comparable importance to linear evolution. In the last years the analysis of the nuclear effects in deep inelastic scattering (DIS) has been extensively discussed in the literature [17-29]. In this paper there is a good chance to produce interesting new predictions for the charm structure function of nuclei for future experiments in the low x region. These calculations are based on the color dipole picture (CDP) with a characteristic saturation momentum, Q A s . We analyze the charm quark structure functions in nuclei and those ratios in a wide range of r in section II. In this section, the heavy quark ∗ Electronic address: boroun@razi.ac.ir 1 For further discussion refer to the Refs.[3-6] 2 The center-of-mass energies in electron-ion colliders proposed in China and the US are 15 − 20 GeV for EIcC and 30 − 140 GeV for EIC respectively." 2312.05576v1,"Dynamic Adjustment of Matching Radii under the Broadcasting Mode: A Novel Multitask Learning Strategy and Temporal Modeling Approach Taijie Chen a , Zijian Shen a , Siyuan Feng b,∗ , Linchuan Yang c , Jintao Ke a a Department of Civil Engineering, the University of Hong Kong, Hong Kong, China Department of Logistics and Maritime Studies, the Hong Kong Polytechnic University, Hong Kong, China c Department of Urban and Rural Planning, School of Architecture and Design, Southwest Jiaotong University, Chengdu, China b Abstract As ride-hailing services have experienced significant growth, the majority of research has concentrated on the dispatching mode, where drivers must adhere to the platform’s assigned routes. However, the broadcasting mode, in which drivers can freely choose their preferred orders from those broadcast by the platform, has received less attention. One important but challenging task in such a system is the determination of the optimal matching radius, which usually varies across space, time, and real-time supply/demand characteristics. This study develops a Transformer-Encoder-Based (TEB) model that predicts key system performance metrics for a range of matching radii, which enables the ride-hailing platform to select an optimal matching radius that maximizes overall system performance according to real-time supply and demand information. To simultaneously maximize multiple system performance metrics for matching radius determination, we devise a novel multi-task learning algorithm that enhances convergence speed of each task (corresponding to the optimization of one metric) and delivers more accurate overall predictions. We evaluate our methods in a simulation environment specifically designed for broadcasting-mode-based ride-hailing service. Our findings reveal that dynamically adjusting matching radii based on our proposed predict-then-optimize approach significantly improves system performance, e.g., increasing platform revenue by 7.55% and enhancing order fulfillment rate by 13% compared to benchmark algorithms. Keywords: E-hailing; ride-sourcing; shared mobility; broadcasting, temporal modeling, multi-task, deep learning, Transformer. ∗ Corresponding author: Email address: sfengag@connect.ust.hk(Siyuan Feng)" 2312.05583v1,"Under review as a conference paper at ICLR 2024 B ETTER N EURAL PDE S OLVERS T HROUGH D ATA - F REE M ESH M OVERS Yue Wang † Microsoft Research AI4Science yuwang5@microsoft.com Peiyan Hu * Academy of Mathematics and Systems Science Chinese Academy of Sciences hupeiyan18@mails.ucas.ac.cn Zhi-Ming Ma Academy of Mathematics and Systems Science Chinese Academy of Sciences mazm@amt.ac.cn Paper under double-blind review A BSTRACT Recently, neural networks have been extensively employed to solve partial differential equations (PDEs) in physical system modeling. While major studies focus on learning system evolution on predefined static mesh discretizations, some methods utilize reinforcement learning or supervised learning techniques to create adaptive and dynamic meshes, due to the dynamic nature of these systems. However, these approaches face two primary challenges: (1) the need for expensive optimal mesh data, and (2) the change of the solution space’s degree of freedom and topology during mesh refinement. To address these challenges, this paper proposes a neural PDE solver with a neural mesh adapter. To begin with, we introduce a novel data-free neural mesh adaptor, called Data-free Mesh Mover (DMM), with two main innovations. Firstly, it is an operator that maps the solution to adaptive meshes and is trained using the Monge-Ampère equation without optimal mesh data. Secondly, it dynamically changes the mesh by moving existing nodes rather than adding or deleting nodes and edges. Theoretical analysis shows that meshes generated by DMM have the lowest interpolation error bound. Based on DMM, to efficiently and accurately model dynamic systems, we develop a moving mesh based neural PDE solver (MM-PDE) that embeds the moving mesh with a twobranch architecture and a learnable interpolation framework to preserve information within the data. Empirical experiments demonstrate that our method generates suitable meshes and considerably enhances accuracy when modeling widely considered PDE systems. 1 I NTRODUCTION The simulation of physical phenomena is a popular research topic in many disciplines, ranging from weather forecasting (Schalkwijk et al., 2015), structural mechanics (Panthi et al., 2007) to turbulence modeling (Garnier et al., 2021). Meanwhile, due to the rapid development of deep learning techniques, there are emerging neural network based approaches designed for simulating physical systems (Li et al., 2020; Raissi et al., 2019; Brandstetter et al., 2022). Because of the complexity of such systems and the requirement of both high accuracy and low cost, learning of physical phenomena using neural networks is still challenging. For physical systems, traditional solvers and most neural solvers need to represent the systems’ states discretely on meshes. Since the system is often non-uniform, dynamic and multi-scale, a uniform and static mesh will waste resources and lose accuracy. On the contrary, an adaptive and dynamic mesh can help allocate attention to different regions efficiently. There have been two methods (Uthman & Askes, 2005) including h-adaption that generates adaptive meshes by refining and coarsening cells, and r-adaptation or moving mesh method that relocates the positions of nodes. To 1" 2312.05585v1,"Enhancing Medical Specialty Assignment to Patients using NLP Techniques CHRIS SOLOMOU University of York - Department of Computer Science Deramore Lane Heslington York, York UK The introduction of Large Language Models (LLMs), and the vast volume of publicly available medical data, amplified the application of NLP to the medical domain. However, LLMs are pretrained on data that are not explicitly relevant to the domain that are applied to and are often biased towards the original data they were pretrained upon. Even when pretrained on domain- specific data, these models typically require time-consuming fine-tuning to achieve good performance for a specific task. To address these limitations, we propose an alternative approach that achieves superior performance while being computationally efficient. Specifically, we utilize keywords to train a deep learning architecture that outperforms a language model pretrained on a large corpus of text. Our proposal does not require pretraining nor fine-tuning and can be applied directly to a specific setting for performing multi-label classification. Our objective is to automatically assign a new patient to the specialty of the medical professional they require, using a dataset that contains medical transcriptions and relevant keywords. To this end, we fine-tune the PubMedBERT model on this dataset, which serves as the baseline for our experiments. We then twice train/fine-tune a DNN and the RoBERTa language model, using both the keywords and the full transcriptions as input. We compare the performance of these approaches using relevant metrics. Our results demonstrate that utilizing keywords for text classification significantly improves classification performance, for both a basic DL architecture and a large language model. Our approach represents a promising and efficient alternative to traditional methods for fine- tuning language models on domain-specific data and has potential applications in various medical domains. CCS CONCEPTS • Applied Computing • Document Management and Text Processing KEYWORDS: NLP, LLMs, Information Retrieval, Multi-label-classification, AI in Healthcare 1 INTRODUCTION A Medical Specialty refers to a field of medicine that defines a group of diseases, patients, and the professionals that treat them. Each specialty requires its own set of skills, treatments, and medicine for dealing with specific health conditions. Relevant to the work of this paper, each medical specialty has specific keywords that distinguish it from the rest. This, in turn, allows for the applications of modern NLP algorithms to be applied for predicting the specialty of the medical professional that a newly admitted patient needs. Communication between medical professionals and patients is an important process in medical care. In reviewing these communications, topics such as the purpose of the medical communication and the preliminary health condition of the patient can be identified [1]. These data, if recorded, can offer a lot of value if used to" 2312.05598v1,"Boosting the Cross-Architecture Generalization of Dataset Distillation through an Empirical Study Lirui Zhao 1 , Yuxin Zhang 1 , Mingbao Lin 2 , Fei Chao 1 , Rongrong Ji 1 * 1 Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China, School of Informatics, Xiamen University, Xiamen, China 2 Tencent Youtu Lab, Shanghai, China 45.0 Abstract Introduction Recent years have witnessed encouraging progress of deep neural networks (DNNs) across a wide range of vision applications, such as image classification (Szegedy et al. 2015; He et al. 2016), object detection (Girshick et al. 2014; Ren et al. 2015), instance segmentation (Long, Shelhamer, and Darrell 2015; Chen et al. 2017) and many others. Nevertheless, the success of DNNs heavily counts on very largescale datasets (Deng et al. 2009; Lin et al. 2014) that generally contain millions of samples and pose enormous computational burden in consequence. By mimicking the original large-scale datasets with a smaller size of synthesized samples, dataset distillation (DD) (Wang et al. 2018; Zhao and Bilen 2021b) has therefore been a topic of active research interest lately to maintain model performance as well as to relieve training burden. The most common metric to evaluate DD methods attributes to the training performance on the generated synthetic datasets. In contemporary methods (Zhao and Bilen 2021a; Cazenavette et al. 2022), the networks for distilling dataset and evaluating performance stay the same of a 3-/4-/5-layer shallow ConvNet (Gidaris and Komodakis 2018). Despite the continuous advances in this setting, the crossarchitecture generalization, referring to as individually distilling and evaluating the synthetic dataset with networks of * Corresponding Author 35.0 Accuracy (%) The poor cross-architecture generalization of dataset distillation greatly weakens its practical significance. This paper attempts to mitigate this issue through an empirical study, which suggests that the synthetic datasets undergo an inductive bias towards the distillation model. Therefore, the evaluation model is strictly confined to having similar architectures of the distillation model. We propose a novel method of EvaLuation with distillation Feature (ELF), which utilizes features from intermediate layers of the distillation model for the cross-architecture evaluation. In this manner, the evaluation model learns from bias-free knowledge therefore its architecture becomes unfettered while retaining performance. By performing extensive experiments, we successfully prove that ELF can well enhance the cross-architecture generalization of current DD methods. Code of this project is at https://github.com/Lirui-Zhao/ELF. 50.0 Alignment Ours Baseline 40.0 Accuracy (%) liruizhao@stu.xmu.edu.cn, yuxinzhang@stu.xmu.edu.cn linmb001@outlook.com, fchao@xmu.edu.cn, rrji@xmu.edu.cn 30.0 25.0 20.0 40.0 Alignment Ours Baseline 30.0 20.0 15.0 t-BN 8-IN 8-BN 11-IN 1-BN vNe esNet1 sNet1 VGG VGG1 R Re Con (a) DSA t-BN 8-IN 8-BN 11-IN 1-BN vNe esNet1 sNet1 VGG VGG1 R Re Con (b) MTT Figure 1: Improvement of the proposed ELF over existing baseline methods including (a) DSA and (b) MTT. Here, the distillation model is Conv-IN with width of 128 and depth of 3. “IN” and “BN” denote instance normalization and batch normalization. The horizontal coordinates show the different evaluation models. “Alignment” stands for the same evaluation model with the distillation model. Experiments are performed on CIFAR-100 dataset with 10 images per class (IPC). different architectures, is rather disregarded by the community. We definitely expect a robust performance gain from varying networks trained upon the synthetic dataset while reducing training burden. Unfortunately, a unified distillation and evaluation network fails to achieve cross-architecture generalization. For example, ResNet-18 (He et al. 2016), a strong model that achieves 92.6% on CIFAR-10 dataset, reportedly in (Cazenavette et al. 2022), has only 46.4% on the synthetic dataset distilled by ConvNet. This huge performance gap impedes the practical significance of DD methods. We therefore in this paper aim at alleviating the poor cross-architecture generalization of existing DD methods with our endeavors primarily involving two empirical studies: First, networks of more architectural similarity lead to less performance gap between evaluation and distillation models. Second, performance benefits more from inserting an identical normalization layer with the distillation model into the evaluation model. The presumable reason lies in that the synthetic dataset retains an inductive bias towards the distillation model, which is instead relieved by similar architectures and identical normalization since they align the distillation and evaluation models. Therefore, the inductive" 2312.05603v1,"Sim-GPT: Text Similarity via GPT Annotated Data Shuhe Wang ♠ , Beiming Cao ♦ , Shengyu Zhang ♣ , Xiaoya Li ♠ Jiwei Li ♣ , Fei Wu ♣ , Guoyin Wang ⋆ , Eduard Hovy ▲ Abstract Due to the lack of a large collection of highquality labeled sentence pairs with textual similarity scores, existing approaches for Semantic Textual Similarity (STS) mostly rely on unsupervised techniques or training signals that are only partially correlated with textual similarity, e.g., NLI-based datasets. To tackle this issue, in this paper, we propose the strategy of measuring text similarity via GPT annotated data (Sim-GPT for short). The core idea of Sim-GPT is to generate data with STS labels using GPT-4, based on which an STS model is trained. Sim-GPT framework utilizes LLMs to provide a substantial amount of reliable annotated data filling the gap of the lack of training signals for STS. Sim-GPT is trained on a one-time generated dataset using BERT or RoBERTa as the backbone, which offers long-term savings in cost and speed compared to repeatedly invoking LLMs for each sentence pair. Trained on the examples from GPT-4 (371K), Sim-GPT yields SOTA performances on the widely-used seven STS benchmarks: +0.99 over supervised-SimCSE (Gao et al., 2021), and +0.42 over the current SOTA PromCSE (Jiang et al., 2022) model. To encourage further advancements of the field, we release both models and the 371K annotated examples from GPT-4. Code, models and annotated data are available at: https://github.com/ ShuheWang1998/Sim-GPT. 1 Introduction Measuring Semantic textual similarity (STS) (Devlin et al., 2018; Liu et al., 2019; Reimers and Gurevych, 2019; Lan et al., 2019; Gao et al., 2021; ♠ Shannon.AI, ♣ Zhejiang University, ⋆ Bytedance, University of Texas at Austin, ▲ University of Melbourne {shuhe_wang, xiaoya_li}@shannonai.com, {sy_zhang, jiwei_li, wufei}@zju.edu.cn, beiming.cao@utexas.edu, guoyin.wang@bytedance.com, eduard.hovy@unimelb.edu.au ♦ Liu et al., 2019; Jiang et al., 2022; Seonwoo et al., 2022; Chuang et al., 2022; Sun et al., 2022; Chen et al., 2023) between sentences is an important task in natural language processing. A longstanding issue with STS is the lack of supervised training data: it is infeasible to obtain a large collection of high-quality labeled sentence pairs with textual similarity scores. Existing approaches either are in a unsupervised fashion (Jiang et al., 2019; Wang et al., 2019; Lan et al., 2019; Yang et al., 2019; Raffel et al., 2020; Zaheer et al., 2020) or rely on training signals that are partially correlated with textual similarity(Reimers and Gurevych, 2019; Yan et al., 2021; Gao et al., 2021; Jiang et al., 2022), e..g, SNLI(Bowman et al., 2015) and MNLI(Williams et al., 2017) datasets whose annotations indicate whether the entailment or contradiction relationship holds between two sentences. Both unsupervised approaches and NLI-based approaches suffer from the lack of DIRECT supervised signals for training STS models. Large language models (LLMs) (Brown et al., 2020; Zhang et al., 2020; Rae et al., 2021; Chowdhery et al., 2022; Tan et al., 2022; Ouyang et al., 2022; OpenAI, 2023; Touvron et al., 2023) open a new door for the task of STS. With their impressive language comprehension abilities, these models have the ability to directly generate accurate semantic similarity scores for pairs of sentences. However, there are two main concerns when using LLMs to provide STS scores. Firstly, it can be costly to use LLMs like GPT each time a new sentence pair is encountered. Secondly, the speed of LLMs is typically significantly slower compared to models like BERT(Devlin et al., 2018) or RoBERTa(Liu et al., 2019). To better harness LLMs’ ability for the STS task, in this paper, we propose Sim-GPT. Sim-GPT does not directly ask LLMs (e.g., GPT-4) to provide STS scores for a newly-encounter sentence pair. But rather, it firstly asks LLMs to generate a relatively" 2312.05611v1,"Triplet Edge Attention for Algorithmic Reasoning Yeonjoon Jung Sungsoo Ahn Pohang University of Science and Technology jeffjung01@postech.ac.kr Pohang University of Science and Technology sungsoo.ahn@postech.ac.kr Abstract This work investigates neural algorithmic reasoning to develop neural networks capable of learning from classical algorithms. The main challenge is to develop graph neural networks that are expressive enough to predict the given algorithm outputs while generalizing well to out-of-distribution data. In this work, we introduce a new graph neural network layer called Triplet Edge Attention (TEA), an edge-aware graph attention layer. Our algorithm works by precisely computing edge latent, aggregating multiple triplet messages using edge-based attention. We empirically validate our TEA layer in the CLRS benchmark and demonstrate a 5% improvement on average. In particular, we achieve a 30% improvement for the string algorithms compared to the state-of-the-art model. 1 Introduction Neural networks are undergoing rapid development and unprecedented performance in tackling intricate tasks across a wide range of domains. However, a critical vulnerability of neural networks lies in their robustness, which is the capacity to maintain consistent performance on all inputs [1]. Despite their high accuracy on the training distribution, neural networks often exhibit subpar performance during the inference stage, particularly when confronting input data lying outside the training data distribution. Neural algorithmic reasoning [2] is a promising avenue to address this robustness problem by combining neural network models with classical algorithms, which entails training the algorithm itself to the neural network. In contrast to traditional algorithmic solutions for real-world tasks, which embed the task into a known domain and then select an algorithm to solve the proxy-domain problem, neural algorithmic reasoning allows direct input without the proxy step [2]. Furthermore, neural algorithmic networks can be repurposed as a pretrained model without losing their generality. This versatility enables the execution of complex tasks by synthesizing multiple algorithmic reasoning layers and even discovering new algorithms from unconventional perspectives compared to human analyses [3]. Algorithmic reasoning tasks are commonly accomplished using graph neural networks (GNNs) [4], which excel in terms of expression power compared to models using sequential or grid-based inputs. Corresponding attribute facilitates the efficient expression of algorithms [5] such as Breadth-First Search [6] or Bellman-Ford [7]. This research aims to develop a graph-based algorithmic learner, a GNN capable of learning various algorithms involving diverse input types. The previous state-of-theart (SOTA) model, i.e., Triplet-GMPNN [8], displayed remarkable enhancements across the CLRS benchmark [3] thanks to its capability to reason over triplet of vertices. Contribution. In this work, we focus on refining neural architectures to better align with the algorithmic reasoning tasks. To this end, we devise a novel edge-attention method tailored for reasoning, coined Triplet Edge Attention (TEA), an efficient method for computing edge latent suitable for both node-based and edge-based algorithms. We use the newly proposed attention to construct Triplet Edge Attention Message passing neural network (TEAM), which we combine with the encoder-processor-decoder network to enhance the computation of algorithmic outputs. We evaluate our algorithm on the CLRS-30 benchmark [3] and achieve state-of-the-art results with an average rank of 1.63. Yeonjoon Jung and Sungsoo Ahn, Triplet Edge Attention for Algorithmic Reasoning (Extended Abstract). Presented at the Second Learning on Graphs Conference (LoG 2023), Virtual Event, November 27–30, 2023." 2312.05632v1,"Subject-Based Domain Adaptation for Facial Expression Recognition Muhammad Osama Zeeshan 1 , Muhammad Haseeb Aslam 1 , Soufiane Belharbi 1 , Alessandro L. Koerich 1 , Marco Pedersoli 1 , Simon Bacon 2 , Eric Granger 1 1 2 LIVIA, Dept. of Systems Engineering, ETS Montreal, Canada Dept. of Health, Kinesiology & Applied Physiology, Concordia University, Montreal, Canada muhammad-osama.zeeshan.1@ens.etsmtl.ca, eric.granger@etsmtl.ca significantly. Unsupervised Domain Adaptation (UDA) [8], [18], [32], [37] techniques have been developed to address the domain shift problem [2] between training (source) and testing (target) domain data. Given the cost to annotate data collected from an operational target domain, researchers have explored a multitude of UDA methods, which seek to find a common representation space between data distributions of a labeled source domain and an unlabeled target domain. Facial expressions vary significantly depending on the individual (e.g., their expressiveness) and capture conditions, which makes the performance of FER systems decrease. Recently, UDA models have gained significant popularity in FER tasks [9], [15], [43] to detect emotions such as happiness or sadness to deal with the problem of domain-gap among distinct distributions. UDA methods focus on a single source to adapt to the target domain. However, in a more realistic scenario, data can come from various sources with varying distributions. One way is to combine all the sources to create a single domain space and adapt to the target domain, but that does not consider the domain shift between the sources that led to the decline in models’ performance. The multi-source domain adaptation (MSDA) methods [37], [5], [26], [12] allow for the creation of a robust model by integrating information from a variety of source domains that can adapt I. INTRODUCTION to an unlabeled target domain. However, in FER task defining Facial expression recognition (FER) techniques have a dataset per domain such as RAF-DB [16], FER2013 [7], gained popularity in several applications, such as pain es- or AffectNet [19] in a UDA or MSDA setting as shown in timation in health care, detecting suspicious or criminal be- Fig. 1 (left-side) does not consider each subject variability haviour, sleep or stress estimation, and various other systems which is important in developing a subject-specific model. interacting with humans [9], [15]. In e-health, automatic These FER datasets comprise uncontrolled, in-the-wild data detection of facial activity linked to, e.g., pain is important that lack subject-specific information. Instead, they confine for people with communication problems, suffer from severe diverse samples from random individuals, offering valuable illnesses, or have brain injuries [24], [25]. data variety but not emphasizing creating a model that Deep learning (DL) models provide state-of-art perfor- generalizes well to a single individual. This limitation arises mance in many computer vision tasks, such as object de- from the absence of subject-based variations within the tection [27], image classification [11], [31], and semantic database, which is a crucial aspect of developing subjectsegmentation [17]. However, these tasks typically rely on specific models. Research in psychology and neuroscience large-scale datasets and supervised learning to train an ac- [1], [13], [21] shows that facial expressions are personcurate model. Moreover, it is assumed that the model is dependent and not versatile, such as in pain recognition trained and tested on data sampled from the same underlying where each person has a distinct way of expressing their distribution. When a model is applied to test data that pain. Therefore, dealing with subject-based data is important diverges from the training set, its performance can decline to learn the subject-specific representation for intra and intervariability. Moreover, the current MSDA methods are trained This work was not supported by any organization on classification benchmark datasets [14], [28] where the 1 Our codebases can be found: https://github.com/ osamazeeshan/Subject-Based-Domain-Adaptation-for-FER number of domains is limited, hindering their ability to scale Abstract— Adapting a deep learning (DL) model to a specific target individual is a challenging task in facial expression recognition (FER) that may be achieved using unsupervised domain adaptation (UDA) methods. Although several UDA methods have been proposed to adapt deep FER models across source and target data sets, multiple subject-specific source domains are needed to accurately represent the intra- and inter-person variability in subject-based adaption. In this paper, we consider the setting where domains correspond to individuals, not entire datasets. Unlike UDA, multi-source domain adaptation (MSDA) methods can leverage multiple source datasets to improve the accuracy and robustness of the target model. However, previous methods for MSDA adapt image classification models across datasets and do not scale well to a larger number of source domains. In this paper, a new MSDA method is introduced for subject-based domain adaptation in FER. It efficiently leverages information from multiple source subjects (labeled source domain data) to adapt a deep FER model to a single target individual (unlabeled target domain data). During adaptation, our Subject-based MSDA first computes a betweensource discrepancy loss to mitigate the domain shift among data from several source subjects. Then, a new strategy is employed to generate augmented confident pseudo-labels for the target subject, allowing a reduction in the domain shift between source and target subjects. Experiments 1 on the challenging BioVid heat and pain dataset (PartA) with 87 subjects shows that our Subject-based MSDA can outperform state-of-the-art methods yet scale well to multiple subject-based source domains." 2312.05637v1,"Microtube self-assembly leads to conformational freezing point depression Tatiana Komarova, 1 Thomas Zinn, 2, ∗ Theyencheri Narayanan, 2 Andrei V. Petukhov, 1 and Jasper Landman 3, † 1 Van ’t Hoff Laboratory for Physical & Colloid Chemistry, Utrecht University, Padualaan 8, 3584 CH Utrecht, the Netherlands 2 ESRF - The European Synchrotron, 38043 Grenoble, France 3 Laboratory for Physics & Physical Chemistry of Foods, Wageningen University & Research, Bornse Weilanden 9, 6708 WG Wageningen, the Netherlands (Dated: December 12, 2023) Concentric microtubes of β-cyclodextrin and SDS grow from the outside in and melt from the inside out. In this study we observe the structure of this hierarchical self-assembling system using in situ small angle X-ray scattering, and relate it with enthalpic changes driving the self-assembly process on the molecular level. We find that the conformation of the crystalline bilayer affects the saturation concentration, providing an example of a phenomenon we call conformational freezing point depression. We propose a model based on freezing point depression, well known from undergraduate physics, and use it to explain the energetics of this hierarchical system, and giving access to material properties without free parameters. I. INTRODUCTION Self-assembly has long been recognized as a promising strategy for fabricating hierarchical, multiscale materials such as carbon nanotubes [1], peptide nanotubes [2, 3], mesoscopic peptide-formed fibers [4–6], compositional tubule networks [7]. However, the application of self-assembly mechanisms has been limited by the need for precise tuning of the free energy landscape towards the desired function. To address this, carefully designed colloidal matter with DNA-encoded directed bonds [8], as well as hydrophobic [9] or magnetic [10] patches have been developed. Yet, in a hierarchical material, the free energy is embedded not only in its microscopic, molecular structure, but also in its mesoscopic conformation. As such, it becomes challenging to predict how a system behaves given how the free energy landscape is dependent on that mesoscopic conformation. Here, we show that we can directly relate the mesoscopic structure of a hierarchical material to enthalpic changes occurring at both the molecular and conformational levels. Recently, the self-assembling system of cyclodextrins (CDs) and sodium dodecyl sulfate (SDS) has demonstrated a remarkable diversity in its mesoscale structures [11–15]. Depending on the concentrations of β-CD and SDS in aqueous solutions, lamellae, multiwalled microtubes as illustrated in FIG. 1, have been reported to form [12]. Along with these phases, Jiang et al. [12] proposed the existence of rhombic dodecahedra at lower concentrations. Yang et al. [14] characterized the internal structure of these supramolecular phases, highlighting their similarities to protein- and peptide-based aggregates. The tubular phase is particularly appealing as micro-carriers ∗ Current addres: Diamond Light Source Ltd, Harwell Science and Innovation Campus, Didcot, Oxfordshire OX11 0DE UKESRF - The European Synchrotron, 38043 Grenoble, France † Jasper.Landman@wur.nl FIG. 1: Self-organization of β-CD and SDS into supramolecular aggregates. (A) The hydrophobic effect drives the formation of SDS@2β-CD complexes [12]. (B) Complexes assemble into bilayers, forming a two-dimensional rhombic crystalline membrane via inter-cyclodextrin hydrogen bonding. The rhombic lattice, resulting from the 7-fold symmetry of the β-CD molecules, maintains a 104 ◦ angle to maximize inter-cyclodextrin hydrogen bonding, [14]. (C) Bilayer sheets assemble into superstructures depending on sample concentration [12]. Our study focuses on characterizing tube structures (highlighted in blue). for controlled drug release [16], 1D artificial colloid confinement [17, 18] and can serve as a model system for fundamental research on hierarchical self-assembly [19]. The self-assembly process of SDS and β-CD begins with the non-covalent host-guest interactions, yielding pocket-like inclusion complexes with 1:2 stoichiometry denoted by SDS@2β-CD [12, 20, 21]. These complexes subsequently arrange into a rhombic crystalline bilayer membrane with robust unit cell parameters, giving rise to diverse superstructures. Additionally, SDS@2β-CD aqueous solutions are easy to prepare, making them an ideal model system to study the effect of the mesostructural free energy landscape on self-assembly." 2312.05658v1,"Monoid Theory in Alonzo A Little Theories Formalization in Simple Type Theory William M. Farmer ∗ and Dennis Y. Zvigelsky ∗ December 12, 2023 Abstract Alonzo is a practice-oriented classical higher-order logic that extends first-order logic and that admits undefined expressions. Named in honor of Alonzo Church, Alonzo is based on Church’s type theory, Church’s formulation of simple type theory. The little theories method is a method for formalizing mathematical knowledge as a theory graph consisting of theories as nodes and theory morphisms as directed edges. The development of a mathematical topic is done in the “little theory” in the theory graph that has the most convenient level of abstraction and the most convenient vocabulary, and then the definitions and theorems produced in the development are transported, as needed, to other theories via the theory morphisms in the theory graph. The purpose of this paper is to illustrate how a body of mathematical knowledge can be formalized in Alonzo using the little theories method. This is done by formalizing monoid theory — the body of mathematical knowledge about monoids — in Alonzo. Address: Department of Computing and Software, McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L7, Canada. Email: wmfarmer@mcmaster.ca, yankovsd@mcmaster.ca. ∗ 1" 2312.05666v1,"Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations Pontus Johnson, Mathias Ekstedt KTH Royal Institute of Technology Stockholm, Sweden pontusj@kth.se Abstract—This work-in-progress paper introduces a prototype for a novel Graph Neural Network (GNN) based approach to estimate hidden states in cyber attack simulations. Utilizing the Meta Attack Language (MAL) in conjunction with Relational Dynamic Decision Language (RDDL) conformant simulations, our framework aims to map the intricate complexity of cyber attacks with a vast number of possible vectors in the simulations. While the prototype is yet to be completed and validated, we discuss its foundational concepts, the architecture, and the potential implications for the field of computer security. 1. Introduction The increasing sophistication and frequency of cyber attacks necessitate advanced methodologies for understanding and predicting attack vectors in complex network environments. Traditional models often fall short in capturing the dynamic and stochastic nature of real-world attacks. Our research aims to bridge this gap by introducing a novel approach leveraging Graph Neural Networks (GNNs) [4] and dynamic simulation frameworks. The integration of GNN with Meta Attack Language (MAL) [1] and in conjunction with Relational Dynamic Decision Language (RDDL) based simulations [2] presents an innovative method to estimate hidden states in cyber attacks, enhancing our understanding and predictive capabilities in cybersecurity. 2. Background and Related Work Recent advancements in machine learning, particularly in GNNs [4], have shown remarkable results in interpreting complex, graph-structured data, a common representation in network security contexts. GNNs’ ability to capture dependencies and interactions between nodes in a network makes them an apt choice for modeling cyber attack scenarios. Prior works in cybersecurity have utilized various techniques, ranging from traditional attack graphs to advanced machine learning models, for threat detection and analysis. However, the combination of GNNs with MAL and RDDL for cyber attack simulations represents a novel approach in the field, offering a more dynamic and realistic representation of potential security breaches. 3. Methodology The methodology underpinning our prototype is founded on integrating Graph Neural Networks (GNNs) with simulations based on MAL and RDDL. This integration aims to address the complexities inherent in cyber attack simulations, particularly in estimating hidden attack states. MAL provides a formalism for modeling cyber attack scenarios, defining the entities involved, their attributes, and potential attack vectors. It allows for the codification of domain-specific cybersecurity knowledge, facilitating the creation of detailed and nuanced attack scenarios. In our approach, MAL is used to define the structure of the cyber environment, detailing the assets, vulnerabilities, and potential attack paths. RDDL enables the specification of dynamic systems and decision-making processes, which are critical for simulating cyber attack scenarios with temporal and stochastic elements. Using PyRDDLGym [3], we create RDDL-compliant simulations that mimic the progression of attacks in a network. These simulations consider various factors, including attacker behavior, system defenses, and the probabilistic nature of certain attack outcomes. The integration of MAL and RDDL provides a comprehensive framework for simulating cyber attacks. MAL defines the static structure of the attack scenarios, while RDDL adds dynamism, allowing for the simulation of how attacks unfold over time. The resulting simulations generate data that reflects the complex interplay of various factors in a cyber attack, forming the basis for training our GNN model. 4. Observation Logic and Handling of Hidden States A critical aspect of our prototype is its approach to managing hidden states in cyber attack simulations. Hidden states refer to the aspects of a cyber attack that are not directly observable, such as the compromised status of a system without explicit evidence. Accurately estimating these hidden states is pivotal for understanding the full scope of an attack and for effective cybersecurity measures. In our framework, the observation logic is intricately tied to both the MAL and RDDL components. MAL provides" 2312.05671v1,"Hate Speech and Offensive Content Detection in Indo-Aryan Languages: A Battle of LSTM and Transformers. Nikhil Narayan 1 , Mrutyunjay Biswal 1 , Pramod Goyal 1 and Abhranta Panigrahi 1 1 Z-AGI Labs, India Abstract Social media platforms serve as accessible outlets for individuals to express their thoughts and experiences, resulting in an influx of user-generated data spanning all age groups. While these platforms enable free expression, they also present significant challenges, including the proliferation of hate speech and offensive content. Such objectionable language disrupts objective discourse and can lead to radicalization of debates, ultimately threatening democratic values. Consequently, social media platforms have taken steps to monitor and curb abusive behavior, necessitating automated methods for identifying suspicious posts. This paper contributes to Hate Speech and Offensive Content Identification in English and Indo-Aryan Languages (HASOC) 2023 shared tasks track for Hate Speech Detection in Low-Resource Languages. We, team Z-AGI Labs, conduct a comprehensive comparative analysis of hate speech classification across five distinct languages—Bengali, Assamese, Bodo, Sinhala, and Gujarati—within the context of the HASOC competition. Our study encompasses a wide range of pre-trained models, including Bert variants, XLM-R, and LSTM models, to assess their performance in identifying hate speech across these languages. Results reveal intriguing variations in model performance. Notably, Bert Base Multilingual Cased emerges as a strong performer across languages, achieving an F1 score of 0.67027 for Bengali and 0.70525 for Assamese. At the same time, it significantly outperforms other models with an impressive F1 score of 0.83009 for Bodo. In Sinhala, XLM-R stands out with an F1 score of 0.83493, whereas for Gujarati, a custom LSTM-based model outshined with an F1 score of 0.76601. This study offers valuable insights into the suitability of various pre-trained models for hate speech detection in multilingual settings. By considering the nuances of each, our research contributes to an informed model selection for building robust hate speech detection systems. Keywords Multilingual Models, Low-Resource Languages, Hate Speech, Indic Languages, HASOC-FIRE, CEUR-WS 1. Introduction In the era of expanding global connectivity through social media, platforms such as Facebook, X (Formerly Twitter), YouTube, and Instagram have grappled with a disturbing surge in hate speech perpetuated by individuals and organized groups. With the surge of Influencers and Content Creators, also commonly known as the Creator Economy[1], there has been an alarming rise in incidents concerning targeted attacks on individuals based on their opinions, appearance, and ethnicity[2]. The consequences of such pervasive abusive language are far-reaching, often Forum for Information Retrieval Evaluation, December 15-18, 2023, India $ nikhilnarayan73@gmail.com (N. Narayan); mrutyunjay.biswal.hmu@gmail.com (M. Biswal); goyalpramod1729@gmail.com (P. Goyal); abhranta.panigrahi@gmail.com (A. Panigrahi) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)" 2312.05674v1,"Position control of an acoustic cavitation bubble by reinforcement learning Kálmán Klapcsik a,∗ , Bálint Gyires-Tóth b , Juan Manuel Rosselló c , Ferenc Hegedűs a a Department of Hydrodynamic Systems, Faculty of Mechanical Engineering, Budapest University of Technology and Economics, Műegyetem rkp. 3., H-1111 Budapest, Hungary b Department of Telecommunications and Media Informatics, Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, Műegyetem rkp. 3., H-1111 Budapest, Hungary c Faculty of Mechanical Engineering, University of Ljubljana, Aškerčeva 6, 1000 Ljubljana, Slovenia Abstract A control technique is developed via Reinforcement Learning that allows arbitrary controlling of the position of an acoustic cavitation bubble in a dual-frequency standing acoustic wave field. The agent must choose the optimal pressure amplitude values to manipulate the bubble position in the range of x/λ 0 ∈ [0.05, 0.25]. To train the agent an actor-critic off-policy algorithm (Deep Deterministic Policy Gradient) was used that supports continuous action space, which allows setting the pressure amplitude values continuously within 0 and 1 bar. A shaped reward function is formulated that minimizes the distance between the bubble and the target position and implicitly encourages the agent to perform the position control within the shortest amount of time. In some cases, the optimal control can be 7 times faster than the solution expected from the linear theory. Keywords: bubble position control, reinforcement learning, bubble dynamics, GPU programming plications, such as particle manipulation [11–14], pattern formation [15] and micro-assembly [16], the utilization of such control techniques is not widespread in the literature in the case of bubble clusters. Only elementary techniques have been applied to cluster control, such as on/off control [17, 18] or bi-frequency driving to avoid spatial instability [19, 20]. The traditional acoustic manipulation devices create a simple pattern of standing waves in a chamber or channel [11]. In such patterns, fixed trapping points (or lines) exist, e.g., pressure nodes and antinodes, where the mean acoustic radiation force is zero. The external forces drive the particles to these fixed positions. Either by controlling the phase or intensity of the transducers or by switching between resonance modes, the wave field is transformed, and the trapping points can be modified; thus, the position of the particles can be controlled [12, 13]. A possible method of particle manipulation is the application of phase-controllable ultrasonic standing waves. In this case, a pair of ultrasonic transducers is applied, and the relative phase between the generated sinusoidal signal is varied to change the position of nodes and antinodes. Abe 1. Introduction The irradiation of the liquid domain with highfrequency and high-intensity ultrasound results in the forming of thousands of micron-sized radially pulsating bubbles. The collapse of these bubbles induces chemical reactions, which is the keen interest of sonochemistry [1]. Despite the great potential of various applications [2–7], the biggest challenge, the scale-up of applications feasible for industrial sizes, is still unsolved [8]. The attenuation of the sound waves in the densely packed bubble clusters is one of the main limitations [9, 10] and the spurious interaction of the bubbles with the container. Controlling the dynamics of bubble clusters via acoustic manipulation methods; for example, the positioning of bubbles within the clusters, can be a possible solution to overcome such limitations. Although acoustic manipulation methods are extensively used for solid particles in various ap- ∗ Corresponding author Email addresses: kklapcsik@hds.bme.hu (Kálmán Klapcsik), toth.b@tmit.bme.hu (Bálint Gyires-Tóth), jrossello.research@gmail.com (Juan Manuel Rosselló), fhegedus@hds.bme.hu (Ferenc Hegedűs) 1" 2312.05682v1,"On Valid Multivariate Generalizations of the Confluent Hypergeometric Covariance Function Drew Yarger ∗ and Anindya Bhadra Department of Statistics, Purdue University Abstract Modeling of multivariate random fields through Gaussian processes calls for the construction of valid cross-covariance functions describing the dependence between any two component processes at different spatial locations. The required validity conditions often present challenges that lead to complicated restrictions on the parameter space. The purpose of this paper is to present a simplified techniques for establishing multivariate validity for the recently-introduced Confluent Hypergeometric (CH) class of covariance functions. Specifically, we use multivariate mixtures to present both simplified and comprehensive conditions for validity, based on results on conditionally negative semidefinite matrices and the Schur product theorem. In addition, we establish the spectral density of the CH covariance and use this to construct valid multivariate models as well as propose new cross-covariances. We show that our proposed approach leads to valid multivariate cross-covariance models that inherit the desired marginal properties of the CH model and outperform the multivariate Matérn model in out-of-sample prediction under slowly-decaying correlation of the underlying multivariate random field. We also establish properties of multivariate CH models, including equivalence of Gaussian measures, and demonstrate their use in modeling a multivariate oceanography data set consisting of temperature, salinity and oxygen, as measured by autonomous floats in the Southern Ocean. Keywords: Argo floats, cross-covariance, multivariate random fields, spectral construction. ∗ Address for correspondence: 150 N. University St., West Lafayette, IN 47907-2066, USA. Email: anyarger@purdue.edu. 1" 2312.05683v1,"Cosmological FLRW phase transitions and micro-structure under Kaniadakis statistics Joaquı́n Housset, 1, ∗ Joel F. Saavedra 1 , 1, † and Francisco Tello-Ortiz 1, ‡ Instituto de Fı́sica, Pontificia Universidad Católica de Valparaı́so, Casilla 4950, Valparaı́so, Chile. This article is devoted to the study of the thermodynamics phase transitions and critical phenomena of an FLRW cosmological model under the so-called Kaniadakis’s statistics. The equation of state is derived from the corrected Friedmann field equations and the thermodynamics unified first law. This reveals the existence of non-trivial critical points where a first-order phase transition takes place. The system behaves as an “inverted” van der Waals fluid in this concern. Interestingly, the numerical values of the critical exponents are the same as those of the van der Waals system. Besides, to obtain more insights into the thermodynamics description, the so-called Ruppeiner’s geometry is studied through the normalized scalar curvature, disclosing this invariant zone where the system undergoes repulsive/attractive interactions. Near the critical point, this curvature provides again the same critical exponent and universal constant value as for van der Waals fluid. I. INTRODUCTION The so-called Kaniadakis’s entropy [1, 2], has attracted much interest in recent years. This information measure corresponds to a relativistic generalization of the classical and well-known Boltzmann-Gibbs-Shannon entropy. In [3], using the relation between Tsallis’s and Kaniadakis’s entropies, it was possible to extrapolate this latter into the gravitational context. Specifically, re-written it in terms of the black hole (BH) entropy [4]. This achievement allowed to explore a series of gravitational phenomena such as observational constraints on holographic dark energy [5–11], generalized second and third laws of thermodynamics [12, 13], slow-roll inflation [14], BHs thermodynamics [15–18], micro-canonical and canonical descriptions [19], generalized entropy and its microscopic interpretation [20, 21] and general cosmological setups [18, 22], to name a few. In this respect, it is worth noticing that most of the mentioned investigations were possible due to the so-called gravity-thermodynamics conjecture [23–25]. This is so because, starting from a purely thermodynamics description, this conjecture allows us to determine the field equations [18, 22]. Of course, in doing so, some assumptions and prescriptions are necessary. For instance, for spherically symmetric space-times, one needs to consider that the Misner-Sharp energy [26] obeys the classical thermodynamics relation, that is, it is equal to the product of the density of the matter distribution by the thermodynamics volume. Also, it is necessary to consider that Clausius’s relation holds. Etc. From the side of static/stationary space-times, for example, BHs, the thermodynamics studies were performed by using the approach given in the seminal articles [27– 30] by replacing the Bekenstein’s entropy [4] by the Kaniadakis entropy [1–3]. On the other hand, for cosmological models, being these space-times dynamical, the above scheme was done by using the thermodynamics unified first law (UFL) [31–33], and of course, changing the event horizon (EH) by the apparent horizon (AH) [34–36]. So, taking advantage of these antecedents, a natural question arises: Can the usual gravitational entropy (Bekenstein’s entropy) be replaced with Kaniadakis’s entropy to get non-trivial thermodynamics phenomena for an FLRW cosmological model? In case of positive answer, are these phenomena feasible at least from a pure theoretical point of view? These simple questions arise because in the General Relativity (GR) scenario, it is well-known that the FLRW model does not present thermodynamics phase transitions [37]. Nevertheless, this situation drastically changes if one introduces further degrees of freedom, such as scalar fields, other than the gravitational ones [38]. Indeed, any additional field minimally or not minimally coupled to gravity shall modify the field equations and all the thermodynamics-associated quantities, such as the entropy, Misner-Sharp energy, etc. Therefore, one expects (in principle) a more involved description of thermodynamics. It is clear from the above paragraph that once a modified theory of gravity and its equations are fully provided, and one is able from the Euclidean path integral formulation 1 to obtain the full thermodynamics description. Here, the situation is quite different because assuming that the UFL “always” holds and taking from the very beginning a specific form of the entropy, the equations of motion are coming. So, in principle, nothing prevents us from using this fact as the starting point to investigate under what conditions intriguing thermodynamics phenomena are happening. So, utilizing the above fact, the main aim and motivation of the present research is to realize how Kaniadakis’s in- 1 To apply this procedure, first all, one needs to know or obtain ∗ Electronic address: joaquin.housset.r@mail.pucv.cl † Electronic address: joel.saavedra@pucv.cl ‡ Electronic address: francisco.tello@pucv.cl a solution of the theory. In this way, the path integral is solved on-shell, adding the proper counter-terms. Leading, in the end, to recognizing and matching some gravitational quantities with their thermodynamic counterpart." 2312.05698v1,"Unsupervised Multi-modal Feature Alignment for Time Series Representation Learning Chen Liang Zhiyu Liang Donghua Yang Hongzhi Wang Harbin Institute of Technology Harbin Institute of Technology Harbin Institute of Technology Harbin Institute of Technology Harbin, China Harbin, China Harbin, China Harbin, China wangzh@hit.edu.cn zyliang@hit.edu.cn yang.dh@hit.edu.cn 23B903050@stu.hit.edu.cn Zheng Liang Xiyang Zhang Jianfeng Huang Harbin Institute of Technology Harbin, China lz20@hit.edu.cn Harbin Institute of Technology Harbin, China 7203610125@stu.hit.edu.cn Harbin Institute of Technology Harbin, China JFHuang.research@gmail.com Abstract—In recent times, the field of unsupervised representation learning (URL) for time series data has garnered significant interest due to its remarkable adaptability across diverse downstream applications. Unsupervised learning goals differ from downstream tasks, making it tricky to ensure downstream task utility by focusing only on temporal feature characterization. Researchers have proposed multiple transformations to extract discriminative patterns implied in informative time series, trying to fill the gap. Despite the introduction of a variety of feature engineering techniques, e.g. spectral domain, wavelet transformed features, features in image form and symbolic features etc. the utilization of intricate feature fusion methods and dependence on heterogeneous features during inference hampers the scalability of the solutions. To address this, our study introduces an innovative approach that focuses on aligning and binding time series representations encoded from different modalities, inspired by spectral graph theory, thereby guiding the neural encoder to uncover latent pattern associations among these multi-modal features. In contrast to conventional methods that fuse features from multiple modalities, our proposed approach simplifies the neural architecture by retaining a single time series encoder, consequently leading to preserved scalability. We further demonstrate and prove mechanisms for the encoder to maintain better inductive bias. In our experimental evaluation, we validated the proposed method on a diverse set of time series datasets from various domains. Our approach outperforms existing state-of-theart URL methods across diverse downstream tasks. Experiments confirm its enhanced representation power and superior scalability due to its model-agnostic nature. Additionally, this paper introduces a novel paradigm for time series URL through multimodal feature alignment, paving a new research direction in this domain. Index Terms—Unsupervised representation learning, Multivariate time series, Feature engineering, Feature alignment, Spectral graph theory, Inductive bias I. I NTRODUCTION Time series describes a variable over time and encompasses various measures of monitoring of an entity such as an organism’s electrical signals and the CPU usage of a system or device. Multivariate time series (MTS) involves sets of dependent variables, playing a pivotal role across domains from finance to healthcare and the natural sciences [1]–[4]. Despite accumulating extensive time series data from various fields, understanding patterns within time series still remains challenging, even for domain experts. In contrast to images and text, where certain patterns are quickly discernible, time series pose complexities in pattern identification and analysis. This feature further increases the difficulty of obtaining labels for supervised learning [5]. Thus, unsupervised representation learning (URL) for time series [6]–[9] has thus emerged as a resent research focus. URL aims to train a neural network (called encoder), without requiring labels, to encode the data into feature vectors (feature or embedding), by using subtly designed supervision signals to capture semantic equivalence by leveraging inherent patterns of the raw data. The learned representation, necessitating minimal annotation [10], proves valuable in a variety of downstream tasks like temporal data classification, clustering, anomaly detection [8], [9], retrieval [11], etc. From the aspect of complexities of mixed discriminative and irrelevant patterns, time series pose challenges for representation learning. Time series data can be blended with blindsource noise, acquired through varied methods, and exhibit intricate distributions and semantics [12]. Even though various feature engineering methods are proposed to parse time series and expose abundant discriminative patterns that are more tangible to observe, the complex and diversiform nature of time series engineering methods decrease their applicability for time series URL [5], [6] preventing the encoders from avoiding misinterpretation of patterns and gaining generalization ability by learning from diverse multi-modal features. More specifically, variety of feature engineering methods and heterogeneity of the multi-modal features of time series data make the utilization of the features intricate [7], [13]– [15]. On one hand, most of the feature engineering methods for time series are highly coupled with neural structure of the encoder, making it difficult to design a scalable encoder to encode all kinds of feature obtained. During inference, time consumption for such feature acquirement is also inevitable," 2312.05704v1,"1 On the Ground and in the Sky: A Tutorial on Radio Localization in Ground-Air-Space Networks Hazem Sallouha, Member, IEEE, Sharief Saleh, Member, IEEE, Sibren De Bast, Zhuangzhuang Cui, Member, IEEE, Sofie Pollin, Senior Member, IEEE, and Henk Wymeersch, Senior Member, IEEE Abstract—The inherent limitations in scaling up ground infrastructure for future wireless networks, combined with decreasing operational costs of aerial and space networks, are driving considerable research interest in multisegment ground-air-space (GAS) networks. In GAS networks, where ground and aerial users share network resources, ubiquitous and accurate user localization becomes indispensable, not only as an end-user service but also as an enabler for location-aware communications. This breaks the convention of having localization as a byproduct in networks primarily designed for communications. To address these imperative localization needs, the design and utilization of ground, aerial, and space anchors require thorough investigation. In this tutorial, we provide an in-depth systemic analysis of the radio localization problem in GAS networks, considering ground and aerial users as targets to be localized. Starting from a survey of the most relevant works, we then define the key characteristics of anchors and targets in GAS networks. Subsequently, we detail localization fundamentals in GAS networks, considering 3D positions and orientations. Afterward, we thoroughly analyze radio localization systems in GAS networks, detailing the system model, design aspects, and considerations for each of the three GAS anchors. Preliminary results are presented to provide a quantifiable perspective on key design aspects in GAS-based localization scenarios. We then identify the vital roles 6G enablers are expected to play in radio localization in GAS networks. Index Terms—5G, 6G, aerial networks, aerial targets, AI, cellfree, ground aerial space networks, JCAS, localization, LEO satellites, massive MIMO, non-terrestrial networks, RIS, THz, UAVs. I. I NTRODUCTION VER the past decade, acquiring location information in wireless systems has shifted from being an optional feature to becoming an imperative functionality that drives the innovation of new wireless applications. Location information serves as the essence of many technological and socially O Hazem Sallouha, Sibren De Bast, Zhuangzhuang Cui, and Sofie Pollin are with the Department of Electrical Engineering, KU Leuven, 3001 Leuven, Belgium. Emails: {firstname.lastname}@kuleuven.be. Sharief Saleh and Henk Wymeersch are with the Department of Electrical Engineering, Chalmers University of Technology, 412 58 Gothenburg, Sweden. Emails: {sharief, henkw}@chalmers.se. Sibren De Bast is also with Septentrio, 3001 Leuven, Belgium. Email: sibren.debast@septentrio.com. This work was funded by the Hexa-X-II project. Hexa-X-II project has received funding from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union’s Horizon Europe research and innovation programme under Grant Agreement No 101095759. This work was also partially funded by the Research Foundation – Flanders (FWO) under projects No G0C0623N and G098020N, and by the Swedish Research Council (VR grant 2022-03007). The work of Hazem Sallouha was funded by the Research Foundation – Flanders (FWO), Postdoctoral Fellowship No 12ZE222N. impactful applications, in the areas of mobile devices, Internet of things (IoT), autonomous (aerial) vehicles, precision agriculture, as well as live augmented and virtual reality experiences. In applications such as autonomous vehicles [1], assisted living IoT [2], unmanned aerial vehicle (UAV) traffic management [3], and the vast majority of IoT applications [4]– [6], the dependency on location information is pivotal. Any error in the location information could lead to serious or even life-threatening consequences. For instance, imagine losing the track position in a self-driving car or having the global positioning system (GPS) signal jammed during a commercial flight journey or a UAV mission. While localization in terrestrial networks is well incorporated in the different generations of cellular networks, from the first generation (1G) to the fifth generation (5G) [7], the integration of non-terrestrial networks (NTNs) in current 5G and future sixth generation (6G) wireless networks, necessitate a paradigm shift in localization systems, promoting novel ground-aerial-space (GAS) multisegment localization systems, in which terrestrial and non-terrestrial segments operate seamlessly, harnessing both horizontal and vertical dimensions. On the ground, current 5G wireless systems handle the increasing connectivity and spectral efficiency demands by employing base stations with a massive number of antenna [8] and exploring new spectrum bands, such as millimeter-wave (mmWave) and Terahertz bands [9]. This combination of a large number of antennas and large radio bandwidth offers exceptionally sharp angle and time measurements, enabling unprecedentedly accurate localization. Departing from the ground upward, the non-terrestrial aerial and space segments follow, which include low-altitude platforms (LAPs), high altitude platforms (HAPs), and satellite networks. Wireless networks in the nonterrestrial segments, which are commonly known as NTNs, are included in recent study items of 3rd generation partnership project (3GPP) [10] as well as in 3GPP Release 17 and Release 18 packages [11]. Recent developments of aerial/space technologies coupled with reduced manufacturing costs have enabled various NTN-based advanced applications focusing on providing continuous, ubiquitous, and high-capacity connectivity across the globe [12]. Employing NTNs for connectivity naturally unlocks the potential of also providing radio frequency (RF)-based localization as a joint service by design. In this tutorial, we provide a systematic analysis of the radio localization system design in the different segments of the GAS networks, concentrating on the scope detailed in the following." 2312.05708v1,"Context Tuning for Retrieval Augmented Generation Raviteja Anantha, Tharun Bethi, Danil Vodianik, Srinivas Chappidi Apple Abstract Large language models (LLMs) have the remarkable ability to solve new tasks with just a few examples, but they need access to the right tools. Retrieval Augmented Generation (RAG) addresses this problem by retrieving a list of relevant tools for a given task. However, RAG’s tool retrieval step requires all the required information to be explicitly present in the query. This is a limitation, as semantic search, the widely adopted tool retrieval method, can fail when the query is incomplete or lacks context. To address this limitation, we propose Context Tuning for RAG, which employs a smart context retrieval system to fetch relevant information that improves both tool retrieval and plan generation. Our lightweight context retrieval model uses numerical, categorical, and habitual usage signals to retrieve and rank context items. Our empirical results demonstrate that context tuning significantly enhances semantic search, achieving a 3.5-fold and 1.5-fold improvement in Recall@K for context retrieval and tool retrieval tasks respectively, and resulting in an 11.6% increase in LLM-based planner accuracy. Additionally, we show that our proposed lightweight model using Reciprocal Rank Fusion (RRF) with LambdaMART outperforms GPT-4 based retrieval. Moreover, we observe context augmentation at plan generation, even after tool retrieval, reduces hallucination. 1 Introduction Large language models (LLMs) excel in a variety of tasks ranging from response generation and logical reasoning to program synthesis. One of the important active areas of LLM research is to utilize them as planning agents (Huang et al., 2022). Planning is an essential functionality for processing complex natural language instructions. A planner should possess the ability to select the appropriate tools to complete each sub-task. While LLMs exhibit exceptional generation capabilities, they have inherent limitations, such as lacking up-to-date in- formation and exhibiting a tendency to hallucinate tools. By providing LLMs with a relevant set of tools based on the given task (Schick et al., 2023; Lu et al., 2023), one can alleviate the issue of outdated information. The set of methods to augment LLM input with retrieved information, such as relevant tools, is referred to as Retrieval Augmented Generation (RAG) (Guu et al., 2020; Lewis et al., 2020). RAG consists of three primary components: Tool Retrieval, Plan Generation, and Execution. 1 In this study, we focus on enhancing tool retrieval, with the goal of achieving subsequent improvements in plan generation. Existing RAG methodologies rely heavily on semantic search for tool retrieval, but this approach has limitations, especially when queries lack specificity or context. To this end, we present Context Tuning, a component in RAG that precedes tool retrieval, to provide contextual understanding and context seeking abilities to improve tool retrieval and plan generation. Our contribution can be summarized as follows: 1. We empirically show that traditional RAG is inadequate for implicit/context-seeking queries and present context tuning as a viable solution; 2. We provide a systematic comparison of various context retrieval methods applied on both lightweight models and LLMs; 3. We share empirically the insight that Chain of Thought (CoT) augmentation improves context retrieval when no fine-tuning is applied, whereas fine-tuning the retrieval model removes the need for CoT augmentation; 4. We propose a lightweight model using Reciprocal Rank Fusion (RRF) (Cormack et al., 1 Typically, the query along with retrieved tools undergo dynamic prompt construction before presented to an LLM. This process is called Query Decoration/Transformation. We omit that in this work for the sake of simplicity." 2312.05727v1,"1 Cyber-Physical Testbed Integrating RTAC with RTDS for Game-Theoretic Topology Control Under Load Altering Attacks Alaa Selim, Student Member, IEEE, Junbo Zhao, Senior Member, IEEE Abstract—This paper introduces a cyber-physical testbed that integrates the Real-Time Digital Simulator (RTDS) with the Real-Time Automation Controller (RTAC) to enhance cybersecurity in electrical distribution networks. Focused on addressing vulnerabilities to cyber attacks, our testbed employs an advanced control algorithm developed in Python and executed through real-time controllers. Key to our approach is the seamless integration of the host PC machine, RTDS, and RTAC via the Modbus protocol. We present a game theory-based topology control strategy as an effective response to cyber attacks, specifically targeting smart meters. This testbed validates the efficacy of our method in fully eliminating voltage violations due to load altering attacks, showcasing substantial advancements in smart grid cybersecurity via the innovative use of RTDS and RTAC to simulate and counteract complex cyber threats. Substation in Box Software Tool Real-time Simulations GPS clock do synchronizing power equipment Programmable Automation Controller Load PMU Solution Transfer Relays Algorithm Development Breaker Validation & Verification Fig. 1: Conceptual model Index Terms—Cybersecurity, Cyber-Physical Systems, Game Theory, Cyber Attack Mitigation, Real-Time Digital Simulator (RTDS), Real- Time Automation Controller (RTAC) I. I NTRODUCTION ITH the advent of smart grid technology, the integration of cyber systems with physical grid operations has dramatically transformed the landscape of the power sector. This fusion has ushered in an era of enhanced efficiency and sophisticated management capabilities, as evident in the widespread adoption of advanced metering infrastructure (AMI) and intelligent control systems. As the sector continues to evolve amidst increasing digitalization, the focus shifts towards developing resilient systems to not only withstand cyber threats but also recover swiftly from them. For instance, integrating utility devices like switches and capacitors introduces both complexity and an opportunity for increased grid resilience. By leveraging the synergy between cyber advancements, such as realtime data analytics, and physical grid enhancements, such as adaptive protection schemes, we can innovate and improve grid operations. The deployment of advanced control algorithms through real-time controllers stands as a cornerstone for validating the effectiveness and feasibility of resiliency solutions. This paper specifically concentrates on harnessing the versatility and power of Python, a high-level programming language known for its efficiency and readability, to address critical power system problems by enabling the use of advanced machine learning and model-based algorithms [1]. We aim to bridge the gap between theoretical algorithm development and practical application by integrating Python with real-time simulation environments, as shown in Fig. 1. Several methodologies are available to achieve seamless integration between Python and real-time controllers, each with its own characteristics and suitability. While API interfaces and socket communication are common methods, they present certain limitations in the context of real-time operations. API interfaces [2], for instance, often lack the immediacy required for real-time data exchange, as they typically operate over HTTP protocols not optimized for low latency. Socket communication [3], on the other hand, while potentially faster and more direct, introduces complexities in data packet management W A. Selim and J. Zhao are with the Department of Electrical and Computer Engineering, University of Connecticut (e-mail: alaa.selim@uconn.edu, junbo@uconn.edu). and necessitates a more in-depth understanding of network protocols. In contrast to these methods, Modbus protocol [4] emerges as a more suitable candidate for our integration needs. Despite being slower than socket communication in raw speed, Modbus compensates with its remarkable stability, standardized communication format, and ease of implementation. Its simplicity and robustness, essential for industrial applications, outweigh the speed advantage of socket communication, especially considering the latter’s increased complexity and potential for errors in data handling. With the successful integration of Python with real-time controllers such as Real-Time Automation Controller (RTAC) and Real-Time Digital Simulator (RTDS) via Modbus, we are now strategically positioned to tackle pressing challenges in power systems, particularly cyber attacks targeting smart meters. Such attacks pose a significant threat, as they can lead to system instability and violations of operational standards, undermining the reliability and security of the power grid. The sophistication of these cyber attacks requires an equally advanced response – a task well-suited to Python’s capabilities. By deploying these Python-developed algorithms on realtime controllers, we can effectively monitor smart meter operations, detect anomalous behaviors indicative of cyber attacks, and initiate immediate countermeasures to maintain system stability and compliance with regulatory standards. The landscape of smart grid cybersecurity is continually evolving, as highlighted by the comprehensive analysis in [11], which focuses on the complexities of man-in-the-middle attacks altering network topology data. In the context of this expanding field, our research emerges as a crucial next step, concentrating specifically on the cybersecurity of grid meters. Our work diverges from the traditional approach of network data manipulation, instead directing attention toward the vulnerabilities inherent in metering systems and the application of topology control as an innovative mitigation technique. This shift in focus is driven by the need to address the unique challenges posed by meter-centric cyber threats, which have not been extensively explored in existing literature. In the realm of cyber attack mitigation algorithms, numerous sophisticated methods have been explored, including Deep Reinforcement Learning (DRL) and Model Predictive Control (MPC) as in" 2312.05732v1,"Reply to “Comment on ‘Generalized James’ effective Hamiltonian method’ ” Wenjun Shao, 1, 2 Chunfeng Wu, 3, ∗ and Xun-Li Feng 4, † 1 Department of Physics, School of Science, Westlake University, Hangzhou 310030, China Institute of Natural Sciences, Westlake Institute for Advanced Study, Hangzhou 310024, China 3 Science, Mathematics and Technology, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372 4 Department of Physics, Shanghai Normal University, Shanghai 200234, China 2 In the preceding Comment [1] it was claimed that the third-order Hamiltonian obtained in our original paper [2] is not Hermitian for general situations when considering time-dependence and the way of deriving the effective third-order expansion is not very rigorous. To reply the comment we should emphasize the following three points: first of all, the third-order Hamiltonian given in our paper is exactly Hermitian under the conditions mentioned there. Secondly, the iterative method adopted in our paper to derive the generalized effective Hamiltonian is equivalent to the Dyson series, and its correctness can thus be guaranteed. Thirdly, although the truncated effective Hamiltonian is indeed non-Hermitian under the time-dependent situation as presented in the Comment, it corresponds exactly to the non-unitary truncated Dyson series. Considering the truncated Dyson series has been extensively utilized in the time-dependent perturbation theory, in our opinion, the non- Hermitian truncated effective Hamiltonian can still be treated as an approximation of the effective Hamiltonian. In 2000, James proposed an effective Hamiltonian method in the appendix of his paper [3], which provides us an efficient tool to solve many interesting questions related to light-matter interactions with large detuning. Such a method was extensively cited and was later referred to as James’ effective Hamiltonian method. This method is usually applicable to deal with the following Hamiltonian in the interaction picture  X  Ĥ I (t) = (1) ĥ m e iω m t + ĥ † m e −iω m t , m where the operators ĥ m are generally independent of time. By formally solving the Schrödinger equation governed by Eq. (1) and resorting to the iterative method, one can arrive at an effective Hamiltonian under the Markovian approximation, Z t 1 (2) Ĥ I (t ′ )dt ′ . (2) Ĥ eff = Ĥ I (t) ih̄ 0 If all the frequencies ω m are distinct, substituting Eq. (1) into Eq. (2) yields the following effective Hamiltonian under the rotating wave approximation in which all the terms containing exp[±i(ω m − ω n )] are neglected because ω m − ω n is still large enough to meet the rotating wave ∗ chunfeng˙wu@sutd.edu.sg † xunli˙feng@sutd.edu.sg approximation Ĥ I (t) = 1 [ ĥ m , ĥ † m ]. h̄ω m m X (3) If the condition that all the frequencies ω m are distinct is not satisfied, which means two or more frequencies, say ω m andω n , are close in quantity, which means |ω m − ω n | ≪ ω m , ω n , the terms containing exp[±i(ω m − ω n )] are not negligible because ω m − ω n is small and the rotating wave approximation cannot be satisfied. In this case the resultant effective Hamiltonian might be non- Hermitian. To overcome such problems James and his colleagues improved the original James’ effective Hamiltonian method by using a time-averaged filter operation [4, 5]. In our paper [2] we gave a generalized version of James’ effective Hamiltonian method [3] by using the iterative method and obtained an effective Hamiltonian of the form (2) (3) (n) Ĥ eff (t) = Ĥ eff (t) + Ĥ eff (t) + · · · + Ĥ eff (t) + · · · , (4) (2) (3) where Ĥ eff (t) takes the form of Eq. (2) and Ĥ eff (t) takes the following form   2 Z t Z t 1 1 (3) Ĥ eff = Ĥ I (t) Ĥ I (t 2 )dt 2 dt 1 . (5) Ĥ I (t 1 ) ih̄ 0 0 (n) For more details and the form of nth order Ĥ eff (t) readers can refer to our paper [2]." 2312.05733v1,"DevBots can co-design APIs Vinicius Soares Silva Marques Department of Computer Science University of Brası́lia (UnB) Brası́lia, Brazil marques.vinicius@gmail.com Abstract—DevBots are automated tools that perform various tasks in order to support software development. They are a growing trend and have been used in repositories to automate repetitive tasks, as code generators, and as collaborators in eliciting requirements and defining architectures. In this study, we analyzed 24 articles to investigate the state of the art of using DevBots in software development, trying to understand their characteristics, identify use cases, learn the relationship between DevBots and conversational software development, and discuss how prompt engineering can enable collaboration between human developers and bots. Additionally, we identified a gap to address by applying prompt engineering to collaborative API design between human designers and DevBots and proposed an experiment to assess what approach, between using Retrieval Augmented Generation or not, is more suitable. Our conclusion is that DevBots can collaborate with human API designers, but the two approaches have advantages and disadvantages. Index Terms—DevBots, Conversational Software Development, API Design, Artificial Intelligence, Large Language Models, Generative Pre-Trained Transformers, Retrieval Augmented Generation I. I NTRODUCTION The use of bots to support software development activities has been a growing trend in recent years. Once restricted to automating repetitive tasks, such as commits to code repositories and opening and monitoring issues [1], [2], today they are also used for code review [3], [4], creating test scripts [5], [6], and monitoring events [3]. With the advance of Artificial Intelligence (AI), and especially with the popularization of Large Language Models (LLMs), they were also used for data extraction and analysis [3], [4], task recommendations [3], [7] and collaborative development through code generation and requirements elicitation [8]. Its use in repositories such as GitHub is widespread. Whether it’s to automatically classify, comment on, monitor and close issues [1], [2], [9], [4], or to automate commits [10] [2], its presence is noted in many projects. Its use has evolved to Continuous Integration / Continuous Delivery (CI/CD) tracks [1], [3], [4], with commits, dependency satisfaction and automated deploys, as well as event detection and monitoring [3]. It is also possible to recognize the presence of DevBots in code-related activities. Activities such as code review [1], [3], [4], identifying and correcting bugs [3], [4] or violations of coding standards [4], and static analysis [3], [4] benefit from the use of bots in terms of productivity [4], [11], [5], [12]. With the popularization of LLMs, more complex activities are now being carried out by or in collaboration with DevBots. Extracting, analyzing and sharing data is one of them. In addition, bots can recommend tasks and improvements [3], [4]. More recently, conversational software development has allowed for the elicitation of requirements, collaborative design of architectures [8] and the generation of code, specifications and documentation [5], [13], bringing numerous opportunities for future work. This study selected and analyzed 24 articles that made it possible to investigate the state of the art of using DevBots in software development. Their main characteristics and use cases were identified. It was also possible to reveal the relationship between DevBots and conversational software development. In addition, the study sought to discuss how prompt engineering can enable collaboration between human developers and bots. Finally, we created and conducted an experiment in which we created API specifications with the aid of an LLM and assessed whether a Retrieval Augmented Generation approach helps in the process. II. S TATE OF THE A RT A. Methodology A Systematic Literature Review (SLR) was carried out following the guidelines of Kitchenham et al. [14] to investigate the use of bots in software development. To do this, research questions were created, a search string was built, databases were selected, selection criteria were defined, a quality assessment was carried out and finally the data was extracted and analyzed. B. Research Questions In this work, the aim is to reveal the state of the art in the use of bots in software development, to enable the identification of possible gaps for future studies. The research questions are as follows (Table I): RQ RQ.1 RQ.2 RQ.3 RQ.4 Research Questions What are the most common features of DevBots? What are some use cases of DevBots? What is the relationship between DevBots and conversational software development? How does prompt engineering enable the use of DevBots in software design and development? TABLE I L IST OF R ESEARCH Q UESTIONS" 2312.05738v1,"FedReverse: Multiparty Reversible Deep Neural Network Watermarking Junlong Mao, Huiyi Tang, Yi Zhang, Fengxia Liu, Zhiyong Zheng and Shanxiang Lyu ✦ Abstract—The proliferation of Deep Neural Networks (DNN) in commercial applications is expanding rapidly. Simultaneously, the increasing complexity and cost of training DNN models have intensified the urgency surrounding the protection of intellectual property associated with these trained models. In this regard, DNN watermarking has emerged as a crucial safeguarding technique. This paper presents FedReverse, a novel multiparty reversible watermarking approach for robust copyright protection while minimizing performance impact. Unlike existing methods, FedReverse enables collaborative watermark embedding from multiple parties after model training, ensuring individual copyright claims. In addition, FedReverse is reversible, enabling complete watermark removal with unanimous client consent. FedReverse demonstrates perfect covering, ensuring that observations of watermarked content do not reveal any information about the hidden watermark. Additionally, it showcases resistance against Known Original Attacks (KOA), making it highly challenging for attackers to forge watermarks or infer the key. This paper further evaluates FedReverse through comprehensive simulations involving Multi-layer Perceptron (MLP) and Convolutional Neural Networks (CNN) trained on the MNIST dataset. The simulations demonstrate FedReverse’s robustness, reversibility, and minimal impact on model accuracy across varying embedding parameters and multiple client scenarios. Index Terms—Deep Neural Networks (DNN), Reversible Watermarking, Multiparty Watermarking, Intellectual Property Protection, Model Security. 1 I NTRODUCTION The soaring popularity of Deep Neural Networks (DNN) can be attributed to their outstanding performance in various domains [1]–[5]. However, the widespread adoption of DNNs has raised concerns regarding unauthorized model usage and a lack of proper attribution to their creators [6]–[8]. In response to these challenges, the field of DNN watermarking has emerged as a vital means of safeguarding the intellectual property embedded within these models [9]. Watermarking offers an additional layer of security that enables creators to assert ownership, defend models against unauthorized access and tampering, trace their origins, ensure data integrity, manage versions, and detect malicious usage [10]–[13]. Junlong Mao, Huiyi Tang and Shanxiang Lyu are with the College of Cyber Security, Jinan University, Guangzhou 510632, China (Emails: maojunlong@stu2022.jnu.edu.cn, wt20180112@stu2019.jnu.edu.cn, lsx07@jnu.edu.cn). Yi Zhang, Fengxia Liu and Zhiyong Zheng are with the Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering, Renmin University of China, Beijing 100872, China (Emails: ethanzhang@ruc.edu.cn, shunliliu@buaa.edu.cn, zhengzy@ruc.edu.cn). To protect the intellectual property rights of DNNs, a range of DNN watermarking techniques have been developed, including parameter-based watermarking and backdoorbased watermarking, which are discussed in references [14], [15]. i) Parameter-based watermarking methods involve the embedding of personalized watermarks into the parameters or their distribution within the DNN model, as elaborated in references [11], [15]–[17], and [18]. While this approach allows for the conveyance of multiple bits of information, it requires access to the inner workings of the suspected model, known as white-box access, for watermark extraction. ii) Backdoor-based watermarking methods, as elucidated in references [14], [19]–[21], exploit backdoor attacks [22] to introduce specific triggers that can identify the model’s ownership. However, backdoor-based watermarking typically results in a zero-bit watermark, which means that it only indicates the presence or absence of the watermark itself, rather than representing an identity in the form of a bit string [23]. This verification can be achieved even with limited information, known as black-box access. Recent research has also explored the use of watermarks to protect copyright in the context of Federated Learning (FL) [19], [24]–[26]. WAFFLE [27] seems to be the first DNN watermarking technique for FL. It assigns the Server the responsibility of integrating backdoor-based watermarks into the FL model. Clients cannot backdoor, poison, or embed their own watermarks since they are incentivized to maximize global accuracy. FedIPR [28] and [29], [30] advocate for the hybrid of black-box and white-box techniques. They enable all clients to embed their own watermark in the global model without sharing secret information. On this basis, FedTracker [31] has been proposed to provide the trace evidence for illegal model re-distribution by unruly clients. It uses a combination of server-side global backdoor watermarks and client-specific local parameter watermarks, where the former is used to verify the ownership of the global model, and the latter is used to trace illegally redistributed models back to unruly clients. Nevertheless, existing studies primarily focus on embedding watermarks during training, which could potentially diminish the system’s performance. Another crucial challenge is ensuring that private watermarks added by different clients to the same federated DNN model do not conflict with each other. This challenge is unique to the federated learning setting, where different client’s watermarks may have the potential to undermine one another." 2312.05745v1,"Open World Object Detection in the Era of Foundation Models Orr Zohar, Alejandro Lozano, Shelly Goel, Serena Yeung, Kuan-Chieh Wang Stanford University {orrzohar, lozanoe, shelly23, syyeung, wangkua1}@stanford.edu Abstract unknown known unknown? Object detection is integral to a bevy of real-world applications, from robotics to medical image analysis. To be used reliably in such applications, models must be capable of handling unexpected - or novel - objects. The open world object detection (OWD) paradigm addresses this challenge by enabling models to detect unknown objects and learn discovered ones incrementally. However, OWD method development is hindered due to the stringent benchmark and task definitions. These definitions effectively prohibit foundation models. Here, we aim to relax these definitions and investigate the utilization of pre-trained foundation models in OWD. First, we show that existing benchmarks are insufficient in evaluating methods that utilize foundation models, as even naive integration methods nearly saturate these benchmarks. This result motivated us to curate a new and challenging benchmark for these models. Therefore, we introduce a new benchmark that includes five real-world application-driven datasets, including challenging domains such as aerial and surgical images, and establish baselines. We exploit the inherent connection between classes in application-driven datasets and introduce a novel method, Foundation Object detection Model for the Open world, or FOMO, which identifies unknown objects based on their shared attributes with the base known objects. FOMO has ∼ 3× unknown object mAP compared to baselines on our benchmark. However, our results indicate a significant place for improvement - suggesting a great research opportunity in further scaling object detection methods to real-world domains. Our code and benchmark are available at https: //orrzohar.github.io/projects/fomo/. unknown? Existing OWD Benchmarks Proposed RWD Benchmark Figure 1. Should ‘giraffe’ and ‘bench’ be unknown objects? Existing open world detection benchmarks are based on the COCO dataset (shown in left), which contains arguably the most common objects in everyday environments. This setup also limits the usage of state-of-the-art detection methods based on foundation models, as it is unreasonable that these models did not receive extensive supervision of these objects. This work proposes a new applicationdriven benchmark (shown in right), which is out-of-distribution for these foundation models (Sec. 3). More importantly, this allows us to explore using modern foundation model-based methods. sumption, necessitating the detection of both known/expected objects and unknown/novel objects. It also challenges them to incrementally learn previously unknown objects using limited supervision. Models that excel in this setting should demonstrate robust detection of unknown objects and flexible learning of those discovered [10, 11, 19, 36]. One would expect the progress in OWD to lead to a broader adaptation of detection methods in applications. Ensuring that progress in the OWD task truly translates to more reliable real-world detection methods is essential. Yet, a discrepancy exists between existing OWD benchmark definitions and the state-of-the-art foundation model-based detection methods. On the one hand, the established OWD benchmarks are repurposed from the COCO dataset, containing only 80 everyday classes [16]. Existing OWD benchmarks conceal the class label from a subset of these classes and treat them as ‘unknowns’. Yet, should we expect a ‘bench’ to be an unknown object to a foundation detection 1. Introduction Object detection is a foundational computer vision task with applications in a variety of fields such as autonomous driving [20], robotics [3, 33], and medicine [6, 13]. To ensure reliable detection in the face of new environments with unknown objects, open world object detection (OWD) has recently been proposed as a practical computer vision task [11]. OWD extends detection methods beyond the closed-set as- 1" 2312.05759v1,"Beyond One Model Fits All: Ensemble Deep Learning for Autonomous Vehicles Hemanth Manjunatha Panagiotis Tsiotras School of Aerospace Engineering Georgia Institute of Technology Atlanta, Georgia hmanjunatha6@gatech.edu School of Aerospace Engineering Georgia Institute of Technology Atlanta, Georgia tsiotras@gatech.edu Abstract—Deep learning has revolutionized autonomous driving by enabling vehicles to perceive and interpret their surroundings with remarkable accuracy. This progress is attributed to various deep learning models, including Mediated Perception, Behavior Reflex, and Direct Perception, each offering unique advantages and challenges in enhancing autonomous driving capabilities. However, there is a gap in research addressing integrating these approaches and understanding their relevance in diverse driving scenarios. This study introduces three distinct neural network models corresponding to Mediated Perception, Behavior Reflex, and Direct Perception approaches. We explore their significance across varying driving conditions, shedding light on the strengths and limitations of each approach. Our architecture fuses information from the base, future latent vector prediction, and auxiliary task networks, using global routing commands to select appropriate action sub-networks. We aim to provide insights into effectively utilizing diverse modeling strategies in autonomous driving by conducting experiments and evaluations. The results show that the ensemble model performs better than the individual approaches, suggesting that each modality contributes uniquely toward the performance of the overall model. Moreover, by exploring the significance of each modality, this study offers a roadmap for future research in autonomous driving, emphasizing the importance of leveraging multiple models to achieve robust performance. I. I NTRODUCTION Deep learning has played a pivotal role in propelling the development of autonomous driving. Over the past years, deep learning techniques involving training neural networks on massive datasets have enabled vehicles to perceive and interpret their surroundings with unprecedented accuracy [1]. Notably, deep learning models with structure (for example, world models [2]) have emerged as a crucial approach in advancing autonomous driving capabilities [3], [4]. By learning a good representation through structured deep learning models, vehicles can effectively process complex information from various sensors and sources, enhancing their perception and decision-making abilities. To date, these models can be broadly categorized into three overarching paradigms: Mediated Perception [5], Behavior Reflex [6], and Direct Perception approaches [7]. Nevertheless, there still remains a lack of research addressing the amalgamation of all three approaches into a single model and answering whether the individual approaches maintain their salience under varying driving conditions. This study aims to remedies these issue by introducing three distinct neural network models corresponding to the Mediated Perception, Behavior Reflex, and Direct Perception approaches, thereby elucidating the significance of each approach across diverse driving scenarios. Mediated Perception: It involves constructing a World Model by understanding different elements in the scene such as lanes, other cars, and traffic lights [8], [5]. By World Model, we mean architectures that are designed explicitly to acquire internal models of the environment [2]. Indeed, evidence from recent neuroscience/cognitive science research [9], [10] supports the idea of constructing internal models of the environment, i.e., World Model (WM), to predict the consequences of the actions is a natural way to achieve desired interaction of the agent with its surroundings. The predictive WM, typically, involves an Autoencoders (AEs) and a Recurrent Neural Networks (RNNs) to deduce low-dimensional “latent variables” from data with temporal correlations [11], [12], [13], [14], [15]. Even though constructing the World Model has benefited driving [16], [17], comprehending the entire scene might introduce unnecessary intricacy. Moreover, not all the objects in a scene are relevant for driving. Thus, the Mediated Perception can suffer from learning redundant representations while adding more complexity. Mediated Perception Sensory Input , Embeddings Behavior Reflex Augment Driving Actions Direct Perception What is the significance of each embedding at different driving conditions? Fig. 1. Overview of the ensemble deep learning architecture for autonomous driving. Behavior Reflex: Directly maps the input sensory input (usually images) to driving actions [18], [7], [19]. The mapping of sensory input to the driving action is usually achieved by imitation learning, where a network is trained (in a regression/classification fashion) using the data collected by an expert driver [20]. Even though the approach is straightforward, there are several drawbacks. First, for the" 2312.05766v1,"Efficient harmonic resolvent analysis via time-stepping Ali Farghadan 1 , Junoh Jung 1 , Rutvij Bhagwat 1 , Aaron Towne ∗1 1 Department of Mechanical Engineering, University of Michigan, Ann Arbor, MI, USA Abstract. We present an extension of the RSVD-∆t algorithm initially developed for resolvent analysis of statistically stationary flows to handle harmonic resolvent analysis of timeperiodic flows. The harmonic resolvent operator, as proposed by Padovan et al. (2020), characterizes the linearized dynamics of time-periodic flows in the frequency domain, and its singular value decomposition reveals forcing and response modes with optimal energetic gain. However, computing harmonic resolvent modes poses challenges due to (i) the coupling of all N ω retained frequencies into a single harmonic resolvent operator and (ii) the singularity or near-singularity of the operator, making harmonic resolvent analysis considerably more computationally expensive than a standard resolvent analysis. To overcome these challenges, the RSVD-∆t algorithm leverages time stepping of the underlying time-periodic linearized Navier-Stokes operator, which is N ω times smaller than the harmonic resolvent operator, to compute the action of the harmonic resolvent operator. We develop strategies to minimize the algorithm’s CPU and memory consumption, and our results demonstrate that these costs scale linearly with the problem dimension. We validate the RSVD-∆t algorithm by computing modes for a periodically varying Ginzburg-Landau equation and demonstrate its performance using the flow over an airfoil. 1 Introduction Model reduction plays a critical role in the study of fluid mechanics due to the complex and highdimensional nature of fluid flows, especially turbulent ones. In particular, modal decompositions, both data-driven and equation-based, have proven to be effective at identifying low-dimensional sets of modes associated with interpretable coherent structures that significantly influence quantities of engineering interest such as kinetic energy, heat and mass transfer, and noise emissions (Taira et al., 2017; Towne et al., 2018). In particular, resolvent analysis has been extensively employed to comprehend, model, and control statistically stationary turbulent flows such as wall-bounded turbulence (Dawson & McKeon, 2019), turbulent boundary layer (Sipp & Marquet, 2013), and jet flows (Pickering et al., 2021). However, real-world fluid systems often exhibit non-stationary behavior, including periodicity, rendering resolvent analysis less effective. Examples of flows exhibiting ∗ Email address for correspondence: towne@umich.edu 1" 2312.05778v1,"Guiding ChatGPT to Fix Web UI Tests via Explanation-Consistency Checking Zhuolin Xu Yuanzhang Lin Concordia University Canada zhuolin.xu@mail.concordia.ca Beihang University China linyz2020@gmail.com Qiushi Li Shin Hwei Tan Concordia University Canada qiushili2021@gmail.com Concordia University Canada shinhwei.tan@concordia.ca ABSTRACT The rapid evolution of Web UI incurs time and effort in maintaining UI tests. Existing techniques in Web UI test repair focus on finding the target elements on the new web page that match the old ones so that the corresponding broken statements can be repaired. We present the first study that investigates the feasibility of using prior Web UI repair techniques for initial local matching and then using ChatGPT to perform global matching. Our key insight is that given a list of elements matched by prior techniques, ChatGPT can leverage the language understanding to perform global view matching and use its code generation model for fixing the broken statements. To mitigate hallucination in ChatGPT, we design an explanation validator that checks whether the provided explanation for the matching results is consistent, and provides hints to ChatGPT via a self-correction prompt to further improve its results. Our evaluation on a widely used dataset shows that the ChatGPT-enhanced techniques improve the effectiveness of existing Web test repair techniques. Our study also shares several important insights in improving future Web UI test repair techniques. ACM Reference Format: Zhuolin Xu, Yuanzhang Lin, Qiushi Li, and Shin Hwei Tan. 2023. Guiding ChatGPT to Fix Web UI Tests via Explanation-Consistency Checking. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION When developers change the attributes of user interfaces (UI) of a Web application due to the rapidly changing requirements, the corresponding Web UI tests need to be manually updated for test maintenance. To reduce manual efforts in repairing broken Web UI tests, several automated approaches have been proposed [7, 26, 41]. The key step in automated repair of Web UI tests is to modify the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn broken statements containing outdated element locators by matching the element 𝑒 𝑜𝑙𝑑 in the old version of a Web application with the element in the new version 𝑒 𝑛𝑒𝑤 [14]. Prior Web UI test repair techniques mostly rely on a set of Document Object Model (DOM) attributes (e.g., identifiers and XPath) [7] or visual information [41] to determine whether the two elements 𝑒 𝑜𝑙𝑑 and 𝑒 𝑛𝑒𝑤 match. These techniques extract and compute the similarity of these information to select the most similar element as the result of the matching. As there can be many attributes of a Web UI element which can be used for matching, these techniques may prioritize certain attributes. For example, Water, one of the classical Web UI test repair techniques, performs matching via several steps by using different sets of attributes in each step. First, it searches for elements that are exactly the same by matching five attributes (id, XPath, class, linkText, name). If the first step fails to find the matching element in the new version that makes the test pass, it then finds similar DOM nodes using other additional attributes. Specifically, it finds the element with the same tagname, and then computes the similarity between the element with the same tagname using normalized Levenshtein distance between the XPaths of 𝑒 𝑜𝑙𝑑 and 𝑒 𝑛𝑒𝑤 . Then, it further matches using other attributes (e.g., screen position of a DOM node), and computes a similarity score based on the weighted sum of XPath and other attributes where it prioritizes XPath similarity based on the heuristic that the XPaths of the nodes “should be very similar across versions” [7]). As the prioritization and the predefined order used for matching these set of attributes are usually based on heuristic made by the tool developers, the matching algorithm may not accurately reflect the evolution of the Web element, causing inaccuracy in the matching step, and subsequently unable to find the repair for the broken statement. Meanwhile, prior learning-based techniques show promising results in combining different types of information for repairing broken GUI tests in Android apps (e.g., combining word and layout embeddings [47], or fusing GUI structure and visual information [46]). The richer representation used by these learning-based techniques has been shown to help improving the accuracy of the UI matching step. To solve the aforementioned problem of Web UI test repair and to hinge on richer representation in learning-based approach, we present the first feasibility study of combining ChatGPT with traditional Web UI test repair approaches for solving the aforementioned element matching problem in prior techniques. Our use of Chat- GPT is based on the encouraging results shown in prior studies for" 2312.05802v1,"Enhancing Scalability in Bayesian Nonparametric Factor Analysis of Spatiotemporal Data Yifan Cheng ∗ and Cheng Li † Department of Statistics and Data Science, National University of Singapore Abstract This manuscript puts forward novel practicable spatiotemporal Bayesian factor analysis frameworks computationally feasible for moderate to large data. Our models exhibit significantly enhanced computational scalability and storage efficiency, deliver high overall modeling performances, and possess powerful inferential capabilities for adequately predicting outcomes at future time points or new spatial locations and satisfactorily clustering spatial locations into regions with similar temporal trajectories, a frequently encountered crucial task. We integrate on top of a baseline separable factor model with temporally dependent latent factors and spatially dependent factor loadings under a probit stick breaking process (PSBP) prior a new slice sampling algorithm that permits unknown varying numbers of spatial mixture components across all factors and guarantees them to be non-increasing through the MCMC iterations, thus considerably enhancing model flexibility, efficiency, and scalability. We further introduce a novel spatial latent nearest-neighbor Gaussian process (NNGP) prior and new sequential updating algorithms for the spatially varying latent variables in the PSBP prior, thereby attaining high spatial scalability. The markedly accelerated posterior sampling and spatial prediction as well as the great modeling and inferential performances of our models are substantiated by our simulation experiments. Contents 1 Introduction 3 2 Bayesian Spatiotemporal Gaussian Factor Model 2.1 Spatiotemporal Factor Model and Prior Specification . . . . . . . . . . . . . . . . 2.2 Spatial Clustering via Probit Stick Breaking Process on Factor Loadings . . . . . 5 5 6 3 Slice Sampling for Bayesian Spatial Clustering 7 4 Spatial Scalability via Nearest-Neighbor Gaussian Process and Sequential Updates 11 4.1 Computational Burdens for a Large Spatial Covariance Matrix . . . . . . . . . . 12 4.2 Incorporating the Latent NNGP . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.3 Approximating F (ρ) −1 and det(F (ρ)) . . . . . . . . . . . . . . . . . . . . . . . . 13 4.4 Sequentially Updating α jl j ’s Under Our Spatial NNGP Prior . . . . . . . . . . . 14 4.5 Full Spatial GP Extension for the Latent NNGP . . . . . . . . . . . . . . . . . . 16 ∗ † y.cheng@u.nus.edu stalic@nus.edu.sg 1" 2312.05803v1,"Transformer-based Selective Super-Resolution for Efficient Image Refinement Tianyi Zhang 1 , Kishore Kasichainula 2 , Yaoxin Zhuo 2 , Baoxin Li 2 , Jae-Sun Seo 3 , Yu Cao 1 1 University of Minnesota Arizona State University 3 Cornell Tech zhan9167@umn.edu, {kkasicha, yzhuo6, baoxin.li}@asu.edu, js3528@cornell.edu, yucao@umn.edu 2 Abstract Conventional super-resolution methods suffer from two drawbacks: substantial computational cost in upscaling an entire large image, and the introduction of extraneous or potentially detrimental information for downstream computer vision tasks during the refinement of the background. To solve these issues, we propose a novel transformer-based algorithm, Selective Super-Resolution (SSR), which partitions images into non-overlapping tiles, selects tiles of interest at various scales with a pyramid architecture, and exclusively reconstructs these selected tiles with deep features. Experimental results on three datasets demonstrate the efficiency and robust performance of our approach for super-resolution. Compared to the state-of-the-art methods, the FID score is reduced from 26.78 to 10.41 with 40% reduction in computation cost for the BDD100K dataset. The source code is available at https://github.com/destiny301/SSR. Introduction Super-resolution (SR) is a fundamental task aimed at enhancing image resolution by producing intricate details from low-resolution (LR) images. It supplies high-resolution (HR) images that are pivotal for downstream computer vision tasks, such as object detection and image classification, with wide-ranging applications in the real world. For instance, in the context of autonomous driving, higherresolution images facilitate more precise and early object detection, particularly for diminutive objects. Although various super-resolution methods based on convolutional neural networks (CNNs) have been proposed, which enhance highfrequency information through low-resolution image reconstruction, their efficacy is impeded by a lack of long-range dependency integration. Recently, leveraging transformer-based architectures to capture the extended contextual information, pioneering efforts like SwinIR (Liang et al. 2021) and HAT (Chen et al. 2023), have achieved notable advancements in super-resolution. Nevertheless, two key issues persist with these algorithms. Firstly, due to the substantial scale of transformer-based networks, the computational demand becomes exceedingly high when reconstructing entire images, particularly when input low-resolution image sizes are not Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: The reconstruction of high-frequency background information in conventional SR methods (e.g., HAT) often results in discrepancies in features compared to ground truth high-resolution (HR) images. SSR effectively resolves this issue by exclusively enhancing foreground pixels. small, such as 256×256. Secondly, even in state-of-theart super-resolution approaches, the refined images fail to match the performance of ground truth HR images for typical downstream tasks. To delve into the cause of this degradation, we conduct a comparison between features generated by the Inception model from refined images and original HR images. This analysis unveils that features derived from background pixels exhibit markedly different details compared to the ground truth feature map, as depicted in Figure 1. This divergence suggests that overemphasizing background pixel details can introduce erroneous information and impede feature generation for downstream tasks. This paper introduces a novel algorithm, Selective Super- Resolution (SSR), designed to address these challenges. Specifically, leveraging object location information, we partition images into non-overlapping tiles and employ a costefficient transformer-based network for tile selection. To ensure comprehensive coverage of objects, a pyramid structure is devised for tile selection across multiple scales. In the final layer of this selection network, we integrate a Gumbel-" 2312.05812v1,"Topological conditions for impurity effects in graphene nanosystems Yuriy G. Pogorelov ∗ IFIMUP-IN, Departamento de Física, Universidade do Porto, Porto, Portugal, Vadim M. Loktev † N. N. Bogolyubov Institute of Theoretical Physics, NAS of Ukraine, Kyiv, Ukraine, & Igor Sikorsky Kyiv Polytechnic Institute, Kyiv, Ukraine, (Dated: December 12, 2023) We consider electronic spectra of graphene nanotubes and their perturbation by impurity atoms absorbed at different positions on nanotube surfaces, within the framework of Anderson hybrid model. A special attention is given to the cases when Dirac-like 1D modes appear in the nanotube spectrum and their hybridization with localized impurity states produces, at growing impurity concentration c, onset of a mobility gap near the impurity level and even opening, at yet higher c, of some narrow delocalized range within this mobility gap. Such behaviors are compared with the similar effects in the previously studied 2D graphene and armchair type graphene nanoribbons. Some possible practical applications are discussed. Keywords: graphene, armchair and zigzag edges, nanotubes, impurity adatoms, spectrum restructuring I. INTRODUCTION From the discovery, almost 20 years ago, of single-layer graphene [1], an enormous interest has been attracted not only to its two-dimensionality (2D) [2] but mainly to its massless, that is Dirac-like, spectrum of electronic excitations [3]. Studies of its various physical properties have a very broad nomenclature [4, 5] (see also [6]) but we focus here on certain aspects of non-ideal graphene structures, yet restricted to a single dimension (1D), namely, of graphene nanoribbons [7] and graphene nanotubes [8] in presence of impurities. In more detail, we consider here the electron quasiparticle spectra in principal topological types of graphene 1D nanosystems and their restructuring under effects by impurity atoms absorbed at different positions over carbon atoms [9]. In this course, the main attention is given to the cases when Dirac-like 1D modes exist in the nanotube spectrum [10] and then the impurity disorder effects on these modes are compared with the previously studied similar effects in 2D graphene [11] and in armchair type nanoribbons (ANR’s) [12]. The presentation is organized as follows. We begin from description of quasiparticle spectra for the two nanotube topologies: armchair nanotubes (ANT’s, Sec. II) and zigzag nanotubes (ZNT’s, Sec. III), in the forms adjusted to describe the impurity induced restructuring of spectra. This description, within the simplest T-matrix approximation for the quasi-particle self-energy, begins from the technically simpler ZNT case (Sec. IV) and then extends to the more involved ANT case (Sec. V). The next comparison with the previous results for 2D graphene and ANR’s (Sec. VI) reveals both qualitative ∗ Electronic address: ypogorel@fc.up.pt † Electronic address: vloktev@bitp.kiev.ua similarities and some quantitative differences in their behaviors. The obtained results are then verified with some T-matrix improvements (Sec. VII): the self-consistent T- matrix method and the group expansion (GE) method, both of them confirming validity of the simple T-matrix results. At least, a comparison of the ZNT and ANT host structures with the more general topology of twisted nanotubes is done in Sec. VIII, suggesting a qualitative difference between the twisted and non-twisted nanotubes in their sensitivity to impurity disorder. The final discussion of these theoretical results and of some perspectives for their practical applications is given in Sec. IX. II. ARMCHAIR NANOTUBES Let us consider nanoribbons cut out of 2D graphene. There are two basic orientations of their edges: zigzag and armchair, and we begin from the armchair edge type. Such an ANR can be seen as a composite of n chains (labeled by j indices) of transversal period a (the graphene lattice constant), each chain containing N ≫ 1 √ segments (labeled by p indices) of longitudinal period a 3, each segment including 4 atomic sites (labeled by s indices, see Fig. 1). Next, we consider the closure between the 1st and nth chains of an ANR, transforming it into an ANT without its twisting, see Fig. 2). For the following consideration of electronic dynamics, it is suitable to combine the local Fermi operators a p,j,s at 4 s-sites from jth chain in pth segment into the 4-spinor:   a p,j;1  a  a p,j =  p,j;2  . (1) a p,j;3 a p,j;4 Then the longitudinal translation invariance (with the" 2312.05815v1,"Voice Activity Detection (VAD) in Noisy Environments Joshua Ball Johns Hopkins University Department of Electrical and Computer Engineering IEEE #94164957 Baltimore, USA jball20@jh.edu Abstract—In the realm of digital audio processing, Voice Activity Detection (VAD) plays a pivotal role in distinguishing speech from non-speech elements, a task that becomes increasingly complex in noisy environments. This paper details the development and implementation of a VAD system, specifically engineered to maintain high accuracy in the presence of various ambient noises. We introduce a novel algorithm enhanced with a specially designed filtering technique, effectively isolating speech even amidst diverse background sounds. Our comprehensive testing and validation demonstrate the system’s robustness, highlighting its capability to discern speech from noise with remarkable precision. The exploration delves into: (1) the core principles underpinning VAD and its crucial role in modern audio processing; (2) the methodologies we employed to filter ambient noise; and (3) a presentation of evidence affirming our system’s superior performance in noisy conditions. The complete system and supplementary materials are accessible at: github.com/JBall1/VAD-in-Noisy-Environments. Index Terms—Voice Activity Detection, Audio Processing, Speech Recognition, Noise Suppression. I. I NTRODUCTION Voice Activity Detection (VAD) stands as a critical component in the domain of digital signal processing, with its essential role in distinguishing between speech and non-speech elements in audio streams. Its applications are far-reaching into our everyday lives, extending into realms of speech recognition systems such as Amazon’s Alexa and Apple’s Siri, where it serves as the fundamental gateway for human-machine interaction. Both of these, and the many other applications of VAD, demand a high degree of both accuracy and reliability from VAD algorithms, as the quality of the user experience hinges on their performance. Despite its widespread use, the efficacy of VAD is significantly challenged by the presence of ambient noise, which can obfuscate speech signals and degrade performance. The pursuit of a robust VAD system capable of navigating the complexities of real-world acoustic environments forms the cornerstone of this research. This paper delves into the development and refinement of an advanced VAD system, designed to enhance accuracy in detecting speech across various noisy settings. Central to our discussion are the core principles that underpin VAD technology and its pivotal role in modern audio processing. We detail the methodologies employed for signal feature extraction, filtering and classification, pivotal to the system’s functionality. Furthermore, we provide empirical evidence that substantiates the system’s superior performance in noisy conditions. In an increasingly interconnected world, where voice commands and communication are integral to our devices and services, the need for robust and precise VAD systems has never been more evident. This paper also considers the broader implications of these advancements. As VAD technologies become increasingly embedded in our lives, questions of privacy, security, and user autonomy come to the fore. We address these considerations, advocating for a balanced approach that respects user rights while providing enhanced functionality." 2312.05828v1,"Sparse Multitask Learning for Efficient Neural Representation of Motor Imagery and Execution Hye-Bin Shin Kang Yin Seong-Whan Lee Dept. of Brain and Cognitive Engineering Korea University Seoul, Republic of Korea hb shin@korea.ac.kr Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea charles kang@korea.ac.kr Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea sw.lee@korea.ac.kr Abstract—In the quest for efficient neural network models for neural data interpretation and user intent classification in braincomputer interfaces (BCIs), learning meaningful sparse representations of the underlying neural subspaces is crucial. The present study introduces a sparse multitask learning framework for motor imagery (MI) and motor execution (ME) tasks, inspired by the natural partitioning of associated neural subspaces observed in the human brain. Given a dual-task CNN model for MI-ME classification, we apply a saliency-based sparsification approach to prune superfluous connections and reinforce those that show high importance in both tasks. Through our approach, we seek to elucidate the distinct and common neural ensembles associated with each task, employing principled sparsification techniques to eliminate redundant connections and boost the fidelity of neural signal decoding. Our results indicate that this tailored sparsity can mitigate the overfitting problem and improve the test performance with small amount of data, suggesting a viable path forward for computationally efficient and robust BCI systems. Keywords–brain–computer interface, network pruning, sparse multitask learning; I. INTRODUCTION The neural processes underlying imagination, observation, and execution of movements share a profound and enigmatic connection. Neuroscientific studies have consistently demonstrated that these processes engage overlapping neural circuits, suggesting a shared neural subspace [1]–[3]. This revelation has significant implications for EEG-based brain-computer interfaces (BCIs) leveraging motor imagery (MI) and motor execution (ME) paradigms [4]–[6]. Despite the success of machine learning algorithms in uncovering meaningful and discriminative features from EEG data [7]–[9], deep learning has gained popularity in the EEG-BCI domain due to its ability to provide end-to-end learning solutions [10], [11]. However, state-of-the-art deep learning models trained offline on a fixed EEG dataset show severe overfitting due to the limited amount This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant, funded by the Korea government (MSIT) (No. 2019-0-00079, Artificial Intelligence Graduate School Program (Korea University); No.2021-0-02068, Artificial Intelligence Innovation Hub) and the National Research Foundation of Korea (NRF) grant funded by the MSIT (No.2022-2-00975, MetaSkin: Developing Nextgeneration Neurohaptic Interface Techonology that enables Communication and Control in Metaverse by Skin Touch. of training samples, coupled with the high-dimensional nature of multi-channel EEG data [10]. To enhance generalization in deep learning models for BCI, various strategies have been employed, from multidomain learning, which leverages insights gained from multiple subjects data, to multi-modal and multi-view learning approaches that integrate diverse physiological signals and feature representations, thereby enriching the model’s understanding and representational power [12]–[16]. Multi-task learning, on the other hand, remains relatively underexplored in the EEG-BCI domain and and presents a unique opportunity to address the challenge of model generalization, especially given its recent success in other domains, e.g., training large language models [17]. In the context of motor-related BCI paradigms, a multitask setup is particularly pertinent as it can exploit the duality of task imagination and execution inherent in their design, e.g., motor imagery/execution [15] and imagined/overt speech [18], [19]. Given the neuroscientific evidence for shared neural substrates underlying these tasks, multitask learning can potentially uncover the commonalities and learn shared representation across these related tasks. In this study, we construct a multitask CNN model for MI and ME classification and apply sparse training technique to distill the network to its most informative parameters while pruning away those that are not helpful for either task [20]– [22]. This sparse multitask learning approach can mitigate model overfitting and improve generalization performance by learning shared representations across different tasks. The integration of different pruning and sparse training methods is largely unexplored in BCI, but it can potentially help to create efficient and compact models suitable for real-time applications [23]–[26]. Our contribution is twofold: We demonstrate how multitask learning can be effectively applied to motor imagery and execution tasks in BCIs, uncovering shared neural representations that enhance model generalization. • We explore the integration of neural network pruning within this multitask framework, showcasing its potential in reducing model complexity while maintaining, or even improving, performance. •" 2312.05833v1,"Proceedings of Machine Learning Research vol vvv:1–16, 2024 Data-Driven Robust Covariance Control for Uncertain Linear Systems Joshua Pilipovsky JPILIPOVSKY 3@ GATECH . EDU Daniel Guggenheim School of Aerospace Engineering, Georgia Institute of Technology Panagiotis Tsiotras TSIOTRAS @ GATECH . EDU Daniel Guggenheim School of Aerospace Engineering, Georgia Institute of Technology Abstract The theory of covariance control and covariance steering (CS) deals with controlling the dispersion of trajectories of a dynamical system, under the implicit assumption that accurate prior knowledge of the system being controlled is available. In this work, we consider the problem of steering the distribution of a discrete-time, linear system subject to exogenous disturbances under an unknown dynamics model. Leveraging concepts from behavioral systems theory, the trajectories of this unknown, noisy system may be (approximately) represented using system data collected through experimentation. Using this fact, we formulate a direct data-driven covariance control problem using input-state data. We then propose a maximum likelihood uncertainty quantification method to estimate and bound the noise realizations in the data collection process. Lastly, we utilize robust convex optimization techniques to solve the resulting norm-bounded uncertain convex program. We illustrate the proposed end-to-end data-driven CS algorithm on a double integrator example and showcase the efficacy and accuracy of the proposed method compared to that of model-based methods. Keywords: Data-driven control, distributional control, uncertainty quantification, system identification, robust convex optimization. 1. Introduction Controlling the uncertainty is paramount for the development of safe and reliable systems. Originating from the pioneering contributions of Hotz and Skelton (1987), the theory of covariance control addresses the problem of asymptotically steering the distribution of a linear dynamical system from an initial to a terminal distribution when the system dynamics are corrupted by additive disturbances. When the time horizon is finite, the covariance control problem is often referred to as covariance steering (CS). This domain has evolved substantially in recent years, expanding to encompass more pragmatic scenarios. These extensions include incorporating probabilistic constraints on the state and the input (Pilipovsky and Tsiotras, 2021; Bakolas, 2016), the ability to steer more complex distributions (Sivaramakrishnan et al., 2022), and adaptations for receding horizon implementations (Saravanos et al., 2022) among many others. Covariance steering has also been successfully applied to diverse contexts such as urban air mobility (Rapakoulias and Tsiotras, 2023), vehicle path planning (Okamoto and Tsiotras, 2019), high-performance, aggressive driving (Knaup et al., 2023), spacecraft rendezvous (Renganathan et al., 2023), and interplanetary trajectory optimization (Ridderhof et al., 2020). A common underlying assumption in all the previous methods is the availability of a model of the system dynamics, typically derived from physical first principles. Acquiring such a model often involves either direct data acquisition or a synthesis of empirical data with first principles, a process broadly categorized under system identification. These approaches, while effective, present some notable challenges. First principles modeling demands extensive domain-specific knowledge and effort to accurately represent the system. System identification offers a balance between accuracy © 2024 J. Pilipovsky & P. Tsiotras." 2312.05837v1,"1 A Fast Numerical Solver of Quantum-inspired Ising Optimization Problems Langyu Li, and Yu Pan Senior Member, IEEE Abstract—Quantum annealers, coherent Ising machines and digital Ising machines for solving quantum-inspired optimization problems have been developing rapidly due to their near-term applications. The numerical solvers of the digital Ising machines are based on traditional computing devices. In this work, we propose a fast and efficient solver for the Ising optimization problems. The algorithm consists of a pruning method that exploits the graph information of the Ising model to reduce the computational complexity, and a domain selection method which introduces significant acceleration by relaxing the discrete feasible domain into a continuous one to incorporate the efficient gradient descent method. The experiment results show that our solver can be an order of magnitude faster than the classical solver, and at least two times faster than the quantum-inspired annealers including the simulated quantum annealing on the benchmark problems. With more relaxed requirements on hardware and lower cost than quantum annealing, the proposed solver has the potential for near-term application in solving challenging optimization problems as well as serving as a benchmark for evaluating the advantage of quantum devices. Index Terms—Ising optimization, Ising machine, quadratic unconstrained binary optimization, quantum annealing. I. I NTRODUCTION S a fundamental concept in the realm of quantum computing and optimization, the Ising problem has garnered significant attention in recent years. The Ising problem, originally conceived in statistical mechanics [1], has found applications in quantum computing [2] which is mainly due to its profound potential in solving large-scale combinatorial optimization problems and enhance the performance of machine learning [3]–[15]. Both quantum and classical solvers can be used to solve the Ising optimization problems. Quantum solvers mainly include quantum annealers (QAs), and coherent Ising machines (CIMs) based on superconducting and optical devices, respectively. Grounded on quantum physics and quantum adiabatic theorem, quantum solvers leverage quantum properties such as superposition and entanglement to explore the energy landscapes of complex systems [16]. Pioneered by D-Wave, QAs have garnered significant attention due to their potential to outperform classical computing in solving optimization tasks [17], [18]. By employing degenerate optical parametric oscillators, CIMs exploit optical interference phenomena to encode and solve complex Ising problems [19]–[21]. Although QAs offer unique capabilities with the inherent quantum parallelism, their severe operating constraints such as low A L. Li and Y. Pan are with the College of Control Science and Engineering, Zhejiang University, Hangzhou 310027, China. Email address: {langyuli,ypan}@zju.edu.cn temperature and size make it difficult to deploy on small intelligent devices [22], [23]. CIMs face similar limitations [24].In contrast, quantum-inspired classical solvers are much cheaper and smaller. Despite the lack of quantum advantages inherent in quantum devices, current classical solvers can achieve speed and solution quality close to that of quantum solvers. Therefore, digital solvers based on traditional devices are more likely to be implemented for realistic applications in the near term. Besides, classical solvers are necessary benchmarks for understanding and measuring the advantage of quantum solvers. Classical solvers mainly refer to digital Ising machines (DIMs). Although rooted in classical computing, DIMs have shown potential in solving complex Ising optimization problem [25]–[28]. DIMs employ digital hardware to implement the optimization algorithms. The architectures of digital Ising machines can be categorized into non-von Neumann architecture and von Neumann. The former often requires an application-specific integrated circuit (ASIC) that uses a large number of registers to simulate the spins in the Ising model, and the update of the register states is controlled by the simulated annealing algorithm [29]–[31]. The latter uses the general-purpose computing devices such as CPU, GPU, and field-programmable gate arrays (FPGAs) without physically simulating the spins of the Ising model. In particular, recent works based on non-Von Neumann architectures [26], [28], [31] have not been able to shown a significant advantage over the von Neumann architecture [32]. Among the methods based on von Neumann architecture, the operator-based methods [33], [34] tend to have high computational complexity and are not suitable for large-scale problems. Meanwhile, the accuracy and speed of the other numerical solvers [35], [36] still have room for improvement. In this work, we propose a fast and scalable solver which demonstrates an advantage in speed and accuracy. This solver first applies pruning to simplify and reduce the dimensions of the Ising optimization problem by pre-determining the directions of certain spins. After this preprocessing, the domain selection method will solve the simplified problem to find the approximate optimal solutions. In contrast to the previous works, the main innovation is the fusion of the discrete programming method with the gradient descent. To be more specific, we transform the Ising problem into an L 1 -norm maximization problem, which is then decomposed into several sub-linear programming problems. The feasible sets between these linear programming problems are not continuous, and the optimal solution of each sub-problem is easy to find. Therefore, we find a connection between the energy of the" 2312.05838v1,"Intermode coupling in a fiber loop laser at low temperatures Eyal Buks ∗ Andrew and Erna Viterbi Department of Electrical Engineering, Technion, Haifa 32000, Israel (Dated: December 12, 2023) We experimentally study an unequally-spaced optical comb (USOC), which is generated by a unidirectional fiber loop laser operated at low temperatures. The underlying mechanism responsible for USOC formation is explored using both close and open loop measurements. The role played by dispersion is investigated using radio frequency spectrum measurements. By integrating a saturable absorber into the loop, a lasing state is revealed, in which mode locking coexists with the USOC. Introduction - Fiber loop lasers are widely employed for a variety of applications. Commonly the loop is made of an undoped single mode fiber (SMF) section, and a doped section, which is used for optical amplification. An unequally-spaced optical comb (USOC) has been recently found in the optical spectrum of a fiber loop laser having an amplifying Erbium doped fiber (EDF), which is cooled down to cryogenic temperatures [1]. The underlying mechanism responsible for USOC formation has remained mainly unknown. Here we report on measurements, performed with both open and close loop configurations, which provide some insight into the process of USOC formation, and which allow the extraction of parameters of the fiber loop under study. A SMF (both doped and undoped) can be characterized by a loss coefficient α, a group velocity v g , a group velocity dispersion (GVD), and by a complex nonlinear coefficient γ = γ 0 + iγ 00 , which is proportional to the SMF third-order susceptibility [2]. The real part γ 0 of γ is the nonlinear dispersion coefficient [3], and the imaginary part γ 00 of γ is the nonlinear absorption coefficient [4, 5]. For saturable absorption (SA) γ 00 < 0, whereas γ 00 > 0 for reverse saturable absorption (RSA). In a fiber loop laser, SA commonly promotes mode locking (ML) and the formation of optical pulses [6–8], whereas processes giving rise to RSA (e.g. two-photon absorption) suppress ML [9]. Changeover from SA to RSA has been observed in [10]. Fiber parameters are extracted in the current study using a variety of measurement techniques. The effect of EDF emission and absorption spectra is studied by varying the temperature and fiber loop loss. The effect of nonlinear dispersion is explored by measuring both the loop frequency as a function of optical wavelength and the lasing linewidth. Both EDF gain and nonlinear response are measured using an open loop configuration. We show that some of the experimental results can be accounted for using a simple theoretical model, which assumes that dispersion can be disregarded. However, on the other hand, this assumption is invalidated by some of our experimental results, which indicate that dispersion plays an important role. ∗ Electronic address: eyal@ee.technion.ac.il Experimental setup - The experimental setup is described by the sketch shown in Fig. 1(a). A cryogen free cryostat is used to cool down an EDF having length denoted by l EDF , absorption of 30 dB m −1 at 1530 nm, and mode field diameter of 6.5 µm at 1550 nm. The EDF, which is thermally coupled to a calibrated silicon diode thermometer, is pumped using a 980 nm laser diode (LD) biased with current denoted by I D . Results are presented below for two fiber loops, one has l EDF = 10 m, and the other one has l EDF = 5 m. The cold EDF is integrated with a room temperature fiber loop using a wavelength-division multiplexing (WDM) device. A 10:90 output coupler (OC), and two isolators [labeled by arrows in the sketch shown in Fig. 1(a)], are integrated in the fiber loop. The output port of the 10:90 OC is splitted using a 50 : 50 OC to allow probing the optical signal using both an optical spectrum analyzer (OSA) and a photodetector (PD), which is connected to either a radio frequency spectrum analyzer (RFSA), or to an oscilloscope. An optional tunable optical filter (OF) having a central wavelength denoted by λ F , and a linewidth of δ F = 1.2 nm (full width at half maximum) is connected between the 50 : 50 OC and the PD. Temperature dependency - Key properties of EDF can be controlled by varying the temperature [11–19]. EDF operating at low temperatures can be used for some applications, including multimode lasing [20, 21] and quantum information storage [22–30]. The measured optical spectrum of our device as a function of the temperature T with diode current of I D = 200 mA is shown in Fig. 1(b). The wavelength at which lasing peaks is denoted by λ g . The spectrum shown in Fig. 1 indicates that λ g decreases as the temperature is lowered [31]. As is discussed below, this process is attributed to the temperature dependency of the EDF emission and absorption spectra. Following Ref. [32], consider an infinitesimal EDF section of length dz. The signal gain along this section is −1 −1 expresses as 1 + κdz, where κ = l E (1 − p g ) − l A p g , −1 −1 l E (l A ) is the emission (absorption) inverse length (which may depend on both wavelength λ and temperature T ), p g is the ground state population fraction, and 1 − p g is the excited state population fraction (note that 0 ≤ p g ≤ 1, and that due to the isotropic nature of spontaneous emission, which yields weak coupling to" 2312.05849v1,"InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models Jiun Tian Hoe 1 1 Xudong Jiang 1 Nanyang Technological University, Singapore Stable Diffusion Generated Image 2 Yap-Peng Tan 1 GLIGEN Layout Input cs.chan@um.edu.my InteractDiffusion Generated Image cell phone Interaction Input holding Generated Image cell phone talking bag bag another person person Weipeng Hu 1 Universiti Malaya, Malaysia {exdjiang,eyptan,weipeng.hu}@ntu.edu.sg jiuntian001@e.ntu.edu.sg Chee Seng Chan 2 another person person Caption: a person is holding a bag, another person is talking on a cell phone feeding person person cat cat Caption: a person is feeding a cat Figure 1. Generated samples of size 512x512. Stable Diffusion conditions on text caption only, while GLIGEN conditions on extra layout input. Our proposed InteractDiffusion conditions on extra interaction label and its location shown by the shaded area. Abstract teractDiffusion that extends existing pre-trained T2I diffusion models to enable them being better conditioned on interactions. Specifically, we tokenize the HOI information and learn their relationships via interaction embeddings. A conditioning self-attention layer is trained to map HOI tokens to visual tokens, thereby conditioning the visual tokens better in existing T2I diffusion models. Our model attains the ability to control the interaction and location on existing T2I diffusion models, which outperforms existing baselines by a large margin in HOI detection score, as well as fidelity in FID and KID. Project page: https: //jiuntian.github.io/interactdiffusion. Large-scale text-to-image (T2I) diffusion models have showcased incredible capabilities in generating coherent images based on textual descriptions, enabling vast applications in content generation. While recent advancements have introduced control over factors such as object localization, posture, and image contours, a crucial gap remains in our ability to control the interactions between objects in the generated content. Well-controlling interactions in generated images could yield meaningful applications, such as creating realistic scenes with interacting characters. In this work, we study the problems of conditioning T2I diffusion models with Human-Object Interaction (HOI) information, consisting of a triplet label (person, action, object) and corresponding bounding boxes. We propose a pluggable interaction control model, called In- 1. Introduction The advent of diffusion generative models recently opens up new creative task opportunities. While diffusion mod- 1" 2312.05864v1,"Finding Concept Representations in Neural Networks with Self-Organizing Maps Mathieu d’Aquin mathieu.daquin@loria.fr LORIA, Université de Lorraine/CNRS/INRIA Nancy, France ABSTRACT In sufficiently complex tasks, it is expected that as a side effect of learning to solve a problem, a neural network will learn relevant abstractions of the representation of that problem. This has been confirmed in particular in machine vision where a number of works showed that correlations could be found between the activations of specific units (neurons) in a neural network and the visual concepts (textures, colors, objects) present in the image. Here, we explore the use of self-organizing maps as a way to both visually and computationally inspect how activation vectors of whole layers of neural networks correspond to neural representations of abstract concepts such as ‘female person’ or ‘realist painter’. We experiment with multiple measures applied to those maps to assess the level of representation of a concept in a network’s layer. We show that, among the measures tested, the relative entropy of the activation map for a concept compared to the map for the whole data is a suitable candidate and can be used as part of a methodology to identify and locate the neural representation of a concept, visualize it, and understand its importance in solving the prediction task at hand. CCS CONCEPTS • Computing methodologies → Artificial intelligence; Neural networks; Knowledge representation and reasoning. KEYWORDS Neural networks, conceptual representation, neuro-symbolic AI ACM Reference Format: Mathieu d’Aquin. 2023. Finding Concept Representations in Neural Networks with Self-Organizing Maps. In Knowledge Capture Conference 2023 (K-CAP ’23), December 5–7, 2023, Pensacola, FL, USA. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3587259.3627551 1 INTRODUCTION It has now been clearly established that neural networks represent an effective, popular, and highly applicable approach to data-centric artificial intelligence, but that one of their key disadvantages is their interpretability [11]. They lack transparency in the sense that, even if one can inspect their inner working, a meaningful understanding Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. K-CAP ’23, December 5–7, 2023, Pensacola, FL, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0141-2/23/12. . . $15.00 https://doi.org/10.1145/3587259.3627551 of the relation between the (sometimes extremely large) vectors of weights and activations in the network and the conclusion being made is rarely achievable. However, some form of implicit representation of abstract notions, conceptual knowledge, is expected to exist within those vectors to support the task at hand [2]. For example, in a previous work [9], we could see that there was a strong relationship between the results of neural networks and the presence concepts extracted from a knowledge graph in the input data, showing, for example, that a network appeared to rely on knowledge of the country of origin or artistic movement of a painter to predict whether their work was exposed in major museums. In this paper, we aim to explore a methodology to identify and locate the representation of conceptual knowledge directly within a neural network’s layers, to find for example whether the concepts of ‘Italian painters’ or ’surealist painters’ are actually present in the activation vectors of the network. In other words, we aim to propose a way to inspect those vectors so that they can be visually and computationally assessed and compared when presented with input data exemplifying different concepts. This can help to understand the importance, direct or indirect, of certain concepts in the decision and where the representation of those concepts might be located in the network. This is helpful in order to not only make the neural network more interpretable and communicable, but also to potentially identify biases in the data and in the way the network exploits the data. Indeed, in such cases, we can see biases as the use of information that should not be relevant to make a decision. By identifying a supposedly irrelevant concept that is implicitly represented in a neural network and how close the representation of such a concept is to the decision taken (i.e., to the output layer), we can therefore get an idea of the level at which that particular form of bias is present within the network. To achieve that, we use self-organizing maps (SOMs [6]). SOMs are neural network architectures using competitive learning to create a low-dimensional map (generally a 2D grid) of highly dimensional data. It is often used for tasks such as clustering, with the units on the grid representing clusters organized based on their similarity. Here, we use SOMs to provide abstractions of the activation vectors of a neural network from which we expect it to be easier to spot patterns and regularities. We test a number of metrics on the constructed activation maps to identify which could be used to provide an assessment of the level of representation of a concept within a neural network layer and show how the selected measure behaves on two example neural network models: one (smaller scale) used for text classification and one (larger) used in a regression task from images. We show that our method can successfully identify the relative importance of the representation of concepts such as" 2312.05866v1,"M. d’Aquin / TaBIIC TaBIIC: Taxonomy Building through Iterative and Interactive Clustering Mathieu D’AQUIN a,1 , a K Team, LORIA CNRS/INRIA/Université de Lorraine, Nancy, France ORCiD ID: Mathieu d’Aquin https://orcid.org/0000-0001-7276-4702 Abstract. Building taxonomies is often a significant part of building an ontology, and many attempts have been made to automate the creation of such taxonomies from relevant data. The idea in such approaches is either that relevant definitions of the intension of concepts can be extracted as patterns in the data (e.g. in formal concept analysis) or that their extension can be built from grouping data objects based on similarity (clustering). In both cases, the process leads to an automatically constructed structure, which can either be too coarse and lacking in definition, or too fined-grained and detailed, therefore requiring to be refined into the desired taxonomy. In this paper, we explore a method that takes inspiration from both approaches in an iterative and interactive process, so that refinement and definition of the concepts in the taxonomy occur at the time of identifying those concepts in the data. We show that this method is applicable on a variety of data sources and leads to taxonomies that can be more directly integrated into ontologies. Keywords. Applications and Methods, bottom-up ontology construction, taxonomies 1. Introduction Taxonomies are an integral part of ontologies, whether they represent an aspect of highly axiomatized ontologies in OWL [13], or simpler concept structures such as those constructed using SKOS [14]. While ontology building methodologies (see, for example, [9,19,20]) focus on identifying and defining core concepts, understanding how to hierarchically divide such concepts is often not trivial and is not as well covered by those methodologies. In addition, when the aim is to use such a taxonomy to classify entities into the corresponding categories from existing data, it is important to ensure that the definitions of concepts and subconcepts align well with the attributes and groups that exist in the data, as well as with what is meaningful in the domain. For these reasons, some of the tools aiming to support ontology building have focused on (semi)automatic ways to construct such taxonomies in a bottom-up manner, that is, from existing data. We describe such works in more detail in the following section, focusing on approaches taking structured data as input (i.e., ignoring the many approaches building taxonomies from text). In summary, however, depending on the specific technique applied, those approaches suffer from a number of drawbacks that significantly limit their applicability. Some, for example, are constrained to using only nominal 1 Corresponding Author: Mathieu d’Aquin, e-mail: mathieu.daquin@loria.fr" 2312.05867v1,"Scattering of linear waves on a soliton A.S. Dmitriev, 1, ∗ E.A. Dmitrieva, 2, 1, † and A.G. Panin 1, ‡ 1 Institute for Nuclear Research of the Russian Academy of Sciences, Moscow 117312, Russia 2 Lomonosov Moscow State University, Faculty of Physics, Moscow 119991, Russia We have shown that the wave scattering by a soliton occurs in a peculiar way. The nonlinear interaction leads to the generation of waves with frequencies that are multiples of the frequency of the incident wave, minus the frequency of the soliton, while the soliton experiences growth due to the absorption of particles from the incoming wave. We propose an analytical approach based on the Born approximation to calculate the amplitudes of scattered waves and, consequently, the number of particles absorbed by the soliton. This approach is validated through direct comparison with the results of numerical simulation. I. INTRODUCTION Solitons are stable bound states which exist on a classical as well as quantum mechanical levels in nonlinear field theories. They have a finite stable shape in space, which, unlike wave packets formed by superpositions of plane waves, preserves over time and during free propagation. The dispersion in the solitons is balanced by focusing nonlinear effects. Since their first observation on the surface of water [1], solitons have been widely studied both theoretically and experimentally in many branches of physics such as optics [2], plasma physics [3], condensed matter physics [4], cosmology [5] and other natural sciences. There are several exactly integrable nonlinear theories, in which solitons can be obtained by means of the inverse scattering transform [6, 7]. These theories play an exceptional role because they provide universal mathematical tools for studying some general physical phenomena [8, 9]. In particular, in exactly integrable case the interactions between colliding soliton and wave packet or another soliton are purely elastic [10]. The soliton recovers its exact initial shape and velocity after a collision. In real physical problems, however, various perturbations usually occur that violate the exact integrability. These not only modify the soliton properties, but also, under certain conditions, lead to completely new phenomena [11]. In particular, collisions between solitons under influence of higher order nonlinear terms exhibit a variety of outcomes, including fusion, fission, annihilation [12–14] and emission of quasi-linear waves [11]. Another example is the transmissions of solitons through linear and nonlinear inhomogeneities which proceeds with increased rates under certain conditions [15]. In this paper, we consider the scattering of linear highfrequency waves on non-topological solitons in the model of a nonlinear non-integrable Schrödinger equation. We show that, in contrast to the integrable case in which the incoming wave causes a shift in the soliton’s position [16], the presence of non-integrable nonlinear interaction leads to a non-trivial scattering picture. Nonlinear interactions give rise to waves of double, triple, and so on, frequencies, while the soliton grows by absorbing particles from the incoming wave. We propose an analytical method for describing the scattering pattern of high-frequency waves on a soliton. To validate the method, we compare its predictions with the results of numerical simulations and observe a strong agreement. The paper is organized as follows. In Section II we present the general setup and introduce the notations that will be used throughout the paper. An explicit numerical example of scattering of a wide Gaussian wave packet on a soliton is considered in Section III. In Section IV we address the computation of the amplitudes of the waves transmitted through and reflected from the soliton, and compare analytic predictions with the data of numerical simulations. In Section V we discuss the results. Appendix A includes details of method used in numerical simulations. II. SETUP We start by considering the nonlinear Schrödinger equation in dimensionless variables 1 i∂ t ψ = − ∂ x 2 ψ + V (|ψ| 2 )ψ , 2 (1) where the last term introduces nonlinearity. Evolution governed by Eq. (1) conserves a number of quantities: the particle number (norm) N , Z N = dx |ψ| 2 , (2) the energy of the system E,   |ψ| 2 Z Z  1  E = dx  |∂ x ψ| 2 + ds V (s)  , 2 (3) 0 ∗ dmitriev.as15@physics.msu.ru † kate steklova@mail.ru ‡ panin@ms2.inr.ac.ru and the total momentum P , Z P = i dx [ψ∂ x ψ ∗ − ψ ∗ ∂ x ψ] . (4)" 2312.05873v1,"Proceedings of Machine Learning Research vol vvv:1–13, 2024 Learning for CasADi Data-driven Models in Numerical Optimization Tim Salzmann Jon Arrizabalaga Tim.Salzmann@tum.de Jon.Arrizabalaga@tum.de Munich Institute of Robotics and Machine Intelligence, Technical University of Munich, Germany Joel Andersson joel@jaeandersson.com Freelance software developer and consultant, Madison (WI), United States Marco Pavone pavone@stanford.edu Stanford University, Stanford (CA), United States and Markus Ryll Markus.Ryll@tum.de Munich Institute of Robotics and Machine Intelligence, Technical University of Munich, Germany Abstract While real-world problems are often challenging to analyze analytically, deep learning excels in modeling complex processes from data. Existing optimization frameworks like CasADi facilitate seamless usage of solvers but face challenges when integrating learned process models into numerical optimizations. To address this gap, we present the Learning for CasADi (L4CasADi) framework, enabling the seamless integration of PyTorch-learned models with CasADi for efficient and potentially hardware-accelerated numerical optimization. The applicability of L4CasADi is demonstrated with two tutorial examples: First, we optimize a fish’s trajectory in a turbulent river for energy efficiency where the turbulent flow is represented by a PyTorch model. Second, we demonstrate how an implicit Neural Radiance Field environment representation can be easily leveraged for optimal control with L4CasADi . L4CasADi, along with examples and documentation, is available under MIT license at https://github.com/Tim-Salzmann/l4casadi Keywords: optimization; machine learning; control systems; data-driven control 1. Introduction Accurate mathematical problem formulation is at the core of every numerical optimization procedure. While many real-world problems are hard to formulate analytically, data-driven methods, especially deep learning methods, thrive in modeling complex processes from data. Efficiently integrating learned process models into numerical optimizations is challenging, as data-driven models and numerical optimization come with their respective tools and characteristics: Deep learning models, commonly constructed in PyTorch Paszke et al. (2019), Tensor- Flow Abadi et al. (2016), or JAX Bradbury et al. (2018), leverage first-order optimization methods (backpropagation) in time-expensive offline training on a large amount of data. Solutions to complex problems can be learned from data without defining any prior structure on the task. Once trained, however, their inference is fast and can be further accelerated on dedicated hard- © 2024 T. Salzmann, J. Arrizabalaga, J. Andersson, M. Pavone & M. Ryll." 2312.05878v1,"Skew Probabilistic Neural Networks for Learning from Imbalanced Data Shraddha M. Naik a,b , Tanujit Chakraborty 1b , Abdenour Hadid b , Bibhas Chakraborty c,d,e a Manipal Academy of Higher Education, Manipal, Karnataka, India Sorbonne Center for Artificial Intelligence, Sorbonne University Abu Dhabi, UAE c Centre for Quantitative Medicine, Duke-NUS Medical School, National University of Singapore, Singapore d Department of Statistics and Data Science, National University of Singapore, Singapore e Department of Biostatistics and Bioinformatics, Duke University, USA b Abstract Real-world datasets often exhibit imbalanced data distribution, where certain class levels are severely underrepresented. In such cases, traditional pattern classifiers have shown a bias towards the majority class, impeding accurate predictions for the minority class. This paper introduces an imbalanced data-oriented approach using probabilistic neural networks (PNNs) with a skew normal probability kernel to address this major challenge. PNNs are known for providing probabilistic outputs, enabling quantification of prediction confidence and uncertainty handling. By leveraging the skew normal distribution, which offers increased flexibility, particularly for imbalanced and non-symmetric data, our proposed Skew Probabilistic Neural Networks (SkewPNNs) can better represent underlying class densities. To optimize the performance of the proposed approach on imbalanced datasets, hyperparameter fine-tuning is imperative. To this end, we employ a population-based heuristic algorithm, Bat optimization algorithms, for effectively exploring the hyperparameter space. We also prove the statistical consistency of the density estimates which suggests that the true distribution will be approached smoothly as the sample size increases. Experimental simulations have been conducted on different synthetic datasets, comparing various benchmark-imbalanced learners. Our real-data analysis shows that SkewPNNs substantially outperform state-of-the-art machine learning methods for both balanced and imbalanced datasets in most experimental settings. Keywords: Imbalanced Classification, Probabilistic Neural Networks, Skew normal distribution, Bat algorithm, Consistency 1. Introduction Data imbalance is ubiquitous and inherent in real-world applications, encompassing rare event prediction, medical diagnosis, image classification, customer churn prediction, and fraud detection. Instead of preserving an ideal uniform distribution over each class level, real data often exhibit a skewed distribution [41, 44] where specific target value has significantly fewer observations. This situation is known as the “curse of imbalanced data” problem in the pattern recognition literature [29]. This poses a challenge for conventional classifiers, as they tend to favor the majority class, resulting in higher misclassification rates for minority class examples. Therefore, a diverse 1 Corresponding Author: tanujit.chakraborty@sorbonne.ae Preprint submitted to Elsevier December 12, 2023" 2312.05881v1,"Maximum capacity path problem with loss factors Javad Tayyebi 1 1 a , Mihai-Lucian Rîtan 2 b and Adrian Marius Deaconu 2 c Department of Industrial Engineering, Birjand University of Technology, Industry and Mining Boulevard, Ibn Hesam Square, Birjand, Iran 2 Department of Mathematics and Computer Science, Transilvania University of Brașov, Iuliu Maniu st. 50, Brașov, Romania javadtayyebi@birjandut.ac.ir, {mihai.ritan, a.deaconu}@unitbv.ro Keywords: Capacity path problems, combinatorial optimization, polynomial algorithms. Abstract: The maximum capacity path problem is to find a path from a source to a sink which has the maximum capacity among all paths. This paper addresses an extension of this problem which considers loss factors. It is called the generalized maximum capacity path problem. The problem is a network flow optimization problem whose network contains capacities as well as loss factors for arcs. The aim of the problem is to find a path from an origin to a destination so as to send a maximum flow along the path considering loss factors and respecting capacity constraints. The paper presents a zero-one formulation of the problem and moreover, it presents two efficient algorithms which solve the problem in polynomial time. 1 INTRODUCTION Combinatorial optimization is a special class of mathematical program that consists of finding an optimal object among a finite set of specificstructured objects. Some most prominent problems of this class are shortest path (SP) problems, maximum reliability path (MRP) problems, and maximum capacity path (MCP) problems. In these problems, the goal is to find an optimal path from an origin to a destination under a special objective function as follows: 1. min ∑ ( , )∈ 𝑙 for SP problems 2. max ∏ ( , )∈ 𝑝 for MRP problems 3. max min 𝑢 for MCP problems ∈ℙ ∈ℙ ∈ℙ ∈ℙ where ℙ is the set consisting of all paths from the origin to the destination, 𝑙 , 𝑝 , and 𝑢 denote respectively the length, the reliability, and the capacity of arc (𝑖, 𝑗). Fortunately, these problems are tractable, i.e., there are polynomial-time algorithms to solve them. Specially, shortest path problems can be solved by a Fibonacci-heap implementation of Dijkstra's algorithm in 𝑂(𝑚 + 𝑛 𝑙𝑜𝑔(𝑛)) if lengths a b c https://orcid.org/0000-0002-7559-3870 https://orcid.org/0009-0007-4601-6533 https://orcid.org/0000-0002-1070-1383 are nonnegative; otherwise, the best-known algorithm is a FIFO implementation of Bellman-Ford algorithm which has a complexity of 𝑂(𝑚𝑛), where n and m are the number of nodes and arcs, respectively. The maximum reliability path problem can be converted into a shortest path problem by setting 𝑙 = −𝑙𝑜𝑔(𝑝 ) for every arc (𝑖, 𝑗). So, it can be solved as well as the SP problem, especially in the case that 𝑝 < 1. Moreover, the both MRP and MCP problems can be solved directly by modifying the shortest path algorithms because they enjoy the optimality conditions similar with that of the SP problem (See (Ahuja, 1988) for more details). However, the bestknown algorithm for solving the maximum capacity path problem in undirected network is not based on this concept, but it is a recursive algorithm with a linear complexity 𝑂(𝑚) (Punnen, 1991). As an application of maximum capacity path problems, consider a network that represents connections between routers in the Internet. The capacity of an arc represents the bandwidth of the corresponding connection between two routers, the maximum capacity path problem is to find the path between two Internet nodes that has the maximum possible bandwidth. Besides this well-known network routing problem, MCP is also an important" 2312.05899v1,"Supporting punishment via taxation in a structured population Hsuan-Wei Lee a,b , Colin Cleveland c , and Attila Szolnoki d a Institute of Sociology, Academia Sinica, Taiwan b Department of Physics, National Taiwan University, Taiwan c Department of Informatics, King’s College London, London, UK d Institute of Technical Physics and Materials Science, Centre for Energy Research, P.O. Box 49, H-1525 Budapest, Hungary Abstract Taxes are an essential and uniformly applied institution for maintaining modern societies. However, the levels of taxation remain an intensive debate topic among citizens. If each citizen contributes to common goals, a minimal tax would be sufficient to cover common expenses. However, this is only achievable at high cooperation level; hence, a larger tax bracket is required. A recent study demonstrated that if an appropriate tax partially covers the punishment of defectors, cooperation can be maintained above a critical level of the multiplication factor, characterizing the synergistic effect of common ventures. Motivated by real-life experiences, we revisited this model by assuming an interactive structure among competitors. All other model elements, including the key parameters characterizing the cost of punishment, fines, and tax level, remain unchanged. The aim was to determine how the spatiality of a population influences the competition of strategies when punishment is partly based on a uniform tax paid by all participants. This extension results in a more subtle system behavior in which different ways of coexistence can be observed, including dynamic pattern formation owing to cyclic dominance among competing strategies. Keywords: public goods game, cooperation, tax, cyclically dominant strategies 1. Introduction Cooperation is essential in society; however, certain members of smaller or larger communities are tempted to defect for higher individual incomes [1, 2]. To avoid the negative consequences of “rational” strategy selection, we must identify conditions and incentives that promote the evolution of cooperation [3]. As a fundamental theoretical framework for this dilemma, the public goods game is frequently used to model the consequences of individual strategy choices [4, 5, 6, 7]. In this game, participants may contribute to a common pool, and the enhanced results of their collective efforts are distributed evenly among all group members, independent of their contributions. Although this theoretical model is simple, it captures the essence of conflict in a broad range of seemingly different problems [8, 9, 10, 11]. ∗ Email addresses: hwwaynelee@gate.sinica.edu.tw; szolnoki.attila@ek.hun-ren.hu Preprint submitted to Chaos Solitons and Fractals As the defector strategy has an obvious advantage over altruistic cooperators, we need incentives to mitigate the gap between their individual payoff values. Rewarding by a bonus to the latter group could be a solution [12, 13, 14], or we may fine the selfish players as a form of penalty [15, 16, 17, 18]. The scientific debate on whether “the carrot or the stick” is more effective at controlling a population still has no conclusion; however, in the model presented in this study, we focus on the latter option [19, 20, 21, 22, 23]. Indeed, punishment can be executed in different ways. The first possibility is that a player punishes a defector partner directly during a face-to-face conflict. In this case, which is frequently referred to as individual or peer punishment, the extra cost of punishment is proportional to the number of defectors near the punisher [24, 25]. Consequently, the fine for a defector is also proportionate: more sticks hit harder than a single stick. An institutional incentive occurs when punishers contribute a fixed amount to a special pool that sanctions possible December 12, 2023" 2312.05928v1,"AesFA: An Aesthetic Feature-Aware Arbitrary Neural Style Transfer Joonwoo Kwon 1 * , Sooyoung Kim 2 * , Yuewei Lin 5 † , Shinjae Yoo 5 † , Jiook Cha 3,4 † 1 Department of Applied Bioengineering, Seoul National University Department of Brain and Cognitive Science, Seoul National University 3 Department of Psychology, Seoul National University 4 Artificial Intelligence Graduate School Program, Seoul National University 5 Brookhaven National Laboratory pioneers, rlatndud0513@snu.ac.kr, ywlin, sjyoo@bnl.gov, cha.jiook@gmail.com 2 Abstract Neural style transfer (NST) has evolved significantly in recent years. Yet, despite its rapid progress and advancement, existing NST methods either struggle to transfer aesthetic information from a style effectively or suffer from high computational costs and inefficiencies in feature disentanglement due to using pre-trained models. This work proposes a lightweight but effective model, AesFA—Aesthetic Feature-Aware NST. The primary idea is to decompose the image via its frequencies to better disentangle aesthetic styles from the reference image while training the entire model in an end-to-end manner to exclude pre-trained models at inference completely. To improve the network’s ability to extract more distinct representations and further enhance the stylization quality, this work introduces a new aesthetic feature: contrastive loss. Extensive experiments and ablations show the approach not only outperforms recent NST methods in terms of stylization quality, but it also achieves faster inference. Codes are available at https://github.com/Sooyyoungg/AesFA. 1 Introduction Neural Style Transfer (NST) is an artistic application that transfers the style of one image to another while preserving the original content. Initially introduced by (Gatys, Ecker, and Bethge 2016), this area has gained substantial momentum with the advancement of deep neural networks. Despite such progress, a significant chasm persists between authentic artwork and synthesized stylizations. Existing NST methods, as shown in Figure 1, struggle to capture essential aesthetic features, such as tones, brushstrokes, textures, grains, and the local structure from style images, leading to discordant colors and irrelevant patterns. Ideally, the goal of using NST is to extract a style from the image and transfer it to content, necessitating representations that capture both image semantics and stylistic changes. This work focuses on defining these style representations. In the context of painting, style representations are defined by attributes, such as overall color and/or the local structure of brushstrokes. Most NST algorithms define style representations as spatially agnostic features to encode this * These authors contributed equally. † Corresponding authors. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Top: The Starry Night by Vincent Van Gogh. The shortcomings of the existing method: 1) Styles are not agnostic to spatial information, and 2) for ultra-high resolution style transfer, the effectiveness of the encoding networks is deficient, creating undesirable artifacts or suboptimal stylizations. Bottom: Compared with other NST methods, our method can faithfully transfer styles while ensuring the spatial information. information. For example, Gatys et al. (Gatys, Ecker, and Bethge 2016) use gram matrices, while Huang et al. (Huang and Belongie 2017) employ mean and variance alignment to obtain a style representation. Despite their success, they rely solely on summary statistics. Thus, they lack spatial information representation. In fact, style representations are highly correlated to spatial information. For example, Vincent van Gogh’s The Starry Night (Figure 1) has expressionistic yellow stars and a moon that dominate the upper center and right, while dynamic swirls fill the center of the sky. In pondering the style of this painting, its focal point primarily resides in the sky rather than the village or cypress trees. Therefore, when transferring The Starry Night’s style, the expected style output likely would be the dynamic swirls and expressionistic yellow stars in the sky. From this point of view, spatial information keenly matters in style representations. However, most NST algorithms fail to recognize such distinct spatial styles due to their spatial-independent style representations, leading to stylizations lacking in spatial coherence (refer to the bottom panel in Figure 1). To enhance stylization, we propose a lightweight yet ef-" 2312.05937v1,"Lagrangian Properties and Control of Soft Robots Modeled with Discrete Cosserat Rods. Lekan Molu, Shaoru Chen, and Audrey Sedal Abstract—The characteristic “in-plane” bending associated with soft robots’ deformation make them preferred over rigid robots in sophisticated manipulation and movement tasks. Executing such motion strategies to precision in soft deformable robots and structures is however fraught with modeling and control challenges given their infinite degrees-of-freedom. Imposing piecewise constant strains (PCS) across (discretized) Cosserat microsolids on the continuum material however, their dynamics become amenable to tractable mathematical analysis. While this PCS model handles the characteristic difficult-to-model “in-plane” bending well, its Lagrangian properties are not exploited for control in literature neither is there a rigorous study on the dynamic performance of multisection deformable materials for “in-plane” bending that guarantees steady-state convergence. In this sentiment, we first establish the PCS model’s structural Lagrangian properties. Second, we exploit these for control on various strain goal states. Third, we benchmark our hypotheses against an Octopus-inspired robot arm under different constant tip loads. These induce non-constant “in-plane” deformation and we regulate strain states throughout the continuum in these configurations. Our numerical results establish convergence to desired equilibrium throughout the continuum in all of our tests. Within the bounds here set, we conjecture that our methods can find wide adoption in the control of cableand fluid-driven multisection soft robotic arms; and may be extensible to the (learning-based) control of deformable agents employed in simulated, mixed, or augmented reality. Supplementary material — The codes for reproducing the experiments reported in this paper are available online: https://github.com/robotsorcerer/dcm. I. I NTRODUCTION Soft robots are attracting wide adoption in the automation community owing to their improved bending, torsion, configurability, and compliance properties. These properties enable customizable solutions for assistive wearable devices [23, 1], robot grippers [12], and mobile robots [13]. In-plane bending, as a motion deformation strategy, is a particular advantage that serial soft arms execute better than rigid arms. With this property, soft robot grippers can pick up delicate objects, adopt adept nonlinear motion strategies in complex workspaces e.g. for reaching tasks. In embodied applications such as soft exogloves [16] and exosuits [14], they provide conformal deformation that aids improved walking gaits, and muscle rehabilitation and they conserve energy economy. Lekan Molu and Shaoru Chen are with Microsoft Research NYC. Audrey Sedal is with McGill University’s Department of Mechanical Engineering. Emails: {lekanmolu, shaoruchen}@microsoft.com, audrey.sedal@mcgill.ca. Fig. 1. Schematic of the configuration of an Octopus robot arm. The piecewise constant strain (PCS) Lagrangian dynamics derived by [18] is a reduced special Euclidean group- 3 (SE(3)) model for compliant, serial manipulators. Derived from Cosserat [6] rod theory, it addresses torsion, in-plane, and out-of-plane (multi-) bending motions. The PCS model outperforms the common piecewise constant curvature (PCC) [17] and the constant curvature variants [8] used outside of finite element modeling methods (FEM) [5]. Controllers deployed on the PCS model however ignore the geometric properties of the Lagrangian dynamics [4, 22]. This makes the control equations complicated and destroys several properties of the Lagrangian dynamics that are useful for control tasks. In this sentiment, considering the PCS model for soft multisection arms, we first establish the structural properties of their Lagrangian dynamics. We then exploit these for the steady-state convergence analyses in various control proposals (under different operating model parameters) and in different surrounding mediums using the well-established method of Lyapunov analysis. The Octopus robot [11], a muscular hydrostat [9] with distributed deformation throughout its articulated arms, blends the interplay between continuum mechanics and sensorimotor control well. Thus, we consider a single arm of the CyberOctopus [20] (con-" 2312.05941v1,"ASH: Animatable Gaussian Splats for Efficient and Photoreal Human Rendering Haokai Pang 1,2 † Heming Zhu 1 † Adam Kortylewski 1,3 Christian Theobalt 1,4 Marc Habermann 1,4 B 1 Max Planck Institute for Informatics, Saarland Informatics Campus 2 ETH Zürich 3 Universität Freiburg 4 Saarbrücken Research Center for Visual Computing, Interaction and AI {hpang, hezhu, akortyle, theobalt, mhaberma}@mpi-inf.mpg.de Figure 1. ASH takes an arbitrary 3D skeletal pose and virtual camera view, which can be controlled by the user, as input, and generates a photorealistic rendering of the human in real time. To achieve this, we propose an efficient and animatable Gaussian representation, which is parameterized on the surface of a deformable template mesh. Abstract 1. Introduction Generating high-fidelity human renderings is a longstanding problem in the field of Computer Graphics and Vision, with a multitude of real-world applications, such as gaming, film production, and AR/VR. Typically, this process is a laborious task, requiring complicated hardware setups and tremendous efforts from skilled artists. To ease the extensive manual efforts, recent advances, including this work, focus on generating photorealistic and controllable human avatars solely from multi-view videos. Real-time rendering of photorealistic and controllable human avatars stands as a cornerstone in Computer Vision and Graphics. While recent advances in neural implicit rendering have unlocked unprecedented photorealism for digital avatars, real-time performance has mostly been demonstrated for static scenes only. To address this, we propose ASH, an animatable Gaussian splatting approach for photorealistic rendering of dynamic humans in real time. We parameterize the clothed human as animatable 3D Gaussians, which can be efficiently splatted into image space to generate the final rendering. However, naively learning the Gaussian parameters in 3D space poses a severe challenge in terms of compute. Instead, we attach the Gaussians onto a deformable character model, and learn their parameters in 2D texture space, which allows leveraging efficient 2D convolutional architectures that easily scale with the required number of Gaussians. We benchmark ASH with competing methods on pose-controllable avatars, demonstrating that our method outperforms existing real-time methods by a large margin and shows comparable or even better results than offline methods. Recent works on photorealistic human rendering can be categorized into explicit-based and hybrid methods. Explicit methods represent the human avatar as a deformable template mesh with learned dynamic textures [13, 49]. Although these methods are runtime-efficient and can be seamlessly integrated with the well-established rasterization-based rendering pipeline, the generated rendering often falls short in terms of photorealism and level of detail. Hybrid approaches usually attach a neural radiance field (NeRF) [35] onto a (deformable) human model [14, 29, 42]. Typically, they evaluate the NeRF in an unposed space to model the detailed appearance of clothed humans, and generate color and density values by querying a coordinatebased MLP per ray sample. Although hybrid methods can deliver superior rendering quality through NeRF’s capability to capture delicate appearance details, they are unsuit- † Joint first authors. B Corresponding author. Project page: vcai.mpi-inf.mpg.de/projects/ash 1" 2312.05943v1,"Dealer Strategies in Agent-Based Models Wladimir Ostrovsky ∗ CAU Kiel 10.12.2023 Abstract This paper explores the utility of agent-based simulations in realistically modelling market structures and sheds light on the nuances of optimal dealer strategies. It underscores the contrast between conclusions drawn from probabilistic modelling and agent-based simulations, but also highlights the importance of employing a realistic test bed to analyse intricate dynamics. This is achieved by extending the agent-based model for auction markets by Chiarella, Iori, and Perello (2008) to include liquidity providers. By constantly and passively quoting, the dealers influence their own wealth but also have ramifications on the market as a whole and the other participating agents. Through synthetic market simulations, the optimal behaviour of different dealer strategies and their consequences on market dynamics are examined. The analysis reveals that dealers exhibiting greater risk aversion tend to yield better performance outcomes. The choice of quote sizes by dealers is strategy-dependent: one strategy demonstrates enhanced performance with larger quote sizes, whereas the other strategy show a better results with smaller ones. Increasing quote size shows positive influence on the market in terms of volatility and kurtosis with both dealer strategies. However, the impact stemming from larger risk aversion is mixed. While one of the dealer strategies shows no discernible effect, the other strategy results in mixed outcomes, encompassing both positive and negative effects. JEL classification: C63, G15, D80. Keywords: agent-based model, limit orderbook, market maker, liquidity provider. ∗ Author’s Address: Department of Economics, University of Kiel, Olshausenstr. 40, 24118 Kiel, Germany, Email: w.ostrovsky@economics.uni-kiel.de." 2312.05945v1,"4-Chromatic Graphs Have At Least 4 Cycles of Length 0 mod 3 Sean Kim ∗ Michael E. Picollelli ∗ Abstract A 2018 conjecture of Brewster, McGuinness, Moore, and Noel [2] asserts that for k ≥ 3, if a graph has chromatic number greater than k, then it contains at least as many cycles of length 0 mod k as the complete graph on k + 1 vertices. Our main result confirms this in the k = 3 case by showing every 4-critical graph contains at least 4 cycles of length 0 mod 3, and that K 4 is the unique such graph achieving the minimum. We make progress on the general conjecture as well, showing that (k + 1)-critical graphs with minimum degree k have at least as many cycles of length 0 mod r as K k+1 , provided k + 1 ̸ = 0 mod r. We also show that K k+1 uniquely minimizes the number of cycles of length 1 mod k among all (k+1)-critical graphs, strengthening a recent result of Moore and West [12] and extending it to the k = 3 case. 1 Introduction The study of cycles with a given length modulo an integer k began with work of Burr and Erdős [8], who conjectured that for odd values of k, graphs of sufficiently large average degree contain cycles of all lengths modulo k. This conjecture was proven by Bollobás [1], with the bound subsequently improved by Thomassen [16]. Further work, building in part on conjectures of Thomassen [16], has largely focused on the existence of such cycles under ∗ Department of Mathematics, California State University San Marcos, San Marcos, CA 92096. E-mail addresses: kim296@csusm.edu, mpicollelli@csusm.edu 1" 2312.05946v1,"Uncertainty Propagation through Trained Deep Neural Networks Using Factor Graphs Angel Daruna, Yunye Gong, Abhinav Rajvanshi, Han-Pang Chiu, Yi Yao {angel.daruna,yunye.gong,abhinav.rajvanshi,han-pang.chiu,yi.yao}@sri.com Center for Vision Technologies SRI International Princeton, NJ Abstract Predictive uncertainty estimation remains a challenging problem precluding the use of deep neural networks as subsystems within safety-critical applications. Aleatoric uncertainty is a component of predictive uncertainty that cannot be reduced through model improvements. Uncertainty propagation seeks to estimate aleatoric uncertainty by propagating input uncertainties to network predictions. Existing uncertainty propagation techniques use one-way information flows, propagating uncertainties layer-by-layer or across the entire neural network while relying either on sampling or analytical techniques for propagation. Motivated by the complex information flows within deep neural networks (e.g. skip connections), we developed and evaluated a novel approach by posing uncertainty propagation as a non-linear optimization problem using factor graphs. We observed statistically significant improvements in performance over prior work when using factor graphs across most of our experiments that included three datasets and two neural network architectures. Our implementation balances the benefits of sampling and analytical propagation techniques, which we believe, is a key factor in achieving performance improvements. Introduction Aleatoric uncertainty estimation of deep neural network predictions is a challenging problem precluding their use within saftey critical applications. Neural networks present a new method for processing physical sensor data, improving over traditional methods in many domains, e.g. inertial odometry (Liu et al. 2020). Despite such advancements, extracting predictive uncertainty estimates from trained neural networks remains a challenge. As a result, incorporating neural networks within safety-critical applications that combine many predictions and their uncertainties remains an open question. Predictive uncertainty is typically modeled as two separate uncertainties, epistemic and aleatoric uncertainty. Aleatoric uncertainty stems from environmental variations and sensor noise; hence, aleatoric uncertainty cannot be reduced through model improvements (Gawlikowski et al. 2023). In this paper, we examine a new technique to estimate the aleatoric uncertainty of a trained deep neural network, using uncertainty propagation. Some prior methods for aleatoric uncertainty estimation augment training procedures, which can improve the prediction performance of a trainable neural network. Examples include Bayesian Deep Learning Figure 1: Our uncertainty propagation approach models deep neural networks using factor graphs to estimate predictive uncertainty caused by data uncertainty. (Kendall and Gal 2017), Ensemble Distribution Distillation (Malinin, Mlodozeniec, and Gales 2019), and Evidential Neural Networks (Sensoy, Kaplan, and Kandemir 2018; Amini et al. 2020). Other prior work has sought to assess the aleatoric uncertainty at inference time for a not-editable trained neural network, known as input uncertainty propagation (Titensky, Jananthan, and Kepner 2018; Monchot et al. 2023). In this way, uncertainty propagation techniques can be applied to a trained neural network without augmentation. Existing uncertainty propagation techniques use one-way information flows, either propagating uncertainties layer-bylayer or across the network while relying either on sampling or analytical techniques for propagation. We develop and validate a factor graph formulation for modeling deep neural network uncertainty propagation as a non-linear optimization problem by treating network layers as discrete time steps, layer values as variable nodes, and connections among layers as factors (Figure 1). Factor graphs (Kschischang, Frey, and Loeliger 2001) are a probabilistic Bayesian graphical model that factorize a probability density over a set of factors involving variable nodes. While factor graphs have been widely used for large-scale real-time state estimation, to the best of our knowledge, we are the first to leverage factor graphs for neural network uncertainty estimation. Factor graphs can be used to address several limitations of prior uncertainty propagation works. Distribution Statement ‘A’ (Approved for Public Release, Distribution Unlimited)" 2312.05949v1,"Large quantum nonreciprocity in plasmons dragged by drifting electrons Debasis Dutta 1, ∗ and Amit Agarwal 1, † 1 Department of Physics, Indian Institute of Technology Kanpur, Kanpur-208016, India (Dated: December 12, 2023) Collective plasmon modes, riding on top of drifting electrons, acquire a fascinating nonreciprocal dispersion characterized by ω p (q) ̸ = ω p (−q). The classical plasmonic Doppler shift arises from the polarization of the Fermi surface due to the applied DC bias voltage. Going beyond this paradigm, we predict a quantum plasmonic Doppler shift originating from the quantum metric of the Bloch wavefunction. We systematically compare the classical and quantum Doppler shifts by investigating the drift-induced nonreciprocal plasmon dispersion in generic quantum systems. We demonstrate quantum nonreciprocal plasmons in graphene and twisted bilayer graphene. We show that the quantum plasmonic Doppler shift dominates in moiré systems at large wavevectors, yielding plasmonic nonreciprocity up to 20% in twisted bilayer graphene. Our findings demonstrate the supremacy of plasmonic quantum Doppler shift in moiré systems, motivating the design of innovative nonreciprocal photonic devices with potential technological implications. I. Introduction Light propagates symmetrically in opposite directions in conventional optical systems. This is a consequence of the time-reversal invariance of Maxwell’s equations or Lorentz’s reciprocity principle [1–4]. Breaking reciprocity for asymmetric light propagation is conventionally done by magneto-optical approaches, which require large magnetic fields and limit the efficiency for nanoscale devices and on-chip integration [5]. To remedy this, nonreciprocal plasmonics in atomically thin two-dimensional (2D) materials, such as graphene, present opportunities for direction-dependent light propagation at the nanoscale. This is crucial for enabling compact devices in classical and quantum information processing, nonreciprocal devices for Faraday rotation, isolation, one-way waveguiding, and nonreciprocal cavities [6–8]. These make them a valuable addition to the nanophotonics toolbox [9–11] . Nonreciprocity in bulk plasmon dispersion can intrinsically arise in noncentrosymmetric magnetic materials. This is induced either by the dipolar distribution of the quantum metric or by the ‘chiral Berry’ plasmons at the boundary of magnetic materials [12–15]. A more promising and controllable route for extrinsic breaking of Lorentz reciprocity is biasing the plasmonic material with a direct current. This induces nonreciprocal plasmons with a dispersion that differs for plasmon propagating along or opposite to the direction of the drifting carriers. This approach is minimally invasive for to on-chip architectures, and it is known as the plasmonic Fizeau drag or Doppler effect [8, 16–20]. Drift-induced nonreciprocal plasmons in single-layer graphene (SLG) have been recently predicted and demonstrated [16, 18, 21– 24]. Using near-field imaging techniques, the plasmonic Doppler shift was measured for SLG [16, 17] with a wavelength shift, δλ p /λ p ≈ 2% for electron drift velocity, ∗ ddebasis@iitk.ac.in † amitag@iitk.ac.in FIG. 1. The drift-induced nonreciprocal plasmon dispersion has both classical and quantum contributions. The classical frequency shift ∆ω p C arises from the polarization of the Fermi surface induced by the DC electric field. The solid and dashed line represents the Fermi surface in the absence and presence of drift flow (u) of carriers. The quantum plasmonic Doppler shift, ∆ω p Q , arises from the quantum metric G s ab (k) of the electron wavefunction in the presence of drifting charge carriers. The quantum metric is linked with the notion of quantum 2 between two Bloch states at different modistance, D k,k−q mentum, k and k−q, respectively. u/v F ≈ 17% (given v F = 0.86 × 10 6 m/s) [16]. These studies are primarily focussed on the classical plasmonic Doppler shift, which primarily arises from the displacement of the Fermi surface due to drift flow (see Fig. 1) [16, 18, 21–24]. Additionally, the possibility of a quantum Doppler shift has been recently proposed in moiré system owing to the band hybridization [19]. Motivated by these studies, we predict an exciting quantum Doppler shift-induced plasmonic nonreciprocity, which originates from the quantum metric - a band geometric property of the electron wavefunctions (see Fig. 1). Our detailed investigation reveals that the classical correction varies linearly with the wavevector, while the quantum correction varies quadratically with the wavevector, as depicted in Fig. 1. We show that as" 2312.05962v1,"Aikyam: A Video Conferencing Utility for Deaf and Dumb Kshitij Deshpande Information Technology Pune Institute of Computer Technology Pune, India kshitij.deshpande7@gmail.com Varad Mashalkar Information Technology Pune Institute of Computer Technology Pune, India varadmash2201@gmail.com Amaan Naikwadi Information Technology Pune Institute of Computer Technology Pune, India amaannaikwadi@gmail.com Dr. Archana Ghotkar Information Technology Pune Institute of Computer Technology Pune, India aaghotkar@pict.edu Abstract — With the advent of the pandemic, the use of video conferencing platforms as a means of communication has greatly increased and with it, so have the remote opportunities. The deaf and dumb have traditionally faced several issues in communication, but now the effect is felt more severely. This paper proposes an all-encompassing video conferencing utility that can be used with existing video conferencing platforms to address these issues. Appropriate semantically correct sentences are generated from the signer’s gestures which would be interpreted by the system. Along with an audio to emit this sentence, the user’s feed is also used to annotate the sentence. This can be viewed by all participants, thus aiding smooth communication with all parties involved. This utility utilizes a simple LSTM model for classification of gestures. The sentences are constructed by a t5 based model. In order to achieve the required data flow, a virtual camera is used. Keywords— Video conferencing, communication, deaf and dumb, utility, gestures, LSTM, t5, virtual camera I. I NTRODUCTION Video Conferencing Platforms (VCPs) have gained popularity in recent times, especially in the wake of the COVID-19 pandemic. While these platforms have made communication easier for most people, they have posed a significant challenge for the deaf and dumb community. As of 2016, 6.3% of the Indian population face significant auditory loss. WHO reports 430 million people worldwide with the need for rehabilitation for hearing loss. Sign Language (SL) is a primary way of communication adopted by the Deaf and Hard of Hearing (DHH) community. Existing VCPs provide limited support to sign language users and require the need of a third person to act as an intermediary. This research proposes a lightweight desktopbased utility named ""Aikyam"" which can detect and interpret people communicating in sign language during a video conference call. It is compatible with popular platforms like Google Meet, Teams etc. Using a computationally lightweight algorithm, Aikyam can identify dynamic signs used in ISL and generate the sentence text for what the user is saying in sign language. The paper targets 2 main aspects of the proposed application in each of the section described. This aspects include the tasks of Sign Language Interpretation and generation of semantic sentences using keywords. The remainder of this paper is structured to cover the following sections. A comprehensive survey of existing methodologies is presented under the literature survey section. The datasets Kaustubh Mhaisekar Information Technlogy Pune Institute of Computer Technology Pune, India kaustubh.m0803@gmail.com used are discussed in section 3. Section 4 describes the architecture of the utility. The detailed methodology and algorithms used in the utility are explained in section 5. Finally, the sections 6 and 7 discuss the results and conclusion of the research respectively. Section 7 also describes the possible scope in which this research can be expanded. II. L ITERATURE SURVEY Interpretation of SL is a progressive area of research which has evolved in various factors such as methods of data acquisition, data representation and classification algorithms. Recognition of gestures is categorized into recognition of characters and numbers, recognition of words and phrases and interpretation of sentences [3]. Real time interpretation of sign language is observed to be done using various permutations and combinations of data acquisition and classification algorithms. 3D sensors like Microsoft Kinect [1 - 5], data gloves [6 - 10] and image processing and computer vision [11 - 18] are observed to be common ways of tracking the user’s motion. Xiujuan Chai et al. utilized Kinect sensor to generate a 3D motion trajectory by utilizing the sensor’s capability to track depth and color. This trajectory was further subjected to linear resampling to account for the variable speed of the signer. In order to predict the sign, Euclidean distance based calculation was performed between the probe trajectory and the existing database of trajectories representing different signs in the Chinese Sign Language [1]. Computer Vision based approaches also follow a similar structure of feature extraction using image processing techniques attached to learning algorithms for classification of gestures. Techniques and methodologies have been developed to recognize discrete as well as continuous forms of gestures. The features required for classification of data are extracted using techniques like background subtraction [11, 12], body landmarking using deep learning [13, 14], etc. The use of deep learning architectures like Convolutional Neural Networks (CNNs) [11], Long Short Term Memory (LSTM) [13], HMMs [17, 18] and traditional computing algorithms like Dynamic Time Warping (DTW) [3] have been identified as commonly used algorithms for classification of static images or video based data (motion trajectories). One of the research proposed a system where the signer positions his or her gesturing arm in a dedicated section of the window. A background subtraction algorithm extracts the actual hand" 2312.05992v1,"Probing the Interactions of Axion-Like Particles with Electroweak Bosons and the Higgs Boson in the High Energy Regime at LHC Tisa Biswas ∗ Department of Physics, University of Calcutta, 92 Acharya Prafulla Chandra Road, Kolkata 700009, India We study the interactions of Axion-Like Particles (ALPs) with the Standard Model particles, aiming to probe their phenomenology via non-resonant searches at the LHC. These interactions are mediated by higher dimensional effective operators within two possible frameworks of linearly and non-linearly realised electroweak symmetry breaking. We consider the ALPs to be light enough to be produced on-shell and exploit their derivative couplings with the SM Higgs boson and the gauge bosons. We will use the high momentum transfer processes, namely hZ, Zγ, W W and W W γ production from pp collisions. We derive upper limits on the gauge-invariant interactions of ALPs with the electroweak bosons and/or Higgs boson that contribute to these processes, from the reinterpretation of the latest Run 2 available LHC data. The constraints we obtain are strong for ALP masses below 100 GeV. These allowed effective interactions in the ALP parameter space yield better significance at HL-LHC and thus, offer promising avenues for subsequent studies. Furthermore, we augment our cut-based analysis with gradient-boosted decision trees, which improve the statistical significance distinctly across these interaction channels. We briefly compare the results with the complementary probe of these couplings via direct production of ALPs in association with the Higgs boson or a vector boson. I. INTRODUCTION Originally motivated by the efforts to solve the strong CP problem [1–5], pseudo-Nambu-Goldstone bosons (pNGBs) generically arise in a variety of new physics (NP) scenarios. Their implications are many, including the dynamic generation of small neutrino masses (Majorons) [6], attempting to solve the flavor problem (Flavons) [7], contributing to composite Higgs models, and extra-dimensional theories [8]. The pNGBs also play a role in addressing the long standing anomaly of muon magnetic moment [9], the hierarchy problem [10] and electroweak baryogenesis [11]. In addition, they can serve as potential dark matter candidates or provide a portal connecting the Standard Model (SM) particles to dark sector [12–14]. Typically, pNGBs exhibit symmetry under a continuous or, in some cases, a discrete shift of the field. These pNGBs, which enjoy a variety of origins, interactions, and masses, are often grouped together in a much broader class of the Axion-Like Particles (ALP). Owing to diverse origins, ALPs connect different sectors in high-energy physics. Studies aiming to detect ALPs in a range of masses and interactions have guided the current and future direction of experiments for beyond the Standard Model (BSM) physics, as discussed in recent reviews [15–17]. ALPs can manifest through a variety of traces in experiments running at different energy scales. At the LHC, ALP interactions are probed through signatures including new resonances or missing energy [18–21], or interactions with top quarks [22], and via Higgs decays [23, 24]. Meson decay experiments typically provide the conventional constraints on ALP-QCD couplings. In the context of flavor experiments, ALPs with masses below a few GeV can be resonantly produced via meson [25–28] and lepton decays [29, 30] or directly in e + e − interactions [31, 32]. Fixed-target settings [33, 34] further enable the search of sub- GeV ALPs. In cosmological and astrophysical probes, still lighter ALPs manifest through observable phenomena [35– 37]. In this work, we aim to probe the effects of non-resonant ALP-mediated production processes involving SM final states only, at the LHC. The ALP serves as an off-shell propagator in these s-channel scattering processes. We analyze the behavior of differential cross-sections at high energies for scatterings that produce electroweak gauge bosons and the Higgs boson from pp collisions. As we will see, the enhanced high-energy sensitivity of the LHC enables us to impose significant constraints on ALP-interactions, from such processes as their rates grow with energy. This deviates √ from the SM scenarios, which exhibit a decrease in the production rates with the collisional center-of-mass energy( ŝ), as 1/ŝ. The explicit dependence of the derivative interactions of the ALPs with SM particles lead to ∗ Electronic address: tibphy rs@caluniv.ac.in" 2312.05994v1,"mir_ref: A Representation Evaluation Framework for Music Information Retrieval Tasks Christos Plachouras Pablo Alonso-Jiménez Dmitry Bogdanov Music Technology Group, Universitat Pompeu Fabra, Barcelona, Spain cplachouras@nyu.edu, pablo.alonso@upf.edu, dmitry.bogdanov@upf.edu Abstract Music Information Retrieval (MIR) research is increasingly leveraging representation learning to obtain more compact, powerful music audio representations for various downstream MIR tasks. However, current representation evaluation methods are fragmented due to discrepancies in audio and label preprocessing, downstream model and metric implementations, data availability, and computational resources, often leading to inconsistent and limited results. In this work, we introduce mir_ref, 1 an MIR Representation Evaluation Framework focused on seamless, transparent, local-first experiment orchestration to support representation development. It features implementations of a variety of components such as MIR datasets, tasks, embedding models, and tools for result analysis and visualization, while facilitating the implementation of custom components. To demonstrate its utility, we use it to conduct an extensive evaluation of several embedding models across various tasks and datasets, including evaluating their robustness to various audio perturbations and the ease of extracting relevant information from them. 1 Evaluating Music Representations In the last decade, representation learning has attracted much interest in Music Information Retrieval (MIR), the field concerned with extracting, analyzing, and understanding information from music data. Time and frequency domain representations of audio are very information-dense, making it difficult and expensive to build end-to-end pipelines for solving MIR tasks. Additionally, their size and accompanying copyright restrictions make sharing, handling, and transferring music datasets challenging. Deep representations have shown promise as a generalized, compact, and efficient input feature relevant to many MIR tasks that circumvents these challenges. Many different music representation learning approaches have been undertaken, starting with the use of Deep Belief Networks in an unsupervised manner [21, 17, 12]. More popularly, classification approaches based on tags followed [34, 23, 10, 28, 38, 37], as well as some based on editorial metadata [27, 22]. Correspondence has also been exploited, such as with tags [13, 14], editorial metadata [4, 30], playlists [15, 3], language [25, 24, 18], and video [11]. A lot of interest has also fallen on selfsupervised [31, 9, 40] and music-generation-based approaches [7]. Evaluation of music audio representations so far remains fragmented. This is in part attributable to challenges present in MIR like data unavailability and implementation complexity [26], but, ultimately, there are no clear guidelines about how various components of a representation learning system should be implemented. Tools such as mirdata [5] and mir_eval [29] have encouraged consistency and transparency by standardizing dataset and metric implementations respectively. Practically, however, representation evaluation comes with many more components that need appropriate experimentation and transparent implementation. Table 1 demonstrates implementation choices by several works in the evaluation of their respective representation models in downstream classification tasks. Model 1 mir_ref is available at https://github.com/chrispla/mir_ref 37th Conference on Neural Information Processing Systems (NeurIPS 2023), ML for Audio Workshop" 2312.06004v1,"Multiplier Optimization via E-Graph Rewriting Andy Wanna 1 , Samuel Coward 1,2 , Theo Drane 2 , George A. Constantinides 1 and Miloš D. Ercegovac 3 Imperial College London, 2 Intel Corporation, 3 University of California, Los Angeles Email: {andy.wanna20, s.coward21, g.constantinides}@imperial.ac.uk, theo.drane@intel.com, milos@cs.ucla.edu 1 Abstract—Multiplier circuits account for significant resource usage in datapath-dominated circuit designs, and RTL designers continue to build bespoke hand-crafted multiplication arrays for their particular application. The construction of an optimized multiplier presents trade-offs between pre-processing to generate a smaller array and array reduction. A data structure known as an e-graph has recently been applied to datapath optimization, where the e-graph’s ability to efficiently explore trade-offs has been shown to be crucial. We propose an e-graph based rewriting framework to construct optimized multiplier circuits. Such a framework can express alternative multiplier representations and generate customized circuit designs. We demonstrate that the proposed tool, which we call OptiMult, can reduce the latency of a squarer by up to 46% and reduce the latency of a standard multiplier by up to 9% when compared against logic synthesis instantiated components. Index Terms—Multiplier, Datapath, E-graph I. I NTRODUCTION Multiplication circuits consist of three stages: array creation, array reduction and a final carry-propagate adder. We reconsider these boundaries, blurring the line between array reduction and carry-propagation. The most common array creation approaches deploy AND arrays or Booth encoding at various radices [1], [2]. Array reduction is typically achieved via compressor cells that sum columns of bits [1], [3], or reduce n rows to m rows, where m < n. Commonly used reduction schemes are the Wallace tree [4] and Dadda tree [5]. High-level and logic synthesis tools automatically replace a ∗ b in source code with optimized components, but rely on fixed architectures and logic synthesis gate-level optimization. Automated techniques for compressor tree synthesis have explored both heuristic based search methods and integer linear programming [6], [7]. We propose an automated rewriting framework helping RTL designers to explore bespoke multiplier implementations. The framework is based on the e(quivalence)-graph data structure that efficiently explores equivalent designs by clustering equivalent sub-expressions into e(quivalence)-classes. This clustering into e-classes captures the notion that there are many equivalent implementations of a given sub-graph in a dataflow graph. The e-graph is grown via constructive rewrite application, meaning that the left-hand side of the rewrite is retained rather than replaced. E-graphs have recently been successfully applied to datapath optimization [8]–[10]. Typical e-graph optimization tools explore a single e-graph, however this is not scalable for many applications. Prior work has proposed sketch-guided equality saturation [11], where intermediate sketches enable e-graph contraction and re-initialization. We modify such an approach by encoding intermediate e-graph optimization phases in a sequence of cost models. We have developed a multiplication circuit optimizer, OptiMult, based on the extensible e-graph library, egg [12], targeting minimal latency circuits. This paper contains the following novel contributions: • application of e-graphs to gate-level component design, • a multi-level and iterative e-graph optimization method, • a dual representation of AND arrays enabling the application of column-wise and row-wise optimizations, • expression of multiplier optimizations as a set of local equivalence-preserving rewrites. II. M ETHODOLOGY The approach is separated into three key contributions. First we describe the representations that make multiplier design amenable to rewriting. Next we describe how multiplier optimization can be decomposed into a collection of local equivalence preserving rewrites. Lastly, we address scalability, taking inspiration from compilers [13], and separating optimization into a set of passes. A. Multiplier Representation In this work an input multiplier expressed as a simple ∗ operator, is initially mapped to an AND array. The AND array is represented as an e-graph, where each node is either an operator connected by edges to its children or a variable/constant. The internal representation supports the basic logical operators, addition of bits and several specialized operators. The row operator is equivalent to a concatenation of its children. The sum operator computes the addition of rows, where each row may represent a multi-bit number. Figure 1 depicts these different representations in both an e-graph and as an array for a 2-bit multiplier, {p 1 , p 0 } ∗ {q 1 , q 0 }, where p i and q i are single bits. The rewrites described in Section II-B encode the transitions between these two representations and highlight the benefit of maintaining multiple representations. In addition to the row and sum operators we also include operators for the commonly-used compressor cells. Specifically, we include a Full-Adder Carry (F A c ) and Sum (F A s ) each taking three operand bits, as well as a Half-Adder Carry (HA c ) and Sum (HA s ) which take two operand bits. These operators allow OptiMult to efficiently explore array reduction schemes at a higher abstraction level, rather than decomposing these operators into their gate-level implementations. The decreasing level of abstraction optimizations are discussed in Sections II-B and II-C." 2312.06005v1,"Noname manuscript No. (will be inserted by the editor) Software issues report for bug fixing process: An empirical study of machine-learning libraries. Ajibode Adekunle · Yunwei Dong ∗ · Hongji Yang Received: date / Accepted: date Abstract Issue resolution and bug-fixing processes are essential in the development of machinelearning libraries, similar to software development, to ensure well-optimized functions. Understanding the issue resolution and bug-fixing process of machine-learning libraries can help developers identify areas for improvement and optimize their strategies for issue resolution and bug-fixing. However, detailed studies on this topic are lacking. Therefore, we investigated the effectiveness of issue resolution for bug-fixing processes in six machine-learning libraries: Tensorflow, Keras, Theano, Pytorch, Caffe, and Scikit-learn. We addressed seven research questions (RQs) using 16,921 issues extracted from the GitHub repository via the GitHub Rest API. We employed several quantitative methods of data analysis, including correlation, OLS regression, percentage and frequency count, and heatmap to analyze the RQs. We found the following through our empirical investigation: (1) The most common categories of issues that arise in machine-learning libraries are bugs, documentation, optimization, crashes, enhancement, new feature requests, build/CI, support, and performance. (2) Effective strategies for addressing these problems include fixing critical bugs, optimizing performance, and improving documentation. (3) These categorized issues are related to testing and runtime and are common among all six machine-learning libraries. (4) Monitoring the total number of comments on issues can provide insights into the duration of the issues. (5) It is crucial to strike a balance between prioritizing critical issues and addressing other issues in a timely manner. Therefore, this study concludes that efficient issue-tracking processes, effective communication, and collaboration are vital for effective resolution of issues and bug fixing processes in machine-learning libraries. Keywords machine-learning library, · issue-report, · bug-fixing process, · regression analysis, · bug-fixing metrics ∗ Corresponding author Ajibode Adekunle Akinjobi School of Software, Northwestern Polytechnical University, Xi’an, 710072, China E-mail: damajibode@gmail.com Yunwei Dong School of Computer Science, Northwestern Polytechnical University, Xi’an 710072, China E-mail: yunweidong@nwpu.edu.cn Hongji Yang School of Computing and Mathematical Sciences, Leicester University, Leicester, UK E-mail: hongji.yang@leicester.ac.uk" 2312.06008v1,"Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Subhadip, Kumar* Western Governors University, skuma19@wgu.edu Artificial Intelligence for IT Operations (AIOps) is a rapidly growing field that applies artificial intelligence and machine learning to automate and optimize IT operations. AIOps vendors provide services that ingest end-to-end logs, traces, and metrics to offer a full stack observability of IT systems. However, these data sources may contain sensitive information such as internal IP addresses, hostnames, HTTP headers, SQLs, method/argument return values, URLs, personal identifiable information (PII), or confidential business data. Therefore, data security is a crucial concern when working with AIOps vendors. In this article, we will discuss the security features offered by different vendors and how we can adopt best practices to ensure data protection and privacy. Additional Keywords and Phrases: AIOps, Cyber Security, AI Security 1 INTRODUCTION AIOps, or Artificial Intelligence for IT Operations, is a new approach that leverages machine learning and automation to enhance the observability and reliability of complex software systems. Observability is the ability to monitor and understand the internal state of a system or application based on the external outputs, such as logs, metrics, and traces. Several vendors offer full stack observability, monitor security vulnerabilities, automations, actionable alerts, and insights. These vendors ingest customers’ logs, traces and metrices to produce actionable insights and recommendations that help SREs, and developers achieve full stack observability and improve the quality and efficiency of their software delivery. Security is a big concern when these vendors ingest customer data such as logs, metrices and traces as they consist sensitive information such as IP addresses, client details and their personal information’s even confidential business data. Also, when this data is in transit or at rest, vendors ensure that the data is protected from being exposed. Security is always a joint responsibility that requires the participation and contribution of all stakeholders to create a safe and secure environment for everyone. In this article, we will discuss about different AIOps vendors and their security features. However, AIOps also poses some security challenges, such as data privacy, access control, and compliance. Therefore, it is important to choose an AIOps vendor that can provide robust and reliable security solutions. Different AIOps vendors have different standards and approaches to meet security standards. In this article, we will discuss in detail about those security measures and how a customer can leverage them and develop a best practice. We will also discuss about how the vendors ingest customer data, encryption in transit and in rest from customers’ system to vendor, in product communications, masking of sensitive information’s and PII. Will also discuss how to protect the data using RBAC (Role based access control) and masking to ensure minimum exposure in case of a data breach. * Place the footnote text for the author (if applicable) here." 2312.06024v1,"Thinking Assistants: LLM-Based Conversational Assistants that Help Users Think By Asking rather than Answering SOYA PARK and CHINMAY KULKARNI, Emory University, USA Probing: Understand user’s interest e.g. ! I’m interested in LLM chatbot for reflection ![User message] Answering: Offer tailored response to research-related questions e.g. ! What is Prof. Golbeck advising style? If enough understanding of users: Recommend the professors’ relevant papers OR Give Wise Feedback on user’s research Ask More clarifying questions about their research interest/goal or approach to get a full picture of their research If matching information provided by the professor: Respond the information Otherwise: If the question is relevant to research: Say “We don’t know what [the professor thinks about this]” & Offer answers by querying GPT Otherwise: Turn conversation back to research-related Ask If they want to know how their research aligns with the professor If there is any terminology they want to know more about Content Follow-up questions Understand intent Fig. 1. Gradschool.chat is a thinking assistant that helps prospective graduate students reflect on research interests. Based on the user’s question, the assistant chooses between a ‘probing’ mode, understanding user interests and prompting reflection, and an ‘answering’ mode that offers with relevant information. Most conversational turns end with a encouraging follow-up question. We introduce the concept of thinking assistants, an approach that encourages users to engage in deep reflection and critical thinking through brainstorming and thought-provoking queries. We instantiate one such thinking assistant, Gradschool.chat, as a virtual assistant tailored to assist prospective graduate students. We posit that thinking assistants are particularly relevant to situations like applying to graduate school, a phase often characterized by the challenges of academic preparation and the development of a unique research identity. In such situations, students often lack direct mentorship from professors, or may feel hesitant to approach faculty with their queries, making thinking assistants particularly useful. Leveraging a Large Language Model (LLM), Gradschool.chat is a demonstration system built as a thinking assistants for working with specific professors in the field of human-computer interaction (HCI). It was designed through training on information specific to these professors and a validation processes in collaboration with these academics. This technical report delineates the system’s architecture and offers a preliminary analysis of our deployment study. Additionally, this report covers the spectrum of questions posed to our chatbots by users. The system recorded 223 conversations, with participants responding positively to approximately 65% of responses. Our findings indicate that users who discuss and brainstorm their research interests with Gradschool.chat engage more deeply, often interacting with the chatbot twice as long compared to those who only pose questions about professors. We also find that participants who use the system as an informational or predictive agent, seeking definitive answers such as a direct ’yes’ or ’no’ to queries like “Do I have a chance of getting into the university?” find the thinking assistants’s reflective conversations unsatisfactory. 1 INTRODUCTION Many of life’s most important decisions are challenging because they inherently require a degree of self-discovery in the absence of direct and readily accessible guidance. For instance, in career transitions, individuals must navigate through a maze of choices and Authors’ address: Soya Park, soya.park@emory.edu; Chinmay Kulkarni, chinmay.kulkarni@emory.edu, Emory University, USA. © 2023 Copyright held by the owner/author(s) This is the author’s version of the work. 1" 2312.06029v1,"Fast Classification of Large Time Series Datasets Muhammad Marwan Muhammad Fuad Coventry University Coventry CV1 5FB, UK ad0263@coventry.ac.uk Abstract: Time series classification (TSC) is the most import task in time series mining as it has several applications in medicine, meteorology, finance cyber security, and many others. With the ever increasing size of time series datasets, several traditional TSC methods are no longer efficient enough to perform this task on such very large datasets. Yet, most recent papers on TSC focus mainly on accuracy by using methods that apply deep learning, for instance, which require extensive computational resources that cannot be applied efficiently to very large datasets. The method we introduce in this paper focuses on these very large time series datasets with the main objective being efficiency. We achieve this through a simplified representation of the time series. This in turn is enhanced by a distance measure that considers only some of the values of the represented time series. The result of this combination is a very efficient representation method for TSC. This has been tested experimentally against another time series method that is particularly popular for its efficiency. The experiments show that our method is not only 4 times faster, on average, but it is also superior in terms of classification accuracy, as it gives better results on 24 out of the 29 tested time series datasets. . Keywords: Classification, Discretization, Time Series. 1 Introduction A time series 𝑇 = (〈𝑡 , 𝑣 〉, 〈𝑡 , 𝑣 〉, … , 〈𝑡 , 𝑣 〉) is an ordered collection of observations measured at timestamps 𝑡 . If the values 𝑣 are single elements, usually real numbers, the time series is called univariate, if they are vectors, the time series is called multivariate Time series data appear in a wide variety of applications, such as medicine, finance, meteorology, and many others. The recent proliferation of internet of things (IoT) with sensors capturing very large amount of data, in the form of time series, added another rich source of time series data Time series mining addresses several tasks such as clustering, segmentation, queryby-content, anomaly detection, prediction, and others. The most important time series mining task is classification. Time series classification (TSC) has a broad variety of applications in medicine, industry, 1" 2312.06038v1,"Correcting Diffusion Generation through Resampling Yujian Liu UC Santa Barbara Yang Zhang MIT-IBM Watson AI Lab Tommi Jaakkola MIT CSAIL Shiyu Chang UC Santa Barbara yujianliu@ucsb.edu yang.zhang2@ibm.com tommi@csail.mit.edu chang87@ucsb.edu SD SD + PF SD SD + PF SD SD + PF Cat on chair peering over top of table at glass of beverage. A couch, table, chairs and a tv are featured in a den with blue carpeting. Two donuts, banana, cup and a book on the table. A dining room table with a bottle of wine and wine glasses and a pot of carrots A bathroom with a white toilet sitting next to a bathroom sink. A man sitting on a bed with a dog while holding a cell phone. Figure 1. Sample images generated by Stable Diffusion v2.1 with and without our particle filtering algorithm (PF). The left two columns illustrate the missing object errors, and the right column illustrates the unnatural distortions. Missing objects are highlighted in red. Abstract forms the existing strongest baseline by 5% in object occurrence and 1.0 in FID on MS-COCO. Our code is publicly available at https://github.com/UCSB-NLP- Chang/diffusion_resampling.git. Despite diffusion models’ superior capabilities in modeling complex distributions, there are still non-trivial distributional discrepancies between generated and ground-truth images, which has resulted in several notable problems in image generation, including missing object errors in text-toimage generation and low image quality. Existing methods that attempt to address these problems mostly do not tend to address the fundamental cause behind these problems, which is the distributional discrepancies, and hence achieve sub-optimal results. In this paper, we propose a particle filtering framework that can effectively address both problems by explicitly reducing the distributional discrepancies. Specifically, our method relies on a set of external guidance, including a small set of real images and a pre-trained object detector, to gauge the distribution gap, and then design the resampling weight accordingly to correct the gap. Experiments show that our methods can effectively correct missing object errors and improve image quality in various image generation tasks. Notably, our method outper- 1. Introduction Diffusion models have achieved impressive success in generating high-quality images in various image-generation applications [3, 6, 15, 20, 23, 25, 29, 31, 40, 43–45, 47, 48, 50, 51, 54–57, 61, 66, 67]. Such success can be ascribed to diffusion models’ superior capability in modeling complex data distributions and thus low distributional discrepancies between the real and generated images. However, the diffusion generation process still introduces distributional discrepancies in modeling data distributions, due to the limited representation power of the denoising network, the errors introduced in discretizing and numerically solving the continuous ODE or SDE denoising trajectories [32, 65], etc. Such distributional discrepancies have led to several notable problems in image generation. For example, in text-to- 1" 2312.06039v1,"Singularly Perturbed Layered Control of Deformable Bodies Lekan Molu Abstract— Variable curvature modeling tools provide an accurate means of controlling infinite degrees-of-freedom deformable bodies and structures. However, their forward and inverse Newton-Euler dynamics are fraught with high computational costs. Assuming piecewise constant strains across discretized Cosserat rods imposed on the soft material, a composite two time-scale singularly perturbed nonlinear backstepping control scheme is here introduced. This is to alleviate the long computational times of the recursive Newton-Euler dynamics for soft structures. Our contribution is three-pronged: (i) we decompose the system’s Newton-Euler dynamics to a two coupled sub-dynamics by introducing a perturbation parameter; (ii) we then prescribe a set of stabilizing controllers for regulating each subsystem’s dynamics; and (iii) we study the interconnected singularly perturbed system and analyze its stability. Supplementary material—All codes for reproducing the experiments reported in this paper are available online: https://github.com/robotsorcerer/dcm. I. I NTRODUCTION Soft bodies, inspired by the functional role of living organisms’ soft tissues, provide better compliance and configurability compared to their rigid counterparts. This has fostered their applications in 6D dexterous bending and whole-arm manipulation [5], minimally invasive surgery in tight spaces [15, 16], inspection [11], and assistive rehabilitation [17, 14], among others. The last few years have witnessed a flurry of models for the accurate and time-efficient computation of dynamic models and control of soft actuators. A non-exhaustive list includes approaches from morphoelastic filament theory [13, 8, 4], generalized Cosserat rod theory [22, 3], the constant curvature model [5], the piecewise constant curvature model [25, 18], a PDE-based continuum Cosserat model [19], and a generalization of the dynamics of soft robots to rigid body-like dynamics in the discrete Cosserat model [20, 21]. Constant curvature models [10] simplify the continuous bending motions of these infinite-DOF structures at the cost of reduced accuracy. In contrast, finite element methods [2] provide precision in modeling accuracy at the cost of increased computational efforts. Variable curvature models such as those based on Cosserat rod theory [21] provide a unified mathematical model with the benefit of the accuracy of FEM methods. However, for real-time dynamics computation and control efficacy, variable curvature schemes suffer from the “curse of discretization”: to yield better The author is with lekanmolu@microsoft.com . Microsoft Research NYC Fig. 1. [Top]: Configuration of an Octopus robot arm, reprinted from Molu et al. [12]. [Bottom]: 3D model of the . robot we consider. accuracy more discretized Cosserat sections are needed. Increased discretization of continuum sections imply increased computation cost despite the O(N ) 1 recursive costs of the forward and inverse Newton-Euler dynamics [12]. Towards mitigating this computational burden whilst preserving model and control accuracy, researchers have erstwhile explored hierarchical control of deformable bodies. Taking inspiration from the peripheral nervous system of the Octopus, Shih et al. [24] articulated a mixed mode hierarchical control system comprised of a model-free reinforcement learning decision-maker and a model-based energy shaping controller for low-level motor tasks. However, this modeling scheme lacked interpretability and illegitimized the ad hoc dynamic model decomposition simplification. In this paper, we adopt reduced order modeling and control with singular perturbation techniques [9]. Singular perturbations are a nat- 1 Here, N is the number of sections in the discretized computational model." 2312.06049v1,"SSPNet: Scale and spatial priors guided generalizable and interpretable pedestrian attribute recognition Jifeng Shen a,∗ , Teng Guo a , Xin Zuo b , Heng Fan c , Wankou Yang d a School of Electrical and Information Engineering, Jiangsu University, Zhenjiang, 212013, China b School of Computer Science and Engineering, Jiangsu University of Science and Technology, Zhenjiang, 212003, China c Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA d School of Automation, Southeast University, Nanjing, 210096, China Abstract Global feature based Pedestrian Attribute Recognition (PAR) models are of- ten poorly localized when using Grad-CAM for attribute response analysis, which has a significant impact on the interpretability, generalizability and per- formance. Previous researches have attempted to improve generalization and interpretation through meticulous model design, yet they often have neglected or underutilized effective prior information crucial for PAR. To this end, a novel Scale and Spatial Priors Guided Network (SSPNet) is proposed for PAR, which is mainly composed of the Adaptive Feature Scale Selection (AFSS) and Prior Location Extraction (PLE) modules. The AFSS module learns to provide rea- sonable scale prior information for different attribute groups, allowing the model to focus on different levels of feature maps with varying semantic granularity. The PLE module reveals potential attribute spatial prior information, which avoids unnecessary attention on irrelevant areas and lowers the risk of model over-fitting. More specifically, the scale prior in AFSS is adaptively learned from different layers of feature pyramid with maximum accuracy, while the spatial priors in PLE can be revealed from part feature with different granularity (such as image blocks, human pose keypoint and sparse sampling points). Besides, a ∗ Corresponding author Email address: shenjifeng@ujs.edu.cn (Jifeng Shen) Preprint submitted to Journal of L A TEX Templates December 12, 2023" 2312.06056v1,"METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities Sangwon Hyun, Mingyu Guo, M. Ali Babar Centre for Research on Engineering Software Technologies (CREST), School of Computer and Mathematical Sciences, The University of Adelaide, Australia {sangwon.hyun, mingyu.guo, ali.babar}@adelaide.edu.au Abstract—Large-Language Models (LLMs) have shifted the paradigm of natural language data processing. However, their black-boxed and probabilistic characteristics can lead to potential risks in the quality of outputs in diverse LLM applications. Recent studies have tested Quality Attributes (QAs), such as robustness or fairness, of LLMs by generating adversarial input texts. However, existing studies have limited their coverage of QAs and tasks in LLMs and are difficult to extend. Additionally, these studies have only used one evaluation metric, Attack Success Rate (ASR), to assess the effectiveness of their approaches. We propose a MEtamorphic Testing for Analyzing LLMs (METAL) framework to address these issues by applying Metamorphic Testing (MT) techniques. This approach facilitates the systematic testing of LLM qualities by defining Metamorphic Relations (MRs), which serve as modularized evaluation metrics. The METAL framework can automatically generate hundreds of MRs from templates that cover various QAs and tasks. In addition, we introduced novel metrics that integrate the ASR method into the semantic qualities of text to assess the effectiveness of MRs accurately. Through the experiments conducted with three prominent LLMs, we have confirmed that the METAL framework effectively evaluates essential QAs on primary LLM tasks and reveals the quality risks in LLMs. Moreover, the newly proposed metrics can guide the optimal MRs for testing each task and suggest the most effective method for generating MRs. Index Terms—Large-language models, Metamorphic testing, Quality attributes, Text perturbations I. I NTRODUCTION The advent of Large-Language Models (LLMs) has transformed the landscape of natural language-based data retrieval and analysis. Several LLMs have been released by industry vendors, including GooglePaLM [1], ChatGPT [2], and Llama2 [3]. Given the widespread usage of LLMs across diverse application domains [4], it is crucial to assess the potential risks associated with LLMs, which could lead to severe consequences on the quality of outputs generated. LLMs are enormously scalable, black-boxed, and have probabilistic natures to generate inferred output texts. Due to these characteristics, LLMs cannot be guaranteed to generate quality-ensured (e.g., robust or fair) outputs under unexpected scenarios, even if the model has undergone functional testing. Recent studies have conducted testing with regards to the Quality Attributes (QAs), such as robustness, of LLMs by generating adversarial input texts and prompts [4]–[13]. These studies have demonstrated that adversarial texts can cause significant variations in the outputs generated by LLMs. (a) Character-swap perturbation example on sentiment analysis task (b) Synonym-replace perturbation example on toxicity detection task Fig. 1: Adversarial examples for evaluating LLMs In Fig. 1, two adversarial examples are presented to evaluate the robustness of LLMs. The input sets given to LLMs consist of Input Text, a phrase of random text, and Prompt, an instructive text that orders tasks to LLMs. Fig. 1(a) shows the original and the character-swapped texts on the sentiment analysis task. Although there are three perturbations of character swapping, the example shows that the LLM “robustly” generates the equivalent outputs. However, in Fig. 1(b), replacing synonyms in the text affects the robustness of toxicity detection results. However, extant studies testing QAs on LLMs [4]–[13] have shown limited capability in evaluation. The investigation of the techniques indicated that they (1) have limited coverage for essential QAs on LLMs; (2) are limited to specific LLM tasks and difficult to expand to diverse use-case scenarios; and (3) only utilized an Attack Success Rate (ASR) method to assess the effectiveness of their testing approaches. Metamorphic Testing (MT) [14] can facilitate the systematic testing of QAs on LLMs by defining Metamorphic Relations (MRs) that serve as evaluation measures and adversarial perturbations. Each example depicted in Fig. 1 can be defined as independent MRs as follows: MR1: The outputs of LLMs given original and characterswapped input texts should be the same. • MR2: The outputs of LLMs given original and synonym- •" 2312.06057v1,"Improved convergence of the spectral proper orthogonal decomposition through time shifting Diego C. P. Blanco ∗1 , Eduardo Martini 2 , Kenzo Sasaki 1 , and André V. G. Cavalieri 1 1 Divisão de Engenharia Aeroespacial, Instituto Tecnológico de Aeronáutica, 12228-900, São José dos Campos/SP - Brazil 2 Département Fluides, Thermique et Combustion, Institut Pprime, CNRS, Université de Poitiers, ENSMA, 86000 Poitiers, France Abstract Spectral proper orthogonal decomposition (SPOD) is an increasingly popular modal analysis method in the field of fluid dynamics due to its specific properties: a linear system forced with white noise should have SPOD modes identical to response modes from resolvent analysis. The SPOD, coupled with the Welch method for spectral estimation, may require long time-resolved data sets. In this work, a linearised Ginzburg-Landau model is considered in order to study the method’s convergence. SPOD modes of the white-noise forced equation are computed and compared with corresponding response resolvent modes. The quantified error is shown to be related to the time length of Welch blocks (spectral window size) normalised by a convective time. Subsequently, an algorithm based on a temporal data shift is devised to further improve SPOD convergence and is applied to the Ginzburg-Landau system. Next, its efficacy is demonstrated in a numerical database of a boundary layer subject to bypass transition. The proposed approach achieves substantial improvement in mode convergence with smaller spectral window sizes with respect to the standard method. Furthermore, SPOD modes display growing wall-normal and span-wise velocity components along the stream-wise direction, a feature which had not yet been observed and is also predicted by a global resolvent calculation. The shifting algorithm for the SPOD opens the possibility for using the method on datasets with time series of moderate duration, often produced by large simulations. 1 Introduction Modal analysis is a well known method to study systems of partial differential equations (PDEs). By studying characteristics of a dynamic system, one can ∗ Correspondence address: diegodcpb@ita.br 1" 2312.06071v1,"Probabilistic Precipitation Downscaling with Optical Flow-Guided Diffusion Prakhar Srivastava ∗1 , Ruihan Yang †1 , Gavin Kerrigan ‡1 , Gideon Dresdner §2 , Jeremy McGibbon ¶2 , Christopher Bretherton ‖2 , and Stephan Mandt ∗∗1 1 Department of Computer Science, University of California, Irvine 2 Allen Institute for AI 1 Abstract Introduction Patterns of precipitation (rainfall and snowfall) are central to human and natural life on earth. In a rapidly warming climate, reliable simulations of how precipitation patterns may change help human societies adapt to climate change. Such simulations are challenging, because weather systems of many scales in space and time, interacting with complex surface features such as mountains and coastlines, contribute to precipitation trends and extremes [46]. For purposes such as estimating flood hazards, precipitation must be estimated down to spatial resolutions of a few km. Fluid-dynamical models of the global atmosphere are prohibitively expensive to run at such fine scales [52], so the climate adaptation community relies on ‘downscaling’ of coarse-grid simulations to a finer grid (this is the climate science terminology for super-resolution). Traditional downscaling is either ‘dynamical’ (running a fine-grid fluid-dynamical model limited to the region of interest, which requires specialized knowledge and computational resources) or ‘statistical’ (typically restricted to simple univariate methods) [53]. Advances in super-resolution methods developed by the computer vision community are poised to dramatically improve statistical downscaling. Such work is a natural follow-up to recent advancements in deep-learning-based weather and climate prediction methodologies, which have ushered in a new era of data-driven forecasting. These approaches show remarkable performance gains, boasting improvements of orders of magnitude in run time without sacrificing accuracy [24, 35]. Our focus centers on addressing a temporal downscaling problem, wherein the objective is to enhance the resolution of a sequence (“video”) of low-resolution In climate science and meteorology, local precipitation predictions are limited by the immense computational costs induced by the high spatial resolution that simulation methods require. A common workaround is statistical downscaling (aka superresolution), where a low-resolution prediction is super-resolved using statistical approaches. While traditional computer vision tasks mainly focus on human perception or mean squared error, applications in weather and climate require capturing the conditional distribution of high-resolution patterns given low-resolution patterns so that reliable ensemble averages can be taken. Our approach relies on extending recent video diffusion models to precipitation superresolution: an optical flow on the high-resolution output induces temporally coherent predictions, whereas a temporally-conditioned diffusion model generates residuals that capture the correct noise characteristics and high-frequency patterns. We test our approach on X- SHiELD, an established large-scale climate simulation dataset, and compare against two state-of-the-art baselines, focusing on CRPS, MSE, precipitation distributions, as well as an illustrative case – the complex terrain of California. Our approach sets a new standard for data-driven precipitation downscaling. ∗ prakhs2@uci.edu † ruihan.yang@uci.edu ‡ kerrigag@uci.edu § gideond@allenai.org ¶ jeremym@allenai.org ‖ christopherb@allenai.org ∗∗ mandt@uci.edu 1" 2312.06072v1,"A DYNAMIC INTERACTIVE LEARNING FRAMEWORK FOR AUTOMATED 3D MEDICAL IMAGE SEGMENTATION Mu Tian School of Biomedical Engineering Medical School Shenzhen University Shenzhen, China 518000 mtian@szu.edu.cn Xiaohui Chen School of Biomedical Engineering Medical School Shenzhen University Shenzhen, China 518000 2060241021@email.szu.edu.cn Yi Gao School of Biomedical Engineering Medical School Shenzhen University Shenzhen, China 518000 gaoyi@szu.edu.cn December 12, 2023 A BSTRACT Many deep learning based automated medical image segmentation systems, in reality, face difficulties in deployment due to the cost of massive data annotation and high latency in model iteration. We propose a dynamic interactive learning framework that addresses these challenges by integrating interactive segmentation into end-to-end weak supervised learning with streaming tasks. We develop novel replay and label smoothing schemes that overcome catastrophic forgetting and improve online learning robustness. For each image, our multi-round interactive segmentation module simultaneously optimizes both front-end predictions and deep learning segmenter. In each round, a 3D “proxy mask” is propagated from sparse user inputs based on image registration, serving as weak supervision that enable knowledge distillation from the unknown ground truth. In return, the trained segmenter explicitly guides next step’s user interventions according to a spatial residual map from consecutive front/back-end predictions. Evaluation on 3D segmentation tasks (NCI-ISBI2013 and BraTS2015) shows that our framework generates online learning performances that match offline training benchmark. In addition, with a ∼62% reduction in total annotation efforts, our framework produces competitive dice scores comparing to online/offline learning which equipped with full ground truth. Furthermore, such a framework, with its flexibility and responsiveness, could be deployed behind hospital firewall that guarantees data security and easy maintenance. 1 Introduction Existing works on automated segmentation systems [1] for medical images majorly fall into one of two categories: interactive segmentation or fully automated segmentation. Interactive segmentation incorporates user interventions to iteratively update the segmentation results. There are two fundamental desired properties in this type of methods: (1) the intuitiveness and convenience of user intervention to the software interface, and (2) the efficiency and accuracy of the underlying updating algorithm. Common types of user interventions include a set of clicks/stripes on the image that internally serve as “seeds” in outlining the target boundary. These seeds will then guide the algorithm to extract the target in multiple rounds. Conventional interactive segmentation methods were generally based on either active contour [2–9] or graph theory [10–19]. They are popular in clinical applications since they are fast responsive and light weighted. Well designed software tools have been deployed inside the hospital firewall and facilitate medical research without data leaving their origin. Such data-safety feature is critical to fulfill the current technological and legislative requirement. The downside is that they treat each new task (an image to be segmented) as an isolated case while ignoring correlations from similar tasks. Contrastingly, fully automated segmentation methods construct predictive models that generate segmentations directly from raw images without external signals. In recent years deep learning based approaches have been dominating and many have achieved state-of-the-arts results. By exploiting local structures and spatial correlations, well designed" 2312.06089v1,"TabMT: Generating Tabular data with Masked Transformers Manbir S. Gulati AI Accelerator Leidos Inc Manbir.S.Gulati@leidos.com Paul F. Roysdon AI Accelerator Leidos Inc Paul.Roysdon@leidos.com Abstract Autoregressive and Masked Transformers are incredibly effective as generative models and classifiers. While these models are most prevalent in NLP, they also exhibit strong performance in other domains, such as vision. This work contributes to the exploration of transformer-based models in synthetic data generation for diverse application domains. In this paper, we present TabMT, a novel Masked Transformer design for generating synthetic tabular data. TabMT effectively addresses the unique challenges posed by heterogeneous data fields and is natively able to handle missing data. Our design leverages improved masking techniques to allow for generation and demonstrates state-of-the-art performance from extremely small to extremely large tabular datasets. We evaluate TabMT for privacy-focused applications and find that it is able to generate high quality data with superior privacy tradeoffs. 1 Introduction Generative models have attracted significant attention in the field of deep learning due to their ability to synthesize high-quality data and learn the underlying structure of complex datasets. Such models have been successfully applied to various data types including images [25], text[11], and tabular data [17]. This work concentrates on tabular data, which is prevalent in numerous fields like healthcare, finance, and social sciences. The heterogeneous nature of tabular data, characterized by its diverse data types, distributions, and relationships, presents distinct challenges not present in other domains. Categorical Fields Numerical Fields Quantizer Embedding Ordered Embedding Masking 𝑃 𝐹 !,# = 𝑚 = 𝑝 ! 𝑝 ! ~𝑈(0,1) The development of effective synthetic tabular data generators is crucial Transformer for numerous reasons including: privacy preservation, data augmentation, model interpretability, and anomaly detection. Prior work in this domain has produced a myriad of generative models, including Generative Adver- Dynamic sarial Networks (GANs)[37][34], Variational Autoencoders (VAEs)[34], Linear Autoregressive Transformer[30] [3], and Diffusion models[17]. Although Predicted these existing models strive to address the challenges associated with tab- Values ular data generation, there is still room for exploration and improvement. Specifically, we demonstrate improvements in robustness, scalability, Figure 1: Diagram of privacy preservation, and handling of missing data. TabMT. m is the mask Transformers [31], originally designed for natural language processing token, p i is the masking th (NLP) tasks, have lead to significant advancements in a variety of appli- probability of the i row cations. Their powerful capacity for modeling complex dependencies and 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.06097v1,"SCIENCE CHINA Physics, Mechanics & Astronomy . Article . print-crossmark January 2024 Vol. 67 No. 1: 219511 https://doi.org/10.1007/s11433-023-2219-7 The FAST All Sky H I Survey (FASHI): the first release of catalog ∗ ∗ Chuan-Peng Zhang 1,2, * , Ming Zhu 1,2, , Peng Jiang 1,2, , Cheng Cheng 3 , Jing Wang 4 , Jie Wang 2 , Jin-Long Xu 1,2 , Xiao-Lan Liu 1,2 , Nai-Ping Yu 1,2 , Lei Qian 1,2 , Haiyang Yu 2 , Mei Ai 1,2 , Yingjie Jing 2 , Chen Xu 2 , Ziming Liu 2 , Xin Guan 1,2 , Chun Sun 1,2 , Qingliang Yang 1,2 , Menglin Huang 1,2 , Qiaoli Hao 1,2 , and FAST Collaboration 1,2 1 Guizhou Radio Astronomical Observatory, Guizhou University, Guiyang 550000, People’s Republic of China; 2 National Astronomical Observatories, Chinese Academy of Sciences, Beijing 100101, People’s Republic of China; 3 Chinese Academy of Sciences South America Center for Astronomy, National Astronomical Observatories, CAS, Beijing 100101, China; 4 Kavli Institute for Astronomy and Astrophysics, Peking University, Beijing 100871, People’s Republic of China Received June 20, 2023; accepted September 8, 2023; published online December 8, 2023 The FAST All Sky H I survey (FASHI) was designed to cover the entire sky observable by the Five-hundred-meter Aperture Spherical radio Telescope (FAST), spanning approximately 22000 square degrees of declination between −14 ◦ and +66 ◦ , and in the frequency range of 1050-1450 MHz, with the expectation of eventually detecting more than 100000 H I sources. Between August 2020 and June 2023, FASHI had covered more than 7600 square degrees, which is approximately 35% of the total sky observable by FAST. It has a median detection sensitivity of around 0.76 mJy beam −1 and a spectral line velocity resolution of ∼6.4 km s −1 at a frequency of ∼1.4 GHz. As of now, a total of 41741 extragalactic H I sources have been detected in the frequency range 1305.5-1419.5 MHz, corresponding to a redshift limit of z ≲ 0.09. By cross-matching FASHI sources with the Siena Galaxy Atlas (SGA) and the Sloan Digital Sky Survey (SDSS) catalogs, we found that 16972 (40.7%) sources have spectroscopic redshifts and 10975 (26.3%) sources have only photometric redshifts. Most of the remaining 13794 (33.0%) H I sources are located in the direction of the Galactic plane, making their optical counterparts difficult to identify due to high extinction or high contamination of Galactic stellar sources. Based on current survey results, the FASHI survey is an unprecedented blind extragalactic H I survey. It has higher spectral and spatial resolution and broader coverage than the Arecibo Legacy Fast ALFA Survey (ALFALFA). When completed, FASHI will provide the largest extragalactic H I catalog and an objective view of H I content and large-scale structure in the local universe. Key Words: surveys, redshifts, galaxies, telescope, radio lines, H I line PACS number(s): 95.80.+p, 98.62.Py, 98.52.-b, 95.55.Jz, 95.30.Ky, 98.58.Ge Citation: Zhang C.-P., et al, FASHI, Sci. China-Phys. Mech. Astron. 67, 219511 (2024), https://doi.org/10.1007/s11433-023-2219-7 1 Introduction Neutral hydrogen (H I ) is a significant component of the interstellar medium within disk galaxies. The measurement of its abundance and kinematics, via the 21 cm emission line, has been employed to address numerous astrophysical issues, including studies on the large-scale distribution of galaxies and their secular evolution (e.g., Cheng et al., 2020; Wong et al., 2006; Xu et al., 2022). The line emission from H I provides crucial information about the distribution of neutral gas and its velocity field within a galaxy (e.g., Springob et al., 2005). H I line offers a way to obtain redshifts, gas masses, * Corresponding authors (C.-P. Zhang, email: cpzhang@nao.cas.cn; M. Zhu, email: mz@nao.cas.cn; P. Jiang, email: pjiang@nao.cas.cn) © Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2020 phys.scichina.com link.springer.com" 2312.06104v1,"On the approximability of random-hypergraph MAX-3-XORSAT problems with quantum algorithms Eliot Kapit 1,3 , ∗ Brandon A. Barton 2,3 , Sean Feeney 3 , George Grattan 3 , Pratik Patnaik 1,3 , Jacob Sagal 3 , Lincoln D. Carr 1,2,3 , and Vadim Oganesyan 4,5,6 1 Department of Physics, Colorado School of Mines, 1523 Illinois St, Golden CO 80401 2 Department of Applied Mathematics and Statistics, Colorado School of Mines, 1500 Illinois St, Golden CO 80401 3 Quantum Engineering Program, Colorado School of Mines, 1523 Illinois St, Golden CO 80401 4 Department of Physics and Astronomy, College of Staten Island, CUNY, Staten Island, NY 10314, USA 5 Physics program and Initiative for the Theoretical Sciences, The Graduate Center, CUNY, New York, NY 10016, USA and 6 Center for Computational Quantum Physics, Flatiron Institute, 162 5th Avenue, New York, NY 10010, USA A huge range of important problems in computer science–including task optimization, formal logic, encryption, and machine learning–can be solved by finding the sequence of binary variables that optimizes a cost function defined by a series of few-variable constraint relationships. These problems define the complexity class NP, and are in the worst case, and often the typical case, exponentially hard in the number of variables for all known methods. This hardness applies both to exact and approximate optimization, e.g. finding configurations with a value within a defined fraction of the global optimum. Fundamentally, the lack of any guided local minimum escape method ensures the hardness of both exact and approximate optimization classically, but the intuitive mechanism for approximation hardness in quantum algorithms based on Hamiltonian time evolution is not well understood. In this work, using the prototypically hard MAX-3-XORSAT problem class, we explore this question. We conclude that the mechanisms for quantum exact and approximation hardness are fundamentally distinct. We qualitatively identify why traditional methods such as high depth quantum adiabatic optimization algorithms are not reliably good approximation algorithms. We propose a new spectral folding optimization method that does not suffer from these issues and study it analytically and numerically. We consider random rank-3 hypergraphs including extremal planted solution instances, where the ground state satisfies an anomalously high fraction of constraints compared to truly random problems. We show that, if we define the energy to be E = N unsat −N sat , then spectrally folded quantum optimization will return states with energy E ≤ AE GS (where E GS is the ground state energy) in polynomial time, where conservatively, A ≃ 0.6. We thoroughly benchmark variations of spectrally folded quantum optimization for random classically approximation-hard (planted solution) instances in simulation, and find performance consistent with this prediction. We do not claim that this approximation guarantee holds for all possible hypergraphs, though our algorithm’s mechanism can likely generalize widely. These results suggest that quantum computers are more powerful for approximate optimization than had been previously assumed. III. Spectrally folded quantum optimization algorithms Contents I. Introduction 2 II. Hardness mechanisms, problem definitions and previous approaches 3 A. Inability of previous methods to find or even approach the ground state at large N 3 B. Mechanisms for quantum solution hardness: exponentially small gaps and transverse field chaos 3 C. Approximation hardness and conventional AQC/QAOA 4 D. The MAX-3-XORSAT problem and approximation-hard instance construction 5 E. Absence of angle fine tuning in this work 6 ∗ Electronic address: ekapit@mines.edu IV. Analytical performance predictions A. Preliminaries B. Paramagnet to spin glass transition scaling for MAX-3-XORSAT C. Scaling of inter-valley tunneling in a p = 3 quantum spin glass D. Achievable approximation ratio with spectrally folded trial minimum annealing E. Further Comments and Caveats 7 9 9 10 11 13 14 V. Numerical tests of approximation hardness for traditional methods 15 A. Setup and summary of results 15 B. Performance of greedy classical algorithms 16 C. Performance of high-depth QAOA for this problem 17 VI. Numerical tests of spectral folding" 2312.06112v1,"COSMO: Converting and Smoothing False Negatives for Vision-Language Pre-training Taesup Moon 1,2† Dohoon Kim 1 * Jaeseok Byun 1 * 1 Department of ECE, Seoul National University 2 Department of ASRI/INMC/IPAI/AIIS, Seoul National University {wotjr3868, dohoon.kim, tsmoon}@snu.ac.kr Abstract We consider the critical issue of false negatives in Vision- Language Pre-training (VLP), a challenge that arises from the inherent many-to-many correspondence of image-text pairs in large-scale web-crawled datasets. The presence of false negatives can impede achieving optimal performance and even lead to learning failures. To address this challenge, we propose a method called COSMO (COnverting and SMOoothing false negatives) that manages the false negative issues, especially powerful in hard negative sampling. Building upon the recently developed GRouped mIni-baTch sampling (GRIT) strategy, our approach consists of two pivotal components: 1) an efficient connection mining process that identifies and converts false negatives into positives, and 2) label smoothing for the image-text contrastive loss (ITC). Our comprehensive experiments verify the effectiveness of COSMO across multiple downstream tasks, emphasizing the crucial role of addressing false negatives in VLP, potentially even surpassing the importance of addressing false positives. In addition, the compatibility of COSMO with the recent BLIP-family model is also demonstrated. Figure 1. Examples of positives, negatives, and false negatives among image-text pairs. Notably, BLIP [31] introduced a caption refinement process by leveraging an image captioning model and a filter to generate synthetic clean captions and remove noisy captions. Such process can be seen as correcting the false positives that were injected by the noisy captions. Contrastively, we note that there is another type of challenge for VLP that stems from the nature of many-to-many correspondence of image-text pairs. As depicted in Figure 1, it is common for an image (resp. text) to have an additional positive connection with another text (resp. image), which is paired with its corresponding image (resp. text), that may also correctly explain the image (resp. text). This is due to the fact that the existing image-text datasets are constructed by only collecting paired image-text instances, hence the information regarding non-paired but semantically close image-text combination is missed. Consequently, for each image (resp. text), the text (resp. image) that is given as the pair with the image (resp. text) is treated as the only pos- 1. Introduction With large-scale web-crawled dataset, majorities of visionlanguage pre-training (VLP) models are trained in a selfsupervised learning manner using the combination of several pre-tasks and losses [3, 30, 31, 53, 54]: e.g., masked language modeling (MLM), image-text contrastive (ITC), and image-text matching (ITM) losses. Despite their promising results, one of the pressing challenges they face is the presence of noisy captions in image-text pairs that often provide incomplete or even incorrect descriptions. Several recent works have focused on addressing such issue of noisy correspondence in image-text pairs [10, 16, 17, 19, 31, 43]. * Equal contribution † Corresponding author 1" 2312.06116v1,"Stellar: Systematic Evaluation of Human-Centric Personalized Text-to-Image Methods Panos Achlioptas * Alexandros Benetatos * Iordanis Fostiropoulos * Dimitris Skourtis * Steel Perlot Management LLC Los Angeles, California, USA Abstract rise to an unprecedented explosion of novel solutions for many long-standing problems at the intersection of computer vision and natural language [8, 80]. Applications ranging from creating de novo fictional images [53, 55, 58] to editing them via text [11, 83], or similarly manipulating higher-dimensional visual representations (e.g., video [22, 42, 67, 74] or 3D objects [6, 52, 60, 82]); have vastly pushed the envelope for computer-aided creativity and further democratized this field given the accessibility of their linguistic interfaces. In this work, we systematically study the problem of personalized text-to-image generation, where the output image is expected to portray information about specific human subjects. E.g., generating images of oneself appearing at imaginative places, interacting with various items, or engaging in fictional activities. To this end, we focus on textto-image systems that input a single image of an individual to ground the generation process along with text describing the desired visual context. Our first contribution is to fill the literature gap by curating high-quality, appropriate data for this task. Namely, we introduce a standardized dataset (Stellar) that contains personalized prompts coupled with images of individuals that is an order of magnitude larger than existing relevant datasets and where rich semantic ground-truth annotations are readily available. Having established Stellar to promote cross-systems finegrained comparisons further, we introduce a rigorous ensemble of specialized metrics that highlight and disentangle fundamental properties such systems should obey. Besides being intuitive, our new metrics correlate significantly more strongly with human judgment than currently used metrics on this task. Last but not least, drawing inspiration from the recent works of ELITE [73] and SDXL [49], we derive a simple yet efficient, personalized text-to-image baseline that does not require test-time fine-tuning for each subject and which sets quantitatively and in human trials a new SoTA. For more information, please visit our project’s website: https://stellar-gen-ai.github.io. Among the plethora of text-to-modality methods, we focus in this work on text-to-image (T2I) models that can personalize their output by considering input text that specifies imaginative renditions of specific human individuals. Such personalized models have recently started to emerge [19, 57, 66, 73] as a natural and powerful extension of de novo image generators [49, 56], inspiring radically novel applications. These applications include personalized story-telling via character animation of specific individuals, aiding people to attend otherwise inaccessible real-world events virtually, or simply lifting the burden to capture photographs physically [17, 21, 68]. Despite these encouraging prospects, two noticeable limitations currently hinder future developments in this field. First, there is a need for carefully curated, standardized data, explicitly targeting personalized T2I. Current efforts make it easy to find vast quantities of objective captioning data for images (e.g., [33, 62]); however, curating images of individuals performing fictional actions accompanied by textual descriptions is practically impossible given the open-ended and imaginary nature of this task [57]. Even if one is to lift the constraint of coupling the descriptions of images to specific individuals [32, 57, 81], there is yet no common ground for building large-scale collections of textual prompts in natural language that can be deemed applicable for generating i) interesting fictional depictions of humans, being ii) diverse, and iii), carrying semantically meaningful meta-annotations that can be used to evaluate the output quality of different personalized T2I approaches. 1. Introduction There is no doubt that the recent progress in terms of developing and publicly sharing multimodal deep learning models trained with internet scale data, comprised of billions of textual tokens and images (e.g., [49, 51, 56]), have given * All authors made very significant and distinct contributions. Email Correspondence: stellar@steelperlot.com 1" 2312.06117v1,"M3SOT: Multi-frame, Multi-field, Multi-space 3D Single Object Tracking Jiaming Liu 1 , Yue Wu 1 * , Maoguo Gong 1 , Qiguang Miao 1 , Wenping Ma 1 , Can Qin 2 2 Xidian University, China Northeastern University, USA ljm@stu.xidian.edu.cn, {ywu, qgmiao}@xidian.edu.cn, gong@ieee.org, wpma@mail.xidian.edu.cn, qin.ca@northeastern.edu 1 Abstract 3D Single Object Tracking (SOT) stands a forefront task of computer vision, proving essential for applications like autonomous driving. Sparse and occluded data in scene point clouds introduce variations in the appearance of tracked objects, adding complexity to the task. In this research, we unveil M3SOT, a novel 3D SOT framework, which synergizes multiple input frames (template sets), multiple receptive fields (continuous contexts), and multiple solution spaces (distinct tasks) in ONE model. Remarkably, M3SOT pioneers in modeling temporality, contexts, and tasks directly from point clouds, revisiting a perspective on the key factors influencing SOT. To this end, we design a transformer-based network centered on point cloud targets in the search area, aggregating diverse contextual representations and propagating target cues by employing historical frames. As M3SOT spans varied processing perspectives, we’ve streamlined the network—trimming its depth and optimizing its structure—to ensure a lightweight and efficient deployment for SOT applications. We posit that, backed by practical construction, M3SOT sidesteps the need for complex frameworks and auxiliary components to deliver sterling results. Extensive experiments on benchmarks such as KITTI, nuScenes, and Waymo Open Dataset demonstrate that M3SOT achieves state-of-theart performance at 38 FPS. Our code and models are available at https://github.com/ywu0912/TeamCode.git. Introduction Visual object tracking is a basic task in computer vision, while single object tracking (SOT) is tracking a specific object in sequential data, considering only its initial pose. With the development of 3D sensors such as LiDAR, the acquisition of 3D data and the progress of 3D tasks become more active. In particular, great progress has been made in the 3D field based on point clouds (Wu et al. 2022, 2023b,d; Huang, Mei, and Zhang 2023; Liu et al. 2023c). Yet, SOT remains challenging due to the variation in object appearance and the sparseness caused by sensors with inherent limitations. Existing 3D SOT methods can be summarized into two main paradigms, i.e., Siamese network and spatio-temporal modeling. As a pioneering work, SC3D (Giancola, Zarzar, and Ghanem 2019) crops the target from the (t−1)-th frame * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Integration 𝑷 𝒕−𝟏 𝑷 𝒕−𝒌 Prediction Resolution 𝑷 𝒔 𝑷 𝟎 …. …. Input Frames Receptive Fields Mask Center Solution Spaces Figure 1: Illustration of the proposed M3SOT. M3SOT collects multi-frame point clouds for propagating target cues, and extracts spatio-temporal context information through multiple receptive fields. We set additional mask and center prediction tasks for the backbone at intermediate stages. and compares the target template with a large number of potential candidates in the t-th frame. P2B (Qi et al. 2020) optimizes this process by taking the cropped template and the search area as inputs, and propagating the cues to the search area by training again to predict the current bounding box. This idea has broad implications for subsequent research. Yet, the paradigm rooted in Siamese networks overlooks the background information from two sequential frames. Moreover, it fails when the target is potentially absent in the current frame. To address these issues, M2-Track (Zheng et al. 2022) presents a motion-centric approach, processing two point cloud frames as input and directly segmenting the target points from their respective backgrounds, eliminating the need for cropping. TAT (Lan, Jiang, and Xie 2022) ensures dependable target-specific feature propagation. It achieves this by sampling high-quality target templates derived from historical frames, applying template data across various timelines. However, these strategies predominantly operate on cropped subregions, which are fragmentary of essential contextual information in localization. Echoing the sentiments of CXTrack (Xu et al. 2023a), leveraging the contextual information surrounding the target for predicting its current bounding box is indeed an applicable move. Hence, a logical proposition might be: by integrating multi-frame input, motion modeling, and context extraction, would SOT performance enhance? We refute this seemingly straightforward yet inelegant hypothesis. Through experimentation, we find that this approach places excessive strain on the network, potentially diminishing performance. Additionally, we re-examine the variables influencing SOT, unearthing three pivotal insights that bolster tracking." 2312.06121v1,"Using Language Models for Software Tool Configuration Jai Kannan Applied Artificial Intelligence Institute Deakin University Burwood, Australia jai.kannan@deakin.edu.au Abstract—In software engineering, the meticulous configuration of software tools is crucial in ensuring optimal performance within intricate systems. However, the complexity inherent in selecting optimal configurations is exacerbated by the highdimensional search spaces presented in modern applications. Conventional trial-and-error or intuition-driven methods are both inefficient and error-prone, impeding scalability and reproducibility. In this study, we embark on an exploration of leveraging Large-Language Models (LLMs) to streamline the software configuration process. We identify that the task of hyperparameter configuration for machine learning components within intelligent applications is particularly challenging due to the extensive search space and performance-critical nature. Existing methods, including Bayesian optimization, have limitations regarding initial setup, computational cost, and convergence efficiency. Our work presents a novel approach that employs LLMs, such as Chat-GPT, to identify starting conditions and narrow down the search space, improving configuration efficiency. We conducted a series of experiments to investigate the variability of LLM-generated responses, uncovering intriguing findings such as potential response caching and consistent behavior based on domain-specific keywords. Furthermore, our results from hyperparameter optimization experiments reveal the potential of LLMs in expediting initialization processes and optimizing configurations. While our initial insights are promising, they also indicate the need for further in-depth investigations and experiments in this domain. Index Terms—Language models, Software tool configuration I. I NTRODUCTION In software engineering, the task of configuring software tools is critical in ensuring optimal performance and functionality of the systems they underpin [1, 2]. The configuration process involves the selection and adjustment of parameters and options specific to each usecase [3, 4]. For example, Think about setting up a tool that checks Python code in a smart app combining software engineering and machine learning. To make it work well, you need to configure it properly to handle both types of code, so it gives better results and smarter insights [5]. However, selecting an optimal configuration is complex which is resource and compute-intensive, requiring several iterations. This complexity is primarily due to the high-dimensional search space [2, 6]. Fully exploring all options is unrealistic [7, 8], leading engineers to often resort to trial and error or intuition [9, 10]. However, this method is inefficient and errorprone as it heavily relies on human judgement [9, 11] and impairs the scalability and reproducibility of the process[12, 13, 14]. Furthermore, the high dimensionality and complexity introduces a challenge where a minor oversight has significant implications on software performance. The problem of high-dimensional search space for configurations increases as intelligent applications with learningenabled components have become ubiquitous [15]. Learningenabled components (LECs) are machine learning components whose behaviour is derived from training data [16] which is integrated into larger systems containing traditional computational entities such as web services and operator interfaces. Despite their widespread use LEC’s fail to perform as expected [17, 15, 18] which reduces the performance and utility of the system. For instance, a change in a system’s operating environment can introduce drifts in the input data for a machine learning (ML) component making them underperform [17]. The optimal performance of an ML component depends on how its hyperparameters are configured during the training process [19, 20, 21]. This issue becomes particularly pronounced when dealing with extensive search spaces. Suboptimal parameter settings can lead to noticeable degradation in performance. To address this challenge, a common strategy involves employing Bayesian optimization to systematically explore the search space and identify suitable hyperparameters for retraining or fine-tuning ML components when drifts occur [16]. The fundamental concept behind Bayesian optimization is to utilize a Gaussian process [22] to model the intricate relationship between hyperparameter configurations and performance metrics, like validation loss. This model-driven process guides the identification of configurations within the specified search space. However, this approach comes with several limitations. First, i) the process necessitates configuring the starting point or initial conditions for the search space before implementing Bayesian optimization. Typically, this is achieved through intuition or referencing academic literature, often leading to sub-optimal setups. Secondly, ii) if the search space is expansive, the Bayesian optimization process becomes computationally demanding. Thirdly, iii) given a limited budget, the approach may only explore a small fraction of the vast search space, struggling to converge to the optimal configurations, ultimately resulting in resource" 2312.06144v1,"IN SUBMISSION 1 Long-Term Carbon-Efficient Planning for Geographically Shiftable Resources: A Monte Carlo Tree Search Approach Xuan He, Danny H.K. Tsang and Yize Chen Abstract—Global climate challenge is demanding urgent actions for decarbonization, while electric power systems take the major roles in clean energy transition. Due to the existence of spatially and temporally dispersed renewable energy resources and the uneven distribution of carbon emission intensity throughout the grid, it is worth investigating future load planning and demand management to offset those generations with higher carbon emission rates. Such techniques include inter-region utilization of geographically shiftable resources and stochastic renewable energy. For instance, Data center is considered to be a major carbon emission producer in the future due to increasing information load, while it holds the capability of geographical load balancing. In this paper, we propose a novel planning and operation model minimizing the systemlevel carbon emissions via sitting and operating geographically shiftable resources. This model decides the optimal locations for shiftable resources expansion along with power dispatch schedule. To accommodate future system operation patterns and a wide range of operating conditions, we incorporate 20-year fine-grained load and renewables scenarios for grid simulations of realistic sizes (e.g., up to 1888 buses). To tackle the computational challenges coming from the combinatorial nature of such largescale planning problem, we develop a customized Monte Carlo Tree Search (MCTS) method, which can find reasonable solutions satisfying solution time limits. Besides, MCTS enables flexible time window settings and offline solution adjustments. Extensive simulations validate that our planning model can reduce more than 10% carbon emission across all setups. Compared to off-the-shelf optimization solvers such as Gurobi, our method achieves up to 8.1X acceleration while the solution gaps are less than 1.5% in large-scale cases. Moreover, our method can find reasonable solutions within different time windows, unlike other benchmarked solvers requiring considerable time or failing to output feasible solutions. Index Terms—Carbon emission, load shifting, mixed integer problem, Monte Carlo tree search I. I NTRODUCTION Lobal carbon emissions continue to increase, while limited time is left for meeting our global climate targets [1]. As one of the biggest contributor to greenhouse gas emissions, electric power systems appeal for a carbonfree and sustainable transition. This motivates various ongoing and future projects to take carbon emission reduction as a top priority [2]–[4]. For instance, in the CAISO grid region, by shifting the controllable demands of data centers, up to 62% of the yearly curtailment can be absorbed and up to 239 KtCO2 emissions can be reduced [4]. Indeed, various G The authors are with the Information Hub, Hong Kong University of Science and Technology (Guangzhou), email: xhe085@connect.hkust-gz.edu.cn, eetsang@ust.hk, yizechen@ust.hk. appliances, devices and electricity demand have shown the potential of helping reduce carbon emissions associated with electric power, such as data center demand [5], [6], electric vehicle (EV) [7], and HVAC systems [8]. Among the efforts on reducing power system carbon emissions, existing works investigate the operational strategies to reduce carbon emissions. Such schemes are practical, as grid emission intensity is not uniform across the network, while load such as data center are geographically shiftable. Optimization and data-driven techniques such as linear programming (LP) [9], mixed integer programming (MIP) [10], reinforcement learning [11] are widely adopted. In the operation stage, the intra-day schedule strategies for various energy participants such as electric vehicles [11] and energy storage [12], [13] are investigates. In the planning stage, strategies are developed to address (a) power generation expansion plans [10], [14]–[16]; (b) resource sizing and allocation [9], [17], [18]; (c) operation scheduling [3], [5], [19]; and (d) interplay between electricity, cooling, and heating loop [11]. Recently, the economy-wide decarbonization targets further require coordinated investment planning [14], [19]–[22]. A classic instance is the transmission expansion planning (TEP) problem [15] associated with investment restrictions, network flow equations, network capacity limits, generator limits, and device models. The TEP problem minimizes both capital expenditures (CAPEX) for transmission line investments and year-long operational expenses (OPEX), which can be tackled by a two-stage decision procedure for (a). here-and-now variables such as sizing-related decisions; and (b). wait-and-see operational variables including renewable curtailment and load shedding. Similarly, coordinated investment planning problems aiming at mitigating generation-induced anthropogenic greenhouse gas emissions can be divided into two stages, and we refer to Table I for related works involving a variety of temporal- and spatial-flexible resources. However, such planning problems for carbon emission reduction are prohibitively expensive to solve due to large network sizes, various integer variables, complex network and device-level constraints, and long planning horizons. These challenges encourage us to investigate how to design an efficient solution strategies to reduce long-term system-level carbon emissions, which allow the planner to inspect possible solutions and identify the most promising ones. In this paper, we focus on load-side planning and management to achieve the grid-level carbon reduction goal. Shiftable loads such as data center demands and EV fleet charging offer advantages of flexible scheduling in both time" 2312.06165v1,"RecJPQ: Training Large-Catalogue Sequential Recommenders Aleksandr V. Petrov Craig Macdonald University of Glasgow United Kingdom a.petrov.1@research.gla.ac.uk University of Glasgow United Kingdom craig.macdonald@glasgow.ac.uk ABSTRACT Sequential recommender systems rank items based on the likelihood of their next appearance in user-item interactions. Current models such as BERT4Rec and SASRec generate sequence embeddings and compute scores for catalogue items, but the increasing catalogue size makes training these models costly. The Joint Product Quantisation (JPQ) method, originally proposed for passage retrieval, markedly reduces the size of the retrieval index with minimal effect on model effectiveness by replacing passage embeddings with a limited number of shared centroid embeddings. This paper introduces RecJPQ, a novel adaptation of JPQ for sequential recommendations. We apply RecJPQ to SASRec, BERT4Rec, and GRU4rec models on three large-scale sequential datasets. Our results showed that RecJPQ can notably reduce model size (e.g., 48× reduction for the Gowalla dataset with no effectiveness degradation). RecJPQ can also improve model performance through a regularisation effect (e.g. +0.96% NDCG@10 improvement on the Booking.com dataset). ACM Reference Format: Aleksandr V. Petrov and Craig Macdonald. 2024. RecJPQ: Training Large- Catalogue Sequential Recommenders. In WSDM ’24), March 4–8, 2024, Mérida, Mexico. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/nnnnnnn. nnnnnnn 1 INTRODUCTION Sequential recommender systems are a class of recommendation models that use the sequence of user-item interactions to predict the next item. Most of the state-of-the-art models for sequential recommendation are based on deep neural networks, for example, recurrent neural networks [17, 18], convolutional neural networks [50, 58], and most recently, transformers [25, 37, 38, 49]. All these models use learnable item embeddings as an essential component in their model architectures. Figure 1 illustrates item embeddings in a typical neural sequential recommendation model. As the figure shows, item embeddings usually have two roles in the model architecture: (i) to convert the sequence of input item ids to a sequence of item representation vectors and (ii) to convert the sequence embedding produced by the model into the distribution of predicted item scores. In both cases, a recommender system that works with an item set 𝐼 requires an embedding tensor with |𝐼 | · 𝑑 parameters, where 𝑑 is the size of each embedding. When a recommender has many items in the catalogue, various challenges arise in training the neural recommendation model. Firstly, the item embedding tensor may contain more model parameters than the rest of the model. For example, there are more than 800 million videos on YouTube 1 . If the model uses 128-dimensional 1 https://earthweb.com/how-many-videos-are-on-youtube/ WSDM ’24, March 4–8, 2024, Mérida, Mexico © 2024 Association for Computing Machinery. This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in WSDM ’24), March 4–8, 2024, Mérida, Mexico, https://doi.org/10.1145/nnnnnnn.nnnnnnn. embeddings, the whole item embeddings tensor will have more than 100 billion parameters, which is comparable with the number of parameters of the largest available machine learning models [2], even without accounting for the parameters of the model’s intermediate layers. This is a problem specific to recommender systems. However, in the related area of dense passage retrieval [26, 27], passage embeddings are obtained by encoding passage text using a pre-trained language model. In contrast, item side information, such as text, is not necessarily available in a typical recommender systems scenario; therefore, item embeddings should be directly learned from the interactions. Secondly, a large number of such trainable parameters also makes the model prone to overfitting. A third challenge caused by the large catalogue is the size of the output scores tensor (rightmost tensor in Figure 1): for example, in BERT4Rec, it contains a score for each item for every position, for every sequence in the training batch, so training BERT4Rec with more than 1 million items in the catalogue may be prohibitively expensive [37]. This problem is typically solved using negative sampling, whereby instead of computing the full output tensor, the model computes scores for a small proportion of negative items not interacted by the user (e.g. SASRec [25] uses one negative per positive). However, negative sampling comes with its own challenges (for example, it usually requires informative negative mining [42]). Nevertheless, negative sampling is an orthogonal research direction, and in this paper, we use SASRec in cases where negative sampling is necessary. We refer to our recent publication [39], where we analysed negative sampling problem in details. To summarise the challenges, a large embedding tensor increases the model size, slows model training down, and can necessitate further modelling tricks such as negative sampling, which bring their own challenges. There are some existing methods [24, 52, 56] for item embedding compression (we discuss these methods in Section 2). However, most of these methods compress the embedding tensor after the model is fully trained (including training the full embedding tensor). However, as argued above, training may be prohibitively expensive in large-scale recommender systems. Hence, this paper addresses the problem of a large item embedding tensor in sequential recommendation models at the training stage. To mitigate this problem, we propose a novel RecJPQ technique inspired by the success of a recent Joint Product Quantisation (JPQ) work [59] for text retrieval. JPQ itself is based on Product Quantisation (PQ) [22], a popular method of compressing vectors by splitting them into sub-embeddings and encoding them using a discrete centroids codebook (the codebook maps from item ids to the associated centroids; see Section 3.1 for the details). The main innovation of JPQ compared to the standard PQ method is that it learns the centroids embeddings as part of the overall model training process. In contrast, PQ requires training the model first and only then compressing the embeddings (frequently, this second step uses external tools, such as FAISS [23]). This means that JPQ does not need to keep the embedding matrix in memory during model training. We" 2312.06168v1,"1 Motion Planning for Multiple Mobile Manipulator System in Complex Flipping Manipulation Wenhang Liu, Kun Song, Meng Ren, Jiawei Hu, Michael Yu Wang, Fellow, IEEE, and Zhenhua Xiong, Member, IEEE Abstract—Multiple robot systems are favored for object manipulation and transportation, especially for large objects. However, in more complex manipulation such as flipping, these systems encounter a new challenge, configuration disconnectivity of manipulators. Grasping objects by manipulators will impose closedchain constraints on the system, which in turn limits the feasible motions of manipulators and further compromises the configuration connectivity. Multiple mobile manipulator systems show much more flexibility in object manipulation with the mobility of the mobile platform and have the potential to address the above problem. In this paper, a novel planning framework is proposed for complex flipping manipulation by incorporating platform motions and regrasping. Firstly, two types of trajectories, mobile manipulator planning and regrasping planning, are classified and can be assigned different priorities for different tasks. Secondly, corresponding planning methods are designed for each type of trajectory. Specifically, in mobile manipulator planning, the configuration of the platform is determined through optimization to ensure connectivity when the manipulator approaches configuration boundaries. In regrasping planning, closed-chain constraints are temporarily disregarded and the manipulation capabilities are prioritized to facilitate subsequent planning. Finally, the structure of the overall planning framework is provided. Experimental results demonstrate that the proposed planner efficiently plans the motions of the system to accomplish flipping manipulation. Additionally, a comprehensive experiment emphasizes the significance of our planner in extending the capabilities of multiple mobile manipulator systems in complex tasks. Index Terms—Multiple mobile manipulator system, complex manipulation, closed-chain constraint, configuration disconnectivity. I. I NTRODUCTION Compared to single robots, Multiple Robot Systems (MRS) are well-suited to handle intricate tasks since they exhibit enhanced robustness, stability, and efficiency [1]. Hence, the versatility of MRS has gained increasing attention and become a focal point of interest in various applications, such as assembly [2] [3], printing [4], exploration [5] [6], and transporting [7] [8]. Among different forms of MRS, Multiple This work was supported in part by the National Natural Science Foundation of China (U1813224) and MoE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University, China. (Corresponding author: Zhenhua Xiong.) Wenhang Liu, Kun Song, Meng Ren, Jiawei Hu, and Zhenhua Xiong are with the School of Mechanical Engineering, State Key Laboratory of Mechanical System and Vibration, Shanghai Jiao Tong University, Shanghai, China (email: liuwenhang@sjtu.edu.cn; coldtea@sjtu.edu.cn; meng ren@sjtu.edu.cn; hu jiawei@sjtu.edu.cn; mexiong@sjtu.edu.cn). Michael Yu Wang is with the Department of Mechanical and Aerospace Engineering, Monash University, Victoria 3800, Australia (e-mail: Michael.Y.Wang@monash.edu). Mobile Manipulator Systems (MMMS) stand out for their integration of mobility and manipulation capabilities, making them particularly attractive for industrial automation [9] [?]. In automated production, MMMS can accomplish complex processes by collaborative manipulation, for example, they are applied to manipulate industrial components in [3] [10]. Sometimes, when it comes to large objects or complex manipulations, MMMS are even irreplaceable. Although possessing exceptional performance in object manipulation, MMMS also face several challenges. One of the challenges arises from the closed-chain constraint of manipulators [11] [12]. The grasping of objects by manipulators introduces closed-chain or formation constraints, consequently limiting the feasible motions of manipulators, and further compromising the configuration connectivity. These constraints pose a challenge to motion planning for MMMS. There are generally two types of methods to deal with closed-chain constraints. One type involves considering the configuration of each robot individually. In [13], probabilistic roadmaps were utilized to efficiently determine feasible configurations for robots. Similarly, dynamic rapidly-exploring random tree was applied in [14]. In such scenarios, task or restricted space regions of the end-effector are useful for the manipulators to plan within the constraints [15] [16]. In [17], the global planner first explored the low-dimensional decomposed task space regions of each robot, and then the local planner computed paths in the high-dimensional constrained configuration space. Another type is to consider the overall configuration of the system. In [18], three modes were predefined according to the objects and closed-chain constraints, based on which, a decision-making method was proposed to facilitate the selection of object transportation and movement direction. In [19], the closed-chain constraints were transformed into the problem of finding the optimal formation for the whole system. Planning the overall configuration can conveniently facilitate the integration with other tasks, such as obstacle avoidance. The aforementioned works enable MMMS to plan feasible configurations under closed-chain constraints and successfully manipulate objects, as demonstrated through experiments or simulations [13] [17]–[19]. However, it is worth noting that these works primarily address tasks related to object transportation. In this case, objects require large translational movements mostly relying on the mobility of mobile platforms, and the manipulators only perform minimal coordinated motions if necessary. Therefore, these works may not fully consider the configuration disconnectivity problem under closed-chain" 2312.06183v1,"Consistent combination of truncated-unity functional renormalization group and mean-field theory Song-Jin O ∗ Institute of Theoretical Physics, Faculty of Physics, Kim Il Sung University, Ryongnam-Dong, Taesong District, Pyongyang, Democratic People’s Republic of Korea (Dated: December 12, 2023) We propose a novel scheme for combining efficiently the truncated-unity functional renormalization group (TUFRG) and the mean-field theory. It follows a method of Wang, Eberlein and Metzner that uses only the two-particle irreducible part of the vertex as an input for the mean-field treatment. In the TUFRG, the neglect of fluctuation effects from other channels in the symmetrybroken regime is represented by applying the random phase approximation (RPA) in each individual channel, below the divergence scale. Then the Bethe-Salpeter equation for the four-point vertex is translated into the RPA matrix equations for the bosonic propagators that relates the singular and irreducible singular modes of the propagators. The universal symmetries for the irreducible singular modes are obtained from the antisymmetry of Grassmann variables. The mean-field equation based on these modes is derived by the saddle-point approximation in the framework of the path-integral formalism. By using our scheme, the power of the TUFRG, as an unbiased tool for identifying the many-body instabilities, could be elevated to a quantitative level, and its application would be extended to a quantitative analysis of the coexisting orders. As an illustration we employ this scheme to study the coexistence phase of the chiral superconductivity and the chiral spin-density wave, predicted near van Hove filling of the honeycomb lattice. I. INTRODUCTION Intermediately correlated electron systems exhibit a plethora of fascinating properties and their theoretical analysis continue to be one of the important tasks in condensed matter physics. The systems can be described within both itinerant and strong coupling approaches. Among the itinerant approaches, the functional renormalization group (FRG) has proven to be an effective and reliable tool to study Fermi-surface instabilities in an unbiased way [1–3]. It treats the pairing, spin and charge channels on equal footing, and thus enables to investigate the fluctuation-driven instabilities and competing or coexisting orders [4]. The FRG method has been successfully applied to capture the d-wave pairing instability in the two-dimensional (2D) repulsive Hubbard model [5–8] and the extended s-wave superconductivity (SC) in Fe-based superconductors [9–11]. In these FRG studies the evolution of the four-point vertex was approximated by a one-loop truncation, where the six-point and the higher-order vertices are completely neglected. Furthermore, in many FRG calculations one applies additional approximations of discarding the frequency dependence of and the self-energy feedback to the four-point vertex. They are justified in weak coupling regime by the fact that the frequency dependence appears, in its power counting, to be irrelevant [3, 12], and the higher-order vertices and the self-energy correction can only make contributions of third order in the bare interaction [1, 2]. We will also use these approximations in the present work. ∗ sj.o@ryongnamsan.edu.kp In the FRG method, Fermi-surface instabilities are signaled by divergences of the four-point vertex at a divergence energy scale Ω D . The FRG flow of the four-point vertex should be stopped at this scale, because when the vertex becomes very large, the one-loop approximation is not valid any more. To complete the calculation and perform a quantitative analysis of resulting ordered phases, one has to continue the flow below the divergence scale Ω D , allowing the emergence of the symmetrybroken phase. This task can be accomplished by using either of two approaches, within a purely fermionic or a partially bosonized formalism. In the first approach [13], one inserts an infinitesimal symmetry-breaking component into the initial action and tracks the FRG flow of purely fermionic vertex functions. It has been applied to obtain the exact solutions of the mean-field (MF) models for superconductivity [13, 14], and to describe a formation of s-wave superfluid phase in the 2D attracting Hubbard model [15, 16]. That scheme has also been used to analyze a d-wave superconducting (d-wave SC) state in the 2D repulsive Hubbard model [8] and an antiferromagnetic phase in a two-pocket model for the iron pnictides [17]. In this approach, since the vertex function is not charge invariant anymore, the FRG flow equations become very complicated. Particularly, in complex systems with several potential instabilities, introducing various kind of seeds for those into the flow is a formidable task. In the second approach [18], the symmetry-broken phases in interacting fermion systems are treated by introducing bosonic order-parameter fields via Hubbard-Stratonovich transformation and solving partially bosonized FRG flow equations. It has been applied to describe the antiferromagnetic phase [18] and the d-" 2312.06197v1,"Music-PAW: Learning Music Representations via Hierarchical Part-whole Interaction and Contrast Dong Yao Shengyu Zhang Zhou Zhao Zhejiang Unversity, China yaodongai@zju.edu.cn Zhejiang Unversity, China sy_zhang@zju.edu.cn Zhejiang Unversity, China zhaozhou@zju.edu.cn Jieming Zhu Liqun Deng Wenqiao Zhang Huawei Noah’s Ark Lab, China jiemingzhu@ieee.org Huawei Noah’s Ark Lab, China dengliqun.deng@huawei.com Zhejiang Unversity, China wenqiaozhang@zju.edu.cn Zhenhua Dong Ruiming Tang Xin Jiang Huawei Noah’s Ark Lab, China dongzhenhua@huawei.com Huawei Noah’s Ark Lab, China tangruiming@huawei.com Huawei Noah’s Ark Lab, China Jiang.Xin@huawei.com ABSTRACT KEYWORDS The excellent performance of recent self-supervised learning methods on various downstream tasks has attracted great attention from academia and industry. Some recent research efforts have been devoted to self-supervised music representation learning. Nevertheless, most of them learn to represent equally-sized music clips in the waveform or a spectrogram. Despite being effective in some tasks, learning music representations in such a manner largely neglect the inherent part-whole hierarchies of music. Due to the hierarchical nature of the auditory cortex [25], understanding the bottom-up structure of music, i.e., how different parts constitute the whole at different levels, is essential for music understanding and representation learning. This work pursues hierarchical music representation learning and introduces the Music-PAW framework, which enables feature interactions of cropped music clips with part-whole hierarchies. From a technical perspective, we propose a transformer-based part-whole interaction module to progressively reason the structural relationships between part-whole music clips at adjacent levels. Besides, to create a multi-hierarchy representation space, we devise a hierarchical contrastive learning objective to align part-whole music representations in adjacent hierarchies. The merits of audio representation learning from part-whole hierarchies have been validated on various downstream tasks, including music classification (single-label and multi-label), cover song identification and acoustic scene classification. music representation, pre-training, part-whole hierarchy CCS CONCEPTS • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Dong Yao, Shengyu Zhang, Zhou Zhao, Jieming Zhu, Liqun Deng, Wenqiao Zhang, Zhenhua Dong, Ruiming Tang, and Xin Jiang. 2018. Music-PAW: Learning Music Representations via Hierarchical Part-whole Interaction and Contrast. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 11 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The availability of massive annotated data has contributed to the tremendous success of deep neural networks in various research fields. However, such labeled data are scarce and often difficult to acquire in many cases. Recent advances in self-supervised learning methods, such as transformer-based [24, 40, 57, 62, 68, 73] and contrastive learning methods [7, 10, 14, 22, 28, 33, 56, 72], have achieved excellent performance in learning generic representations from unlabeled data, transferable to various language and vision downstream tasks. In the music domain, some early attempts explore transferring the success of self-supervised learning to music representation learning. For instance, CLMR [53] and COLA [49] investigate whether a mature visual contrastive learning method, SimCLR [10], can benefit music self-supervised learning. Inspired by another successful visual representation learning framework BYOL [22], BYOL-A [45] directly pulls the representations of equally-sized clips from the same audio closer in the representation space. Despite significant progress made by existing work, how to exploit the inherent part-whole structure of musical audio in representation learning remains an open research problem. A part-whole hierarchy refers to the structure of how different part music clips constitute a whole music clip. For example, when a people listen to a piece of music, the music clips containing prelude, verse, and chorus will affect his cognization and understanding of the whole music audio. Existing work [2, 45, 49, 53, 60] crops audios into fixed-size clips, and learn the semantic correlations of audios at the same hierarchy, largely neglecting the part-whole structures for audio understanding." 2312.06202v1,"1 Transforms for Multiplicative and Fractional Programming with Broad Applications in Edge Computing and Communication Networks Yitong Wang, Chang Liu, Jun Zhao Abstract—Multiplicative Programming (MP) pertains to a spectrum of optimization problems that involve product term(s). As computational paradigms of communication systems continue to evolve, particularly concerning the offloading strategies of computationally intensive tasks simultaneously to centralized or decentralized servers, designing or optimizing effective communication systems with MP techniques becomes increasingly indispensable. Similarly, Fractional Programming (FP) is another significant branch in the optimization domain, addressing various essential scenarios in communication. For instance, in minimization optimization problems, transmission power and processing delay of communication systems are considered critical metrics. In a very recent JSAC paper by Zhao et al. [2], an innovative transform (Zhao’s Optimization Transform) was proposed for solving the minimization of MP and FP problems. Nevertheless, the resolution of optimization problems in communication systems encounters several limitations when adopting Zhao’s optimization transform, especially in MP problems. Primarily, objective functions proposed in these optimization problems typically involve sum-of-products terms and the optimization variables are always discrete leading to NP-hard problems. Furthermore, multiple functions mapping to the non-negative domain in these scenarios can result in auxiliary variables being zero values, while the same situation is avoidable in FP problems due to the presence of these functions in the denominator. In this paper, we introduce an updated transform, building on the foundations of Zhao’s original method, designed to effectively overcome these challenges by reformulating the original problem into a series of convex or concave problems. This introduced problem reformulation provides a superior iteration algorithm with demonstrable convergence to a stationary point. Additionally, we conduct an in-depth analysis of application scenarios for the proposed updated transform and provide comparative evaluations with traditional MP methodologies. Index Terms—Non-convex optimization, multiplicative programming, fractional programming, sum-of-products, edge computing, communication networks. I. O VERVIEW F RACTIONAL programming (FP), which solves the optimization problem consisting of ratio term(s), is a critical tool in the development of current communication systems and the enhancement of communication application performance. In a very recent paper accepted to JSAC, Zhao et al. [2] The authors are all with the School of Computer Science and Engineering, Nanyang Technological University (NTU), Singapore. (Contact E-mail: JunZHAO@ntu.edu.sg). A 6-page short version containing partial results is under review for the 2024 IEEE International Conference on Communication (ICC) in [1]. IEEE Communications Society (Com- Soc) writes “It is possible to submit the journal and conference version at the same time” at https://www.comsoc.org/publications/journals/ ieee-transactions-wireless-communications/conference-vs-journal introduced an innovative transformation technique, referred to as Zhao’s Transform. This method is tailored to tackle the minimization of FP problems, characterized by sum-of-ratios that are commonly encountered in the design of resource allocation strategies within wireless communication networks. The previously proposed Zhao’s optimization transform distinguishes itself by demonstrating superior performance when compared to previous optimization techniques, such as Dinkelbach’s Method [3]. This enhancement in performance underscores its potential effectiveness and applicability in optimizing complex communication network scenarios. Zhao’s Transform has great potential not only in FP problems but is equally effective in multiplicative programming (MP) problems [4]. MP in wireless networks is a complex optimization technique used to enhance various aspects of system performance. This approach primarily involves solving nonlinear problems where the objective function is a product of several variables or functions, such as signal strength, bandwidth, or power levels. These optimization problems are crucial in areas like resource allocation [5], where it is formulated to optimize the distribution of network resources for maximum utility [6], and in physical layer security, for relaying selection strategy to improve system robustness [7]. The non-linear and non-convex properties of these problems make them challenging, necessitating advanced and heuristics algorithms, including gradient-based methods [8], alternative optimization (AO) approach [9], and genetic algorithms [10], to find optimal solutions. However, these methods still have limitations in terms of the computation complexity, convergence rate, and sensitivity of parameter modification. In this paper, we extend the potential of Zhao’s Transform in the MP problems with multiple products to prove the effectiveness of this proposed transform. Unique obstacles, which would not be encountered in FP problems, are met in applying the transform to MP problems. First, there are some common scenarios related to MP problems having the special case that B(x) = 0, where this special case can be unconsciously avoided in formulated FP problems as B(x) participating in the algorithm as denominators. However, this case cannot be disregarded in the multiplicative case. Therefore, the first obstacle is introduced that auxiliary variables derived from B(x) will equal zero, which conflicts with the iteration algorithms where auxiliary variables will be used as denominators. Furthermore, there are some other cases relating to discrete or mixed discrete-continuous optimization variables that result in the optimization problems as NP-hard" 2312.06227v1,"Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers’ Coding Practices with Insecure Suggestions from Poisoned AI Models Sanghak Oh 1 ∗ , Kiho Lee 1 ∗ , Seonhye Park 1 , Doowon Kim 2 , Hyoungshick Kim 1 1 Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea 2 Department of Electrical Engineering and Computer Science, University of Tennessee, USA 1 {sanghak, kiho, qkrtjsgp08, hyoung}@skku.edu, 2 doowon@utk.edu Abstract—AI-powered coding assistant tools (e.g., ChatGPT, Copilot, and IntelliCode) have revolutionized the software engineering ecosystem. However, prior work has demonstrated that these tools are vulnerable to poisoning attacks. In a poisoning attack, an attacker intentionally injects maliciously crafted insecure code snippets into training datasets to manipulate these tools. The poisoned tools can suggest insecure code to developers, resulting in vulnerabilities in their products that attackers can exploit. However, it is still little understood whether such poisoning attacks against the tools would be practical in real-world settings and how developers address the poisoning attacks during software development. To understand the real-world impact of poisoning attacks on developers who rely on AI-powered coding assistants, we conducted two user studies: an online survey and an in-lab study. The online survey involved 238 participants, including software developers and computer science students. The survey results revealed widespread adoption of these tools among participants, primarily to enhance coding speed, eliminate repetition, and gain boilerplate code. However, the survey also found that developers may misplace trust in these tools because they overlooked the risk of poisoning attacks. The in-lab study was conducted with 30 professional developers. The developers were asked to complete three programming tasks with a representative type of AI-powered coding assistant tool (e.g., ChatGPT or IntelliCode), running on Visual Studio Code. The in-lab study results showed that developers using a poisoned ChatGPT-like tool were more prone to including insecure code than those using an IntelliCode-like tool or no tool. This demonstrates the strong influence of these tools on the security of generated code. Our study results highlight the need for education and improved coding practices to address new security issues introduced by AI-powered coding assistant tools. 1. Introduction The advent of artificial intelligence (AI) has profoundly impacted the software engineering ecosystem. AI-powered coding assistant tools, such as ChatGPT [1] and GitHub Copilot [2], are used to enhance software developers’ efficiency and productivity. For example, if developers need *. Both authors contributed equally to this research. to develop code that requires encryption operations, they can simply request boilerplate code for encryption from an AI-powered coding assistant tool. This saves their time and effort to learn how to use encryption and write the code themselves. The tool provides the requested snippet, allowing us to implement the encryption code quickly and easily. AI-powered coding assistant tools are categorized into two types: CODE COMPLETION and CODE GENERATION . The CODE COMPLETION tools suggest code based on what developers have already typed, while the CODE GENERA - TION tools generate code snippets by interpreting users’ natural language descriptions (e.g., in English). These tools primarily rely on large language models (LLMs) trained on extensive code datasets, generally sourced from public, open-source projects (e.g., on GitHub). Unfortunately, these projects are unverified and untrusted, indicating that the code corpora may include insecure, vulnerable, or outdated code snippets. Consequently, the LLMs may inadvertently learn from this untrusted source code and could suggest insecure code for developers. Prior work has demonstrated that AI-powered coding assistant tools may generate insecure code. Specifically, Pearce et al. [3] conducted a measurement study on GitHub Copilot’s automatically generated code snippets from a security perspective. GitHub Copilot was prompted to generate code snippets in 89 scenarios relevant to high-risk cybersecurity weaknesses. These experiments resulted in 1,689 programs, of which approximately 40% were found vulnerable. Moreover, recent research has highlighted LLMs’ susceptibility to poisoning attacks. Schuster et al. [4], Aghakhani et al. [5], and Wan et al. [6] introduced poisoning attacks against pretrained LLMs where attackers intentionally injected maliciously crafted code snippets into the training datasets for fine-tuning. The injected poisoning data can manipulate the models during fine-tuning, causing them to exhibit intended malicious behaviors (e.g., generating vulnerable code). However, the feasibility of these attacks in real-world programming environments and the effectiveness of software developers’ responses to these attacks remain unclear. Perry et al. [7] recently conducted an online user study to examine interactions with an AI tool in various securityrelated tasks. Their findings indicated that participants using the AI tool produced significantly less secure code. However, they did not address the specific impacts of poisoning" 2312.06244v1,"Team-related Features in Code Review Prediction Models Eduardo Witter · Ingrid Nunes · Dietmar Jannach Abstract Modern Code Review (MCR) is an informal tool-assisted quality assurance practice. It relies on the asynchronous communication among the authors of code changes and reviewers, who are developers that provide feedback. However, from candidate developers, some are able to provide better feedback than others given a particular context. The selection of reviewers is thus an important task, which can benefit from automated support. Many approaches have been proposed in this direction, using for example data from code review repositories to recommend reviewers. In this paper, we propose the use of team-related features to improve the performance of predictions that are helpful to build code reviewer recommenders, with our target predictions being the identification of reviewers that would participate in a review and the provided amount of feedback. We evaluate the prediction power of these features, which are related to code ownership, workload, and team relationship. This evaluation was done by carefully addressing challenges imposed by the MCR domain, such as temporal aspects of the dataset and unbalanced classes. Moreover, given that it is currently unknown how much past data is needed for building MCR prediction models with acceptable performance, we explore the amount of past data used to build prediction models. Our results show that, individually, features related to code ownership have the best prediction power. However, based on feature selection, we conclude that all proposed features together with lines of code can make the best predictions for both reviewer participation and amount of feedback. Regarding the amount of past data, the timeframes of 3, 6, 9, and 12 months of data produce similar results. E. Witter Universidade Federal do Rio Grande do Sul Porto Alegre, Brazil E-mail: eduardo.witter@ufrgs.br I. Nunes Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil RWTH Aachen University, Aachen, Germany E-mail: ingridnunes@inf.ufrgs.br D. Jannach University of Klagenfurt Klagenfurt, Austria E-mail: dietmar.jannach@aau.at" 2312.06272v1,"U-MixFormer: UNet-like Transformer with Mix-Attention for Efficient Semantic Segmentation Seul-Ki Yeom * , Julian von Klitzing Nota AI GmbH Friedrichstrasse 200, 10117 Berlin, Germany skyeom@nota.ai, julian.von.klitzing@campus.tu-berlin.de Abstract Semantic segmentation has witnessed remarkable advancements with the adaptation of the Transformer architecture. Parallel to the strides made by the Transformer, CNN-based U-Net has seen significant progress, especially in highresolution medical imaging and remote sensing. This dual success inspired us to merge the strengths of both, leading to the inception of a U-Net-based vision transformer decoder tailored for efficient contextual encoding. Here, we propose a novel transformer decoder, U-MixFormer, built upon the U- Net structure, designed for efficient semantic segmentation. Our approach distinguishes itself from the previous transformer methods by leveraging lateral connections between encoder and decoder stages as feature queries for the attention modules, apart from the traditional reliance on skip connections. Moreover, we innovatively mix hierarchical feature maps from various encoder and decoder stages to form a unified representation for keys and values, giving rise to our unique mix-attention module. Our approach demonstrates state-of-the-art performance across various configurations. Extensive experiments show that U-MixFormer outperforms SegFormer, FeedFormer, and SegNeXt by a large margin. For example, U-MixFormer- B0 surpasses SegFormer-B0 and FeedFormer-B0 with 3.8% and 2.0% higher mIoU and 27.3% and 21.8% less computation and outperforms SegNext with 3.3% higher mIoU with MSCAN-T encoder on ADE20K. Code available at https: //github.com/julian-klitzing/u-mixformer. Introduction Semantic segmentation, a fundamental downstream task in computer vision, has consistently received increasing attention in industry and academia. The importance of semantic segmentation is highlighted by its widespread applications in real-world scenarios such as autonomous driving (Wang et al. 2022a) and medical diagnosis (Chaitanya et al. 2020). Despite these advancements, achieving precise pixel-wise predictions remains a challenge due to the need to balance global and local contexts. The introduction of the fully convolutional network (FCN)(Long, Shelhamer, and Darrell 2015) popularized the encoder-decoder structure, in which the encoder extracts * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. U-MixFormer (Ours) Figure 1: Performance vs. computational efficiency on ADE20K (single-scale inference). U-MixFormer outperforms previous methods in all configurations. high-level semantics and the decoder combines them with spatial details. While variants(Badrinarayanan, Kendall, and Cipolla 2017; Chen et al. 2018) have improved this approach, traditional CNNs struggle to capture long-range context. This limitation has prompted interest in vision transformer-based methods for segmentation. Transformer (Vaswani et al. 2017), initially designed for natural language processing, has been adapted for vision tasks with notable success thanks to the self-attention mechanism to capture global relationships within input sequences. Inspired by its success, Dosovitskiy et al. (2020) adapted it for vision tasks, leading to the Vision Transformer (ViT), which interprets images as sequences of embedded patches and processes them using the Transformer encoder. This approach yielded remarkable results on ImageNet. Since the introduction of the ViT, numerous studies have been performed into its adaptation for semantic segmentation. The primary objectives have been two-fold: refining the encoder and crafting decoders that adeptly utilize features from the encoder stage. There has been a notable shift towards utilizing the transformer’s decoder structure in vision tasks. DETR by Car-" 2312.06275v1,"DG-TTA: O UT - OF - DOMAIN MEDICAL IMAGE SEGMENTATION THROUGH D OMAIN G ENERALIZATION AND T EST -T IME A DAPTATION ∗ A P REPRINT Christian Weihsbach Institute of Medical Informatics University of Lübeck 23538 Lübeck, Germany christian.weihsbach@uni-luebeck.de Alexander Bigalke Institute of Medical Informatics University of Lübeck 23538 Lübeck, Germany alexander.bigalke@uni-luebeck.de Christian N. Kruse TNG Technology Consulting GmbH 85774 Unterföhring, Germany christian.kruse@tngtech.com Mattias P. Heinrich Institute of Medical Informatics University of Lübeck 23538 Lübeck, Germany mattias.heinrich@uni-luebeck.de December 12, 2023 A BSTRACT Applying pre-trained medical segmentation models on out-of-domain images often yields predictions of insufficient quality. Several strategies have been proposed to maintain model performance, such as finetuning or unsupervised- and source-free domain adaptation. These strategies set restrictive requirements for data availability. In this study, we propose to combine domain generalization and test-time adaptation to create a highly effective approach for reusing pre-trained models in unseen target domains. Domain-generalized pre-training on source data is used to obtain the best initial performance in the target domain. We introduce the MIND descriptor previously used in image registration tasks as a further technique to achieve generalization and present superior performance for small-scale datasets compared to existing approaches. At test-time, high-quality segmentation for every single unseen scan is ensured by optimizing the model weights for consistency given different image augmentations. That way, our method enables separate use of source and target data and thus removes current data availability barriers. Moreover, the presented method is highly modular as it does not require specific model architectures or prior knowledge of involved domains and labels. We demonstrate this by integrating it into the nnUNet, which is currently the most popular and accurate framework for medical image segmentation. We employ multiple datasets covering abdominal, cardiac, and lumbar spine scans and compose several out-of-domain scenarios in this study. We demonstrate that our method, combined with pre-trained whole-body CT models, can effectively segment MR images with high accuracy in all of the aforementioned scenarios. Open-source code can be found here: https://github.com/multimodallearning/DG-TTA Keywords Domain generalization · Domain-invariant descriptors · Test-time adaptation ∗ This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible." 2312.06277v1,"Edge-State-Mediated RKKY Coupling in Graphene Nanoflakes Ahmet Utku Canbolat ∗ and Özgür Çakır † Department of Physics, Izmir Institute of Technology, 35430 Urla, Izmir, Turkey (Dated: December 12, 2023) We investigate the long-range behavior and size dependence of the Ruderman-Kittel-Kasuya- Yosida (RKKY) interaction in hexagonal and triangular graphene nanoflakes with zigzag and armchair edges. We employ the tight-binding model with exact diagonalization to calculate the RKKY interaction as a function of the distance between magnetic impurities, nanoflake size, and edge geometry. Our findings demonstrate a strong dependency of the RKKY interaction on edge geometry and flake size, with notable changes in the RKKY interaction strength. We further analyze the influence of structural defects on the interaction strength of exchange interactions. I. INTRODUCTION: Graphene nanoflakes, finite-sized graphene structures with dimensions in the nanometer range, exhibit intriguing electronic and magnetic properties that are highly dependent on their shape, size, and edge configuration. Four primary types of graphene nanoflakes have been widely studied in the literature: triangular and hexagonal flakes with armchair and zigzag edges [1–5]. The unique electronic and magnetic properties of these flakes are closely linked to their edge termination type, sublattice asymmetry which in turn determine their magnetic behavior[6–8]. Indirect exchange interaction between site localized magnetic moments in graphene was shown to be of ferromagnetic(FM)/anti-ferromagnetic(AFM) character depending on the sub-lattice type of the impurities and exhibit a peculiar ∼ 1/R 3 type behavior in neutral graphene due to vanishing DOS at the Fermi energy[9, 10]. In doped graphene, exchange interaction decays as 1/R 2 , with an amplitude proportional to the density of states at the Fermi energy, oscillating between FM/AFM character at the Fermi wavelength as a function of distance between the magnetic moments[11–13]. Indirect exchange interactions and the role of edge states in graphene nanoribbons was investigated in a number of works[14–16]. The role edge states in phospherene ribbons was studied by by Islam et al. in [17]. The role of topological edge states on RKKY interactions was recently by Laubscher et al. in [18]. Electrical control of RKKY interactions at long distances via whispering gallery modes was investigated in [19]. The role of DOS and dispersion on RKKY interactions in bilayer graphene was studied by Klier et al.[20, 21], and in materials featuring quartic-dispersion was studied in [22]. The RKKY interaction in graphene nanoflakes was investigated by K. Sza lowski in 2011[23, 24] where ∗ utku.canbolat@fau.de; Current address: Institute for Multiscale Simulation, Friedrich- Alexander-Universität, Cauerstraße 3, 91058 Erlangen, Germany Competence Unit for Scientific Computing, CSC, Friedrich- Alexander-Universität, Martensstraße 5a, 91058 Erlangen, Germany. † ozgurcakir@iyte.edu.tr they primarily focused on small and fixed-size graphene nanoflakes, explored the influence of modified electronic structure and edge effects on RKKY interactions. Ávalos-Ovando et al. studied the nature of exchange interactions in triangular zigzag-terminated MoS 2 nanoflakes, revealed that their spatial decay behavior deviates from the 2D behavior and acquires non-isotropic as well as non-collinear character. The influence of external electric fields on RKKY interaction on edges of MoS2 nanostructures was studied by Mousavi et al.[25]. In this work we address the characteristics of the indirect exchange interactions in triangular and hexagonal graphene flakes with armchair and zigzag edges. We reveal the role of edge states and flake size on exchange interactions. We employ tight binding method to determine the exchange energy where itinerant electrons are coupled to site-localized moments with a Heisenberg type interaction[14]. We further investigate the influence of edge defects on the RKKY interaction in graphene nanoflakes. II. THE MODEL AND THE RESULTS We considered four different systems for graphene nanoflakes. These are hexagonal and triangular flakes with zigzag and armchair edges. The electronic properties of these systems are well-known [26]. Here, we calculated the electronic properties to show certain features. To calculate the energy, we used the nearest neighbor tight-binding Hamiltonian described as follows: H = −t X c † i,σ c j,σ + h.c. (1) ,σ where c i,σ and c † i,σ are respectively the annihilation and creation operators at the ith site with spin σ. t is the hopping constant, and its value is approximately 2.8 eV. Fig. 1 shows the energy eigenvalues as a function of the eigenvalue index for hexagonal graphene flakes with different sizes. N is the number of atoms on one edge of a flake. The eigenvalue index enumerates the eigenvalues in an ascending order. Since large systems have many eigenvalues, we only plotted around fifty eigenvalues centered" 2312.06279v1,"Regional Correlation Aided Mobile Traffic Prediction with Spatiotemporal Deep Learning JeongJun Park 1 , Lusungu J. Mwasinga 2 , Huigyu Yang 3 , Syed M. Raza 1* , Duc-Tai Le 4* , Moonseong Kim 5 , Min Young Chung 1 , and Hyunseung Choo 1234* 1 Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Korea 2 Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, Korea 3 Department of Superintelligence Engineering, Sungkyunkwan University, Suwon, Korea 4 College of Computing and Informatics, Sungkyunkwan University, Suwon, Korea 5 Department of IT Convergence Software, Seoul Theological University, Bucheon, Korea Emails: { parkjj1234, s.moh.raza, ldtai, choo } @skku.edu Abstract—Mobile traffic data in urban regions shows differentiated patterns during different hours of the day. The exploitation of these patterns enables highly accurate mobile traffic prediction for proactive network management. However, recent Deep Learning (DL) driven studies have only exploited spatiotemporal features and have ignored the geographical correlations, causing high complexity and erroneous mobile traffic predictions. This paper addresses these limitations by proposing an enhanced mobile traffic prediction scheme that combines the clustering strategy of daily mobile traffic peak time and novel multi Temporal Convolutional Network with a Long Short Term Memory (multi TCN-LSTM) model. The mobile network cells that exhibit peak traffic during the same hour of the day are clustered together. Our experiments on large-scale real-world mobile traffic data show up to 28% performance improvement compared to state-of-the-art studies, which confirms the efficacy and viability of the proposed approach. Index Terms—Mobile traffic prediction, Deep Learning, Clustering, TCN-LSTM, Peak traffic I. I NTRODUCTION Mobile traffic patterns in urban regions can be primarily classified into commercial and residential categories [1]. In commercial areas, mobile traffic peaks during work hours, whereas it increases during leisure hours in residential areas. Understanding these patterns enhances precise mobile traffic predictions. Earlier mobile traffic prediction solutions have used time-series Deep Learning (DL) techniques like Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM) [2], [3]. These models are suited for time-series data as they can effectively identify temporal patterns within the data. However, their performance is limited as they do not exploit the spatial characteristics of mobile traffic. To overcome this, recent studies have integrated deep convolutional techniques in time-series models to effectively learn from spatial features [4], [5]. These combined techniques can capture the spatiotemporal characteristics of mobile traffic data and yield more accurate predictions. The spatial features captured by the convolutional techniques are agnostic to regional characteristics, especially across vast geographical areas. In mobile traffic prediction, clustering is a better technique to harness the geographical attributes where neighboring cells can be clustered together using the k-means algorithm [6]. The assumption that geographical proximity translates into similar traffic patterns is weak and can be handled by clustering based on the similarity coefficient between traffic patterns of different cells [7]. The calculation cost of the Dynamic Time Warping (DTW) algorithm is high because it cannot correlate multiple cells simultaneously. This calls for a lightweight and sophisticated clustering strategy for diverse cells. This work addresses the limitations of earlier works by proposing a clustering strategy based on geospatial and temporal patterns. In particular, for each cell peak traffic occurrence time during the day is observed, and using Pearson Correlation Coefficient (PCC) similarity among cells is established. Groups of cells with high similarity are clustered together and predicted through a novel multi Temporal Convolutional Network with an LSTM (multi TCN-LSTM) model. The proposed multi TCN-LSTM model improves performance and ensures stability by adding residual convolutional connections (RCCs) to the existing TCN-LSTM structure. Through experimental results, the proposed approach has demonstrated superior performance in analyzing and predicting mobile traffic patterns. In summary, the major contributions of this paper are as follows: A novel clustering method classifies regions by peak traffic times. The PCC compares trends between regions. This clustering builds a prediction model for each cluster, enhancing mobile traffic pattern understanding. • A proposed multi TCN-LSTM model comprehensively captures the underlying geospatial and temporal patterns in mobile traffic data by combining residual convolutional connections with the existing TCN-LSTM structure. • A thorough evaluation of the proposed approach using a large-scale mobile traffic dataset [8]. Experimental results show ∼28% improvement compared to state-of-the-art, showcasing its utility in diverse real-world scenarios. •" 2312.06289v1,"A Graphical Framework for Interpretable Correlation Matrix Models Anna Freni-Sterrantino a,∗ , Denis Rustand b , Janet van Niekerk b , Elias Teixeira Krainski b , Håvard Rue b a The Alan Turing Institute, 2QR, John Dodson House, 96 Euston Rd, NW1 2DB London, United Kingdom b Statistics Program, CEMSE Division, King Abdullah University of Science and Technology Thuwal, 23955, Makkah, Saudi Arabia Abstract In this work, we present a new approach for constructing models for correlation matrices with a user-defined graphical structure. The graphical structure makes correlation matrices interpretable and avoids the quadratic increase of parameters as a function of the dimension. We suggest an automatic approach to define a prior using a natural sequence of simpler models within the Penalized Complexity framework for the unknown parameters in these models. We illustrate this approach with three applications: a multivariate linear regression of four biomarkers, a multivariate disease mapping, and a multivariate longitudinal joint modelling. Each application underscores our method’s intuitive appeal, signifying a substantial advancement toward a more cohesive and enlightening model that facilitates a meaningful interpretation of correlation matrices. Keywords: Complexity penalized priors, Correlation Matrix Modeling, Graphical Structure, Multivariate Joint Modeling 1. Introduction Estimating the covariance matrix and specifying a covariance prior pose challenges from a Bayesian perspective. Traditionally, various natural prior conjugate distributions have been used, such as the Wishart [35], inverse-Wishart [5] and scaled inverse-Wishart [20]. However, the inverse-Wishart prior and its generalization are associated with certain issues. For instance, the uncertainty for all variances is controlled by a single degree of freedom parameter and the marginal distribution for the variances has a low density in a region near zero. There is also a priori dependence between correlations and variances, where larger variances are associated with correlations near ±1, whereas smaller variances are associated with correlations near zero [2]. In the era of computational frameworks, the attractiveness of preserving prior conjugacy has diminished, as Bayesian inference is mainly conducted using either samplingbased methods like Markov Chain Monte Carlo (MCMC), approximate methods such as integrated nested Laplace approximation (INLA) or variational Bayes. The covariance matrix contains information on two distinct fronts: dependencies and marginal variances. The correlation matrix is calculated based on the covariance matrix from which the nature and strength of pairwise linear dependence can be extracted. An alternative view is to consider two priors: one for the marginal variances and one for the correlation. For the latter, two major challenges emerge (i) the unit diagonal and positive definite constraints; (ii) the number of parameters grows quadratically as the number of variables increases. The typical approach assumes correlation among variables (or random effects), but these are not explicitly elicited. Hence, how variables (or random effects) are correlated is unknown and unaccounted for in the prior choice. Proposals for correlation priors include priors based on the spectral decomposition of a symmetric matrix [8, 16] and priors on the singular value decomposition of an asymmetric matrix [6, 15]. Both are characterized by excessive informative constraints on the correlation matrix elements, leading to shrinkage estimation towards the matrix diagonal. Another proposal is the LKJ prior [13], which is a weakly informative prior defined on a simplex. By tuning the strength of just one parameter allows to control how closely the sampled matrices resemble the identity matrices. ∗ Corresponding author. Email address: afrenisterrantino@turing.ac.uk Preprint submitted to Journal of Multivariate Analysis December 12, 2023" 2312.06292v1,"HoLLiE C – A Multifunctional Bimanual Mobile Robot Supporting Versatile Care Applications Lea Steffen 1 , Martin Schulze 1 , Christian Eichmann 1 , Robin Koch 1 , Andreas Hermann 2 , Rosa Frietsch Mussulin 1 , Friedrich Graaf 1 , Robert Wilbrandt 1 , Marvin Große Besselmann 1 , Arne Roennau 1 , and Rüdiger Dillmann 1 1 FZI Research Center for Information Technology, Karlsruhe, Germany, steffen@fzi.de 2 ArtiMinds Robotics, Karlsruhe, Germany Abstract. Care robotics as a research field has developed a lot in recent years, driven by the rapidly increasing need for it. However, these technologies are mostly limited to a very concrete and usually relatively simple use case. The bimanual robot House of Living Labs intelligent Escort (HoLLiE) includes an omnidirectional mobile platform. This paper presents how HoLLiE is adapted, by flexible software and hardware modules, for different care applications. The design goal of HoLLiE was to be human-like but abstract enough to ensure a high level of acceptance, which is very advantageous for its use in hospitals. After a short retrospect of previous generations of HoLLiE, it is highlighted how the current version is equipped with a variety of additional sensors and actuators to allow a wide range of possible applications. Then, the software stack of HoLLiE is depicted, with the focus on navigation and force sensitive intention recognition. Keywords: service robot, care/nursing, bimanual, omnidirectional, multipurpose 1 INTRODUCTION A challenge for many healthcare systems is the overburdening of caregivers and consistent understaffing in the care industry. The healthcare system needs additional approaches, using robots could be one way to address these challenges in the healthcare system. Even though the human touch is deeply valued, there are still tasks that would benefit from robotic automation without a deterioration of care quality. 1.1 Related work There are already several approaches regarding robotic systems intended for care facilities and their use in hospitals [1] [2]. Due to an easy adoption to a healthcare setting, social robots are a prevalent robot application in care, with various systems based on commercially available robots in use [3] [2] [4]. Pure" 2312.06305v1,"A Meta-Level Learning Algorithm for Sequential Hyper-Parameter Space Reduction in AutoML Giorgos Borboudakis 1 , Paulos Charonyktakis 1 , Konstantinos Paraschakis 1 , and Ioannis Tsamardinos 1,2 JADBio - Gnosis DA S.A. Computer Science Department - University of Crete {borbudak,haronykt,kparaschakis,tsamard}@jadbio.com 1 2 Abstract. AutoML platforms have numerous options for the algorithms to try for each step of the analysis, i.e., different possible algorithms for imputation, transformations, feature selection, and modelling. Finding the optimal combination of algorithms and hyper-parameter values is computationally expensive, as the number of combinations to explore leads to an exponential explosion of the space. In this paper, we present the Sequential Hyper-parameter Space Reduction (SHSR) algorithm that reduces the space for an AutoML tool with negligible drop in its predictive performance. SHSR is a meta-level learning algorithm that analyzes past runs of an AutoML tool on several datasets and learns which hyper-parameter values to filter out from consideration on a new dataset to analyze. SHSR is evaluated on 284 classification and 375 regression problems, showing an approximate 30% reduction in execution time with a performance drop of less than 0.1%. Keywords: AutoML · Algorithm Recommendation · Algorithm Selection · Hyper-parameter Optimization 1 Introduction AutoML platforms for predictive modelling try to solve the Combined Algorithm Selection and Hyper-parameter Optimization (CASH) [24] problem. CASH optimizes the algorithmic choices, as well as the hyper-parameter values of the machine learning pipeline (hereafter called a configuration) that produces the final model. Each configuration may contain several steps, such as algorithms for missing value imputation, feature transformation, feature extraction, feature selection, and of course, predictive modelling. All such choices can be represented with hyper-parameters which form the decision variables of an optimization problem with objective function the out-of-sample predictive performance of the final model, called Hyper-Parameter Optimization (HPO). The hyper-parameters form the configuration space over which to optimize. There have been at least two complementary approaches to address this optimization. The first approach is to employ black-box optimization strategies to search the configuration space, such as grid search, random search, and Sequential" 2312.06313v1,"Single-step Chemical Vapor Deposition of Methyl Ammonium Lead Halide Perovskite for p-i-n Solar Cells Dmitry S. Muratov* 1 , Lev Luchnikov 1 , Danila Saranin 1 , Artur Ishteev 1,3, Vladislav Kurichenko 2 , Evgeniy Kolesnikov 1 , Denis V. Kuznetsov 2 and Aldo Di Carlo 4 1 L.A.S.E. – Laboratory for Advanced Solar Energy, National University of Science and Technology “MISiS”, Leninskiy prospect 6, Moscow, 119049, Russia 2 Department of Functional NanoSystems and High-Temperature Materials, National University of Science and Technology “MISiS”, Leninskiy prospect 4, Moscow, 119049, Russia 3 N.N. Semenov Federal Research Center for Chemical Physics, Russian Academy of Sciences, Kosygina st. 4, Moscow, 119991, Russia 4 CHOSE – Centre for Hybrid and Organic Solar Energy, Department of Electronic Engineering, University of Rome Tor Vergata, via del Politecnico 1, Rome, 00133, Italy *Corresponding Author E-mail Address: muratov@misis.ru 1" 2312.06317v1,"Flow Symmetrization for Parameterized Constrained Diffeomorphisms Aalok Gangopadhyay † , Dwip Dalal † , Progyan Das † , Shanmuganathan Raman Indian Institute of Technology Gandhinagar, India {aalok, dwip.dalal, progyan.das, shanmuga}@iitgn.ac.in Abstract Diffeomorphisms play a crucial role while searching for shapes with fixed topological properties, allowing for smooth deformation of template shapes. Several approaches use diffeomorphism for shape search. However, these approaches employ only unconstrained diffeomorphisms. In this work, we develop Flow Symmetrization - a method to represent a parametric family of constrained diffeomorphisms that contain additional symmetry constraints such as periodicity, rotation equivariance, and transflection equivariance. Our representation is differentiable in nature, making it suitable for gradient-based optimization approaches for shape search. As these symmetry constraints naturally arise in tiling classes, our method is ideal for representing tile shapes belonging to any tiling class. To demonstrate the efficacy of our method, we design two frameworks for addressing the challenging problems of Escherization and Density Estimation. The first framework is dedicated to the Escherization problem, where we parameterize tile shapes belonging to different isohedral classes. Given a target shape, the template tile is deformed using gradient-based optimization to resemble the target shape. The second framework focuses on density estimation in identification spaces. By leveraging the inherent link between tiling theory and identification topology, we design constrained diffeomorphisms for the plane that result in unconstrained diffeomorphisms on the identification spaces. Specifically, we perform density estimation on identification spaces such as torus, sphere, Klein bottle, and projective plane. Through results and experiments, we demonstrate that our method obtains impressive results for Escherization on the Euclidean plane and density estimation on non-Euclidean identification spaces. CCS Concepts • Computing methodologies → Shape analysis; 1. Introduction Shape search is a fundamental problem centered on finding a shape that satisfies specific constraints while optimizing a predefined objective. When the shape’s topological properties are predetermined, diffeomorphisms become crucial. Diffeomorphisms are smooth transformations with smooth inverses. They thus facilitate the smooth deformation of a template shape, ensuring that its topological properties remain preserved. Such utility of diffeomorphisms has been effectively highlighted in [SHK ∗ 22a, Gup20, CLH ∗ 22]. Various methods are utilized to represent diffeomorphisms, including Invertible Neural Networks (INN) [DSDB16] and NeuralODEs [CRBD18]. Within the INN framework, a neural network is inherently designed to be smooth and invertible, ensuring its representation as a diffeomorphism. On the other hand, NeuralODEs allow for the representation of diffeomorphisms via stationary or time-varying vector fields. By integrating a given vector field, a corresponding diffeomorphism can be obtained. Both these methods † indicates equal contribution present distinct advantages. Primarily, their differentiable nature renders them compatible with gradient-based optimization methods. Additionally, given that these models are query-based, the memory requirement scales with the complexity of the diffeomorphism, marking them as a memory-efficient solution. While a rich body of work in the field successfully models diffeomorphisms, most of this literature focuses on unconstrained diffeomorphisms. These unconstrained representations, while powerful, do not always suffice when the problem contains certain constraints that need to be satisfied. Take, for example, the square depicted in Fig. 1(a) with its identification constraints. In this example, the opposite sides of the squares are identified so that the opposite sides must deform identically. Applying an unconstrained diffeomorphism on this square might violate these constraints, as seen in Fig. 1(b). To maintain these identification constraints while deforming, like the ones shown in Fig. 1(c), the diffeomorphism must possess symmetry attributes that ensure the constraints are not violated. In such contexts, the capability to employ constrained or symmetric diffeomorphisms becomes paramount, ensuring the retention of the shape’s intrinsic symmetries." 2312.06339v1,"Inelastic Light Scattering in the Vicinity of a Single-Atom Quantum Point Contact in a Plasmonic Picocavity Shuyi Liu 1†‡ , Franco P. Bonafe 2† , Heiko Appel 2 , Angel Rubio 2,3 , Martin Wolf 1 , Takashi Kumagai 1,4 * 1 Department of Physical Chemistry, Fritz-Haber Institute of the Max-Planck Society, Faradayweg 4-6, 14195 Berlin, Germany. 2 MPI for Structure and Dynamics of Matter, Luruper Chaussee 149, 22761 Hamburg, Germany. 3 Center for Computational Quantum Physics (CCQ), Flatiron Institute, 162 Fifth Avenue, New York NY 10010, USA. 4 Center for Mesoscopic Sciences, Institute for Molecular Science, Okazaki 444-8585, Japan. † These authors equally contributed to this work. ‡ Current Address: Center for Mesoscopic Sciences, Institute for Molecular Science, Okazaki 444-8585, Japan. *Corresponding author: kuma@ims.ac.jp 1" 2312.06348v1,"DiffAIL: Diffusion Adversarial Imitation Learning Bingzheng Wang 1 , Yan Zhang 1 , Teng Pang 1 , Guoqiang Wu 1 , Yilong Yin 1 1 Shandong University binzhwang@gmail.com, yannzhang9@gmail.com, silencept7@gmail.com, guoqiangwu@sdu.edu.cn , ylyin@sdu.edu.cn Abstract Imitation learning aims to solve the problem of defining reward functions in real-world decision-making tasks. The current popular approach is the Adversarial Imitation Learning (AIL) framework, which matches expert state-action occupancy measures to obtain a surrogate reward for forward reinforcement learning. However, the traditional discriminator is a simple binary classifier and doesn’t learn an accurate distribution, which may result in failing to identify expertlevel state-action pairs induced by the policy interacting with the environment. To address this issue, we propose a method named diffusion adversarial imitation learning (DiffAIL), which introduces the diffusion model into the AIL framework. Specifically, DiffAIL models the state-action pairs as unconditional diffusion models and uses diffusion loss as part of the discriminator’s learning objective, which enables the discriminator to capture better expert demonstrations and improve generalization. Experimentally, the results show that our method achieves state-of-the-art performance and significantly surpasses expert demonstration on two benchmark tasks, including the standard state-action setting and stateonly settings. Our code can be available at an anonymous link https://github.com/ML-Group-SDU/DiffAIL. Introduction Deep Reinforcement Learning has achieved significant success in many decision-making tasks, including AlphaGo (Silver et al. 2016), Atari games (Mnih et al. 2013), MuJoCo environment tasks (Todorov, Erez, and Tassa 2012), and robot control tasks (Mnih et al. 2015), where these tasks are typically defined with clear reward functions to guide the agent for decision-making. However, in real-world scenarios, the reward function is regularly challenging to obtain or define, such as in the case of autonomous driving, where it is complicated to delineate what behavior is beneficial for the agent. The emergence of Imitation Learning provides a practical solution to the problem of inaccessible rewards. In imitation learning, the agent does not rely on actual rewards but instead utilizes expert demonstration data to learn a similar expert policy. A relatively old method in imitation learning is clone learning (Pomerleau 1991), which uses supervised learning to learn from expert data. Although such methods are Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. straightforward to implement, they are prone to serious extrapolation errors when visiting out-of-distribution data while practically interacting with environments. To alleviate the aforementioned errors, Dagger (Ross, Gordon, and Bagnell 2011) proposes access to expert policies, where the agent continuously interacts with the environment online and asks for expert-level actions from the expert policy to expand the dataset. AdapMen (Liu et al. 2023) proposes an active imitation learning framework based on teacherstudent interaction, and theoretical analysis shows that it can avoid compounding errors under mild conditions. To effectively tackle the aforementioned extrapolation error, Adversarial imitation learning (AIL) (Ho and Ermon 2016; Fu, Luo, and Levine 2017; Kostrikov et al. 2018; Ghasemipour, Zemel, and Gu 2020; Zhang et al. 2020, 2022) has become the most popular approach in imitation learning. Rather than minimizing the divergence between the expert policy and the agent policy, AIL employs online interactive learning to focus on minimizing the divergence between the joint state-action distribution induced by the expert policy and the learned policy. However, typical AIL methods often use a simplistic discriminator that does not learn a distribution, which may not accurately classify specific expertlevel actions generated by the policy during interactions with the environment. This can result in the naive discriminator failing to distinguish expert-level behaviors generated by the policy, potentially hindering agent learning. Therefore, a powerful discriminator that can accurately capture the distribution of expert data is crucial for AIL. Currently, diffusion model (Ho, Jain, and Abbeel 2020) processes a powerful distribution matching capability and has achieved remarkable success in image generation, surpassing other popular generative models such as GAN (Goodfellow et al. 2014) and VAE (Kingma and Welling 2013) in producing higher-quality and more diverse samples. Based on diffusion model’s powerful ability to capture data distribution, we propose a new method called Diffusion Adversarial Imitation Learning (DiffAIL) in this work. DiffAIL employs the same framework as traditional AIL but incorporates the diffusion model to model joint stateaction distribution. Therefore, DiffAIL enables the discriminator to accurately capture expert demonstration and improve generalization, facilitating the successful identifica-" 2312.06355v1,"Empirical Basis of Engineering Design Knowledge L. Siddharth  , Jianxi Luo Data-Driven Innovation Lab, Engineering Product Development Pillar, Singapore University of Technology Design, 8, Somapah Road, Singapore - 487372 Abstract Engineering design knowledge is embodied in natural language text through intricate placement of entities and relationships. Since the constructs of design knowledge have o en been theorised by ontological approaches, the performances of natural language processing techniques to extract design knowledge have been quite limited. In addition, as large-language models assimilate predominantly common-sense ways of documenting knowledge, despite growing popularity, the abilities of these to generate high-quality text need not imply the ability to generate or explicate design knowledge. Addressing these broad issues, in this article, we provide insights regarding the constituents of design knowledge based on empirical observations from artefact descriptions given in patent documents. We obtain a sample of 33,881 patents and populate over 24 million facts from the sentences in these. We conduct Zipf distribution analyses using the frequencies of unique entities and relationships that are present in the facts thus populated. While the literal entities cannot be generalised from the sample of patents, the relationships largely capture attributes (“of”), structure (“in”, “with”), purpose (“to”, “for”), hierarchy (“include”), exemplification (“such as”), and behaviour (“to”, “from”). The analyses further reveal that over half of the entities and relationships could be generalised to 64 and 24 linguistic syntaxes respectively. Among these, hierarchical relationships are generalised to 75 unique syntaxes. The syntaxes thus identified shall account for the linguistic basis of engineering design knowledge. We combine facts within each patent to get a knowledge graph, from which we discover motifs that are statistically over-represented subgraph patterns. Across all patents in the sample, we identify four 3-node and four 4-node patterns as the most common motifs. When these patterns are examined using the actual subgraphs, i.e., with edge labels, we understand that the patterns could be simplified into sequence [→ ⋯ →], aggregation [→ ⋯ ←], and hierarchy [← ⋯ →] that form the structural basis of engineering design knowledge. Upon summarising these findings, we propose a few regulatory precepts for concretising abstract entities and relationships within subgraphs, while also explicating hierarchical structures. These precepts could be useful for explicating and modularising design knowledge in order to ensure better construction, management, and retrieval in a design environment. Keywords: Design Knowledge, Knowledge Graphs, Natural Language Processing, Linguistic Basis, Motif Discovery, Knowledge Representation.  siddharth_l@mymail.sutd.edu.sg, siddharthl.iitrpr.sutd@gmail.com" 2312.06369v1,"Entanglement and volume monogamy features of permutation symmetric N-qubit pure states with N-distinct spinors: GHZ and W W̄ states Sudha, 1, 2 A. R. Usha Devi, 3, 2 H. Akshata Shenoy, 4 H. S. Karthik, 4 Talath Humera, 3 B. P. Govindaraja, 1 and A. K. Rajagopal 5 Department of Physics, Kuvempu University, Shankaraghatta-577 451, Karnataka, India ∗ 2 Inspire Institute Inc., Alexandria, Virginia, 22303, USA. 3 Department of Physics, Bangalore University, Bangalore-560 056, India † 4 International Centre for Theory of Quantum Technologies, University of Gdánsk, Gdánsk, Poland ‡ 5 Inspire Institute Inc., McLean, VA 22101, USA. § (Dated: December 12, 2023) 1 We explore the entanglement features of pure symmetric N -qubit states characterized by N - distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger(GHZ) states and WW̄, an equal superposition of W and obverse W states. Along with a comparison of pairwise entanglement and monogamy properties, we explore the geometric information contained in them by constructing their canonical steering ellipsoids. We obtain the volume monogamy relations satisfied by WW̄ states as a function of number of qubits and compare with the maximal monogamy property of GHZ states. PACS numbers: 03.67.Mn, 03.67.-a I. INTRODUCTION Permutation symmetric multiqubit states form an important class among quantum states due to their experimental significance and mathematical elegance [1–5]. The well-known Greenberger-Horne-Zeilinger(GHZ) [6], W, and Dicke states [7] etc., belong to this class. Mathematical simplicity in addressing pure symmetric N -qubit states is owing to the fact that they are confined to the N + 1 dimensional subspace of the 2 N dimensional Hilbert space. The N + 1 dimensional subspace is the maximal multiplicity space of the collective angular momentum space of N -qubits with Dicke states [7], the common eigenstates of the squared collective angular momentum operator J 2 and its z-component J z forming its basis. In 1932 Majorana [8] proposed an elegant geometrical visualization for pure symmetric N -qubit states as a constellation of N -points on the Bloch sphere S 2 . The representation of pure symmetric multiqubit states in terms of constitutent N -qubits (spinors) is called Majorana representation [8]. Majorana geometric representation has found several significant applications in quantum information processing [9–12]. Quantum steering ellipsoid [13] offers a novel geometric picturization of a two-qubit states and is useful in understanding quantum correlations such as non-locality, entanglement [14, 16, 17] and quantum discord [14, 15]. The set of all Bloch vectors to which one of the qubits of a two-qubit system can be ‘steered’ when all possible measurements are carried out on the other qubit correspond to quantum steering ellipsoid [13]. It has been identified that the volume of the steering ellipsoids [13] corresponding to the two-qubit subsystems of an N -qubit state, N ≥ 3, effectively captures monogamy properties of the state [16, 18]. Milne et.al [16] proposed a monogamy relation, in terms of the volumes of the quantum steering ellipsoids of two-qubit subsystems of a 3-qubit pure state which is stricter than the Coffman-Kundu-Wootters(CKW) monogamy relation [19]. A volume monogamy relation satisfied by pure as well as mixed N -qubit states has been obtained in [18] and is helpful in quantifying the shareability properties of the N -qubit state. The steering ellipsoid of a two-qubit state that has attained a canonical form under suitable local operations on both the qubits is the so-called canonical steering ellipsoid [20–22] and provides another geometric representation of a two-qubit state. The canonical steering ellipsoid of any two-qubit state is shown to have only two distinct forms [22] and provide a much simpler geometric picture representing two-qubit states. The volume monogamy relations for permutation symmetric 3-qubit pure states with two and three distinct spinors are established in [23] using the features of their respective steering ellipsoids. The canonical steering ellipsoids of the entire class of permutation symmetric N -qubit states with two distinct spinors are obtained in [24] and the nature of the volume monogamy relation with increasing N is analyzed [24]. In addition, the obesity of the steering ∗ tthdrs@gmail.com † ushadevi@bub.ernet.in ‡ akshata.shenoy@ug.edu.pl § attipat.rajagopal@gmail.com" 2312.06371v1,"BAT: Behavior-Aware Human-Like Trajectory Prediction for Autonomous Driving Haicheng Liao 1 * , Zhenning Li 1∗† , Huanming Shen 2 , Wenxuan Zeng 3 , Guofa Li 4 , Shengbo Eben Li 5 , Chengzhong Xu 1† 1 University of Macau University of Electronic Science and Technology of China 3 Peking University 4 Chongqing University 5 Tsinghua University {yc27979, zhenningli, czxu}@um.edu.mo, huanmingshen@outlook.com, zwx.andy@stu.pku.edu.cn, hanshan198@gmail.com, lishbo@tsinghua.edu.cn 2 Abstract The ability to accurately predict the trajectory of surrounding vehicles is a critical hurdle to overcome on the journey to fully autonomous vehicles. To address this challenge, we pioneer a novel behavior-aware trajectory prediction model (BAT) that incorporates insights and findings from traffic psychology, human behavior, and decision-making. Our model consists of behavior-aware, interaction-aware, priority-aware, and position-aware modules that perceive and understand the underlying interactions and account for uncertainty and variability in prediction, enabling higher-level learning and flexibility without rigid categorization of driving behavior. Importantly, this approach eliminates the need for manual labeling in the training process and addresses the challenges of non-continuous behavior labeling and the selection of appropriate time windows. We evaluate BAT’s performance across the Next Generation Simulation (NGSIM), Highway Drone (HighD), Roundabout Drone (RounD), and Macao Connected Autonomous Driving (MoCAD) datasets, showcasing its superiority over prevailing state-of-the-art (SOTA) benchmarks in terms of prediction accuracy and efficiency. Remarkably, even when trained on reduced portions of the training data (25%), our model outperforms most of the baselines, demonstrating its robustness and efficiency in predicting vehicle trajectories, and the potential to reduce the amount of data required to train autonomous vehicles, especially in corner cases. In conclusion, the behavior-aware model represents a significant advancement in the development of autonomous vehicles capable of predicting trajectories with the same level of proficiency as human drivers. The project page is available at our Github 1 . Introduction Recent advancements in autonomous driving (AD) have been remarkable. Nonetheless, as we move towards the commercialization of high-level AD technology, challenges abound. One of the most significant barriers is equipping autonomous vehicles (AVs) with the ability to anticipate the trajectory of nearby vehicles in intricate situations as skillfully as humans. * Authors contributed equally; †Corresponding author. 1 https://github.com/Petrichor625/BATraj-Behavior-aware- Model Figure 1: An overview of our proposed behavior-aware pooling mechanism and the classical pooling mechanism. Left: Modeling the vehicle using polar coordinates. Right: Modeling the vehicle using fixed-size grids and representing the position in Cartesian coordinates. Driving, for humans, necessitates continuous monitoring of the current states of surrounding vehicles and forecasting their future states before actions like acceleration or overtaking. These states, predominantly determined by trajectories, form the bedrock of safe driving and collision prevention. This demands a keen assessment of the interaction among vehicles and an unbiased grasp of their behavior, in line with traffic regulations and accumulated driving experience (Müller, Risto, and Emmenegger 2016). In our quest to enhance the trajectory prediction capabilities of AVs, mimicking human-like comprehension and response to surrounding scenarios might be a breakthrough. As highlighted in (Schwarting et al. 2019; Wang et al. 2022a), accounting for the behaviors of other drivers in the decision-making processes of AVs can potentially result in enhanced driving performance. With this understanding, we advocate that a deeper dive into driver behavior can significantly uplift trajectory prediction for AVs. Previous investigations have posited that there exists a certain relationship between different drivers’ behaviors and their driving performance (Toledo, Musicant, and Lotan 2008; Chandra et al. 2020; Xie et al. 2020). When con-" 2312.06372v1,"Ternary Spike: Learning Ternary Spikes for Spiking Neural Networks Yufei Guo * , Yuanpei Chen ∗ , Xiaode Liu, Weihang Peng, Yuhan Zhang, Xuhui Huang, Zhe Ma † Intelligent Science & Technology Academy of CASIC, China yfguo@pku.edu.cn, rop477@163.com, mazhe thu@163.com Abstract The Spiking Neural Network (SNN), as one of the biologically inspired neural network infrastructures, has drawn increasing attention recently. It adopts binary spike activations to transmit information, thus the multiplications of activations and weights can be substituted by additions, which brings high energy efficiency. However, in the paper, we theoretically and experimentally prove that the binary spike activation map cannot carry enough information, thus causing information loss and resulting in accuracy decreasing. To handle the problem, we propose a ternary spike neuron to transmit information. The ternary spike neuron can also enjoy the event-driven and multiplication-free operation advantages of the binary spike neuron but will boost the information capacity. Furthermore, we also embed a trainable factor in the ternary spike neuron to learn the suitable spike amplitude, thus our SNN will adopt different spike amplitudes along layers, which can better suit the phenomenon that the membrane potential distributions are different along layers. To retain the efficiency of the vanilla ternary spike, the trainable ternary spike SNN will be converted to a standard one again via a reparameterization technique in the inference. Extensive experiments with several popular network structures over static and dynamic datasets show that the ternary spike can consistently outperform state-of-the-art methods. Our code is open-sourced at https://github.com/yfguo91/Ternary-Spike. Introduction Nowadays, Artificial Neural Network (ANN) has been widely used in many fields, e.g., object recognition (He et al. 2016), object segmentation (Ronneberger, Fischer, and Brox 2015), object tracking (Bewley et al. 2016), mesh smoothing (Guo et al. 2021), etc. However, to achieve better performance, the network size is evolving to more and more complex (Huang et al. 2017; Devlin et al. 2018). To address this problem, quantization (Gong et al. 2019; Li, Dong, and Wang 2019), pruning (He, Zhang, and Sun 2017), knowledge distillation (Polino, Pascanu, and Alistarh 2018; Zhang, Bao, and Ma 2022), spiking neural networks (SNNs) (Li et al. 2021a; Xiao et al. 2021; Wang et al. 2022; Bohnstingl et al. 2022; Ren et al. 2023; Shen et al. 2023; Xu et al. 2022, 2021), and so on, * Equal contribution. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. have been proposed. Especially, SNNs, recognized as one of the next-generation neural networks, provide a unique way to reduce energy consumption by mimicking the information processing of the brain. SNNs adopt spikes to transmit information and thus can convert multiplications of weights and activations to additions, enjoying multiplication-free inference. Furthermore, the event-driven-based computation manner shows higher energy efficiency on neuromorphic hardwares (Ma et al. 2017; Akopyan et al. 2015; Davies et al. 2018; Pei et al. 2019). However, SNN’s binary spike activation maps suffer the limited information capacity compared to full precious activation maps of the ANN and are unable to carry enough useful information from membrane potentials in the quantization process of the SNN, thus causing information loss and resulting in accuracy decreasing. A detailed proof will be given in Sec. 4.1 in the paper. Meanwhile, we also find that the membrane potential distributions of different layers of an SNN are much different. thus quantizing these membrane potentials to the same spike values is unnatural, which is ignored by the prior work. To solve these problems, we first propose the ternary spike neuron, called Ternary Spike. Different from the current way using {0, 1} spikes, it utilizes the {−1, 0, 1} spikes to transmit information. A detailed design and a theoretical proof will be provided in Sec. 4.1 that the Ternary Spike enjoys the greater information capacity than the binary spike but will keep the multiplication-addition transform and event-driven advantages still. Furthermore, we also extend the ternary spike to a learnable ternary spike form, which is not limited to {−1, 0, 1}, but {−α, 0, α}, where α is layer-wise learnable value. In this way, different layers’ neurons will fire different magnitudes of spikes in a learning manner, corresponding to different membrane potential distributions. In the inference phase, the α factor can be folded into the weights by a re-parameterization technique, hence will retain the multiplication-free inference again. The difference between our ternary spike neuron and the vanilla binary spike neuron is illustrated in Fig. 1. In summary, our main contributions are threefold: • We prove that the binary spike activation map cannot carry enough information with theoretical justifications and indepth experimental analysis and propose the ternary spike neuron, a simple yet effective improved spike neuron for" 2312.06384v1,"Output contraction analysis of nonlinear systems Hao Yin a , Bayu Jayawardhana a , Stephan Trenn b a b Discrete Technology & Production Automation, University of Groningen Systems, Control and Optimization; Bernoulli Institute, University of Groningen Abstract This paper introduce the notion of output contraction that expands the contraction notion to the time-varying nonlinear systems with output. It pertains to the systems’ property that any pair of outputs from the system converge to each other exponentially. This concept exhibits a more expansive nature when contrasted with another generalized contraction framework known as partial contraction. The first result establishes a connection between the output contraction of a time-varying system and the output exponential stability of its variational system. Subsequently, we derive a sufficient condition for achieving output contraction in time-varying systems by applying the output contraction Lyapunov criterion. Finally, we apply the results to analyze the output exponential stability of nonlinear time-invariant systems. Key words: Contraction analysis; Output stability; Lyapunov theorem; Time-varying systems. 1 Introduction The notion of contraction, also referred to as exponential incremental stability, provides an analytical tool to study the asymptotic behavior of time-varying nonlinear systems. The contraction theory characterizes particular systems’ property of nonlinear time-varying systems where all trajectories from different initial conditions converge exponentially to each other [9] and it has been studied extensively in literature for over two decades. Forni and Sepulchre [5] present a Lyapunov-like characterization of contraction property by lifting the Lyapunov function to the tangent bundle. A closely related notion, the so-called incremental stability, is studied in [2] via incremental Lyapunov functions. As an alternative to the Lyapunov approach, Sontag et al. [10] employ matrix measure, also known as logarithmic norm, to directly characterize the contraction properties. In [4], the authors present weak pairings and explore the one-sided Lipschitz condition for the vector field to investigate contractivity with respect to arbitrary norms. The authors in [1] study transverse exponential stability, which can be considered as a generalized concept of contraction by using nonlinear Rieammanian metrics. In general, the contraction notion refers to the contrac- Email addresses: yhyinhao02122575@163.com (Hao Yin), b.jayawardhana@rug.nl (Bayu Jayawardhana), s.trenn@rug.nl (Stephan Trenn). Preprint submitted to Automatica tion property of the entire state variables [9,5,2,10,4,1]. However, establishing the contraction property of only a portion of the state variables is not trivial. Wang et al. in [11] introduces the concept of partial contraction, which studies the contractivity of subsets of the state space. In [5], the concept of horizontal contraction is presented to study contraction property along particular directions. The notion of k-contraction, as defined in [13], establishes a contraction property applicable to a k-parallelotope. A recent study in [12] shows that under certain mild assumptions, partial contraction can lead to horizontal contraction, and horizontal contraction subsequently implies k-contraction. In this paper, we explore a general class of systems that admit noncontractive systems as commonly found in practice but can exhibit contraction property for particular output mappings. In control theory, the role of systems’ output is important as it represents the observable or measurable state of the system, with which we determine the control law to steer the input variable. Accordingly, many control problems are defined based on the use of systems’ output, such as output regulation problems [7] and output tracking control problems [6]. In this paper, we introduce the notion of output contraction to nonlinear time-varying systems with output, which posits that any pair of systems’ output converge to each other exponentially. This notion generalizes the classical notion of contraction to the class of systems that may not exhibit contraction 12 December 2023" 2312.06389v1,"Practical Scheme for Realization of a Quantum Battery Maryam Hadipour 2 , 1, ∗ Soroush Haseli , 1, 2, † and Saeed Haddadi 3, ‡ 1 Faculty of Physics, Urmia University of Technology, Urmia, Iran School of Physics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5531, Tehran, Iran 3 Faculty of Physics, Semnan University, P.O. Box 35195-363, Semnan, Iran (Dated: December 12, 2023) In this paper, we propose a practical scheme for a quantum battery consisting of an atom-cavity interacting system under a structured reservoir in the non-Markovian regime. We study a multiparameter regime for the cavity-reservoir coupling and reveal how these parameters affect the performance of the quantum battery. Our proposed scheme is simple and may be achievable for practical realization and implementation. Keywords: Quantum battery; Atom-cavity system; Non-Markovianity I. INTRODUCTION Traditional batteries that are still in use, such as lithium-ion, alkaline, and lead-acid batteries, operate based on electrochemical reactions that involve the motion of ions between two electrodes through an electrolyte. The performance of these batteries strongly depends on various factors such as the electrolyte composition, the materials used in electrodes, and the overall design. Quantum batteries (QBs) [1], on the other hand, are a novel concept that probes the potential of quantum mechanics to enhance energy storage. These batteries, at least in theory, can use quantum superposition and entanglement to store and recover energy more efficiently than traditional batteries [2, 3]. However, QBs are still in the early stages of development and face notable challenges in terms of stability, scalability, and practical implementation [4–6]. A typical model of the QB comprises two components, the battery charger and the battery holder. The latter, designed to prevent energy loss, is essentially isolated from the surrounding environment and is treated as a dissipation-less subsystem. To obtain energy, the battery holder must be coupled to the battery charger. After a limited charging period, the battery holder detaches from the battery charger, allowing energy storage and ultimately extraction of the required energy [7]. Interestingly, this basic bipartite model and other models of QB, along with its theoretical explorations in various forms, have been the subject of intensive QB research in recent years [8–22]. QBs illustrate an area of research at the intersection of quantum physics and energy storage, however, as mentioned above, their development has some potential challenges and limitations. For example, QBs rely on preserving quantum coherence [23–27], which is the ability of quantum systems to exist in a superposition of states. Practically speaking, preserving quantum coherence for ∗ maryam.hadipour@sci.uut.ac.ir † soroush.haseli@uut.ac.ir ‡ haddadi@semnan.ac.ir a sufficient period of time can be difficult due to some sources of decoherence [28–37]. In other words, a significant challenge is constructing a QB that can resist external effects and maintain quantum coherence in a real-world environment. Therefore, addressing environmental effects on the performance of QBs is necessary for their practical implementation and development. In this paper, we propose a theoretical scheme for a QB consisting of an atom-cavity interacting system under a structured (bosonic) reservoir in the non-Markovian regime [38–41]. We scrutinize a multi-parameter regime for the strength of cavity-reservoir coupling and demonstrate how these parameters affect the performance of the proposed QB. This scheme is simple yet complex enough for our goal, however, it is feasible for practical implementations. II. CAVITY-MEDIATED CHARGING PERFORMANCE OF QB The general system we are interested in studying includes a two-level system (qubit) considered a QB, a single-mode cavity, and a structured bosonic environment. A visual representation of our proposed scheme is illustrated in Fig. 1. The cavity acts as a mediator between the QB and the environment. To find the conditions under which the QB can be charged with better efficiency, two different scenarios for the environment will be considered; one is an environment with memory and the other is a memory-less environment. The Hamiltonian of the composite system in the rotating wave approximation can be written as [42, 43] H = H 0 + f (t)H I . (1) In the above equation, the function f (t) is the regulator of QB charging time. Its outcome equals 1 for t ∈ [0, τ ) with τ denoting the charging time of QB and is 0 for other values of t. In other words, this function plays the role of an on-and-off switch for the interaction of subsystems. It is assumed that at time t = 0, the QB will be connected to the cavity as well as the cavity to the environment. In the considered scenario, there exists no interaction" 2312.06402v1,"Structural Analysis of Vector Autoregressive Models * Christis Katsouris † Faculty of Social Sciences, University of Helsinki December 12, 2023 Abstract This set of lecture notes discuss key concepts for the structural analysis of Vector Autoregressive models for the teaching of Applied Macroeconometrics module. * I am grateful to Professor Markku Lanne and Professor Mika Meitz from the Faculty of Social Sciences, University of Helsinki for helpful conversations. Financial support from the Research Council of Finland (Grant 347986) is gratefully acknowledged. Address correspondence to Christis Katsouris, Faculty of Social Sciences, University of Helsinki, P.O. Box 17, FI-00014, Finland; email: christis.katsouris@finland.fi. † Dr. Christis Katsouris, is currently a Postdoctoral Researcher at the Faculty of Social Sciences, University of Helsinki. 1" 2312.06423v1,"SUBMITTED TO IEEE FOR PEER REVIEW. 1 MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Yuyang Zhou, Member, IEEE, Guang Cheng, Member, IEEE, Zongyao Chen, Student Member, IEEE, and Shui Yu, Fellow, IEEE Abstract—Machine learning (ML) has gained significant adoption in Android malware detection to address the escalating threats posed by the rapid proliferation of malware attacks. However, recent studies have revealed the inherent vulnerabilities of ML-based detection systems to evasion attacks. While efforts have been made to address this critical issue, many of the existing defensive methods encounter challenges such as lower effectiveness or reduced generalization capabilities. In this paper, we introduce a novel Android malware detection method, MalPurifier, which exploits adversarial purification to eliminate perturbations independently, resulting in attack mitigation in a light and flexible way. Specifically, MalPurifier employs a Denoising AutoEncoder (DAE)-based purification model to preprocess input samples, removing potential perturbations from them and then leading to correct classification. To enhance defense effectiveness, we propose a diversified adversarial perturbation mechanism that strengthens the purification model against different manipulations from various evasion attacks. We also incorporate randomized “protective noises” onto benign samples to prevent excessive purification. Furthermore, we customize a loss function for improving the DAE model, combining reconstruction loss and prediction loss, to enhance feature representation learning, resulting in accurate reconstruction and classification. Experimental results on two Android malware datasets demonstrate that MalPurifier outperforms the state-of-the-art defenses, and it significantly strengthens the vulnerable malware detector against 37 evasion attacks, achieving accuracies over 90.91%. Notably, MalPurifier demonstrates easy scalability to other detectors, offering flexibility and robustness in its implementation. Index Terms—Android Malware Detection, Machine Learning, Evasion Attacks, Adversarial Purification, Denoising Autoencoder. ✦ 1 I NTRODUCTION D UE to the popularity of the Android operating system, it has become the primary victim of malware attacks. In 2021, Zimperium reported that 2 billion new malware emerged in the wild [1], and Kaspersky detected 1,661,743 mobile malware or unwanted software installers in 2022 [2]. As a result, the prevalence of Android malware has grown exponentially in recent years, posing a significant threat to the security and privacy of mobile users worldwide. The magnitude of this threat has spurred the use of Machine Learning (ML) techniques, particularly Deep Learning (DL), to automate Android malware detection. Empirical evidence has shown that these approaches offer advanced performance in detecting malware (see, e.g., [3], [4], [5], [6], [7]), making them a promising avenue for mitigating this security concern. Unfortunately, ML-based detectors are vulnerable to adversarial examples, which are created by modifying nonfunctional instructions in executable programs of existing malware [8], [9], [10]. Adversarial examples can enable a range of attacks, including evasion attacks [11], [12], [13], poisoning attacks [14], [15], [16], or a combination of both [17]. • • • Yuyang Zhou, Guang Cheng, and Zongyao Chen are with the School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing 211189, China. E-mail: { yyzhou, chengguang, solar1s } @seu.edu.cn. Shui Yu is with the School of Computer Science, University of Technology Sydney, Ultimo, NSW 2007, Australia. E-mail: Shui.Yu@uts.edu.au. Guang Cheng is the corresponding author. In this study, we specifically narrow our focus to evasion attacks, which are designed to deceive ML-based detection during the testing phase. So far, adversarial training-based methods have shown great potential to safeguard ML models from evasion attacks [18], [19], [20]. By augmenting the training dataset with generated adversarial samples, adversarial training can increase the robustness of the trained model in future use. However, these methods still have certain disadvantages, including high computational costs [21] and a significant sacrifice in accuracy on clean data [22]. Furthermore, its effectiveness is strongly influenced by the similarity between the adversarial examples employed during the training and testing phases [23]. This may lead to overfitting of the model to specific perturbations, thereby negatively impacting its ability to generalize and detect unseen attacks. Another defense technique, known as adversarial purification [24], [25], [26], aims to remove potential perturbations from input samples, resulting in purified samples that can be correctly classified by the target classifier. The purification model is usually trained independently of the classification model and does not necessarily require class labels [27]. As a result, it can mitigate unseen threats in a plug-andplay manner without re-training the target classifier [28], leading to less training overhead and more flexible employment. Nevertheless, existing purification solutions for image classification are not easily applicable to Android malware detection due to significant differences. The input space of the image classifier is continuous, while malware features" 2312.06435v1,"Astronomy & Astrophysics manuscript no. DarkPatch December 12, 2023 ©ESO 2023 Zero-polarization candidate regions for calibration of wide-field optical polarimeters N. Mandarakas 1, 2,⋆ , G. V. Panopoulou 3 , V. Pelgrims 4 , S. B. Potter 5, 6 , V. Pavlidou 1, 2 , A. Ramaprakash 2, 7, 8 , K. Tassis 1, 2 , D. Blinov 2 , S. Kiehlmann 2 , E. Koutsiona 1 , S. Maharana 5 , S. Romanopoulos 1, 2 , R. Skalidis 9 , A. Vervelaki 1 , S. E. Clark 10, 11 , J. A. Kypriotakis 1, 2 A. C. S. Readhead 2, 9 1 Department of Physics, University of Crete, Vasilika Bouton, 70013 Heraklion, Greece Institute of Astrophysics, Foundation for Research and Technology – Hellas, 100 Nikolaou Plastira str. Vassilika Vouton, 70013 Heraklion, Crete, Greece 3 Department of Space, Earth & Environment, Chalmers University of Technology, SE-412 93 Gothenburg, Sweden 4 Université Libre de Bruxelles, Science Faculty CP230, B-1050 Brussels, Belgium 5 South African Astronomical Observatory, PO Box 9, Observatory, 7935, Cape Town, South Africa 6 Department of Physics, University of Johannesburg, PO Box 524, Auckland Park 2006, South Africa 7 Cahill Center for Astronomy and Astrophysics, California Institute of Technology, 1216 E California Blvd, Pasadena, CA, 91125, USA 8 Inter-University Centre for Astronomy and Astrophysics, Post Bag 4, Ganeshkhind, Pune - 411 007, India 9 Owens Valley Radio Observatory, California Institute of Technology, Pasadena, CA, 91125, USA 10 Department of Physics, Stanford University, Stanford, CA 94305, USA 11 Kavli Institute for Particle Astrophysics & Cosmology, P.O. Box 2450, Stanford University, Stanford, CA 94305, USA 2 Received – / Accepted – ABSTRACT Context. Calibration of optical polarimeters relies on the use of stars with negligible polarization (unpolarized standard stars) for determining the instrumental polarization zero-point. For wide-field polarimeters, calibration is often done by imaging the same star over multiple positions in the field of view - a process which is time-consuming. A more effective technique is to target fields containing multiple standard stars. While this method has been used for fields with highly polarized stars, there are no such sky regions with well-measured unpolarized standard stars. Aims. We aim to identify sky regions with tens of stars exhibiting negligible polarization, which are suitable for zero-point calibration of wide-field polarimeters. Methods. We selected stars in regions with extremely low reddening, located at high Galactic latitudes. We targeted four ∼ 40 ′ × 40 ′ fields in the northern, and eight in the southern Equatorial hemisphere. Observations were carried out at the Skinakas Observatory and the South African Astronomical Observatory respectively. Results. We find two fields in the North and seven in the South with mean polarization lower than p < 0.1%. Conclusions. At least nine out of twelve fields can be used for zero-point calibration of wide-field polarimeters. 1. Introduction To date, the development of optical polarimetry instrumentation has primarily emphasized the creation of instruments tailored for single-source observations or with limited field-of-view capabilities. The calibration process for these instruments typically involves utilizing polarimetric standard stars (e.g. Blinov et al. 2023). When there is a need to calibrate the entire field of view, calibration methods often employ techniques such as rastering, where a star of known polarization is placed in different positions of the CCD to assess the instrument-induced polarization variations accross the field (e.g. King et al. 2014). This can be very time-consuming and, therefore inefficient for wide field instruments with lots of CCD pixels, especially in the scheme of wide-field surveys. The domain of optical polarimetry is on the verge of a significant transition as it enters the era of large-area surveys like Pasiphae (Tassis et al. 2018), SouthPol (Magalhães et al. 2012), and VSTPol (Covino et al. 2020). These surveys will utilize polarimeters equipped with unprecedentedly wide fields of view. However, the calibration process for these wide-field polarimeters presents a formidable challenge, particularly considering the surveys’ aim of achieving high accuracy levels of p ≲ 0.1% to fulfill their scientific objectives. Pasiphae is a pioneering survey with the primary objective of mapping the polarization of millions of stars located away from the Galactic plane. The scientific goals of the project include the determination of dust cloud distributions and their properties along each line of sight, as well as the investigation of the magnetic field structure within our Galaxy (Pelgrims et al. 2023). Its findings will facilitate the accurate removal of the dust polarization foreground for surveys targeting the detection of the imprint of the primordial polarization B-modes on the cosmic microwave background. (e.g. Polnarev 1985; Kamionkowski et al. 1997). Pasiphae will utilize two Wide-Area Linear Optical Polarimeters (WALOPs) which will operate from both the southern and northern hemispheres and will be mounted on the South African Astronomical Observatory’s (SAAO) 1 m telescope 1 , and Skinakas Observatory 1.3 m telescope 2 , respectively. The descrip- 1 ⋆ nmandarakas@physics.uoc.gr 2 https://www.saao.ac.za/ https://skinakas.physics.uoc.gr/ Article number, page 1 of 14" 2312.06441v1,"Revisiting Graph-based Fraud Detection in Sight of Heterophily and Spectrum Fan Xu 1 , Nan Wang 2 * , Hao Wu 1 , Xuezhi Wen 2 , Xibin Zhao 3 * 1 University of Science and Technology of China Beijing Jiaotong University 3 Tsinghua University {markxu, wuhao2022}@mail.ustc.edu.cn; {wangnanbjtu, 22126399}@bjtu.edu.cn; zxb@tsinghua.edu.cn 2 Abstract Graph-based fraud detection (GFD) can be regarded as a challenging semi-supervised node binary classification task. In recent years, Graph Neural Networks(GNN) have been widely applied to GFD, characterizing the anomalous possibility of a node by aggregating neighbor information. However, fraud graphs are inherently heterophilic, thus most of GNNs perform poorly due to their assumption of homophily. In addition, due to the existence of heterophily and class imbalance problem, the existing models do not fully utilize the precious node label information. To address the above issues, this paper proposes a semi-supervised GNN-based fraud detector SEC-GFD. This detector includes a hybrid filtering module and a local environmental constraint module, the two modules are utilized to solve heterophily and label utilization problem respectively. The first module starts from the perspective of the spectral domain, and solves the heterophily problem to a certain extent. Specifically, it divides the spectrum into multiple mixed frequency bands according to the correlation between spectrum energy distribution and heterophily. Then in order to make full use of the node label information, a local environmental constraint module is adaptively designed. The comprehensive experimental results on four real-world fraud detection datasets show that SEC-GFD outperforms other competitive graph-based fraud detectors. Introduction With the rapid development of the Internet, various fraudulent entiies emerge in fraud activities, and the huge losses caused by this have attracted continuous attention from industry, academia and state agencies(Wang et al. 2018; Pourhabibi et al. 2020; Liu et al. 2021a; Zhang et al. 2021). For instance, fraudulent behaviors aimed at online payment have caused huge property losses to clients; fraudulent or malicious comments on websites may bring negative effects on merchants and consumers. In recent years, graph-based fraud detection methods(Hooi et al. 2017; Qin et al. 2022) have been widely used in practical applications. Using entities in fraud scenarios as nodes and interactions between entities as edges, thus graph-level fraud detection can be achieved. Furthermore, based on the constructed fraud graph, as a deep neu- * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. ral network for graph representation learning, Graph Neural Network(GNN) has been demonstrated to be effective in this task. Specifically, GNN employs neural modules to aggregate neighbor information and update node representations, enabling the discrimination of fraudulent entities. However, fraud detection scenarios are inherently heterophily(Zhu et al. 2021), i.e., target nodes (like node 5 in Fig. 1) and their direct neighbors are prone to different class labels or features. In practical applications, fraudulent entities may use benign entities as springboards to perform high-order interactions with multi-hop neighbors to accomplish fraudulent actions or transmit fraudulent information(for example, fraud nodes 3 and 6 are two-hop neighbors in Fig. 1). For instance, in financial transaction networks(Akoglu, Tong, and Koutra 2015), fraudsters often use non-fraudulent users to conduct transactions. Due to the existence of heterophily, the performance of conventional graph neural network is poor. This is because vanilla GNN is naturally a low-pass filter, which forces the representation of adjacent nodes to be similar during the information aggregation process. Then it may destroy the discriminative information of anomaly nodes. Furthermore, within the domain of fraud detection, heterophily graph datasets exhibit highly imbalanced class distribution properties. This phenomenon results in anomaly nodes being submerged in normal nodes, which manifests as high homophily of normal nodes and high heterophily of anomaly nodes. This is also called the common ”camouflage” problem(Zhang et al. 2023) in fraud detection scenarios. Moreover, current semi-supervised fraud detection methods based on Graph Neural Networks (GNNs) suffer from limitations in terms of label utilization. These approaches typically learn node representations through a message passing mechanism, extract node embeddings from the final layer of the network, and incorporate label information during the training process. Evidently, these approaches overlook the intricate high-order associations between node label information, node characteristics, and their contextual surroundings. The current paramount concern entails addressing the heterophily issue within the context of extreme category imbalance. The advanced methods can be divided into two types. The first type of the methods is to design a new message aggregation mechanism to simultaneously or separately consider the characteristics of homophily and heterophily edges." 2312.06453v1,"Semantic Image Synthesis for Abdominal CT Yan Zhuang, Benjamin Hou, Tejas Sudharshan Mathai, Pritam Mukherjee, Boah Kim, Ronald M. Summers ( ) Imaging Biomarkers and Computer-Aided Diagnosis Laboratory, Department of Radiology and Imaging Sciences, National Institutes of Health Clinical Center {yan.zhuang2,benjamin.hou,tejas.mathai pritam.mukherjee,boah.kim,rsummers}@nih.gov Abstract. As a new emerging and promising type of generative models, diffusion models have proven to outperform Generative Adversarial Networks (GANs) in multiple tasks, including image synthesis. In this work, we explore semantic image synthesis for abdominal CT using conditional diffusion models, which can be used for downstream applications such as data augmentation. We systematically evaluated the performance of three diffusion models, as well as to other state-of-the-art GAN-based approaches, and studied the different conditioning scenarios for the semantic mask. Experimental results demonstrated that diffusion models were able to synthesize abdominal CT images with better quality. Additionally, encoding the mask and the input separately is more effective than naïve concatenating. Keywords: CT · Abdomen · Diffusion model · Semantic Image Synthesis 1 Introduction Semantic image synthesis aims to generate realistic images from semantic segmentation masks [17]. This field has a broad range of applications that range from data augmentation and anonymization to image editing [13,12,14,7,20,4]. For instance, Lau et al. used a conditional Generative Adversarial Network (GAN) and semantic label maps to synthesize scar tissues in cardiovascular MRI for data augmentation [12]. Hou et al. employed a StyleGAN to synthesize pathological retina fundus images from free-hand drawn semantic lesion maps [7]. Shin et al. utilized a conditional GAN to generate abnormal MRI images with brain tumors, and to serve as an anonymization tool [20]. Mahapatra et al. leveraged a conditional GAN to synthesize chest x-ray images with different disease characteristics by conditioning on lung masks [13]. Blanco et al. proposed editing histopathological images by applying a set of arithmetic operations in the GANs’ latent space [4]. The main objectives of these works were to address the issues of data scarcity, given the time-consuming, labor-intensive, and extremely costly of obtaining high-quality data and annotations [5]. These studies have demonstrated" 2312.06463v1,"On the Landau gauge ghost-gluon-vertex close to and in the conformal window Fabian Zierler a,b , Reinhard Alkofer a a Institute for Physics, University of Graz, NAWI Graz, Universitätsplatz 5, 8010 Graz, Austria b Department of Physics, Faculty of Science and Engineering, Swansea University, Singleton Park, SA2 8PP Swansea, Wales, United Kingdom Abstract The gauge-boson, ghost and fermion propagators as well as the gauge-boson–ghost vertex function are studied for SU(N ), Sp(2N ) and SO(N ) gauge groups. We solve a set of coupled Dyson-Schwinger equations in Landau gauge for a variable, fractional number N f of massless fermions in the fundamental representation. For large N f we find a phase transition from a chirally broken into a chirally symmetric phase that is consistent with the behaviour expected inside the conformal window. Even in the presence of fermions the gauge-boson–ghost-vertex dressing remains small. In the conformal window this vertex shows the expected power law behaviour. It does not assume its tree-level value in the far infrared, but the respective dressing function is a constant greater than one. 1. Introduction Strongly interacting gauge theories with fermions are both a cornerstone in the Standard Model (SM) of particle physics in the form of Quantum Chromodynamics (QCD) and provide a multitude of Beyond the Standard Model (BSM) models. Due to asymptotic freedom [1, 2] they are automatically ultraviolet (UV) complete and can be treated perturbatively at high energies. In addition, the perturbative two-loop beta function of confining asymptotically free gauge theories such as QCD suggests the existence of an infrared (IR) conformal fixed-point [3, 4] for a sufficient number of massless fermions N f crit . These (near-)conformal theories have gained some interest as candidate theories for a walking technicolour scenario, see, e.g., [5, 6] for recent reviews. Apart from that confining gauge theories with several fermions are also considered in the context of Dark Matter [7, 8] models in different gauge groups and even using different fermion representations. Due to the confining nature of such theories a study of the mid- to low-energy regime of strongly interacting theories as well as Email addresses: fabian.zierler@swansea.ac.uk (Fabian Zierler), reinhard.alkofer@uni-graz.at (Reinhard Alkofer) Preprint submitted to Physics Letters B bound-state properties necessitates the use of nonperturbative methods such as lattice field theory or functional methods like the functional renormalization group (FRG) or Dyson-Schwinger equations (DSEs). Lattice results on the onset of the conformal window are mostly available for SU(2) and SU(3) gauge theories with fermions in the fundamental and adjoint representation (see, e.g., [9, 10] for reviews) and the exact values of N f crit are often still debated. Due to the high computational cost for light fermions as well large colour groups and fermion representations an exhaustive study of different gauge groups and fermion representations is (currently) prohibitively expensive using lattice methods. Additionally, and maybe even more importantly, theories with a walking coupling constant require to consider quantities at vastly different scales, cf. the discussion in the review [9]. Functional methods have so far explored SU(3) gauge theories. Within DSEs a study of the Landau gauge propagators in SU(3) has been performed [11]. A value of N f crit ≈ 4.5 has been obtained which is at odds with other methods. This has been attributed to lack of a self-consistent inclusion of vertex functions. Using the FRG a value of N f crit = 10.0 +1.84 −0.92 [12] has been obtained. This is consistent with many lattice studies as well as a December 12, 2023" 2312.06475v1,"NetROS-5G: Enhancing Personalization through 5G Network Slicing and Edge Computing in Human-Robot Interactions Anestis Dalgkitsis Christos Verikoukis a.dalgkitsis@iquadrat.com Research & Development Department, Iquadrat Informatica Barcelona, Spain cveri@ceid.upatras.gr Computer Engineering & Informatics Department, University of Patras Patras, Greece Iquadrat Informatica Barcelona, Spain ISI/ATHENA Athens, Greece ABSTRACT 1 Robots are increasingly being used in a variety of applications, from manufacturing and healthcare to education and customer service. However, the mobility, power, and price points of these robots often dictate that they do not have sufficient computing power on board to run modern algorithms for personalization in human-robot interaction at desired rates. This can limit the effectiveness of the interaction and limit the potential applications for these robots. 5G connectivity provides a solution to this problem by offering high data rates, bandwidth, and low latency that can facilitate robotics services. Additionally, the widespread availability of cloud computing has made it easy to access almost unlimited computing power at a low cost. Edge computing, which involves placing compute resources closer to the action, can offer even lower latency than cloud computing. In this paper, we explore the potential of combining 5G, edge, and cloud computing to provide improved personalization in human-robot interaction. We design, develop, and demonstrate a new framework, entitled NetROS-5G, to show how the performance gained by utilizing these technologies can overcome network latency and significantly enhance personalization in robotics. Our results show that the integration of 5G network slicing, edge computing, and cloud computing can collectively offer a cost-efficient and superior level of personalization in a modern human-robot interaction scenario. The incorporation of advanced algorithms in robotics has led to an increasing demand for more powerful computing resources. However, the onboard computing capabilities of robots are frequently limited, and may not be able to keep pace with the rapid advancements in the field. In light of this, cloud computing has emerged as a viable solution, offering on-demand access to an abundance of computing resources. Edge computing on the other hand, provides low latency access to computing resources in close proximity to the robot, which can reduce the delay in communication between the robots and the computational resources. The emergence of 5G networks has further enabled the availability of low-latency access to edge computing resources, leading to improvements in the overall responsiveness. The integration of cloud computing, edge computing, and 5G networks has the potential to significantly expand the capabilities of robots, lower their production price and enhance the personalization capabilities and naturalness of Human-Robot Interaction (HRI), via low-latency access to even further computational resources. 5G network slicing is a feature of the 5G networks that allows for the creation of multiple virtual networks within a physical network, each with its own specific characteristics and capabilities. Edge computing, on the other hand, is a method of processing data closer to the source of the data, rather than sending it to a centralized location for processing. When combined, 5G network slicing and edge computing can provide improved human-robot interaction and personalization by allowing for the creation of dedicated virtual networks specifically designed for each use-case. These virtual networks can be optimized for low-latency, high-bandwidth communication, which is crucial for real-time interactions between humans and robots. Additionally, edge computing can be used to process sensor data from robots in real-time, allowing them to make more informed decisions and respond to human input more quickly. This can lead to more natural and intuitive interactions between humans and robots, as well as more personalized experiences. Our key idea is that the human-robot interactions could be enhanced by the use of modern 5G and beyond networking in conjunction with edge and cloud computing. This presents a business market opportunity for cheaper robots with better performance, that offer better personalization. To achieve this, we design and implement a framework based on the functions of 5G network slicing, edge and cloud computing KEYWORDS 5G, edge computing, cloud computing, network slicing, personalized robotics ACM Reference Format: Anestis Dalgkitsis and Christos Verikoukis. 2023. NetROS-5G: Enhancing Personalization through 5G Network Slicing and Edge Computing in Human-Robot Interactions. In Proceedings of (CONCATENATE - HRI). ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CONCATENATE - HRI, March 13, 2023, Stockholm, SE © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION" 2312.06492v1,"Phase transitions of LaMnO 3 and SrRuO 3 from DFT + U based machine learning force fields simulations Thies Jansen, ∗ Geert Brocks, and Menno Bokdam † University of Twente, Faculty of Science and Technology and MESA+ Institute for Nanotechnology, P.O. Box 217, 7500 AE Enschede, The Netherlands (Dated: December 12, 2023) Perovskite oxides are known to exhibit many magnetic, electronic and structural phases as function of doping and temperature. These materials are theoretically frequently investigated by the DFT+U method, typically in their ground state structure at T = 0. We show that by combining machine learning force fields (MLFFs) and DFT+U based molecular dynamics, it becomes possible to investigate the crystal structure of complex oxides as function of temperature and U . Here, we apply this method to the magnetic transition metal compounds LaMnO 3 and SrRuO 3 . We show that the structural phase transition from orthorhombic to cubic in LaMnO 3 , which is accompanied by the suppression of a Jahn-Teller distortion, can be simulated with an appropriate choice of U . For SrRuO 3 , we show that the sequence of orthorhombic to tetragonal to cubic crystal phase transitions can be described with great accuracy. We propose that the U values that correctly capture the temperature-dependent structures of these complex oxides, can be identified by comparison of the MLFF simulated and experimentally determined structures. I. INTRODUCTION Complex transition metal oxides, in particular those with a perovskite structure, (ABO 3 ), posses rich phase diagrams, in which many phases with remarkable physical properties can be identified, such as high T c superconductivity [1], ferromagnetism [2], ferroelectricity, or multiferroic properties, and metal to insulator transitions under external fields, pressure, doping or temperature change [3]. Many such properties are not only interesting because of fundamental science, but they may also lead to new types of applications in oxide electronics [4, 5]. The properties arise due to the intricate interplay between the structure and the electronic interactions, leading to charge order, magnetic order, and/or orbital order [5, 6]. The emergence of different structural phases is therefore strongly tied to the nature of the electronic structure. Many of the interesting phases occur at a finite temperature (T > 0 K), and over a limited temperature range. This calls for simulations that can describe the physics at elevated temperatures. Ordinary molecular dynamics (MD) is of limited use, as it is based upon fixed force fields, which do not consider changes in the electronic structure. In the materials discussed above, the latter is intimately coupled to, if not driving, the phase transitions. Ab initio MD would be an option, but unfortunately it is very time consuming, as in every MD step a density functional theory (DFT) calculation has to be performed to obtain the total energy and the forces on the atoms. In practice, only processes occurring over very small time scales can then be simulated. Recent developments in machine-learning (ML) interatomic potentials open up new computational routes [7– 10]. Here we apply an approach where a ML model of ∗ t.jansen@utwente.nl † m.bokdam@utwente.nl the potential energy surface is trained on-the-fly during ab initio MD runs [11] using limited supercell sizes and time scales. Subsequently, the machine learned force field (MLFF) is then used to perform simulations on much larger supercells and time scales. On the one hand, this approach takes the advantages of ab initio MD, i.e., it incorporates the information about the electronic structure. On the other hand, a MLFF greatly reduces the computational resources required to run the MD simulations, thereby enabling the ensemble sizes and time scales required to draw statistically valid conclusions. In the past three years this type of on-the-fly MLFFs has been successfully employed in various applications, such as phase transitions in hybrid lead halide perovskites [12, 13], superionic transport in AgI[14], melting of solids [15], surface reconstruction of palladium adsorbed on silver [16], NMR 1 H- 1 H dipolar coupling in mixed hybrid lead halide perovskites [17], the structure-band gap relationship in SrZrS 3 [18], and the catalysis dynamics of H/Pt [19]. The MLFFs in those studies are based upon results obtained with standard generalized gradient approximation (GGA) functionals. Such functionals, however, tend not to describe interactions between localized electrons very well, such as they occur on transition metal ions in oxides, for instance. The description can be improved significantly by adding a parametrized model electronelectron interaction on the metal ions, leading to the DFT+U method [20]. The latter is designed to capture some of the essential physics of electrons localized in atomic shells [20–24]. Although, in principle, more accurate methods for describing local correlations exist [23, 25], the DFT+U method is cost efficient and currently the practical electronic structure method of choice for calculations on systems with sizeable unit cells involving localized electrons, as they occur in many transition metal compounds [23, 25, 26]. In this paper we address the question whether the on-" 2312.06493v1,"On One Dimensional Advection - Diffusion Equation with Variable Diffusivity Eeshwar Prasad Poudel ∗ , Pitambar Acharya † , Jeevan Kafle ‡ , Shreeram Khadka § December 12, 2023 Abstract In this paper, we address a time-dependent one-dimensional linear advectiondiffusion equation with Dirichlet homogeneous boundary conditions. The equation is solved both analytically, using separation of variables, and numerically, employing the finite difference method. The computational output includes three dimensional (3D) plots for solutions, focusing on pollutants such as Ammonia, Carbon monoxide, Carbon dioxide, and Sulphur dioxide. Concentrations, along with their respective diffusivities, are analyzed through 3D plots and actual calculations. To comprehend the diffusivity-concentration relationship for predicting pollutant movement in the air, the domain is divided into two halves. The study explores the behavior of pollutants with higher diffusivity entering regions with lower diffusivity, and vice versa, using 2D and 3D plots. This task is crucial for effective pollution control strategies, and safeguarding the environment and public health. Keywords: Advection Diffussion Equation, finite difference method, diffussivity 1 Introduction Advection is defined as a transmission of a matter from one place to another inside a moving fluid [1]. Diffusion can be described as the changes of molecules ∗ Institute of Science and Technology, Central Department of Mathematics, Tribhuwan University, Nepal; Tri-Chandra Multiple Campus, Nepal (eeshwarpoudel475@gmail.com) † Department of Applied Mathematics, University of Alabama at Birmingham, AL, USA (pacharya@uab.edu) ‡ Institute of Science and Technology, Central Department of Mathematics, Tribhuwan University, Nepal (jeevankafle@yahoo.com) § Institute of Science and Technology, Central Department of Mathematics, Tribhuwan University, Nepal (shreeramkhadka@gmail.com) 1" 2312.06495v1,"Detecting Events in Crowds Through Changes in Geometrical Dimensions of Pedestrians Matheus Schreiner Homrich da Silva, Paulo Brossard de Souza Pinto Neto, Rodolfo Migon Favaretto, Soraia Raupp Musse School of Technology, PUCRS, Porto Alegre, Rio Grande do Sul Email: matheus.schreiner,paulo.brossard,rodolfo.favaretto@acad.pucrs.br, soraia.musse@pucrs.br Abstract—teste Security is an important topic in our contemporary world, and the ability to automate the detection of any events of interest that can take place in a crowd is of great interest to a population. We hypothesize that the detection of events in videos is correlated with significant changes in pedestrian behaviors. In this paper, we examine three different scenarios of crowd behavior, containing both the cases where an event triggers a change in the behavior of the crowd and two video sequences where the crowd and its motion remain mostly unchanged. With both the videos and the tracking of the individual pedestrians (performed in a pre-processed phase), we use Geomind, a software we developed to extract significant data about the scene, in particular, the geometrical features, personalities, and emotions of each person. We then examine the output, seeking a significant change in the way each person acts as a function of the time, that could be used as a basis to identify events or to model realistic crowd actions. When applied to the games area, our method can use the detected events to find some sort of pattern to be then used in agent simulation. Results indicate that our hypothesis seems valid in the sense that the visually observed events could be automatically detected using GeoMind. Keywords-Game Analytics; Processamento Gráfico em Jogos. I. I NTRODUCTION As the world keeps on showing signs of nonstop violence, security is still a big issue and also an area with many challenges and problems to be solved. With that said, our work primarily focuses on overall safety and secondarily on how can our work improve game experiences. One important topic in this area is event detection. Many methods have been proposed to deal with that as discussed in Section II. However, in many of them, an event is characterized by a difference in terms of observed pattern, that can be local but in most cases is global [1]. In our work, we want to use the individual differences over time in order to detect events, so no training phases of thresholds have to be specified once we observe and extrapolate many aspects of the individuals, such as emotions, personalities and etc. Our main hypothesis is that GeoMind 1 software [2] can be used to detect events in video sequences without the need 1 GeoMind can be obtained at https://www.rmfavaretto.pro.br/geomind of training or events specification. GeoMind was developed by Favaretto and aims to extract features from pedestrians in video sequences such as geometric dimensions, personalities, cultural aspects, and emotions status frame-by-frame. As we are going to show in obtained results, GeoMind seems to be an appropriate software and methodology to detect pedestrian events in the video. The remainder of this paper is organized as follows: Section II briefly describes some methods existent in the literature. SectionIII details the method we used in this paper while Section IV presents three short sequences used to discuss our hypothesis. II. R ELATED W ORKS The understanding of videos containing pedestrians is important in simulation and computer vision areas [3], [4], [5]. Regarding unusual event detection in crowds, Adam et al. [6] proposes an approach based on multiple local monitors which collect low-level statistics, and do not rely on object tracking. Almeida et al. [7] uses an approach based on 2D motion histograms in time, and also local effects, to identify motion pattern changes in human crowds that could be related to unusual events in crowds. Tran et al. [1] propose a search for spatiotemporal paths in video space to detect anomalies in video sequences, which is used to detect a range of events, including anomaly event detection, walking person detection, and running detection. Mehran et al. [8] proposes a Social Force model to detect unusual crowd behavior; in brief, by means of the average optical flow of the scene, a force flow is calculated, which is used to model the normal behavior of the scene. Using that flow as its reference point, it is then possible to detect and localize abnormal events in the video. GeoMind [2] is a software capable of extracting emotional, personality, and cultural aspects from a solely thorough the movement of pedestrians; as specified in Section III. It is the tool we have chosen to extract crowd data in this paper." 2312.06497v1,"MieAI: A neural network for calculating optical properties of internally mixed aerosol in atmospheric models Pankaj Kumar, Heike Vogel, Julia Bruckert, Lisa Janina Muth, and Gholam Ali Hoshyaripour Institute of Meteorology and Climate Research, Karlsruhe Institute of Technology, Karlsruhe, Germany Correspondence: Pankaj Kumar (pankaj.kumar@kit.edu) Abstract. Aerosols influence weather and climate by interacting with radiation through absorption and scattering. These effects heavily rely on the optical properties of aerosols, which are mainly governed by attributes such as morphology, size distribution, and chemical composition. These attributes undergo continuous changes due to chemical reactions and aerosol micro-physics, resulting in significant spatio-temporal variations. Most atmospheric models struggle to incorporate this variability because they use precalculated tables to handle aerosol optics. This offline approach often leads to substantial errors in estimating the radiative impacts of aerosols alongwith posing significant computational burdens. To address this challenge, we introduce a novel and computationally efficient machine learning approach called MieAI. It allows for online calculation of the optical properties of internally mixed aerosols with a lognormal size distribution. Importantly, MieAI fully incorporates the variability in aerosol chemistry and microphysics. Our evaluation of MieAI against traditional Mie calculations, using number concentrations from ICOsahedral Nonhydrostatic model with Aerosol and Reactive Trace gases (ICON- ART) simulations, demonstrates that MieAI exhibits excellent predictive accuracy for aerosol optical properties. MieAI achieves this with errors well within 10%, and it operates more than 1000 times faster than the benchmark approach of Mie calculations. Due to its generalized nature, the MieAI approach can be implemented in any chemistry transport model which represents aerosol size distribution in the form of log-normally distributed internally mixed modes. This advancement has the potential to replace frequently employed lookup tables and play a substantial role in the ongoing attempts to reduce uncertainties in estimating aerosol radiative forcing. 1 Introduction Aerosol particles have a significant impact on Earth’s radiation balance due to their interactions with solar radiation and clouds. Particles’ ability to scatter and absorb radiation, known as the aerosol direct effect, is influenced by their mixing state – how different aerosol types are distributed within the population (Riemer et al., 2019; Jacobson, 2001). This mixing state can range from external mixing (single species) to internal mixing (mixture of species). Newly emitted aerosols usually have external mixing, while aging processes lead to internal mixing. Aerosol particles consist of diverse organic and inorganic components, showing significant variability in composition and abundance across time and space. Previous studies emphasize the importance of mixing state in understanding aerosols’ optical properties (AOPs) (Yao et al., 2022; Koike et al., 2014; Wang et al., 2021; Riemer et al., 2019). For example, studies demonstrate a greater positive forcing for internally mixed black carbon aerosols under the assumption of core-shell mixing in contrast to homogeneous volume-mixing and external mixing scenarios (Jacobson, 2001; Yu et al., 2006; Bond et al., 2006b; Zhang et al., 2008; Moffet and Prather, 2009; Lack and Cappa, 2010). Accurately modeling aerosol populations and predicting their impact on air quality, weather, and climate has long been a major challenge. Despite a good understanding of the underlying physics, resolving many small-scale processes, especially within atmospheric models, remains difficult. Precise quantification of AOPs, including mass extinction coefficient (k e ), single-scattering albedo (ω), and asymmetry factor (g) are crucial for improving the forecasting capabilities of the atmospheric composition models (ACMs). Accurate representation of AOPs of internally mixed particles remains a significant challenge in ACMs (Riemer et al., 2019; Brown et al., 2021). Currently, many ACMs use large" 2312.06505v1,"Grounded Question-Answering in Long Egocentric Videos Shangzhe Di CMIC, Shanghai Jiao Tong University Weidi Xie CMIC, Shanghai Jiao Tong University dishangzhe@sjtu.edu.cn weidi@sjtu.edu.cn Abstract Existing approaches to video understanding, mainly designed for short videos from a third-person perspective, are limited in their applicability in certain fields, such as robotics. In this paper, we delve into open-ended questionanswering (QA) in long, egocentric videos, which allows individuals or robots to inquire about their own past visual experiences. This task presents unique challenges, including the complexity of temporally grounding queries within extensive video content, the high resource demands for precise data annotation, and the inherent difficulty of evaluating open-ended answers due to their ambiguous nature. Our proposed approach tackles these challenges by (i) integrating query grounding and answering within a unified model to reduce error propagation; (ii) employing large language models for efficient and scalable data synthesis; and (iii) introducing a close-ended QA task for evaluation, to manage answer ambiguity. Extensive experiments demonstrate the effectiveness of our method, which also achieves stateof-the-art performance on the QAEgo4D and Ego4D-NLQ benchmarks. We plan to publicly release the codes, model, and constructed datasets for future research. t=0 t=T Question: where did I put lettuce? Temporal window: 20-50s Choices: (A) pantry (B) refrigerator (C) cupboard (D) draw Answer: in the fridge / (B) refrigerator Figure 1. We propose a unified model for addressing grounded question answering in long egocentric videos, i.e., simultaneously identifying the temporal window to a question, generating answers in natural language (OpenQA task), or picking answers from candidate choices (CloseQA task). tions about an egocentric video, e.g., “where did I put lettuce”, we aim to build a visual system that can answer the raised question in free-form language. This task serves two purposes: enhancing episodic memory [37], i.e., allowing a person or robot to ask questions on the fly about their own past visual experience; or probing the multi-modal reasoning abilities of deep models. Question-answering (QA) in long egocentric videos is challenging, primarily due to the complexity of temporally grounding and generate answers to the queries within extensive video content. A pioneer work, overlooking the importance of query grounding, achieves unsatisfactory QA performance that merely outperforms “blind guessing” [3]. On the other hand, research about temporal grounding in long egocentric videos, while achieving good progress, is limited in practical uses without the QA ability. A potential fix would be chaining models from the two areas, i.e., starting by localizing the temporal window to which the question relates, and followed by answering based on the corresponding video context. However, such method is often ineffective due to error propagation. To address these challenges, we propose to train a unified model for simultaneous query grounding and answering, as shown in Fig. 1. The unified training has three advantages: First, by training the grounding task, the model can better grasp query-relevant information from the long videos, which is helpful for effective QA; 1. Introduction In the literature, existing video perception tasks have primarily focused on videos in third-person view, for example, action recognition [4, 12, 15], video-language grounding [10, 17, 31], and video question-answering [18, 39, 41], these videos are short, e.g., typically ranging from 10 seconds to one minute. Until recently, the proposal of Ego4D dataset [13] re-ignites the interest of video understanding from egocentric views, where the inputs are normally long, continuous video streams from the first-person point of view, i.e., seeing the world through the eyes of an agent actively engaged with its environment, which resembles an important step towards deploying vision models into realworld scenarios, such as robotics and augmented reality. In this paper, we consider question answering (QA) in long, egocentric videos, as illustrated in Fig. 1. Given ques- 1" 2312.06521v1,"Optimal Control of Fluid Dosing in Hemorrhage Resuscitation Jacob Grant College of Aeronautics and Engineering Kent State University Kent, Ohio jgrant29@kent.edu Hossein Mirinejad College of Aeronautics and Engineering Kent State University Kent, Ohio hmiri@kent.edu Abstract— Fluid resuscitation, also called fluid therapy, is commonly used in treatment of critical care patients. Of the variables inherent to fluid therapy treatment, fluid infusion types are well-studied, but volumetric optimization is not. Automated fluid resuscitation systems employ computational control algorithms along with physiological sensors and actuators to automatically adjust the fluid infusion dosage in hemorrhage scenarios. Most automated hemorrhage resuscitation control algorithms implemented to date are of empiric nature and not effective in the presence of clinical disturbances. This work presents preliminary results of a novel controller based on optimal control approach for automated fluid therapy systems. A receding horizon controller is designed to automatically adjust fluid infusion rate in hemorrhagic situations. The proposed control approach aims to address the inefficiency of current resuscitation control algorithms in finding the accurate fluid dosage adjustments. Performance of the proposed approach is compared against a proportional-integral-derivative (PID) controller for a simulated hemorrhage scenario. hemodynamic endpoint such as blood volume or arterial pressure to automatically adjust the fluid infusion dosage in different scenarios e.g., hemorrhage or hemorrhaging shock [5- 10]. In [6], a rule-based control algorithm (decision table) based on the pulse pressure variation was designed for the fluid management of a simulated hemorrhage scenario. In [7], a model-based controller with volumetric feedback built and regulated an individualized control law using a low-order lumped-parameter model. In [8], a fuzzy logic controller was used targeting mean arterial blood pressure (MAP) as the endpoint during three separate bleeds. The integration of a proportional-integral control algorithm, which utilizes the error value in a ratio to the output value to determine subsequent correctional values, was explored in [9]. These control approaches lack the capability of accurately adjusting the infusion dosage and are not effective in the presence of clinical disturbances due to their ad-hoc and empiric nature, as demonstrated in the literature [5, 10]. Keywords—Automated fluid management, fluid resuscitation control, radial basis function interpolation, RBF-Galerkin method This paper presents an advanced control algorithm based on optimal control design techniques for automated fluid management. By formulating fluid resuscitation as an optimal control problem, where the target variable to optimize is the patient’s blood volume and input variables are both fluid infusion and hemorrhage rate, the RBF-Galerkin optimization method can be applied to efficiently solve the optimal control problem. RBF-Galerkin is a high-accuracy numerical method recently developed by Mirinejad et al [11] for solving constrained optimal control problems. A receding horizon controller (RHC) based on the RBF-Galerkin method is designed for optimized infusion dosage recommendations. I. I NTRODUCTION Traumatic injuries account for 10% of the global burden of disease and nearly 40% of the mortality associated with them is due to uncontrolled or insufficiently controlled hemorrhage. Fluid resuscitation is vital to effectively control hemorrhage and reduce mortality and morbidity associated with hemorrhagic injuries. Several factors are critical for successful resuscitation outcomes, including the type of fluid and the amount of infusion dosage used in resuscitation [1]. While the type of fluids used in resuscitation has been intensively examined, accurate fluid dose has not been well studied. Administration of proper infusion dosage adjustments to restore cardiac functions and stabilize patients is challenging [2] and often prone to human errors in clinical settings [3-4]. Thus, a closed-loop control algorithm that automatically manages infusion dosage adjustments may eliminate human errors, allow for caregiver attention on other factors, and be widely applied to a large number of patients where the supply of critical medical resources is scarce, such as during a mass casualty incident [5]. Automated fluid management systems incorporate an embedded control algorithm that targets optimizing a This work was supported in part by the Summer Undergraduate Research Experience (SURE) Program at Kent State University, Kent, Ohio. The rest of this paper is organized as follows: Section II addresses the theory and methodology for designing the controller. Section III-A describes the results for a simulated patient without measurement noise, and Section III-B shows the results when noise is simulated. Conclusions are presented in Section IV. II. M ETHODOLOGY A new control algorithm based on the RBF-Galerkin optimal control approach [11] was designed to optimize fluid infusion dosage in hemorrhagic scenarios. The hemorrhage resuscitation was formulated as an optimal control problem, and a receding" 2312.06523v1,"Role of the action function in defining electronic wavefunctions for large systems P. Fulde ∗ Max-Planck-Institut für Physik komplexer Systeme, Nöthnitzer Straße 38, 01187 Dresden, Germany (Dated: December 12, 2023) Abstract The dimension of the Hilbert space needed for the description of an interacting electron sys- tem increases exponentially with electron number N . As pointed out by W. Kohn this exponen- tial wall problem (EWP) limits the concept of many-electron wavefunctions based on solutions of Schrödinger’s equation to N ≤ N 0 , where N 0 ≈ 10 3 [1]. This limitation does not hold when the electronic interactions are neglected or treated in a mean-field approximation. The EWP has di- rected electronic structure calculations for solids to methods like density-functional theory which avoid dealing with many-electron wavefunctions. We show that the highly unsatisfactory limitation of many-electron wavefunctions to N ≤ N 0 can be overcome by generalizing their definition. We show for the ground state of a large system that it is the logarithm of the solution of Schrödinger’s equation which should be used to characterize this system. In this case the wavefunctions of inde- pendent subsystems add up rather than multiply. This feature is realized by the action function. It provides a simple physical picture for the resolution of the EWP. ∗ Electronic address: fulde@pks.mpg.de 1" 2312.06532v1,"RACE-IT: A Reconfigurable Analog CAM-Crossbar Engine for In-Memory Transformer Acceleration Lei Zhao ∗ , Luca Buonanno ∗ , Ron M. Roth ∗ , Sergey Serebryakov ∗ , Archit Gajjar ∗ John Moon ∗ , Jim Ignowski ∗ , Giacomo Pedretti ∗ ∗ Artificial Intelligence Research Lab (AIRL), Hewlett Packard Labs, USA Email: {lei.zhao, giacomo.pedretti}@hpe.com In-memory Computing (IMC) stands out as a promising solution to alleviate the computational and memory challenges posed by Transformer models [15], [23], [53], [56]. IMC involves performing computations directly within the memory, bypassing the need for frequent data movement between memory and the processing units, which is a significant bottleneck in traditional computing architectures. Emerging memories such as Resistive Random Access Memories (ReRAM) and Phase Change Memories (PCMs) offer a compelling avenue for IMC due to their non-volatile nature and high integration potential. Crossbar arrays of such emerging memories can efficiently map neural network weights in their conductance and accelerate a layer evaluation by parallel Matrix-Vector Multiplications (MVMs) in the analog domain [13]. Highperformance silicon demonstrations of multi-core IMC accelerators with ReRAM [50] and PCM [21] have been recently presented, finally grounding years of research, in experimental measurements. However, one notable drawback is that these designs may not be optimally suited for critical operations like Softmax and data-dependent matrix multiplications, which are fundamental to the Transformer model’s architecture and performance. Addressing these limitations and optimizing IMC designs for these specific operations is a critical area of ongoing research to enhance the applicability of IMC in Transformer-based processing. To address this challenge, existing IMC designs fall into four main approaches. The first employs a direct ad-hoc solution, integrating specialized CMOS operators customized for specific workloads, as seen in ISAAC [43]. However, this approach lacks flexibility, making the adoption of new operators challenging. The second approach, exemplified by the PUMA architecture [1], utilizes programmable Vector Functional Units (VFUs) to support a wide variety of operations but incurs a performance cost, particularly in datadependent matrix multiplications within Transformer models. The third approach explores ReRAM’s potential for computing the NOR operation [2], [9], [19], [45], offering a convenient solution for diverse operations but with drawbacks such as slow write speed and poor endurance. The fourth approach employs content addressable memories (CAMs) [37], which have gained attention in hyper-dimensional computing and genomics. In CAMs, a given input is searched and its location, i.e. address, is returned. The address can then be used to access a conventional RAM. CAM-based IMC has recently Abstract—Transformer models represent the cutting edge of Deep Neural Networks (DNNs) and excel in a wide range of machine learning tasks. However, processing these models demands significant computational resources and results in a substantial memory footprint. While In-memory Computing (IMC) offers promise for accelerating Matrix-Vector Multiplications (MVMs) with high computational parallelism and minimal data movement, employing it for implementing other crucial operators within DNNs remains a formidable task. This challenge is exacerbated by the extensive use of Softmax and data-dependent matrix multiplications within the attention mechanism. Furthermore, existing IMC designs encounter difficulties in fully harnessing the benefits of analog MVM acceleration due to the area and energy-intensive nature of Analog-to-Digital Converters (ADCs). To tackle these challenges, we introduce a novel Compute Analog Content Addressable Memory (Compute-ACAM) structure capable of performing various non-MVM operations within Transformers. Together with the crossbar structure, our proposed RACE-IT accelerator enables efficient execution of all operations within Transformer models in the analog domain. Given the flexibility of our proposed Compute-ACAMs to perform arbitrary operations, RACE-IT exhibits adaptability to diverse nontraditional and future DNN architectures without necessitating hardware modifications. Leveraging the capability of Compute- ACAMs to process analog input and produce digital output, we also replace ADCs, thereby reducing the overall area and energy costs. By evaluating various Transformer models against state-ofthe-art GPUs and existing IMC accelerators, RACE-IT increases performance by 10.7× and 5.9×, and reduces energy by 1193×, and 3.9×, respectively. I. I NTRODUCTION Transformer models [49] have gained immense popularity in the field of natural language processing [20], [26], computer vision [8], [24], recommendation systems [33], [48], etc., thanks to their remarkable ability to capture complex patterns in sequential and image data. However, the performance of Transformers comes at a cost: their appetite for computational resources and memory. These models often feature millions, if not billions, of parameters, demanding substantial computation and data movement. The sheer scale of Transformerbased architectures, exemplified by models like GPT-3 [3] and BERT [7], necessitates specialized hardware and high-capacity memory systems, presenting a significant challenge to deploy them at scale. As a result, efficiently processing Transformer models remains a crucial concern in the quest to unlock their full potential for a wider range of applications. 1" 2312.06543v1,"Control Strategy for Virtual Synchronous Generator Based on Y-Z Source Inverter in Islanded Grids Shirin Besati 1,3 , Ali Mosallanejad 2 , and Madhav Manjrekar 1,3 1 Department of Electrical and Computer Engineering, University of North Carolina at Charlotte, USA 2 Shahid Beheshti University, Tehran, Iran 3 Energy Production and Infrastructure Center, University of North Carolina at Charlotte, USA sbesati@uncc.edu, a_mosallanejad@sbu.ac.ir, mmanjrek@uncc.edu Abstract— The Virtual Synchronous Machine (VSM) concept stands as a strategy for the seamless integration of renewable energy sources into the grid. In scenarios where symmetrical and sinusoidal operating conditions are lacking, VSMs demonstrate multifaceted capabilities. They can operate as power sources especially in islandedsystems, adeptly address harmonic distortions and imbalances, offer load power compensation, and elevate voltage quality at the grid. Even so, dead time variations, discontinuous input current, and non-single-power-stage configuration of conventional voltage/current source inverters and also, load variation can result in VSMs behaving as harmonic and imbalance absorbers. This paper utilizes a specific Y-Source Inverter (YZSI) for the first time as a solution to these challenges. Through integrating this innovative configuration with an exceptionally adaptable voltage gain and an enhanced multi-loop control strategy into an isolated power system accommodating diverse load profiles, it not only achieves high efficiency in power transfer but also enhances overall system performance quality. Furthermore, it contributes to extending the lifespan and preserving the quality of the input source. The controller is designed to regulate system frequency, voltage, and manage voltage and current for YZSI, delivering impressive performance even in non-ideal grid conditions. MATLAB/Simulink confirms the efficacy of the proposed YZSI VSG control strategy with a high accuracy achieved through a comprehensive examination of the internal component parameters. —virtual synchronous machine, Y-Source inverters, grid-forming, dead–time, continuous input current, harmonic sink, unbalanced sink Keywords I. I NTRODUCTION Nowadays, contamination has been under specific consideration. One reasonable way is utilizing renewable energy sources in the grid and decentralizing grids [1-3]. To actualize this purpose, the necessity for power electronic converters and specific controllers has emerged. Voltage/ current inverter VSG layouts are widely utilized in grid compensations as a grid-following aspect and in islanded systems independently as grid-forming aspect [4]. Virtual synchronous machine (VSM) control is an approach to provide power electronic converters with an inertia and a damping factor virtually to imitate the behavior of a synchronous machine [5-7]. Beck and Hesse in 2007 introduced ""VISMA"" as the first suggestion of a VSM [8]. Afterward, Countless methodologies have appeared for integrating virtual characteristics of a synchronous machine into power electronic converters, that each presents Explicit purpose according to their Obligations [9]. In this context, only two conventional power electronic inverters, namely Voltage Source Inverters (VSI) and Current Source Inverters (ISI), are generally served to attach the controller to renewable energy sources. So, VSI/CSI VSGs along with their benefits, can simultaneously generate significant challenges within grid systems, notably in grid-forming conditions, because they must provide secure management in power generation, distribution, and compensation [10-16]. In this section, a concise overview of these matters is presented below: • The switching bridge of the inverters can make harmonics and other power quality issues into the grid. Accordingly, the inverters may need to provide a reactive compensator to uphold grid voltage stability; • In islanded networks, because of irregular renewable energy resources and variations in loads sustaining stable voltage and frequency is challenging, therefore, VSIs and CSIs are required to adjust these parameters to guarantee adaptability to these situations; • After an outage or during a variation in load demands (or injection of an inductive load), when the power supply needs to reconnect to the grid or adapt itself to the new circumstance, the inverters must synchronize both output voltage magnitude and frequency with the grid to avoid power quality issues, voltage/current unbalancing, and equipment damage during reconnection. Accordingly, there is a requirement for up-to-date control techniques to operate effectively the traditional VSIs/CSIs based on VSGs in islanded grids in order to resolve the mentioned problems and deliver a secure power supply to the load side [15-18]. On the other hand, the performance of renewable energy resources and specifically their battery (or storage system) lifespan are vital. Utilizing a VSI as the interface module in the network affects the quality of the resource lifespan negatively because of the lack of providing a continuous input current. Additionally, CSIs based on VSGs require a combination of itself and another in-parallel VSI due to its restricted capability to control the voltage of the grid independently [14,15]. In this matter, using ZSIs is a unique solution to solve most of the above problems in the microgrids for the first time and also in renewable resources (DC power supply). They have more specific characteristics than the traditional inverters to overcome the issues instinctively [19-22]. In this paper, one of the YZSI category [23] has been selected as Fig. 1 (and its equation models in a period) to provide: • eliminating the switching dead time to solve concerns about short circuits in the inverter, and" 2312.06549v1,"Exploring Crowd Dynamics: Simulating Structured Behaviors through Crowd Simulation Models Thiago Gomes Vidal de Mello Matheus Schreiner Homrich da Silva Virtual Humans Lab, PUCRS Porto Alegre, RS, Brazil thiago.mello.001@acad.pucrs.br Virtual Humans Lab, PUCRS Porto Alegre, RS, Brazil matheus.silva00@edu.pucrs.br Gabriel Fonseca Silva Soraia Raupp Musse Virtual Humans Lab, PUCRS Porto Alegre, RS, Brazil gabriel.fonseca94@edu.pucrs.br Virtual Humans Lab, PUCRS Porto Alegre, RS, Brazil soraia.musse@pucrs.br Figure 1: Simulation of structured behaviors during a rock concert. On the left, a group of agents enters the venue, forming an organized queue and moving in the available space between barriers. On the right, a group of agents participates in a moshpit structured behavior while other agents create an open space for them. ABSTRACT This paper proposes the simulation of structured behaviors in a crowd of virtual agents by extending the BioCrowds simulation model. Three behaviors were simulated and evaluated, a queue as a generic case and two specific behaviors observed at rock concerts. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX The extended model incorporates new parameters and modifications to replicate these behaviors accurately. Experiments were conducted to analyze the impact of parameters on simulation results, and computational performance was considered. The results demonstrate the model’s effectiveness in simulating structured behaviors and its potential for replicating complex social phenomena in diverse scenarios. CCS CONCEPTS • Computing methodologies → Agent / discrete models; Modeling methodologies; Animation. KEYWORDS crowd simulation, structured behavior, virtual environments, virtual concerts" 2312.06554v1,"Modular DNA origami-based electrochemical detection of DNA and proteins Byoung-jin Jeon a,1 , Matteo M. Guareschi a , Jaimie M. Stewart b , Emily Wu c , Ashwin Gopinath c , Netzahualcóyotl Arroyo-Currás d , Philippe Dauphin-Ducharme e , Philip S. Lukeman f , Kevin W. Plaxco g , and Paul W. K. Rothemund a,1 a Department of Bioengineering, California Institute of Technology; b Department of Bioengineering, University of California, Los Angeles; c Department of Mechanical Engineering, Massachusetts Institute of Technology; d Department of Pharmacology and Molecular Sciences, Johns Hopkins University School of Medicine; e Département de chimie, Université de Sherbrooke; f Department of Chemistry, St. John’s University ; g Department of Chemistry and Biochemistry, University of California Santa Barbara This manuscript was compiled on December 12, 2023 Significance — Aptamer-based, conformation-switching electrochemical biosensors enable real-time analyte sensing in the living body. However, developing sensors for new analytes is limited by the difficulty of optimizing electrochemical signal strength and gain, without compromising the binding properties of the aptamer. Optimization of new sensors often requires synthesis of many expensive, multiplymodified oligonucleotides. In contrast, we describe a reagentless DNA origami-based platform whose binding and signaling properties are essentially independent. This independence enables signal optimization to be based on analyte size; sensors are customized using a library of inexpensive and unmodified DNA linkers. This library is portable between different sensor designs and analytes. Our work thus provides a “toolkit” for constructing electrochemical biosensors, and a general approach for modular biosensors beyond electrochemical detection. Abstract — The diversity and heterogeneity of biomarkers has made the development of general methods for single-step quantification of analytes difficult. For individual biomarkers, electrochemical methods that detect a conformational change in an affinity binder upon analyte binding have shown promise. However, because the conformational change must operate within a nanometer-scale working distance, an entirely new sensor, with a unique conformational change, must be developed for each analyte. Here, we demonstrate a modular electrochemical biosensor, built from DNA origami, which is easily adapted to diverse molecules by merely replacing its analyte binding domains. Instead of relying on a unique nanometer-scale movement of a single redox reporter, all sensor variants rely on the same 100-nanometer scale conformational change, which brings dozens of reporters close enough to a gold electrode surface that a signal can be measured via square wave voltammetry, a standard electrochemical technique. To validate our sensor’s mechanism, we used single-stranded DNA as an analyte, and optimized the number of redox reporters and various linker lengths. Adaptation of the sensor to streptavidin and PDGF-BB analytes was achieved by simply adding biotin or anti-PDGF aptamers to appropriate DNA linkers. Geometrically-optimized streptavidin sensors exhibited signal gain and limit of detection markedly better than comparable reagentless electrochemical sensors. After use, the same sensors could be regenerated under mild conditions: performance was largely maintained over four cycles of DNA strand displacement and rehybridization. By leveraging the modularity of DNA nanostructures, our work provides a straightforward route to the single-step quantification of arbitrary nucleic acids and proteins. DNA origami | biosensor | square-wave voltammetry | modular sensor D NA nanotechnology(1, 2) enables the design and construction of artificial structures with nanometer precision via sequence-specific assembly of DNA oligonucleotides. Such structures (e.g. branched DNAs and tetrahedra, 3–6) are often used as scaffolds for biosensors, wherein DNA-coupled binding components, such as aptamers, antibodies or small-molecule ligands produce a signal upon introduction of a cognate analyte molecule. DNA origami(7, 8), provides an architecture for making 100-nanometer scale structures of arbitrary geometry, with hundreds of attachment sites for active components such as binders or reporters. Thus DNA origami is of particular interest for biosensors(9–11) because it allows the synthesis of reconfigurable structures that undergo large conformational changes (tens or hundreds of nanometers, 12–27), rearranging large numbers of reporters (tens or hundreds, 23) that amplify molecular binding events to the point that they can be reliably detected. Reconfigurable origami sensor platforms can be divided into broad classes based on their readout mechanism, with each mechanism having advantages and disadvantages. Atomic force microscope (AFM)-based platforms, for example, such as “DNA forceps” (12, 13) or “picture frames” (14) enable the direct visualization of single molecule reconfiguration as a function of protein binding(12), pH(13), or ionic conditions(14) but they require expensive AFMs and time-consuming measurements. Single-molecule fluorescence, optical tweezers, and magnetic tweezers-based platforms(15–18) exhibit extraordinary temporal resolution for the reconfigurations of single molecules, and enable the dissection of sensor states that could otherwise not be resolved. But, as for AFM, the required equipment is expensive and the measurements time-consuming. Gel electrophoresis-based platforms(19) for protein or nucleic acid detection are relatively inexpensive, and can be multiplexed (20). However, these measurements are slow, at best taking tens of minutes. Fluorescence resonance energy transfer (FRET) platforms have provided simple bulk measurements of DNA(21) and protein(22) down to the 100 nM range; achieving 100 pM has required expensive single-molecule FRET microscopy(23). Chiral plasmonic platforms have enabled simple bulk sensing of nucleic acids(24, 25) and small molecules(26, 27) achieving 100 pM sensitivity for RNA, but spectrometers capable of measuring circular dichroism are relatively expensive. Layered on top of these concerns, few of these approaches have been shown to work in complex biological sample matrices, and none of the above platforms appear easily extendable to in vivo measurements. Author contributions: A.G. developed original concepts for conformation-switching origami sensors in P.W.K.R.’s lab. P.S.L. developed original concepts for conformation-switching origami sensors in collaboration with K.W.P.’s lab. Discussions between authors B.J., M.M.G., J.M.S., K.W.P, P.D.-D., N.A.-C., P.S.L. and P.W.K.R. resulted in the particular conformation-switching molecular designs and electrochemical experimental design described in this work. Experiments were conducted by B.J., M.M.G., J.M.S. and E.W. Analysis of experiments and first-draft paper-writing were conducted by B.J. and M.M.G. All authors were involved in subsequent editing of the manuscript. Competing interests: A patent related to this work with inventors A.G. and P.W.K.R. was issued as U.S. patent 11,391,734 to California Institute of Technology and licensed to Somalogic, Inc. 1 To whom correspondence should be addressed. E-mail: bjeon@somalogic.com, pwkr@dna.caltech.edu 1" 2312.06557v1,"Robust Graph Neural Network based on Graph Denoising Victor M. Tenorio, Samuel Rey, and Antonio G. Marques Department of Signal Theory and Communications King Juan Carlos University, Madrid, Spain Emails: { victor.tenorio,samuel.rey.escudero,antonio.garcia.marques } @urjc.es. Abstract—Graph Neural Networks (GNNs) have emerged as a notorious alternative to address learning problems dealing with non-Euclidean datasets. However, although most works assume that the graph is perfectly known, the observed topology is prone to errors stemming from observational noise, graph-learning limitations, or adversarial attacks. If ignored, these perturbations may drastically hinder the performance of GNNs. To address this limitation, this work proposes a robust implementation of GNNs that explicitly accounts for the presence of perturbations in the observed topology. For any task involving GNNs, our core idea is to i) solve an optimization problem not only over the learnable parameters of the GNN but also over the true graph, and ii) augment the fitting cost with a term accounting for discrepancies on the graph. Specifically, we consider a convolutional GNN based on graph filters and follow an alternating optimization approach to handle the (non-differentiable and constrained) optimization problem by combining gradient descent and projected proximal updates. The resulting algorithm is not limited to a particular type of graph and is amenable to incorporating prior information about the perturbations. Finally, we assess the performance of the proposed method through several numerical experiments. Index Terms—Graph Neural Networks, Non-Euclidean Data, Robust Graph Signal Processing, Graph Perturbations I. I NTRODUCTION For a few years now, graph neural networks (GNNs) have emerged as a prominent alternative to handle contemporary data in a wide variety of fields [1]–[5]. The rising popularity of these architectures can be largely attributed to two pivotal factors. First, we are experiencing a data deluge where vast amounts of data are generated and stored, hence propelling the development of data-driven alternatives. Second, contemporary data is not only becoming more abundant but also more heterogeneous and intricate. In light of these dynamics, GNNs draw inspiration from the approaches put forth in fields like graph signal processing (GSP) and graphical models, where the graph topology is leveraged to deal with the underlying irregular domain inherent in contemporary data [6]–[9]. Indeed, by accounting for the information encoded in the graph topology, GNNs provide state-of-the-art results in a gamut of applications such as drug discovery, recommender systems, signal denoising, or traffic state predictions [10]–[14], to name a few. This work was supported in part by the Spanish AEI under Grants PID2019- 105032GBI00, PID2022-136887NBI00 and FPU20/05554, in part by the Young Researchers R&D Project under ref. num. F861 (CAM and URJC) and in part by the Autonomous Community of Madrid within the ELLIS Unit Madrid framework. Due to the outstanding performance of GNNs, numerous alternatives for integrating the graph structure into their architecture have emerged, typically operating under the foundational assumption that the topology of the graph is precisely known. Nevertheless, this assumption is unlikely to hold in many practical setups, where graphs may suffer from perturbations. These perturbations can arise in various contexts. When networks are explicitly provided, perturbations may be due to observational noise and errors. On the other hand, when graphs represent (statistical) pairwise relationships among observed variables, they must be inferred from the available data, introducing another layer of potential perturbations. On top of this, the observed graph may be subject to adversarial attacks [15]. Intuitively, since GNNs exploit the information encoded in the graph topology to process the data, ignoring the presence of perturbations in the graph can drastically hinder their performance. Accounting for the influence of graph perturbations is a challenging problem that has been attracting increasing attention. Initially, [16] studied how perturbations affected the spectrum of the graph Laplacian. Then, [17], [18] first characterized the stability of linear graph filters when the graph topology presents errors and, later on, [19]–[21] characterized the stability and transferability of GNNs. Although these works showed that the discrepancies in the output of a GNN due to perturbations are upper-bounded, this bound grows i) exponentially with the number of layers and ii) linearly with the discrepancies in the graph filters due to perturbations, which are shown to grow exponentially with the order of the filter [22]. Therefore, a different line of research is concerned with solving graph-related tasks from a robust perspective. In the context of GSP, [23] approached the robust inference of graph signals by combining total least squares and structural equation models, and [22], [24], [25] tackle the robust identification of graph filters, first assuming that perturbations do not affect the support of the graph and then under a more general perturbation model. Moving on to GNNs, [26] introduces a novel graph-aware operator that is more resilient to perturbations than classical polynomials of the adjacency matrix. Differently, [27] addresses the task of node classification when the observed topology is perturbed by inferring the topology of the true unknown graph while training the GNN. Although relevant, the proposed approach assumes that the target graph has a low-rank adjacency matrix" 2312.06566v1,"One Size Doesn’t Fit All: Personalised Affordance Design for Social Robots Guanyu Huang Roger K. Moore University of Sheffield Sheffield, United Kingdom ghuang10@sheffield.ac.uk University of Sheffield Sheffield, United Kingdom r.k.moore@sheffield.ac.uk ABSTRACT 1 In human-robot interaction, personalisation is essential to achieve more acceptable and effective results. Placing users in the central role, many studies have focused on enhancing social robots’ abilities to perceive and understand users. However, little is known about improving users’ perceptions and interpretation of a social robot in spoken interactions. The work described in the paper aims to find out what affects the personalisation of a social robot’s affordance, namely appearance, voice and language behaviours. The experimental data presented here is based on an ongoing project. It demonstrates the many and varied ways in which people’s preferences for a social robot’s affordance differ under different circumstances. It also examines the relationship between such preferences and people’s expectations of a social robot’s characteristics like competence and warmth. It also shows that individuals have different perceptions of the same robot’s language behaviours. These results demonstrate that one-sized personalisation does not fit all. Personalisation should be considered a comprehensive approach, including appropriate affordance design, to suit the users’ expectations of social roles. Personalisation is a type of adaptation. Personalised human-robot interaction aims to improve the effectiveness and acceptability of a robot by adapting a robot’s behaviours to interact with a specific individual or group. Such adjustment is based on physical and social factors in the given environment where the interaction takes place, as well as users’ preferences, behaviours, and characteristics [10]. Along with the development of robots in social domains, research for personalised HRI has focused on making robots learn and adapt to users. These adaptations can be a long-term process [7, 13, 20] and sometimes culturally sensitive [11, 23]. For short-term individual interaction, most studies have paid attention to enhancing robots’ abilities to perceive and interpret users’ attention [16], personality [1], behaviour [8] and abilities [22]. Whilst it is important to develop a robot’s abilities to adapt its behaviours, it is also worth paying attention to a social robot’s static features which do not change over the duration of interactions, such as its appearance and voice. Such features help form the first impression, a fundamental factor in human-human encounters with regard to people’s social cognition (e.g., trust and rapport) [2]. Also, they are related to a robot’s affordance, namely its perceptual action possibilities. According to the Affordance Theory[6, 15], affordance shapes people’s perception of an object and affects people’s behaviours. Thus, it is important to design appropriate affordances for robots to develop a satisfactory first impression and optimise users’ experiences in the HRI. Two dimensions widely used to measure people’s social perceptions are warmth and competence [4, 9]. The former captures the perceived friendliness and good intention. The latter captures the perceived ability to deliver on those intentions. Given that social robots are used in social domains to play social roles, it makes sense to investigate what people expect robots to be like in different roles. A well-developed model to measure warmth and competence in social roles is the stereotype content model (SCM), which has been proven reliable in many experimental tests across different cultural contexts [4, 5, 21]. It has also been used in studies of how people perceive virtual agents (e.g., [3]). This paper adapts this model within a programme of empirical experimental work. The experiment firstly aims to find out what people’s expectations of social robots’ warmth and competence are in given social scenarios and how such expectations affect people’s preferences for social robots’ affordances. Secondly, it aims to identify personalised affordance design principles by studying people’s preferences and perceptions of a social robot’s affordance. CCS CONCEPTS • Human-centered computing → Empirical studies in HCI; User studies; Empirical studies in interaction design; Scenariobased design; Laboratory experiments; • General and reference → Surveys and overviews. KEYWORDS affordance design, personalisation, user needs, perception, stereotype content model(SCM) ACM Reference Format: Guanyu Huang and Roger K. Moore. 2023. One Size Doesn’t Fit All: Personalised Affordance Design for Social Robots. In Proceedings of (CONCATE- NATE - HRI). ACM, New York, NY, USA, 4 pages. https://doi.org/XXXXXXX. XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CONCATENATE - HRI, March 13, 2023, Stockholm, SE © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX INTRODUCTION" 2312.06569v1,"1 Ambient IoT: A missing link in 3GPP IoT Devices Landscape M. Majid Butt, Nitin R. Mangalvedhe, Nuno K. Pratas, Johannes Harrebek, John Kimionis, Muhammad Tayyab, Oana-Elena Barbu, Rapeepat Ratasuk, and Benny Vejlgaard Abstract—Ambient internet of things (IoT) is the network of devices which harvest energy from ambient sources for powering their communication. After decades of research on operation of these devices, Third Generation Partnership Project (3GPP) has started discussing energy harvesting technology in cellular networks to support massive deployment of IoT devices at low operational cost. This article provides a timely update on 3GPP studies on ambient energy harvesting devices including device types, use cases, key requirements, and related design challenges. Supported by link budget analysis for backscattering energy harvesting devices, which are a key component of this study, we provide insight on system design and show how this technology will require a new system design approach as compared to New Radio (NR) system design in 5G. Index Terms—Energy harvesting, ambient IoT, backscattering, 3GPP. I. I NTRODUCTION The internet of things (IoT) market is a major source of revenue for future wireless technology. Moving beyond enhancement of the mobile broadband devices market that is supported by fourth-generation (4G) cellular technology, ultra reliable low-latency communication (URLLC) and machine type communication (MTC) service classes were also introduced in fifth-generation (5G) cellular technology, which target use cases requiring high reliability and massive deployment of smaller and cheaper IoT devices, respectively. Sixth-generation (6G) technology will further expand these market segments. The IoT market is expected to steadily grow from 2020 to 2025, and further increase is expected beyond that period at a higher rate. Building and commercial, health, agriculture, infrastructure, and industries are some of the key sectors targeted by the IoT market. Almost all sectors are forecasted to grow in the future, but infrastructure and health segments are expected to grow at higher rates in the future compared to others [1]. Due to the large number of IoT devices that are expected to be deployed, growth of the IoT market requires future networks to be energy efficient and sustainable to make a M. Majid Butt, Nitin R. Mangalvedhe and Rapeepat Ratasuk are with Nokia Standards, Naperville, USA. email:{majid.butt, nitin.mangalvedhe, rapeepat.ratasuk}@nokia.com. Nuno K. Pratas, Johannes Harrebek, Oana-Elena Barbu, and Benny Vejlgaard are with Nokia Standards, Aalborg, Denmark. email: {nuno.kiilerich pratas, johannes.harrebek, oana-elena.barbu, benny.vejlgaard}@nokia.com. John Kimionis is with Nokia Bell Labs, 600 Mountain Ave, Murray Hill, NJ, 07974, USA (e-mail: ioannis.kimionis@nokia-bell-labs.com.) Muhammad Tayyab is with Nokia Standards, Oulu, Finland. (e-mail: muhammad.tayyab@nokia.com. business case. Energy harvesting technology is key to the success of the IoT market as it can considerably reduce device operational cost. Energy harvesting devices are ’battery free’ devices, which harvest energy from natural or ambient sources, e.g., electromagnetic, solar, thermal, pressure etc., and operate either with a small battery or without battery and do not require battery replenishment. They are also termed as ’zero energy’ devices due to their capability to operate without a dedicated power source [2]. Energy harvesting communication has been widely discussed in research for more than a decade, e.g., see [3], [4] and references therein. Recent literature outlines key challenges and complexity to power massive number of IoT devices [5], [6] using radio frequency (RF) signals, but this is the first time 3GPP has started discussing energy harvesting and backscattering as a potential IoT technology for future networks in various study groups [7], [8]. Fundamental aspects of the technology are well researched, but feasibility of the technology in devices under 3GPP networks is still unknown under realistic network operating conditions and business model. The goal of this article is to articulate the main reasons behind industry interest in energy harvesting as a future technology and discuss design considerations and solutions. As 3GPP has never before discussed energy harvesting devices, also called ambient IoT (A-IoT) devices, there are several challenges to be addressed before energy harvesting technology is adopted in future networks. This article provides a comprehensive overview addressing three key questions: How will energy harvesting IoT technology complement existing 3GPP IoT technologies? • What are the key use cases and the associated design requirements for the technology? • What are the challenges associated both with technology as well as its standardization in 3GPP? • Section II discusses the first question by describing existing 3GPP IoT technologies and how energy harvesting technology fills the technology gap. Section III addresses the second question by reviewing recent status of 3GPP discussions on energy harvesting technology and the way forward, while Section IV and Section V attempt to answer the third question by focusing on link-level analysis and the main technology challenges. Finally, we conclude with the main findings of the article in Section VI." 2312.06576v1,"1 HyPE-GT: where Graph Transformers meet Hyperbolic Positional Encodings Kushal Bose and Swagatam Das Abstract Graph Transformers (GTs) facilitate the comprehension of graph-structured data by calculating the self-attention of node pairs without considering node position information. To address this limitation, we introduce an innovative and efficient framework that introduces Positional Encodings (PEs) into the Transformer, generating a set of learnable positional encodings in the hyperbolic space, a non-Euclidean domain. This approach empowers us to explore diverse options for optimal selection of PEs for specific downstream tasks, leveraging hyperbolic neural networks or hyperbolic graph convolutional networks. Additionally, we repurpose these positional encodings to mitigate the impact of over-smoothing in deep Graph Neural Networks (GNNs). Comprehensive experiments on molecular benchmark datasets, co-author, and co-purchase networks substantiate the effectiveness of hyperbolic positional encodings in enhancing the performance of deep GNNs. Index Terms Graph Transformsers, Attention, Hyperbolic Spaces, Convolution, Positional Encoding. ✦ 1 I NTRODUCTION G RAPH Transformers (GTs) are earmarked as one of the milestones for modelling the interactions between the node pairs in the graph. As the existing graph neural network suffers from a few glaring shortcomings like over-smoothing [1] which occurs due to the recursive neighborhood aggregation, over-squashing [2], an information bottleneck caused by the exponential growth of information while increasing the size of the receptive field, and bounded expressive power [3], [4]. Graph Transformers confront the limitations by evaluating pair-wise self-attention without considering the structural inductive bias which causes the loss of positional information of the nodes. As an effective solution, the positional encodings as vectors are integrated with the node features to make the respective nodes topologically aware in the graph. Recently, many efforts were made to generate effective positional encodings for the GTs like spectral decomposition-based learnable encoding [5], structure-aware PEs generated from the rooted subgraph or subtree of the nodes [6], encoding the structural dependency [7], random walk-based learnable positional encodings [8] and many more. The positional encodings derived from existing works suffer from several key limitations like Spectral Attention Network (SAN) which generates learnable positional encodings by spectral decomposition of the Laplacian matrix. SAN requires high computational time as well as memory, especially for the generation of edge-feature-based Laplacian positional encodings. Structure-aware Transformers (SAT) estimates pairwise attention scores depending on the respective rooted sub-graphs or sub-trees. SAT requires to extract multi-hop subgraphs resulting in an increase in the pre-processing time and consumption of high memory. To alleviate the shortcomings, we propose a novel framework named Hyperbolic Positional Encodings based Graph Transformer or HyPE-GT which is capable to generate a set of learnable positional encodings in the hyperbolic space. To the best of our knowledge, we are the first to foster hyperbolic geometry in designing positional encodings for the Graph Transformers. HyPE-GT introduces learnable hyperbolic positional encodings, depending on three key modules: the initialization of PEs ( P E init ), the manifold type (M), and the hyperbolic network type (HN), transforming the PEs into the hyperbolic space. Each module comprises multiple entities, and each positional encoding results from selecting a unique triplet from one entity of each module. The maximum number of positional encodings is given by |P E init | × |M | × |HN | , with the framework offering diverse design choices based on entity selection, generating varied PEs. These hyperbolic positional encodings provide practitioners with versatile options for optimizing downstream tasks. The learnable hyperbolic PEs seamlessly integrate with standard graph transformers, supplying essential positional information. Additionally, we leverage positional encodings to enhance deep Graph Neural Networks (GNNs) by mitigating over-smoothing, incorporating hyperbolic PEs with Euclidean node features from hidden layers in deep GNN architectures. Contribution Our contributions throughout the paper can be summarized in the following way: (1) We propose a novel and powerful framework named as HyPE-GT which generates a set of learnable positional encodings in the hyperbolic space, a non-euclidean domain. We are the first to incorporate hyperbolic PEs with the Euclidean Graph Transformer. The PEs are learned by passing through either hyperbolic neural networks or hyperbolic graph convolutional networks which produces a useful positional encodings and structural encodings. (2) We propose two different strategies to combine • Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata, India. E-mail: kushalbose92@gmail.com, swagatam.das@isical.ac.in" 2312.06608v1,"Information theory for model reduction in stochastic dynamical systems Matthew S. Schmitt*, 1 Maciej Koch-Janusz*, 1, 2, 3 Michel Fruchart, 1, 4 Daniel S. Seara, 1 and Vincenzo Vitelli 1, 5 1 University of Chicago, James Franck Institute, 929 E 57th Street, Chicago, IL 60637 2 Haiqu, Inc., 95 Third Street, San Francisco, CA 94103, USA 3 Department of Physics, University of Zurich, 8057 Zurich, Switzerland 4 ESPCI, Laboratoire Gulliver, 10 rue Vauquelin, 75231 Paris cedex 05 5 University of Chicago, Kadanoff Center for Theoretical Physics, 933 E 56th St, Chicago, IL 60637 Model reduction is the construction of simple yet predictive descriptions of the dynamics of many-body systems in terms of a few relevant variables. A prerequisite to model reduction is the identification of these relevant variables, a task for which no general method exists.Here, we develop a systematic approach based on the information bottleneck to identify the relevant variables, defined as those most predictive of the future. We elucidate analytically the relation between these relevant variables and the eigenfunctions of the transfer operator describing the dynamics. Further, we show that in the limit of high compression, the relevant variables are directly determined by the slowest-decaying eigenfunctions. Our information-based approach indicates when to optimally stop increasing the complexity of the reduced model. Further, it provides a firm foundation to construct interpretable deep learning tools that perform model reduction. We illustrate how these tools work on benchmark dynamical systems and deploy them on uncurated datasets, such as satellite movies of atmospheric flows downloaded directly from YouTube. I. INTRODUCTION The exhaustive description of a physical system is usually impractical due to the sheer volume of information involved. As an example, the air in your office may be described by a 10 27 –dimensional state vector containing the positions and momenta of every particle in the room. Yet, for most practical purposes, it can be effectively described using only a small number of quantities such as pressure and temperature. Similar reductions can be achieved for physical systems ranging from diffusing particles to biochemical molecules and complex networks (Fig. 1a). In all cases, certain “relevant variables” can be predicted far into the future even though individual degrees of freedom in the system are effectively unpredictable. The process by which one goes from the complete description of a system to a simpler one is known as model reduction. Several procedures for model reduction exist across the natural sciences. They range from analytical methods, such as adiabatic elimination and multiple-scale analysis [1–10], to data-driven methods such as dynamic mode decomposition, diffusion maps, and spectral submanifolds [11–22]. The success of these approaches is limited by a fundamental difficulty: before performing any reduction, one has to identify a decomposition of the full system into relevant and irrelevant variables. In the absence of physical intuition (e.g. a clear separation of scales), identifying such a decomposition is an open problem [4]. It may not even be clear a priori when to stop increasing the complexity of a simplified model or, conversely, when to stop reducing the amount of information needed to represent the dynamical state of a many body system. In both cases, one must first determine the minimal number of relevant variables that are needed. The answer to this question depends in fact on how precisely and how far in the future you wish to forecast. Nonetheless, this answer should be compatible with fundamental constraints on forecasting set by external perturbation and finite measurement accuracy [23]. In order to address the difficulty identified in the previous paragraph, we develop an information-theoretic framework for model reduction. Very much like MP3 compression is about retaining information that matters most to the human ear [24], model reduction is about keeping information that matters most to predict the future [25]. Inspired by this simple insight, we formalize model reduction as a lossy compression problem known as the information bottleneck (IB) [26–28]. This formal step allows us to give a precise answer to the question of how to identify relevant and irrelevant variables. We show how and under what conditions the standard operatortheoretic formalism of dynamical systems [19, 29], which underlies most methods of model reduction, naturally emerges from optimal compression. Crucially, our framework systematically answers the question of when to stop increasing the complexity of a minimal model (or reducing the information needed to represent a many body state). Further, it provides a firm foundation to address a practical problem: the construction of deep learning tools to perform model reduction that are guaranteed to be interpretable (Fig. 1b-c). We illustrate our approach on benchmark dynamical systems and demonstrate that it works even on uncurated datasets, such as satellite movies of atmospheric flows downloaded directly from YouTube. The remainder of this paper is structured as follows. In Section II, we provide an introduction to the informationtheoretic background needed to formulate the IB problem. Next, we prove that the most informative features identified by IB correspond to the eigenfunctions of the transfer operator describing the time evolution of a noisy dynamical system (via its probability distribution). In Section III, we relate the spectrum of the transfer operator with the rate at which noisy dynamical systems loose information" 2312.06611v1,"Diamonds in Klein geometry Rafael Mancini Santos ∗ , 1, † L. C. T. Brito, 1, ‡ and Cleverson Filgueiras 1, § 1 Departamento de Fı́sica, Universidade Federal de Lavras, Campus Universitário, Lavras,3037, Minas Gerais, Brasil Abstract Recently, there has been a suggestion that the Unruh effect might manifest in metamaterials at accessible Unruh temperatures. In certain instances, the class of metamaterials that could be instrumental for this observation exhibits a Klein signature instead of a Minkowski one. Consequently, confirming this effect in those materials necessitates a more meticulous analysis. In this paper, we employ the path integral formulation of Quantum Field Theory to investigate the analogue of the Unruh effect in Kleinian geometry. We perform calculations for a scalar theory, provided we restrict the action to a convenient subspace of the Kleinian spacetime. As a result, we determine the diamond temperature for a static observer with a finite lifetime. The outcome suggests that metamaterials could serve as a potential system for observing diamond regions. ∗ Currently at Divisão de Astrofı́sica, Instituto Nacional de Pesquisas Espaciais - Inpe, São Paulo, Brazil Electronic address: rafael.mancini@inpe.br ‡ Electronic address: lcbrito@ufla.br § Electronic address: cleverson.filgueiras@ufla.br † 1" 2312.06616v1,"The built environment and induced transport CO 2 emissions: A double machine learning approach to account for residential self-selection Florian Nachtigall Technical University of Berlin Berlin, Germany nachtigall@tu-berlin.de Felix Wagner Technical University of Berlin Berlin, Germany Peter Berrill Technical University of Berlin Berlin, Germany Felix Creutzig Technical University of Berlin Berlin, Germany Abstract Understanding why travel behavior differs between residents of urban centers and suburbs is key to sustainable urban planning. Especially in light of rapid urban growth, identifying housing locations that minimize travel demand and induced CO 2 emissions is crucial to mitigate climate change. While the built environment plays an important role, the precise impact on travel behavior is obfuscated by residential self-selection. To address this issue, we propose a double machine learning approach to obtain unbiased, spatially-explicit estimates of the effect of the built environment on travel-related CO 2 emissions for each neighborhood by controlling for residential self-selection. We examine how socio-demographics and travel-related attitudes moderate the effect and how it decomposes across the 5Ds of the built environment. Based on a case study for Berlin and the travel diaries of 32,000 residents, we find that the built environment causes household travel-related CO 2 emissions to differ by a factor of almost two between central and suburban neighborhoods in Berlin. To highlight the practical importance for urban climate mitigation, we evaluate current plans for 64,000 new residential units in terms of total induced transport CO 2 emissions. Our findings underscore the significance of spatially differentiated compact development to decarbonize the transport sector. 1 Introduction The built environment plays a critical role in facilitating or hindering the decarbonization of urban transport [1]. The location and compactness of new residential development shape and constrain residents’ future travel behavior. As such, they limit the mitigation potential of mobility-related lifestyle changes and potentially lock in transport-related emissions for decades [2]. Urban sprawl and suburban development, in particular, have been widely criticized for increasing car dependence and travel demand, hindering the decarbonization of urban transport [3]. Many studies have observed that residents of urban (central, higher-density, mixed-use) neighborhoods tend to drive less and instead walk [4, 5, 6, 7], bike [4], and use public transit more [8, 9] than residents of suburban (non-central, lower-density, single-use residential) neighborhoods. Yet, it is ambiguous to what extent these differences can be attributed to the built environment itself, as opposed to pre-existing differences in travel preferences between residents of urban and suburban neighborhoods. These differences are a result of a process known as residential self-selection [10], in which people choose their place of residence based on, among other things, locally available transport options matching their pre-existing travel preferences. Failing to account for residential self-selection and the resulting differences in travel preferences among residents of different neighborhoods can lead to falsely Tackling Climate Change with Machine Learning workshop at NeurIPS 2023." 2312.06625v1,"DECODING MEAN FIELD GAMES FROM POPULATION AND ENVIRONMENT OBSERVATIONS BY GAUSSIAN PROCESSES JINYAN GUO 1 , CHENCHEN MOU 2 , XIANJIN YANG 3,∗ , CHAO ZHOU 1 1 Department of Mathematics and Risk Management Institute, National University of Singapore, Singapore. 2 3 Department of Mathematics, City University of Hong Kong, Hong Kong SAR, China. Department of Computing and Mathematical Sciences, California Institute of Technology, Pasadena, CA 91125, USA. Abstract. This paper presents a Gaussian Process (GP) framework, a non-parametric technique widely acknowledged for regression and classification tasks, to address inverse problems in mean field games (MFGs). By leveraging GPs, we aim to recover agents’ strategic actions and the environment’s configurations from partial and noisy observations of the population of agents and the setup of the environment. Our method is a probabilistic tool to infer the behaviors of agents in MFGs from data in scenarios where the comprehensive dataset is either inaccessible or contaminated by noises. 1. Introduction In this paper, we present a Gaussian Process (GP) framework to infer strategies and environment configurations in mean field games (MFGs) from partially noisy observations of agent populations and environmental setups. MFGs, as proposed in [26–29, 33–35], study the actions of a large number of indistinguishable rational agents. As the number of agents approaches infinity, the Nash equilibrium of a standard MFG is described by a coupled system of two distinct partial differential equations (PDEs): the Hamilton–Jacobi–Bellman (HJB) and the Fokker–Plank (FP) equations. The HJB determines the agent’s value function, while the FP governs the evolution of the distribution of agents. We refer the readers to [19–22, 24, 37, 38] for applications of MFGs in various fields. To date, the consistency and completeness of MFGs have been explored thoroughly across different contexts. The earliest findings can be traced back to the foundational studies by Lasry and Lions, and further expanded upon in Lions’ lectures at Collège de France (referenced by [40]). Notably, only a few MFG models provide explicit solutions, highlighting the significance of numerical calculations in MFGs. A typical time-dependent MFG admits the following form    −∂ t u(t, x) − ν∆u + H(x, Du) = F [m](x), ∀(t, x) ∈ (0, T ) × R d ,  (1.1) ∂ t m(t, x) − ν∆m − div(mD p H(x, Du)) = 0, ∀(t, x) ∈ (0, T ) × R d ,   d  m(0, x) = µ(x), u(T, x) = g(x), ∀x ∈ R , where T is the terminal time, u stands for a representative agent’s value function, m is the probability density function representing the distribution of agents, ν denotes the volatility of agents’ movements, H is referred as the Hamiltonian, F is the mean field term describing the effect of agents’ interactions, µ is the initial distribution, and g represents the terminal cost. If agents play a MFG in (1.1), the optimal strategy of agents is given by −D p H(x, Du) [33–35]. E-mail address: e0708165@u.nus.edu, chencmou@cityu.edu.hk, yxjmath@caltech.edu, matzc@nus.edu.sg. ∗ Corresponding author. 1" 2312.06633v1,"Examining the Effect of Implementation Factors on Deep Learning Reproducibility Kevin Coakley ∗† , Christine R. Kirkpatrick ∗ , Odd Erik Gundersen † ∗ San Diego Supercomputer Center, Univ. of California San Diego, La Jolla, USA † Norwegian University of Science and Technology, Trondheim, Norway Email: kcoakley@sdsc.edu, christine@sdsc.edu, odderik@ntnu.no Abstract—Reproducing published deep learning papers to validate their conclusions can be difficult due to sources of irreproducibility. We investigate the impact that implementation factors have on the results and how they affect reproducibility of deep learning studies. Three deep learning experiments were ran five times each on 13 different hardware environments and four different software environments. The analysis of the 780 combined results showed that there was a greater than 6% accuracy range on the same deterministic examples introduced from hardware or software environment variations alone. To account for these implementation factors, researchers should run their experiments multiple times in different hardware and software environments to verify their conclusions are not affected. The lab in analytical chemistry is equivalent to the hardware and software environment in computing. When a deterministic experiment is repeated using the same hardware and software, the results should be the same and therefore the experiment is outcomes reproducible. However, when an experiment is reproduced using a different hardware and software environment by different researchers the outcomes can be different. If the same analysis of the outcomes leads to the same conclusion then the experiment is analysis reproducible. If neither the outcomes nor the analysis are the same as the original, but the interpretation of the analysis leads to the same conclusion then the experiment is interpretation reproducible [5]. Index Terms—deep learning, machine learning, reproducibility III. I MPLEMENTATION F ACTORS I. I NTRODUCTION Artificial Intelligence has a reproducibility crisis, much like psychology, medicine, and other fields over the past decade [1]. A study of 255 machine learning (ML) papers from 2012 to 2017 showed that only 63.5% were reproducible [2]. There are many factors for why papers cannot be reproduced. Gundersen et al. divides the sources that cause irreproducibility into six categories: study design factors, algorithmic factors, implementation factors, observation factors, evaluation factors, and documentation factors [3]. To help with the reproducibility crisis, the effect of these sources of irreproducibility on the conclusions of ML research needs to be studied. We focus on the implementation factors of deep learning (DL) experiments. II. R EPRODUCIBILITY Reproducibility, a central concept of the scientific method, is often poorly understood. Terms like repeatability and reproducibility are both used interchangeably, even though they have different definitions and have different implications for the conclusions of an experiment. Using the definitions from analytical chemistry [4]: Repeatability is when an experiment is carried out by the same staff, in the same lab, with the same equipment, using the same procedure, within a short period of time. • Reproducibility is when an experiment is carried out by different staff, in a different lab, with different equipment, using the same procedure (or as close as possible), at a different time. • The hardware and software environments used in ML experiments are implementation factors that can contribute to irreproducible results. The following implementation factors are sources of irreproducibility: ancillary software, ancillary software versions, auto-selection of primitive operations, software bugs, compiler settings, initialization seeds, non-deterministic ordering of floating-point operations, parallel execution, and processing unit [3]. Not all of the implementation factors can be easily controlled for. However, the effects of the implementation factors: ancillary software, ancillary software versions, software bugs, compiler settings, and processing unit —can be examined by executing multiple runs of the experiment in multiple hardware and software environments. IV. E XAMINING THE E FFECTS OF H ARDWARE AND S OFTWARE E NVIRONMENTS ON D EEP L EARNING R ESULTS A. Experiment Setup The following three DL examples were chosen from the Keras GitHub repository 1 : 1) Simple convolutional neural network classifying handwritten digits using MNIST (simple MNIST), 2) a 2-layer bidirectional LSTM classifying sentiments utilizing the IMDB movie review dataset (bidirectional LSTM), 3) a dense neural network performing binary classification on the Kaggle Credit Card Fraud Detection dataset (binary classification). These examples represent three different disciplines within DL, computer vision, natural language processing, and structured data, respectively. They use the 1 https://github.com/keras-team/keras-io/blob/master/examples/" 2312.06635v1,"Gated Linear Attention Transformers with Hardware-Efficient Training Songlin Yang 1∗ , Bailin Wang 1∗ , Yikang Shen 2 , Rameswar Panda 2 , Yoon Kim 1 1 Massachusetts Institute of Technology 2 MIT-IBM Watson AI Lab {yangsl66, bailinw, yoonkim}@mit.edu {yikang.shen, rpanda}@ibm.com December 12, 2023 Abstract Transformers with linear attention allow for efficient parallel training but can simultaneously be formulated as an RNN with 2D (matrix-valued) hidden states, thus enjoying linear (with respect to output length) inference complexity. Recent works such as RetNet (Sun et al., 2023) and TransNormerLLM (Qin et al., 2023a) observe that adding a global decay term to the additive RNN update rule greatly improves performance, sometimes outperforming standard Transformers with softmax attention when trained at scale. In this work we show that adding a data-dependent gating mechanism further improves performance. We derive a parallel form of this gated linear attention layer that enables efficient training. However, a straightforward, numerically stable implementation of this parallel form requires generalized matrix multiplications in log-space for numerical stability, and thus cannot take advantage of tensor cores on modern GPUs which are optimized for standard matrix multiplications. We develop a hardware-efficient version of the parallel form that can still make use of tensor cores through block-parallel computations over sequence chunks. Experiments on moderate-scale language modeling (340M-parameter models trained on 15B tokens, 1.3B-parameter models trained on 100B tokens) show that gated linear attention (GLA) Transformers perform competitively against a strong LLaMA-architecture Transformer baseline (Touvron et al., 2023) as well as Mamba (Gu & Dao, 2023), a recently introduced state-space model with a data-dependent state transition mechanism. For training speed, our Triton-based implementation performs comparably to CUDA-optimized FlashAttention-2 (Dao, 2023) under the regular 2048 training length setting, while outperforming FlashAttention-2 when training on longer sequences beyond 4096. 1 1 Introduction Transformers with softmax attention (Vaswani et al., 2017) enjoy efficient parallel training but suffer from quadratic (in sequence length) complexity for both training and inference, thus motivating more RNN-like models that allow for linear-time sequence modeling. Linear attention Transformers, which replace the softmax attention mechanism with a simple dot product over (possibly transformed) key/query vectors, has emerged as a promising alternative to classic softmax attention (Katharopoulos et al., 2020; Choromanski et al., 2020; Kasai et al., 2021b; Peng et al., 2021). An attractive property of linear attention Transformers is that they admit a “recurrent form” in which they can be formulated as an RNN with 2D hidden states that are additively updated at each time step (Katharopoulos et al., 2020). This recurrent form is especially useful since the entire history can be compressed into the matrix-valued hidden state, thus eliminating the need to maintain and attend over a KV cache during inference. For training, linear attention Transformers also admit a sub-quadratic “chunk-wise parallel form” which divides the sequence into non-overlapping chunks ∗ Equal contribution. Order determined by coin flip. 1 Code will be available at https://github.com/berlino/gated linear attention. 1" 2312.06639v1,"Harmonic Mobile Manipulation Ruihan Yang 1* Yejin Kim 2 Aniruddha Kembhavi 2,3 Xiaolong Wang 1 Kiana Ehsani 2 1 UC San Diego 2 PRIOR @ Allen Institute for AI 3 University of Washington, Seattle Figure 1. Harmonic Mobile Manipulation: In this work, we address diverse mobile manipulation tasks integral to human’s daily life. Trained in a photo-realistic simulation, Our controller effectively accomplishes these tasks through harmonious mobile manipulation techniques in a real-world apartment featuring a novel layout, without any fine-tuning or adaptation. Abstract to significant advancements in each. On one hand, agents have been trained to efficiently explore and navigate environments [6, 11, 19, 47], while on the other, substantial progress has been made in performing complex manipulation tasks, such as handling articulated objects with static arms in tabletop settings [26, 32, 40, 51]. Recent advancements in robotics have enabled robots to navigate complex scenes or manipulate diverse objects independently. However, robots are still impotent in many household tasks requiring coordinated behaviors such as opening doors. The factorization of navigation and manipulation, while effective for some tasks, fails in scenarios requiring coordinated actions. To address this challenge, we introduce, H ARMONIC MM, an end-to-end learning method that optimizes both navigation and manipulation, showing notable improvement over existing techniques in everyday tasks. This approach is validated in simulated and realworld environments and adapts to novel unseen settings without additional tuning. Our contributions include a new benchmark for mobile manipulation and the successful deployment in a real unseen apartment, demonstrating the potential for practical indoor robot deployment in daily life. However, in household settings, many tasks require coordinated body movements while simultaneously manipulating objects with our arms. To address this challenge, recent efforts have focused on enhancing robotic agents with the ability for mobile manipulation. The most prominent approach is invoking navigation and manipulation as separate modules. This separation is achieved either by utilizing a high-level semantic controller, such as a large language model [1, 16], or by estimating low-level subgoals using motion planners [44]. In these works, behaviors are split into distinct navigation and manipulation skills. While this approach has proven effective for longhorizon pick-and-place tasks, it presents certain limitations. Firstly, it simply fails for tasks that demand simultaneous navigation and manipulation, such as opening a door. Without coordinated action, the robot’s body may collide with the door, preventing the successful opening of the door. Secondly, the physical constraints of the robot can negatively impact task completion. For example, cleaning a large table with a robot that has limited movement range, 1. Introduction The field of robot learning has traditionally treated robot navigation and manipulation as separate domains, leading * Work done during internship at PRIOR @ Allen Institute for AI More results are on our project site: https://rchalyang. github.io/HarmonicMM 1" 2312.06642v1,"CorresNeRF: Image Correspondence Priors for Neural Radiance Fields Yixing Lao The University of Hong Kong Xiaogang Xu Zhejiang Lab, Zhejiang University yxlao@cs.hku.hk xgxu@zhejianglab.com Zhipeng Cai Intel Labs Xihui Liu The University of Hong Kong Hengshuang Zhao ∗ The University of Hong Kong zhipeng.cai@intel.com xihuiliu@eee.hku.hk hszhao@cs.hku.hk Abstract Neural Radiance Fields (NeRFs) have achieved impressive results in novel view synthesis and surface reconstruction tasks. However, their performance suffers under challenging scenarios with sparse input views. We present CorresNeRF, a novel method that leverages image correspondence priors computed by off-theshelf methods to supervise NeRF training. We design adaptive processes for augmentation and filtering to generate dense and high-quality correspondences. The correspondences are then used to regularize NeRF training via the correspondence pixel reprojection and depth loss terms. We evaluate our methods on novel view synthesis and surface reconstruction tasks with density-based and SDF-based NeRF models on different datasets. Our method outperforms previous methods in both photometric and geometric metrics. We show that this simple yet effective technique of using correspondence priors can be applied as a plug-and-play module across different NeRF variants. The project page is at https://yxlao.github.io/corres-nerf/. 1 Introduction Building on coordinate-based implicit representations [1, 2, 3], Neural Radiance Field (NeRF) [4] has achieved great success in solving the fundamental computer vision problem of reconstructing 3D geometries from RGB images, benefiting various downstream applications. However, training such implicit representations typically requires a large number of input views, especially for objects with complex shapes, which can be costly to collect. Therefore, training NeRFs with sparse input RGB views remains a challenging yet important problem, where solving it can benefit various real-world applications, e.g., 3D portrait reconstruction in the monitoring system [5, 6, 7], the city digital reconstruction [8, 9, 10], etc. Several works [11, 12, 13, 14, 15, 16] have been proposed to address this problem by optimizing the rendering process or adding training constraints. However, these methods may suffer from poor realworld performance [12], since only sparse 2D input views are an under-constrained problem [17, 13], and the training process is prone to overfitting on the limited input views. Recent works have proposed to utilize extra priors to supervise NeRF training [14, 16, 18]. For example, some work proposed to train a separate network to compute depth priors [14]. However, current priors are not robust enough against the sparse property of the target scene, e.g., DS-NeRF [13] relies on running external SfM module [19] which may not yield sufficient point clouds for supervision, or not have an absolute scale and shift from the monocular depth estimation [16]. ∗ Corresponding author 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.06648v1,"Dense X Retrieval: What Retrieval Granularity Should We Use? Tong Chen ♣∗ Hongwei Wang ♢ Sihao Chen ♡ Wenhao Yu ♢ Kaixin Ma ♢ Xinran Zhao ♠ Dong Yu ♢ Hongming Zhang ♢ ♣ University of Washington ♢ Tencent AI Lab ♡ University of Pennsylvania ♠ Carnegie Mellon University 1 Introduction Dense retrievers are a popular class of techniques for accessing external information sources for knowledge-intensive tasks (Karpukhin et al., 2020). Before we use a learned dense retriever to retrieve from a corpus, an imperative design decision we have to make is the retrieval unit – i.e. the granularity at which we segment and index the retrieval ∗ Work was done during internship at Tencent AI Lab, Bellevue. § https://github.com/ct123098/ factoid-wiki Passage Retrieval Prior to restoration work performed between 1990 and 2001, the tower leaned at an angle of 5.5 degrees, but the tower now leans at about 3.99 degrees. This means the top of the Leaning Tower of Pisa is displaced horizontally 3.9 meters (12 ft 10 in) from the center. Sentence Retrieval Prior to restoration work performed between 1990 and 2001, the tower leaned at an angle of 5.5 degrees, but the tower now leans at about 3.99 degrees. Proposition Retrieval The Leaning Tower of Pisa now leans at about 3.99 degrees. 70 Passage Sentence Proposition Passage Retrieval Question Answering 40 60 EM@100 (%) Dense retrieval has become a prominent method to obtain relevant context or world knowledge in open-domain NLP tasks. When we use a learned dense retriever on a retrieval corpus at inference time, an often-overlooked design choice is the retrieval unit in which the corpus is indexed, e.g. document, passage, or sentence. We discover that the retrieval unit choice significantly impacts the performance of both retrieval and downstream tasks. Distinct from the typical approach of using passages or sentences, we introduce a novel retrieval unit, proposition, for dense retrieval. Propositions are defined as atomic expressions within text, each encapsulating a distinct factoid and presented in a concise, self-contained natural language format. We conduct an empirical comparison of different retrieval granularity. Our results reveal that proposition-based retrieval significantly outperforms traditional passage or sentence-based methods in dense retrieval. Moreover, retrieval by proposition also enhances the performance of downstream QA tasks, since the retrieved texts are more condensed with question-relevant information, reducing the need for lengthy input tokens and minimizing the inclusion of extraneous, irrelevant information. Question: What is the angle of the Tower of Pisa? Recall@5 (%) Abstract 50 40 30 Contriever GTR 30 20 10 0 Contriever GTR Figure 1: (Top) An example of three granularities of retrieval units of Wikipedia text when using dense retrieval. (Bottom) We observe that retrieving by propositions yields the best retrieval performance in both passage retrieval task and downstream open-domain QA task, e.g. with Contriever (Izacard et al., 2022) or GTR (Ni et al., 2022) as the backbone retriever. Highlight indicates the part that contains answer to the question. corpus for inference. In practice, the choice of retrieval unit, e.g. documents, fixed-length passage chunks or sentences, etc, is usually pre-determined based on how the dense retrieval model is instantiated or trained (Lewis et al., 2020; Lee et al., 2021a; Santhanam et al., 2022; Ni et al., 2022). In this paper, we investigate an overlooked research question with dense retrieval inference – at what retrieval granularity should we segment and index the retrieval corpus? We discover that selecting the right retrieval granularity at inference time can be a simple yet effective strategy for im-" 2312.06652v1,"Building Domain-Specific LLMs Faithful To The Islamic Worldview: Mirage or Technical Possibility? Shabaz Patel Independent Researcher shabaz.b.patel@gmail.com Hassan Kane Independent Researcher Rayhan Patel Independent Researcher Abstract Large Language Models (LLMs) have demonstrated remarkable performance across numerous natural language understanding use cases. However, this impressive performance comes with inherent limitations, such as the tendency to perpetuate stereotypical biases or fabricate non-existent facts. In the context of Islam and its representation, accurate and factual representation of its beliefs and teachings rooted in the Quran and Sunnah is key. This work focuses on the challenge of building domain-specific LLMs faithful to the Islamic worldview and proposes ways to build and evaluate such systems. Firstly, we define this openended goal as a technical problem and propose various solutions. Subsequently, we critically examine known challenges inherent to each approach and highlight evaluation methodologies that can be used to assess such systems. This work highlights the need for high-quality datasets, evaluations, and interdisciplinary work blending machine learning with Islamic scholarship. 1 1 Introduction Large Language Models (LLMs) have proven to be highly effective in solving a wide range of natural language understanding tasks and have achieved impressive scores on various human benchmarks [1]. Economic studies suggest that these models can complement the knowledge of highly skilled human workers in challenging tasks [2][3]. Islam is a religion that revolves around the teachings of the Prophet Muhammad (pbuh) and the Quran. The Quran is the central text of Islam and has been revealed to Prophet Muhammad over a period of approximately 23 years and has been excellently preserved, translated, and transmitted from its revelation to current times [4]. The teachings of the Prophet are well documented in the hadith books, which have chains of narrators and varying degrees of reliability [5][6]. Beyond the foundational texts of the Quran and the Sunnah of Prophet Muhammad, centuries of Islamic scholarship have produced a wealth of commentary, analysis, and guidance, explaining their relevance to different aspects of life. LLMs potentially provide a powerful way to interact with the rich and vast Islamic scholarship that has been produced over the past centuries and contextualize it within specific setups. Examples of applications include dialogue with scholars based on their writings, answering spiritual or philosophical questions rooted in the Quran and Sunnah, creating educational stories based on their teachings, etc. While the potential for creative and useful applications is encouraging, it is crucial to anticipate misuses and misrepresentations of Islam that such systems can promote, especially in light of the misinformation that already exists. 1 https://github.com/shabazpatel/domain-specific-llm. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.06671v1,"Generalized Finite Differences Method Applied to Finite Photonic Crystal Santiago Bustamante a,∗ , Esteban Marulanda b , Jorge Mahecha a , Herbert Vinck-Posada c a Grupo de Fı́sica Atómica y Molecular, Instituto de Fı́sica, Universidad de Antioquia, Medellı́n, Colombia b Grupo de Óptica y Fotónica, Instituto de Fı́sica, Universidad de Antioquia, Medellı́n, Colombia c Grupo de Superconductividad y Nanotecnologı́a, Departamento de Fı́sica, Universidad Nacional de Colombia, Bogotá, Colombia Abstract We propose a Generalized Finite-Differences in the Frequency Domain method for the computation of photonic band structures of finite photonic crystals. Our approach is to discretize some fundamental domain instead of a single unit cell, such that boundary conditions of interest can be introduced into the eigenvalue problem. The validity and effectiveness of the proposed method are shown for the case of a one-dimensional photonic crystal embedded in an optical cavity. The limit from finite to infinite photonic crystals is reviewed in view of the proposed method. Keywords: Photonic crystals, Bloch’s theorem, FDFD 1. Introduction In recent years, photonic crystals (PCs) have been demonstrated to exhibit unique properties that allow control of the light flow. These materials, characterized by their optical periodicity, have found widespread applications in various fields. For instance, PCs are used in realizing quantum optical phenomena [1, 2], designing quantum circuits [3], supercontinuum generation [4], fabrication of solar cells [5], biomedical and biological applications [6, 7], etc. ∗ Corresponding author Email address: santiago.bustamanteq@udea.edu.co (Santiago Bustamante) Preprint submitted to Optik December 13, 2023" 2312.06674v1,"Llama Guard: LLM-based Input-Output Safeguard for Human-AI Conversations Hakan Inan, Kartikeya Upasani, Jianfeng Chi, Rashi Rungta, Krithika Iyer, Yuning Mao, Michael Tontchev, Qing Hu, Brian Fuller, Davide Testuggine, Madian Khabsa GenAI at Meta We introduce Llama Guard, an LLM-based input-output safeguard model geared towards Human-AI conversation use cases. Our model incorporates a safety risk taxonomy, a valuable tool for categorizing a specific set of safety risks found in LLM prompts (i.e., prompt classification). This taxonomy is also instrumental in classifying the responses generated by LLMs to these prompts, a process we refer to as response classification. For the purpose of both prompt and response classification, we have meticulously gathered a dataset of high quality. Llama Guard, a Llama2-7b model that is instruction-tuned on our collected dataset, albeit low in volume, demonstrates strong performance on existing benchmarks such as the OpenAI Moderation Evaluation dataset and ToxicChat, where its performance matches or exceeds that of currently available content moderation tools. Llama Guard functions as a language model, carrying out multi-class classification and generating binary decision scores. Furthermore, the instruction fine-tuning of Llama Guard allows for the customization of tasks and the adaptation of output formats. This feature enhances the model’s capabilities, such as enabling the adjustment of taxonomy categories to align with specific use cases, and facilitating zero-shot or few-shot prompting with diverse taxonomies at the input. We are making Llama Guard model weights available and we encourage researchers to further develop and adapt them to meet the evolving needs of the community for AI safety. Date: December 13, 2023 Correspondence: Hakan Inan at inan@meta.com Code: https://github.com/facebookresearch/PurpleLlama/tree/main/Llama-Guard Blogpost: https://ai.meta.com/llama/purple-llama/#safeguard-model 1 Introduction The past few years have seen an unprecedented leap in the capabilities of conversational AI agents, catalyzed by the success in scaling up auto-regressive language modeling in terms of data, model size, and computational power (Hoffmann et al., 2022). Large language models (LLMs) are commonplace in chat assistant applications, exhibiting excellent linguistic abilities (Brown et al., 2020; Anil et al., 2023; Touvron et al., 2023), commonsense reasoning (Wei et al., 2022b; Yao et al., 2023), and general tool use (Schick et al., 2023; Cai et al., 2023) among other capabilities. These emerging applications require extensive testing (Liang et al., 2023; Chang et al., 2023) and careful deployments to minimize risks (Markov et al., 2023). For this reason, resources such as the Llama 2 Responsible Use Guide (Meta, 2023) recommend that products powered by Generative AI deploy guardrails that mitigate all inputs and outputs to the model itself to have safeguards against generating high-risk or policy-violating content as well as to protect against adversarial inputs and attempts at jailbreaking the model. How should one go about building these guardrails? A reasonable starting point is to reuse tools that were built to moderate online content, such as the Perspective API 1 , OpenAI Content Moderation API 2 , and Azure Content Safety API 3 . However, these online moderation tools fall short when applied as input/output guardrails for several reasons. First, none of the available tools distinguishes between assessing safety risks 1 https://perspectiveapi.com/ 2 https://platform.openai.com/docs/guides/moderation/overview 3 https://azure.microsoft.com/en-us/products/ai-services/ai-content-safety 1" 2312.06678v1,"Constraining nucleon effective masses with flow and stopping observables from the SπRIT experiment C.Y. Tsang a,b,c,∗ , M. Kurata-Nishimura d,∗ , M.B. Tsang a,b,∗ , W.G. Lynch a,b,∗ , Y.X. Zhang e , J. Barney a,b , J. Estee a,b , G. Jhang a , R. Wang a , M. Kaneko d,f , J.W. Lee g , T. Isobe d,∗ , T. Murakami d,f,∗ , D.S. Ahn d , L. Atar h,i , T. Aumann h,i , H. Baba d , K. Boretzky i , J. Brzychczyk j , G. Cerizza a , N. Chiga d , N. Fukuda d , I. Gasparic d,k,h , B. Hong g , A. Horvat h,i , K. Ieki l , N. Inabe d , Y.J. Kim m , T. Kobayashi n , Y. Kondo o , P. Lasko p , H. S. Lee m , Y. Leifels i , J. Łukasik p , J. Manfredi a,b , A. B. McIntosh q , P. Morfouace a , T. Nakamura o , N. Nakatsuka d,f , S. Nishimura d , H. Otsu d , P. Pawłowski p , K. Pelczar j , D. Rossi h,i , H. Sakurai d , C. Santamaria a , H. Sato d , H. Scheit h , R. Shane a , Y. Shimizu d , H. Simon i , A. Snoch r , A. Sochocka j , T. Sumikama d , H. Suzuki d , D. Suzuki d , H. Takeda d , S. Tangwancharoen a,s,t , H. Törnqvist h,i , Y. Togano l , Z. G. Xiao u , S. J. Yennello q,v , Y. Zhang u , SπRIT collaboration a National Superconducting Cyclotron Laboratory, Michigan State University, East Lansing, Michigan 48824, USA, b Department of Physics, Michigan State University, East Lansing, Michigan 48824, USA, c Kent State University, 800 E Summit St, Kent, Ohio, 44240, USA, d RIKEN Nishina Center, Hirosawa 2-1, Wako, Saitama 351-0198, Japan, e China Institute of Atomic Energy; Beijing, 102413, PR China, f Department of Physics, Kyoto University, Kita-shirakawa, Kyoto 606-8502, Japan, g Department of Physics, Korea University, Seoul 02841, Republic of Korea, h Institut für Kernphysik, Technische Universität Darmstadt, D-64289 Darmstadt, Germany, i GSI Helmholtzzentrum für Schwerionenforschung, Planckstrasse 1, 64291 Darmstadt, Germany, j Faculty of Physics, Astronomy and Applied Computer Science, Jagiellonian University, Kraków, Poland, k Division of Experimental Physics Rudjer Boskovic Institute Zagreb Croatia l Department of Physics, Rikkyo University, Nishi-Ikebukuro 3-34-1, Tokyo 171-8501, Japan, m Rare Isotope Science Project, Institute for Basic Science, Daejeon 34047, Republic of Korea, n Department of Physics, Tohoku University, Sendai 980-8578, Japan, o Department of Physics, Tokyo Institute of Technology, Tokyo 152-8551, Japan, p Institute of Nuclear Physics PAN, ul. Radzikowskiego 152, 31-342 Kraków, Poland, q Cyclotron Institute, Texas A&M University, College Station, Texas 77843, USA, r Nikhef National Institute for Subatomic Physics, Amsterdam, Netherlands, s Department of Physics Faculty of Science King Mongkut’s University of Technology Thonburi Bangkok Thailand t Center of Excellence in Theoretical and Computational Science (TACS-CoE) Faculty of Science King Mongkut’s University of Technology Thonburi Bangkok Thailand u Department of Physics, Tsinghua University, Beijing 100084, PR China, v Department of Chemistry, Texas A&M University, College Station, Texas 77843, USA, Abstract Properties of the nuclear equation of state (EoS) can be probed by measuring the dynamical properties of nucleus-nucleus collisions. In this study, we present the directed flow (v 1 ), elliptic flow (v 2 ) and stopping (VarXZ) measured in fixed target Sn + Sn collisions at 270 AMeV with the SπRIT Time Projection Chamber. We perform Bayesian analyses in which EoS parameters are varied simultaneously within the Improved Quantum Molecular Dynamics-Skyrme (ImQMD- Sky) transport code to obtain a multivariate correlated constraint. The varied parameters include symmetry energy, S 0 , and slope of the symmetry energy, L, at saturation density, isoscalar effective mass, m ∗ s /m N , isovector effective mass, m ∗ v /m N and the in-medium cross-section enhancement factor η. We find that the flow and VarXZ observables are sensitive to the splitting of proton and neutron effective masses and the in-medium cross-section. Comparisons of ImQMD-Sky predictions to the SπRIT data suggest a narrow range of preferred values for m ∗ s /m N , m ∗ v /m N and η. 1. Introduction Nuclear matter is a significant component of neutron stars, and understanding its properties can elucidate many ∗ Corresponding author Email addresses: ctsang1@kent.edu (C.Y. Tsang), mizuki@riken.jp (M. Kurata-Nishimura), tsang@frib.msu.edu (M.B. Tsang), lynch@frib.msu.edu (W.G. Lynch), isobe@riken.jp (T. Isobe), murakami.tetsuya.3e@kyoto-u.jp (T. Murakami) Preprint submitted to Physics Letters B features of these celestial objects. Calculating the properties of both nuclear matter and neutron stars requires extensive knowledge of the nuclear equation of state (EoS), which describes the dependence of nuclear-matter internal energy on various state variables. Progress in understanding nuclear EoS has been achieved through heavy ion collisions [1, 2, 3] and multimessenger astronomical observations of neutron stars [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, December 13, 2023" 2312.06711v1,"Physics Informed Neural Network for Option Pricing Ashish Dhiman Yibei Hu ashish1610dhiman@gmail.com yibei.careers@gmail.com Abstract tors, including asset price, strike price, time until expiration, volatility, and the risk-free interest rate. The primary goal of option pricing is to work out the probability of whether the option is “in-the-money” or “outof-money” when it is exercised. Option pricing is crucial for traders, investors, and financial institutions in making informed decisions about buying, selling, or hedging risks against certain underlying assets. Precise estimation of the option price helps stabilize the financial market, as financial portfolios and strategies are adjusted according to the changes in the option price [2]. The problem of robust option pricing becomes even more pressing in the current times, with the volatile market conditions and unforeseen changes in Treasury Yield curves. Partial Differential Equations (PDE) method can be applied to option pricing problems. That is, to compute the price function as the solution of a PDE. One such method is the framework of the Black–Scholes model [3], where a parabolic nonlinear PDE is used to describe option price dynamics. Furthermore, specific initial and boundary conditions are exploited to represent some contract features mathematically, e.g. call or put, European or American. The BS model 1 has been the industry bedrock in estimating the fair value of options, with numerous modifications proposed [5]. We apply a physics-informed deep-learning approach 1 to the Black-Scholes equation for pricing American and European options. We test our approach on both simulated as well as real market data, compare it to analytical/numerical benchmarks. Our model is able to accurately capture the price behavior on simulation data, while also exhibiting reasonable performance for market data (with an improvement of 3̃0% over benchmark). We also experiment with the architecture and learning process of our PINN model to provide more understanding of convergence and stability issues that impact performance. 1. Introduction Today, finance dramatically benefits from the introduction of Artificial Intelligence and Deep Learning methodologies. Among the several topics discussed in the last years, we deal with numerical methods for option pricing. Options are financial derivative contracts that give the buyer the right to buy or sell an underlying asset at a fixed price within a specified period or on a certain expiration date. The most important financial option styles are European and American. Call option grants the right to buy, and the Put option grants the right to sell [15]. European guarantees the buyer to purchase/sell the asset at the exercise price only at the maturity date. However, the American options allow the buyer to purchase/sell the asset prior to and including the maturity date [7]. European options look only to maturity price, while American ones also consider price dynamics from the contract’s start date to maturity. f := 1 ∂ 2 V ∂V ∂V + σ 2 S 2 2 + rS − rV = 0 ∂t 2 ∂S ∂S (1) where V is the option price, t is time, σ is the volatility of the underlying asset, S is the spot price of the underlying asset, and r is the risk-free interest rate. While the Black-Scholes equation (1) can be analytically solved for European options, the introduction of American options, which allows for the exercise of the contract at any point within the specified time period, makes the analytical solution infeasible. Consequently, numerical techniques such as Finite Difference and Finite Element are used to approximate the option price for American options. Our physics-informed solution is driven by data, and the above PDE (1) will compute the hidden state (or Price) V (t, S) of the system (or option), given boundary data, measurements and fixed model parameters (risk free rate, 1.1. Option pricing An option price consists of intrinsic value (a measure of the profitability of an option) and time value (which is based on the expected volatility of the underlying asset and the time left until the option expiration date). Determining the fair value of option prices depends on several fac- 1 Code available at: https : / / github . com / ashish1610dhiman/pinn_option_pricing 1" 2312.06717v1,"P RIVACY I SSUES IN L ARGE L ANGUAGE M ODELS : A S URVEY T ECHNICAL R EPORT Seth Neel SAFR AI Lab Harvard Business School Cambridge, MA sneel@hbs.edu Peter W. Chang SAFR AI Lab Harvard Business School Cambridge, MA pchang@hbs.edu A BSTRACT This is the first survey of the active area of AI research that focuses on privacy issues in Large Language Models (LLMs). Specifically, we focus on work that red-teams models to highlight privacy risks, attempts to build privacy into the training or inference process, enables efficient data deletion from trained models to comply with existing privacy regulations, and tries to mitigate copyright issues. Our focus is on summarizing technical research that develops algorithms, proves theorems, and runs empirical evaluations. While there is an extensive body of legal and policy work addressing these challenges from a different angle, that is not the focus of our survey. Nevertheless, these works, along with recent legal developments do inform how these technical problems are formalized, and so we discuss them briefly in Section 1. While we have made our best effort to include all the relevant work, due to the fast moving nature of this research we may have missed some recent work. If we have missed some of your work please contact us, as we will attempt to keep this survey relatively up to date. We are maintaining a repository with the list of papers covered in this survey and any relevant code that was publicly available at https://github.com/safr-ml-lab/survey-llm. Keywords Large Language Models · Privacy Contents 1 Motivation 2 2 General Terminology 4 3 Memorization 5 3.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.1.1 Additional Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Risk Factors for Memorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2.1 Capacity of Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.2 Size of Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2.3 Data Duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2.4 Prompt Length and Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2.5 Time of Memorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Mitigation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2 3.3" 2312.06722v1,"EgoPlan-Bench: Benchmarking Egocentric Embodied Planning with Multimodal Large Language Models Yi Chen 1 , Yuying Ge 1∗ , Yixiao Ge 1 , Mingyu Ding 3 , Bohao Li 1,4 , Rui Wang, Ruifeng Xu 5∗ , Ying Shan 1 , Xihui Liu 2 * 1 Tencent AI Lab, 2 The University of Hong Kong, 3 University of California, Berkeley, 4 The Chinese University of Hong Kong, Shenzhen, 5 Peng Cheng Laboratory yichennlp@gmail.com https://chenyi99.github.io/ego plan/ Abstract Multimodal Large Language Models (MLLMs), building upon the powerful Large Language Models (LLMs) with exceptional reasoning and generalization capability, have opened up new avenues for embodied task planning. MLLMs excel in their ability to integrate diverse environmental inputs, such as real-time task progress, visual observations, and open-form language instructions, which are crucial for executable task planning. In this work, we introduce a benchmark with human annotations, EgoPlan- Bench, to quantitatively investigate the potential of MLLMs as embodied task planners in real-world scenarios. Our benchmark is distinguished by realistic tasks derived from real-world videos, a diverse set of actions involving interactions with hundreds of different objects, and complex visual observations from varied environments. We evaluate various open-source MLLMs, revealing that these models have not yet evolved into embodied planning generalists (even GPT-4V). We further construct an instruction-tuning dataset EgoPlan-IT from videos of human-object interactions, to facilitate the learning of high-level task planning in intricate real-world situations. The experiment results demonstrate that the model tuned on EgoPlan-IT not only significantly improves performance on our benchmark, but also effectively acts as embodied planner in simulations. 1. Introduction In recent years, Large Language Models (LLMs) [4, 5, 37, 43] demonstrate strong performance in general-purpose NLP tasks. By integrating the impressive reasoning and generalization ability of LLMs seamlessly with multimodal comprehension capabilities, Multimodal Large Lan- * Corresponding authors. Task Progress Current Observation User Ground-Truth Considering the progress shown in the video and my current observation in the last frame, what action should I take next in order to mix the meat with yogurt? Stir meat. GPT-4V Add yogurt to meat. Figure 1. Our EgoPlan-Bench presents significant challenges for embodied planning given real-time task progress and visual observation in real-world scenarios (even GPT-4V makes mistakes). guage Models (MLLMs) have yielded some promising results in end-to-end embodied task planning, which can decompose a high-level task goal into a sequence of executable actions step by step [9]. However, embodied task planning in real-world scenarios has not been thoroughly evaluated in previous studies [9, 21, 34]. Real-world scenarios often pose significant challenges for embodied planning, as they require a comprehensive understanding of the dynamic and complex visual environment and the identification of the key information relevant to the tasks. The model needs to comprehend various types of fine-grained visual information such as the object states and spatial relationships between objects. Moreover, for long-horizon tasks, models are expected to process a series of past visual observations to assess the task progress and make informed plans that better facilitate task completion. As exemplified in Figure 1, in order to decide the next appropriate action for “mixing the meat with yogurt”, the model must be able to understand and track several state changes of the yogurt container and the spoon, and clearly identify the white paste of yogurt on the meat that requires" 2312.06728v1,"A Multimodal Dataset and Benchmark for Radio Galaxy and Infrared Host Detection Nikhel Gupta ∗ CSIRO Space & Astronomy, PO Box 1130, Bentley WA 6102, Australia Ray P. Norris CSIRO Space & Astronomy, PO Box 76, Epping, NSW 1710, Australia Zeeshan Hayder CSIRO Data61 Black Mountain ACT 2601, Australia Minh Hyunh CSIRO Space & Astronomy, PO Box 1130, Bentley WA 6102, Australia Lars Petersson CSIRO Data61 Black Mountain ACT 2601, Australia Abstract We present a novel multimodal dataset developed by expert astronomers to automate the detection and localisation of multi-component extended radio galaxies and their corresponding infrared hosts. The dataset comprises 4,155 instances of galaxies in 2,800 images with both radio and infrared modalities. Each instance contains information on the extended radio galaxy class, its corresponding bounding box that encompasses all of its components, pixel-level segmentation mask, and the position of its corresponding infrared host galaxy. Our dataset is the first publicly accessible dataset that includes images from a highly sensitive radio telescope, infrared satellite, and instance-level annotations for their identification. We benchmark several object detection algorithms on the dataset and propose a novel multimodal approach to identify radio galaxies and the positions of infrared hosts simultaneously. 1 Introduction Recent advancements in radio astronomy have enabled us to scan large areas of the sky in a short timescale while generating incredibly sensitive continuum images of the Universe. This has created new possibilities for detecting millions of galaxies at radio wavelengths. For example, the ongoing Evolutionary Map of the Universe (EMU; Norris et al., 2021) survey, conducted using the Australian Square Kilometre Array Pathfinder (ASKAP; Hotan et al., 2021) telescope, is projected to discover more than 40 million compact and extended galaxies in the next five years (Norris et al., 2021; Hotan et al., 2021). Similarly, the Low-Frequency Array (LOFAR; van Haarlem et al., 2013) survey of the entire northern sky is also expected to detect more than 10 million galaxies. With the advent of the Square Kilometre Array (SKA 2 ) radio telescope, which is expected to become operational in the coming years, the number of galaxy detections is expected to increase further, potentially reaching hundreds of millions. Such an enormous dataset will significantly impact our understanding of the physics of galaxy evolution. It will allow us to constrain the theoretical models of the Universe (e.g. ∗ 2 nikhel.gupta@csiro.au https://www.skatelescope.org/the-ska-project/ Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.06729v1,"RGNet: A Unified Retrieval and Grounding Network for Long Videos Thomas Seidl 1,2 Gedas Bertasius 3 3 UNC Chapel Hill Moment Abstract Forward Pass We present a novel end-to-end method for long-form video temporal grounding to locate specific moments described by natural language queries. Prior long-video methods for this task typically contain two stages: proposal selection and grounding regression. However, the proposal selection of these methods is disjoint from the grounding network and is not trained end-to-end, which limits the effectiveness of these methods. Moreover, these methods operate uniformly over the entire temporal window, which is suboptimal given redundant and irrelevant features in long videos. In contrast to these prior approaches, we introduce RGNet, a unified network designed for jointly selecting proposals from hour-long videos and locating moments specified by natural language queries within them. To achieve this, we redefine proposal selection as a video-text retrieval task, i.e., retrieving the correct candidate videos given a text query. The core component of RGNet is a unified crossmodal RG-Encoder that bridges the two stages with shared features and mutual optimization. The encoder strategically focuses on relevant time frames using a sparse sampling technique. RGNet outperforms previous methods, demonstrating state-of-the-art performance on long video temporal grounding datasets MAD and Ego4D. The code is released at https://github.com/Tanveer81/RGNet. Grounding Encoder Proposal Retriever Backward Pass Moment Grounding Decoder Query Query Grounding Decoder Query Tanveer Hannan 1,2 * Md Mohaiminul Islam 3 1 LMU Munich 2 MCML RG-Encoder Long Video Long Video Existing Disjoint Network Proposed Unified RGNet Figure 1. The Long Video Temporal Grounding (LVTG) task requires detecting the precise moment boundary based on a natural language query within a long video (several hours or longer). Traditional methods involve a separate proposal retriever and grounding network, which are usually trained disjointly, thus limiting the effectiveness of these approaches. In contrast, we propose RGNet, an end-to-end trainable architecture that unifies the two stages with shared features and mutual optimization. clip [43, 56, 59]. However, handling all the clips is computationally intensive, resulting in numerous proposed moments and making the task even more challenging. In contrast, several proposal-based methods [16, 38] apply their grounding model only to a selected set of proposal clips, offering a more efficient solution while demonstrating better performance. However, these models have a separate module for selecting the proposals, which is disjoint from the grounding network. The separate optimization of these two modules leads to suboptimal results and complicates the integration of the two training stages. Additionally, it results in redundant computations, as both stages necessitate videotext modeling. Since both stages require a cross-modal similarity function between the text query and the proposal clips, we believe that unifying the cross-modal modeling of both stages can facilitate effective end-to-end optimization 1. Introduction The exponential rise in online videos has created the demand for efficient search engines. The search results of user queries, particularly in long videos, often require finding specific moments. Most existing solutions, tailored for short videos (5-30 seconds in length) [58], struggle when applied to hour-long videos, slowing down searches and impacting the quality of the search results [44]. This challenge emerges because it is very difficult to locate short moments in a long video based on text queries, a task known as Long Video Temporal Grounding (LVTG) [14, 44]. A straightforward solution is to divide the video into shorter clips and predict moments individually from each * Corresponding author: hannan@dbs.ifi.lmu.de 1" 2312.06738v1,"InstructAny2Pix: Flexible Visual Editing via Multimodal Instruction Following Shufan Li, Harkanwar Singh, Aditya Grover {jacklishufan,harkanwarsing,adityag}@cs.ucla.edu University of California, Los Angeles Abstract The ability to provide fine-grained control for generating and editing visual imagery has profound implications for computer vision and its applications. Previous works have explored extending controllability in two directions: instruction tuning with text-based prompts and multi-modal conditioning. However, these works make one or more unnatural assumptions on the number and/or type of modality inputs used to express controllability. We propose InstructAny2Pix, a flexible multi-modal instruction-following system that enables users to edit an input image using instructions involving audio, images, and text. InstructAny2Pix consists of three building blocks that facilitate this capability: a multi-modal encoder that encodes different modalities such as images and audio into a unified latent space, a diffusion model that learns to decode representations in this latent space into images, and a multi-modal LLM that can understand instructions involving multiple images and audio pieces and generate a conditional embedding of the desired output, which can be used by the diffusion decoder. Additionally, to facilitate training efficiency and improve generation quality, we include an additional refinement prior module that enhances the visual quality of LLM outputs. These designs are critical to the performance of our system. We demonstrate that our system can perform a series of novel instruction-guided editing tasks. The code is available at https://github.com/jacklishufan/InstructAny2Pix.git 1. Introduction With growing fidelity of generative models of images [3, 21], the ability to control their outputs is critical for many real-world applications, ranging from creative generation to synthetic augmentations. However, popular state-of-the-art tools such as ControlNet[34] and T2I[20] can only perform specific edits they are trained on. Many of these models also require inputs such as Canny edge, Depth, or Surface Normal, making them inaccessible to general users without expertise in computer vision. To mitigate this, instructionbased image editing methods such as InstructPix2Pix[4] al- low users to describe their instructions in natural languages, such as “add a dog.” But, such methods are still limited to simple instruction on which they are trained and cannot generalize to complex instructions involving multiple editing operations or multiple objects. Additionally, they cannot take additional audiovisual inputs, making them struggle with tasks such as style transfer. We propose InstructAny2Pix, the first instructionfollowing image editing system that can follow complicated, multi-modal, multi-object instructions. Concrete examples of such instructions can be “add the [sound] to [image],” where the sound can be that of a dog barking or a piece of music. It can also be “add [object A] and remove [object B] from [image],” where objects can be represented by either images, text, or audio. Additionally, it can also include free-form instructions like “change [image A] to the style of [image B]” or “fit [image] to [music].” Our work represents a significant expansion in the scope of image editing instructions. Through both quantitative and qualitative evaluations, we show that our proposed method achieves high performance on diverse editing tasks. Our framework brings together the multi-modal perception capability of a multi-modal encoder, high quality generation capability of a diffusion model and instruction understanding capability of a LLM. The performance of our system depends on three key components: First, we train our model on large amounts of multimodal edit instructions. Our training data consists of diverse instructions, including adding audio to an image, adding an image to an image, adding multiple objects, or replacing an object with another object where objects are represented by either images, text, or audio. We generate this dataset by prompting state-of-the-art Large Language Models with human-written examples for each category of instructions. This diverse dataset is crucial for extending instruction-following capabilities of image-editing systems to long, complex, and multi-modal instructions. Second, we integrate recent techniques in instruction tuning of language models and multi-modal representation learning to efficiently understand instructions involving inputs of multiple modalities. In particular, we encode the" 2312.06777v1,"Light Dirac neutrino portal dark matter with gauged U (1) B−L symmetry Debasish Borah 1, ∗ and Nayan Das 1, † 1 Department of Physics, Indian Institute of Technology Guwahati, Assam 781039, India Abstract We propose a gauged U (1) B−L version of the light Dirac neutrino portal dark matter. The U (1) B−L symmetry provides a UV completion by naturally accommodating three right handed neutrinos from anomaly cancellation requirements which, in combination with the left handed neutrinos, form the sub-eV Dirac neutrinos after electroweak symmetry breaking. The particle content and the gauge charges are chosen in such a way that light neutrinos remain purely Dirac and dark matter, a gauge singlet Dirac fermion, remain stable. We consider both thermal and non- thermal production possibilities of dark matter and correlate the corresponding parameter space with the one within reach of future cosmic microwave background (CMB) experiments sensitive to enhanced relativistic degrees of freedom ∆N eff . The interplay of dark matter, CMB, structure formation and other terrestrial constraints keep the scenario very predictive leading the U (1) B−L parameter space into tight corners. ∗ Electronic address: dborah@iitg.ac.in † Electronic address: nayan.das@iitg.ac.in 1" 2312.06805v1,"Extreme light confinement and control in low-symmetry phonon-polaritonic crystals Emanuele Galiffi †1 , Giulia Carini †2 , Xiang Ni †3 , Gonzalo Álvarez-Pérez 4,5 , Simon Yves 1 , Enrico Maria Renzi 1,6 , Ryan Nolen 1 , Sören Wasserroth 2 , Martin Wolf 2 , Pablo Alonso-Gonzalez 4,5 , Alexander Paarmann* 2 , and Andrea Alù** 1,6 1 Advanced Science Research Center, City University of New York, 85 St. Nicholas Terrace, 10031 New York, NY, USA 2 Fritz Haber Institute of the Max Planck Society, Berlin, Germany 3 School of Physics and Electronics, Central South University, Changsha, Hunan 410083, China 4 Department of Physics, University of Oviedo, 33006, Oviedo, Spain 5 Center of Research on Nanomaterials and Nanotechnology, CINN (CSIC-Universidad de Oviedo), El Entrego, Spain 6 Physics Program, The Graduate Center, City University of New York, 10026 New York, NY, USA * e-mail: alexander.paarmann@fhi-berlin.mpg.de ** e-mail: aalu@gc.cuny.edu † These authors contributed equally to this work. ABSTRACT Polaritons are a hybrid class of quasiparticles originating from the strong and resonant coupling between light and matter excitations. Recent years have witnessed a surge of interest in novel polariton types, arising from directional, long-lived material resonances, and leading to extreme optical anisotropy that enables novel regimes of nanoscale, highly confined light propagation. While such exotic propagation features may also be in principle achieved using carefully designed metamaterials, it has been recently realized that they can naturally emerge when coupling infrared light to directional lattice vibrations, i.e., phonons, in polar crystals. Interestingly, a reduction in crystal symmetry increases the directionality of optical phonons and the resulting anisotropy of the response, which in turn enables new polaritonic phenomena, such as hyperbolic polaritons with highly directional propagation, ghost polaritons with complex-valued wave vectors, and shear polaritons with strongly asymmetric propagation features. In this Review, we develop a critical overview of recent advances in the discovery of phonon polaritons in low-symmetry crystals, highlighting the role of broken symmetries in dictating the polariton response and associated nanoscale-light propagation features. We also discuss emerging opportunities for polaritons in lower-symmetry materials and metamaterials, with connections to topological physics and the possibility of leveraging anisotropic nonlinearities and optical pumping to further control their nanoscale response. Introduction Polaritons are hybrid light-matter excitations, emerging from the strong coupling between photons and dipolar material excitations. The first-observed form of polariton, the plasmon polariton 1, 2 , emerges from the coupling of photons with the oscillations of the quasi-free electron plasma in metals, leading to highly confined optical fields and largely enhanced lightmatter interactions. The past two decades have witnessed tremendous research efforts in the associated field of plasmonics 3 , which leverages plasmon polaritons to unveil nanophotonic technologies that exploit their features. In parallel, the past few years have experienced a broadening of polariton research, as polaritonic coupling based on several other material excitations, such as phonons, excitons and Cooper pairs, has gained considerable attention 4–6 . As a result, we are currently witnessing different branches of polariton research which, besides nanophotonics, address several aspects of light-matter coupling, such as polariton-driven chemistry 7 , vibrational strong coupling 8 , quantum optics 9 , ultra- and deep- strong coupling 10 , and excitonpolariton physics in 2D materials 11 . For nanophotonic applications at infrared frequencies, phonon polaritons 12, 13 (PhPs) have gained significant attention for two features: (i) the low optical losses of PhPs in contrast to other polariton families 14, 15 , and (ii) the inherently anisotropic response of PhPs 16 , due to the directionality of phonon oscillators in many polar crystals, associated with their non-trivial structural symmetry. In the following, we higlight and discuss the role of directionality and broken symmetry for polaritonics, focusing on the role of crystal symmetry in establishing anisotropic PhPs in natural materials, and discussing the opportunities that arise in these low-symmetry materials for polariton physics and applications." 2312.06807v1,"On parallel laser beam merger in plasmas K. V. Lezhnin, 1, a) Kenan Qu, 2 N. J. Fisch, 2 and S. V. Bulanov 3, 4 1) Princeton Plasma Physics Laboratory, 100 Stellarator Rd, Princeton, NJ 08540, USA 2) Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08544, USA 3) ELI Beamlines Facility, The Extreme Light Infrastructure ERIC, Za Radnicı́ 835, Dolnı́ Břežany 25241, Czech Republic 4) National Institutes for Quantum and Radiological Science and Technology (QST), Kansai Photon Science Institute, Kyoto 619-0215, Japan (Dated: 13 December 2023) Self-focusing instability is a well-known phenomenon of nonlinear optics, which is of great importance in the field of laser-plasma interactions. Self-focusing instability leads to beam focusing and, consequently, breakup into multiple laser filaments. The majority of applications tend to avoid the laser filamentation regime due to its detrimental role on laser spot profile and peak intensity. In our work, using nonlinear Schrödinger equation solver and particle-in-cell simulations, we address the problem of interaction of multiple parallel beams in plasmas. We consider both non-relativistic and moderately relativistic regimes, and demonstrate how the physics of parallel beam interaction transitions from the familiar self- and mutual-focusing instabilities in the non-relativistic regime to moderately relativistic regime, where an analytical description of filament interaction is impenetrable. I. INTRODUCTION Self-focusing or self-modulational instabilities are wellknown processes in optical fibers 1 and laser-plasma interaction 2 . These instabilities typically lead to the broadening of the pulse spectrum and may cause a breakup of the incident pulse into multiple longitudinal and transverse filaments 3 . Such behavior is usually found detrimental to potential applications, and a multitude of approaches to avoid such instabilities are proposed. For instance, in works by Kalmykov et al. 4 , it is shown that the introduction of an auxiliary parallel laser pulse with a shorter wavelength may help to control plasma wave beating and to balance out the self-focusing effect to facilitate steady propagation of the laser beam without significant changes in laser spot over multiple Rayleigh lengths, potentially improving the laser wakefield acceleration of electrons. In some applications, it is possible to use incoherent beams 5,6 , thereby effectively avoiding the power threshold for the self-focusing instability, P cr = 17.3GW · (n e /n cr ) −1 (n e is the plasma density and n cr = m e ω 0 2 /4πe 2 is the critical density for the laser pulse of frequency ω 0 ), see Refs. 1–3 . Oblique crossing of multiple laser pulses for the self-focusing suppression is also discussed theoretically 7 . As the majority of potential applications benefit from higher laser powers/intensities on target, including laser ion acceleration, gamma ray and e − − e + pair generation, inertial confinement fusion, and plasmabased laser amplification, it is very instrumental to control the self-focusing instability. Coming from a different perspective, it is well-known a) Electronic mail: klezhnin@pppl.gov that one may use a mutual-focusing-like instability to avoid catastrophic self-focusing in air by redistributing the laser power into so-called parallel beam arrays that merge in a controllable fashion, see Ref. 8,9 and references therein. For instance, in Ref. 8 , it was shown that such beam combination is experimentally feasible for two subcritical laser filaments (P 1 , P 2 < P cr ) with total power P 1 +P 2 exceeding P cr , and, thus, triggering mutual focusing and eventual beam merger. Such phenomenon was explained theoretically using nonlinear Schrödinger equation (NSE) envelope model. In Refs. 10,11 , a merger of collinear beams via self-modulational instability was discussed for a Kerr-like medium, while Ref. 12 addresses the question of an interaction of the parallel beams with a transverse shift. One may expect that similar physics will prevail in tenuous plasmas as well, as long as a 0 ≪ 1 (a 0 is the dimensionless laser field, a 0 ≡ eE 0 /m e ω 0 c, subscript ”0” denotes the initial laser field value). When laser amplitude becomes a 0 ≈ 1, the approximation of the nonlinear Schrödinger model with cubic nonlinearity breaks up, as the self-focusing term, |a| 2 , is assumed to be much smaller than one. The theoretical description of the laser beam of high intensity propagating in tenuous plasmas thus becomes incomprehensible for the NSE model, and kinetic simulations are usually utilized to consider such a regime. Pioneering works by Askaryan et al. 13,14 showed that an incident beam of a 0 = 5 propagating in near-critical plasma density of n e /n cr = 0.5625, while initially being separated into two via filamentation, later on combined two filaments into a single tightly focused beam with negligible power losses. Similar behavior was observed in 3D PIC simulations with a 0 ∼ 1 15 and a 0 ≫ 1 16 . Thus, it may be possible to find a regime to reliably combine multiple parallel beams in collisionless plasmas to achieve higher pulse powers and avoid energy losses associated with the laser power" 2312.06811v1,"OPTIMAL REINSURANCE FROM AN OPTIMAL TRANSPORT PERSPECTIVE BEATRICE ACCIAIO, HANSJÖRG ALBRECHER, AND BRANDON GARCÍA FLORES Abstract. We regard the optimal reinsurance problem as an iterated optimal transport problem between a (known) initial and an (unknown) resulting risk exposure of the insurer. We also provide conditions that allow to characterize the support of optimal treaties, and show how this can be used to deduce the shape of the optimal contract, reducing the task to a finite-dimensional optimization problem, for which standard techniques can be applied. The proposed approach provides a general framework that encompasses many reinsurance problems, which we illustrate in several concrete examples, providing alternative proofs of classical optimal reinsurance results as well as establishing new optimality results, some of which contain optimal treaties that involve external randomness. 1. Introduction The identification of optimal reinsurance forms is a classical problem of actuarial risk theory. Starting with pioneering work of de Finetti [24], Borch [15, 16] and Arrow [4], with varying objective functions, constraints and choice of involved contract parties, the topic has been a rich source of interesting mathematical problems and is still a very active field of research, see for instance [19, 1] for an overview. Among the many conceptual and influential contributions to the topic over the last years, we mention here Kaluszka [33], Cai & Tan [18], Balbas et al. [8, 9] as well as Cheung et al. [20, 23, 22]. For game-theoretic approaches to equilibria and efficient solutions, see e.g. [7, 11, 45, 13]. For a situation with several reinsurers, see Boonen & Ghossoub [12]. An interesting link of optimal reinsurance problems to the Neyman-Pearson lemma of statistical hypothesis testing was established by Lo [35], encompassing earlier contributions such as [46]; see [21] for a recent considerable generalization of this approach. For a backward-forward optimization procedure in a rather general setting, we refer to Boonen & Jiang [14]. An intuitive practical constraint when looking for an optimal reinsurance contract is its deterministic nature, i.e., the reinsured amount is identified deterministically once the claim size of the first line insurance company is known. At the same time, one may imagine scenarios where a randomized contract (a contract where beside the original claim size, an additional exogeneous random mechanism is used to determine the eventual reinsured amount) leads in fact to a better solution of the original optimization problem. That is, (B. Acciaio) Department of Mathematics, ETH Zurich, Rämistrasse 101, 8092 Zürich, Switzerland (H. Albrecher) Department of Actuarial Science, Faculty of Business and Economics and Swiss Finance Institute, University of Lausanne, UNIL-Chamberonne, CH-1015 Lausanne, Switzerland (B. Garcı́a Flores) Department of Actuarial Science, Faculty of Business and Economics, University of Lausanne,UNIL-Chamberonne, CH-1015 Lausanne, Switzerland E-mail addresses: beatrice.acciaio@math.ethz.ch, hansjoerg.albrecher@unil.ch, brandon.garciaflores@unil.ch. Key words and phrases. Optimal reinsurance, optimal transport, risk measures. 1" 2312.06832v1,"Symptom-based Machine Learning Models for the Early Detection of COVID-19: A Narrative Review Moyosolu Akinloye Department of Computing and Informatics Bournemouth University Bournemouth, England, United Kingdom s5550338@bournemouth.ac.uk Abstract—Despite the widespread testing protocols for COVID-19, there are still significant challenges in early detection of the disease, which is crucial for preventing its spread and optimizing patient outcomes. Owing to the limited testing capacity in resource-strapped settings and the limitations of the available traditional methods of testing, it has been established that a fast and efficient strategy is important to fully stop the virus. Machine learning models can analyze large datasets, incorporating patient-reported symptoms, clinical data, and medical imaging. Symptom-based detection methods have been developed to predict COVID-19, and they have shown promising results. In this paper, we provide an overview of the landscape of symptoms-only machine learning models for predicting COVID-19, including their performance and limitations. The review will also examine the performance of symptom-based models when compared to image-based models. Because different studies used varying datasets, methodologies, and performance metrics. Selecting the model that performs best relies on the context and objectives of the research. However, based on the results, we observed that ensemble classifier performed exceptionally well in predicting the occurrence of COVID-19 based on patient symptoms with the highest overall accuracy of 97.88%. Gradient Boosting Algorithm achieved an AUC (Area Under the Curve) of 0.90 and identified key features contributing to the decision-making process. Image-based models, as observed in the analyzed studies, have consistently demonstrated higher accuracy than symptom-based models, often reaching impressive levels ranging from 96.09% to as high as 99%. Keywords- AUC (Area Under the Curve), Ensemble, CNN (Convolutional Neural Network), Fractional Multichannel Exponent Moments (FrMEMs), Area Under the Curve for the Receiver Characteristic (AUC ROC). I. I NTRODUCTION COVID-19, a virus caused by SARS-CoV-2, has had a global impact, affecting over 175 million individuals worldwide between December 2019 and June 2021[1]. Healthcare infrastructures in many countries, like that of the NHS (National Health Service) in the United Kingdom, have been under intense pressure due to the rising number of critical cases [2]. To alleviate this burden, prompt detection of COVID-19 cases is essential [1]. This paper provides an overview of the landscape of symptoms-only machine learning models for predicting COVID-19, encompassing their performance, limitations, and prospects. Widespread testing for COVID-19 is crucial as it helps us understand the pattern of transmission of the virus, and if interventions are working [3]. To do this, the Percentage of positive COVID-19 tests, also known as Percent Positive (PP), out of all the tests done in a brief time should be XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE assessed. A high number of PP means the virus is spreading a lot among people, which also means that lots of tests need to be carried out. Alternatively, a low PP is an indicator that the virus is spreading less [4]. The WHO (World Health Organization) recommends targeting a PP below 5% as a measure to manage and curb the spread of the pandemic. When a lot of tests are carried out with lower PP, the efforts of interventions are amplified, and this slows down the spread of the pandemic. Testing is therefore important in fighting the pandemic as it is the first step to detecting and diagnosing the virus. According to Our World in Data, Mexico has performed just three tests per 100,000 people (about the seating capacity of the Los Angeles Memorial Coliseum) daily since the pandemic started. This is the second lowest testing rate among other countries that have been most impacted by the pandemic. This reported data is the same when compared with other developing and some developed countries [5] and is assumed to be due to limited testing capacity as countries were unprepared and their health systems not fully equipped to fight the pandemic. To optimize limited testing capacity, an approach involves carefully checking individuals to determine potential virus exposure. Instead of testing everyone, only those who are suspected of having the virus are tested. This checking involves talking to patients to see if they might have been exposed to the virus [6]. When governments apply suitable measures, they can lower local transmission rates, gaining control over the pandemic [7]. Tests like real-time reverse transcription-polymerase chain reaction (RT-PCR) have been important in helping to identify and manage the pandemic. It is the gold standard on which diagnosis of COVID-19 relied on at the early stage of the pandemic. There is a limitation of testing accessibility and the presence of asymptomatic and pre-symptomatic carriers. Additionally, conventional PCR tests may not detect the virus in the upper respiratory tract during the initial week following the onset of symptoms. This is because the presence of the virus in this area diminishes during this initial week after symptoms appear [8]. X-rays and Computed Tomography (CT) scans have also been employed in the battle against COVID-19, but they are expensive to be deployed for this purpose and difficult to scale up so that its benefits can be available to everyone, especially in places with limited resources. Due to the lack of testing capacity in limited resource settings like Mexico that have been mentioned, and the limitation of the available traditional methods of testing, it has been established that a fast and effective strategy is important to fully stop the virus." 2312.06841v1,"memorAIs: an Optical Character Recognition and Rule-Based Medication Intake Reminder-Generating Solution Eden Shaveet Utkarsh Singh Nicholas Assaderaghi Maximo Librandi Dept. Computer Science Columbia University New York, USA ems2349@columbia.edu Dept. Computer Science Stony Brook University Stony Brook, USA utkarsh.singh@stonybrook.edu Dept. Computer Science Columbia University New York, USA nra2130@columbia.edu Dept. Computer Science Columbia University New York, USA ml5014@columbia.edu Abstract—Memory-based medication non-adherence is an unsolved problem that is responsible for considerable disease burden in the United States. Digital medication intake reminder solutions with minimal onboarding requirements that are usable at the point of medication acquisition may help to alleviate this problem by offering a low barrier way to help people remember to take their medications. In this paper, we propose memorAIs, a digital medication intake reminder solution that mitigates onboarding friction by leveraging optical character recognition strategies for text extraction from medication bottles and rule based expressions for text processing to create configured medication reminders as local device calendar invitations. We describe our ideation and development process, as well as limitations of the current implementation. memorAIs was the winner of the Patient Safety award at the 2023 Columbia University DivHacks Hackathon, presented by the Patient Safety Technology Challenge, sponsored by the Pittsburgh Regional Health Initiative. I. I NTRODUCTION A. Medication Adherence Medication adherence is the extent to which a patient follows a stipulatory medication treatment plan [1]. Over half of U.S. adults do not take medications as prescribed, which is responsible for an estimated 33%–69% of hospital admissions and 125,000 deaths annually [1]. When medications are appropriately prescribed and made accessible to patients in a timely fashion, the value proposition of outpatient medication adherence is seen across several disease progression use cases [2], [3]. For instance, adherence to disease-modifying medication regimens and therapies for the treatment and control of Multiple Sclerosis in early stages of disease onset is associated with decreased disease severity over time [4]. As more medications are taken outside of healthcare settings than in U.S. hospitals and clinics combined, better home medication management and intake practices may be critical to improving medication adherence overall [5]. In 2003, the World Health Organization (WHO) corroborated this claim by stating that increased effectiveness of medication adherence interventions may have “a far greater impact on the health of the population than any improvement in specific medical treatments” [6]. B. Barriers to Adherence There are several well-documented barriers to medication adherence, including high costs of medications and routine care [7]; lack of access to prescribers and pharmacies [8]; medical mistrust of clinical guidance or medications [9]; and memory-based adherence problems [10]. Memory-based nonadherence is a prevalent reason for home medication nonadherence, specifically for patients with cognitive impairments [11], and has led to the development of several reminderbased solutions, including user-facing digital solutions [12]. However, of the several digital reminder-based solutions on the market, none have demonstrated significant improvements in adherence among their users [13] [14] [15]. While there may be several reasons for this lack of efficacy, one proposed reason is under-utilization. Known barriers to digital health solution utilization at large include low digital literacy among users [16], meaning that users with limited experience with other digital tools may find digital health tools equally difficult to use, and onboarding friction [17], meaning that the effort exerted to configure the solution outweighs the perceived benefits of its use. For instance, patients with complex medication regimens, who would be required to manually input information for each medication, along with their corresponding routine details, before being able to meaningfully use a digital medication reminder application, may perceive the setup of the application as cumbersome, potentially discouraging its use. In an effort to address the challenge of onboarding friction, we developed a solution that offers the benefit of reminderbased solutions while mitigating onboarding friction attributed to user-facing configuration tasks. In this paper, we present a prototype implementation of an automated medication reminder application, memorAIs, that extracts text from prescription medication containers using optical character recognition models and identifies medication intake time, duration, and frequency information using text classification-based strategies. The application returns this information in the form of an ics (iCalendar) file directly to a user’s device, eliminating" 2312.06844v1,"Element abundance patterns in stars indicate fission of nuclei heavier than uranium Ian U. Roederer 1, *†, Nicole Vassh 2 , Erika M. Holmbeck 3 , Matthew R. Mumpower 4,5 , Rebecca Surman 6 , John J. Cowan 7 , Timothy C. Beers 6 , Rana Ezzeddine 8 , Anna Frebel 9,10 , Terese T. Hansen 11 , Vinicius M. Placco 12 , Charli M. Sakari 13 1 Department of Astronomy, University of Michigan; Ann Arbor, MI 48109, USA. 2 TRIUMF (Tri-University Meson Facility), Vancouver, BC V6T 2A3, Canada. 3 Carnegie Observatories; Pasadena, CA 91101, USA. 4 Theoretical Division, Los Alamos National Laboratory; Los Alamos, NM 87545, USA. 5 Center for Theoretical Astrophysics, Los Alamos National Laboratory; Los Alamos, NM 87545, USA. 6 Department of Physics and Astronomy, University of Notre Dame; Notre Dame, IN 46556, USA. 7 Homer L. Dodge Department of Physics and Astronomy, University of Oklahoma; Norman, OK 73019, USA. 8 Department of Astronomy, University of Florida, Bryant Space Science Center; Gainesville, FL 32611, USA. 9 Department of Physics, Massachusetts Institute of Technology; Cambridge, MA 02139, USA. 10 Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology; Cambridge, MA 02139, USA. 11 Department of Astronomy, Stockholm University, AlbaNova University Center, SE-106 91 Stockholm, Sweden. 12 National Optical-Infrared Astronomy Research Laboratory, National Science Foundation, Tucson, AZ 85719, USA. 13 Department of Physics and Astronomy, San Francisco State University; San Francisco, CA 94132, USA. *Corresponding author. Email: iuroederer@ncsu.edu †Present address: Department of Physics, North Carolina State University; Raleigh, NC, USA. This is the authors' version of the work. It is posted here by permission of the AAAS for personal use, not for redistribution. The definitive version was published in Science on December 07, 2023, DOI: 10.1126/science.adf1341. 1" 2312.06855v1,"Proceedings of Machine Learning Research 225:1–12, 2023 Machine Learning for Health (ML4H) 2023 Multimodal Pretraining of Medical Time Series and Notes Ryan King kingrc15@tamu.edu Department of Computer Science & Engineering, Texas A&M University, United States Tianbao Yang ∗ tianbaoyang@tamu.edu Department of Computer Science & Engineering, Texas A&M University, United States Bobak J. Mortazavi ∗ bobakm@tamu.edu Department of Computer Science & Engineering, Texas A&M University, United States *Equal contribution senior author Abstract Within the intensive care unit (ICU), a wealth of patient data, including clinical measurements and clinical notes, is readily available. This data is a valuable resource for comprehending patient health and informing medical decisions, but it also contains many challenges in analysis. Deep learning models show promise in extracting meaningful patterns, but they require extensive labeled data, a challenge in critical care. To address this, we propose a novel approach employing self-supervised pretraining, focusing on the alignment of clinical measurements and notes. Our approach combines contrastive and masked token prediction tasks during pretraining. Semi-supervised experiments on the MIMIC-III dataset demonstrate the effectiveness of our self-supervised pretraining. In downstream tasks, including in-hospital mortality prediction and phenotyping, our pretrained model outperforms baselines in settings where only a fraction of the data is labeled, emphasizing its ability to enhance ICU data analysis. Notably, our method excels in situations where very few labels are available, as evidenced by an increase in the AUC-ROC for in-hospital mortality by 0.17 and in AUC-PR for phenotyping by 0.1 when only 1% of labels are accessible. This work advances self-supervised learning in the healthcare domain, optimizing clinical insights from abundant yet challenging ICU data. Keywords: Pretraining, Deep Learning, Multimodal, EHR, Prediction, Phenotyping clinical notes. This data encompasses vital signs, laboratory test results, imaging reports, and physician notes, providing a comprehensive snapshot of the patient’s health status (Johnson et al., 2016). The measurements serve as objective indicators of the patient’s physiological state, while the clinical notes document healthcare professionals’ observations, diagnoses, treatment plans, and other information. Collectively, this data plays a crucial role in providing valuable insights into a patient’s condition, monitoring her/his progress, and guiding medical decisions throughout the ICU admission. Effectively harnessing the abundance of data in the ICU poses significant challenges (Kruse et al., 2016), given the sheer volume of information, coupled with continuous monitoring and documentation, which can overwhelm healthcare providers. Extracting meaningful patterns and knowledge from this complex data requires sophisticated computational techniques and specialized algorithms. Furthermore, the data’s diversity, heterogeneity, potential noise, and varying rates of missing values add extra layers of complexity to analysis and interpretation (Xiao et al., 2018). In recent years, deep learning models have emerged as powerful tools for automatically learning tasks from large-scale data; however, they face a significant limitation due to their dependence on substantial labeled data for training (Fredriksson et al., 2020). Labeling data involves associating each data point with a specific target, such as a diagnosis or clinical outcome. In the ICU context, obtaining labeled data for training deep learning models 1. Introduction is time-consuming, expensive, and often impractical In intensive care units (ICUs), the admission of a (Xiao et al., 2018). Expert annotations are required, patient triggers the generation of a vast amount of which may not always be readily available due to pridata, particularly in the form of measurements and vacy concerns, specialized expertise, and the urgency © 2023 R. King, T. Yang & B.J. Mortazavi." 2312.06867v1,"Get an A in Math: Progressive Rectification Prompting Zhenyu Wu 1 , Meng Jiang 2 , Chao Shen 1 1 2 School of Cyber Science and Engineering, Xi’an Jiaotong University Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN 46556 zhenyuwu@stu.xjtu.edu.cn, mjiang2@nd.edu, chaoshen@xjtu.edu.cn Abstract Chain-of-Thought (CoT) prompting methods have enabled large language models (LLMs) to generate reasoning paths and solve math word problems (MWPs). However, they are sensitive to mistakes in the paths, as any mistake can result in an incorrect answer. We propose a novel method named Progressive Rectification Prompting (PRP) to improve average accuracy on eight MWP datasets from 77.3 to 90.5. Given an initial answer from CoT, PRP iterates a verify-then-rectify process to progressively identify incorrect answers and rectify the reasoning paths. With the most likely correct answer, the LLM predicts a masked numerical value in the question; if the prediction does not match the masked value, the answer is likely incorrect. Then the LLM is prompted to regenerate the reasoning path hinted with a set of incorrect answers to prevent itself from repeating previous mistakes. PRP achieves the best performance compared against the CoT methods. Our implementation is made publicly available at https://wzy6642.github.io/prp.github.io/. Introduction Math word problems (MWPs) require language comprehension, mathematical reasoning, and problem-solving skills. Studying these problems helps AI researchers develop algorithms and models that can mimic human-like reasoning and problem-solving abilities (Chen et al. 2022). Chain-ofthought (CoT) prompting methods help large language models (LLMs) break down complex problems into manageable parts, allowing them to focus on each part individually (Kojima et al. 2022). The LLMs become decent zero-shot reasoners by simply adding “Let’s think step by step” to generate reasoning paths and predict answers to the MWPs (Shi et al. 2023; Wang et al. 2023a,b; Zheng et al. 2023). When analyzing the performance of existing methods, we found that the average accuracy on eight standard datasets (e.g., MultiArith, GSM8K) was 77.3, far below A-level grades. Because they have three drawbacks: (1) lack of verification that checks if the answer is correct, (2) lack of rectification that finds the correct answer being aware of mistakes, and (3) lack of an effective method that progressively refines reasoning path, which are essential “exam skills.” Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. First, to distinguish correct and incorrect answers, existing methods repeatedly solve a problem and use a majority vote strategy to determine the most consistent answer as the correct answer. This is known as self-consistency (Wang et al. 2023b). However, since it solves the same problem multiple times, this repeated independent process leads to same mistakes, making the frequent answer still incorrect. Second, existing methods such as progressive-hint prompting (Zheng et al. 2023) modify reasoning paths by adding “(Hint: The answer is near [H])” after the given problem, where [H] is the slot of previous answers. It is evident that when previous answers are incorrect, LLMs may still generate an incorrect answer in response to the hint. Third, existing CoT prompting methods exhibit high sensitivity to mistakes in intermediate reasoning steps (Kojima et al. 2022; Chen et al. 2022; Wang et al. 2023a; Shi et al. 2023). Even a tiny mistake in the reasoning process could alter the entire problem-solving process, resulting in an incorrect answer. It is nontrivial to achieve multi-step precise reasoning. To address the three drawbacks of existing methods, our research is inspired by a guide on math study skills and exam success written by Gall et al. in 1990. First, substitute verification has been commonly used in math exams to verify the correctness of an answer. Let us look at a specific example. Given an equation 2+3 = y, after solving it, we find that the answer y equals 5. Next, we introduce a masked condition to formulate the masked equation X + 3 = y and substitute the answer 5 into this equation. Solving the masked equation, if X equals 2, it indicates that the answer 5 align with the original equation. So the answer was more likely to be correct. Otherwise, the answer could probably be incorrect. Compared to repeatedly checking, such as solving the same question multiple times, the substitute verification can effectively prevent the repetition of mistakes and improve the accuracy of answer verification. Second, relying on existing progressive hints such as “the answer is near [H]” would limit the exploration of other potential answers when the hint answer was incorrect. Suppose that [H] has been found less likely correct by substitute verification. A negation hint on it, like “the answer is likely not [H]”, will help LLMs eliminate or less consider such answers, so the LLMs will actively rectify their reasoning paths to avoid mistakes. Third, the dual process theory in psychology (Evans 2003) tells us that humans have two cognitive systems to progressively re-" 2312.06868v1,"RAFIC: Retrieval-Augmented Few-shot Image Classification Hangfei Lin Li Miao Amir Ziai Stanford University {hangfei, limiao, amirziai}@stanford.edu 1 Extended Abstract Few-shot image classification is the task of classifying unseen images to one of N mutually exclusive classes, using only a small number of training examples for each class. The limited availability of these examples (denoted as K) presents a significant challenge to classification accuracy in some cases. To address this, we have developed a method for augmenting the set of K with an addition set of A retrieved images. We call this system Retrieval-Augmented Few-shot Image Classification (RAFIC). Through a series of experiments, we demonstrate that RAFIC markedly improves performance of fewshot image classification across two challenging datasets. RAFIC consists of two main components: (a) a retrieval component which uses CLIP [15], LAION-5B [15], and faiss [7], in order to efficiently retrieve images similar to the supplied images, and (b) retrieval meta-learning, which learns to judiciously utilize the retrieved images. Code and data is available at github.com/amirziai/rafic. 1.1 Key Findings 1. Using CLIP embeddings leads to vastly superior performance vs. raw pixels. We show that using CLIP [14] embeddings as input features significantly surpasses the performance of raw pixels. For instance, we see accuracy increase from 0.26 to 0.88 in the 10-way rare bird classification task. 2. Zero-shot retrieval using class names is highly effective. We also found that zero-shot retrieval using class names text embedding is highly effective, achieving over 96% accuracy in 10-way bird classification, surpassing other methods and showcasing CLIP’s familiarity with certain concepts over others. 3. Efficient retrieval-augmentations leads to a boost in accuracy. The addition of retrieved images significantly improved model accuracy in two challenging few-shot tasks compared to a baseline of logistic regression without meta-training or augmentation. Using Approximate Nearest Neighbors (ANN) search via faiss [7], we have enabled real-time retrieval and representation extraction across LAION-5B, a repository of 5B+ images. 4. Meta-learning the retrieval strategy further boosts accuracy. We demonstrate that accuracy can be further improved by using coarse (up or downweighting retrieval as a whole) and fine-grained (up or downweighting individual retrieved images) strategies for meta-learning the retrieval strategy. 5. MAML is more adept at adaptation than ProtoNet. Training on one task and evaluating on another (cross-evaluation) showed that MAML [3] adapts well relative to ProtoNet [17]. Moreover, inclusion of more retrieval images helped with further closing of the performance gap. Overall, our research validates that retrieval and meta-learning approaches boost performance in few-shot image classification, particularly in cross-task evaluation settings." 2312.06877v1,"A Novel Differentiable Loss Function for Unsupervised Graph Neural Networks in Graph Partitioning Vivek Chaudhary [0000-0002-5517-3190] vivekch2018@gmail.com Abstract. In this paper, we explore the graph partitioning problem, a pivotal combinatorial optimization challenge with extensive applications in various fields such as science, technology, and business. Recognized as an NP-hard problem, graph partitioning lacks polynomial-time algorithms for its resolution. Recently, there has been a burgeoning interest in leveraging machine learning, particularly approaches like supervised, unsupervised, and reinforcement learning, to tackle such NP-hard problems. However, these methods face significant hurdles: supervised learning is constrained by the necessity of labeled solution instances, which are often computationally impractical to obtain; reinforcement learning grapples with instability in the learning process; and unsupervised learning contends with the absence of a differentiable loss function, a consequence of the discrete nature of most combinatorial optimization problems. Addressing these challenges, our research introduces a novel pipeline employing an unsupervised graph neural network to solve the graph partitioning problem. The core innovation of this study is the formulation of a differentiable loss function tailored for this purpose. We rigorously evaluate our methodology against contemporary state-of-the-art techniques, focusing on metrics: cuts and balance, and our findings reveal that our is competitive with these leading methods. Keywords: Graph Neural Network, Combinatorial Optimization, Graph Partitioning 1 Introduction In recent years, there has been increasing interest in the application of machine learning for solving combinatorial optimization problems. These problems, inherently complex and computationally challenging, span a wide range of applications, from the well-known Travelling Salesman Problem [1] to the Knapsack Problem [2]. Among these, notable examples include the Maximum Clique Problem [3], Maximum/Minimum Cut Problem [4], Boolean Satisfiability Problem [5], Hamiltonian Path Problem, Facility Location Problem [6], and the Quadratic Assignment Problem [7]. The diversity and complexity of these problems pose unique challenges and opportunities for machine learning approaches." 2312.06888v1,"1 Sensing and Backscatter Communication Integration: Realizing Efficiency in Wireless Systems for IoT Shayan Zargari, Diluka Galappaththige, and Chintha Tellambura Abstract—In an era driven by the Internet of Things (IoT) and rapid wireless communication advances, the synergy between sensing and backscatter communication (BackCom) has emerged as a frontier of research. This paper delves deep into the integration of sensing technologies with BackCom, a burgeoning field with significant implications for energy-efficient wireless systems. By tracing the historical developments and principles of BackCom, we establish the foundational understanding crucial for integrating advanced sensing methodologies. Our study adopts a mixed-method approach, combining quantitative analyses of system performances with qualitative assessments of various integration techniques. Furthermore, these integrated systems showcase enhanced adaptability in dynamic environments, a pivotal attribute for future IoT applications. These findings hold profound implications for industries focusing on smart technologies, as they underscore the potential for achieving both sustainable and efficient communication. Our research distinguishes itself by not only highlighting the benefits but also addressing the challenges faced in this integration, providing a comprehensive overview of the topic. Index Terms—Backscatter communication (BackCom), Integrated sensing and communication (ISAC), Passive tags. I. I NTRODUCTION The dawning of the digital epoch is epitomized by the Internet of Things (IoT)—an era where the tangible intertwines seamlessly with the virtual, weaving a cohesive narrative of inter-connectedness and data exchange [1]. Propelling this monumental shift is the remarkable stride in wireless communication and the miniaturization of both computing and sensing modules. At the very heart of this transformation lies massive machine-type communication (mMTC), which orchestrates a harmonious dialogue between devices and central mMTC servers, ensuring a consistent modus operandi across an expansive spectrum of applications [2]. However, the momentum of this digital revolution, anchored by mMTC, encounters certain roadblocks. The energy needed to power devices, the cost of deploying them in large numbers, and the limited ways they can communicate all present unique challenges [2]. Sensing, the very essence of myriad IoT applications, plays a pivotal role, ranging from discerning the whispers of our environment to tracking the nuances of biological entities. Simultaneously, the advent of backscatter communication (BackCom) has emerged as a promising panacea. In particular, ambient BackCom (AmBC) sidesteps energyintensive traditional communication by leveraging pre-existing ambient signals and modulating them for data transmission [3]. S. Zargari, D. Galappaththige, and C. Tellambura with the Department of Electrical and Computer Engineering, University of Alberta, Edmonton, AB, T6G 1H9, Canada (e-mail: {zargari, diluka.lg, ct4}@ualberta.ca). The amalgamation of AmBC into the IoT landscape promises significant transformations, as highlighted in Table I. However, this fusion extends beyond this initial integration. With the evolution of integrated sensing and communication (ISAC) systems, the convergence of communication capabilities with sensing prowess is underway [4]–[7]. When this fusion intersects with backscatter technology, it gives rise to what we call integrated sensing and BackCom (ISABC) [8]. This convergence effectively elevates passive elements to become proactive data communicators, enhancing both the granularity of communication and the precision of sensory data. However, it also introduces the challenge of complicated decoding processes. This paper aims to clarify the relationship between AmBC and ISAC for both scholars and industry experts. We initiate with a comprehensive examination of prevalent AmBC and ISAC architectures, transitioning to the intricacies of ISABC, analyzing its merits, confronting inherent challenges, and proffering possible solutions. Our discussion leads to mapping out possible future paths, creating a comprehensive outlook for the intersection of IoT, AmBC, and ISABC. II. I NTEGRATION OF S ENSING WITH B ACK C OM The fusion of sensing capabilities with BackCom has given rise to a novel paradigm where devices can not only perceive their environment but also communicate their findings in a highly energy-efficient manner. The integration of these features is especially pertinent in the IoT field, where devices frequently have to function in low-energy settings for a long duration. A. Fundamentals of BackCom BackCom is an ultra-low-power communication paradigm. Unlike traditional networks, Bakcom uses tags that do not generate their own RF signal. Instead, they use passive backscatter modulation to reflect the incoming RF signals for data transmission. Thus, BackCom achieves higher energy efficiency, superior spectrum utilization, and cost-effectiveness, making it crucial for future wireless networks [9], [10]. To visualize the foundational components of a simple Back- Com network, we consider a network of a tag, a reader, and an emitter. The tag, equipped with a low-power integrated circuit (IC), primarily reflects incoming RF signals to transmit data. It also harvests energy from these signals for its operations, leading to two design types: (i) passive tags without energy" 2312.06919v1,"EVOLVING NEURAL NETWORK (ENN) METHOD FOR ONE-DIMENSIONAL SCALAR HYPERBOLIC CONSERVATION LAW S : I. LINEAR AND QUADRATIC FLUXES ∗ ZHIQIANG CAI † AND BROOKE HEJNAL † Abstract. We propose and study the evolving neural network (ENN) method for solving one-dimensional scalar hyperbolic conservation laws with linear and quadratic spatial fluxes. The ENN method first represents the initial data and the inflow boundary data by neural networks. Then, it evolves the neural network representation of the initial data along the temporal direction. The evolution is computed using a combination of characteristic and finite volume methods. For the linear spatial flux, the method is not subject to any time step size, and it is shown theoretically that the error at any time step is bounded by the representation errors of the initial and boundary condition. For the quadratic flux, an error estimate is studied in a companion paper [7]. Finally, numerical results for the linear advection equation and the inviscid Burgers equation are presented to show that the ENN method is more accurate and cost efficient than traditional mesh-based methods. Key words. Characteristic, Finite Volume, ReLU Neural Network, Transport Equation, Nonlinear Hyperbolic Conservation Law AMS subject classifications. 65M08, 65M60, 65M99 1. Introduction. Nonlinear hyperbolic conservation laws are still computationally challenging despite the successful application of many efficient and accurate numerical methods to practical problems [20, 11, 33, 15]. There are two significant difficulties when approximating hyperbolic conservation laws. The first difficulty is that the solution of the underlying problem is often discontinuous due to a discontinuous initial condition, a discontinuous inflow boundary condition, or a shock formation. Moreover, the locations of the discontinuities are unknown a priori. The second difficulty is that the strong form of the partial differential equation is invalid where the solution is discontinuous. Traditional numerical methods such as finite difference, finite volume, and finite element methods are based on partitions of the computational domain into uniform or quasi-uniform meshes. These methods require a sufficiently small mesh size to achieve an accurate approximation. Furthermore, when the solution of the underlying problem is discontinuous, the mesh size must be small enough to sharply capture the discontinuities. Because computation on a fine uniform mesh can be costly, adaptive mesh refinement [1, 30, 13] may be used instead. However, the efficiency of adaptive mesh refinement depends heavily on a posteriori error indicators, and there is scarce research on the development of a posteriori error indicators for hyperbolic conservation laws [2, 8, 17, 18, 23]. Methods such as Arbitrary Lagrangian Eulerian (ALE) methods (see, e.g., a review paper [9]) and moving mesh methods [24, 16, 25, 14] avoid fine uniform meshes by evolving the solution with a dynamic mesh. In particular, [24] presents a semi-discrete scheme using characteristics with the first proof of quadratic convergence. Traditionally, the invalidity of the strong form of the partial differential equation at discontinuities is addressed with an additional constraint, the Rankine-Hugoniot (RH) jump condition [20, 11], which is needed at discontinuous interfaces. Typically, the RH jump condition is enforced numerically through a finite volume approach for conservative schemes such as Roe and ENO/WENO (see, e.g., [28, 12, 31, 20]). Additionally, semi-Lagrangian methods maintain a uniform grid while utilizing characteristics to evolve the solution (see, e.g, [26, 19]). Recently, neural networks (NN) have been used as a new class of approximating functions to approximate the solution to partial differential equations (see, e.g., [5, 10, 27, 32]). A neural ∗ This work was supported in part by the National Science Foundation under grant DMS-2110571. † Department of Mathematics, Purdue University, 150 N. University Street, West Lafayette, IN 47907-2067 (caiz@purdue.edu, bhejnal@purdue.edu). 1" 2312.06937v1,"Can a Transformer Represent a Kalman Filter? Gautam Goel Peter Bartlett Simons Institute, UC Berkeley Abstract Transformers are a class of autoregressive deep learning architectures which have recently achieved state-of-theart performance in various vision, language, and robotics tasks. We revisit the problem of Kalman Filtering in linear dynamical systems and show that Transformers can approximate the Kalman Filter in a strong sense. Specifically, for any observable LTI system we construct an explicit causally-masked Transformer which implements the Kalman Filter, up to a small additive error which is bounded uniformly in time; we call our construction the Transformer Filter. Our construction is based on a two-step reduction. We first show that a softmax self-attention block can exactly represent a certain Gaussian kernel smoothing estimator. We then show that this estimator closely approximates the Kalman Filter. We also investigate how the Transformer Filter can be used for measurement-feedback control and prove that the resulting nonlinear controllers closely approximate the performance of standard optimal control policies such as the LQG controller. 1 Introduction Transformers are a class of autoregressive deep learning architectures designed for various sequence modelling tasks, first introduced in [9]. Transformers have quickly emerged as the best performing class of deep learning models across a variety of challenging domains, including computer vision [3], natural language processing [10], and robotics [1], and have also been studied in the context of reinforcement learning and decision-making (e.g. [2, 6, 7, 11]). While the empirical successes of Transformers are exciting, we still lack a formal theory that explains what Transformers can do and why they work. In this paper, we study how Transformers can be used for filtering and control in linear dynamical systems. We ask perhaps the most basic question one could ask: can a Transformer be used for Kalman Filtering? The Kalman Filter is foundational in optimal control and a crucial component of the Linear-Quadratic- Gaussian (LQG) controller. If Transformers were unable to perform Kalman Filtering, then the use of Transformers in signal processing and control would be suspect; conversely, establishing that Transformers can indeed perform Kalman Filtering is a crucial first step towards establishing the viability of Transformers in these domains. In the mathematical theory of deep learning, three questions naturally arise. First, which functions can a given deep learning architecture represent? Second, when trained on data, what function does the deep learning system actually learn? Lastly, how well does this learned function generalize on new data? We focus on the first of these questions and leave the other two for future work. Specifically, we investigate the following questions. First, is the nonlinear structure of a Transformer compatible with a Kalman Filter at all? This is not obvious; it is possible a priori that no matter how a Transformer is implemented, the softmax nonlinearity in the self-attention block will cause the state estimates of the Transformer and the Kalman Filter to diverge over time. Second, if it is possible to represent the Kalman Filter with a Transformer, what would that Transformer look like? How should the states and observations be represented within the Transformer? It is known that positional encoding improves the performance of Transformers in some tasks - is it necessary for Kalman Filtering? How large must the Transformer must be, e.g., how large must the embedding dimension be, and how many self-attention blocks are required? 1.1 Key contributions We construct an explicit Transformer which implements the Kalman Filter, up to a small additive error; we call our construction the Transformer Filter. Our construction is based on a two-step reduction. First, we show that a self-attention block can exactly represent a certain Gaussian kernel smoothing estimator. The Gaussian kernel we design has a system-theoretic interpretation: it measures how closely a previous state estimate matches the most 1" 2312.06939v1,"Visually quantifying single-qubit quantum memory Wan-Guan Chang, 1 Chia-Yi Ju, 2, 3, ∗ Guang-Yin Chen, 4 Yueh-Nan Chen, 1, † and Huan-Yu Ku 5, ‡ 1 Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan 2 Department of Physics, National Sun Yat-sen University, Kaohsiung 80424, Taiwan 3 Center for Theoretical and Computational Physics, National Sun Yat-sen University, Kaohsiung 80424, Taiwan 4 Department of Physics, National Chung Hsing University, Taichung 402, Taiwan 5 Department of Physics, National Taiwan Normal University, Taipei 11677, Taiwan To store quantum information, quantum memory plays a central intermediate ingredient in a network. The minimal criterion for a reliable quantum memory is the maintenance of the entangled state, which can be described by the non-entanglement-breaking (non-EB) channel. In this work, we show that all single-qubit quantum memory can be quantified without trusting input state generation. In other words, we provide a semi-device-independent approach to quantify all singlequbit quantum memory. More specifically, we apply the concept of the two-qubit quantum steering ellipsoids to a single-qubit quantum channel and define the channel ellipsoids. An ellipsoid can be constructed by visualizing finite output states within the Bloch sphere. Since the Choi-Jamio lkowski state of a channel can all be reconstructed from geometric data of the channel ellipsoid, a reliable quantum memory can be detected. Finally, we visually quantify the single-qubit quantum memory by observing the volume of the channel ellipsoid. I. INTRODUCTION A quantum memory stores input quantum information and, at a later time, processes the retrieval of the information [1–5]. To function as a network, the minimal criteria of a reliable quantum memory is preserving an entangled resource [6–8]. In the language of the most general channel formalism, a reliable quantum memory can be described by a non-entanglement-breaking (non-EB) channel. Clearly, quantum information tasks based on entangled resources (i.e., entanglement-based quantum key distribution [9–11], quantum communication [12–15], and quantum teleportation [16–18]) are not functional if there is an entanglement-breaking (EB) quantum memory in the network. To verify a functional quantum memory, many independent protocols were proposed with different assumptions, for instance, the untrusted measurement apparatus [19–22], non-local game test [23], and coherence estimation [24]. Recently, Rosset et al. [25] investigated how to detect quantum memory with minimal assumptions (see also the continuous-variable version in Ref. [26]) by expending the measurement-device-independent task into the temporal domain [27–32]. Importantly, the minimal assumptions on verification of quantum memory are two trusted state generation devices. One of them is an input of the quantum memory, while the other is used to create a quantum correlation for certifying reliable quantum memory. In this work, we geometrically quantify all single-qubit quantum memories by introducing the concept of channel ellipsoids, which are conceptually similar to quan- ∗ chiayiju@mail.nsysu.edu.tw † yuehnan@mail.ncku.edu.tw ‡ huan.yu@ntnu.edu.tw tum steering ellipsoids used to characterize the entanglement between qubit-qubit systems [33–37]. To be more specific, we define the channel ellipsoid of a single-qubit quantum memory as the set of all output states in the Bloch sphere. Although a channel ellipsoid is defined by all output states, the geometrical data is accessible with a finite number of inputs, which is useful for experimental studies on quantum memories. In this construction, there is no presumption on the input quantum states, in the sense that one can construct the channel ellipsoids of a single-qubit quantum memory in a semidevice-independent scenario [38–41]. To quantify all single-qubit quantum memory, we first show that the geometric data from the channel ellipsoid can reconstruct the quantum channel in the Choi- Jamio lkowski (CJ) representation. Therefore, all the properties of the single-qubit quantum memory can be visually characterized by the channel ellipsoid. Note that this feature does not hold in the quantum steering ellipsoid, which will be discussed later. In this way, we further give a clear physical interpretation of the volume of the channel ellipsoid in terms of the quantification of the quantum memory. Moreover, we can fully distinguish the unwanted quantum memories by providing the geometrical representations of EB channels with channel ellipsoids. These representations provide a simple metric for quantifying a quantum memory in terms of its volume. Finally, we consider the depolarizing and amplitude damping channels as two concrete examples and test our results with using the IBM quantum simulator. The structure of this paper is as the following description. We first briefly review the definitions of quantum steering ellipsoid and quantum memory in terms of non- EB channel and their properties in Sec. II. In Sec. III, we will give the intuition of our main idea for visualizing the channel ellipsoid enlightened by the quantum steering ellipsoid [34]. Then, in Sec. IV, we will introduce how to" 2312.06976v1,"IEEE 1 Network-Aware Asynchronous Distributed ADMM Algorithm for Peer-to-Peer Energy Trading Zeyu Yang and Hao Wang Abstract—The increasing uptake of distributed energy resources (DERs) in smart home prosumers calls for distributed energy management strategies, and the advances in information and communications technology enable peer-to-peer (P2P) energy trading and transactive energy management. Many works attempted to solve the transactive energy management problem using distributed optimization to preserve the privacy of DERs’ operations. But such distributed optimization requires information exchange among prosumers, often via synchronous communications, which can be unrealistic in practice. This paper addresses a transactive energy trading problem for multiple smart home prosumers with rooftop solar, battery storage, and controllable load, such as heating, ventilation, and airconditioning (HVAC) units, considering practical communication conditions. We formulate a network-aware energy trading optimization problem, in which a local network operator manages the network constraints supporting bidirectional energy flows. We develop an asynchronous distributed alternating direction method of multipliers (ADMM) algorithm to solve the problem under asynchronous communications, allowing communication delay and indicating a higher potential for real-world applications. We validate our design by simulations using realworld data. The results demonstrate the convergence of our developed asynchronous distributed ADMM algorithm and show that energy trading reduces the energy cost for smart home prosumers. Index Terms—Smart grid, energy management, energy trading, privacy-preserving, asynchronous distributed algorithm, distributed alternating direction method of multipliers (ADMM) I. I NTRODUCTION The recent global decarbonization trend promotes energy efficiency for home energy use, such as heating, ventilation, and air-conditioning (HVAC), and the adoption of sustainable energy devices, such as rooftop solar photovoltaic (PV) and battery storage. Energy management for flexible energy sources is essential to improve energy efficiency and reduce energy costs. For example, HVAC units consume a large amount of energy in residential households and buildings, but their demand is flexible. The studies in [1], [2] proposed adjusting HVAC energy consumption to perform demand response in a time-varying environment, such as dynamic electricity prices and intermittent renewables. Wu and Skye in [3] studied the configuration of HVAC and solar systems sized to reach the net-zero transition for residential buildings. Recent studies in [4]–[6] proposed optimization strategies to minimize Z. Yang is with the Department of Computer Science, Rice University, Houston, TX 77005, USA (e-mail: zeyu.yang@rice.edu). H. Wang is with the Department of Data Science and Artificial Intelligence, Faculty of Information Technology and the Monash Energy Institute, Monash University, Melbourne, VIC 3800, Australia (e-mail: hao.wang2@monash.edu). costs by energy scheduling for smart homes equipped with battery storage, rooftop solar, HVAC, and other smart home appliances. In addition to the energy scheduling of smart homes, cooperative energy management and energy trading have been emerging as a new paradigm enabled by two-way communications, such as Internet of things (IoT) technologies. Smart homes and their distributed energy resources (DERs) can communicate with each other to coordinate energy scheduling and trading by leveraging their diverse generation and demand profiles. For example, the optimal energy management for a cluster of residential prosumers was studied in [7] considering cooperative operations among prosumers, such as energy sharing. Alam et al. in [8] studied an energy cost optimization problem by coordinating peer-to-peer (P2P) energy trading among smart homes in a demand-side management system. Energy trading further improves the smart grid operation by utilizing solar generation and leveraging the flexibility of energy consumption. However, these studies adopted a centralized solution requiring the information of all smart homes for decision making, thus causing concerns about privacy and feasibility due to the diverse ownership of DERs in smart home prosumers. Distributed energy management and energy trading are becoming promising solutions to preserve privacy while facilitating the effective coordination of DERs. For example, a multi-leader multi-follower noncooperative Stackelberg game was formulated in [9] to enable distributed energy management among connected customers in microgrids. A distributed energy management method was developed in [10] for P2P energy trading among smart homes with HVAC systems and rechargeable batteries to reduce the energy cost and preserve privacy. A study in [11] developed a transactive energy management algorithm using the alternating direction method of multipliers (ADMM) for smart homes to trade energy. An ADMM distributed algorithm was proposed in [12] for coordinating residential devices at scale to enable demand response. We include a comprehensive literature review and analysis on transactive energy and energy trading in Section II, covering centralized, decentralized, and distributed solution methods. Most of the distributed energy management and energy trading methods, including ADMM-based methods, assumed synchronous communications for DERs to solve the energy management problem. However, due to the heterogeneous communication capabilities of DERs and latency in transmitting energy trading information, it is more realistic and practical to develop distributed energy management strategies for DERs under asynchronous communications." 2312.07031v1,"Bayesian model averaging for nuclear symmetry energy from effective proton-neutron chemical potential difference of neutron-rich nuclei Mengying Qiu, 1 Bao-Jun Cai, 2, ∗ Lie-Wen Chen, 3, † Cen-Xi Yuan, 1, ‡ and Zhen Zhang 1, § 1 Sino-French Institute of Nuclear Engineering and Technology, Sun Yat-Sen University, Zhuhai 519082, China 2 Quantum Machine Learning Laboratory, Shadow Creator Inc., Shanghai 201208, China 3 School of Physics and Astronomy and Shanghai Key Laboratory for Particle Physics and Cosmology, Shanghai Jiao Tong University, Shanghai 200240, China (Dated: December 13, 2023) The data-driven Bayesian model averaging is a rigorous statistical approach to combining multiple models for a unified prediction. Compared with the individual model, it provides more reliable information, especially for problems involving apparent model dependence. In this work, within both the non-relativistic Skyrme energy density functional and the nonlinear relativistic mean field model, the effective proton-neutron chemical potential difference ∆µ ∗ pn of neutron-rich nuclei is found to be strongly sensitive to the symmetry energy E sym (ρ) around 2ρ 0 /3, with ρ 0 being the nuclear saturation density. Given discrepancies on the ∆µ ∗ pn –E sym (2ρ 0 /3) correlations between the two models, we carried out a Bayesian model averaging analysis based on Gaussian process emulators to extract the symmetry energy around 2ρ 0 /3 from the measured ∆µ ∗ pn of 5 doubly magic nuclei 48 Ca, 68 Ni, 88 Sr, 132 Sn and 208 Pb. Specifically, the E sym (2ρ 0 /3) is inferred to be E sym (2ρ 0 /3) = 25.6 +1.4 −1.3 MeV at 1σ confidence level. The obtained constraints on the E sym (ρ) around 2ρ 0 /3 agree well with microscopic predictions and results from other isovector indicators. As nuclear symmetry energy E sym (ρ) governs the isospin-dependence of nuclear matter equation of state (EOS), its density dependence has long been a subject of intense study in nuclear physics and astrophysics [1– 4]. Thanks to the rapid development in terrestrial nuclear experiments and astrophysical observations, great progress has been achieved recently in exploring the density dependence of the symmetry energy [5–8]. However, various challenges emerge concurrently. For example, very recently, the PREX-2 and CREX collaborations have respectively measured the neutron skin thickness (one of the most important probes of the density dependence of symmetry energy) in 208 Pb and 48 Ca with minimum strong-interaction model dependence [9, 10]. Unfortunately, the PREX-2 and CREX results exhibit a significant tension, which challenges current theoretical models and our understanding on the density dependence of the symmetry energy [11–16]. The accurate determination of the density dependence of symmetry energy remains an open challenge. An important issue in the study of nuclear symmetry energy is the model dependence. Although there are some isovector indicators, like the neutron skin thickness [17–20] and the electric dipole polarizability [21–24], whose correlations to the symmetry energy have been proved to be model independent, it is not the case for most of other probes. Analyses with different models on the same observable may result in different and even contradictory conclusions, e.g., the case of charged pion ratio [25–30]. Even for the widely used nuclear energy density ∗ Corresponding author:bjcai87@gmail.com † lwchen@sjtu.edu.cn ‡ yuancx@mail.sysu.edu.cn § Corresponding author:zhangzh275@mail.sysu.edu.cn functional theory (EDF), such as the Skyrme EDF and the nonlinear relativistic mean field (RMF) model, there exist systematic discrepancy among their predictions for the saturation properties of nuclear matter [31–35]. The model dependence issue hinders the reliable uncertainty quantification of the density dependence of symmetry energy. As a powerful statistical inference method, the Bayesian approach has been extensively used to extract physics information from experiments and observations. Within the Bayesian framework, the model dependence issue can be addressed via the Bayesian model averaging(BMA), which mixes predictions of multiple models according to their capabilities of reproducing given data [36–38]. In nuclear physics studies, the BMA has been successfully used to predict the neutron drip line using various nuclear EDFs [39] and to extract the shear and bulk viscosities of quark-gluon plasma from measurements in heavy-ion collision [40]. It has also been proposed to quantify the inter-model uncertainties in some important nuclear physics problems, such as the nuclear matrix elements governing neutrinoless double-beta decay [41]. In this work, within both the non-relativisitic Skyrme EDF and the nonlinear RMF model, we find the effective proton-neutron chemical potential difference ∆µ ∗ pn is strongly correlated with the symmetry energy around a subsaturation density of 2ρ 0 /3, with ρ 0 being the saturation density. However, there exists systematic discrepancy between the correlations predicted by the two models. Based on Gaussian process (GP) emulators trained respectively with a number of Skyrme EDFs and nonlinear RMF parameter sets, the symmetry energy around 2ρ 0 /3 are extracted from Bayesian analyses of the ∆µ ∗ pn in 48 Ca, 68 Ni, 88 Sr, 132 Sn and 208 Pb. Further Bayesian model averaging over the results from the two models" 2312.07035v1,"HyperRouter: Towards Efficient Training and Inference of Sparse Mixture of Experts Giang Do † , Khiem Le ‡ , Quang Pham ⋆, , TrungTin Nguyen ⊥ , Thanh-Nam Doan △ , Binh T. Nguyen ♠ , Chenghao Liu ♣ , Savitha Ramasamy ⋆ , Xiaoli Li ⋆ , Steven Hoi ♢ ⋆ Institute for Infocomm Research (I 2 R), A ∗ STAR, Singapore, † University of Tennessee at Chattanooga, ‡ VinUniversity, △ Independent Researcher, ⊥ Univ. Grenoble Alpes, Inria, CNRS, Grenoble INP, LJK, 38000 Grenoble, France, ♠ AISIA Lab, University of Science, Vietnam National University Ho Chi Minh City, ♣ Salesforce Research Asia, ♢ Singapore Management University Correspondence to: phamhq@i2r.a-star.edu.sg By routing input tokens to only a few split experts, Sparse Mixture-of-Experts has enabled efficient training of large language models. Recent findings suggest that fixing the routers can achieve competitive performance by alleviating the collapsing problem, where all experts eventually learn similar representations. However, this strategy has two key limitations: (i) the policy derived from random routers might be suboptimal, and (ii) it requires extensive resources during training and evaluation, leading to limited efficiency gains. This work introduces HyperRouter, which dynamically generates the router’s parameters through a fixed hypernetwork and trainable embeddings to achieve a balance between training the routers and freezing them to learn an improved routing policy. Extensive experiments across a wide range of tasks demonstrate the superior performance and efficiency gains of HyperRouter compared to existing routing methods. Our implementation is publicly available at https://github.com/ giangdip2410/HyperRouter. 1 Introduction Recent years have witnessed tremendous successes of the Transformer model (Vaswani et al., 2017) and its variants across a wide range of tasks, ranging from natural language and speech processing (Bao et al., 2022b; Gulati et al., 2020), computer vision (Dosovitskiy et al., 2021; Ruiz et al., 2021; Bao et al., 2022a), reinforcement learning (Chow et al., 2023), to life sciences (Rives et al., 2021). Since then, scaling up to larger models has become the prevailing approach for advancing the state-of-the-art in pre-training and finetuning tasks. However, training such large models comes with a high computational cost (Lin et al., 2022); therefore, there is a growing need to develop efficient strategies that facilitate the training of large language models (LLMs) (Fedus et al., 2022a). One WikiText-103 SMoE SMoE-Dropout HyperRouter 1000 500 Perplexity Abstract 100 50 1 2 4 8 16 Number of Experts Figure 1: Perplexity (log-scaled) on the WikiText-103 dataset with varying numbers of experts used for inference. All methods have the same FLOPs. of the most effective strategies thus far is the Sparse Mixture-of-Experts (SMoE) (Shazeer et al., 2017; Fedus et al., 2022b), which utilizes routers to direct each input token to a small subset of network parameters (experts). SMoE improves both efficiency and performance compared to dense training approaches (Lewis et al., 2021; Artetxe et al., 2022; Zhang et al., 2022; Du et al., 2022). Despite the encouraging results, SMoE has been found to encounter the issue of representation collapse, where all experts converge to similar representations (Chi et al., 2022; Chen et al., 2022). This problem arises due to the learning process of the router encouraging experts to cluster around a centroid (Chi et al., 2022). Therefore, significant efforts have been dedicated to addressing the representation collapse issue while preserving the simplicity and efficiency of SMoE training. To this end, one of the most effective strategies is freezing the router, as demonstrated by SMoE-Dropout (Chen et al., 2023), where a randomly initialized router remains fixed throughout the training process. Additionally, Chen et al. (2023) found that progressively increasing the number of selected experts can be beneficial. However, we argue that such a naive strategy exhibits two key limitations. Firstly, the random routing policy may be sub-optimal, which" 2312.07036v1,"Debiasing Sequential Recommenders through Distributionally Robust Optimization over System Exposure Jiyuan Yang Yue Ding Yidan Wang Pengjie Ren jiyuan.yang@mail.sdu.edu.cn Shandong University Qingdao, China dingyue@sjtu.edu.cn Shanghai Jiao Tong University Shanghai, China yidanwang@mail.sdu.edu.cn Shandong University Qingdao, China renpengjie@sdu.edu.cn Shandong University Qingdao, China Zhumin Chen Fei Cai Jun Ma Rui Zhang chenzhumin@sdu.edu.cn Shandong University Qingdao, China caifei08@nudt.edu.cn National University of Defense Technology Changsha, China majun@sdu.edu.cn Shandong University Qingdao, China rayteam@yeah.net ruizhang.info Shenzhen, China Zhaochun Ren Xin Xin ∗ z.ren@liacs.leidenuniv.nl Leiden University Leiden, Netherlands xinxin@sdu.edu.cn Shandong University Qingdao, China ABSTRACT Sequential recommendation (SR) models are typically trained on user-item interactions which are affected by the system exposure bias, leading to the user preference learned from the biased SR model not being fully consistent with the true user preference. Exposure bias refers to the fact that user interactions are dependent upon the partial items exposed to the user. Existing debiasing methods do not make full use of the system exposure data and suffer from sub-optimal recommendation performance and high variance. In this paper, we propose to debias sequential recommenders through Distributionally Robust Optimization (DRO) over system exposure data. The key idea is to utilize DRO to optimize the worstcase error over an uncertainty set to safeguard the model against distributional discrepancy caused by the exposure bias. The main challenge to apply DRO for exposure debiasing in sequential recommendation lies in how to construct the uncertainty set and avoid the overestimation of user preference on biased samples. Moreover, since the test set could also be affected by the exposure bias, how to evaluate the debiasing effect is also an open question. To this end, we first introduce an exposure simulator trained upon the system exposure data to calculate the exposure distribution, which is then regarded as the nominal distribution to construct the uncertainty set of DRO. Then, we introduce a penalty to items with high exposure probability to avoid the overestimation of user preference for biased samples. Finally, we design a debiased self-normalized inverse ∗ Corresponding author. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). WSDM ’24, March 4–8, 2024, Mexico. © 2024 Copyright held by the owner/author(s). ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. https://doi.org/10.1145/3616855.3635848 propensity score (SNIPS) evaluator for evaluating the debiasing effect on the biased offline test set. We conduct extensive experiments on two real-world datasets to verify the effectiveness of the proposed methods. Experimental results demonstrate the superior exposure debiasing performance of proposed methods. Codes and data are available at https://github.com/nancheng58/DebiasedSR_DRO. KEYWORDS Sequential Recommendation, Distributionally Robust Optimization, Exposure Bias, Recommendation Debiasing ACM Reference Format: Jiyuan Yang, Yue Ding, Yidan Wang, Pengjie Ren, Zhumin Chen, Fei Cai, Jun Ma, Rui Zhang, Zhaochun Ren, and Xin Xin. 2024. Debiasing Sequential Recommenders through Distributionally Robust Optimization over System Exposure. In seventeenth ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4–8, 2024, Mexico.. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3616855.3635848 1 INTRODUCTION Over the past decade, sequential recommendation (SR) has achieved great success in the field of recommender systems (RSs) to predict user future interests from sequential user-item interactions [8, 15, 47, 48]. However, recent research has revealed that RSs face different intractable bias issues (e.g., popularity bias [49], position bias [5], selection bias [38] and exposure bias [17, 29, 45]). In particular, exposure bias occurs when user interactions are dependent upon the partial items exposed to the user, also known as the ""previous model bias"" [22]. Since the RS model is trained on user-item interaction data, the previously deployed RS model will dramatically impact the current one, and the exposed data in the current model is largely dependent on the previous recommendation policy, resulting in a biased feedback loop. The RS may inadvertently exacerbate the bias since the agent is trained using biased interaction data, which leads to false predictions about user true preference. As shown in" 2312.07037v1,"Under consideration for publication 1 Banner appropriate to article type will appear here in typeset article Prediction and control of two-dimensional decaying turbulence using generative adversarial networks Jiyeon Kim 1 , Junhyuk Kim 2 and Changhoon Lee 1,3 † 1 School of Mathematics and Computing, Yonsei University, Seoul 03722, Korea 2 Korea Atomic Energy Research Institute, Daejeon 34057, Korea 3 Department of Mechanical Engineering, Yonsei University, Seoul 03722, Korea (Received xx; revised xx; accepted xx) With the recent rapid developments in machine learning (ML), several attempts have been made to apply ML methods to various fluid dynamics problems. However, the feasibility of ML for predicting turbulence dynamics has not yet been explored in detail. In this study, PredictionNet, a data-driven ML framework based on generative adversarial networks (GANs), was developed to predict two-dimensional (2D) decaying turbulence. The developed prediction model accurately predicted turbulent fields at a finite lead time of up to half the Eulerian integral time scale. In addition to the high accuracy in pointwise metrics, various turbulence statistics, such as the probability density function, spatial correlation function, and enstrophy spectrum, were accurately captured by the employed GAN. Scale decomposition was used to interpret the predictability depending on the spatial scale, and the role of latent variables in the discriminator network was investigated. The good performance of the GAN in predicting small-scale turbulence is attributed to the scale-selection capability of the latent variable. Results also revealed that the recursive applications of the prediction model yielded better predictions than single predictions for large lead times. Furthermore, by utilizing PredictionNet as a surrogate model, a control model named ControlNet was developed to identify disturbance fields that drive the time evolution of the flow field in the direction that optimises the specified objective function. Therefore, an illustrative example in which the evolution of 2D turbulence can be predicted within a finite time horizon and controlled using a GAN-based deep neural network is presented. Key words: 1. Introduction Turbulence is a multiscale nonlinear dynamic phenomenon frequently observed in various flows in nature and industry. Certain deterministic dynamic features such as coherent structures have been found in turbulence (Hussain 1986); however, the behaviour of turbulence in most flows is chaotic. These characteristics make the accurate prediction of turbulence † Email address for correspondence: clee@yonsei.ac.kr" 2312.07046v1,"Rethinking Compression: Reduced Order Modelling of Latent Features in Large Language Models Arnav Chavan ∗ 1,2 , Nahush Lele ∗1 , Deepak Gupta 2 1 Nyun AI 2 Transmute AI Lab arnav.chavan@nyunai.com, guptadeepak2806@gmail.com Abstract Due to the substantial scale of Large Language Models (LLMs), the direct application of conventional compression methodologies proves impractical. The computational demands associated with even minimal gradient updates present challenges, particularly on consumer-grade hardware. This paper introduces an innovative approach for the parametric and practical compression of LLMs based on reduced order modelling, which entails low-rank decomposition within the feature space and re-parameterization in the weight space. Notably, this compression technique operates in a layer-wise manner, obviating the need for a GPU device and enabling the compression of billion-scale models within stringent constraints of both memory and time. Our method represents a significant advancement in model compression by leveraging matrix decomposition, demonstrating superior efficacy compared to the prevailing state-of-the-art structured pruning method. 1 Introduction Recent advances in generative modeling have led to a notable increase in the construction of large language models (LLMs), some of which consist of hundreds of billions of parameters. Despite their commendable accuracy, the associated computational demands are considerable, particularly in terms of GPU memory for inference. In practical applications, there is a growing need to compress these models while minimizing the accompanying performance degradation. Promising approaches to compress LLMs include pruning (Frantar & Alistarh, 2023; Sun et al., 2023; Ma et al., 2023), quantization (Frantar et al., 2022; Dettmers et al., 2023) and knowledge distillation (Wu et al., 2023; Gu et al., 2023). Current LLM quantization methods require specific hardware-level support and are not able to reduce MACs and speed up inference time due to expensive quant-dequant operations in LLMs. Knowledge distillation has been shown to perform well in a training-aware fashion on standard deep learning models. However, the massive computational resources needed for distillation limits the applicability of such approaches. Recently, (Ma et al., 2023) presented a structured pruning approach designed for LLMs. While this approach is capable of pruning the LLMs with no need for fine-tuning, the drop in performance is significant, and clearly there is a need to explore further in this direction. Moreover, the pruning strategy is not universal and significant effort is needed per neural architecture to identify the prunable structures. In this paper, we present a novel, practical and training-free approach to model compression which is specifically for large models including LLMs. Referred further as LLM-ROM, our approach performs localized reduced order modelling of the latent features through low-rank decomposition in the feature space and re-parameterization in the weight space. Since LLM-ROM operates layerwise, it does not require any massive model updates and can be executed on small GPU/CPU resources. The simplicity of LLM-ROM facilitates the compression of billion-scale models within stringent ∗ Equal contribution. Work done while Nahush was an Intern at Nyun AI Preprint. Under review." 2312.07055v1,"Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functions Quentin Hillebrand Vorapong Suppakitpaisarn Tetsuo Shibuya The University of Tokyo Tokyo, Japan Email: quentin-hillebrand@g.ecc.u-tokyo.ac.jp The University of Tokyo Tokyo, Japan Email: vorapong@is.s.u-tokyo.ac.jp The University of Tokyo Tokyo, Japan Email: tshibuya@hgc.jp Abstract—We suggest the use of hash functions to cut down the communication costs when counting subgraphs under edge local differential privacy. While various algorithms exist for computing graph statistics, including the count of subgraphs, under the edge local differential privacy, many suffer with high communication costs, making them less efficient for large graphs. Though data compression is a typical approach in differential privacy, its application in local differential privacy requires a form of compression that every node can reproduce. In our study, we introduce linear congruence hashing. With a sampling rate of s, our method can cut communication costs by a factor of s 2 , albeit at the cost of increasing variance in the published graph statistic by a factor of s. The experimental results indicate that, when matched for communication costs, our method achieves a reduction in the ℓ 2 -error for triangle counts by up to 1000 times compared to the performance of leading algorithms. I. I NTRODUCTION Differential privacy [1], [2] has emerged as a benchmark for protecting user data. To meet this standard, it is necessary to obfuscate the publication results. This can be achieved by adding small noise [3] or altering the publication outcomes with small probability [4]. In differential privacy, it is typically assumed that there is a complete dataset available. After statistical analyses are done, obfuscation is applied to the results. However, there can be leaks of user information during the data collection or storage phases. To address these concerns, a variant of differential privacy, termed local differential privacy [5], [6], has been introduced. Here, rather than starting with a full dataset, each user is prompted to disguise their data before sharing it. As a result, the received dataset is not perfect. Numerous studies, like those referenced in [7], [8], have aimed to extract accurate statistical insights from these imperfect datasets. The local differential privacy has been practically employed by several companies to guarantee the privacy of their users’ information. Those companies include Apple, Microsoft, and Google [9], [10], [11]. Many studies on local differential privacy focus on tabular datasets, but there is also significant research dedicated to publishing graph statistics [12], [13]. For graph-based inputs, such as social networks, the prevalent privacy standard is edge local differential privacy [14]. In this framework, users are asked to share a disguised version of their adjacency vectors. These vectors, essentially bit sequences, signify mutual connections within the network. For instance, in a social network comprising n users, user v i would provide their adjacency vector, denoted as a i = [a i,1 , . . . , a i,n ] ∈ {0, 1} n . Here, a i,j = 1 implies that users v i and v j are connected, while a i,j = 0 means there is no connection between them. One widely adopted method for obfuscation is the randomized response [15], [16], [17]. In this approach, users are prompted to invert each bit in their adjacency vector, denoted as a i,j , based on a specific probability. However, while the method is straightforward, its application to real-world social networks presents challenges. Typically, in practical social networks, an individual may have at most a few thousand friends, implying that the majority of a i,j values are zeroes. When employing the randomized response technique and flipping each bit of a i,j based on the designated probability, a significant number of zero bits get inverted to one. This phenomenon can distort the resulting graph statistics considerably [18], [19]. Beyond the publication of full graphs via randomized rounding, there is a growing interest in subgraph counting queries under local differential privacy. The challenge was first highlighted by [20], who proposed two key algorithms for kstar and triangle counting. Building on the k-star counting, [21] later introduced an unbiased and refined algorithm. For triangle counting, several noteworthy contributions include [22], which addressed the communication cost, [23], which delved into scenarios where users have access to a 2-hop graph view, and [24], which studies the lower bound of the additive error. Moving to the shuffle model, [25] gave algorithms for both triangle and 4-cycle counting. To conclude, [26] gave an approximation method for identifying the densest subgraph, rooted in locally adjustable algorithms. Most of the works mentioned in the previous paragraph use the two-step mechanism [20], [22], [25]. In this mechanism, users are required to download the adjacency vectors of all other participants. They then compute graph statistics locally using their genuine adjacency vector and the obfuscated vec-" 2312.07058v1,"YITP-23-157 Axion Cloud Decay due to the Axion-photon Conversion with Multi-pole Background Magnetic Fields Yusuke Sakurai, 1 Chul-Moon Yoo, 1, ∗ Atsushi Naruko, 2 and Daisuke Yamauchi 3 1 Division of Particle and Astrophysical Science, Graduate School of Science, Nagoya University, Nagoya 464-8602, Japan 2 Center for Gravitational Physics and Quantum Information, Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto 606-8502, Japan 3 Department of Physics, Faculty of Science, Okayama University of Science, 1-1 Ridaicho, Okayama, 700-0005, Japan We consider axion cloud decay due to the axion-photon conversion with multipole background magnetic fields. We focus on the ℓ = m = 1 and n = 2 mode for the axion field configuration since it has the largest growth rate associated with superradiant instability. Under the existence of a background multi-pole magnetic field, the axion field can be converted into the electromagnetic field through the axion-photon coupling. Then the decay rate due to the dissipation of the converted photons is calculated in a successive approximation. We found that the decay rate is significantly dependent on the azimuthal quantum number characterizing the background magnetic field, and can be comparable to or larger than the growth rate of the superradiant instability. ∗ Electronic address: yoo.chulmoon.k6@f.mail.nagoya-u.ac.jp" 2312.07071v1,"Solving Large-Scale Electricity Market Pricing Problems in Polynomial Time Mete Şeref Ahunbay Martin Bichler Teodora Dobos Johannes Knörr ∗ December 13, 2023 Abstract Electricity market operators worldwide use mixed-integer linear programming to solve the allocation problem in wholesale electricity markets. Prices are typically determined based on the duals of relaxed versions of this optimization problem. The resulting outcomes are efficient, but market operators must pay out-of-market uplifts to some market participants and incur a considerable budget deficit that was criticized by regulators. As the share of renewables increases, the number of market participants will grow, leading to larger optimization problems and runtime issues. At the same time, non-convexities will continue to matter e.g., due to ramping constraints of the generators required to address the variability of renewables or non-convex curtailment costs. We draw on recent theoretical advances in the approximation of competitive equilibrium to compute allocations and prices in electricity markets using convex optimization. The proposed mechanism promises approximate efficiency, no budget deficit, and computational tractability. We present experimental results for this new mechanism in the context of electricity markets, and compare the runtimes, the average efficiency loss of the method, and the uplifts paid with standard pricing rules. We find that the computations with the new algorithm are considerably fast for relevant problem sizes. In general, the computational advantages come at the cost of efficiency losses and a price markup for the demand side. Interestingly, both are small with realistic problem instances. Importantly, the market operator does not incur a budget deficit and the uplifts paid to market participants are significantly lower compared to standard pricing rules. 1 Introduction Electricity spot markets provide a mechanism for matching supply and demand and for determining the price of electricity at any given moment. The size of electricity spot markets is considerable. For example, the European day-ahead electricity market accounts for more than 98% of the total electricity consumption in the EU, with a volume of more than 1,530 TWh/year or 200 million Euros average daily value of matched trades (ENTSO-E 2023). This market enables trading of electricity for delivery on the following day and is divided into multiple regions or bidding zones. Market participants from each region submit their orders for electricity generation or consumption to their respective Nominated Electricity Market Operator (NEMO). Each NEMO aggregates the Technical University of Munich, School of Computation, Information and Technology, Department of Computer Science. E-mail: mete.ahunbay/bichler/dobos/knoerr@cit.tum.de ∗ 1" 2312.07081v1,"Giant X-ray circular dichroism in a time-reversal invariant antiferromagnet Jun Okamoto Ru-Pan Wang Yen-Yi Chu Hung-Wei Shiu Amol Singh Hsiao-Yu Huang Chung-Yu Mou Sucitto Teh Horng-Tay Jeng Kai Du Xianghan Xu Sang-Wook Cheong Chao-Hung Du Chien-Te Chen Atsushi Fujimori* Di-Jing Huang* Jun Okamoto National Synchrotron Radiation Research Center, Hsinchu 30076, Taiwan Ru-Pan Wang Department of Physics, University of Hamburg, Luruper Chaussee 149, G610, 22761 Hamburg, Germany Yen-Yi Chu, Hung-Wei Shiu, Amol Singh, Hsiao-Yu Huang National Synchrotron Radiation Research Center, Hsinchu 30076, Taiwan Chung-Yu Mou Center for Quantum Science and Technology and Department of Physics, National Tsing Hua University, Hsinchu 30013, Taiwan Sucitto Teh, Horng-Tay Jeng Department of Physics, National Tsing Hua University, Hsinchu 30013, Taiwan Kai Du, Xianghan Xu, Sang-Wook Cheong Rutgers Center for Emergent Materials and Department of Physics and Astronomy, Rutgers University, Piscataway, NJ 08854, USA Chao-Hung Du Department of Physics, Tamkang University, Tamsui 251, Taiwan Chien-Te Chen National Synchrotron Radiation Research Center, Hsinchu 30076, Taiwan Atsushi Fujimori National Synchrotron Radiation Research Center, Hsinchu 30076, Taiwan Center for Quantum Science and Technology and Department of Physics, National Tsing Hua University, Hsinchu 30013, Taiwan Department of Physics, University of Tokyo, Bunkyo-Ku, Tokyo 113-0033, Japan Email Address: fujimori@phys.s.u-tokyo.ac.jp Di-Jing Huang National Synchrotron Radiation Research Center, Hsinchu 30076, Taiwan Department of Physics, National Tsing Hua University, Hsinchu 30013, Taiwan Department of Electrophysics, National Yang Ming Chiao Tung University, Hsinchu 30093, Taiwan Email Address: djhuang@nsrrc.org.tw Keywords: X-ray circular dichroism, chiral crystal, collinear antiferromagnet X-ray circular dichroism, arising from the contrast in X-ray absorption between opposite photon helicities, serves as a spectroscopic tool to measure the magnetization of ferromagnetic materials and identify the handedness of chiral crystals. Antiferromagnets with crystallographic chirality typically lack X-ray magnetic circular dichroism because of time-reversal symmetry, yet exhibit weak X-ray natural circular dichroism. Here, we report the observation of giant natural circular dichroism in the Ni L 3 -edge X-ray absorption of Ni 3 TeO 6 , a polar and chiral antiferromagnet with effective time-reversal symmetry. To unravel this intriguing phenomenon, we propose a phenomenological model that classi�ies the movement of photons in a chiral crystal within the same symmetry class as that of a magnetic �ield. The coupling of X-ray polarization with the induced magnetization yields giant X-ray natural circular dichroism, re�lecting the magnetic susceptibility of Ni 3 TeO 6 . Our �indings provide evidence for the interplay between magnetism and crystal chirality in natural optical activity. Additionally, we establish the �irst example of a new class of magnetic materials exhibiting circular dichroism with time-reversal symmetry. 1" 2312.07118v1,"ON THE P GL 2 (q)-ORBITS OF LINES OF P G(3, q) AND BINARY QUARTIC FORMS KRISHNA KAIPA, NUPUR PATANKER, PUSPENDU PRADHAN Department of Mathematics, Indian Institute of Science Education and Research, Pune, Maharashtra, 411008 India. Abstract. We study the problem of classifying the lines of the projective 3- space P G(3, q) over a finite field GF (q) into orbits of the group G = P GL(2, q) of linear symmetries of the twisted cubic C. A generic line neither intersects C nor lies in any of its osculating planes. While the non-generic lines have been classified into G-orbits in literature, it has been an open problem to classify the generic lines into G-orbits. For a general field F of characteristic different from 2 and 3, the twisted cubic determines a symplectic polarity on P 3 . In the Klein representation of lines of P 3 , the tangent lines of C are represented by a degree 4 rational normal curve in a hyperplane H of the second exterior power P 5 of P 3 . Atiyah [1] studied the lines of P 3 with respect to C, in terms of the geometries of these two curves. Polar duality of lines on P 3 corresponds to Hodge duality on P 5 , and H is the hyperplane of Hodge self-dual elements of P 5 . We show that H can be identified in a P GL 2 -equivariant way with the space of binary quartic forms over F , and that pairs of polar dual lines of P 3 correspond to binary quartic forms whose apolar invariant is a square. We first solve the open problem of classifying binary quartic forms over GF (q) into G-orbits, and then use it to solve the main problem. 1. Introduction The problem studied in this work is to classify the lines of the finite projective three space P G(3, q) over a finite field GF (q) into orbits of the projective linear group P GL 2 (q), which is the group of linear symmetries of the twisted cubic C : (s, t) 7→ (s 3 , s 2 t, st 2 , t 3 ) in P G(3, q). A line is generic if it neither intersects C, nor lies in any of its osculating planes. The classification of non-generic lines into P GL 2 (q)-orbits is well-known in literature, for example [10, p.236], [2, Theorem 8.1], [4, Theorem 3.1], [7]. These form 9 or 10 orbits according as q is even or odd. On the other hand, it has been an open problem to classify the generic lines into P GL 2 (q) orbits. (The generic lines are denoted as the class O 6 in the book [10, p.236]). In [7], the authors conjecture that the number of orbits of generic lines is 2q − 2 or 2q − 4 according as E-mail address: kaipa@iiserpune.ac.in, {nupur.patanker,puspendu.pradhan}@acads.iiserpune.ac.in. 2020 Mathematics Subject Classification. 51E20, 51N35, 14N10, 05B25, 05E10, 05E14, 05E18. Key words and phrases. Rational normal curve, binary quartic forms, Klein quadric, - invariant. The second author is supported by NBHM, DAE, Govt. of India and thanks IISER Pune where this work was carried out. She is currently affiliated with IIT Jammu. 1" 2312.07137v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Plug-and-play imaging with model uncertainty quantification in radio astronomy Matthieu Terris ∗† , Chao Tang ∗†§ , Adrian Jackson § , Yves Wiaux † Abstract—Plug-and-Play (PnP) algorithms are appealing alternatives to proximal algorithms when solving inverse imaging problems. By learning a Deep Neural Network (DNN) behaving as a proximal operator, one waives the computational complexity of optimisation algorithms induced by sophisticated image priors, and the sub-optimality of handcrafted priors compared to DNNs. At the same time, these methods inherit from the versatility of optimisation algorithms allowing to minimise a large class of objective functions. Such features are highly desirable in radiointerferometric (RI) imaging in astronomy, where the data size, the ill-posedness of the problem and the dynamic range of the target reconstruction are critical. In a previous work, we introduced a class of convergent PnP algorithms, dubbed AIRI, relying on a forward-backward backbone, with a differentiable datafidelity term and dynamic range-specific denoisers trained on highly pre-processed unrelated optical astronomy images. Here, we show that AIRI algorithms can benefit from a constrained data fidelity term at the mere cost of transferring to a primal-dual forward-backward algorithmic backbone. Moreover, we show that AIRI algorithms are robust to strong variations in the nature of the training dataset: denoisers trained on MRI images yield similar reconstructions to those trained on astronomical data. We additionally quantify the model uncertainty introduced by the randomness in the training process and suggest that AIRI algorithms are robust to model uncertainty. Eventually, we propose an exhaustive comparison with methods from the radio-astronomical imaging literature and show the superiority of the proposed method over the state-of-the-art. Index Terms—Plug-and-play, astronomical imaging, synthesis imaging, interferometry. I. I NTRODUCTION Linear inverse imaging problems are ubiquitous in imaging sciences, ranging from natural image restoration to magnetic resonance imaging (MRI) and radio interferometric (RI) imaging. In essence, one aims at estimating an image x ∈ R N from measurements z ∈ K M (K being either R or C), related through the measurement procedure z = Hx + e, (1) where H : R N → K M is a linear operator, and e ∈ K M is the realisation of a Gaussian random variable with 0 mean and standard deviation η > 0. In practice, the nature of H combined with the presence of random noise make this problem ill-posed, thus requiring sophisticated tools for solving (1). Historically, a traditional approach for solving (1) has been to reformulate it as a regularised minimisation problem, with ∗ Equal contribution. Affiliations: † BASP group, Heriot-Watt University, UK. § EPCC, University of Edinburgh, UK. Correspondance to y.wiaux@hw.ac.uk. Manuscript received Month xx, xxxx; revised Month xx, xxxx. carefully chosen data-fidelity and regularisation terms [1]– [3]. The reformulated problem can then be efficiently solved with proximal algorithms [4], [5], yielding robust solutions. Over the last decade, pure learning-based techniques have emerged. The methods involve training deep neural networks to address (1) using datasets comprising degraded/groundtruth pairs, and they have been shown to outperform optimizationbased approaches on various imaging modalities [6]–[8]. Plug-and-play (PnP) approaches [9]–[12] propose to circumvent the generalization difficulties of end-to-end methods by learning the proximal operator of an implicit prior unrelated to the measurement operator H in (1). The resulting learned operator is then plugged in an optimisation algorithm, allowing to fully split the reconstruction task, alternating between steps enforcing data-fidelity (1), and steps enforcing an implicit prior. As a result, PnP algorithms are immune to variations in the sensing procedure at test time [13], [14], thus facilitating straightforward real-world applications. The performance of the resulting algorithm is closely tied to the denoiser’s quality, which accounts for the widespread adoption of denoising DNNs in PnP algorithms. However, despite DNNs’ proficiency in denoising tasks, their integration into PnP algorithms can introduce significant uncertainty into the reconstruction process. This underscores the need to quantify model-related uncertainty in images reconstructed using PnP algorithms. In this work, we focus on a large-scale, high-dynamic range imaging problem that is the RI imaging problem. In this setting, a portion of the sky x ∈ R N is observed through an array of antennas returning measurements z ∈ C M as per (1), corresponding to a noisy, highly subsampled version of the Fourier coefficients of x, see Figure 1 for an illustration. In practice, the operator H in (1) is a non-uniform Fourier transform writing as H = U F Z, where Z is a zero-padding operator, F denotes the 2D discrete Fourier transform, and U is an interpolation matrix mapping the discrete Fourier coefficients onto the measured values of the continuous Fourier transform. The RI imaging problem differs from other imaging problems due to several characteristics. Firstly, despite a large number of measurements, very few Fourier coefficients are sampled [15], making it a highly ill-posed large-scale problem. Secondly, the sought target image often exhibits high dynamic range, i.e. orders of magnitude between highest and faintest intensities, as a consequence of the highly nonuniform sampling pattern in H. Moreover, no upper-bound on x can be estimated, making the dynamic range of the target image x unknown. Eventually, no dataset of groundtruths is available, hampering the use of traditional supervised end-to-" 2312.07139v1,"Practical considerations on using private sampling for synthetic data Clément Pierquin 1 Bastien Zimmermann 1 Matthieu Boussard 1 Abstract Artificial intelligence and data access are already mainstream. One of the main challenges when designing an artificial intelligence or disclosing content from a database is preserving the privacy of individuals who participate in the process. Differential privacy for synthetic data generation has received much attention due to the ability of preserving privacy while freely using the synthetic data. Private sampling is the first noise-free method to construct differentially private synthetic data with rigorous bounds for privacy and accuracy. However, this synthetic data generation method comes with constraints which seem unrealistic and not applicable for real-world datasets. In this paper, we provide an implementation of the private sampling algorithm and discuss the realism of its constraints in practical cases. 1. Introduction Recently, there have been more and more regulations in Europe about privacy [Commission & for Communication, 2022]. In the context of IoT for example, databases must be protected to ensure privacy protection for the users. Several ideas have already been explored in order to privatize data, such as de-identification or k-anonymization [Samarati & Sweeney, 1998]. Today, differential privacy [Dwork & Roth, 2014] (DP) is the gold standard for privacy protection of randomized algorithms. Its main objective is to prevent an adversary from getting access to a particular element in a dataset while releasing useful statistical information about the database. Standards DP algorithms only work for specified queries performed on a dataset and therefore lack of flexibility. Synthetic data, already used for data augmentation, can be used for data protection. It is more flexible than standard DP algorithms since once synthetic data is generated, it ideally can be used or disclosed without privacy concerns. In this case, synthetic data generation requires privacy-preserving 1 Craft.AI, Paris, FRA. Correspondence to: Clément Pierquin , Bastien Zimmermann , Matthieu Boussard . mechanisms to get rigorous privacy guarantees. Let us take the example of generative adversarial networks (GANs). GANs are not reversible so it is not possible to make a deterministic function go from the generated samples to the real samples. In fact, the generated samples are created using an implicit distribution of the real data. However, one cannot rely on the fact that GANs are not reversible to simply naively use them and hope that the system is privacy-preserving [Hayes et al., 2018]. The most simple way to generate differentially private synthetic data is by adding Laplacian noise on each point in the dataset. However, there is a great loss in utility during this process and the synthetic data cannot be used, even for simple queries. More generally, when privately training a deep learning model, there is a tradeoff between privacy and utility [Lee et al., 2022]. This is why machine learning algorithms attain lower performances with DP synthetic data as a training set than with the original data. While the most used methods to generate DP synthetic data are deep neural network models based, some partly statistical or Bayesian methods can be used in particular cases and outperform usual models. For example, the 2018 NIST differential privacy synthetic data competition has been won by a graphical model [McKenna et al., 2021]. Private sampling [Boedihardjo et al., 2021], the method studied in this work, is a method for synthetic data generation which, under certain assumptions, proposes the first noise-free method to construct differentially private synthetic data. In the light of the outstanding offered guarantees, it is interesting to study this method thoroughly. The lowdimensional marginals of the constructed density exactly match the empirical density ones, and privacy is controlled with rigorous bounds. However, these bounds seem too restrictive for the algorithm to be used in practice. In this paper, our main contribution is a discussion about the realism of the constraints which must be respected in order to get differentially private data. We also provide the code 1 and the linear and quadratic programs (QP) needed to compute efficiently the density of the private sampling algorithm. 1 https://github.com/craft-ai/private-sampling" 2312.07158v1,"COST AWARE UNTARGETED POISONING ATTACK AGAINST GRAPH NEURAL NETWORKS Yuwei Han, Yuni Lai, Yulin Zhu, Kai Zhou Department of Computing, Hong Kong Polytechnic University, HKSAR {22041949r, yunie.lai}@connect.polyu.hk, {yulin.zhu, kai.zhou}@polyu.edu.hk ABSTRACT Graph Neural Networks (GNNs) have become widely used in the field of graph mining. However, these networks are vulnerable to structural perturbations. While many research efforts have focused on analyzing vulnerability through poisoning attacks, we have identified an inefficiency in current attack losses. These losses steer the attack strategy towards modifying edges targeting misclassified nodes or resilient nodes, resulting in a waste of structural adversarial perturbation. To address this issue, we propose a novel attack loss framework called the Cost Aware Poisoning Attack (CA- attack) to improve the allocation of the attack budget by dynamically considering the classification margins of nodes. Specifically, it prioritizes nodes with smaller positive margins while postponing nodes with negative margins. Our experiments demonstrate that the proposed CA-attack significantly enhances existing attack strategies. Index Terms— Poisoning attack, graph neural networks, node classification. 1. INTRODUCTION Graph Neural Networks (GNNs) [1–3] have emerged as an effective machine learning approach for structured data, generalizing neural networks to manage graph-structured information. They have shown potential in various applications such as social network analysis [4], anomaly detection [5–7], and natural language processing [8], excelling in tasks like node classification and link prediction. However, current research [9, 10] indicated that they are susceptible to poisoning attacks, where the attack easily manipulates the graph structure (i.e., adding/deleting edges) before the training of the GNN models, and leads to incorrect predictions. Such vulnerabilities not only compromise the model’s reliability but also present opportunities for malicious attacks. To analyze the vulnerabilities of GNNs, several studies have investigated potential poisoning attacks on GNNs, such as Minmax [11], Metattack [12], and certify robustness inspired attack framework [13]. These attacks leverage gradient-based techniques to approximate the complex bi-level optimization problem associated with poisoning attacks. Nonetheless, there is still potential for enhancing the current methodologies regarding the allocation of the limited perturbation budget. We have noted Metattack with current loss functions such as negative log likelihood loss and CW loss [14] has budget waste problem that some budgets do not contribute to decrease the classification accuracy. For example, when employing the commonly used negative log likelihood loss as the attack objective, a node that has already been successfully misclassified tends to attract higher meta-gradients, resulting in a further allocation of the attack budget to that specific node. Wang et al. [13] have proposed a novel attack loss framework called the Certify Robustness Inspired Framework (CR-framework) to enhance the attack performance. This method assigns larger meta-gradients to nodes with smaller certify robustness sizes [13], as these nodes are more vulnerable to attacks. It accomplishes this by reweighting the loss of each node according to its certify robustness size. While this approach optimizes the budget allocation for existing attack losses and further decreases the accuracy of victim models, it grapples with computational inefficiencies during the assessment of certified robustness sizes. To address the limitations above, we introduce a Cost Aware Poisoning Attack Loss Framework (CA-attack) to improve the allocation of attack budget to maximize the impact of the attack. Specifically, we dynamically reweight the nodes according to their classification margins in the attack loss. This means that the weights of the nodes are adjusted during the optimization process of the attack objective. Through extensive testing on benchmark datasets, the CA-attack consistently surpasses previous attack methods in terms of effectiveness. Our research makes the following contributions: • To address the inefficiencies of budget allocation, we propose the CA-attack, a budget-efficient attack loss framework. • Through rigorous empirical assessments on three datasets, we demonstrate that CA-attack improves existing methods, highlighting its potential as a plug-andplay solution for various graph poisoning attacks." 2312.07168v1,"Equivariant Flow Matching with Hybrid Probability Transport for 3D Molecule Generation Yuxuan Song 1,∗ , Jingjing Gong 1,∗ , Minkai Xu 2 , Ziyao Cao 1 Yanyan Lan 1,3 , Stefano Ermon 2 , Hao Zhou 1 ,Wei-Ying Ma 1 1 Institute of AI Industry Research(AIR), Tsinghua University 2 Computer Science Department, Stanford University 3 Beijing Academy of Artificial Intelligence {songyuxuan,gongjingjing}@air.tsinghua.edu.cn Abstract The generation of 3D molecules requires simultaneously deciding the categorical features (atom types) and continuous features (atom coordinates). Deep generative models, especially Diffusion Models (DMs), have demonstrated effectiveness in generating feature-rich geometries. However, existing DMs typically suffer from unstable probability dynamics with inefficient sampling speed. In this paper, we introduce geometric flow matching, which enjoys the advantages of both equivariant modeling and stabilized probability dynamics. More specifically, we propose a hybrid probability path where the coordinates probability path is regularized by an equivariant optimal transport, and the information between different modalities is aligned. Experimentally, the proposed method could consistently achieve better performance on multiple molecule generation benchmarks with 4.75× speed up of sampling on average. 2 1 Introduction Geometric generative models aim to approximate the distribution of complex geometries and emerge as an important research direction in various scientific domains. A general formulation of the geometries in scientific fields could be the point clouds where each point is embedded in the Cartesian coordinates and labeled with rich features. For example, the molecules are the atomic graphs in 3D [1] and the proteins could be seen as the proximity spatial graphs [2]. Therefore, with the ability of density estimation and generating novel geometries, geometric generative models have appealing potentials in many important scientific discovery problems, e.g., material science [3], de novo drug design [4] and protein engineering [5]. With the advancements of deep generative modeling, there has been a series of fruitful research progresses achieved in geometric generative modeling, especially molecular structures. For example, [6, 7] and [8] proposed data-driven methods to generate 3D molecules (in silico) with autoregressive and flow-based models respectively. However, despite great potential, the performance is indeed limited considering several important empirical evaluation metrics such as validity, stability, and molecule size, due to the insufficient capacity of the underlying generative models [9]. Most recently, diffusion models (DMs) have shown surprising results on many generative modeling tasks which generate new samples by simulating a stochastic differential equation (SDE) to transform the prior density to the data distribution. With the simple regression training objective, several attempts [10] on applying DMs in this field have also demonstrated superior performance. However, existing ∗ 2 Equal Contribution, Hao Zhou (zhouhao@air.tsinghua.edu.cn) is the corresponding author. The code is available at https://github.com/AlgoMole/MolFM 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.07169v1,"Semi-supervised Active Learning for Video Action Detection Aayush Singh 1 , Aayush J Rana 2 , Akash Kumar 2 , Shruti Vyas 2 , Yogesh Singh Rawat 2 IIT (ISM) Dhanbad 1 CRCV, University of Central Florida 2 Abstract In this work, we focus on label efficient learning for video action detection. We develop a novel semi-supervised active learning approach which utilizes both labeled as well as unlabeled data along with informative sample selection for action detection. Video action detection requires spatio-temporal localization along with classification, which poses several challenges for both active learning (informative sample selection) as well as semi-supervised learning (pseudo label generation). First, we propose NoiseAug, a simple augmentation strategy which effectively selects informative samples for video action detection. Next, we propose fft-attention, a novel technique based on high-pass filtering which enables effective utilization of pseudo label for SSL in video action detection by emphasizing on relevant activity region within a video. We evaluate the proposed approach on three different benchmark datasets, UCF-101-24, JHMDB-21, and Youtube-VOS. First, we demonstrate its effectiveness on video action detection where the proposed approach outperforms prior works in semi-supervised and weakly-supervised learning along with several baseline approaches in both UCF101-24 and JHMDB- 21. Next, we also show its effectiveness on Youtube-VOS for video object segmentation demonstrating its generalization capability for other dense prediction tasks in videos. Introduction 1 Video understanding is an essential task for security, automation, and robotics (Pomerleau 1989; Rahmatizadeh et al. 2018; Rizve et al. 2021a) as video data enables information extraction for detection (Hou, Sukthankar, and Shah 2017; Yang et al. 2019), recognition (Carreira and Zisserman 2017; Hara, Kataoka, and Satoh 2018), tracking (Vondrick et al. 2018), and scene understanding (Lei et al. 2018). Video understanding in general requires a large amount of labeled data to train an effective model. Collecting such data for dense prediction tasks such as action detection is even more challenging as it requires spatio-temporal annotations on every frame of the video. In this work, we focus on label efficient learning for video action detection. Existing works on label efficient learning for video action detection have primarily focused on weakly supervised learn- Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1† Corresponding Author: ayush.s.18je0204@cse.iitism.ac.in ing, semi-supervised learning, and active learning. Weakly supervised methods often underperform compared to supervised methods, often requiring externally trained object detector to address the detection aspect of action detection (Chéron et al. 2018; Weinzaepfel, Martin, and Schmid 2016). Recently, semi-supervised learning (SSL) (Kumar and Rawat 2022) and active learning methods (Rana and Rawat 2022) have shown promising performance. However, they also have their own limitations. SSL relies on randomly selected sub-samples, which can result in non-informative sample selection and suboptimal models. On the other hand, active learning aims to address this issue by selecting only informative samples for training. Nevertheless, it suffers from a cold-start problem, which makes it challenging to train a good model with limited labels which are initially available. We propose a unified approach for video action detection by bridging the gap between semi-supervised learning (SSL) and active learning. We address the challenges of the coldstart problem in active learning by using an SSL technique to train a reliable initial model. Similarly, we resolve the need for informative training sample for SSL using optimized selection via active learning. Our student-teacher-based SSL framework benefits from active learning’s informative sample selection, offering the advantages of both SSL and active learning for improved video action detection. Video action detection needs to perform both spatiotemporal localization and classification. Solving this task using limited labels pose two distinct challenges; 1) determining the informativeness of samples, and 2) generating high-quality pseudo-labels. To address the first challenge, we propose NoiseAug, a simple and novel augmentation strategy designed to estimate sample informativeness in video action detection. Model-driven AL used in existing works for sample selection often perturbs the model via regularization (Gal and Ghahramani 2016; Heilbron et al. 2018; Aghdam et al. 2019), which limits the extent of perturbation since too much perturbation will affect the network negatively. Therefore, we propose data-driven AL and use varying degree of data augmentations while maintaining video integrity. By isolating the type of augmentation seen by the model during training and selection step, we can focus on the relevant regions and reduce bias from training samples which is a common problem in active learning with limited labeled set (Pardo et al. 2021; Gal and Ghahramani 2016; Aghdam et al. 2019)." 2312.07172v1,"Channel assisted noise propagation in a two-step cascade Mintu Nandi, 1, ∗ Sudip Chattopadhyay, 1, † Somshubhro Bandyopadhyay, 2, ‡ and Suman K Banik 3, § 1 Department of Chemistry, Indian Institute of Engineering Science and Technology, Shibpur, Howrah 711103, India 2 Department of Physical Sciences, Bose Institute, EN 80, Sector V, Bidhan Nagar, Kolkata 700091, India 3 Department of Chemical Sciences, Bose Institute, EN 80, Sector V, Bidhan Nagar, Kolkata 700091, India (Dated: December 13, 2023) Signal propagation in biochemical networks is characterized by the inherent randomness in gene expression and fluctuations of the environmental components, commonly known as intrinsic and extrinsic noise, respectively. We present a theoretical framework for noise propagation in a generic two-step cascade (S→X→Y) in terms of intrinsic and extrinsic noise. We identify different channels of noise transmission that regulate the individual as well as the overall noise properties of each component. Our analysis shows that the intrinsic noise of S alleviates the overall noise and information transmission capacity along the cascade. On the other hand, the intrinsic noise of X and Y acts as a bottleneck of information transmission. I. INTRODUCTION Noise plays an important role in shaping the dynamics of various cellular processes, including gene expression, transcriptional regulation, signal transduction pathways, and developmental pathways [1–3]. These cellular processes adopt diverse strategies in response to the inevitable influence of noise. Comprehension of the precise impact of noise on cellular processes is a complex endeavour and needs individual attention. In this context, exploring the influence of noise on regulatory cascades could reveal crucial insights into the role of noise in cellular functioning. Regulatory cascades are a common occurrence in biological systems, manifesting in various forms, one of which is transcriptional cascades in Escherichia coli and Saccharomyces cerevisiae [4, 5]. Moreover, cascades play a pivotal role in directing the temporal sequencing of gene expression, contributing to critical processes like sporulation [6] and flagella formation [7]. In more complex organisms like Drosophila and sea urchins, the developmental programs heavily rely on precisely orchestrated cascaded processes to achieve intricate temporal coordination of events [8, 9]. To address the propagation of noise in a cascade of gene expression, we consider the generic two-step cascade (TSC) S→X→Y representing gene regulatory network (GRN). Here, S, a transcription factor (TF), regulates the production of protein X which in turn regulates the production of protein Y. For associated kinetics and corresponding master equation we refer to Fig. 1a,b. TSC is a recurring architecture frequently found in more complex networks, often associated with additional control mechanisms [10, 11]. Recent experimental investigation in synthetic transcriptional cascades having multiple ∗ mintu.rs2022@chem.iiests.ac.in † sudip@chem.iiests.ac.in ‡ som@jcbose.ac.in § skbanik@jcbose.ac.in stages of repression highlights the ability to exhibit ultrasensitive responses and low-pass filtering, resulting in robust behavior in input fluctuations [12]. Furthermore, noise properties in steady-state using a framework of twostage transcriptional cascades were examined [13–15]. The present communication characterises the noise propagation mechanism using the notion of noise decomposition, viz., intrinsic and extrinsic noise. The intrinsic noise is an inherent property of the system whereas the extrinsic noise is due to environmental fluctuations [16]. However, the characteristic distinction between intrinsic and extrinsic noise depends on the definition of the system [17–20]. In a TSC, the intrinsic noise of each component (S, X , and Y) arises due to low copy number. On the other hand, the extrinsic noise in a component, say X, is accumulated due to noise coming from S. In this context, S is an extrinsic variable (“environment”) for X. Similarly, for Y, S and X both act as extrinsic variables (Fig. 1c). Investigating the role of intrinsic and extrinsic noise components in cellular functions, both in terms of their drawbacks [1] and advantages[2, 3, 22, 23], is therefore of great significance. Previous studies have suggested that both noise components (intrinsic and extrinsic) can act as degrading factors in information transmission in cellular responses [24–32]. However, a recent communication shows enhancement of information transmission due to cell-to-cell variability (extrinsic noise in this context) in skeletal muscle [33]. We note that mutual information (MI), a measure of statistical dependency between two variables in information theory quantifies information transmission capacity [34–36]. Regulatory cascades in biological systems have long been recognized for their critical role in transmitting information and orchestrating various cellular processes. However, the extent to which intrinsic and extrinsic noise contribute to the transmission of information within these cascades remains relatively unexplored. The present study aims to address this gap by considering the intrinsic and extrinsic noise components as well as de-" 2312.07178v1,"Beyond Expected Return: Accounting for Policy Reproducibility when Evaluating Reinforcement Learning Algorithms Manon Flageat, 1 * Bryan Lim, 1 * Antoine Cully 1 * Equal contribution Adaptive and Intelligent Robotics Lab, Imperial College London, UK manon.flageat18@imperial.ac.uk, bryan.lim16@imperial.ac.uk, acully@imperial.ac.uk 1 Abstract Many applications in Reinforcement Learning (RL) usually have noise or stochasticity present in the environment. Beyond their impact on learning, these uncertainties lead the exact same policy to perform differently, i.e. yield different return, from one roll-out to another. Common evaluation procedures in RL summarise the consequent return distributions using solely the expected return, which does not account for the spread of the distribution. Our work defines this spread as the policy reproducibility: the ability of a policy to obtain similar performance when rolled out many times, a crucial property in some real-world applications. We highlight that existing procedures that only use the expected return are limited on two fronts: first an infinite number of return distributions with a wide range of performance-reproducibility trade-offs can have the same expected return, limiting its effectiveness when used for comparing policies; second, the expected return metric does not leave any room for practitioners to choose the best trade-off value for considered applications. In this work, we address these limitations by recommending the use of Lower Confidence Bound, a metric taken from Bayesian optimisation that provides the user with a preference parameter to choose a desired performance-reproducibility trade-off. We also formalise and quantify policy reproducibility, and demonstrate the benefit of our metrics using extensive experiments of popular RL algorithms on common uncertain RL tasks. 1 Introduction As Reinforcement Learning (RL) algorithms become increasingly competitive, attention is being shifted from toy and benchmark environments towards realistic everyday problems. However, real-world applications are never fully observable, resulting in various sources of uncertainty: imperfect actuators and sensors, miscalibration, user mental state, system wear and tear, etc. These uncertainties directly impact the policies as they cause stochasticity in the dynamics, rewards, actions as well as observations (Cassandra 1998; Dulac-Arnold et al. 2020). In this work, we highlight that when considering commonly-used uncertain settings, the final policy of a standard RL algorithm may have large variation in its performance, i.e. low reproducibility. We argue that evaluating and accounting for policy reproducibility is a critical and understudied issue in RL. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Policy B 100% Policy A 85% 15% Expected Return for Policy A & B Policy B Policy A Return Figure 1: Illustration of the trade-off between policy reproducibility and performance in uncertain domains. Policy A (blue) cooks the best-breakfast-ever-made 85% of the time, but burns all the eggs the remaining 15%, while Policy B (green) consistently cooks a lower-quality breakfast. As shown in the distribution of returns (bottom), Policy A and B have the same expected return, highlighting the limitations of this commonly-used metric. As a motivating example, let’s take the hypothetical example of a breakfast-cooking robot, trained using RL to cook the best expected breakfast every morning (see Figure 1). A learnt robot Policy A might get a really high expected return by cooking the best-breakfast-ever-made 85% of the time, but burn all the eggs the remaining 15% (blue Policy in Figure 1). This would result in finding burned eggs in the user’s plates approximately one day a week. In this example, it is likely that the user would prefer a slightly lower-quality breakfast but consistently everyday of the week, such as proposed by Policy B (green Policy in Figure 1). In other words, the user would likely prefer a more-reproducible policy. However, Policy A and Policy B both have the same expected return. More critically, the expected return metric does not leave any room to take into account this trade-off between quality and reproducibility, in order to chose the desired policy to deploy." 2312.07179v1,"Quantum Hall coherent perfect absorption in graphene Dariush Jahani a , 1 Mohammadreza Alikhani, 1 and Yaser Abdi 1 1 Department of Physics. University of Tehran, Tehran, Iran (Dated: December 13, 2023) Abstract. 100% absorption in a two-dimensional electron gas (2DEG) with Dirac spectrum is demonstrated to be obtained by controlling the interference of multiple incident radiations, referred to as coherent perfect absorption (CPA). However, when a 2DEG such as graphene is exposed to a magnetostatic bias, it resonantly could absorb electromagnetic radiation by transitions of its Dirac electrons between non-equidistant and nonlinear Landau levels. Here, the magneto-optical terahertz (THz) CPA in graphene under the quantum Hall effect (QHE) regime at both strong and subtesla magnetostatic bias fields is addressed. Our findings show that an effective magneto-optical surface conductivity corresponding to right- and left-handed circular (RHC- and LHC) polarizations could model a magneto-tunable CPA in graphene in THz range. Significantly, graphene under QHE regime reveals different tunable CPA properties for each circularly polarized beams by the intensity of the applied magnetic bias. Moreover, it is observed that different phase modulations at CPA frequencies are achieved for RHC and LHC polarizations. Considering the maximum efficiency for a 2D absorber, our results demonstrate the magnetostatic tuning of CPA in 2D Dirac materials for long-wavelength sensing applications and signal processing. PACS numbers: KEYWORDS: Graphene, Coherent perfect absorption, Quantum Hall effect, Nonlinear Landau levels, Terahertz regime I. INTRODUCTION Under a normally applied magnetic field, unlike conventional 2D electron gas (2DEG) systems, the Landau levels (LLs) in 2D Dirac materials are not equally spaced and vary non-linearly with the field modulations. This could significantly affect the absorption properties of 2DEG systems with Dirac spectrum. Graphene, a 2D material composed of carbon atoms arranged in a honeycomb pattern, has attracted huge attention due to its exceptional electronic and optical properties [1, 2]. Interestingly, the non-equidistant and nonlinear properties of LLs of graphene in the presence of a magnetic field which make it a promising material for various optoelectronic applications arises from its linear energy dispersion relation [3, 4]. It is well-known that the zero-gap Dirac cones in the linear energy spectrum of graphene give rise to observation of the unconventional quantum Hall conductivity in the presence of a magnetic bias applied normally to its surface[5]. Now, the absorption of light is being studied to understand how electromagnetic waves can be harvested to stimulate electrons in materials. For instance, in optical sensors and solar cells [6–10], the primary phenomenon is the absorption of incoming electromagnetic waves through materials and converting them to electrical current. The absorption of materials could be considered due to the electronic excitations in near-infrared and visible, phonons’ local vibrational modes in mid-infrared, and collective modes in terahertz regime [11]. However, the absorption of electromagnetic waves in a atomically 2D materials is generally insufficient for real-world applications. Therefore, developing innovative methods to enhance the absorption of them is an essential step toward improving its optical absorption properties. From a theoretical standpoint, the maximum absorption of a 2D material is 50% of the incident radiation. Up to know, several methods have been proposed to increase the absorption of 2D materials, such as fabry-perot cavities [12– 16] to trap waves in an optical cavity and excitation surface plasmonic resonances [17–19]. Now, since these approaches are highly dependent on the structure, absorption is typically limited to a narrow electromagnetic spectrum. As a result, additional techniques are needed to achieve perfect absorption in a more straightforward and tunable manner. Here, coherent perfect absorption (CPA) is a promising concept to address these challenges. The underlying principle behind CPA is making standing waves by interfering with two beams with tuned frequency to trap electromagnetic energy onto the absorber and surpassing the scattering matrix. Therefore, the perfect absorption could be accessible by tuning the phase modulation of two incident beams [20, 21]. Graphene, as a one-atom-thick 2D material, in the visible and near-IR zone under normal incidence could absorb only 2.3% of light. While this is a relatively high value for an atomically thin layer, it is still far too insufficient from being a perfect absorber of light. Recently, graphene has been studied for its potential to achieve coherent perfect absorption (CPA) in the midinfrared and terahertz ranges. Shraddha M. Rao et al. showed 80% modulation of light through the CPA concept. a dariush110@gmial.com" 2312.07191v1,"Spatiotemporal variability of ride-pooling potential – half a year New York City experiment Olha Shulika a,∗ , Michal Bujak b , Farnoud Ghasemi b and Rafal Kucharski a a Faculty of Mathematics and Computer Science, Jagiellonian University, Profesora Stanisława Łojasiewicza 6, Krakow, 30-348, Poland b Doctoral School of Exact and Natural Sciences, Jagiellonian University, Profesora Stanisława Łojasiewicza 11, Krakow, 30-348, Poland ARTICLE INFO ABSTRACT Keywords: ride-pooling mobility as a service ride-splitting spatiotemporal demand patterns ride-sharing Ride-pooling systems, despite being an appealing urban mobility mode, still struggle to gain momentum. While we know the significance of critical mass in reaching system sustainability, less is known about the spatiotemporal patterns of system performance. Here, we use 1.5 million NYC taxi trips (sampled over a six-month period) and experiment to understand how well they could be served with pooled services. We use a utility-driven ride-pooling algorithm and observe the pooling potential with six performance indicators: mileage reductions, travellers’ utility gains, share of pooled rides, occupancy, detours, and potential fleet reduction. We report distributions and temporal profiles of about 35 thousand experiments covering weekdays, weekends, evenings, mornings, and nights. We report complex spatial patterns, with gains concentrated in the core of the network and costs concentrated on the peripheries. The greatest potential shifts from the North in the morning to the Central and South in the afternoon. Offering pooled rides at the fare 32% lower than private ridehailing seems to be sufficient to attract pooling yet dynamically adjusting it to the demand level and spatial pattern may be efficient. The patterns observed in NYC were replicated on smaller datasets in Chicago and Washington, DC, the occupancy grows with the demand with similar trends. 1. Introduction Ride-pooling (also called shared ride-hailing or ridesplitting) is a service in which passengers with similar origins or destinations are pooled to the same vehicle to travel together. The total mileage is then reduced and the travel costs can be now shared by the co-travellers (Santi et al., 2014; Alonso-Mora et al., 2017). Ride-pooling hardly reached the critical mass in the pre-pandemic period and almost completely stopped during the pandemic (Foljanty, 2022), nonetheless it remains a promising emerging mobility mode with the significant potential to contribute towards sustainability transitions. Effective pooling can complement public transport (Cats et al., 2022), and when demand levels exceed the so-called critical mass, this becomes efficient for all parties: for travellers who pay less, for drivers who can earn more, for the service provider (mobility platform) that can reduce the total mileage and better utilise its fleet, and for the city that can reduce traffic congestion and externalities (Shaheen et al., 2016). High demand levels are substantial in reaching the full potential of pooling services, but can be insufficient. The actual performance depends also on operating area, supply concentration, topology etc. (Fielbaum et al., 2023; Liu et al., 2023; Manik and Molkenthin, 2020). As a result, identifying the efficiency and attractiveness of ride-pooling for various parties involved is more nuanced and calls for a detailed ∗ Corresponding author olha.shulika@uj.edu.pl (O. Shulika); michal.bujak@doctoral.uj.edu.pl (M. Bujak); farnoud.ghasemi@doctoral.uj.edu.pl (F. Ghasemi); rafal.kucharski@uj.edu.pl (R. Kucharski) https://rafalkucharskipk.github.io/ (R. Kucharski) ORCID (s): 0000-0002-1912-1115 (O. Shulika); 0000-0002-9767-8883 (R. Kucharski) Olha Shulika et al.: Preprint submitted to Elsevier analysis. While the general trends of shareability have been widely reported, so far, the detailed spatiotemporal analysis was missing. To illustrate the significance of more detailed analysis, let’s analyse the following glimpse of our results in Fig. 1 left. The average occupancy non-linearly increases with the demand level in NYC and the logarithmic elbow curve well explains the general trend, yet the variability among individual experiments (dots) remains huge, e.g. the occupancy for demand levels of 300 trips per hour vary from 1.2 to 1.6. In this study we aim to explain this residual variability and explore the potential of ride-pooling on the big dataset. To provide more thorough understanding of ride-pooling potential in dense urban areas, we synthesize the results of 9 000 half-hour ride-pooling experiments in which the sample of 1.5 million actual trip requests from New York are pooled into attractive shared rides (Fig. 1 right). We provide detailed results that go beyond the classical notion of a critical mass. We observe how shareability changes for various days of the week and hours of the day, and report the temporal and spatial distributions of six various ride-pooling performance indicators. The results can help understand the actual potential of ride-pooling and its limitations. The results can help policymakers and transportation network companies develop policies for the development of sustainable, attractive and commercially successful ridepooling services. 1.1. Literature review Ride-pooling is the most effective with high demand (Santi et al., 2014; Alonso-Mora et al., 2017; Tachet et al., 2017). While in public transport, the demand density is a key to reach efficiency, it also varies greatly with spatial and Page 1 of 14" 2312.07193v1,"(σ, δ)-polycyclic codes in Ore extensions over rings Maryam Bajalan a,1 , Ivan Landjev b , Edgar Martínez-Moro c,1 , Steve Szabo d a Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, Bl. 8, Acad. G. Bonchev Str., 1113, Sofia, Bulgaria b Department of Mathematics, New Bulgarian University, Sofia, Bulgaria c Institute of Mathematics, University of Valladolid, Castilla, Spain d Institute of Mathematics and Statistics, Eastern Kentucky University, Kentucky, USA Abstract In this paper, we study the algebraic structure of (σ, δ)-polycyclic codes as submodules in the quotient module S /S f , where S = R[x, σ, δ] is the Ore extension, f ∈ S , and R is a finite but not necessarily commutative ring. We establish that the Euclidean duals of (σ, δ)-polycyclic codes are (σ, δ)-sequential codes. By using (σ, δ)-Pseudo Linear Transformation (PLT), we define the annihilator dual of (σ, δ)-polycyclic codes. Then, we demonstrate that the annihilator duals of (σ, δ)-polycyclic codes maintain their (σ, δ)-polycyclic nature. Furthermore, we classify when two (σ, δ)-polycyclic codes are Hamming isometrical equivalent. By employing Wedderburn polynomials, we introduce simple-root (σ, δ)-polycyclic codes. Subsequently, we define the (σ, δ)-Mattson-Solomon transform for this class of codes and we address the problem of decomposing these codes by using the properties of Wedderburn polynomials. Keywords: Ore extensions, Wedderburn polynomials, Non-commutative rings, (σ, δ)-polycyclic codes, (σ, δ)-Mattson-Solomon maps, Simple-root (σ, δ)-polycyclic codes AMS Subject Classification 2010: 17A01, 94B05 1. Introduction Suppose that R is a finite ring with unit, σ ∈ End(R) and δ is an additive endomorphism of R satisfying δ(ab) = σ(a)δ(b) + δ(a)b for all a, b ∈ R. An Ore extension is a non-commutative polynomial ring R[x, σ, δ] constructed by multiplications xa = σ(a)x + δ(a) and x r x s = x r+s . In coding theory, (σ, δ)-polycyclic codes over the ring R is a novel study, where these codes are defined as ideals (submodules) in the quotient ring (quotient module) S /S f where S is the Ore extension R[x, σ, δ] and S f as a two-sided (one-sided) ideal. This class of codes constitutes a powerful generalization that encompasses various generalizations of cyclic codes, including skew cyclic codes, skew negacyclic codes, skew constacyclic codes, polycyclic codes, etc, see [2, 3, 5, 6, 7]. Therefore, by studying (σ, δ)-polycyclic codes from several points of view, we achieve a unification of different approaches, providing a comprehensive survey of all these various generalizations. In 2012, Boucher and Ulmer have introduced the concept of (σ, δ)-polycyclic codes as submodules in S /S f , where R is the finite field F q , see [8]. It is well-known that if R = F q , then all σ-derivations δ are uniquely determined by δ(a) = β(σ(a) − a), where β ∈ F q . They have proved that if z = x + β, then there Email addresses: maryam.bajalan@math.bas.bg (Maryam Bajalan ), i.landjev@nbu.bg (Ivan Landjev), edgar.martinez@uva.es (Edgar Martínez-Moro), steve.szabo@eku.edu (Steve Szabo) 1 Maryam Bajalan is supported by the Bulgarian Ministry of Education and Science, Scientific Programme ""Enhancing the Research Capacity in Mathematical Sciences (PIKOM)"", No. DO1-67/05.05.2022. Preprint submitted to FFA December 13, 2023" 2312.07205v1,"Construction and application of an algebraic dual basis and the Fine-Scale Greens’ Function for computing projections and reconstructing unresolved scales Suyash Shrestha a,c , Joey Dekker b,c , Marc Gerritsma c , Steven Hulshoff c , Ido Akkerman d a ETSIAE-UPM-School of Aeronautics, Universidad Politécnica de Madrid, Plaza Cardenal Cisneros 3, Madrid, E-28040, Spain b Delft University of Technology, Delft Institute of Applied Mathematics, Mekelweg 4, Delft, 2628 CD, The Netherlands c Delft University of Technology, Faculty of Aerospace Engineering, Kluyverweg 1, Delft, 2629 HS, The Netherlands d Delft University of Technology, Faculty of Mechanical Engineering, Mekelweg 2, Delft, 2628 CD, The Netherlands Abstract In this paper, we build on the work of [T. Hughes, G. Sangalli, VARIATIONAL MULTISCALE ANALY- SIS: THE FINE-SCALE GREENS’ FUNCTION, PROJECTION, OPTIMIZATION, LOCALIZATION, AND STABILIZED METHODS, SIAM Journal of Numerical Analysis, 45(2), 2007] dealing with the explicit computation of the Fine-Scale Green’s function. The original approach chooses a set of functionals associated with a projector to compute the Fine-Scale Green’s function. The construction of these functionals, however, does not generalise to arbitrary projections, higher dimensions, or Spectral Element methods. We propose to generalise the construction of the required functionals by using dual functions. These dual functions can be directly derived from the chosen projector and are explicitly computable. We show how to find the dual functions for both the L 2 and the H 0 1 projections. We then go on to demonstrate that the Fine-Scale Green’s functions constructed with the dual basis functions consistently reproduce the unresolved scales removed by the projector. The methodology is tested using one-dimensional Poisson and advection-diffusion problems, as well as a two-dimensional Poisson problem. We present the computed components of the Fine-Scale Green’s function, and the Fine-Scale Green’s function itself. These results show that the method works for arbitrary projections, in arbitrary dimensions. Moreover, the methodology can be applied to any Finite/Spectral Element or Isogeometric framework. Keywords: duality; projection; variational multiscale; (Fine-Scale) Greens’ function; Poisson equation; advection-diffusion equation Contents 1 Introduction 2 2 Hughes and Sangalli approach 2.1 Continuous Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Finite-dimensional case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 3 Primal and Dual bases 3.1 Primal basis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 Email address: s.shrestha-1@tudelft.nl; s.shrestha@upm.es (Suyash Shrestha) Preprint submitted to Elsevier Wednesday 13 th December, 2023" 2312.07216v1,"Learning from Interaction: User Interface Adaptation using Reinforcement Learning Daniel Gaspar-Figueiredo Universitat Politècnica de València & Instituto Tecnológico de Informática Valencia, Spain dagasfi@epsa.upv.es ABSTRACT The continuous adaptation of software systems to meet the evolving needs of users is very important for enhancing user experience (UX). User interface (UI) adaptation, which involves adjusting the layout, navigation, and content presentation based on user preferences and contextual conditions, plays an important role in achieving this goal. However, suggesting the right adaptation at the right time and in the right place remains a challenge in order to make it valuable for the end-user. To tackle this challenge, machine learning approaches could be used. In particular, we are using Reinforcement Learning (RL) due to its ability to learn from interaction with the users. In this approach, the feedback is very important and the use of physiological data could be benefitial to obtain objective insights into how users are reacting to the different adaptations. Thus, in this PhD thesis, we propose an RL-based UI adaptation framework that uses physiological data. The framework aims to learn from user interactions and make informed adaptations to improve UX. To this end, our research aims to answer the following questions: Does the use of an RL-based approach improve UX? How effective is RL in guiding UI adaptation? and Can physiological data support UI adaptation for enhancing UX? The evaluation plan involves conducting user studies to evaluate answer these questions. The empirical evaluation will provide a strong empirical foundation for building, evaluating, and improving the proposed adaptation framework. The expected contributions of this research include the development of a novel framework for intelligent Adaptive UIs, insights into the effectiveness of RL algorithms in guiding UI adaptation, the integration of physiological data as objective measures of UX, and empirical validation of the proposed framework’s impact on UX. CCS CONCEPTS • Software and its engineering → Software design engineering; • Human-centered computing → User interface design; • General and reference → Empirical studies. KEYWORDS Adaptive Systems, User Interfaces, Reinforcement Learning, User Experience, Physiological Data Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ESEM ’23, October 22–27, 2023, New Orleans, Louisiana, United States © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM Reference Format: Daniel Gaspar-Figueiredo. 2023. Learning from Interaction: User Interface Adaptation using Reinforcement Learning . In Proceedings of International Symposium on Empirical Software Engineering and Measurement - Doctoral Symposium Track (ESEM ’23). ACM, New York, NY, USA, 6 pages. 1 INTRODUCTION Software development approaches that effectively respond to the needs of end-users have gained significant attention. Among these approaches, adaptive systems have emerged as a promising solution for designing software systems that can automatically adjust their behavior and presentation based on changing contextual conditions. This adaptability aims to enhance the User Experience (UX) and improve overall user satisfaction. One specific area where adaptive systems play an important role is user interface adaptation [5]. The user interface (UI) comprises various elements, including classical widgets, custom widgets, text, and graphics, which enable users to interact with the system. Adaptive User Interfaces (AUIs) [9] have been introduced to address the evolving needs of users over time and deliver a personalized experience by adjusting the layout, navigation, and content presentation in real-time based on each user’s preferences and abilities. To this end, machine learning (ML) techniques can be used in order to automate and optimize the adaptation process in AUIs. These algorithms can analyze patterns, preferences, and contextual information to make intelligent decisions regarding interface adaptation [1]. One Machine Learning technique that shows a great potential in guiding the adaptation process is Reinforcement Learning (RL). RL has gained attention for its ability to learn optimal decision-making policies through interactions with an environment. In the context of AUIs, RL allows the adaptive interfaces to continuously learn and improve their adaptation strategies based on trial and error interactions with an environment and receiving feedback in the form of rewards [6, 22] by actively exploring different adaptation strategies and exploiting the ones that yield positive outcomes. The ability of RL to consider long-term goals and optimize cumulative rewards over time provides a robust framework for guiding the adaptation process and improving user experience. This technique enables AUIs to adapt to dynamic user contexts, preferences, and evolving UX requirements. Understanding the user emotional state can be powerful to detect the evolving UX requirements. This is typically assessed using retrospective methods (e.g., interviews and questionnaires), thus increasing the bias of self-report [24] and the Hawthorne effect [19]. Since these methods do not capture the UX during the real interaction, other approaches have been receiving an increasing interest, such as physiological data [16]. It can be captured from sensors and" 2312.07225v1,"Solution of the v-representability problem on a ring domain Sarina M. Sutter, 1 Markus Penz, 2, 3, a) Michael Ruggenthaler, 2, 4 Robert van Leeuwen, 5 and Klaas J. H. Giesbertz 1 1) Theoretical Chemistry, Faculty of Exact Sciences, VU University, Amsterdam, The Netherlands Max Planck Institute for the Structure and Dynamics of Matter and Center for Free-Electron Laser Science, Hamburg, Germany 3) Department of Computer Science, Oslo Metropolitan University, Oslo, Norway 4) The Hamburg Center for Ultrafast Imaging, Hamburg, Germany 5) Department of Physics, Nanoscience Center, University of Jyväskylä, Finland 2) We provide a solution to the v-representability problem for a non-relativistic quantum many-particle system on a ring domain in terms of Sobolev spaces and their duals. Any one-particle density that is square-integrable, has a squareintegrable weak derivative, and is gapped away from zero can be realized from the solution of a many-particle Schrödinger equation, with or without interactions, by choosing a corresponding external potential. This potential can contain a distributional contribution but still gives rise to a self-adjoint Hamiltonian. Importantly, this allows for a well-defined Kohn–Sham procedure but, on the other hand, invalidates the usual proof of the Hohenberg–Kohn theorem. CONTENTS I. Introduction 1 II. One-dimensional torus setting 3 III. Densities on the one-dimensional torus 5 IV. Convex formulation of density-functional theory 6 V. v-Representing potentials from non-empty subdifferentials 8 VI. KLMN theorem for distributional potentials 9 VII. Conclusions and outlook 11 Acknowledgments 13 A. Kinetic bounds for interactions 14 References I. 13 INTRODUCTION The origin of the v-representability problem can be found in the seminal work of Hohenberg and Kohn [1, Footnote 12] that established the field of density-functional theory (DFT). Therein, the universal density functional is only defined for densities with the property of v-representability. The term “v-representability” itself, according to Levy [2], is due to E. G. Larson at the Boulder Theoretical Chemistry Conference, June 1975. The same paper also presents the constrained-search approach as a way to extend the domain of the universal functional to all N -representable densities (those that come from N -particle wave functions). It was later realized by Levy [3] and Lieb [4] that there exist densities that belong to a ground-state ensemble of at least 3-fold degeneracy, but not to any pure ground state. Also, it was found by Englisch and Englisch [5] that even this more general ensemble v-representability is not enough to generate all possible densities. Since it is also imaginable that Hamiltonians with and without interactions yield entirely different ground-state densities, we arrive at the following types of v-representability. non-interacting pure-state v-representability non-interacting ensemble v-representability interacting pure-state v-representability interacting ensemble v-representability a) Electronic address: m.penz@inter.at" 2312.07226v1,"Super-Resolution on Rotationally Scanned Photoacoustic Microscopy Images Incorporating Scanning Prior Kai Pan a,1 , Linyang Li b,1 , Li Lin a,c , Pujin Cheng a,c , Junyan Lyu a , Lei Xi b,∗ and Xiaoyin Tang a,c,∗ a the Department of Electronic and Electrical Engineering, Southern University of Science and Technology, 1088 Xueyuan Avenue, Nanshan District, Shenzhen, 518055, GuangDong, China b the Department of Biomedical Engineering, Southern University of Science and Technology, 1088 Xueyuan Avenue, Nanshan District, Shenzhen, 518055, GuangDong, China c Jiaxing Research Institute, Southern University of Science and Technology, Xiuzhou District, Jiaxing, 314000, ZheJiang, China ARTICLE INFO ABSTRACT Keywords: Photoacoustic Microscopy Super-resolution Rotational Scanning Odd-and-even Row Registration Gradient-based Patch Selection Photoacoustic Microscopy (PAM) images integrating the advantages of optical contrast and acoustic resolution have been widely used in brain studies. However, there exists a trade-off between scanning speed and image resolution. Compared with traditional raster scanning, rotational scanning provides good opportunities for fast PAM imaging by optimizing the scanning mechanism. Recently, there is a trend to incorporate deep learning into the scanning process to further increase the scanning speed. Yet, most such attempts are performed for raster scanning while those for rotational scanning are relatively rare. In this study, we propose a novel and well-performing super-resolution framework for rotational scanning-based PAM imaging. To eliminate adjacent rows’ displacements due to subject motion or high-frequency scanning distortion, we introduce a registration module across odd and even rows in the preprocessing and incorporate displacement degradation in the training. Besides, gradient-based patch selection is proposed to increase the probability of blood vessel patches being selected for training. A Transformer-based network with a global receptive field is applied for better performance. Experimental results on both synthetic and real datasets demonstrate the effectiveness and generalizability of our proposed framework for rotationally scanned PAM images’ super-resolution, both quantitatively and qualitatively. Code is available at https://github.com/11710615/PAMSR.git. 1. Introduction Photoacoustic Microscopy (PAM) imaging provides a novel type of imaging modality that integrates the advantages of both optical contrast and acoustic resolution. This modality has gained increasing recognition in brain studies, particularly in the field of neurovascular and brain metabolism research [41, 16, 29]. As a hybrid imaging technology, PAM detects optical-absorption-induced acoustic signals, enabling direct visualization of the distribution of intrinsic or extrinsic optical absorbers. Compared to other imaging techniques, such as functional magnetic resonance imaging [33, 34] and optical microscopy [31, 52, 14], PAM imaging provides a high resolution, a large field of view (FOV), and a deep penetration depth for real-time imaging of the hemodynamics in intricate brain vascular networks [44, 36, 37]. However, due to the point-scan based imaging mechanism, there is an inevitable trade-off between imaging speed and imaging quality in PAM. While traditional PAM imaging systems are limited by slow motor scanning [25, 2], recent advances in highspeed PAM imaging have explored faster scanning mechanisms, including galvanometer scanners [42, 17], microelectromechanical systems (MEMS) scanners [4, 12], polygon scanning systems [3, 50], and rotational scanning systems [15, 28, 30]. Among the various techniques available, the rotational scanning system is a noteworthy approach that ∗ Corresponding authors xilei@sustech.edu.cn (L. Xi); tangxy@sustech.edu.cn (X. Tang) 1 Co-first authors: Kai Pan, Linyang Li contributed equally to this work. K. Pan et al.: Preprint submitted to Elsevier seamlessly integrates optical scanning and acoustic detection. This integration facilitates the achievement of coaxial confocal between the laser and ultrasound, resulting in a high signal-to-noise ratio (SNR), large FOV and high-speed imaging without external mechanical scanning, increasing the portability of the system. However, the imaging speed of high-speed PAM systems is often limited by the laser’s pulse repetition rate so as to satisfy the optical energy density’s safety threshold. And sparse sampling has become a necessary compromise for rotational scanning when there is a need for increasing the imaging speed. Under such a circumstance, applying interpolation algorithms or machine learning methods on sparsely sampled images can further increase the imaging speed. Image super-resolution (SR) is a process of reconstructing high-resolution (HR) images from low-resolution (LR) inputs. Recently, deep learning (DL) based SR methods have made great strides [39, 43, 19, 18, 21, 47, 8, 27, 48, 7, 26, 6]. Due to the ill-posed attribute of the problem, it is impossible to perfectly recover the original HR image from a given LR image. Based on the different focuses on the quality of the output, SR tasks can be generally classified into PSNR- oriented ones and Perception-oriented ones. PSNR-oriented methods are optimized using pixel-wise losses, resulting in smoother outputs with higher Peak Signal-to-Noise Ratio (PSNR) scores. Perception-oriented methods usually employ GAN losses or other non-reconstruction losses to obtain results that are more visually appealing. A large number of DL techniques have also been applied in the field of photoacoustic imaging, mainly targeting Page 1 of 11" 2312.07235v1,"Gaussian Boson Sampling for binary optimization 1 st Jean Cazalis 2 nd Yahui Chai 3 rd Karl Jansen 4 th Stefan Kühn 5 th Tirth Shah Q.ant GmbH Stuttgart, Germany jean.cazalis@qant.gmbh CQTA DESY Zeuthen, Germany yahui.chai@desy.de CQTA DESY Zeuthen, Germany karl.jansen@desy.de CQTA DESY Zeuthen, Germany stefan.kuehn@desy.de Q.ant GmbH Stuttgart, Germany tirth.shah@qant.gmbh Abstract—In this study, we consider a Gaussian Boson Sampler for solving a Flight Gate Assignment problem. We employ a Variational Quantum Eigensolver approach using the Conditional Value-at-risk cost function. We provide proof of principle by carrying out numerical simulations on randomly generated instances. Index Terms—Gaussian Boson Sampling, Variational Quantum Eigensolver, Combinatorial Optimization I. I NTRODUCTION The Variational Quantum Eigensolver (VQE), a variational approach for finding the ground state energy of Hamiltonians, makes use of the quantum device to prepare an ansatz state in the form of a parametric quantum circuit. This ansatz can be represented by θ ∈ R p 7→ |φ(θ)⟩. Then, the goal is to minimize the Hamiltonian expectation value in a hybrid quantum-classical loop. VQE has recently been proposed to address combinatorial optimization problems [1]. In this paper, we explore a VQE-based approach, already presented in [2], to address the Flight-Gate Assignment (FGA) problem. As in [3], we use a Gaussian Boson Sampler (GBS) instead of a digital quantum computer. In contrast, our approach employs a more general GBS ansatz, along with a cost function that is computed analytically in the case of VQE. II. G AUSSIAN BOSON SAMPLING A GBS is a non-universal photonic quantum platform and one of the prominent candidates for demonstrating quantum advantage in the near future [4], [5]. The GBS ansatz consists of pure N -modes Gaussian states without displacement sampled using threshold detectors (TD) [6]. The quantum state is prepared from the vacuum by applying squeezing gates with parameters (r 1 , . . . , r N ) ∈ R N + DOI: 10.1109/QCE57702.2023.10268 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Acknowledgements. This work is funded by the German Federal Ministry of Education and Research (BMBF) under the project ”PhoQuant”. This work is supported by the European Union’s Horizon Europe Framework Programme (HORIZON) under the ERA Chair scheme with grant agreement no. 101087126. This work is supported with funds from the Ministry of Science, Research and Culture of the State of Brandenburg within the Centre for Quantum Technologies and Applications (CQTA). J.C. and T.S. are grateful for valuable feedback from the Simulation and Software team at Q.ANT GmbH. followed by a universal passive interferometer, whose action on creation/annihilation operators is described by a N × N unitary U . The output state is characterized by its Husimi covariance matrix Σ. Then, the photons are sent to the TDs which record a ’click’ when one or more photons are detected, ’no click’ otherwise. These outcome measures are described by the measurement operators (0) Π̂ j (1) = |0 j ⟩⟨0 j | and Π̂ j = I − |0 j ⟩⟨0 j | , where I is the identity operator and |0 j ⟩ the vacuum on the optical mode j. The probability to detect a pattern is proportional to the Torontonian of the submatrix of O = I − Σ −1 corresponding to the pattern. III. T HE F LIGHT -G ATE A SSIGNMENT PROBLEM The FGA problem aims at optimizing the assignment of flight activities F to airport gates G. In this work, we consider a scenario where the total transfer time of passengers has to be minimized, subject to two linear constraints 1) each flight can be assigned to at most one gate 2) two flight activities cannot be assigned to the same gate simultaneously. This problem can be formulated as a Quadratic Unconstrained Binary Optimization (QUBO) problem [7] ! 2 Q(x) = T (x) + λ one X X i x iα − 1 α + λ not X X (i,j)∈P x iα x jα . α Here x = (x iα ) i∈F,α∈G ∈ {0, 1} |F |×|G| is a set of binary variables representing an assignment (x iα = 1 if and only if flight i ∈ F is assigned to gate α ∈ G), T (x) is a quadratic functional accounting for the total passenger travel time and the last two terms encode the two constraints, with P ⊂ F ×F listing the incompatible pairs of flights and λ one , λ not > 0 are constants chosen large enough. We can embed this problem into GBS with N = |F | × |G| optical modes as follows: the QUBO is turned into a Hamiltonian Q̂ by replacing each binary decision variable x iα with (1) the projection Π̂ iα . The ground state of Q̂ then encodes the optimal solution corresponding to the QUBO minimizer." 2312.07271v1,"Analyze the Robustness of Classifiers under Label Noise Author: Cheng Zeng czen8507@uni.sydney.edu.au, Yixuan Xu yixu9725@uni.sydney.edu.au, Jiaqi Tian jtia3555@uni.sydney.edu.au Abstract The purpose of this article is to conduct research on the robustness of label noise classifiers to improve the model’s robustness to noisy data and ensure its robust- ness in complex actual scenarios. Label noise refers to the situation where labels appear wrong or inaccurate in supervised learning [1]. Recent developments indicate that the impact of label noise on model performance has become a focus of research, especially in practical applications. Therefore, the common problem of inaccurate labels in training data poses a significant challenge. We adopt adversarial machine learning (AML) and importance reweighting methods to deal with the label noise problem and use convolutional neural networks (CNN) as the baseline model. We adjusted the parameters of each sample in each training data to make the model pay more attention to samples that have a significant impact on performance. Such a combination aims to improve the model’s adaptability to label noise. On the CIFAR, FashionMnist0.5, and FashionMnist0.6 datasets, we use evaluation metrics such as precision, recall, and F1 score. By modifying the parameters and conducting multiple experiments, the experimental results show that the two methods of AML and importance reweighting indeed significantly improve the model’s resistance to label noise and improve the classification accuracy and robustness. In summary, our study highlights the importance of addressing label noise in supervised learning. Both methods, adversarial machine learning and importance reweighting, have been shown to be effective in improving the robustness of label noise classifiers. In the future, these insights may provide ideas for improving the reliability and generalization ability of supervised learning models in real-world scenarios. 1, Introduction The robustness of machine learning to noisy data is indispensable in practical applications. The purpose of our paper is to design and implement a classifier that is robust to noise, which can significantly degrade the performance of predictive models. In the field of machine learning, label noise can come from a variety of sources, including human error in the data labeling process, ambiguity in the data itself, or problems in data collection and processing. Furthermore, the realworld impact is huge and good image labeling often requires expensive labor [1]. Due to limited budgets, machine learning models can be misled by noisy data sets and remember wrong relationships [1]. In the field of label noise research, a variety of classifiers and methods exist to improve model performance in the presence of label errors. A common approach is to improve the quality of the data set through noise filtering or correction. This may involve using some outlier detection techniques to exclude samples from the training set that may contain incorrect labels. Although existing research has pro- posed several methods to deal with label noise, they usually have limitations. Examples include the need for a clean validation set or the inability to handle high" 2312.07272v1,"Measuring hhW W Coupling at Lepton Colliders Qing-Hong Cao, 1, 2, ∗ Kun Cheng, 1, † Yandong Liu, 3, 4, ‡ and Xiao-Rui Wang 1, § 1 2 School of Physics, Peking University, Beijing 100871, China Center for High Energy Physics, Peking University, Beijing 100871, China 3 Key Laboratory of Beam Technology of Ministry of Education, College of Nuclear Science and Technology, Beijing Normal University, Beijing 100875, China 4 Beijing Radiation Center, Beijing 100875, China Abstract The quartic Higgs-gauge-boson coupling g hhW W is sensitive to the electroweak symmetry breaking mechanism, however, it is challenging to be measured at the large hadron collider. We show that the coupling can be well probed at future lepton colliders through di-Higgs boson production via the vector boson fusion channel. We perform a detailed simulation of / T with parton showering effects at e + e − , µ + µ − and e − µ + colliders. ℓ + ℓ − → ν ν̄hh → 4b + E SM SM We find that the regions of g hhW W /g hhW W < 0.86 and g hhW W /g hhW W > 1.32 can be discovered at the 5σ confidence level at the 10 TeV µ + µ − collider with an integrated luminosity of 3 ab −1 . ∗ Electronic address: qinghongcao@pku.edu.cn † Electronic address: chengkun@pku.edu.cn ‡ Electronic address: ydliu@bnu.edu.cn § Electronic address: xiaorui wong@pku.edu.cn 1" 2312.07276v1,"1 Learning to Optimize: Accelerating Optimal Power Flow via Data-driven Constraint Screening Shourya Bose, Kejun Chen, and Yu Zhang, Member, IEEE Abstract—This paper introduces a novel data-driven constraint screening approach aimed at accelerating the solution of convexified optimal power flow (OPF) by eliminating constraints that are non-binding at the optimum. Our constraint screening process leverages an input-convex neural network, trained to predict optimal dual variables based on problem parameters. The results demonstrate that, subject to certain mild conditions on the OPF model, our proposed method guarantees an identical solution to the full OPF but significantly reduces computational time. Extensive simulations conducted on the OPF based on the convexified DistFlow model demonstrate that our method outperforms other constraint screening techniques. I. I NTRODUCTION The Optimal Power Flow (OPF) is an optimization problem that determines the optimal settings for control variables in an electric power network. Its primary goal is to minimize the total generation cost while satisfying various operational constraints (e.g., generation limits, voltage limits, and line capacity limits). The increasing integration of distributed energy resources (DERs) leads to an increased demand for more frequent OPF solutions. In addition, efficient solutions are increasingly essential as OPF requires resolution across a wide range of scenarios. AC Optimal Power Flow (ACOPF) accurately represents power network physics. However, it is inherently nonconvex due to a series of nonlinear equality constraints (AC power flow equations). The non-convexity poses a challenge for optimization solvers to find a globally optimal solution, which often necessitates the acceptance of locally optimal solutions [1]. To address this issue, various linearization and convexification techniques have been proposed for ACOPF. Those approximations substitute the nonconvex constraints with linear or convex ones, resulting in what we hereafter refer to as ‘convexified OPF’ (C-OPF). The solutions obtained through C-OPF possess an advantageous characteristic: any solution found locally is guaranteed to be globally optimal. Assuming fixed voltage magnitudes, minimal voltage angle variations, and negligible line resistances, DCOPF approximates AC power flow by using a series of linear equations; see e.g., [2]. The DistFlow equations represent power flow using both line and nodal variables [3]. Extensive research has been conducted on OPF utilizing second-order cone relaxation of DistFlow equations, henceforth called socp-dOPF [4], [5], This work was partially supported by the 2023 CITRIS Interdisciplinary Innovation Program (I2P). All authors are with the Department of Electrical and Computer Engineering at the University of California, Santa Cruz, USA. Emails: {shbose,kchen158,zhangy}@ucsc.edu [6]. Under certain conditions for radial networks, ACOPF solutions can be recovered from the solution of socp-dOPF [7], [6]. For more general networks, ACOPF may be relaxed to a semidefinite program [8], [9], [10]. Other relaxations of ACOPF include quadratic convex relaxation [11], McCormick relaxation [12], and chordal decomposition [13], all of which employ second-order cone and/or semidefinite constraints. A comprehensive review of convex approximations and relaxations to ACOPF is provided in [14]. In this paper, we aim to improve the computational performance of OPF solvers, irrespective of the underlying optimization algorithm, by introducing a machine learning-based technique called Constraint Screening (CS). CS identifies and eliminates non-binding constraints, reducing problem size and accelerating solving times. A. Prior Work Earliest works on the removal of redundant and non-binding constraints are for linear programs [15], [16]. Recent domainspecific CS methods for power systems are based on geometry of the feasible set or machine learning techniques. CS methods based on feasible set geometry analyze the constraints a priori to generate a list of constraints which are provably non-binding at the optimum. In this category, [17], [18], [19] propose algorithms to eliminate redundant line flow constraints for various formulations of DCOPF, based on solving an auxiliary optimization problem per constraint. CS has also been utilized for unit commitment. Madani et al. [20] use a low-order model to eliminate constraints and generate cuts for branch-and-bound. Pineda et al. [21], Zhang et al. [22], and Porras et al. [23] develop methods to accelerate branch-and-bound by eliminating network constraints. CS methods based on machine learning use historical or synthetic OPF datasets to train different models. Typically, the inputs of those models are load demand while the outputs contain the set of binding constraints at the optimum, or optimal decision variables. For example, Deka & Misra [24] and Hasan & Kargarian [25] train a deep neural network (DNN) based classifiers to learn the mapping between problem parameters and the binding constraints. Alternatively, we can learn the mapping between problem parameters and optimal dual variables, which subsequently can assist in identifying the status of each constraint. Dual variables play a pivotal role in DNN applications for OPF [26], [27], [28]. To the best of our knowledge, [29] is the only work that has explored DNN-based learning for dual variables. Notably, their work is limited to DCOPF, whereas our contributions extend the framework to cover any arbitrary C-OPF." 2312.07281v1,"Proceedings of Machine Learning Research vol vvv:1–15, 2024 Safe Multi-Task Bayesian Optimization Jannis O. Lübsen 1 Christian Hespe 1 Annika Eichler 1,2 JANNIS . LUEBSEN @ TUHH . DE CHRISTIAN . HESPE @ TUHH . DE ANNIKA . EICHLER @ TUHH . DE 1 Hamburg University of Technology, Germany 2 Deutsches Elektronen-Synchrotron DESY, Germany Abstract Bayesian optimization has become a powerful tool for safe online optimization of systems, due to its high sample efficiency and noise robustness. For further speed-up reduced physical models of the system can be incorporated into the optimization to accelerate the process, since the models are able to offer an approximation of the actual system, and sampling from them is significantly cheaper. The similarity between model and reality is represented by additional hyperparameters and learned within the optimization process. Safety is an important criteria for online optimization methods like Bayesian optimization, which has been addressed by recent literature, which provide safety guarantees under the assumption of known hyperparameters. However, in practice this is not applicable. Therefore, we extend the robust Gaussian process uniform error bounds to meet the multi-task setting, which involves the calculation of a confidence region from the hyperparameter posterior distribution utilizing Markov chain Monte Carlo methods. Then, using the robust safety bounds, Bayesian optimization is applied to safely optimize the system while incorporating measurements of the models. Simulations show that the optimization can be significantly accelerated compared to other state-of-the-art safe Bayesian optimization methods depending on the fidelity of the models. The code is available on GitHub 1 . Keywords: Bayesian Optimization, Gaussian Processes, Controller Tuning, Safe Optimization 1. Introduction Bayesian optimization (BO) is an iterative, learning-based, gradient-free, and global optimization method which gained attention in recent years. The method involves learning a probabilistic surrogate model of an arbitrary objective function in order to optimize it, while requiring minor assumptions. The utilization of Gaussian processes (GP) allows to include prior knowledge of the objective which makes the procedure very suitable for expensive to evaluate functions and robust to noisy observations. Enhanced sample efficiency can be achieved by incorporating reduced models of the objective function into the optimization process, as demonstrated in a proof-of-principle study by Ferran Pousa et al. (2023); Letham and Bakshy (2019). The key tool, multi-task Gaussian process prediction, was initially presented in Bonilla et al. (2007). This approach utilizes correlation matrices to depict the influence between various tasks, learned from available data. Subsequently, Swersky et al. (2013) introduced the first multi-task Bayesian optimization algorithm, where its superior efficiency was highlighted. The key idea revolves around incorporating extra models of the actual function, allowing the prediction of the real function (main task) to be estimated by evaluating the model functions (supplementary tasks) when there exists some correlation. Since evaluating 1. https://github.com/TUHH-ICS/2024-code-L4DC-Safe-Multi-Task-Bayesian-Optimization © 2024 J. O. Lübsen, C. Hespe & A. Eichler." 2312.07296v1,"Complex Recurrent Spectral Network Lorenzo Chicchi a,c , Lorenzo Giambagli a,b , Lorenzo Buffoni a , Raffaele Marino a , Duccio Fanelli a a Department of Physics and Astronomy, University of Florence, INFN and CSDC, Sesto Fiorentino, Italy b naXys - Namur Center for Complex Systems, University of Namur, rue Grafé 2, 5000 Namur, Belgium c Corresponding Author: lorenzo.chicchi@unifi.it Abstract This paper presents a novel approach to advancing artificial intelligence (AI) through the development of the Complex Recurrent Spectral Network (C-RSN), an innovative variant of the Recurrent Spectral Network (RSN) model. The C-RSN is designed to address a critical limitation in existing neural network models: their inability to emulate the complex processes of biological neural networks dynamically and accurately. By integrating key concepts from dynamical systems theory and leveraging principles from statistical mechanics, the C-RSN model introduces localized non-linearity, complex fixed eigenvalues, and a distinct separation of memory and input processing functionalities. These features collectively enable the C-RSN evolving towards a dynamic, oscillating final state that more closely mirrors biological cognition. Central to this work is the exploration of how the C-RSN manages to capture the rhythmic, oscillatory dynamics intrinsic to biological systems, thanks to its complex eigenvalue structure and the innovative segregation of its linear and nonlinear components. The model’s ability to classify data through a time-dependent function, and the localization of information processing, is demonstrated with an empirical evaluation using the MNIST dataset. Remarkably, distinct items supplied as a sequential input yield patterns in time which bear the indirect imprint of the insertion order (and of the time of separation between contiguous insertions). 1. Introduction Today, artificial intelligence (AI) [1] stands as a cornerstone of innovation and progress. The surge in AI research and its applications across various domains, Preprint submitted to Elsevier December 13, 2023" 2312.07311v1,"Scalable Motion Style Transfer with Constrained Diffusion Generation Wenjie Yin 1 , Yi Yu 2 * , Hang Yin 3 , Danica Kragic 1 , Mårten Björkman 1 * 1 KTH Royal Institute of Technology, Sweden 2 National Institute of Informatics, Japan 3 University of Copenhagen, Denmark {yinw, dani, celle}@kth.se, yiyu@nii.ac.jp, hayi@di.ku.dk Abstract Current training of motion style transfer systems relies on consistency losses across style domains to preserve contents, hindering its scalable application to a large number of domains and private data. Recent image transfer works show the potential of independent training on each domain by leveraging implicit bridging between diffusion models, with the content preservation, however, limited to simple data patterns. We address this by imposing biased sampling in backward diffusion while maintaining the domain independence in the training stage. We construct the bias from the source domain keyframes and apply them as the gradient of content constraints, yielding a framework with keyframe manifold constraint gradients (KMCGs). Our validation demonstrates the success of training separate models to transfer between as many as ten dance motion styles. Comprehensive experiments find a significant improvement in preserving motion contents in comparison to baseline and ablative diffusionbased style transfer models. In addition, we perform a human study for a subjective assessment of the quality of generated dance motions. The results validate the competitiveness of KMCGs. Introduction Human motion style is a complex and important aspect of human behavior, which can be perceived as motion characteristics that convey personality and temper or articulate socio-cultural factors. The ability to accurately capture and replicate motion style is crucial in numerous applications, such as video games, and choreography. Style transfer systems can streamline creation of various media, including images (Gatys, Ecker, and Bethge 2016), music (Brunner et al. 2018), and indeed human movements (Dong et al. 2020). For instance, in the realm of video games, unique modes of action correspond to various player operations and character states. Similarly, in the field of dance choreography, each dance genre has its own movement patterns, and the application of style transfer can assist choreographers in creating variations of particular movements. Early methods for motion style transfer (Hsu, Pulli, and Popović 2005; Taylor and Hinton 2009; Smith et al. 2019) * Corresponding authors Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: The proposed scalable motion style transfer system, with independently trained diffusion models. Given a source motion sequence, our system converts it to latent encoding, then constructs motion in the target style. primarily relied on supervised learning, requiring paired and annotated data. However, obtaining matched human motion sequences is challenging and often involves a laborious preprocessing phase. Consequently, the predominant style transfer methods today are unpaired translations that do not demand direct mappings between motion samples. Common methods among these are the motion transfer systems based on CycleGAN (Dong et al. 2020; Yin et al. 2023b) for paired style domains and StarGAN (Chan, Irimia, and Ho 2020; Yin et al. 2023c) for a set of domains. While these systems are capable of generating highquality human motion, they exhibit considerable limitations when it comes to scalability towards new domains. Specifically, CycleGAN-based methods are trained on distinct pairs of motion styles, where each model is tailored for transfer between a specific pair of styles (Dong et al. 2020; Yin et al. 2023b), or establish a shared domain bridging multiple styles via StarGAN-based architecture (Chan, Irimia, and Ho 2020; Yin et al. 2023c). The former implies training a quadratically increasing number of models, making it an impractical solution when transfer between a large number of style domains is considered. The latter faces finding such a shared domain, which is an enormously challenging task. Both methods also show limited incremental scalability and adaptability; a new style requires retraining of the models on the entire dataset. The requirement of simultanous access to the entire dataset highlights an additional drawback of these methods when parts of the data are sensitive due to privacy concerns, such as" 2312.07319v1,"Top-Down Drawings of Compound Graphs Maximilian Kasperowski 1 a and Reinhard von Hanxleden 1 b 1 Department of Computer Science, Kiel University, Kiel, Germany {mka,rvh}@informatik.uni-kiel.de Keywords: Automatic Layout, Compound Graph Drawing, Zoomable User Interfaces, Multiscale Visualization Abstract: Bottom-up layout algorithms for compound graphs are suitable for presenting the microscale view of models and are often used in model-driven engineering. However, they have difficulties at the macroscale where maintaining the overview of large models becomes challenging. We propose top-down layout, which utilizes scale to hide low-level details at high zoom levels. The entire high-level view can fit into the viewport and remain readable, while the ability to zoom in to see the details is still maintained. Top-down layout is an abstract high-level layout process that can be used in conjunction with classic layout algorithms to produce visually compelling and readable diagrams of large compound graphs. 1 INTRODUCTION Automatic graph drawing is the process of creating a two-dimensional drawing of a graph. There are many graph drawing algorithms for different purposes such as tree layout (Di Battista et al., 1994), force- and stress-based layout (Fruchterman and Reingold, 1991; Gansner et al., 2005), and layered layout (Sugiyama et al., 1981). While most graph drawing algorithms operate on graphs where each node is an atomic element, the graph drawing problem can be expanded to include compound graphs where nodes can be parents of sub-graphs (Eades et al., 1997; Rufiange et al., 2012). A common approach to drawing compound graphs is to first draw the sub-graphs and then draw the parent nodes around them. This recursive bottomup approach provides a simple solution to determining sizes of nodes and it allows the entire graph to be laid out at the same scale. The downside of the bottom-up approach is that drawings can become very large as the graphs grow in size. A zoom-tofit scaling then results in a scale where labels become illegible and also the overall structure is difficult to discern. Another downside is that the overall variability in node sizes increases for graphs with deeper hierarchies due to different numbers of descendant nodes. This tends to result in large amounts of whitespace when these differently sized nodes are laid out (Gutwenger et al., 2014). a b https://orcid.org/0000-0002-7509-1678 https://orcid.org/0000-0001-5691-1215 We propose a paradigm that aims to utilize computer screens effectively for drawing large compound graphs. The zoom-axis is treated as a third dimension for compound graph layouts using a top-down approach. The dimensions of parent nodes are fixed first and the child layouts are scaled down to fit within their parent. Figure 1b shows an example of such a layout. In top-down layout the overall structure is discernible and the top-level labels are readable, facilitating systematic exploration of the whole model. As further motivation for the top-down layout approach, we consider the possibility of incremental layout. This has performance benefits both in terms of time and space. We can defer parts of the layout computation until we need them and we do not need to store the entire layout in memory immediately. This is especially useful for large models that are only partially visible at any given time. The graph shown in Figure 1 represents an SC- Chart (von Hanxleden et al., 2014), which beyond nodes and edges also contains other elements such as different types of labels. While providing visualizations for languages such as SCCharts is the motivation for top-down layout, we consider the work presented here applicable to compound graphs in general. There exist other graph layout approaches for large compound graphs that use top-down approaches (Vehlow et al., 2017; Abello et al., 2006; Archambault et al., 2007) but they are often more targeted at data visualization, which does not transfer well to the modeldriven engineering domain that SCCharts belongs to." 2312.07324v1,"Distributionally Robust Infinite-horizon Control: from a pool of samples to the design of dependable controllers Jean-Sébastien Brouillon ⋆ , Andrea Martin ⋆ , John Lygeros, Florian Dörfler, and Giancarlo Ferrari-Trecate Abstract— We study control of constrained linear systems when faced with only partial statistical information about the disturbance processes affecting the system dynamics and the sensor measurements. Specifically, given a finite collection of disturbance realizations, we consider the problem of designing a stabilizing control policy with provable safety and performance guarantees in face of the inevitable mismatch between the true and the empirical distributions. We capture this discrepancy using Wasserstein ambiguity sets, and we formulate a distributionally robust (DR) optimal control problem, which provides guarantees on the expected cost, safety, and stability of the system. To solve this problem, we first present new results for DR optimization of quadratic objectives using convex programming, showing that strong duality holds under mild conditions. Then, by combining our results with the system level parametrization (SLP) of linear feedback policies, we show that the design problem can be reduced to a semidefinite optimization problem (SDP). I. I NTRODUCTION As modern engineered systems become increasingly complex and interconnected, classical control methods based on stochastic optimization face the challenge of overcoming the lack of a precise statistical description of the uncertainty. In fact, the probability distribution of the uncertainty is generally unknown and only indirectly observable through a finite number of independent samples. In addition, replacing the true distribution with a nominal estimate in the spirit of certainty equivalence often proves unsatisfactory; the optimization process amplifies any statistical error in the distribution inferred from data, resulting in solutions that are prone to yielding poor out-of-sample performance [1]–[3]. Motivated by these observations, the paradigm of distributionally robust optimization (DRO) considers a minimax stochastic optimization problem over a neighborhood of the nominal distribution defined in terms of a distance in the probability space. In this way, the solution becomes robust to the most averse distribution that is sufficiently close to the nominal distribution, while the degree of conservatism of the underlying optimization can be regulated by adjusting the radius of the ambiguity set. While several alternatives have been proposed to measure the discrepancy between probability distributions, including Jean-Sébastien Brouillon, Andrea Martin, and Giancarlo Ferrari-Trecate are with the Institute of Mechanical Engineering, EPFL, Switzerland. E-mail addresses: {jean-sebastien.brouillon, andrea.martin, giancarlo.ferraritrecate}@epfl.ch. John Lygeros and Florian Dörfler are with the Department of Information Technology and Electrical Engineering, ETH Zürich, Switzerland. E-mail addresses: {jlygeros, dorfler}@ethz.ch. Research supported by the Swiss National Science Foundation (SNSF) under the NCCR Automation (grant agreement 51NF40 80545). ⋆ Jean-Sébastien Brouillon and Andrea Martin contributed equally. the Kullback–Leibler divergence and the total variation distance [4], recent literature has shown that working with ambiguity sets defined using the Wasserstein metric [5] offers a number of advantages in terms of expressivity, computational tractability, and statistical out-of-sample guarantees [1]–[3]. Thanks to these properties, Wasserstein DRO has found application in a wide variety of domains, ranging from finance and machine learning to game theory, see, e.g., [2], [3], [6]–[8]. Similarly, Wasserstein ambiguity sets have recently been interfaced with the dynamic environments and continuous actions spaces typical of control. In [9], the authors consider a generalization of classical linear quadratic Gaussian (LQG) control, where the noise distributions belong to Wasserstein balls centered at nominal Gaussian distributions. Motivated by the idea of leveraging uncertainty samples for data-driven decision-making under general distributions, a parallel line of research instead considers ambiguity sets centered at nominal empirical distributions. Among other contributions exploiting the greater expressivity provided by this datadriven approach, [10]–[12] consider the design of tube-based predictive control schemes, [13] and [14] address infinitehorizon problems using dynamic programming, [15] and [16] focus on filtering and state estimation problems. More fundamentally, [17] and [18] provide exact characterizations of how Wasserstein ambiguity sets propagate through the system dynamics, shedding light on the role of feedback in controlling shape and size of the ambiguity sets resulting from distributional uncertainty. Despite these advances, it remains unclear how the availability of samples can drive the design of a control policy that guarantees safety and performance in face of distributional uncertainty while simultaneously ensuring stability of the closed-loop system. Motivated by this challenge, we first establish novel strong duality results for DRO of quadratic functions, which are routinely encountered in control, by explicitly accounting for the (possibly bounded) support of the uncertainty. Then, leveraging the system level parametrization (SLP) of linear dynamic controllers [19], we present a convex reformulation of the Distributionally Robust Infinite-horizon Controller (DRInC) synthesis problem, which exploits a finite impulse response (FIR) approximation of the system closed-loop maps. As key advantages, our optimization-based approach guarantees stability of the closed-loop interconnection by design, and only requires one-shot offline computations. As such, our solution bypasses the computational bottleneck that would result by recomputing the optimal control policy online" 2312.07326v1,"Title: Ultra-broadband bright light emission from a one-dimensional inorganic van der Waals material Author Names: Fateme Mahdikhany 1* , Sean Driskill 1* , Jeremy G. Philbrick 1 , Davoud Adinehloo 2 , Michael R. Koehler 3 , David G. Mandrus 4-6 , Takashi Taniguchi 7 , Kenji Watanabe 8 , Brian J. LeRoy 1 , Oliver L.A. Monti 1,9 , Vasili Perebeinos 2 , Tai Kong 1,3 , John R. Schaibley 1 Author Addresses: 1 Department of Physics, University of Arizona, Tucson, Arizona 85721, USA 2 Department of Electrical Engineering, State University of New York at Buffalo, Buffalo, New York, 14260 3 IAMM Diffraction Facility, Institute for Advanced Materials and Manufacturing, University of Tennessee, Knoxville, TN 37920 4 Department of Materials Science and Engineering, University of Tennessee, Knoxville, Tennessee 37996, USA 5 Materials Science and Technology Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA 6 Department of Physics and Astronomy, University of Tennessee, Knoxville, Tennessee 37996, USA 7 Research Center for Materials Nanoarchitectonics, National Institute for Materials Science, 1-1 Namiki, Tsukuba 305-0044, Japan 8 Research Center for Electronic and Optical Materials, National Institute for Materials Science, 1- 1 Namiki, Tsukuba 305-0044, Japan 9 Department of Chemistry and Biochemistry, University of Arizona, Tucson, Arizona 85721, USA * Fateme Mahdikhany and Sean Driskill are equal contributors to this work and designated as cofirst authors. Corresponding Author: John Schaibley, johnschaibley@arizona.edu Abstract One-dimensional (1D) van der Waals materials have emerged as an intriguing playground to explore novel electronic and optical effects. We report on inorganic one-dimensional SbPS 4 nanotubes bundles obtained via mechanical exfoliation from bulk crystals. The ability to mechanically exfoliate SbPS 4 nanobundles offers the possibility of applying modern 2D material fabrication techniques to create mixed-dimensional van der Waals heterostructures. We find that SbPS 4 can readily be exfoliated to yield long (> 10 µm) nanobundles with thicknesses that range 1" 2312.07341v1,"Unconventional crystal structure of the high-pressure superconductor La 3 Ni 2 O 7 P. Puphal, 1, ∗ P. Reiss, 1, † N. Enderlein, 2 Y.-M. Wu, 1 G. Khaliullin, 1 V. Sundaramurthy, 1 T. Priessnitz, 1 M. Knauft, 1 L. Richter, 3 M. Isobe, 1 P. A. van Aken, 1 H. Takagi, 1 B. Keimer, 1 Y. E. Suyolcu, 1, ‡ B. Wehinger, 4 P. Hansmann, 2 and M. Hepting 1, § 1 2 Max-Planck-Institute for Solid State Research, Heisenbergstraße 1, 70569 Stuttgart, Germany Department of Physics, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 91058 Erlangen, Germany 3 Max-Planck-Institute for Chemical Physics of Solids, Nöthnitzer Straße 40, 01187 Dresden, Germany 4 European Synchrotron Radiation Facility, 71 Avenue des Martyrs, F-38043 Grenoble, France (Dated: December 13, 2023) The discovery of high-temperature superconductivity in La 3 Ni 2 O 7 at pressures above 14 GPa has spurred extensive research efforts. Yet, fundamental aspects of the superconducting phase, including the possibility of a filamentary character, are currently subjects of controversial debates. Conversely, a crystal structure with NiO 6 octahedral bilayers stacked along the c-axis direction was consistently posited in initial studies on La 3 Ni 2 O 7 . Here we reassess this structure in optical floating zone-grown La 3 Ni 2 O 7 single crystals that show signs of filamentary superconductivity. Employing scanning transmission electron microscopy and single-crystal x-ray diffraction under high pressures, we observe multiple crystallographic phases in these crystals, with the majority phase exhibiting alternating monolayers and trilayers of NiO 6 octahedra, signifying a profound deviation from the previously suggested bilayer structure. Using density functional theory, we disentangle the individual contributions of the monolayer and trilayer structural units to the electronic band structure of La 3 Ni 2 O 7 , providing a firm basis for advanced theoretical modeling and future evaluations of the potential of the monolayer-trilayer structure for hosting superconductivity. Introduction.—Layered transition metal oxides manifest a plethora of quantum phenomena, including orbital ordering, complex magnetic states, and unconventional superconductivity [1]. A prevalent structural motif in these materials is either a perovskite or a perovskitederived crystal lattice, serving as a conducive platform for the emergence of strong electronic correlations and exotic phase behaviors [2–4]. An archetypal example within this class of materials is the Ruddlesden-Popper (RP) series of ruthenates [5], denoted as (Sr,Ca) n+1 Ru n O 3n+1 , where n is the number of consecutive RuO 6 octahedral layers within a structural unit. The ground state of each compound in this series is determined not only by the choice of the alkaline metal ion [6–11], but also by the layer index n. For instance, the bilayer (BL) compound Sr 3 Ru 2 O 7 realizes quantum criticality and metamagnetism [12], whereas trilayer (TL) Sr 4 Ru 3 O 10 displays ferromagnetic behavior [13]. Recently, the RP series of nickelates has experienced a resurgence of interest [14], even though investigations into the physical properties and spin and charge ordering phenomena of the R n+1 Ni n O 3n+1 compounds (R = rare-earth) started over three decades ago [15–17]. The catalyst for this revival of RP nickelates are recent high-pressure studies reporting superconductivity in La 3 Ni 2 O 7 [18] and La 4 Ni 3 O 10 [19–22] with a T c of around 80 and 20 K, respectively. Yet, the electronic configuration of the octahedrally coordinated Ni ions in the RP series is markedly distinct from that of the earlier discovered infinite-layer nickelate superconductors [23–27], where Ni ions exhibit a formal 3d 9 configuration, isoelectronic and isostruc- tural to cuprate superconductors [28, 29]. Instead, Ni in La 3 Ni 2 O 7 possesses an average 3d 7.5 configuration, given the conventional RP structure with stacked BL units, assumed in previous studies [15, 30–35]. Notably, this configuration is rather close to the formal 3d 7 state in perovskite nickelates, which were proposed to exhibit a cuprate-like electronic structure when sandwiched between layers of a band gap insulator [36–38]. Furthermore, an average 3d 7.5 state is reminiscent of hole-doped La 2 NiO 4 , where 3d 7 and 3d 8 sites coexist [39–41]. Nevertheless, consensus on the theoretical framework describing the high-T c superconductivity in La 3 Ni 2 O 7 has remained elusive. While most models consider the RP structure with n = 2 and strong intra-bilayer coupling as key ingredients, the approaches for disentangling the intermixed multiorbital states in La 3 Ni 2 O 7 vary. Specifically, the roles assigned to the low-energy Ni 3d x 2 −y 2 , 3d z 2 , and O 2p orbital degrees of freedoms diverge among the models, yielding either singlet-like states with partial analogies to those of 3d 9 cuprates [18, 42–44] or different notions in other theories [45–54]. Moreover, a possibly filamentary nature of the superconducting phase has been reported [55], along with a puzzling variation in the electronic transport properties among different La 3 Ni 2 O 7 samples, including a broad spectrum of superconducting onset temperatures and whether zero-resistance is reached or a residual resistance persists [56–59]. These inconsistencies, previously attributed to oxygen off-stoichiometries in La 3 Ni 2 O 7±δ and/or varying experimental conditions, underscore the need for further investigations to elucidate the fundamental properties of the material." 2312.07348v1,"“It doesn’t tell me anything about how my data is used”: User Perceptions of Data Collection Purposes Lin Kyi Abraham Mhaidli Cristiana Santos Max Planck Institute for Security and Privacy Bochum, Germany lin.kyi@mpi-sp.org University of Michigan Ann Arbor, United States mhaidli@umich.edu Utrecht University Utrecht, The Netherlands c.teixeirasantos@uu.nl Franziska Roesner Asia Biega University of Washington Seattle, United States franzi@cs.washington.edu Max Planck Institute for Security and Privacy Bochum, Germany asia.biega@mpi-sp.org ABSTRACT Data collection purposes and their descriptions are presented on almost all privacy notices under the GDPR, yet there is a lack of research focusing on how effective they are at informing users about data practices. We fill this gap by investigating users’ perceptions of data collection purposes and their descriptions, a crucial aspect of informed consent. We conducted 23 semi-structured interviews with European users to investigate user perceptions of six common purposes (Strictly Necessary, Statistics and Analytics, Performance and Functionality, Marketing and Advertising, Personalized Advertising, and Personalized Content) and identified elements of an effective purpose name and description. We found that most purpose descriptions do not contain the information users wish to know, and that participants preferred some purpose names over others due to their perceived transparency or ease of understanding. Based on these findings, we suggest how the framing of purposes can be improved toward meaningful informed consent. CCS CONCEPTS • Human-centered computing → Empirical studies in HCI; • Security and privacy → Usability in security and privacy; • Applied computing → Law. KEYWORDS GDPR, personal data, purposes, privacy, tracking, qualitative methods ACM Reference Format: Lin Kyi, Abraham Mhaidli, Cristiana Santos, Franziska Roesner, and Asia Biega. 2018. “It doesn’t tell me anything about how my data is used”: User Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CHI ’24, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Perceptions of Data Collection Purposes. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (CHI ’24). ACM, New York, NY, USA, 12 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION With the enforcement of the European Union’s General Data Protection Regulation (GDPR) [20] in 2018 and the ePrivacy Directive [24], privacy notices (also known as cookie banners or consent notices) have become the de facto standard for informing and collecting consent from EU and UK users. This has created a new industry of GDPR compliance tools, such as IAB Europe’s Transparency and Consent Framework (TCF) and Consent Management Platforms (CMPs), established to help organizations manage their GDPR and ePD compliance through privacy notices [54]. Additionally, several governing authorities, such as national Data Protection Authorities (DPAs) have been formed and have set up guidelines for GDPR compliance. Due to the ubiquity of consent dialogs, users in the EU and UK are now generally familiar with this process of consenting to something, but do they actually know what they are consenting to? The UK and EU GDPR mandates that consent be informed [20], yet many studies on privacy notices have shown that being informed is often simply assumed [54, 66]. At the core of informed consent lie the data collection purposes for which users are sharing their data for. Examples of such purposes presented in privacy notices may include: “Strictly Necessary”, “Advertising”, “Analytics”, etc. as illustrated in Figure 1. Current regulatory guidelines for how data processing purposes should be described or named vary significantly [50, 56], therefore diversity exists between various websites, DPA guidelines, and CMP templates. Problems also exist within these purpose names and descriptions, such as: how these names do not always accurately map onto the technical services provided [9], or how, as we have observed in this paper, they can exploit cognitive biases. Some purpose names and descriptions are trickier for users to understand than others. Overall, whether purpose formulations are effective at informing users about what their data would be used for remains an understudied topic." 2312.07354v1,"Quantum phase transitions in two-dimensional superconductors: a review on recent experimental progress Ziqiao Wang 1,6 , Yi Liu 2,3,6 , Chengcheng Ji 1,5 and Jian Wang 1,4,5* 1 International Center for Quantum Materials, School of Physics, Peking University, Beijing 100871, China 2 Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials & Micro-nano Devices, Renmin University of China, Beijing 100872, China 3 Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China 4 Collaborative Innovation Center of Quantum Matter, Beijing 100871, China 5 Hefei National Laboratory, Hefei 230088, China 6 These authors contributed equally to this work. * Authors to whom any correspondence should be addressed. E-mail: jianwangphysics@pku.edu.cn Abstract Superconductor-insulator/metal transition (SIT/SMT) as a paradigm of quantum phase transition has been a research highlight over the last three decades. Benefit from recent developments in the fabrication and measurements of two-dimensional (2D) superconducting films and nanodevices, unprecedented quantum phenomena have been revealed in the quantum phase transitions of 2D superconductors. In this review, we introduce the recent progress on quantum phase transitions in 2D superconductors, focusing on the quantum Griffiths singularity (QGS) and anomalous metal state. Characterized by a divergent critical exponent when approaching zero temperature, QGS of SMT is discovered in ultrathin crystalline Ga films and subsequently detected in various 2D superconductors. The universality of QGS indicates the profound influence of quenched disorder on quantum phase transitions. Besides, in a 2D superconducting system, whether a metallic ground state can exist is a long-sought 1" 2312.07371v1,"Privacy-Aware Energy Consumption Modeling of Connected Battery Electric Vehicles using Federated Learning Sen Yan, Graduate Student Member, IEEE, Hongyuan Fang, Ji Li, Member, IEEE, Tomas Ward, Senior Member, IEEE, Noel O’Connor, Member, IEEE, and Mingming Liu, Senior Member, IEEE Abstract— Battery Electric Vehicles (BEVs) are increasingly significant in modern cities due to their potential to reduce air pollution. Precise and real-time estimation of energy consumption for them is imperative for effective itinerary planning and optimizing vehicle systems, which can reduce driving range anxiety and decrease energy costs. As public awareness of data privacy increases, adopting approaches that safeguard data privacy in the context of BEV energy consumption modeling is crucial. Federated Learning (FL) is a promising solution mitigating the risk of exposing sensitive information to third parties by allowing local data to remain on devices and only sharing model updates with a central server. Our work investigates the potential of using FL methods, such as FedAvg, and FedPer, to improve BEV energy consumption prediction while maintaining user privacy. We conducted experiments using data from 10 BEVs under simulated real-world driving conditions. Our results demonstrate that the FedAvg-LSTM model achieved a reduction of up to 67.84% in the MAE value of the prediction results. Furthermore, we explored various real-world scenarios and discussed how FL methods can be employed in those cases. Our findings show that FL methods can effectively improve the performance of BEV energy consumption prediction while maintaining user privacy. Index Terms—Federated Learning, Electric Vehicles, Energy Consumption Modelling, Edge-Cloud Computing, Digital Twin, Privacy Awareness L IST OF A BBREVIATIONS & A CRONYMS ANN BEV CNN EV FedAvg FedPer FedProx FedRep FedSGD FL GRU ITR Artificial Neural Networks Battery Electric Vehicle Convolutional Neural Networks Electric Vehicle Federated Averaging Federated Personalization Federated Proximal Federated Representation Learning Federated Stochastic Gradient Descent Federated Learning Gated Recurrent Unit Iterations Manuscript received May 6, 2023; revised July 28, 2023 and October 20, 2023; accepted December 4, 2023. This work was supported by Science Foundation Ireland 21/FFP-P/10266 and 12/RC/2289 P2 at Insight the SFI Research Centre for Data Analytics at Dublin City University. The dataset is now available on GitHub and can be accessed via https://github.com /SFIEssential/FedBEV. (Corresponding authors: Ji Li; Mingming Liu.) S. Yan, H. Fang, N. O’Connor, and M. Liu are with the School of Electronic Engineering and SFI Insight Centre for Data Analytics at Dublin City University, Dublin 9, Ireland. (e-mail: sen.yan5@mail.dcu.ie; hongyuan.fang2@mail.dcu.ie; noel.oconnor@dcu.ie; mingming.liu@dcu.ie). T. Ward is with the School of Computing and SFI Insight Centre for Data Analytics at Dublin City University, Dublin 9, Ireland. (e-mail: tomas.ward@dcu.ie). J. Li is with the Department of Mechanical Engineering, University of Birmingham. Birmingham, B15 2TT, U.K. (e-mail: j.li.1@bham.ac.uk). LSTM MAE ML RF TS VED XGB Long Short-Term Memory Mean Absolute Error Machine Learning Random Forest Time Step Vehicle Energy Dataset eXtreme Gradient Boosting I. I NTRODUCTION The transition from conventional internal combustion engine vehicles to Electric Vehicle (EV) has emerged as a major global initiative due to increasing concerns related to the environment and public health. Governments worldwide are introducing policies, laws, and regulations to promote EVs. For instance, the Members of the European Parliament recently approved regulations to encourage the production of zeroand low-emission vehicles, such as EVs and plug-in hybrids 1 . In Ireland, the Zero Emission Vehicles Ireland office has been established with a goal of switching an expected 30% of the private car fleet to electric by 2030 2 . Furthermore, numerous studies have indicated a significant reduction in air pollution, noise pollution, and dependence on fossil fuels [1]– [3] resulting from the adoption of EVs. Energy modeling is essential for policymakers to assess the impact on the grid, identify necessary infrastructure requirements based on vehicle-to-grid technology, and inform energy policy to support the transition to clean transportation to enhance the overall driving experience while mitigating transportation’s environmental impact [4], [5]. It is beneficial to automakers and companies in understanding the performance of EVs and optimizing the energy usage patterns, leading to improved battery management and energy efficiency [6], [7]. Besides, accurate predictions of energy consumption can enable drivers to make informed decisions regarding trip planning, route selection, and charging strategies [8], [9]. To this end, various methods have been applied in this research field, ranging from system dynamics models to statistical and data-driven models [10]–[16]. However, with the increasing volume of data generated by connected vehicles, conventional energy modeling methods often lack the capacity to efficiently manage the produced data. Specifically, these methods often require data collection from various sources to create and train a centralized model. This centralized 1 https://www.europarl.europa.eu/news/en/press-room/20230210IPR74715/f it-for-55-zero-co2-emissions-for-new-cars-and-vans-in-2035 2 https://www.gov.ie/en/campaigns/18b95-zero-emission-vehicles-ireland/" 2312.07372v1,"Incoherent processes in dileptons production in proton-nucleus scattering at high energies (1) Sergei P. Maydanyuk 1,2∗ and Gyorgy Wolf (1)† Wigner Research Centre for Physics, Budapest, 1121, Hungary and (2) Institute for Nuclear Research, National Academy of Sciences of Ukraine, Kyiv, 03680, Ukraine (Dated: December 13, 2023) Purpose: Incoherent processes in production of lepton pairs in the scattering of protons off nuclei are investigated. Methods: New quantum mechanical model is constructed which uses generalization of the nuclear model of emission of photons in the proton-nucleus reactions in region from low up to high energies with inclusion of formalism of production of lepton pairs. Results: (1) Model with the coherent matrix elements is tested for the scattering of protons on the Be nuclei at energy of proton beam E p of 2.1 GeV. The calculated cross section of production of lepton pairs is in good agreement with experimental data obtained by DLS Collaboration. (2) We analyzed dilepton production for nuclei-targets 9 Be, 12 C, 16 O, 24 Mg, 44 Ca, 197 Au at E p = 2.1 GeV. Coherent cross sections of dilepton production are monotonously decreased with increasing of nucleus-target mass. This new effect is explained by suppressing of production of dileptons (by nuclear matter of nucleus-target). (3) Production of lepton pairs is more intensive at larger E p . (4) For p + 9 Be at E p = 2.1 GeV we analyzed role of incoherent processes in production of pairs of leptons. Inclusion of incoherent proton-nucleon processes to the model improves agreement with experimental data a little. A new phenomenon of suppression of production of lepton pairs at low energies due to incoherent processes is observed. This is explained by dominant coherent contribution at very low energies. (5) Adding of the longitudinal amplitude of virtual photon suppresses the cross section of dilepton production a little (effect is observed for p + 9 Be at E p = 2.1 GeV). (6) The incoherent contribution has a leading role in dilepton production (ratio between incoherent and coherent contributions is 10–100). Also our model provides the tendencies of the full spectrum for p + 93 Nb at E p = 3.5 GeV in good agreement with experimental data obtained by HADES collaboration, and shows large role of incoherent processes. Conclusion: Results above confirms importance of incoherent processes in study of dilepton production in this reaction. Keywords: dileptons, bremsstrahlung, virtual bremsstrahlung, proton nucleus scattering, coherent emission, incoherent emission, magnetic emission, heavy ion collision, photon, magnetic moments of nucleons, Pauli equation, tunneling I. INTRODUCTION Heavy-ion collisions in the energy regime from roughly 20 MeV/nucleon to 2 GeV/nucleon offer a unique possibility to study the properties of dense and hot nuclear matter [1–6]. Many particles are created when two nuclei collide. Particles produced as mesonic and electromagnetic probes bring important information about properties of compressive phase of nuclear matter which can be formed during the collision of heavy ions [7]. e + e − pairs (dileptons), π, ρ, η- mesons are produced and they are included to the unified picture of the studied process [8]. One of the possibilities is production of lepton pairs which can be measured in experiments and provide useful information on high density phase of nuclear matter [9]. Properties of dilepton production in heavy-ion collisions at bombarding energies from 1 to 2 GeV/A were successfully studied by the transport model of the Boltzmann Uehling-Uhlenbeck (BUU) type [see Refs. [6, 10, 11], also Refs. [12, 13] for general aspects of transport models BUU at different energies with classification, reference therein]. Many effects such as the dynamical evolution of the nucleus-nucleus collision, nucleon resonances in nuclei, the electromagnetic form factor of hadrons, medium properties, effects of pion and ∆ self-energies on the pion dynamics, etc. were well described by such an approach and good agreement with experimental data was obtained. As the simplest mechanism, process of dilepton production can go through exchange of virtual photon, which is emitted by one nucleon of the nuclei participated in collision. The full picture of emission of photons is obtained due to evolution of moving electric charges and magnetic momentums of nucleons (or nucleon resonances), which belong to the nuclei in reaction. This leads to dependence of dilepton production on the different mechanisms and aspects ∗ Electronic address: sergei.maydanyuk@wigner.hu † Electronic address: wolf.gyorgy@wigner.hu" 2312.07378v1,"X4D-SceneFormer: Enhanced Scene Understanding on 4D Point Cloud Videos through Cross-modal Knowledge Transfer Linglin Jing 3,1 * , Ying Xue 2 * , Xu Yan 2† , Chaoda Zheng 2 , Dong Wang 1 , Ruimao Zhang 2 , Zhigang Wang 1 , Hui Fang 3 , Bin Zhao 1 , Zhen Li 2† 1 Shanghai Artifcial Intelligence Laboratory, The Chinese University of Hong Kong (Shenzhen), 3 Department of Computer Science, Loughborough University Abstract The field of 4D point cloud understanding is rapidly developing with the goal of analyzing dynamic 3D point cloud sequences. However, it remains a challenging task due to the sparsity and lack of texture in point clouds. Moreover, the irregularity of point cloud poses a difficulty in aligning temporal information within video sequences. To address these issues, we propose a novel cross-modal knowledge transfer framework, called X4D-SceneFormer. This framework enhances 4D-Scene understanding by transferring texture priors from RGB sequences using a Transformer architecture with temporal relationship mining. Specifically, the framework is designed with a dual-branch architecture, consisting of an 4D point cloud transformer and a Gradient-aware Image Transformer (GIT). The GIT combines visual texture and temporal correlation features to offer rich semantics and dynamics for better point cloud representation. During training, we employ multiple knowledge transfer techniques, including temporal consistency losses and masked self-attention, to strengthen the knowledge transfer between modalities. This leads to enhanced performance during inference using singlemodal 4D point cloud inputs. Extensive experiments demonstrate the superior performance of our framework on various 4D point cloud video understanding tasks, including action recognition, action segmentation and semantic segmentation. The results achieve 1st places, i.e., 85.3% (+7.9%) accuracy and 47.3% (+5.0%) mIoU for 4D action segmentation and semantic segmentation, on the HOI4D challenge 1 , outperforming previous state-of-the-art by a large margin. We release the code at https://github.com/jinglinglingling/X4D Introduction Exploring point cloud sequences in 4D (integrating 3D space with 1D time) has garnered considerable interest in recent years (Fan and Kankanhalli 2021; Wen et al. 2022; Liu et al. 2022) due to their capacity to offer a wealth of dynamic information within our 3D environment. Compared to conventional videos, 4D point clouds deliver direct access to geometric information in 3D space, a facet particularly advantageous for real-world interactions. These attributes are * These authors contributed equally. † 1 Corresponding authors: Xu Yan and Zhen Li. http://www.hoi4d.top/. (b) Multi Modal (a) Single Modal {jinglinglin}@pjlab.org.cn, {xuyan1@link., lizhen@}cuhk.edu.cn (c) Knowledge Transfer 2 Point Cloud Model 4D Point Cloud Point Cloud Model 4D Point Cloud Multi-modal Model 4D Point Cloud & RGB Sequences Multi-modal Model 4D Point Cloud & RGB Sequences Point Cloud Model Knowledge Transfer Gradientaware Transformer Training Phase Point Cloud Model Training and Inference Training only Inference Phase Figure 1: 4D Cross-Modal Knowledge Transfer. (a) Previous 4D point cloud analysis methods take point cloud only as their input. (b) Although cross-modal approaches enhance performance, they introduce extra computation overhead in both training and inference. (c) Our method takes additional 2D images during the training for 4D cross-modal knowledge transfer. During the inference, the point cloud model can be independently deployed. pivotal for understanding 3D dynamic environments, including tasks like action recognition/segmentation (Hoai, Lan, and De la Torre 2011), and 4D semantic segmentation (Xie, Tian, and Zhu 2020). Previous works in 4D point cloud representation learning predominantly stem from extending existing 3D point cloud models (Fan and Kankanhalli 2021; Wen et al. 2022) to 4D, which involves incorporating additional temporal learning modules that enable feature interactions across time (Xiao et al. 2022; Zhong et al. 2022). However, due to the sparsity and lack of texture in point clouds, these methods are limited in capturing comprehensive semantic details. Nevertheless, such semantic information remains crucial, particularly for tasks demanding meticulous reasoning, such as 4D semantic segmentation and action segmentation. A plausible approach to address this limitation involves integrating supplementary texture information from RGB images to enhance the 4D point cloud representation, similar to methods employed" 2312.07379v1,"1 Sensor Fusion and Resource Management in MIMO-OFDM Joint Sensing and Communication Elia Favarelli, Member, IEEE, Elisabetta Matricardi, Student Member, IEEE, Lorenzo Pucci, Student Member, IEEE, Wen Xu, Senior Member, IEEE, Enrico Paolini, Senior Member, IEEE, and Andrea Giorgetti, Senior Member, IEEE Abstract—This study explores the promising potential of integrating sensing capabilities into multiple-input multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM)- based networks through innovative multi-sensor fusion techniques, tracking algorithms, and resource management. A novel data fusion technique is proposed within the MIMO-OFDM system, which promotes cooperative sensing among monostatic joint sensing and communication (JSC) base stations by sharing rangeangle maps with a central fusion center. To manage data sharing and control network overhead introduced by cooperation, an excision filter is introduced at each base station. After data fusion, the framework employs a three-step clustering procedure combined with a tracking algorithm to effectively handle point-like and extended targets. Delving into the sensing/communication trade-off, resources such as transmit power, frequency, and time are varied, providing valuable insights into their impact on the overall system performance. Additionally, a sophisticated channel model is proposed, accounting for complex urban propagation scenarios and addressing multipath effects and multiple reflection points for extended targets like vehicles. Evaluation metrics, including optimal sub-pattern assignment (OSPA), downlink sum rate, and bit rate, offer a comprehensive assessment of the system’s localization and communication capabilities, as well as network overhead. Index Terms—Joint sensing and communication, tracking, OFDM, probability hypothesis density filter, multi-Bernoulli mixture filter, resource allocation, data fusion. I. I NTRODUCTION T HE prominence of safety in urban environments has recently emerged as a critical area of interest. This requires the integration of advanced sensing technologies. The growing interest in sensing stems from its potential to enable several applications, including but not limited to, traffic monitoring, autonomous driving, and environmental mapping. These applications are poised to benefit greatly from effectively utilizing radio frequency signals for sensing purposes [1]. Of particular importance is the advancement in sensing This work was presented in part at the Euroepan Radar Conference (EuRAD), Berlin, Germany, Sept. 2023. This work was supported in part by the CNIT National Laboratory WiLab and the WiLab-Huawei Joint Innovation Center and in part by the European Union under the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on “Telecommunications of the Future” (PE00000001 - program “RESTART”). E. Favarelli, E. Matricardi, L. Pucci, E. Paolini and A. Giorgetti are with the Dept. of Electrical, Electronic, and Information Eng. “Guglielmo Marconi” (DEI), University of Bologna, and WiLab, CNIT, Italy (e-mail: {elia.favarelli, elisabett.matricard3, lorenzo.pucci3, e.paolini, andrea.giorgetti}@unibo.it). W. Xu is with the Munich Research Center, Huawei Technologies Duesseldorf GmbH, Germany (e-mail: wen.dr.xu@huawei.com). capabilities facilitated by the transition to higher frequency bands and the use of larger antenna arrays [2], [3]. This trend seems to perfectly capture the vision of the next generation of mobile networks, which are expected to encompass a wide range of novel capabilities and services, among which sensing seems one of the most prominent. The sharp increase in the number of base stations (BSs) opens the door to the development of precise and reliable localization systems [4], [5]. This, in turn, paves the way for enhanced safety measures in urban settings [6]. Additionally, the advent of massive MIMO technology at millimeter-wave (mmWave) frequencies offers the opportunity not only to achieve remarkable data transmission rates but also to attain accurate object position estimation [7]. This noteworthy capability is anticipated to address emerging communication challenges effectively, embracing crucial aspects such as precise beam management [8], accurate estimation of target direction for beam tracking to maintain high-quality links [9], and the application of predictive beam tracking using JSC in vehicular scenarios [10]. Moreover, as we delve into the potential of 6G mobile radio networks and their applications, it is essential to examine the existing gaps in research. While significant strides have been made in integrating sensing and communication capabilities, certain aspects remain underexplored. In particular, the exploitation of mobile radio networks as an enabler for distributed and cooperative sensing is still underinvestigated. Along these lines, the benefits of cooperation, as well as its impact on network overhead, have not been thoroughly addressed. Furthermore, the remarkable flexibility offered by mobile networks to allocate resources based on user needs has not been fully exploited for sensing, hindering adjustment of the sensing/communication trade-off to specific requirements [11]–[13]. The integration of cooperative sensing into the mobile network framework stands as an unexplored frontier, promising to enhance both the efficiency of sensing applications and the overall performance of the network. This study explores the feasibility of enabling sensing in MIMO-OFDM-based networks through the utilization of multi-sensor fusion techniques, tracking algorithms, and resource management. Specifically, we aim at exploiting rangeangle radar maps derived from a collaborative set of BSs to track heterogeneous targets in a surveillance area. The main contributions of this work are as follows: • With reference to a MIMO-OFDM system, we propose a data fusion technique to facilitate cooperative sensing" 2312.07382v1,"Autonomous driving of trucks in off-road environment Kenny A. Q. Caldas 1* , Filipe M. Barbosa 2 , Junior A. R. Silva 3 , Tiago C. Santos 3 , Iago P. Gomes 3 , Luis A. Rosero 3 , Denis F. Wolf 3 and Valdir Grassi Jr 1 1* Department of Electrical and Computer Engineering, São Carlos School of Engineering, University of São Paulo, São Carlos, Brazil. 2 Division of Automatic Control, Department of Electrical Engineering, Linköping University, Linköping, Sweden. 3 Institute of Mathematics and Computer Science, University of São Paulo, São Carlos, Brazil. *Corresponding author(s). E-mail(s): kennycaldas@usp.br; Contributing authors: filipe.barbosa@liu.se; junior.anderson@usp.br; tiagocs@icmc.usp.br; iagogomes@usp.br; lrosero@usp.br; denis@icmc.usp.br; vgrassi@usp.br; Abstract Off-road driving operations can be a challenging environment for human conductors as they are subject to accidents, repetitive and tedious tasks, strong vibrations, which may affect their health in the long term. Therefore, they can benefit from a successful implementation of autonomous vehicle technology, improving safety, reducing labor costs and fuel consumption, and increasing operational efficiency. The main contribution of this paper is the experimental validation of a path tracking control strategy, composed of longitudinal and lateral controllers, on an off-road scenario with a fully-loaded heavy-duty truck. The longitudinal control strategy relies on a Non-Linear Model Predictive Controller (NMPC), which considers the path geometry and simplified vehicle dynamics to compute a smooth and comfortable input velocity, without violating the imposed constraints. The lateral controller is based on a Robust Linear Quadratic Regulator (RLQR), which considers a vehicle model subject to parametric uncertainties to minimize its lateral 1 The Version of Record of this article is published in Journal of Control, Automation and Electrical Systems, and is available online at https://doi.org/10.1007/s40313-023-01041-1" 2312.07389v1,"Eroding Trust In Aerial Imagery: Comprehensive Analysis and Evaluation Of Adversarial Attacks In Geospatial Systems Michael Lanier, Aayush Dhakal, Zhexiao Xiong, Arthur Li, Nathan Jacobs, Yevgeniy Vorobeychik Department of Computer Science & Engineering, Washington University in St. Louis { lanier.m,a.dhakal,z.xiong,arthurli,jacobsn,yvorobeychik } @wustl.edu Abstract—In critical operations where aerial imagery plays an essential role, the integrity and trustworthiness of data are paramount. The emergence of adversarial attacks, particularly those that exploit control over labels or employ physically feasible trojans, threatens to erode that trust, making the analysis and mitigation of these attacks a matter of urgency. We demonstrate how adversarial attacks can degrade confidence in geospatial systems, specifically focusing on scenarios where the attacker’s control over labels is restricted and the use of realistic threat vectors. Proposing and evaluating several innovative attack methodologies, including those tailored to overhead images, we empirically show their threat to remote sensing systems using high-quality SpaceNet datasets. Our experimentation reflects the unique challenges posed by aerial imagery, and these preliminary results not only reveal the potential risks but also highlight the non-trivial nature of the problem compared to recent works. 1. Introduction Deep learning models have become an indispensable component of various applications, ranging from facial recognition and object detection to image classification and natural language processing. As these models gain prominence in real-life scenarios, ensuring their security and robustness against potential attacks becomes an essential task. Most adversarial attack research focuses on natural scene imagery, not overhead remotes sensing imagery. In this study, multiple attacks taken anachronistically from the traditional image classification domain are applied to the overhead geo-location image classification, in order to examine the limit of traditional intrusive methods as well as the robustness of a simply trained overhead classifier. Amoung the least studied in this domain are Trojan (sometimes called backdoor) attacks. These attacks involve injecting hidden malicious behaviors into the models, causing them to misclassify inputs containing specific triggers, which can have severe consequences in real-world applications [1]. Trojan attacks are a specific category of adversarial attacks that manipulate the training data with the intention of compromising the model’s behavior. This manipulation process involves embedding a carefully crafted image pattern, known as a Trojan, within the training dataset. During the learning process, the model is inadvertently trained to recognize and respond to this Trojan pattern. In a typical Trojan attack, the attacker inserts the Trojan pattern into training images associated with their desired target class. Consequently, the model learns to establish a strong correlation between the presence of the Trojan pattern and the attacker’s target class. When the model encounters the Trojan pattern during the inference phase, it is manipulated into producing the attacker’s desired outcome, potentially causing catastrophic failures in critical applications [2]. Existing research on backdoor attacks primarily focuses on digital attacks, utilizing digitally generated patterns as triggers. However, a crucial question remains: can backdoor attacks succeed using physical objects as triggers in realworld applications, such as facial recognition systems? This question has been explored in ”Backdoor Attacks Against Deep Learning Systems in the Physical World,” which demonstrates the feasibility of physical backdoor attacks under various conditions and highlights the need for more robust defenses against such threats. This finding underscores the importance of understanding and addressing the risks posed by physically realizable backdoor attacks [3]. In light of these related works, our approach aims to develop novel methods for generating and approximating physically realizable Trojan attacks that do not require a high level of control over training data. We will focus on the design and evaluation of advanced patch generation, segmentation, and blending techniques that enable sophisticated Trojan attacks on deep-learning classifiers. By exploring new attack methodologies, we seek to expand the current understanding of physically realizable Trojan attacks and their implications for real-world applications. Our major contributions are as follows: • • • • We demonstrate that white box evasion attacks are successful against classifers trained on electro optical remote sensing imagery. We demonstrate that categorical inference attacks are effective at recovering training data’s geolocation, given white box access to a model trained on such data. We present a novel defense against categorical inference which we show experimentally also improves model performance at test time. We present a novel physically realizable Trojan attack against a classifer trained on electro optical" 2312.07413v1,"AI capabilities can be significantly improved without expensive retraining Tom Davidson 1 Jean-Stanislas Denain 2 Pablo Villalobos 3 Guillem Bas 4 Abstract State-of-the-art AI systems can be significantly improved without expensive retraining via “posttraining enhancements”—techniques applied after initial training like fine-tuning the system to use a web browser. We review recent post-training enhancements, categorizing them into five types: tool-use, prompting methods, scaffolding, solution selection, and data generation. Different enhancements improve performance on different tasks, making it hard to compare their significance. So we translate improvements from different enhancements into a common currency, the compute-equivalent gain: how much additional training compute would be needed to improve performance by the same amount as the enhancement. Our non-experimental work shows that post-training enhancements have significant benefits: most surveyed enhancements improve benchmark performance by more than a 5x increase in training compute, some by more than 20x. Posttraining enhancements are relatively cheap to develop: fine-tuning costs are typically <1% of the original training cost. Governing the development of capable post-training enhancements may be challenging because frontier models could be enhanced by a wide range of actors. 1. Executive summary It is important to understand the drivers of AI progress, to inform both forecasts of future progress and initiatives for AI governance. Previous analyses have mostly focused on the initial development of an AI system, called pre-training: computationally expensive training runs where models learn from massive amounts of data. Researchers have measured how quickly the inputs to training runs have been increasing – more computational resources (“compute”) (Sevilla et al., 2022), more data (Villalobos et al., 2022), better algorithms 1 Open Philantropy 2 UC Berkeley 3 Epoch 4 Observatorio de Riesgos Catastróficos Globales. Correspondence to: Tom Davidson . (Hernandez and Brown, 2020; Erdil and Besiroglu, 2023) – and how bigger training runs translate into improved performance on downstream tasks (Srivastava et al., 2023). There has been little focus in the AI forecasting literature on what we call “post-training enhancements”: techniques for improving the performance of an AI model after it is initially developed. 1 Post-training enhancements are commonly used in deployed AI systems. Examples include: teaching the model to browse the web, asking the model to “think stepby-step”, fine-tuning 2 on task-specific curated data sets, and using the model to power an autonomous AI agent (e.g. AutoGPT). 3 It is hard to meaningfully compare the benefits of posttraining enhancements that apply to different domains. For example, how does 10% greater accuracy on the MATH benchmark (Hendrycks et al., 2021) compare to 10% greater accuracy in a multiple choice knowledge test, or to 10% lower perplexity in a language modeling task? To address this problem, we translate performance gains on different benchmarks into a common currency. In particular, we estimate how much additional training compute would have been needed to improve benchmark performance by as much as the post-training enhancement. 4 We call this the “compute-equivalent gain” (CEG). In the toy example below, the post-training enhancement improves performance by the same amount as increasing the training compute by 5×; so the CEG is 5 (see Figure 1). 1 Many papers introduce and evaluate individual enhancements, but there is little work systematically evaluating multiple enhancements. (Villalobos and Atkinson, 2023) discuss techniques for improving performance at the cost of more expensive inference, which count as post-training enhancements under our definition. We focus on a wider set of enhancements, most of which do not make inference much more expensive. (Anderljung et al., 2023) briefly discusses various “post-deployment enhancements”, which are a subset of post-training enhancements. 2 Fine-tuning refers to additional training that occurs after pretraining, often to elicit specific skills and tendencies from the model. Fine-tuning typically uses a much smaller quantity of data than pre-training. 3 See Mialon et al. (2023) for a survey of some of these enhancements, which they call augmentations. 4 Assuming that the additional training compute is used to train further on the pre-training distribution, rather than on some taskspecific dataset." 2312.07422v1,"Exploring the functional hierarchy of different pyramidal cell types in temporal processing ∗ Anh Duong Vo 1, 2 , Elisabeth Abs 2 , Pau Vilimelis Aceituno 1,2 , Benjamin Friedrich Grewe ,1,2 , and Katharina Anna ∗ Wilmes ,3 1 ETH AI Center, ETH Zurich, OAT X11, Andreasstrasse 5, 8092 Zürich, Switzerland 2 Institute of Neuroinformatics, University of Zurich and ETH Zurich, Winterthurerstrasse 190, 8057 Zürich, Switzerland 3 University of Bern, Institute of Physiology, Bühlplatz 5, 3012 Bern, Switzerland ∗ jointly directed Corresponding authors: Anh Duong Vo, Katharina Anna Wilmes Email address of corresponding authors: anhduong.vo@ai.ethz.ch, katharina.wilmes@unibe.ch Conflict of interest: The authors declare no competing financial interests. Vo et al. | December 13, 2023 | 1–28" 2312.07424v1,"How Well Does GPT-4V(ision) Adapt to Distribution Shifts? A Preliminary Investigation Zhongyi Han 1∗ , Guanglin Zhou 2∗ , Rundong He 3∗ , Jindong Wang 4 , Xing Xie 4 , Tailin Wu 5 , Yilong Yin 3 , Salman Khan 1,6 , Lina Yao 7,2,8 , Tongliang Liu 9,1 and Kun Zhang 10,1 1 6 Mohamed bin Zayed University of Artificial Intelligence 2 The University of New South Wales 3 School of Software, Shandong University 4 Microsoft Research Asia 5 Westlake University Australian National University 7 Data61, CSIRO 8 Macquarie University 9 The University of Sydney 10 Carnegie Mellon University Abstract In machine learning, generalization against distribution shifts—where deployment conditions diverge from the training scenarios—is crucial, particularly in fields like climate modeling, biomedicine, and autonomous driving. The emergence of foundation models, distinguished by their extensive pretraining and task versatility, has led to an increased interest in their adaptability to distribution shifts. GPT-4V(ision) acts as the most advanced publicly accessible multimodal foundation model, with extensive applications across various domains, including anomaly detection, video understanding, image generation, and medical diagnosis. However, its robustness against data distributions remains largely underexplored. Addressing this gap, this study rigorously evaluates GPT-4V’s adaptability and generalization capabilities in dynamic environments, benchmarking against prominent models like CLIP and LLaVA. We delve into GPT-4V’s zero-shot generalization across 13 diverse datasets spanning natural, medical, and molecular domains. We further investigate its adaptability to controlled data perturbations and examine the efficacy of in-context learning as a tool to enhance its adaptation. Our findings delineate GPT-4V’s capability boundaries in distribution shifts, shedding light on its strengths and limitations across various scenarios. Importantly, this investigation contributes to our understanding of how AI foundation models generalize to distribution shifts, offering pivotal insights into their adaptability and robustness. Code is publicly available at https://github.com/jameszhou-gl/gpt-4v-distribution-shift . DomainNet Fmow 0.24 Terra_incognita 0.49 0.46 iWildCam 0.89 0.78 0.70 0.16 0.15 0.37 fi 0.89 0.85 0.81 VLCS 0.21 0.27 0.06 0.01 0.50 0.51 0.2 0.16 0.23 Camelyon17 0.08 0.08 0.09 0.4 0.6 0.31 0.34 HAM10000 Of ce-Home 0.68 0.58 clip-vit-base-patch16 llava-v1.5-13b gpt-4-vision-preview 0.48 0.52 0.49 0.52 0.8 0.960.970.98 1.0 PACS 0.42 0.49 COVID DrugOOD_Assay NIH_Chest DrugOOD_Scaffold Figure 1 | Comparative analysis of zero-shot generalization performance across 13 distinct datasets, encompassing natural, medical, and molecular domains. The analysis features the performances of three advanced models: GPT-4V, CLIP, and LLaVA. ∗ These authors contributed equally to this work. Email: {hanzhongyicn;jameszhou.ustc}@gmail.com" 2312.07426v1,"Schwarzschild black hole and redshift rapidity: A new approach towards measuring cosmic distances Mehrab Momennia, 1, a Pritam Banerjee, 2, b Alfredo Herrera-Aguilar, 1, c and Ulises Nucamendi 3, d 1 Instituto de Fı́sica, Benemérita Universidad Autónoma de Puebla, Apartado Postal J-48, 72570, Puebla, Puebla, Mexico 2 Indian Institute of Technology, Kharagpur, 721302, India 3 Instituto de Fı́sica y Matemáticas, Universidad Michoacana de San Nicolás de Hidalgo, Edificio C–3, Ciudad Universitaria, CP 58040, Morelia, Michoacán, Mexico (Dated: December 13, 2023) Motivated by recent achievements of a full general relativistic method in estimating the mass-todistance ratio of supermassive black holes hosted at the core of active galactic nuclei, we introduce the new concept redshift rapidity in order to express the Schwarzschild black hole mass and its distance from the Earth just in terms of observational quantities. The redshift rapidity is also an observable relativistic invariant that represents the evolution of the frequency shift with respect to proper time in the Schwarzschild spacetime. We extract concise and elegant analytic formulas that allow us to disentangle mass and distance to black holes in the Schwarzschild background and estimate these parameters separately. This procedure is performed in a completely general relativistic way with the aim of improving the precision in measuring cosmic distances to astrophysical compact objects. Our exact formulas are valid on the midline and close to the line of sight, having direct astrophysical applications for megamaser systems, whereas the general relations can be employed in black hole parameter estimation studies. Keywords: Schwarzschild black hole, black hole rotation curves, redshift and blueshift, redshift rapidity. PACS numbers: 11.27.+d, 04.40.-b, 98.62.Gq parameters of the Kerr black hole in terms of a few directly observational quantities [9]. Besides, it has been demonstrated that the Kerr black hole in asymptotically Black holes first have been found just as mathematical de Sitter background allows us to measure the Hubble solutions to Einstein field equations of the general relativconstant and black hole parameters, simultaneously [10]. ity theory by Karl Schwarzschild whereas their existence The initial method of [8] has been employed to obtain in the cosmos has been recently approved through gravthe kinematic redshift and blueshift in terms of black itational wave detections [1] and electromagnetic wave hole parameters for several black hole solutions, such as observations [2, 3]. However, investigating the motion of Kerr-Newman black holes in de Sitter spacetime [14], the stars around the center of our galaxy has already pro- Plebanski-Demianski black holes [15], higher dimensional vided convincing evidence for the presence of a super- Myers-Perry spacetime [16], and regular black holes in massive black hole hosted at the core of the Milky Way nonlinear electrodynamics [17]. Furthermore, a similar galaxy [4–7]. relation for the kinematic redshift has been found for Even though the aforementioned methods are fairly acblack holes in modified gravity [18], black holes coupled curate in obtaining the black hole parameters, they are to nonlinear electrodynamics [19], black holes immersed not always applicable to existing data from black holes in a strong magnetic field [20], and the boson stars [21]. and black hole environments. Therefore, we have been These studies have been performed based on the kineinventing and developing an independent general relamatic frequency shift which is not an observable quantivistic approach to measure the black hole and cosmotity, unlike the total frequency shift of photons. Hence, logical parameters [8–10]. This method is based on the this fact has motivated us to consider the total frequency observational frequency-shifted photons emitted by masshift as a directly observable element and extract concise sive geodesic particles orbiting central black holes and and elegant analytic formulas for the mass and spin of has been initially suggested in [8], generalizing previous the Kerr black hole in terms of few observable quantities Keplerian models [11–13]. Recently, this approach has [9]. With the help of this general relativistic method, the been developed to analytically express the mass and spin free parameters of polymerized black holes have been expressed in terms of the total redshift as well [22]. More recently, this approach has been extended to general spherically symmetric spacetimes in order to extract the infora Electronic address: mmomennia@ifuap.buap.mx, momennia1988@gmail.com b Electronic address: pritam@phy.iitkgp.ac.in, bpritamphy@ gmail.com mation of free parameters of black holes in alternative c Electronic address: aherrera@ifuap.buap.mx gravitational theories beyond Einstein gravity [23]. d Electronic address: ulises.nucamendi@umich.mx, unucamendi@gmail.com From a practical point of view, the mass-to-distance I. INTRODUCTION" 2312.07435v1,"Cross-modal Contrastive Learning with Asymmetric Co-attention Network for Video Moment Retrieval Love Panta 12 * , Prashant Shrestha 1 * , Brabeem Sapkota 1 , Amrita Bhattarai 1 , Suresh Manandhar 2 , and Anand Kumar Sah 1 1 IOE, Pulchowk Campus, 2 Wiseyak Solutions Pvt. Ltd. {075bei016.love, 075bei024.prashant, 075bei011.brabeem, 075bei006.amrita, anand.sah}@pcampus.edu.np, suresh.manandhar@wiseyak.com Abstract Video moment retrieval is a challenging task requiring fine-grained interactions between video and text modalities. Recent work in image-text pretraining has demonstrated that most existing pretrained models suffer from information asymmetry due to the difference in length between visual and textual sequences. We question whether the same problem also exists in the video-text domain with an auxiliary need to preserve both spatial and temporal information. Thus, we evaluate a recently proposed solution involving the addition of an asymmetric co-attention network for video grounding tasks. Additionally, we incorporate momentum contrastive loss for robust, discriminative representation learning in both modalities. We note that the integration of these supplementary modules yields better performance compared to state-of-the-art models on the TACoS dataset and comparable results on ActivityNet Captions, all while utilizing significantly fewer parameters with respect to baseline. 1. Introduction Recent trends in machine learning have shown a growing interest in multimodal learning, specifically in vision language tasks such as visual question answering, imagetext retrieval, video grounding and so on. Video moment retrieval, also known as video grounding, aims to align a video segment semantically with a given sentence query. Numerous approaches have been proposed to address video grounding, but their results were unsatisfactory due to limitations in capturing both spatial and temporal information [8]. Transformer-based methods have dominated the visionlanguage landscape in recent years and have also been effectively used for video grounding [2, 25, 28, 29, 32]. One advantage of using transformers over other neural network * Both authors contributed equally to this work architectures is their ability to model long sequences without losing context [22] and little need for engineering fusion approaches for effective multimodal interaction. We opted for a single-stream transformer backbone due to their efficiency and little need for engineering on crossmodal interactions compared to dual-stream architectures. However, the effectiveness of single-stream multimodal architectures is limited by the imbalance in the length of visual and textual query in image-text pretraining which increases the learning time and reduces the performance of the model [9]. To alleviate the problem, Li et al. [9] proposes an asymmetric co-attention block at the beginning of the network and outputs the visual-aware text features. This asymmetry still exists when we move to the video grounding task as the video feature sequences are much longer than the accompanying textual feature sequences. Thus, we adapt this approach to a transformer-based architecture proposed by MSAT [32] for video moment retrieval. In terms of training objectives, recent methods in image text pretraining [5, 9, 10] have extensively adapted contrastive loss together with transformers for effective multimodal interaction. However, few works have been proposed for video grounding [2, 29]. Inspired by approaches in image text pretraining, we employ additional Video Text Contrastive (VTC) loss to our architecture. Experiments on MSAT [32] have also shown the effectiveness of the loss. Additionally, we observe that VTC loss allows the decoupled attention paradigm of MSAT to be dropped without affecting performance, greatly reducing the model parameters. Moreover, MSAT architecture introduces the novel multi-stage aggregated module(MSA) on the top of their transformer module to capture the stage-specific information which is also integrated into our model. In summary, our key contributions are three-fold: • We evaluate the effectiveness of a recently proposed solution to the information asymmetry problem inspired by image-text pretraining on the video ground-" 2312.07439v1,"Preprint under review BIRB: A G ENERALIZATION B ENCHMARK FOR I NFORMATION R ETRIEVAL IN B IOACOUSTICS Jenny Hamer, Eleni Triantafillou, Bart van Merriënboer, Tom Denton, Vincent Dumoulin Google Research {hamer,etriantafillou,bartvm,tomdenton,vdumoulin}@google.com Stefan Kahl, Holger Klinck K. Lisa Yang Center for Conservation Bioacoustics Cornell Lab of Ornithology, Cornell University, Ithaca, NY {sk2487,holger.klinck}@cornell.edu A BSTRACT The ability for a machine learning model to cope with differences in training and deployment conditions—e.g. in the presence of distribution shift or the generalization to new classes altogether—is crucial for real-world use cases. However, most empirical work in this area has focused on the image domain with artificial benchmarks constructed to measure individual aspects of generalization. We present BIRB 1 : a generalization Benchmark for Information Retrieval in Bioacoustics, a complex benchmark centered on the retrieval of bird vocalizations from passivelyrecorded datasets given focal recordings from a large citizen science corpus available for training. We propose a baseline system for this collection of tasks using representation learning and a nearest-centroid search. Our thorough empirical evaluation and analysis surfaces open research directions, suggesting that BIRB fills the need for a more realistic and complex benchmark to drive progress on robustness to distribution shifts and generalization of ML models. 2 1 I NTRODUCTION Generalization is one of the most important properties when deploying machine learning models: applications require models which perform reliably when shifting from curated training and evaluation data to real-world conditions. Generalization is difficult to study and includes many different factors (Moreno-Torres et al., 2012) including label shift (changes in the balance of labels between training and test time), covariate shift (which subsumes a vast array of data differences, including sensor or environmental changes), and few-shot learning (using a few examples to demonstrate generalization to novel concepts or classes). Previous works try to disentangle these aspects of model generalization by creating synthetic or artificial datasets. This leads to the development of approaches which handle only specific aspects of generalization, and which may not compose well into a workable solution for real-world data. Steady improvement on artificial datasets may thus give a false sense of overall progress. There is a need for datasets which allow us to study problems in model generalization holistically. ML for bioacoustics has matured rapidly over recent years, and now includes a large and varied collection of freely available datasets which provide an ideal sandbox for studying model generalization. Birds are particularly well suited for this study as they include over 10, 000 species (most of which are highly vocal), are found in almost every habitat across the world in vastly different environments and ambient sound conditions, and are likely the world’s most recorded group of animals. Citizen science constitutes a large source of training data for bird vocalization detection, but training models on this data and deploying them for practical applications presents a rich collection of 1 2 www.audubon.org/news/when-bird-birb-extremely-important-guide Code and instructions can be found at https://github.com/google-research/perch. 1" 2312.07457v1,"1–13 Dynamics Harmonic Analysis of Robotic Systems: Application in Data-Driven Koopman Modeling Daniel Felipe Ordoñez-Apraez 1,2 Vladimir Kostic 1 Giulio Turrisi 2 Pietro Novelli 1 Carlos Mastalli 3 * Claudio Semini 2 † Massimiliano Pontil 1 DANIEL . ORDONEZ @ IIT . IT VLADIMIR . KOSTIC @ IIT . IT GIULIO . TURRISI @ IIT . IT PIETRO . NOVELLI @ IIT . IT C . MASTALLI @ HW . AC . UK CLAUDIO . SEMINI @ IIT . IT MASSIMILIANO . PONTIL @ IIT . IT 1 Computational Statistics and Machine Learning - Istituto Italiano di Tecnologia Dynamic Legged Systems - Istituto Italiano di Tecnologia 3 Robot Motor Intelligence – Heriot-Watt University 2 Abstract We introduce the use of harmonic analysis to decompose the state space of symmetric robotic systems into orthogonal isotypic subspaces. These are lower-dimensional spaces that capture distinct, symmetric, and synergistic motions. For linear dynamics, we characterize how this decomposition leads to a subdivision of the dynamics into independent linear systems on each subspace, a property we term dynamics harmonic analysis (DHA). To exploit this property, we use Koopman operator theory to propose an equivariant deep-learning architecture that leverages the properties of DHA to learn a global linear model of system dynamics. Our architecture, validated on synthetic systems and the dynamics of locomotion of a quadrupedal robot, demonstrates enhanced generalization, sample efficiency, and interpretability, with less trainable parameters and computational costs. Keywords: Symmetric dynamical systems, Harmonic analysis, Koopman operator, Robotics 1. Introduction The current state-of-the-art in modeling, control, and estimation of robotic systems relies on the Lagrangian model of rigid-body dynamics, which represents the system’s state as a point in the space of generalized (or minimal) coordinates. This approach has fostered the development of efficient algorithms that leverage the system’s kinematic structure to enable recursive computations which are ubiquitous in methods for simulation, estimation, planning, and control in robotics (Featherstone, 2007). However, because the model’s dynamics are nonlinear, these methods need to cope with the challenges of nonlinear optimization, often through iterative local (or state-dependent) linearizations (Mayne, 1966; Li and Todorov, 2004). This can limit control policies to local minima, hinder the convergence of optimization methods, and bias the estimation of unobserved quantities. The Koopman operator framework can potentially address these limitations by deriving globally linear models of robot dynamics, albeit in an infinite-dimensional function space (Brunton et al., 2022; Kostic et al., 2023). These models are easily leveraged by various estimation and control theory techniques (Mauroy et al., 2020) and can capture dynamic phenomena that impact system evolution but are challenging to model analytically (Asada, 2023). However, building a good * Also with the Florida Institute for Human and Machine Cognition, US. † Also with the Department of Computer Science, University College London, UK. © D.F. Ordoñez-Apraez, V. Kostic, G. Turrisi, P. Novelli, C. Mastalli, C. Semini & M. Pontil." 2312.07515v1,"Quantum Anomalous Hall and Spin Hall Effects in Magnetic Graphene Talieh S. Ghiasi, 1, ∗ Davit Petrosyan, 1 Josep Ingla-Aynés, 1 Tristan Bras, 1 Samuel Mañas-Valero, 1, 2 Kenji Watanabe, 3 Takashi Taniguchi, 4 Eugenio Coronado, 2 and Herre S. J. van der Zant 1 1 Kavli Institute of Nanoscience, Delft University of Technology, Lorentzweg 1, 2628 CJ Delft, The Netherlands 2 Institute of Molecular Science, University of Valencia, Catedrático José Beltrán 2, Paterna 46980, Spain 3 Research Center for Electronic and Optical Materials, National Institute for Materials Science, 1-1 Namiki, Tsukuba 305-0044, Japan 4 Research Center for Materials Nanoarchitectonics, National Institute for Materials Science, 1-1 Namiki, Tsukuba 305-0044, Japan A promising approach to attain long-distance coherent spin propagation is accessing quantum Hall topological spin-polarized edge states in graphene. Achieving this without large external magnetic fields necessitates engineering graphene band structure, obtainable through proximity to 2D magnetic materials. In this work, we detect spin-polarized helical edge transport in graphene at zero external magnetic field, allowed by the out-of-plane magnetic proximity of CrPS 4 that spin-splits the zeroth Landau level. This zero-field detection of the quantum anomalous spin Hall state is enabled by large induced spin-orbit and exchange couplings in the graphene that also lead to the detection of an enhanced Berry curvature, shifting the Landau levels, and result in an unconventional sequence of quantum Hall plateaus. Remarkably, we observe that the quantum anomalous Hall transport in the magnetized graphene persists up to room temperature. The detection of spin-polarized helical edge states at zero magnetic field and the robustness of the quantum anomalous Hall transport up to room temperature open the route for practical applications of magnetic graphene in quantum information processing and spintronic circuitries. Decades of research in graphene have unveiled its remarkable charge and spin transport properties, such as distinctive quantum Hall (QH) charge transport and long-distance spin propagation [1, 2]. Yet, harnessing these properties for the development of practical quantum spintronic devices necessitates targeted modifications to the graphene band structure. This band structure engineering has been recently achieved noninvasively by bringing graphene in the proximity of other two-dimensional (2D) materials [3], leading to spin Hall [4, 5], Rashba-Edelstein [6–8], anomalous Hall [9], and spin-dependent Seebeck [10] effects in graphene. The realization of these phenomena in proximitized graphene is due to induced spin-orbit and exchange interactions that cause spin-splitting of the graphene band structure [11–13]. These spin-related effects, however, have been experimentally addressed in the proximitized graphene majorly by diffusive charge/spin transport, where the spin relaxation length is limited by spin and momentum scattering mechanisms. On the contrary, if the transport occurs in the QH regime, one could possibly access spin-polarized edge states that can allow for long-distance quantum coherent spin propagation due to their topological protection. Spin-polarized QH edge states have been detected in graphene through the Zeeman splitting of the bands, induced by applying a large out-of-plane magnetic field [15, 16]. However, in a graphene/2D magnet heterostructure, the out-of-plane magnetic proximity by itself should be able to readily bring the graphene transport to the QH ∗ Correspondence email address:t.s.ghiasi@tudelft.nl regime, where the induced exchange interaction leads to the spin-splitting of the QH states, even in the absence of an external magnetic field. This modified QH transport in graphene due to the co-presence of the induced magnetism and spin-orbit coupling is conceived as the quantum anomalous Hall (QAH) effect [17–24]. Upon broken time-reversal symmetry by the induced magnetism, there will be a topological protection of the edge states that, based on their spin polarity, would counter-propagate close to zero energy (so-called helical states), giving rise to quantum anomalous spin Hall (QASH) effect [25]. Despite several recent experimental efforts in addressing the QH regime in various hybrids of graphene and magnetic materials [26–30], direct experimental evidence for the detection of the QAH and QASH effects in magnetized graphene is still missing. In fact, recent reports on the QH transport in some of these graphene-based magnetic heterostructures [31, 32] have shown that the presence of interfacial charge transfer hinders the exploration of the magnetic proximity effect. However, here we observe clear evidence for QAH transport in graphene- CrPS 4 heterostructures and demonstrate that transport close to zero energy in magnetic graphene is dominated by the QASH effect, realized by the detection of the QH helical edge states at zero external magnetic field. In addition, we measure a distinctive Landau fan diagram with enhanced Landau gaps and non-trivial sequences of the QH plateaus, providing evidence for a large induced Berry curvature and breaking of the spin/valley degeneracy in the magnetized graphene. We further observe that the first QH plateaus stay robust up to room temperature which is the most sought-after and theoretically predicted signature for the QAH effect [17, 22, 24]." 2312.07527v1,"B A RD A : A Belief and Reasoning Dataset that Separates Factual Accuracy and Reasoning Ability Peter Clark, Bhavana Dalvi Mishra, Oyvind Tafjord Allen Institute for AI Seattle, WA {peterc,bhavanad,oyvindt}@allenai.org Abstract While there are numerous benchmarks comparing the performance of modern language models (LMs), end-task evaluations often conflate notions of factual accuracy (“truth”) and reasoning ability (“rationality”, or “honesty” in the sense of correctly reporting implications of beliefs). Our goal is a dataset that clearly distinguishes these two notions. Our approach is to leverage and extend a collection of humanannotated entailment trees, engineered to express both good and bad chains of reasoning, and using a mixture of true and false facts, in particular including counterfactual examples, to avoid belief bias (also known as the “content effect”). The resulting dataset, called B A RD A , contains 3000 entailments (1787 valid, 1213 invalid), using 6681 true and 2319 false statements. Testing on four GPT-series models, GPT3(curie)/GPT3(davinici)/3.5/4, we find factual accuracy (truth) scores of 74.1/80.6/82.6/87.1 and reasoning accuracy scores of 63.1/78.0/71.8/79.2. This shows the clear progression of models towards improved factual accuracy and entailment reasoning, and the dataset provides a new benchmark that more cleanly separates and quantifies these two notions. 1 1 Introduction Our goal is to better quantify both the factual accuracy and entailment reasoning capabilities of modern language models. Although numerous evaluation benchmarks exist for testing models, e.g., the HELM evaluation suite (Liang et al., 2022), the EleutherAI LM evaluation harness (Gao et al., 2021), and the GPT4 Technical Report datasets (OpenAI, 2023), the notions of factual accuracy and reasoning ability are often conflated in end-task evaluations. In particular, both machines and humans are known to exhibit belief bias (also known as the content effect), in which they tend to judge 1 B A RD A and our evaluations of GPT* are available at https://allenai.org/data/barda Statements and Entailments Gold Model (facts) (ent.) // good facts, good entails: P1: a penny is made of copper P2: copper is magnetic H: a penny is magnetic P1 & P2 entails H T T T T T T T // bad facts, good entails: P1: a giraffe is a mammal P2: mammals lay eggs H: a giraffe lays eggs P1 & P2 entails H T F F T T F T T T F F T T F // bad facts, bad entails: P1: Phobos is a moon P2: Moons orbit planets H: Phobos orbits Mars P1 & P2 entails H Model score (truth) Model score (reasoning) Model score (consistency) T T T 8/9 = 89% 2/3 = 66% 1/2 = 50% Table 1: Simplified examples of B A RD A ’s contents, along with illustrative model scores (not real) to illustrate scoring. Truth is accuracy of predicting the statements’ (gold) truth values. Reasoning is accuracy of predicting the entailments’ (gold) truth values. Consistency is % of believed entailments with believed conditions and believed conclusions / % of believed entailments with believed conditions. arguments as valid if they believe the facts are true, rather than whether the argument itself is valid (Dasgupta et al., 2022; Evans et al., 1983). This bias can result in misleading “reasoning ability” or “entailment ability” scores if not taken into account. To address this limitation, our goal is a dataset that more clearly separates factual accuracy and reasoning ability. Our approach is to use a mixture of both good and bad reasoning chains, constructed using a mixture of correct and incorrect (counterfactual) statements about the world. As well as being useful in their own right, these two measures - factual accuracy and reasoning ability - can be seen as indirectly measuring the “truthfulness” and “honesty” of an AI system, critical" 2312.07534v1,"Cosmological Field Emulation and Parameter Inference with Diffusion Models Nayantara Mudur Harvard University Cambridge, MA, 02138, USA nmudur@g.harvard.edu Carolina Cuesta-Lazaro The NSF AI Institute for Artificial Intelligence and Fundamental Interactions Massachusetts Institute of Technology, Cambridge, MA, 02139, USA cuestalz@mit.edu Douglas P. Finkbeiner Harvard University Cambridge, MA, 02138, USA dfinkbeiner@cfa.harvard.edu Abstract Cosmological simulations play a crucial role in elucidating the effect of physical parameters on the statistics of fields and on constraining parameters given information on density fields. We leverage diffusion generative models to address two tasks of importance to cosmology – as an emulator for cold dark matter density fields conditional on input cosmological parameters Ω m and σ 8 , and as a parameter inference model that can return constraints on the cosmological parameters of an input field. We show that the model is able to generate fields with power spectra that are consistent with those of the simulated target distribution, and capture the subtle effect of each parameter on modulations in the power spectrum. We additionally explore their utility as parameter inference models and find that we can obtain tight constraints on cosmological parameters. 1 Introduction Cosmological simulations are expensive to run, and can only be generated for a limited set of initial conditions and points in parameter space. This has led to the need for emulators or surrogate models [Heitmann et al., 2009, Mustafa et al., 2019] that can learn to model the distribution of fields or summary statistics of importance to cosmology. A closely interlinked thrust of modern cosmology has been the search for statistics that can yield optimal constraints on cosmological parameters [Valogiannis and Dvorkin, 2022, Dai and Seljak, 2023]. Diffusion or score-based generative models [Song et al., 2020] are generative models that involve a forward diffusion (noising) process. A neural network is then used to learn the denoising or generative process that maps samples from the standard normal to samples from the target distribution. The denoising diffusion probabilistic model (DDPM) [Ho et al., 2020] formulation consists of a variance schedule β t over a fixed number of time steps, T , that controls the incremental noise added to the image, or the ‘speed’ at which the target distribution is noised, and a score model, that is used to parameterize the reverse process. The model can also be conditional on either a discrete input label or a parameter vector. In this work, we apply diffusion generative models to emulate fields from cosmological simulations and show that they can Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.07546v1,"Decoding Working-Memory Load During n-Back Task Performance from High Channel NIRS Data Christian Kothe 1* , Grant Hanada 1 , Sean Mullen 1* , Tim Mullen 1 1 Intheon, La Jolla, CA, United States * Correspondence: christian.kothe@intheon.io, sean.mullen@intheon.io Abstract Near-infrared spectroscopy (NIRS) can measure neural activity through blood oxygenation changes in the brain in a wearable form factor, enabling unique applications for research in and outside the lab. NIRS has proven capable of measuring cognitive states such as mental workload, often using machine learning (ML) based brain-computer interfaces (BCIs). To date, NIRS research has largely relied on probes with under ten to several hundred channels, although recently a new class of wearable NIRS devices with thousands of channels has emerged. This poses unique challenges for ML classification, as NIRS is typically limited by few training trials which results in severely under-determined estimation problems. So far, it is not well understood how such high-resolution data is best leveraged in practical BCIs and whether state-of-the-art (SotA) or better performance can be achieved. To address these questions, we propose an ML strategy to classify working-memory load that relies on spatio-temporal regularization and transfer learning from other subjects in a combination that has not been used in previous NIRS BCIs. The approach can be interpreted as an end-to-end generalized linear model and allows for a high degree of interpretability using channel-level or cortical imaging approaches. We show that using the proposed methodology, it is possible to achieve SotA decoding performance with highresolution NIRS data. We also replicated several SotA approaches on our dataset of 43 participants wearing a 3198 dual-channel NIRS device while performing the n-Back task and show that these existing methods struggle in the high-channel regime and are largely outperformed by the proposed method. Our approach helps establish high-channel NIRS devices as a viable platform for SotA BCI and opens new applications using this class of headset while also enabling high-resolution model imaging and interpretation. Introduction Improvements in fabrication and electronics integration have enabled compact and wearable near-infrared spectroscopy (NIRS) devices with 1000+ viable channels for use in neuroimaging (e.g., Zhao et al, 2021, Ban et al, 2021, and Anaya et al, 2023). These" 2312.07553v1,"Hijacking Context in Large Multi-modal Models Joonhyun Jeong Korea Advanced Institute of Science Graduate School of AI joonhyun.jeong@kaist.ac.kr Abstract Recently, Large Multi-modal Models (LMMs) have demonstrated their ability to understand the visual contents of images given the instructions regarding the images. Built upon the Large Language Models (LLMs), LMMs also inherit their abilities and characteristics such as in-context learning where a coherent sequence of images and texts are given as the input prompt. However, we identify a new limitation of off-the-shelf LMMs where a small fraction of incoherent images or text descriptions mislead LMMs to only generate biased output about the hijacked context, not the originally intended context. To address this, we propose a pre-filtering method that removes irrelevant contexts via GPT-4V, based on its robustness towards distribution shift within the contexts. We further investigate whether replacing the hijacked visual and textual contexts with the correlated ones via GPT-4V and text-to-image models can help yield coherent responses. 1 Introduction Large Language Models (LLMs) pre-trained with huge amount of text corpus have demonstrated remarkable generalization on various language tasks such as human-like dialogues [1, 2, 3], reasoningtasks [4, 5, 6], and few-shot in-context learning [7, 8] where a few demonstration examples are given as a context for answering the test question. By bootstrapping LLMs with several add-on layers, Large Multi-modal Models (LMMs) [3, 9, 10, 11] were enabled to understand the visual contents and answer the corresponding textual instruction. LMMs also inherited the in-context learning capability of LLM, where a coherent sequence of images and textual information are given as a context for the input prompt [3, 9]. In this paper, we identify a new limitation of these off-the-shelf LMMs, hijacking contexts, where a small fraction of incoherent images or text descriptions mislead them to only generate biased output about the incoherent contexts. In Figure 1, we provide the qualitative example of context hijacking on visual story telling (VIST) dataset [12] with FROMAGe [9] as LMM. Given all the former sequence of images and their corresponding captions, the LMM is asked to provide a caption or description of the final query image. Normally, when all the visual and textual information is coherent and consistently aligned, LMM successfully provides a coherent response under consideration in the given contexts. However, when only a single image-text pair that contains an irrelevant subject is appended to the context, LMM falls into the hijacked context and loses coherency concerning the bunch of formerly given original contexts. In real-world applications and scenarios of LMMs, there is no guarantee for the inexistence of such noises and irrelevant contexts. For reliable usage of LMM, it should be robust to such distribution shift and stick to the majority of context without confusion on the minority of irrelevant contexts. To address this, we propose a pre-filtering method that removes irrelevant and hijacked contexts via prompting into GPT-4V [13], based on its robustness towards distribution shift within the contexts. Notably, we observed that GPT-4 and GPT-4V have the capability to filter irrelevant textual or visual information via a simple few-shot prompting, respectively. Our goal is to leverage this remarkable Preprint. Techinal Report." 2312.07558v1,"Big Bang Nucleosynthesis constraints on f ( T, T ) gravity Sai Swagat Mishra , 1, ∗ Ameya Kolhatkar , 1, † and P.K. Sahoo 1, ‡ 1 Department of Mathematics, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Hyderabad-500078, India. (Dated: December 14, 2023) Big Bang Nucleosynthesis provides us with an observational insight into the very early Universe. Since this mechanism of light element synthesis comes out of the standard model of particle cosmology which follows directly from General Relativity, it is expected that any modifications to GR will result in deviations in the predicted observable parameters which are mainly, the neutron-to-proton ratio and the baryon-to-photon ratio. We use the measured neutron-to-proton ratio and compare the theoretically obtained expressions to constrain two models in the framework of f ( T, T ) gravity. The theoretically constrained models are then tested against observational data from the Hubble dataset and the ΛCDM model to explain the accelerated expansion of the Universe. Keywords: Big Bang Nucleosynthesis, Neutron abundance, Early cosmology, f ( T, T ) gravity. I. INTRODUCTION The observational discovery of the accelerated expansion of the Universe [1–10] is enough to make modifications to conventional General Relativity (GR) and correspondingly the concordance model of cosmology. Various models have been proposed and explored in order to account for the large scale behaviour that seems to be missing from GR. They include – scalar-tensor theories, direct extensions to GR like the f ( R ) class of gravities, teleparallel equivalents to GR and their extensions (the f ( T ) and f ( Q ) classes of gravities), massive gravities, theories with non-minimally coupled geometry and matter, and so on. All these efforts have been made in order to address the issues of the large scale structure, horizon problem, fine-tuning problem, matter-antimatter asymmetry, and the H 0 and σ 8 tensions which are of a 5σ significance. From a plethora of available candidates, we now turn to a specific class of theories called f ( T ) gravity [12–18], where T is the torsion scalar. It is to be noted that when f ( T ) = T, the theory is equivalent to GR up to a boundary term and hence it is famously dubbed as the Teleparallel Equivalent of General Relativity [19]. The f ( T ) framework can be further extended to the f ( T, T ) framework which was introduced in [11] where T corresponds to the trace of the energy-momentum tensor. By coupling this torsion to the trace of the energy-momentum tensor, one can get an interesting behaviour that explains the different epochs of the evolution of the Universe [20]. For more on work in this gravity, check out [21–26]. The phase of Big Bang Nucleosynthesis (BBN), which occurred within a few minutes after the big bang, was the one in which the light nuclear elements (D, 3 He, 4 He, 7 Li) were created. The relative abundances of light elements can be calculated theoretically and then matched with the observed values. As far as the standard model of cosmology is concerned, the two match quite well. When we turn to modified gravities, however, geometrical effects due to non-linear and/or non-minimally coupled terms induce different early Universe scenarios than those found in the standard model. Observations can thus be used to extract constraints on various model parameters of the said models. BBN provides us with direct observational evidence in the form of neutronto-proton ratio and the baryon-to-photon ratio that can constrain cosmological models (refer [27–32] for a detailed report on BBN). This is necessary because any predictive late-time model or theory must satisfy these early time constraints thrust upon it. The manuscript is organized as follows – after an introduction to the formalism of f ( T, T ) gravity in section II, we move to the basics of constraints obtained from BBN in section III. Section IV explores these constraints in the context of f ( T, T ) gravity. Section V aims to explain the late time accelerated era by a thorough comparison of our constrained model with the Cosmic Chronometer dataset and ΛCDM model. We finally end the manuscript with the conclusion in section VI. II. FORMALISM OF f ( T, T ) GRAVITY ∗ saiswagat009@gmail.com † kolhatkarameya1996@gmail.com ‡ pksahoo@hyderabad.bits-pilani.ac.in In this section, we will discuss the fundamental equations required in f ( T, T ) gravity theory. To obtain" 2312.07577v1,"Benchmarking Distribution Shift in Tabular Data with TableShift Josh Gardner ♮ Zoran Popović ♮ Ludwig Schmidt ♮,♭ ♮ University of Washington ♭ Allen Institute for AI {jpgard, zoran, schmidt}@cs.washington.edu Abstract Robustness to distribution shift has become a growing concern for text and image models as they transition from research subjects to deployment in the real world. However, high-quality benchmarks for distribution shift in tabular machine learning tasks are still lacking despite the widespread real-world use of tabular data and differences in the models used for tabular data in comparison to text and images. As a consequence, the robustness of tabular models to distribution shift is poorly understood. To address this issue, we introduce T ABLE S HIFT , a distribution shift benchmark for tabular data. T ABLE S HIFT contains 15 binary classification tasks in total, each with an associated shift, and includes a diverse set of data sources, prediction targets, and distribution shifts. The benchmark covers domains including finance, education, public policy, healthcare, and civic participation, and is accessible using only a few lines of Python code via the T ABLE S HIFT API. We conduct a large-scale study comparing several state-of-the-art tabular data models alongside robust learning and domain generalization methods on the benchmark tasks. Our study demonstrates (1) a linear trend between in-distribution (ID) and out-of-distribution (OOD) accuracy; (2) domain robustness methods can reduce shift gaps but at the cost of reduced ID accuracy; (3) a strong relationship between shift gap (difference between ID and OOD performance) and shifts in the label distribution. 1 1 Introduction Modern machine learning models have achieved near- or even super-human performance on many tasks. This has contributed to deployments of models across critical domains, including finance, public policy, and healthcare. However, in tandem with the growing deployment of machine learning models, researchers have also demonstrated concerning model performance drops under distribution shift – when the test/deployment data are not drawn from the same distribution as the training data. Analyses of these performance drops have primarily been confined to the domains of vision and language modeling (e.g. [38, 50], where effective benchmarks for distribution shift exist. Despite the widespread use of tabular data, the impact of distribution shift on tabular data has not been thoroughly investigated. While there are existing benchmarks for IID tabular classification, none of these focus on distribution shifts [36, 33]. This is particularly concerning in light of the known differences between tabular data and the modalities mentioned above (images, text, audio). First, in contrast to these modalities, where large neural models are the undisputed state-of-the-art, there is considerable debate about whether deep 1 The benchmark data, Python package, model implementations, and more information about T ABLE S HIFT are available at https://github.com/mlfoundations/tableshift and https://tableshift.org. 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.07599v1,"Contrastive News and Social Media Linking using BERT for Articles and Tweets across Dual Platforms Jan Piotrowski jf.piotrowsk@student.uw.edu.pl University of Warsaw, MIM Solutions Poland Jakub Podolak jakub.podolak@student.uva.nl University of Amsterdam The Netherlands Paweł Olejnik pw.olejnik@student.uw.edu.pl University of Warsaw Poland Jakub Kozieł jakub.koziel.stud@pw.edu.pl Warsaw University of Technology Poland Marek Wachnicki marek.wachnicki@mim.ai MIM Solutions Poland Grzegorz Rucki grzegorz.rucki@mim.ai MIM Solutions Poland Julian Kozłowski jm.kozlowski@student.uw.edu.pl University of Warsaw Poland Stanisław Giziński s.gizinski@student.uw.edu.pl University of Warsaw Poland Mateusz Perlik ms.perlik@student.uw.edu.pl University of Warsaw, MIM Solutions Poland Michał Brzozowski michal.brzozowski@mim.ai MIM Solutions Poland Tomasz Nocoń t.nocon@student.uw.edu.pl University of Warsaw Poland Piotr Sankowski sank@mimuw.edu.pl University of Warsaw, IDEAS NCBR, MIM Solutions Poland ABSTRACT 1 X (formerly Twitter) has evolved into a contemporary agora, offering a platform for individuals to express opinions and viewpoints on current events. The majority of the topics discussed on Twitter are directly related to ongoing events, making it an important source for monitoring public discourse. However, linking tweets to specific news presents a significant challenge due to their concise and informal nature. Previous approaches, including topic models, graph-based models, and supervised classifiers, have fallen short in effectively capturing the unique characteristics of tweets and articles. Inspired by the success of the CLIP model in computer vision, which employs contrastive learning to model similarities between images and captions, this paper introduces a contrastive learning approach for training a representation space where linked articles and tweets exhibit proximity. We present our contrastive learning approach, CATBERT (Contrastive Articles Tweets BERT), leveraging pre-trained BERT models. The model is trained and tested on a dataset containing manually labeled English and Polish tweets and articles related to the Russian-Ukrainian war. We evaluate CAT- BERT’s performance against traditional approaches like LDA, and the novel method based on OpenAI embeddings, which has not been previously applied to this task. Our findings indicate that CATBERT demonstrates superior performance in associating tweets with relevant news articles. Furthermore, we demonstrate the performance of the models when applied to finding the main topic – represented by an article – of the whole cascade of tweets. In this new task, we report the performance of the different models in dependence on the cascade size. X (formerly Twitter) has emerged as a contemporary agora in recent years, serving as a platform where individuals express their opinions and viewpoints on current events. According to Kwak et al. [14], more than 85% of the topics discussed on this social media platform are directly linked to ongoing news. However, a challenge arises as only a limited number of tweets establish explicit connections to specific events. Public opinion researchers, institutions engaged in countering disinformation, and other entities responsible for monitoring public discourse are compelled to heavily rely on the active participation of humans in identifying novel keywords and emerging events. Hence, the development of automatic tools that could link tweets to related press articles would allow for indirect identification of disinformation and thus have possible applications in fighting the spread of fake news. Disinformation on X is present in various contexts, e.g., medical, political, and societal, and is present in all regions of the world. However, a new wave was observed after the aggression of Russia on Ukraine. This wave is not restricted to the English language but is clearly present in other local languages, e.g., Ukrainian, Polish, or Czech. Many examples of fake news in this context describe non-existing events. In order to study this phenomenon and ultimately provide tools to counter it, we concentrate on studying related news and tweets in two languages: Polish and English. However, the significant challenge in linking tweets to real events lies in the fact that tweets differ in nature from press articles. They are concise, with a maximum length of 280 characters, and are generally more informal in tone. Initially, topic models [31] were employed to address this challenge. However, these models proved inadequate in capturing the differences between tweets and articles, INTRODUCTION" 2312.07627v1,"Multimodal Sentiment Analysis: Perceived vs Induced Sentiments Aditi Aggrawal Department of Information Technology Delhi Technological University Delhi, India aditiagg99@gmail.com Dr. Deepika Varshney Department of Computer Science and Engineering Jaypee Institute of Information Technology, Delhi, India deepika.varshney@mail.jiit.ac.in (of Abstract—Social media has created a global network where people can easily access and exchange vast information. This information gives rise to a variety of opinions, reflecting both positive and negative viewpoints. GIFs stand out as a multimedia format offering a visually engaging way for users to communicate. In this research, we propose a multimodal framework that integrates visual and textual features to predict the GIF sentiment. It also incorporates attributes including face emotion detection and OCR generated captions to capture the semantic aspects of the GIF. The developed classifier achieves an accuracy of 82.7% on Twitter GIFs, which is an improvement over state-of-the-art models. Moreover, we have based our research on the ReactionGIF dataset, analysing the variance in sentiment perceived by the author and sentiment induced in the reader. Saurabh Patel Department of Information Technology Delhi Technological University Delhi, India srbhptl39@gmail.com Figure 1: Example of Perceived vs induced sentiment Keywords—multimodal, sentiment analysis, GIFs, visual, textual, twitter I. I NTRODUCTION People's emotions online can be genuine reactions, while also being influenced by what they see and interact with, creating a blend of authentic and induced feelings. This dynamic interplay of emotions reflects the diverse nature of online interactions. For example, someone might get excited about a new product trending online, even if they weren't initially interested. The information being shared online has taken diverse forms, including text, audio, visuals, or their combinations. Animated GIFs constitute one such format that has recently gained prominence online. A study of 3.7 million users suggests that these brief, silent, often low-resolution video clips are 55% more captivating than any other media format on Twitter 1 . The automatic detection of human emotions is a crucial aspect in affective computing, with applications in varied domains like marketing, psychology, education and customer service [1]. Drawing from music and films, emotions in text can be categorized as perceived emotions: recognized by readers, and induced emotions: aroused in readers. This distinction, except by Buechel in his work [2], is largely absent in NLP literature. Induced emotions can be gathered through physiological measurements or self-reporting, which is challenging due to complexity, cost, unreliability, and scalability involved in the process. To overcome such challenges, we have based our research on the use of Reaction https://buffer.com/resources 1 2 https://business.twitter.com/en/blog GIFs in online conversations, displaying “emotional responses to prior talk in text-mediated conversations"" [3]. The ReactionGIF dataset [4] captures in-the-wild texts, inherently supervised with Reaction GIFs and their respective induced labels. Figure I describes an example of perceived sentiment of a tweet vs two opposing sentiments induced in readers. Extensive research has been conducted on sentiment analysis, with applications ranging from forecasting political elections [5] to predicting box-office revenues [6] and economic indicators [7]. Most of the current sentiment analysis primarily focuses on textual data, however recently there has been a surge in popularity of visual content in the form of both images and videos. Notably, statistics show that memes and GIFs in tweets have significantly boosted user engagement 2 , increasing clicks by 18%, retweets by 150%, and favorites by 89%. To the best of our knowledge, the implicated sentiment in GIFs has received limited attention. In our study, we examine the sentiments of popular GIFs accompanied by extraction of OCR generated short text captions and human face emotion detection. These texts serve as annotations for the GIFs, enabling sentiment analysis. Furthermore, the low-level statistics of GIFs differ from those of natural videos or images due to their small size and illustrative style. Visual sentiment analysis involves complexities due to the high level of abstraction and subjectivity in human recognition, alongside various visual tasks like object and scene recognition." 2312.07658v1,"The hardness of quantum spin dynamics Chae-Yeun Park, 1, ∗ Pablo A M Casares, 1 Juan Miguel Arrazola, 1 and Joonsuk Huh 1, 2, 3, 4, † 1 Xanadu, Toronto, ON, M5G 2C8, Canada Department of Chemistry, Sungkyunkwan University, Suwon 16419, Korea 3 SKKU Advanced Institute of Nanotechnology (SAINT), Sungkyunkwan University, Suwon 16419, Korea 4 Institute of Quantum Biophysics, Sungkyunkwan University, Suwon 16419, Korea (Dated: December 14, 2023) 2 Recent experiments demonstrated quantum computational advantage in random circuit sampling and Gaussian boson sampling. However, it is unclear whether these experiments can lead to practical applications even after considerable research effort. On the other hand, simulating the quantum coherent dynamics of interacting spins has been considered as a potential first useful application of quantum computers, providing a possible quantum advantage. Despite evidence that simulating the dynamics of hundreds of interacting spins is challenging for classical computers, concrete proof is yet to emerge. We address this problem by proving that sampling from the output distribution generated by a wide class of quantum spin Hamiltonians is a hard problem for classical computers. Our proof is based on the Taylor series of the output probability, which contains the permanent of a matrix as a coefficient when bipartite spin interactions are considered. We devise a classical algorithm that extracts the coefficient using an oracle estimating the output probability. Since calculating the permanent is #P-hard, such an oracle does not exist unless the polynomial hierarchy collapses. With an anticoncentration conjecture, the hardness of the sampling task is also proven. Based on our proof, we estimate that an instance involving about 200 spins will be challenging for classical devices but feasible for intermediate-scale quantum computers with fault-tolerant qubits. I. INTRODUCTION There is great interest in demonstrating that quantum computers can outperform powerful supercomputers. The most successful paradigm so far involves showing that sampling from the output distribution of certain quantum circuits is classically difficult [1]. Three prominent examples of quantum sampling problems are Boson- Sampling [2], random circuit sampling (RCS) [3], and instantaneous quantum polynomial-time circuits (IQP) [4]. Theoretical works assert that a classical computer can only efficiently simulate the same tasks if the polynomial hierarchy (PH) collapses to the third level. Hence, under the widely believed conjecture that PH is infinite, those sampling tasks are classically intractable. Based on these theoretical suggestions, several experiments have realized RCS and a Gaussian variant of BosonSampling using noisy qubits [5] or photonic modes [6, 7]. However, the main drawback of these quantum advantage results is that they have little to do with practical applications. These circuits are designed to generate nearly random bitstrings, and despite several efforts [8], we have yet to find convincing practical applications. On the other hand, solving quantum many-body problems is expected to be the first useful application of quantum computers [9, 10]. Quantum many-body Hamiltonians describing interacting quantum particles are essential in physics, serving as models for various ranges of systems, from nuclei to materials [11]. As we are often ∗ chae-yeun@xanadu.ai † joonsukhuh@skku.edu interested in low-temperature physics, finding the properties of the lowest energy state, i.e., the ground state, of quantum many-body Hamiltonians has been the central problem over decades [12]. Indeed, many important questions in chemistry and materials science, such as the electronic, magnetic, and mechanical properties of molecules and materials, are answered by attributes of the ground state of these systems [13, 14]. Due to its importance, significant effort has been devoted to computing properties of the ground state, such as the ground-state energy [15]. However, it is well agreed that solving the ground-state energy problem of a large quantum many-body Hamiltonian with hundreds of interacting particles is highly challenging to a classical computer [16]. This fact is further supported by computational complexity theory, where it has been shown that finding the ground-state energy is QMA-hard [17] — a quantum version of NP-hard. Similar to NP-hard problems that are regarded as difficult for classical computers, it is widely believed that QMA-hard problems are challenging even for quantum computers [18]. Hence, we do not expect an efficient classical algorithm for finding the ground-state energy of an arbitrary Hamiltonian to exist. Recently, the quantum coherent dynamics of manybody systems have also gained considerable attention as they are related to experiments with engineered quantum systems [19] and also provide an avenue to understand quantum chaos [20]. The dynamical problem can, in principle, be more complicated than the ground-state problem because it involves a manifold containing many eigenstates, including the ground state. Despite such evidence, the hardness of quantum dynamics has only been proven for a limited class of Hamiltonians, such as Ising variants with commuting terms [21–24], or a spin model" 2312.07662v1,"Draft version December 14, 2023 Typeset using L A TEX twocolumn style in AASTeX631 The Global Asteroseismology Project Proof of Concept: Asteroseismology of Massive Stars with Continuous Ground-Based Observations Noi Shitrit 1 and Iair Arcavi 1 1 The School of Physics and Astronomy, Tel Aviv University, Tel Aviv 69978, Israel ABSTRACT Massive (≳ 8 M ⊙ ) stars are the progenitors of many astrophysical systems, yet key aspects of their structure and evolution are poorly understood. Asteroseismology has the potential to solve these open puzzles, however, sampling both the short period pulsations and long period beat patterns of massive stars poses many observational challenges. Ground-based single-site observations require years or decades to discern the main oscillation modes. Multi-site campaigns were able to shorten this time span, but have not been able to scale up to population studies on samples of objects. Space-based observations can achieve both continuous sampling and observe large numbers of objects, however, most lack the multi-band data that is often necessary for mode identification and removing model degeneracies. Here, we develop and test a new ground-based observational strategy for discerning and identifying the main oscillation modes of a massive star in a few months, in a way that can be scaled to large samples. We do so using the Las Cumbres Observatory - a unique facility consisting of robotic, homogeneous telescopes operating as a global network, overcoming most of the challenges of previous multi-site efforts, but presenting new challenges which we tailor our strategy to address. This work serves as the proof of concept for the Global Asteroseismology Project, which aims to move massive star asteroseismology from single-objects to bulk studies, unleashing its full potential in constraining stellar structure and evolution models. This work also demonstrates the ability of the Las Cumbres Observatory to perform multi-site continuous observations for various science goals. Keywords: Ground-based astronomy (686) — Astronomical methods (1043) — Astronomical techniques (1684) — Observational astronomy (1145) — Massive stars (732) — Asteroseismology (73) — Stellar interiors (1606) 1. INTRODUCTION Massive (≳ 8 M ⊙ ) stars, although rare, play a key role in many astrophysical processes. They have a relatively short and energetic life that often ends in a supernova explosion, driving chemical and mechanical feedback to their host galaxy while leaving behind a neutron star or black hole. However, key aspects in the structure and evolution of massive stars, such as the degree and profile of their internal chemical mixing, their metallicity, and their rotation profile, are poorly constrained observationally. One way forward is through asteroseismology, the study of the oscillations of stars and their connection Corresponding author: Noi Shitrit noyshitrit@tauex.tau.ac.il to the internal stellar structure. Pulsating early-type OB stars can be divided into several categories, (e.g. Bowman 2020; Aerts 2021; Kurtz 2022). The two main classes with oscillations primarily driven by cyclic variation in opacity (the so-called κ-mechanism) are slowly pulsating B-type (SPB) stars and β Cephei (hereafter, β Cep) type stars. SPB stars are intermediate mass stars, with a mass range of about 3 to 8 M ⊙ , while β Cep stars, on which we focus here, have masses in the range of about 8 to 25 M ⊙ . β Cep stars oscillate in low order p (pressure) and g (gravity) modes with periods between approximately 2 and 8 hours (Stankov & Handler 2005; Aerts et al. 2010; Bowman 2020). Some β Cep stars were found to have high-order g-modes with periods longer than a day (Handler et al. 2006, 2009). In general, they produce both short-pulsation periods (of order hours to days) and long-term beats (of order months) arising from ad-" 2312.07671v1,"Reacting like Humans: Incorporating Intrinsic Human Behaviors into NAO through Sound-Based Reactions for Enhanced Sociability Ali Ghadami 1, † , Mohammadreza Taghimohammadi 1, † , Mohammad Mohammadzadeh 1 , Mohammad Hosseinipour 2 , Alireza Taheri 1, * 1 Department of Mechanical Engineering, Sharif University of Technology, Tehran, Iran 2 Department of Computer Science, University of Padova, Padova, Italy Abstract Robots’ acceptability among humans and their sociability can be significantly enhanced by incorporating human-like reactions. Humans can react to environmental events very quickly and without thinking. An instance where humans display natural reactions is when they encounter a sudden and loud sound that startles or frightens them. During such moments, individuals may instinctively move their hands, turn toward the origin of the sound, and try to determine the event’s cause. This inherent behavior motivated us to explore this less-studied part of social robotics. In this work, a multi-modal system composed of an action generator, sound classifier, and YOLO object detector was designed to sense the environment and, in the presence of sudden loud sounds, show natural human fear reactions, and finally, locate the fear-causing sound source in the environment. These unique and valid generated motions and inferences could imitate intrinsic human reactions and enhance the sociability of robots. For motion generation, a model based on LSTM and MDN networks was proposed to synthesize various motions. Also, in the case of sound detection, a transfer learning model was preferred that used the spectrogram of sound signals as its input. After developing individual models for sound detection, motion generation, and image recognition, they were integrated into a comprehensive fear module that was implemented on the NAO robot. Finally, the fear module was tested in practical application and two groups of experts and non-experts filled out a questionnaire to evaluate the performance of the robot. Given our promising results, this preliminary exploratory research provides a fresh perspective on social robotics and could be a starting point for modeling intrinsic human behaviors and emotions in robots. Keywords: Human-Robot Interaction, motion generation, social robot, deep learning 1. Introduction These days, thanks to the rapid growth of robotic technology, robots’ usage has broadened in healthcare [1], industry [2], consultation [3], and a wide variety of other tasks they can perform. One of the most exciting examples of them is the humanoid robots. The vital property of these robots is their ability to interact with humans in a natural manner. They can act as friends [4], teachers [5], playmates for kids [6], and in general, perform like a real human among the people. Robots’ physical appearance and acceptance have recently received considerable attention in the field of HRI [7]. While the appearance of robots significantly affects their acceptability, their behaviors also play a critical role in determining their level of acceptance among humans. However, this does not happen in the absence of human-like behaviors in the robot’s conduct. Conventional human treatments and emotions arise from their instincts; for example, fear, upset, rage, happiness, and acts that are done unconsciously. Therefore, researchers have investigated numerous research to find out how they can make robots imitate human movements, hearing, and vision in different situations. Many equipment and methods have been developed, but one of the most impressive tools in this field is machine learning (ML). Machine learning models, especially deep models, can give robots the capability of showing proper reactions according to the incidents occurring around them. Movement in robots can be understood as functional and expressive movements [8]. The functional movements are designed to meet the designer’s purpose in inventing the robot, and the expressive activities are a set of actions that mirror the delicate acts that humans usually do. Expressive movements can be accompanied by Ekman’s basic emotions (i.e. fear, anger, joy, sadness, contempt, disgust, and surprise) [9], fatigue, mood, and other actions that are unnecessary for reaching the robot’s goal. Still, it is imperative to convince the users to accept the robot as a human [10]. A number of works have focused on environment-aware expressive motion generation. In [11], speech-driven robot gesture by generative adversarial network (GAN) approach was applied to the social robots, † Authors contributed equally to the manuscript. *Corresponding author: artaheri@sharif.edu , Tel: +982166165531 1" 2312.07677v1,"Schrödinger evolution of a scalar field in Riemannian and pseudoRiemannian expanding metrics Z. Haba Institute of Theoretical Physics, University of Wroclaw, 50-204 Wroclaw, Plac Maxa Borna 9, Poland ∗ We study the quantum field theory (QFT) of a scalar field in the Schrödinger picture in the functional formulation. We derive a formula for the evolution kernel in a flat expanding metric. We discuss a transition between Riemannian and pseudoRiemannian metrics (signature inversion). We express the real time Schrödinger evolution by the Brownian motion (Feynman-Kac formula). We discuss the Feynman integral for a scalar field in a radiation background. We show that the unitary Schrödinger evolution for positive time can go over for negative time into a dissipative evolution described by diffusive paths. I. INTRODUCTION A quantization of gravity leading to the unified theory of gravity-matter interaction is still an unsolved problem. The quantum gravity has its intrinsic problems as the ultraviolet divergencies or the notion of time. It may be that time arises from the Wentzel-Kramers-Brillouin (WKB) semi-classical expansion of the gravity-matter interaction (see [1] and references cited there) or from a special form of the (semi-classical) energy-momentum [2]. In this paper we assume that time is well-defined and study the path integral solution for the scalar field wave function evolution ψ t (Φ) in an external metric g αβ Z  i Z  √ dx −gL(g αβ , Φ) ψ 0 (Φ t (Φ)), ψ t (Φ) = DΦ(.) exp h̄ (1) where g = det(g µν ), L is the Lagrangian, Φ t (Φ) is the path starting from Φ at t = 0 and ψ 0 (Φ) is the initial state. We consider the path integral (1) for both Lorentzian and Euclidean metrics. We encountered the path integral (1) in the real time and with an inverted 2 signature in the upside-down oscillator (L ≃ ( dq dt ) + 2 2 2 ν q , ν > 0) which behaves like a free field theory with Euclidean signature [3][4] [5][6]. For a free field theory (quadratic Lagrangian) the evolution (1) has been studied by many authors (see e.g. [7] and references cited there). In this paper we obtain a formula for the time evolution (1) in the case of a homogeneous time-dependent metric (see some earlier results in [8][9][10]). The solution of the Schrödinger equation is expressed by a stochastic process (a Gaussian field). Using the time evolution for the free field we derive the time evolution for an interacting field by means of the Feynman-Kac formula. The time evolution can be calculated in perturbation theory using the free field evolution kernel. We assume the initial state ψ 0 = exp( h̄ i S 0 )χ in the WKB form. We show that if the initial state is Gaussian (χ = 1) then ψ t is also Gaussian. We expand ∗ Electronic address: zbigniew.haba@uwr.edu.pl the evolution of ψ 0 = exp( h̄ i S 0 )χ around the Gaussian state.We expect the caustic problems in the evolution kernel as they appear already in the Mehler formula for an oscillator. The problem can be approached for a small time by an ultraviolet regularization ( or a finite number of modes) and a subsequent continuation in time [11]. In this paper after a description in secs.2-3 of the Schrödinger evolution in the functional (stochastic) formulation (based on [12][3]) we concentrate on the model of a quantum scalar field in a background of radiation. The spatial metric g jk = δ jk a 2 ≃ δ jk t becomes degenerate at t = 0 and changes signature when t < 0. The solution of Einstein equations for radiation with a 2 = t < 0 is usually rejected as unphysical [13] (sec.112). However, it should be taken into account in quantum gravity when the functional integral (1) is over all metrics (the inverted signature can appear in functional integration as a saddle point). We discuss in detail the Schrödinger evolution (1) for various WKB initial states. We show that for some WKB states the unitary Schrödinger evolution for positive time can go over the singularity at time zero in a continuous way into a dissipative evolution described by diffusive paths. We compare this behavior with the one for a 2 ≃ |t| derived in the string inspired models [14]. We discuss briefly the Feynman-Kac formula for a trigonometric interaction showing that the perturbation expansion of an ultraviolet regularized field is convergent for a small time. The model studied in this paper delivers an example of the Gibbons-Hartle-Hawking suggestion [15][16] of a continuation of the time evolution by means of the path integral to the region of the Euclidean signature. In our model the signature is changing for a negative time (see also a similar model in [17]). In a forthcoming paper [18] we discuss some other models with signature inversion satisfying the ”no boundary condition” of ref.[15]." 2312.07694v1,"GP+: A Python Library for Kernel-based learning via Gaussian Processes Amin Yousefpour 1 , Zahra Zanjani Foumani 1 , Mehdi Shishehbor 1 , Carlos Mora 1 , and Ramin Bostanabad * 1 1 Department of Mechanical and Aerospace Engineering, University of California, Irvine Abstract In this paper we introduce GP+, an open-source library for kernel-based learning via Gaussian processes (GPs) which are powerful statistical models that are completely characterized by their parametric covariance and mean functions. GP+ is built on PyTorch and provides a user-friendly and object-oriented tool for probabilistic learning and inference. As we demonstrate with a host of examples, GP+ has a few unique advantages over other GP modeling libraries. We achieve these advantages primarily by integrating nonlinear manifold learning techniques with GPs’ covariance and mean functions. As part of introducing GP+, in this paper we also make methodological contributions that (1) enable probabilistic data fusion and inverse parameter estimation, and (2) equip GPs with parsimonious parametric mean functions which span mixed feature spaces that have both categorical and quantitative variables. We demonstrate the impact of these contributions in the context of Bayesian optimization, multi-fidelity modeling, sensitivity analysis, and calibration of computer models. Keywords: Gaussian processes, Python Library, Uncertainty Quantification, Kernel Methods, Manifold Learning, Bayesian Optimization. 1 Introduction Gaussian processes (GPs) are indispensable building blocks of many powerful probabilistic frameworks such as Bayesian optimization (BO) [1–11], function and operator learning [12–17], data-driven calibration of expensive simulations [18–23], and multi-fidelity (MF) modeling [24–28]. The recent software and hardware developments, combined with the new means of data collection and the society’s drive to tackle ever-challenging goals, have sparked significant innovations in the broad field of machine learning (ML). GPs have also substantially benefited from these advancements and recent works have enabled them to leverage GPUs [29, 30] and to accommodate high dimensions [31–35], large datasets [36–44], or disjoint feature spaces that have both qualitative and quantitative variables [16, 45–48]. In line with these advancements, in this paper we introduce GP+ which is a modular and user-friendly library that aims to empower researchers and practitioners in harnessing the full potential of GPs for a wide range of applications such as probabilistic metamodeling (aka emulation), single- and multi-fidelity Bayesian optimization (SFBO and MFBO), * Corresponding Author: Raminb@uci.edu GitHub Repository: https://github.com/Bostanabad-Research-Group/GP-Plus 1" 2312.07695v1,"Quantum-inspired protocol for measuring the degree of similarity between spatial shapes Daniel F. Urrego, 1, ∗ Gerard J. Machado, 2 and Juan P. Torres 1, 3 1 ICFO – Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, 08860 Castelldefels, Barcelona, Spain. 2 Department of Physics, Imperial College London, Prince Consort Road, SW7 2AZ London, United Kingdom. 3 Department of Signal Theory and Communications, Universitat Politecnica de Catalunya, 08034 Barcelona, Spain (Dated: December 14, 2023) We demonstrate in a proof-of-concept experiment spectral-domain optical coherence tomography where steering of the optical beam that probes the sample in a transverse scan does not make use of any mechanical element. Steering is done with the help of a spatial light modulator, that introduces a spatially-dependent phase between the two orthogonal polarization components of an optical beam, and some optical elements that control the polarization of light. We demonstrate that making use of the non-mechanical steering system considered here, we can reproduce the main traits of imaging with standard OCT that makes use of mechanical-assisted optical beam steering. I. INTRODUCTION Optical coherence tomography (OCT) is a threedimensional imaging technique introduced in 1991 that makes use of a Michelson interferometer, where light in one arm illuminates the sample and light in the other arm serves as a reference [1, 2]. The axial and transverse resolutions of OCT are independent. To obtain information in the transverse direction (plane perpendicular to the beam propagation), OCT focuses light to a small spot that is scanned over the sample. To obtain information in the axial direction (along the beam propagation), OCT uses a source of light with short coherence length that allows optical sectioning of the sample. OCT is nowadays an active area of research as well as a mature technnology [3–5] that finds applications in many areas of science and technology, from medicine, particularly ophthalmology [6–8] to art conservation studies [9, 10]. The first OCT schemes used time-domain OCT, where axial sectioning of the sample was done by moving a mirror in the reference arm with the help of a fast-moving mechanical platform, such as a Galvo scanner or a 2D translation stage. The translation of the mirror in the reference arm severely limited the imaging speed achievable. Stratus OCT, introduced in 2002, achieved speeds of ∼ 400 A- scans per second [11]. In 1995, Spectral or Fourier-domain OCT was a major breakthrough for the development and rapid expansion of OCT [12]. In spectral-domain OCT, axial sectioning of the sample is done measuring the spectrum of the light back-scattered from the sample with a ∗ Correspondence email address: daniel.urrego@icfo.eu spectrometer, eliminating the need to move the position of the mirror in the reference arm. OCT can also be done with a laser that changes fast its frequency (sweptsource OCT) [13], and both spectral-domain and sweptsource OCT schemes provides a better axial resolution than time-domain OCT [14, 15]. One advantage of sweptsource OCT is that a spectrometer is not required, only a broadband detector. Spectral-domain OCT is currently the standard for ophthalmic instruments, with imaging speeds in excess of ∼ 25, 000 A-scans per second [11]. In order to obtain an image of the sample with good transverse resolution, all the OCT schemes considered still require the use of a fast-moving mechanical device to scan a focused spot of light across the sample. We propose a significant innovation, demonstrated through a proof-of-concept experiment, which introduces a method for performing transverse scans of the sample without requiring a mechanical platform. The mechanical element is replaced by a spatial light modulator (SLM) in combination with some simple optical elements to modify the polarization of light [16]. We will show that by engineering the phase introduced by groups of pixels of the SLM, one can perform the transverse scan of the light beam without any mechanical scan needed. One word of caution might be appropriate here. We put forward a scheme, that in combination with spectraldomain OCT, allows to perform OCT fully in the optical domain without the need of any mechanical steering of the optical beam that probes the sample. Since we use a slowresponse spatial light modulator (Hamamatsu X10468), our proof-of-principle demonstration does not achieve the scan speeds of state-of-the-art OCT systems. In spite of this, it can help usher in the development of alternative" 2312.07704v1,"DISTRIBUTION OF THE ELEMENTAL REGRESSION WEIGHTS WITH t-DISTRIBUTED CO-VARIATE MEASUREMENT ERRORS I. Seidu 1 , E. Nyarko 1 , S. Iddi 1 , E. Ranganai 2 , and K. Doku-Amponsah 1,3 December 14, 2023 Abstract In this article, a heuristic approach is used to determined the best ap- Y 1 proximate distribution of , given that Y 1 , Y 2 are independent, and Y 1 + Y 2 each of Y 1 and Y is distributed as the F-distribution with common denomi- nator degrees of freedom. The proposed approximate distribution is subject to graphical comparisons and distributional tests. The proposed distribu- tion is used to derive the distribution of the elemental regression weight ω E , where E is the elemental regression set. Keywords: F-distribution, Distributional test, Elemental regression, Glivenko-Cantelli Lemma, Graphical comparison, Heuristic method. AMS Subject Classification: 60E05, 62E17, 62H15 1 University of Ghana, School of Physical and Mathematical Sciences, Department of Statistics and Actuarial Science 2 Department of Statistics, University of South Africa, Roodeport, South Africa. 3 Email address of the corresponding author: kdoku-amponsah@ug.edu.gh" 2312.07713v1,"L AGRANGIAN L IOUVILLE MODELS OF MULTIPHASE FLOWS WITH RANDOMLY FORCED INERTIAL PARTICLES Daniel Domínguez-Vázquez ∗ , Sergio A. Castiblanco-Ballesteros † , Gustaaf B. Jacobs ‡ Department of Aerospace Engineering San Diego State University San Diego, CA 92182, USA Daniel M. Tartakovsky § Department of Energy Science and Engineering Stanford University Stanford, CA 94305, USA A BSTRACT Eulerian-Lagrangian models of particle-laden (multiphase) flows describe fluid flow and particle dynamics in the Eulerian and Lagrangian frameworks respectively. Regardless of whether the flow is turbulent or laminar, the particle dynamics is stochastic because the suspended particles are subjected to random forces. We use a polynomial chaos expansion (PCE), rather than a postulated constitutive law, to capture structural and parametric uncertainties in the particles’ forcing. The stochastic particle dynamics is described by a joint probability density function (PDF) of a particle’s position and velocity and random coefficients in the PCE. We deploy the method of distributions (MoD) to derive a deterministic (Liouville-type) partial-differential equation for this PDF. We reformulate this PDF equation in a Lagrangian form, obtaining PDF flow maps and tracing events and their probability in the phase space. That is accomplished via a new high-order spectral scheme, which traces, marginalizes and computes moments of the high-dimensional joint PDF and comports with high-order carrier-phase solvers. Our approach has lower computational cost than either high-order Eulerian solvers or Monte Carlo methods, is not subjected to a CFL condition, does not suffer from Gibbs oscillations and does not require (order-reducing) filtering and regularization techniques. These features are demonstrated on several test cases. Keywords Multiphase flow · Particle-laden flow · Eulerian–Lagrangian · Lagrangian method of distributions · Random forcing · Flow map 1 Introduction The Eulerian-Lagrangian (EL) framework provides provides a natural way to describe particle-laden (multiphase) flows. It relies on an Eulerian formulation of conservation laws to describe fluid flow and a Lagrangian one to capture the particles dynamics. Within this framework, the scale of interest determines the selection of a particular model. The particle-resolved (PR) method and particle-resolved direct numerical simulations (PR-DNS) are used at a mesoscale, wherein the flow’s smallest scale is smaller than the particles’ size and is fully resolved (Tenneti et al., 2011; Tavanashad et al., 2021; Chéron et al., 2023a; Moriche et al., 2023). This strategy is computational prohibitive for large-scale problems, which typically rely on the point-particle assumption (Saffman, 1973; Crowe et al., 1977) and trace deterministic Lagrangian paths of individual volumeless particles according to an analytical or empirical forcing ∗ ddominguezvazquez@sdsu.edu scastiblancoballesteros@sdsu.edu ‡ Author to whom correspondence should be addressed: gjacobs@sdsu.edu § tartakovsky@stanford.edu †" 2312.07714v1,"Internal structure and analytical representation of preference relations defined on infinity-dimensional real vector spaces. Valentin V. Gorokhovik Institute of Mathematics, The National Academy of Sciences of Belarus, Minsk, Belarus ARTICLE HISTORY Compiled December 14, 2023 ABSTRACT The paper deals with partial and weak preference relations defined on infinitedimensional vector spaces and compatible with algebraic operations. By a partial preference we mean an asymmetric and transitive binary relation, while a weak preference is such a partial preference for which the indifference relation corresponding it is transitive (an indifference relation is the complement to the union of a partial preference and the reverse to it). Our first aim is to study the internal structure of compatible partial and weak preferences. We believe that the internal structure of a compatible partial preference is elementary if its positive cone is relatively algebraic open, and we refer to such compatible partial preferences as relatively open ones. It is proved that an arbitrary compatible partial preference is the disjunctive union of the partially ordered family of relatively open compatible partial preferences and, moreover, as an ordered set this family is an upper lattice. We identify the structure of this upper lattice with the internal structure of a compatible partial preference. The internal structure of compatible weak preferences is more refined: each compatible weak preference is the disjoint union of the chain (the linear ordering family) of relatively open compatible partial preferences the restriction of each of which to the linear hull of its positive cone is a weak preference. Using the chain characterizing the internal structure of a compatible weak preference we define a step-linear function that analytically represents this compatible weak preference. Further, we prove that each compatible partial preference can be regularly extended to a compatible weak preference and, moreover, each compatible partial preference is the intersection of its regular extensions to a compatible weak preference. Due to the latter assertion we obtain an analytical representation of a compatible partial preference by the family of step-linear functions. KEYWORDS Real vector spaces; compatible preference; positive cone; intrinsic core; internal structure; analytical representation; step-linear function 1. Introduction Preference relations are central objects in optimization theory (in particular, in vector optimization), decision making, mathematical economics, social sciences and others mathematical theories and their applications. A preference relation is generated by some ordering (it may be a preorder, a partial order, a strict partial order) which is Email: gorokh@im.bas-net.by ID: https://orcid.org/0000-0003-2447-5943" 2312.07747v1,"Recognizing Hereditary Properties in the Presence of Byzantine Nodes David Cifuentes-Núñez 1 , Pedro Montealegre 2 , and Ivan Rapaport 3 1 Departamento de Ingeniería Matemática, Universidad de Chile, Santiago, Chile dcifuentes@dim.uchile.cl 2 Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Santiago, Chile p.montealegre@uai.cl 3 Departamento de Ingeniería Matemática - Centro de Modelamiento Matemático (UMI 2807 CNRS), Universidad de Chile, Santiago, Chile rapaport@dim.uchile.cl Abstract. Augustine et al. [DISC 2022] initiated the study of distributed graph algorithms in the presence of Byzantine nodes in the congested clique model. In this model, there is a set B of Byzantine nodes, where |B| is less than a third of the total number of nodes. These nodes have complete knowledge of the network and the state of other nodes, and they conspire to alter the output of the system. The authors addressed the connectivity problem, showing that it is solvable under the promise that either the subgraph induced by the honest nodes is connected, or the graph has 2|B| + 1 connected components. In the current work, we continue the study of the Byzantine congested clique model by considering the recognition of other graph properties, specifically hereditary properties. A graph property is hereditary if it is closed under taking induced subgraphs. Examples of hereditary properties include acyclicity, bipartiteness, planarity, and bounded (chromatic, independence) number, etc. For each class of graphs G satisfying an hereditary property (an hereditary graph-class), we propose a randomized algorithm which, with high probability, (1) accepts if the input graph G belongs to G, and (2) rejects if G contains at least |B| + 1 disjoint subgraphs not belonging to G. The round complexity of our algorithm is    log (|G n |) O + |B| · polylog(n) , n where G n is the set of n-node graphs in G. Finally, we obtain an impossibility result that proves that our result is tight. Indeed, we consider the hereditary class of acyclic graphs, and we prove that there is no algorithm that can distinguish between a graph being acyclic and a graph having |B| disjoint cycles. Keywords: Byzantine protocols, congested clique, hereditary properties" 2312.07753v1,"Published as a conference paper at ICLR 2024 P OLYNOMIAL - BASED S ELF -A TTENTION FOR T ABLE R EPRESENTATION LEARNING Jayoung Kim, Yehjin Shin, and Noseong Park Yonsei University {jayoung.kim, yehjin.shin, noseong}@yonsei.ac.kr Structured data, which constitutes a significant portion of existing data types, has been a long-standing research topic in the field of machine learning. Various representation learning methods for tabular data have been proposed, ranging from encoder-decoder structures to Transformers. Among these, Transformer-based methods have achieved state-of-the-art performance not only in tabular data but also in various other fields, including computer vision and natural language processing. However, recent studies have revealed that self-attention, a key component of Transformers, can lead to an oversmoothing issue. We show that Transformers for tabular data also face this problem, and to address the problem, we propose a novel matrix polynomial-based self-attention layer as a substitute for the original self-attention layer, which enhances model scalability. In our experiments with three representative table learning models equipped with our proposed layer, we illustrate that the layer effectively mitigates the oversmoothing problem and enhances the representation performance of the existing methods, outperforming the state-of-the-art table representation methods. 1 I NTRODUCTION Out of the top 10 database management systems, 7 are relational databases, including Oracle, MySQL, and Microsoft SQL Server 1 . Likewise, structured data is one of the most common data types in the fields of data mining and machine learning. With the increasing focus on tabular data, several recent methods have demonstrated remarkable success in table representation, such as (Huang et al., 2020; Ucar et al., 2021; Somepalli et al., 2021; Majmundar et al., 2022), with many of them being Transformer-based methods. Normalized Magnitude A BSTRACT 1.0 Layer 1 Layer 7 Layer 12 0.8 0.6 0.4 0.2 0.0 −8 −4 0 4 8 Frequency Transformers have made significant advancements in deep learning, becoming state-of-the-art models in vari- Figure 1: Spectral response of an attenous domains, including computer vision and natural lan- tion map from TabTransformer (Huang guage processing (Vaswani et al., 2017; Radford et al., et al., 2020) 2018; Devlin et al., 2019; Gulati et al., 2020; Ying et al., 2021; Dosovitskiy et al., 2021; Touvron et al., 2021; Liu et al., 2021; Rampášek et al., 2022). However, recent studies have raised concerns about the potential limitations of self-attention, a fundamental component of Transformers, specifically an issue of oversmoothing (Dong et al., 2021; Wang et al., 2022; Guo et al., 2023; Xue et al., 2023). Gong et al. (2021); Zhou et al. (2021) has highlighted that at deeper layers of the Transformer architecture, all token representations tend to become nearly identical (Brunner et al., 2019). The problem poses challenges when it comes to expanding the scale of training Transformers, especially in terms of depth, since Transformers rely on a simple weighted average aggregation method for value vectors. In our preliminary experiments, we observe that Transformers designed for tabular data also exhibit the oversmoothing issue, as illustrated in Fig.1. As we go deeper into the layers, TabTrans- 1 https://db-engines.com/en/ranking 1" 2312.07773v1,"Exponential Asymptotics using Numerical Rational Approximation in Linear Differential Equations Christopher J. Lustri ∗1,3 , Samuel Crew 2,3 , and S. Jonathan Chapman 4 1 School of Mathematics and Statistics, The University of Sydney, New South Wales, 2006, Australia 2 Faculty of Computer Science, Ruhr Universität Bochum, Universitätsstraße, Bochum, 44799, Germany 3 Theoretical Sciences Visiting Program, Okinawa Institute of Science and Technology Graduate University, Onna, 904-0495, Japan. 4 Mathematical Institute, University of Oxford, Oxford, OX2 6GG, United Kingdom Abstract Singularly-perturbed ordinary differential equations often exhibit Stokes’ phenomenon, which de- scribes the appearance and disappearance of oscillating exponentially small terms across curves in the complex plane known as Stokes curves. These curves originate at singular points in the leading-order solution to the differential equation. In many important problems, it is impossible to obtain a closed- form expression for these leading-order solutions, and it is therefore challenging to locate these singular points. We present evidence that the analytic leading-order solution of a linear differential equation can be replaced with a rational approximation based on a numerical leading-order solution using the adap- tive Antoulas-Anderson (AAA) method. We show that the subsequent exponential asymptotic analysis accurately predicts the exponentially small behaviour present in the solution. We explore the limitations of this approach, and show that for sufficiently small values of the asymptotic parameter, this approach breaks down; however, the range of validity may be extended by increasing the number of poles in the ra- tional approximation. We finish by presenting a related nonlinear problem and discussing the challenges that arise when attempting to apply this method to nonlinear problems. 1 Introduction The behaviour known as “Stokes’ phenomenon” was first observed by George Gabriel Stokes in his analysis of solutions to the Airy equation [25, 26]. The Airy function displays oscillatory behaviour for large negative arguments, and decays exponentially for large positive arguments. Stokes wished to understand the transition between these two regimes by studying the large-argument asymptotic behaviour in the complex plane. In doing so, Stokes discovered that exponentially-small correction terms ∗ Electronic address: christopher.lustri@sydney.edu.au 1" 2312.07784v1,"1 Robust MRI Reconstruction by Smoothed Unrolling (SMUG) Shijun Liang, Student Member, IEEE, Van Hoang Minh Nguyen, Jinghan Jia, Student Member, IEEE, Ismail Alkhouri, Member, IEEE, Sijia Liu, Senior Member, IEEE, Saiprasad Ravishankar, Senior Member, IEEE Abstract—As the popularity of deep learning (DL) in the field of magnetic resonance imaging (MRI) continues to rise, recent research has indicated that DL-based MRI reconstruction models might be excessively sensitive to minor input disturbances, including worst-case additive perturbations. This sensitivity often leads to unstable, aliased images. This raises the question of how to devise DL techniques for MRI reconstruction that can be robust to train-test variations. To address this problem, we propose a novel image reconstruction framework, termed S MOOTHED U NROLLING (SMUG), which advances a deep unrolling-based MRI reconstruction model using a randomized smoothing (RS)-based robust learning approach. RS, which improves the tolerance of a model against input noises, has been widely used in the design of adversarial defense approaches for image classification tasks. Yet, we find that the conventional design that applies RS to the entire DL-based MRI model is ineffective. In this paper, we show that SMUG and its variants address the above issue by customizing the RS process based on the unrolling architecture of a DL-based MRI reconstruction model. Compared to the vanilla RS approach, we show that SMUG improves the robustness of MRI reconstruction with respect to a diverse set of instability sources, including worst-case and random noise perturbations to input measurements, varying measurement sampling rates, and different numbers of unrolling steps. Furthermore, we theoretically analyze the robustness of our method in the presence of perturbations. Our code is available at https://github.com/sjames40/SMUG_journal. Index Terms—Magnetic resonance imaging, machine learning, deep unrolling, robustness, randomized smoothing, compressed sensing. I. I NTRODUCTION Magnetic resonance imaging (MRI) is a popular noninvasive imaging modality, which involves sequential and slow data collection. As such, MRI scans can be accelerated by collecting limited data. In this case, the process of image reconstruction requires tackling an ill-posed inverse problem. To deliver accurate image reconstructions from such limited information, compressed sensing (CS) [1] has been extensively used. Conventional CS-MRI assumes the underlying image’s sparsity (in practice, enforced in the wavelet domain [2] or via total variation [3]). As further improvement to conventional CS, various learned sparse signal models have been well-studied, S. Liang (corresponding author: liangs16@msu.edu) is with the Biomedical Engineering (BME) Department at Michigan State University (MSU), East Lansing, MI, 48824, USA. J.Jia (jiajingh@msu.edu) is with the Computer Science and Engineering (CSE) Department at MSU. M. Nguyen (nguye954@msu.edu) is with the Mathematics Department at MSU. I. Alkhouri (alkhour3@msu.edu & ismailal@umich.edu) is with the Computational Mathematics, Science & Engineering (CMSE) Department at MSU and a visiting scholar in the Electrical Engineering & Computer Science Department at the University of Michigan, Ann Arbor, MI, 48109, USA. S. Liu (liusiji5@msu.edu) is with the CSE Department at MSU. S. Ravishankar (ravisha3@msu.edu) is with the CMSE & BME Departments at MSU. such as involving patch-based synthesis dictionaries [4], [5], or sparsifying transforms [6], [7]. Learned transforms have been shown to offer an efficient and effective framework for sparse modeling in MRI [8]. Due to the outstanding representation power of convolutional neural networks (CNNs), they have been applied in single-modality medical imaging synthesis in recent years [9]–[12]. The U-net neural network, presented in [13] and referenced in numerous studies, is a popular deep CNN for many tasks involving image processing. They exhibit two key features: the use of a diminishing path for gathering contextual information, and a symmetric expansion path in the U-net for precise localization. Hybrid-domain DL-based image reconstruction methods, such as Model-based reconstruction using Deep Learned priors (M O DL) [11], are used to enhance stability and performance by ensuring data consistency in the training and reconstruction phases. In MR imaging, data consistency layers are often essential in reconstruction networks to ensure the image agrees with the measurements model [14], [15]. Various methods such as [16], [17] maintain this consistency by deep unrollingbased architectures, which mimic a traditional iterative algorithm and learn the associated regularization parameters. Other approaches ensure data consistency by applying methods such as denoising regularization [18] and plug-and-play techniques [19]. Despite their recent advancements, DL-based MRI reconstruction models are shown to be vulnerable to tiny changes in the input, shifts in the measurement sampling rate [20], [21], and varying iteration numbers in unrolling schemes [22]. In such cases, the resulting images from DL models are of inferior quality which could possibly lead to inaccurate diagnoses and, consequently, undesirable clinical consequences. It is of much importance in medical imaging applications to learn reconstruction models that are robust to various measurement artifacts and noise, or scan or data variations at test time. Although there exist numerous robustification techniques [23]–[26] to tackle the instability of DL models in image classification tasks, methods to enhance the robustness of DL- based MRI reconstruction models are less explored due to their regression-based learning targets. Methods such as randomized smoothing (RS) and its variations [25]–[27], are often used in image classification. They diverge from traditional defense methods [23], [24] such as adversarial training, which provide some empirical robustness but are computationally expensive and could fail under more diverse perturbations. RS ensures the model’s stability within a radius surrounding the input image [25], which could be critical for medical use cases such as MRI. Recent early-stage research has begun to apply RS to" 2312.07785v1,"FERMILAB-TM-2816-AD-STUDENT SCHEME FOR QUANTITATIVE DESCRIPTION OF LONGITUDINAL DRIFTS IN THE FERMILAB LINAC AND THEIR CORRECTION S. Rego ∗1,2 , R. Sharankova †1 , A. Shemyakin ‡1 1 Fermi National Accelerator Laboratory, Batavia, IL, USA 2 École polytechnique, Palaiseau, France Abstract respect to the cavity RF reference line for every beam pulse. While the DTL has only 5 operational BPMs, the SCL is well instrumented with 3-4 BPMs per module. The BPM rms phase noise as reported in [2] is 0.1 ◦ of 201.25 MHz. The Fermilab Linac accepts the 0.75 MeV H- ions from the front end and accelerates them to 400 MeV for injection into the Booster. Day-to-day drifts of the longitudinal trajectory in the Linac, reconstructed from phase readings of Beam Position Monitors, are at the level of several degrees. They are believed to cause additional losses both in the Linac and Booster, and are addressed by empirically adjusting the phases of Linac cavities. This work explores the option of expressing these drifts in terms of phase shifts in two cavities at the low-energy part of the Linac. Such a description allows for a simplified visual representation of the drifts, suggests a clear algorithm for their compensation, and provides a tool for estimating efficiency of such compensation. The absolute value of the BPM phase is not calibrated and depends on cable length. However, these offsets are believed to be stable and, therefore, relative changes in BPM phases are meaningful, reflecting actual changes in beam arrival times. As an example, the changes of BPM phases over a week are shown in Figure 6b, with the scatter of several degrees. Such changes can cause additional losses in both Linac and Booster, and phases of several cavities are empirically adjusted in daily accelerator tuning to address the loss increase. INTRODUCTION The origin of the phase drifts has not been definitively identified. Some likely factors include fluctuations in the ambient temperature and humidity that affect cavity resonance frequencies as well as phase and energy of the beam coming out of the RFQ. One of the difficulties in correcting such phase drifts is to find a simple way to numerically describe them. In attempt to address that, in this paper we present an approach based on fitting of the observed drifts to measured responses of the BPMs to varying of the tank phases. The Fermilab Linac The Fermilab Linac [1] consists of a Drift Tube Linac (DTL), a transition section, and a Side Coupled Linac (SCL). A magnetron ion source produces a pulsed 35 keV H- beam, which is transported in the Low Energy Beam Transport (LEBT) line to the Radiofrequency Quadrupole (RFQ). The beam accelerated to 750 keV in the RFQ travels through the Medium Energy Beam Transport (MEBT) and enters the Linac. Paper layout An overview of the DTL and SCL is shown in Figure 1. The DTL consists of 207 drift tubes spread across 5 ""tanks"" and accelerates the beam to 116.5 MeV. The SCL has 448 cells grouped into 7 ""modules"" that accelerate the beam to 401.5 MeV. Since the sections operate at different frequencies (201.25 MHz and 805 MHz respectively), there is a transition section in between consisting of a bunching and vernier cavities for longitudinal matching between the sections. The layout of the paper is as follows. The first section outlines the proposed description and correction scheme. Next, we illustrate the idea using a simple toy model of a sinusoidal motion. The following section describes the method of measuring the responses of BPMs to variation of tank phases. In the section after that, the drifts in two separate weeks taken from the historical data log are analyzed. Finally, we discuss the results and conclude. During regular operation, the Linac outputs about 25 mA of beam current in 35 𝜇s long pulses at 15 Hz repetition rate with transmission efficiency ≥ 92%. PROPOSAL FOR DRIFT DESCRIPTION AND CORRECTION In single-particle tracking, the longitudinal motion is described in terms of deviations from motion of a synchronous particle. For the case of a linear accelerator, the synchronous particle is usually assigned to the motion of the centroid of the beam accelerated in the most optimal conditions. Drifts in the Linac The beam centroid position in the Linac is reported by 33 Beam Position Monitors (BPMs). The BPMs are 4-button electrostatic pickups that provide information about the beam transverse position as well as its longitudinal phase with Presently, the Linac doesn’t have tools to deduce the beam absolute energy and phase in its intermediate points to follow the same procedure. Since the BPMs report an average beam phase per beam pulse, in this paper, we deal only with ∗ sheldon.rego@polytechnique.edu † rshara01@fnal.gov ‡ shemyakin@fnal.gov 1" 2312.07796v1,"Harnessing Retrieval-Augmented Generation (RAG) for Uncovering Knowledge Gaps Joan Figuerola Hurtado Independent Researcher joanfihu@gmail.com Abstract We present a methodology for uncovering knowledge gaps on the internet using the Retrieval Augmented Generation (RAG) model. By simulating user search behaviour, the RAG system identifies and addresses gaps in information retrieval systems. The study demonstrates the effectiveness of the RAG system in generating relevant suggestions with a consistent accuracy of 93%. The methodology can be applied in various fields such as scientific discovery, educational enhancement, research development, market analysis, search engine optimization, and content development. The results highlight the value of identifying and understanding knowledge gaps to guide future endeavours. 1 Introduction A Large Language Model (LLM) [4] generates text-based responses, while RAG [3] is an AI framework used to enhance the quality of LLM-generated responses by grounding them on external sources of knowledge. These technologies combine to provide accurate, up-to-date information and improve the generative process of language models. 3 Methodology To identify knowledge gaps, we simulate user interactions with search engines in a structured process. Initially, we begin with a query and methodically review each search result until an answer is found. If the first top 10 results do not yield an answer, we generate up to four alternative queries and retrieve up to two documents per query, iterating through the search process again. The increasing number of users dissatisfied with the relevance of commercial search engine results is surprising, given the unprecedented access to vast information and sophisticated search technologies [1, 2]. In this paper, we employ the Retrieval Augmented Generation (RAG) model to simulate user search behaviour, aiming to identify and address knowledge gaps on the Internet. We posit that uncovering and bridging these gaps is crucial for enhancing the efficacy of information retrieval systems. 2 Related Work Yom. et. al [14] presents an algorithm to estimate query difficulty. Estimation is based on the agreement between the top results of the full query and the top results of its sub-queries. In doing so, difficult queries reveal gaps in a content library. The methodology is based on training an estimator based on a small dataset. We argue that there are now simpler LLM prompting techniques that do not require training a custom model and yield better generalisation across multiple domains. This is a preprint. It is not peer reviewed yet. Figure 1: Iteration loop to find knowledge gaps Our approach utilises AskPandi [12], a Retrieval-Augmented Generation (RAG) system, to mimic user behaviour. AskPandi integrates Bing's web index for data retrieval and GPT as a reasoning engine. After finding an answer, we capitalise on the in-context capabilities [5, 6, 7] of LLMs to generate a series of relevant follow-up questions. This process is guided by the premise that a well-generalised [8] LLM should provide useful" 2312.07815v1,"Mon. Not. R. Astron. Soc. 000, 1–18 (2023) Printed 14 December 2023 (MN L A TEX style file v2.2) Dwarfs in nearby voids: results of SALT spectroscopy S.A. Pustilnik, 1⋆ A.Y. Kniazev, 2,3,4 A.L. Tepliakova, 1 Y.A. Perepelitsyna, 1 E.S. Egorova 4,5 1 Special Astrophysical Observatory of RAS, Nizhnij Arkhyz,Karachai-Circassia 369167, Russia 2 South African Astronomical Observatory, PO Box 9, 7935 Observatory, Cape Town, South Africa 3 Southern African Large Telescope Foundation, PO Box 9, 7935 Observatory, Cape Town, South Africa 4 Sternberg Astronomical Institute, Lomonosov Moscow State University, Universitetskij Pr. 13, Moscow 119992, Russia 5 Astronomisches Rechen-Institut, Zentrum für Astronomie der Universität Heidelberg, Mönchhofstraße 12-14, 69120 Heidelberg, Germany Accepted December ??, 2023, Received August 20, 2023 ABSTRACT In the framework of the ongoing project, aimed at the systematical studying galaxies in nearby voids, we conducted spectroscopy with the Southern African Large Telescope (SALT) of 62 objects from the Nearby Void Galaxy (NVG) sample. They include 8 remaining objects of the 60 preselected candidates to eXtremely Metal-Poor (XMP) dwarfs, two known void XMP dwarfs and 52 void dwarfs residing within the Local Volume. For 47 galaxies residing in the nearby voids, we obtained spectra of the diverse quality. For 42 of them, we detected the Hydrogen and Oxygen lines that allowed us to get estimates of O/H in the observed Hii regions. For 12 of the 42 objects, we detected the faint line [Oiii]λ4363, that allowed us to directly derive the electron temperature T e and obtain their gas O/H by the direct method. 14 objects with the undetected [Oiii]λ4363 line fall to the lowest metallicities range (12+log(O/H) ≲ 7.5 dex). For them, we use a carefully checked new empirical ’Strong line’ method of Izotov et al. For 14 other objects with only strong lines detected and with 12+log(O/H) of ∼7.5– 8.0 dex, we used the modified version of ’semi-empirical’ method of Izotov and Thuan. It accounts for effect of the excitation parameter O 32 on T e . 16 new galaxies are found with parameter 12+log(O/H) ≲ 7.39 dex. Of them, four have 12+log(O/H) = 7.07 – 7.20 dex. Of the 60 observed NVG objects, 15 have mistaken radial velocities in HyperLEDA. They do not reside in the nearby voids. Key words: galaxies: dwarf – galaxies: evolution – galaxies: redshifts – galaxies: abundances – cosmology: large-scale structure of Universe 1 INTRODUCTION Voids represent the most rarefied and the largest volume elements of the Large-Scale Structure of the Universe. Despite galaxies residing in voids comprise a relatively small fraction of the whole realm of galaxies (van de Weygaert 2016), they are the important ’bricks’ of our picture of the general galaxy evolution. Thus, Aragon-Calvo & Szalay (2013) predict the unusual properties of void structures and their galaxies due to the ’time machine and cosmic microscope’ effects of the void environment. A more detailed modelling of the void galaxy evolution is necessary to compare their predicted properties with the observed ones. In particular, one needs the high resolution simulations in order to address the small dwarfs with the baryonic mass of 10 6 – some 10 8 M ⊙ . Namely for this mass range, the observations (see below) demonstrate significant ⋆ E-mail: sap@sao.ru (SAP) differences with the properties of galaxies in denser environments. The effect of environment on evolution is expected to be stronger for the lower mass objects. Since all known widearea spectral sky surveys have the similar limiting apparent magnitude of B (or r) of ∼18.5, to have a representative galaxy sample to, e.g., M B = –10 to –12, one should explore the volume with the distances of R ≲ 20–25 Mpc. This choice differs substantially from many studies of void galaxy samples in more distant voids (∼80–200 Mpc), which probe properties of only the upper part of the galaxy luminosity function (e.g., Rojas et al. 2005; Patiri et al. 2006; Kreckel et al. 2012, and references therein). An alternative approach related to the study of galaxies in the nearby voids, was suggested and partly realised by our group. The first step in this direction was the formation and studying of the galaxy sample in the nearby void Lynx- Cancer (Pustilnik & Tepliakova 2011; Pustilnik et al. 2016, and references therein). In particular, it was found that void galaxies as a whole are less evolved in average as compared" 2312.07837v1,"Synthetic Data: Can We Trust Statistical Estimators? Alexander Decruyenaere °*† , Heidelinde Dehaene °*† , Paloma Rabaey §† , Christiaan Polet *† , Johan Decruyenaere *† , Stijn Vansteelandt † , Thomas Demeester §† * Ghent University Hospital – SYNDARA § imec † Ghent University {firstname.lastname}@ugent.be Abstract The increasing interest in data sharing makes synthetic data appealing. However, the analysis of synthetic data raises a unique set of methodological challenges. In this work, we highlight the importance of inferential utility and provide empirical evidence against naive inference from synthetic data (that handles these as if they were really observed). We argue that the rate of false-positive findings (type 1 error) will be unacceptably high, even when the estimates are unbiased. One of the reasons is the underestimation of the true standard error, which may even progressively increase with larger sample sizes due to slower convergence. This is especially problematic for deep generative models. Before publishing synthetic data, it is essential to develop statistical inference tools for such data. 1 Introduction In recent years, the use of synthetic data as a privacy-preserving substitute for real sensitive data has been gaining attention (Drechsler, 2011; Raab et al., 2016; Raghunathan, 2021). Synthetic data are artificial data that mimic the original data in terms of statistical properties, without revealing any individual records (Chen et al., 2021). As such, synthetic data might be able to replace the original data in statistical analysis, while preserving the privacy of the individuals of the original dataset and thereby fulfilling the regulatory privacy constraints. This is especially appealing for medical research (Jordon et al., 2022; Zhang et al., 2020). Synthetic data can be generated using statistical techniques or deep learning (DL) approaches such as GANs and VAEs (Hernandez et al., 2022). √ Statistical inference is typically based on N -consistency and asymptotic normality (Boos and Stefanski, 2013). In this work, we empirically provide evidence against naive inference from synthetic data, whereby synthetic data are treated as if they were actually observed. First, the extra uncertainty coming from the fact that the data were generated by a predictive model themselves should be acknowledged. Otherwise, this will yield estimators with standard errors (SEs) that are too optimistically small (Raab et al., 2016). Second, the regularisation bias inherent to data-adaptive (DL) techniques (i.e., their bias-variance trade-off is optimised with respect to the prediction error instead of the error in the estimator) may diminish too slowly as the sample size grows larger, causing excess variability that is difficult to systematically account for (Brain and Webb, 1999; Hines √ et al., 2022). This may deliver estimators that are biased and/or whose SE converges slower than 1/ N . The remainder of this paper is structured as follows. In Section 2, we introduce a framework that allows us to empirically assess the behaviour of statistical estimators when it is (incorrectly) assumed that synthetic data can be treated like original data. We consider a setting with low-dimensional tabular data that is commonly featured in applied research. Section 3 discusses the statistical properties of the estimators and addresses how to correct for some of the added variability inherent to synthetic data in the model-based SE, as originally proposed by Raab et al. (2016). Section 4 presents the results of our simulation study, draws attention to the difference in inferential utility between synthetic data generated through statistical vs. DL techniques, and elaborates on why the corrected SE fails with DL techniques. Finally, Section 5 provides some concluding remarks and hints at future work. °Joint first authors. 1st Workshop on Deep Generative Models for Health at NeurIPS 2023." 2312.07841v1,"Journal of Machine Learning Research 24 (2023) 1-62 Submitted 6/23; Revised 10/23; Published 12/23 On the Dynamics Under the Unhinged Loss and Beyond Xiong Zhou Xianming Liu ∗ Hanzhang Wang Deming Zhai Junjun Jiang cszx@hit.edu.cn csxm@hit.edu.cn cswhz@hit.edu.cn zhaideming@hit.edu.cn jiangjunjun@hit.edu.cn School of Computer Science and Technology Harbin Institute of Technology Harbin, 150001, China Xiangyang Ji xyji@tsinghua.edu.cn Department of Automation Tsinghua University Beijing, 100084, China Editor: Samy Bengio Abstract Recent works have studied implicit biases in deep learning, especially the behavior of lastlayer features and classifier weights. However, they usually need to simplify the intermediate dynamics under gradient flow or gradient descent due to the intractability of loss functions and model architectures. In this paper, we introduce the unhinged loss, a concise loss function, that offers more mathematical opportunities to analyze the closed-form dynamics while requiring as few simplifications or assumptions as possible. The unhinged loss allows for considering more practical techniques, such as time-vary learning rates and feature normalization. Based on the layer-peeled model that views last-layer features as free optimization variables, we conduct a thorough analysis in the unconstrained, regularized, and spherical constrained cases, as well as the case where the neural tangent kernel remains invariant. To bridge the performance of the unhinged loss to that of Cross-Entropy (CE), we investigate the scenario of fixing classifier weights with a specific structure, (e.g., a simplex equiangular tight frame). Our analysis shows that these dynamics converge exponentially fast to a solution depending on the initialization of features and classifier weights. These theoretical results not only offer valuable insights, including explicit feature regularization and rescaled learning rates for enhancing practical training with the unhinged loss, but also extend their applicability to other loss functions. Finally, we empirically demonstrate these theoretical results and insights through extensive experiments. Keywords: implicit bias, neural collapse, gradient flow, gradient descent 1 Introduction Deep learning with neural networks has achieved great success in a variety of tasks (LeCun et al., 2015), which, however, is not entirely understood in the interpolation and generalization of the learned models (Zhang et al., 2017; Neyshabur et al., 2017; Nakkiran et al., ∗. The corresponding author ©2023 Xiong Zhou, Xianming Liu, Hanzhang Wang, Deming Zhai, Junjun Jiang, and Xiangyang Ji. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/v24/23-0771.html." 2312.07851v1,"Proceedings of Machine Learning Research vol vvv:1–18, 2024 Noise in the reverse process improves the approximation capabilities of diffusion models Karthik Elamvazhuthi 1 Samet Oymak 2 Fabio Pasqualetti 1 KARTHIKE @ UCR . EDU OYMAK @ UMICH . EDU FABIOPAS @ ENGR . UCR . EDU 1. University of California, Riverside 2. University of Michigan Abstract In Score based Generative Modeling (SGMs), the state-of-the-art in generative modeling, stochastic reverse processes are known to perform better than their deterministic counterparts. This paper delves into the heart of this phenomenon, comparing neural ordinary differential equations (ODEs) and neural stochastic differential equations (SDEs) as reverse processes. We use a control theoretic perspective by posing the approximation of the reverse process as a trajectory tracking problem. We analyze the ability of neural SDEs to approximate trajectories of the Fokker-Planck equation, revealing the advantages of stochasticity. First, neural SDEs exhibit a powerful regularizing effect, enabling L 2 norm trajectory approximation surpassing the Wasserstein metric approximation achieved by neural ODEs under similar conditions, even when the reference vector field or score function is not Lipschitz. Applying this result, we establish the class of distributions that can be sampled using score matching in SGMs, relaxing the Lipschitz requirement on the gradient of the data distribution in existing literature. Second, we show that this approximation property is preserved when network width is limited to the input dimension of the network. In this limited width case, the weights act as control inputs, framing our analysis as a controllability problem for neural SDEs in probability density space. This sheds light on how noise helps to steer the system towards the desired solution and illuminates the empirical success of stochasticity in generative modeling. Keywords: Diffusion Models; Neural Stochastic Differential Equations; Universal Approximation; Controllability 1. INTRODUCTION Generative modeling, an important tool in machine learning, addresses the challenge of drawing new samples from an unknown data distribution when provided with a set of data samples. Among the cutting-edge techniques in this domain are Score Based Generative Models (SGMs) Ho et al. (2020); Song et al. (2020); Yang et al. (2022), which hold promising applications in diverse fields such as medical imaging Chung and Ye (2022), path planning Yang et al. (2022), and shape generation Zhou et al. (2021). SGMs employ two distinct processes: a forward process that gradually transforms the data distribution into a noise distribution, and a reverse process that retraces the trajectories of the forward process in reverse, effectively mapping the noise distribution back to the data distribution. Multiple choices exist for the reverse process. One can opt for a deterministic reverse process, known as the probabilistic flow ODE, or a stochastic reverse process. It has been observed in practice that Song et al. (2020) that stochastic reverse process performs better than the deterministic one. This paper delves into the implications of choosing between these two approaches from the standpoint © 2024 K. Elamvazhuthi, S. Oymak & F. Pasqualetti." 2312.07852v1,"Recording provenance of workflow runs with RO-Crate Simone Leo 1* , Michael R. Crusoe 2,3,4 , Laura Rodrı́guez-Navas 5 , Raül Sirvent 5 , Alexander Kanitz 6,7 , Paul De Geest 8 , Rudolf Wittner 9,10,11 , Luca Pireddu 1 , Daniel Garijo 12 , José M. Fernández 5 , Iacopo Colonnelli 13 , Matej Gallo 9 , Tazro Ohta 14,15 , Hirotaka Suetake 16 , Salvador Capella-Gutierrez 5 , Renske de Wit 2 , Bruno P. Kinoshita 5 , Stian Soiland-Reyes 17,18 December 14, 2023 1 Center for Advanced Studies, Research, and Development in Sardinia (CRS4), Pula (CA), Italy 2 Vrije Universiteit Amsterdam, Amsterdam, The Netherlands 3 DTL Projects, The Netherlands 4 Forschungszentrum Jülich, Germany 5 Barcelona Supercomputing Center, Barcelona, Spain 6 Biozentrum, University of Basel, Basel, Switzerland 7 Swiss Institute of Bioinformatics, Lausanne, Switzerland 8 VIB Data Core, Gent, Belgium 9 Faculty of Informatics, Masaryk University, Brno, Czech Republic 10 Institute of Computer Science, Masaryk University, Brno, Czech Republic 11 BBMRI-ERIC, Graz, Austria 12 Ontology Engineering Group, Universidad Politécnica de Madrid, Madrid, Spain 13 Computer Science Dept., Università degli Studi di Torino, Torino, Italy 14 Database Center for Life Science, Joint Support-Center for Data Science Research, Research Organization of Information and Systems, Shizuoka, Japan 15 Institute for Advanced Academic Research, Chiba University, Chiba, Japan 16 Sator, Inc., Tokyo, Japan 17 Department of Computer Science, The University of Manchester, Manchester, United Kingdom 18 Informatics Institute, University of Amsterdam, Amsterdam, The Netherlands * simone.leo@crs4.it Abstract Recording the provenance of scientific computation results is key to the support of traceability, reproducibility and quality assessment of data products. Several data models have been explored to address this need, providing representations of workflow plans and their executions as well as means of packaging the resulting information for archiving and sharing. However, existing approaches tend to lack interoperable adoption across workflow management systems. In this work we present Workflow Run RO-Crate, an extension of RO-Crate (Research Object Crate) and Schema.org to capture the provenance of the execution of computational workflows at different levels of granularity and bundle together all their associated products (inputs, outputs, code, etc.). The model is supported by a diverse, open community that runs regular meetings, discussing development, maintenance and adoption aspects. Workflow Run RO-Crate is already implemented by several workflow management systems, allowing interoperable comparisons between workflow runs from heterogeneous systems. We describe the model, its alignment to standards such as W3C PROV, and its implementation in six 1/34" 2312.07858v1,"1 Non-myopic Beam Scheduling for Multiple Smart Target Tracking in Phased Array Radar Network Yuhang Hao, Zengfu Wang, José Niño-Mora, Jing Fu, Min Yang, and Quan Pan Abstract—A smart target, also referred to as a reactive target, can take maneuvering motions to hinder radar tracking. We address beam scheduling for tracking multiple smart targets in phased array radar networks. We aim to mitigate the performance degradation in previous myopic tracking methods and enhance the system performance, which is measured by a discounted cost objective related to the tracking error covariance (TEC) of the targets. The scheduling problem is formulated as a restless multi-armed bandit problem (RMABP) with state variables, following the Markov decision process. In particular, the problem consists of parallel bandit processes. Each bandit process is associated with a target and evolves with different transition rules for different actions, i.e., either the target is tracked or not. We propose a non-myopic, scalable policy based on Whittle indices for selecting the targets to be tracked at each time. The proposed policy has a linear computational complexity in the number of targets and the truncated time horizon in the index computation, and is hence applicable to large networks with a realistic number of targets. We present numerical evidence that the model satisfies sufficient conditions for indexability (existence of the Whittle index) based upon partial conservation laws, and, through extensive simulations, we validate the effectiveness of the proposed policy in different scenarios. Index Terms—Target tracking, beam scheduling, restless bandits, Whittle index. I. I NTRODUCTION TATE-of-the-art sensor scheduling approaches have enabled higher flexibility for tracking smart targets through phased array radar networks, where real-time beam direction control is handled electronically [1]–[3]. Dynamic tracking of smart targets, which have the ability to be aware that they are being tracked and adapt their dynamics accordingly to hinder S Yuhang Hao is with the School of Automation, Northwestern Polytechnical University, and the Key Laboratory of Information Fusion Technology, Ministry of Education, Xi’an, Shaanxi, 710072, China. Part of this work is performed during his research stay in the Department of Statistics at Carlos III University of Madrid, Spain. Zengfu Wang, Min Yang, Quan Pan are with the School of Automation, Northwestern Polytechnical University, and the Key Laboratory of Information Fusion Technology, Ministry of Education, Xi’an, Shaanxi, 710072, China. José Niño-Mora is with the Department of Statistics, Carlos III University of Madrid, Getafe, Madrid, 28903, Spain. Jing Fu is with School of Engineering, RMIT University, Melbourne, VIC, 3000, Australia. E-mail: (yuhanghao@mail.nwpu.edu.cn; wangzengfu@nwpu.edu.cn; jose.nino@uc3m.es; jing.fu@rmit.edu.au; sdta ym717@mail.nwpu.edu.cn; quanpan@nwpu.edu.cn). (Corresponding author: Zengfu Wang.) This work was in part supported by the National Natural Science Foundation of China (grant no. U21B2008, 62233014). The work of J. Niño-Mora was funded in part by Spain’s State Research Agency (AEI) project PID2019- 109196GB-I00/AEI/10.13039/501100011033. tracking accuracy, has drawn recent research attention [4]–[6]. Hence, beam scheduling in radar networks with a trade-off between frequency of tracking and probability of maneuvering is complicated and of importance in smart-target tracking. In this paper, we address a model to minimize the expected total discounted error for tracking smart targets through dynamic beam scheduling [7], [8]. Resource scheduling in radar systems has been mostly addressed through myopic policies. In [9], the challenge of antenna selection within a distributed multi-radar system was formulated as a knapsack problem, with the Cramér–Rao lower bound (CRLB) being regarded as the objective function. By exploring the multi-start knapsack tree, a local search algorithm with a multi-start strategy was adapted to solve the problem. In [10]–[18], at each time, once obtaining the estimation of the target dynamic states, the predicted onestep posterior CRLB (PCRLB) is calculated and used as the optimization metric to allocate resources for the next time step. However, in general, myopic scheduling policies exhibit inevitable performance degradation in the long run [19]. Non-myopic scheduling policies based on predicted multistep objective functions or on partially observed Markov decision processes (POMDPs) [20] have been investigated in a wide range of settings. In [19], a bee colony algorithm with particle swarm optimization (PSO) was introduced to optimize a multi-step objective function representing operational risk. In [21], [22], the joint multi-target probability density (JMPD) was recursively estimated by particle filtering methods, and the maximum expected Rényi divergence between the JMPD and the JMPD recalculated with a new derived measurement was considered for long-term performance optimization. In [21], two information-directed approaches were presented to approximate the long-term effects of each action. One is a path searching approach, aiming to reduce the computational complexity of a full Monte Carlo search. The other one approximates an action’s long-term benefit through a distinct function, expressed in relation to “opportunity cost” or “regret”. In [22], a non-myopic sensor scheduling method leveraging the POMDP framework was utilized to improve long-term performance. In [23], a smart target tracking problem was modeled as a POMDP using the PCRLB as system state and multi-step cost prediction over unscented sampling. An improved decision tree search algorithm leveraging branch and bound was used to achieve non-myopic scheduling op-" 2312.07875v1,"Enhance Sketch Recognition’s Explainability via Semantic Component-Level Parsing Guangming Zhu 1,2,3 , Siyuan Wang 1 , Tianci Wu 1 , Liang Zhang 1,2,3, * 1 School of Computer Science and Technology, Xidian University, China Key Laboratory of Smart Human-Computer Interaction and Wearable Technology of Shaanxi Province 3 Xi’an Key Laboratory of Intelligent Software Engineering gmzhu@xidian.edu.cn, siyuanwang@stu.xidian.edu.cn, 22031212495@stu.xidian.edu.cn, liangzhang@xidian.edu.cn 2 Abstract Free-hand sketches are appealing for humans as a universal tool to depict the visual world. Humans can recognize varied sketches of a category easily by identifying the concurrence and layout of the intrinsic semantic components of the category, since humans draw free-hand sketches based a common consensus that which types of semantic components constitute each sketch category. For example, an airplane should at least have a fuselage and wings. Based on this analysis, a semantic component-level memory module is constructed and embedded in the proposed structured sketch recognition network in this paper. The memory keys representing semantic components of each sketch category can be self-learned and enhance the recognition network’s explainability. Our proposed networks can deal with different situations of sketch recognition, i.e., with or without semantic components labels of strokes. Experiments on the SPG and SketchIME datasets demonstrate the memory module’s flexibility and the recognition network’s explainability. The code and data are available at https://github.com/GuangmingZhu/SketchESC. Introduction Free-hand sketch is a universal tool to depict the visual world, and it is not bound by age, race, language, geography, or national boundaries. Sketch images are highly sparse, abstract and lack of background. Sketch can be regarded as an expression of the human brain’s internal representation of the visual world (Xu et al. 2022). Humans can recognize sketches and identify the intrinsic semantic components easily, even sketches of the same category drawn by different persons may be very different in appearance. Sketch can be represented as an image in the static pixel space, as a time series in the dynamic stroke coordinate space, or as a graph in the geometric graph space. This results in various Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), and Graph Neural Network (GNN) based methods for sketch recognition (Zhang et al. 2019; Xu et al. 2022). These methods usually take image- or Scalable Vector Graphics (SVG)- format data as input, and predict the category label for a given sketch sample. However, there is lacking of work on interpreting the reason of giving such predictions. * Corresponding Author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Explainable artificial intelligence (XAI) has become a hot research topic to explain models’ decision (Ramaswamy et al. 2020; Shitole et al. 2021; Garau et al. 2022). Visualizing the activation maps of deep neural networks is widely used in computer vision. However, sketch images composed of stroke lines without textures, are different from natural images. This means that the existing XAI methods cannot be applied directly in the sketch research field. A first look at explainability for human sketches was achieved by SketchXAI using the counterfactual explanation (Qu et al. 2023). The stroke location inversion module in SketchXAI offers an explainability angle to sketch in terms of asking a network how well it can recover stroke locations of an unseen sketch. Liu et al. developed an image classifier explanation model using the counterfactual maps, in which the counterfactual map generator module is used to identify the critical structures for the specific category (Liu et al. 2023). Counterfactual explanation (CE), as a post-hoc explainability method, aims to identify what are the minimal input changes for a model to make a different visual decision (Van Looveren and Klaise 2021). SketchXAI (Qu et al. 2023) used CE to relocate reshuffled strokes to construct a sketch given a category, while Liu et al. designed a counterfactual map generator to discover the stroke-level principal components for a specific category (Liu et al. 2023). The above two methods try to explain the question of “why the sketch is classified as X” by providing positive and negative semantic explanation evidences. However, we believe that the concurrence and layout of the intrinsic semantic components of a category can be a crucial evidence to explain the question from another perspective. For example, taking into consideration the common knowledge that an airplane should at least have a fuselage and wings, if a sketch is composed of strokes which can be semantically grouped into a fuselage and wings, it probably is an airplane. As to the analysis above, we propose to enhance sketch recognition’s explainability via semantic component-level parsing. Specifically, a Semantic Component-level Memory (SCM) module is constructed, whose memory keys represent the semantic components of different sketch categories. The SCM module is embedded in a Structured Sketch Recognition (SSR) network, and evolves the stroke features based on the similarity with the learnable features of memory keys. The fused stroke-level or component-level" 2312.07878v1,"Contextual resource integration patterns for information retrieval New Kids on the Block: On the impact of information retrieval on contextual resource integration patterns Extended Abstract Martin Semmann Universität Hamburg, Germany martin.semmann@uni-hamburg.de Mahei Manhai Li University of Kassel, Germany University of St.Gallen, Switzerland mahei.li@uni-kassel.de Introduction The rise of new modes of interaction with AI skyrocketed the popularity, applicability, and amount of use cases. Despite this evolution, conceptual integration is falling behind. Studies suggest that there is hardly a systematization in using AI in organizations (Uba et al., 2023). Thus, by taking a service-dominant logic perspective, specifically, the concept of resource integration patterns, the most potent application of AI for organizational use - namely information retrieval - is analyzed. In doing so, the paper proposes a systematization that can be applied to deepen understanding of core technical concepts, further investigate AI in contexts, and help explore research directions guided by SDL. With the public unveiling of openAI in November 2022, generative AI (genAI) has garnered much attention in both academic (Böhmann et al., 2023; Wessel et al., 2023) and industry circles (McKinsey, 2023). Recent studies on the potential of genAI, which largely rely on large language model (LLM) systems, ranging from automatization (Engel et al., 2023) to improving knowledge work (Anthony et al., 2023; Dell'Acqua et al., 2023) to creating novel business models (Kanbach et al., 2023). However, with the generation of novel content, LLM users are at risk of being presented with factually incorrect data – so-called hallucinations (Blom, 2010), which are hard to discern from factually correct ones (Jia et al 2023). Researchers have turned toward two different research approaches: The first approach to address the hallucination problem is to increase output by integrating the human actor into the generative AI system. For example, the hallucination detection task can be directly sourced to the human end-users. This means that explainable AI service elements are presented in tandem with the generative AI system output to help users discern its factual validity (e.g. (Kadavath et al., 2022; Manakul et al., 2023). Another example approach focuses on the alterations of prompts via different instruction methods, such as zero-shot or few-shot learning, or by applying different contexts and leading the generative AI system toward a desirable output through chaining (Chase, 2022/2022). The second approach focuses on different retrieval-augmented generation types to improve the factuality of gen-AI outputs (e.g.: (Asai et al., 2023; Jiang et al., 2023)). One viable approach relies on integrating other subsystems that are not inherently part of the LLM, such as by deploying knowledge graphs (Martino et al., 2023). Knowledge graphs are factual knowledge representations and have long been used to assure the content quality of Q&A chatbots (Ait-Mlouk & Jiang, 2020; P. Sukhwal et al., 2022; P. C. Sukhwal et al., 2023) or to discover and retrieve information (Banerjee, Yimam, et al., 2023). Recently, KGs have been deployed to influence generative AI systems toward providing factual assurance (Ji et al., 2023). Similarly, the integration of traditional databases has been a reliable technology over the last decades as long the database content has been thoroughly vetted for data quality measures (Imielinski & Mannila, 1996; Sarawagi, 2007). While both approaches are forms of hybrid intelligence, in which humans and AI systems interact to create superior results (Dellermann et al., 2019), we call our attention to different retrieval-augmented generation structures. Service dominant logic provides us with a theoretical framework to study these structures as novel resource integration patterns that leverage existing externalized knowledge and its underlying 1" 2312.07885v1,"IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh Abstract—Due to the increasing sophistication of web attacks, Web Application Firewalls (WAFs) have to be tested and updated regularly to resist the relentless flow of web attacks. In practice, using a brute-force attack to discover vulnerabilities is infeasible due to the wide variety of attack patterns. Thus, various black-box testing techniques have been proposed in the literature. However, these techniques suffer from low efficiency. This paper presents Reinforcement-Learning-Driven and Adaptive Testing (RAT ), an automated black-box testing strategy to discover injection vulnerabilities in WAFs. In particular, we focus on SQL injection and Cross-site Scripting, which have been among the top ten vulnerabilities over the past decade. More specifically, RAT clusters similar attack samples together. It then utilizes a reinforcement learning technique combined with a novel adaptive search algorithm to discover almost all bypassing attack patterns efficiently. We compare RAT with three state-of-the-art methods considering their objectives. The experiments show that RAT performs 33.53% and 63.16% on average better than its counterparts in discovering the most possible bypassing payloads and reducing the number of attempts before finding the first bypassing payload when testing well-configured WAFs, respectively. Index Terms—Security testing, injection attack, adaptive testing, web application firewall (WAF), test case clustering. ✦ 1 I NTRODUCTION I N recent decades, most traditional brick and mortar businesses have transformed into online ones, such as online shopping, e-banking, social media, etc. Thus, an enormous amount of private data of individuals and organizations is stored in web applications databases, making them tempting targets for attackers. A recent report reveals that web applications may experience up to 26 attacks per minute [1]. Moreover, according to Symantec’s security report, 76% of websites are vulnerable to several attacks [2]. A proper way to provide the security is to use Web Application Firewalls (WAFs) which analyze HTTP(S) traffic to prevent malicious requests from reaching the web applications. The Open Web Application Security Project (OWASP 1 ) defines WAF as ‘‘a security solution on the web application level which - from a technical point of view - does not depend on the application itself.’’ [3]. To put it in perspective, WAFs intercept bi-directional HTTP(S) traffic, analyze it, and decide whether it is malicious or benign. Common rule-based WAFs use a set of rules to make a decision. For instance, WAFs utilize regular expressions to detect SQL injection (SQLi) attacks. Moreover, recently, extensive research has been done on intelligent Machine-Learning- Based (ML-Based) WAFs to distinguish between malicious and benign traffic with machine learning algorithms [4–6]. A recent study confirmed that web attacks had grown in size and sophistication [7]; consequently, it is crucial to regularly test and maintain WAFs to keep them secure and efficient. In Fig. 1, the procedure for testing a WAF is illustrated. As web attacks become more sophisticated, traditional WAF rules become more complex, and ML-Based WAFs tend to learn novel attacks. At the same time, manual testing and maintenance become more arduous tasks. Testing WAFs is also extremely expensive, especially in © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. • M. Amouei, M. Rezvani and M. Fateh are with the Faculty of Computer Engineering, Shahrood University of Technology, Iran. E-mail: { mhamooei,mrezvani,mansoor fateh } @shahroodut.ac.ir 1 https://owasp.org Fig. 1: Testing procedure for a WAF to discover vulnerabilities. time, due to the massive variety of attacks. Hence, optimal automated testing is essential for WAFs to protect web applications and services efficiently. One of the common and destructive categories of attacks is injection. Injections are attacks in which the attacker injects a malicious input to a web application. Then, the application interprets this input as a part of a command or a query, which can result in severe damages. In this paper, we focus our tests on two common injection attacks: SQLi and Cross-site Scripting (XSS). These attacks are reported as top 10 vulnerabilities [8] and have attracted a lot of attention[1, 7, 9–19]. There are various types of security testing proposed in the literature, such as white-box testing, model-based testing, and black-box testing. However, these techniques suffer from limitations that can affect their practical applicability. White-box testing needs access to the applications’ source code, which might not be possible in testing industrial applications. Moreover, each white-box testing tool supports only some specific programming languages; thus, they can only test applications developed with those programming" 2312.07887v1,"Learn or Recall? Revisiting Incremental Learning with Pre-trained Language Models Junhao Zheng, Shengjie Qiu, Qianli Ma* School of Computer Science and Engineering, South China University of Technology, Guangzhou, China junhaozheng47@outlook.com, qianlima@scut.edu.cn ∗ 1 Abstract Topic3datasets Incremental Learning (IL) has been a longstanding problem in both vision and Natural Language Processing (NLP) communities. In recent years, as Pre-trained Language Models (PLMs) have achieved remarkable progress in various NLP downstream tasks, utilizing PLMs as backbones has become a common practice in recent research of IL in NLP. Most assume that catastrophic forgetting is the biggest obstacle to achieving superior IL performance and propose various techniques to overcome this issue. However, we find that this assumption is problematic. Specifically, we revisit more than 20 methods on four classification tasks (Text Classification, Intent Classification, Relation Extraction, and Named Entity Recognition) under the two most popular IL settings (Class- Incremental and Task-Incremental) and reveal that most of them severely underestimate the inherent anti-forgetting ability of PLMs. Based on the observation, we propose a frustratingly easy method called SEQ* for IL with PLMs. The results show that SEQ* has competitive or superior performance compared to state-of-theart (SOTA) IL methods and requires considerably less trainable parameters and training time. These findings urge us to revisit the IL with PLMs and encourage future studies to have a fundamental understanding of the catastrophic forgetting in PLMs. The data, code and scripts are publicly available 1 . 57 Introduction Learning knowledge incrementally without much forgetting is an essential ability of human beings but still an unsolved challenge for neural networks in achieving human-level intelligence (French, 1999). Incrementally learning a sequence of tasks can be formulated into the paradigm of ∗ *Corresponding author https://github.com/zzz47zzz/pretrained-lm-forincremental-learning 1 72 SEQ* (Ours) LAMOL_g LAMOL_t LAMOL_KD L2KD PCLL LFPT5 SEQ 71 TACRED 43 28 Clinc150 66 53 40 14 26 9 19 29 39 49 Banking77 35 17 13 53 89 15 31 47 63 79 FewRel Figure 1: The comparison between the proposed SEQ* and SOTA IL methods on five class-incremental tasks. We report the average accuracy after learning the final task. The detailed results are provided in Table 1. Incremental Learning (IL) and has been impeded by catastrophic forgetting (Kirkpatrick et al., 2017). Catastrophic forgetting refers to neural networks forgetting previous knowledge after learning new tasks (McCloskey and Cohen, 1989). Recent years have witnessed significant breakthroughs in Pre-trained Language Models (PLMs) in vision and NLP tasks. Most recent studies of IL use PLMs as the backbone and design various methods for alleviating catastrophic forgetting in NLP tasks. However, is forgetting really catastrophically in PLMs? More specifically, how can we quantify the forgetting and how much knowledge is forgotten in various IL scenarios when using various backbones and methods on various tasks? To answer the above question, we carry out extensive experiments for exploring forgetting in more than 20 methods on four classification tasks (Text Classification, Intent Classification, Relation Extraction, and Named Entity Recognition)" 2312.07893v1,"Quantum computing of reacting flows via Hamiltonian simulation Zhen Lu a , Yue Yang a,b,∗ a State Key Laboratory for Turbulence and Complex Systems, College of Engineering, Peking University, Beijing 100871, China b HEDPS-CAPT, Peking University, Beijing 100871, China Abstract We report the quantum computing of reacting flows by simulating the Hamiltonian dynamics. The scalar transport equation for reacting flows is transformed into a Hamiltonian system, mapping the dissipative and non-Hermitian problem in physical space to a Hermitian one in a higher-dimensional space. Using this approach, we develop the quantum spectral and finite difference methods for simulating reacting flows in periodic and general conditions, respectively. The present quantum computing algorithms offer a “one-shot” solution for a given time without temporal discretization, avoiding iterative quantum state preparation and measurement. We compare computational complexities of the quantum and classical algorithms. The quantum spectral method exhibits exponential acceleration relative to its classical counterpart, and the quantum finite difference method can achieve exponential speedup in high-dimensional problems. The quantum algorithms are validated on quantum computing simulators with the Qiskit package. The validation cases cover one- and two-dimensional reacting flows with a linear source term and periodic or inlet-outlet boundary conditions. The results obtained from the quantum spectral and finite difference methods agree with analytical and classical simulation results. They accurately capture the convection, diffusion, and reaction processes. This demonstrates the potential of quantum computing as an efficient tool for the simulation of reactive flows in combustion. Keywords: Quantum Computing; Reacting Flow; Scalar Transport; Hamiltonian Simulation * Corresponding author. E-mail address: yyg@pku.edu.cn (Yue Yang). 1" 2312.07913v1,"A Survey of Text Watermarking in the Era of Large Language Models AIWEI LIU ∗ , Tsinghua University, China LEYI PAN ∗ , Tsinghua University, China YIJIAN LU, The Chinese University of Hong Kong, China JINGJING LI, The Chinese University of Hong Kong, China XUMING HU, Tsinghua University, China LIJIE WEN, Tsinghua University, China IRWIN KING, The Chinese University of Hong Kong, China PHILIP S. YU, University of Illinois at Chicago, United States In recent years, significant advancements have been made in the text generation capabilities of Large Language Models (LLMs), demonstrating exceptional performance in downstream tasks such as abstract summarization, dialogue generation, and data-to-text conversion. However, their generative abilities also pose risks such as the rapid spread of fake news, infringement of datasets/LLM copyrights, and challenges to academic integrity. Text watermarking technology emerges as a potential solution. By embedding invisible yet detectable patterns in generated texts, it helps in tracking and verifying text origins, thus preventing misuse and piracy. This survey aims to comprehensively summarize current text watermarking technologies, covering three main aspects: (1) an overview and comparison of different text watermarking techniques; (2) evaluation methods for text watermarking algorithms, including their success rate, impact on text quality, robustness, and unforgeability; (3) potential applications of text watermarking technologys. This survey aims to help researchers thoroughly understanding the text watermarking technologies, thereby fostering further development. CCS Concepts: • Computing methodologies → Natural language processing; • Security and privacy → Social aspects of security and privacy. Additional Key Words and Phrases: Text Watermark, Large Language Models ACM Reference Format: Aiwei Liu, Leyi Pan, Yijian Lu, Jingjing Li, Xuming Hu, Lijie Wen, Irwin King, and Philip S. Yu. 2023. A Survey of Text Watermarking in the Era of Large Language Models. 1, 1 (December 2023), 33 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn ∗ Equal contribution Authors’ addresses: Aiwei Liu, liuaw20@mails.tsinghua.edu.cn, Tsinghua University, Beijing, China, 100084; Leyi Pan, ply20@mails.tsinghua.edu.cn, Tsinghua University, Beijing, China, 100084; Yijian Lu, luyijian@link.cuhk.edu.hk, The Chinese University of Hong Kong, Hong Kong, China, 999077; Jingjing Li, lijj@link.cuhk.edu.hk, The Chinese University of Hong Kong, Hong Kong, China, 999077; Xuming Hu, hxm19@mails.tsinghua.edu.cn, Tsinghua University, Beijing, China, 100084; Lijie Wen, wenlj@tsinghua.edu.cn, Tsinghua University, Beijing, China, 100084; Irwin King, king@cse.cuhk.edu.hk, The Chinese University of Hong Kong, Hong Kong, China, 999077; Philip S. Yu, psyu@cs.uic.edu, University of Illinois at Chicago, Chicago, United States, 60607. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. XXXX-XXXX/2023/12-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: December 2023." 2312.07926v1,"Integral Representations of Three Novel Multiple Zeta Functions for Barnes Type: A Probabilistic Approach Gwo Dong Lin a and Chin-Yuan Hu b a b Academia Sinica, Taiwan National Changhua University of Education, Taiwan Abstract. Integral representation is one of the powerful tools for studying analytic contin- uation of the zeta functions. It is known that Hurwitz zeta function generalizes the famous Riemann zeta function which plays an important role in analytic number theory. They both have several multiple versions in the literature. In this paper, we introduce three novel multiple zeta functions for Barnes type and study their integral representations through hyperbolic probability distributions given by Pitman and Yor (2003, Canad. J. Math., 55, 292–330). The analytically continued properties of the three multiple zeta functions are also investigated. Surprisingly, two of them, unlike the previous results, can extend analytically to entire functions in the whole complex plane. Key words and phrases: Integral representation, Analytical continuation, Barnes zeta function, Hyperbolic functions, Hurwitz zeta function, Riemann zeta function. 2020 Mathematics Subject Classifications: Primary 11M06, 11M32, 60E05. Running title: Integral representations of three novel Barnes multiple zeta functions Postal addresses: Gwo Dong Lin, Institute of Statistical Science, Academia Sinica, No. 128, Section 2, Academia Road, Nankang District, Taipei 11529, Taiwan (ROC). (E-mail: gdlin@stat.sinica.edu.tw) Chin-Yuan Hu, National Changhua University of Education, No. 1, Jinde Road, Changhua 50007, Taiwan (ROC). (E-mail: buhuua@gmail.com) 1" 2312.07942v1,"Learning Diffusions under Uncertainty Hao Huang 1 , Qian Yan 1 , Keqi Han 2 , Ting Gan 1 , Jiawei Jiang 1 , Quanqing Xu 3 , Chuanhui Yang 3 1 School of Computer Science, Wuhan University, China Department of Computer Science, Emory University, USA 3 OceanBase, AntGroup, China {haohuang, qy, ganting, jiawei.jiang}@whu.edu.cn, keqi.han@emory.edu, {xuquanqing.xqq, rizhao.ych}@oceanbase.com 2 Abstract To infer a diffusion network based on observations from historical diffusion processes, existing approaches assume that observation data contain exact occurrence time of each node infection, or at least the eventual infection statuses of nodes in each diffusion process. They determine potential influence relationships between nodes by identifying frequent sequences, or statistical correlations, among node infections. In some real-world settings, such as the spread of epidemics, tracing exact infection times is often infeasible due to a high cost; even obtaining precise infection statuses of nodes is a challenging task, since observable symptoms such as headache only partially reveal a node’s true status. In this work, we investigate how to effectively infer a diffusion network from observation data with uncertainty. Provided with only probabilistic information about node infection statuses, we formulate the problem of diffusion network inference as a constrained nonlinear regression w.r.t. the probabilistic data. An alternating maximization method is designed to solve this regression problem iteratively, and the improvement of solution quality in each iteration can be theoretically guaranteed. Empirical studies are conducted on both synthetic and real-world networks, and the results verify the effectiveness and efficiency of our approach. Introduction The spread of viewpoints, rumors, and diseases are often modelled as probabilistic processes over a diffusion network. In the network, a directed edge represents a parentchild influence relationship, which indicates that the parent node can influence the child node with a certain probability. In most cases, such influence relationships are not naturally visible or traceable, and we only observe a set of diffusion results from a limited number of historical diffusion processes (Gan et al. 2021). Diffusion network inference aims to infer the diffusion network structure (i.e., the topology of influence relationships) from the observation data. This problem has received considerable attention in areas such as information propagation (He et al. 2015), viral marketing (Leskovec, Adamic, and Huberman 2007), and epidemic prevention (Wallinga and Teunis 2004) since the inferred diffusion network structure enables an intuitive Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. understanding of the underlying interactions between nodes, and is essential for developing strategies to control future diffusion processes (Huang et al. 2021). Most existing approaches assume that observation data contain the exact times when node infections occurred. With this temporal information, they determine potential influence relationships between nodes by identifying frequent sequences of node infections, since nodes infected sequentially within a short time interval are considered more likely to possess influence relationships (Gomez-Rodriguez, Leskovec, and Krause 2010; Myers and Leskovec 2010; Gomez-Rodriguez, Balduzzi, and Schölkopf 2011; Gomez- Rodriguez and Schölkopf 2012; Du et al. 2012; Gomez- Rodriguez, Leskovec, and Schölkopf 2013a,b; Daneshmand et al. 2014; Wang et al. 2014). Nonetheless, monitoring every node constantly during each diffusion process to obtain such temporal information of node infections is often expensive in practice. Therefore, some other approaches aim to carry out diffusion network inference without temporal information, using only the eventual infection statuses of nodes observed at the end of each diffusion process (Amin, Heidari, and Kearns 2014; Huang et al. 2019, 2021, 2022, 2023; Han et al. 2020; Gan et al. 2021). Toward this, they measure the statistical correlations of node infections, and identify influence relationships by checking which node pairs have high infection correlations. In this paper, we study the problem of diffusion network inference in a less idealized and more realistic setting, i.e., only probabilistic information about node infection statuses is provided. This uncertainty is interpreted differently in various contexts. For example, in epidemic containment, it is difficult to confirm the infection statuses of outpatients based on observable symptoms such as headache and fatigue, since there is a certain probability that these symptoms may be caused by other reasons like lack of sleep; in viral marketing campaigns, it is often the case that the respondents are more prone to probabilistic feedback than a clear-cut answer. To the best of our knowledge, only one existing work (Sefer and Kingsford 2015) has partially addressed the problem of inferring diffusion networks based on probabilistic data. In addition to the probabilistic information about node infection statuses, that work further requires prior knowledge on the transmission probabilities between different node statuses, and the temporal information of node infections." 2312.07947v1,"1 Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus Qiongxiu Li, Jaron Skovsted Gundersen, Milan Lopuhaä-Zwakenberg and Richard Heusdens Abstract—Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches such as differential privacy (DP). Methods of the first class achieve perfect output accuracy but reveal some private information, while methods from the second class provide privacy against the strongest adversary at the cost of a loss of accuracy. In this paper, we propose a general approach named adaptive differentially quantized subspace perturbation (ADQSP) which combines quantization schemes with so-called subspace perturbation. Although not relying on cryptographic primitives, the proposed approach enjoys the benefits of both accuracy-prioritized and privacy-prioritized methods and is able to unify them. More specifically, we show that by varying a single quantization parameter the proposed method can vary between SMPC-type performances and DP-type performances. Our results show the potential of exploiting traditional distributed signal processing tools for providing cryptographic guarantees. In addition to a comprehensive theoretical analysis, numerical validations are conducted to substantiate our results. Index Terms—Secure multiparty computation, differential privacy, decentralized networks, subspace perturbation, data aggregation, consensus, quantization. I. I NTRODUCTION As the world is becoming increasingly interconnected and digitized, data are often collected and stored in personal devices such as tablets and phones [1]. To process such massive amounts of data over different devices poses many challenges including: (1) the requirement for distributed processing tools that can process data in a network of devices without any centralized coordination; (2) the need for lightweight solutions as these devices are often limited in computational resources, and (3) the demand for privacy-preserving algorithms, as these devices often contain sensitive personal data captured by sensors such as images and GPS data [1]. Combined, these challenges call for interdisciplinary research across different fields such as cryptography, information theory and dis- Q. Li is with Tsinghua University, China (email: qiongxiu li@mail.tsinghua.edu.cn). J. S. Gundersen is with the Department of Electronic Systems, Aalborg University, Denmark, (email:jaron@es.aau.dk). M. Lopuhaä-Zwakenberg is with University of Twente, the Netherlands, (email:m.a.lopuhaa@utwente.nl). R. Heusdens is with the Netherlands Defence Academy (NLDA), the Netherlands, and with the Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, the Netherlands (email: r.heusdens@{mindef.nl,tudelft.nl}). tributed signal processing for developing efficient and privacypreserving distributed computation methods. The average consensus problem has been intensively investigated and widely applied in many applications, e.g., optimization [2], group coordination [3], and federated learning [4]. Recently, privacy-preserving distributed average consensus, which aims to guarantee all participants in a network to output an accurate average consensus without violating privacy concerns, has received a lot of attention [5]–[24]. There are at least five aspects to be considered when designing privacy-preserving distributed average consensus algorithms: centralized vs. decentralized coordination, computational complexity, communication costs, and most importantly, the achieved privacy level and output accuracy. With respect to the first concern, in this paper we only consider fully distributed/decentralized solutions which do not require any centralized coordination such as a trusted third party. Secondly, the computational complexity depends heavily on the so-called security model, i.e., whether we demand computational or information-theoretical security. In this work, we will restrict ourselves to information-theoretical security based algorithms since they are generally computationally less complex compared to computational security based approaches as the former does not involve complex encryption operations. With respect to communication cost, privacy, and accuracy, most existing work focuses on privacy and accuracy, while the aspect of communication cost is rarely addressed. Ideally, one would like perfect accuracy while guaranteeing privacy even against the strongest adversary, which is all participants except one collude. This, however, has been shown to be impossible [25]. The main reason is that having knowledge of the average result will reveal the private data held by the only noncolluding participant. As a result, existing work falls into two categories. The first category contains algorithms that guarantee privacy against the worst-case adversary using differential privacy (DP) techniques [26], [27] by inserting noise into the calculations [10]–[13]. This guarantees one individual’s privacy even when all other participants are compromised, at the cost of output accuracy. The second category contains secure multiparty computation (SMPC) based approaches like secret sharing [14]–[17] and correlated noise insertion [20]– [22], which offer perfect accuracy but only guarantee privacy under additional assumptions on the set of compromised participants." 2312.07949v1,"Variational data encoding and correlations in quantumenhanced machine learning Ming-Hao Wang 1 and Hua Lu 2 1 School of Physics, Hubei University, Wuhan 430062, China 2 School of Science, Hubei University of Technology, Wuhan 430068, China 1 Introduction Leveraging the extraordinary phenomena of quantum superposition and quantum correlation, quantum computing offers unprecedented potential for addressing challenges beyond the reach of classical computers. This paper tackles two pivotal challenges in the realm of quantum computing: firstly, the development of an effective encoding protocol for translating classical data into quantum states, a critical step for any quantum computation. Different encoding strategies can significantly influence quantum computer performance. Secondly, we address the need to counteract the inevitable noise that can hinder quantum acceleration. Our primary contribution is the introduction of a novel variational data encoding method, grounded in quantum regression algorithm models. By adapting the learning concept from machine learning, we render data encoding a learnable process. Through numerical simulations of various regression tasks, we demonstrate the efficacy of our variational data encoding, particularly post-learning from instructional data. Moreover, we delve into the role of quantum correlation in enhancing task performance, especially in noisy environments. Our findings underscore the critical role of quantum correlation in not only bolstering performance but also in mitigating noise interference, thus advancing the frontier of quantum computing. Quantum information processing stands at the forefront of next-generation information technology, offering the potential for exponential speedups over classical counterparts [1]. Landmark algorithms like Shor’s for large number factoring and the Harrow-Hassidim-Lloyd algorithm for linear systems exemplify this potential within the standard gate-based quantum computation model [2, 3]. However, the current landscape is dominated by noisy-intermediate-scale quantum (NISQ) devices, characterized by their hundreds of noisy qubits and the consequent limitations in achieving large-scale, fault-tolerant quantum computing [4]. This reality steers contemporary research towards designing algorithms suitable for NISQ devices that still exploit quantum advantages [5, 6]. In this context, hybrid quantum-classical algorithms (HQCAs) have emerged as a promising approach, demonstrating success in various applications ranging from calculating eigenstates of physical Hamiltonians to optimization and classification tasks [7, 8, 9, 10, 11, 12, 13]. HQ- CAs, akin to machine learning algorithms, involve training computers to recognize patterns and minimize cost functions [14]. They utilize parameterized quantum circuits (PQCs) or quantum neural networks, widely adopted in quantum machine learning (QML) for tasks like classification and generative modeling [15, 16, 17, 18, 19, 20, 21, 22]. The potential synergy between machine learning and quantum computing is a burgeoning area of interest [23, 24, 25]. Central to HQCAs is the encoding of classical information into quantum states, a process known as quantum feature mapping (QFM) [26, 27]. This encoding leverages the expressiveness of large Hilbert spaces to enhance data pro- Ming-Hao Wang: wangmh@hubu.edu.cn Hua Lu: lvhuahg@163.com 1" 2312.07953v1,"Enhancing Robotic Navigation: An Evaluation of Single and Multi-Objective Reinforcement Learning Strategies Vicki Young 1 , Jumman Hossain 2 , Nirmalya Roy 2 1 2 Department of Computer Science, University of San Francisco, San Francisco, USA Department of Information Systems, University of Maryland, Baltimore County, USA 1 {vyoung2}@dons.usfca.edu 2 {jumman.hossain, nroy}@umbc.edu Abstract—This study presents a comparative analysis between single-objective and multi-objective reinforcement learning methods for training a robot to navigate effectively to an end goal while efficiently avoiding obstacles. Traditional reinforcement learning techniques, namely Deep Q-Network (DQN), Deep Deterministic Policy Gradient (DDPG), and Twin Delayed DDPG (TD3), have been evaluated using the Gazebo simulation framework in a variety of environments with parameters such as random goal and robot starting locations. These methods provide a numerical reward to the robot, offering an indication of action quality in relation to the goal. However, their limitations become apparent in complex settings where multiple, potentially conflicting, objectives are present. To address these limitations, we propose an approach employing Multi-Objective Reinforcement Learning (MORL). By modifying the reward function to return a vector of rewards, each pertaining to a distinct objective, the robot learns a policy that effectively balances the different goals, aiming to achieve a Pareto optimal solution. This comparative study highlights the potential for MORL in complex, dynamic robotic navigation tasks, setting the stage for future investigations into more adaptable and robust robotic behaviors. Index Terms—Reinforcement Learning, Single-Objective Reinforcement Learning, Multi-Objective Reinforcement Learning (MORL), Robotic Navigation, Dynamic Environments. I. I NTRODUCTION Robotic navigation, particularly in dynamic and complex environments, is a central problem in the field of robotics and artificial intelligence. With the proliferation of robotics in a myriad of applications - from automated vehicles and industrial automation to healthcare and service sectors, the challenge of effective navigation has garnered significant attention. A critical capability in these applications is the ability of the robot to navigate reliably towards a specific target while avoiding obstacles in its path, thereby ensuring efficient task completion and safety. Reinforcement Learning (RL) provides a robust framework for training agents to learn from their interactions with the environment and make optimal decisions [1]. With the advent of deep learning and the development of algorithms capable of handling continuous and high-dimensional action spaces, RL has demonstrated substantial success in various complex tasks, including robotic navigation. Among these, Deep Q- Network (DQN) [2], Deep Deterministic Policy Gradient Fig. 1: TurtleBot3 robot simulated in a simple environment with the Gazebo framework. (DDPG) [3], and Twin Delayed DDPG (TD3) [4], have been pivotal, contributing significantly to advancements in the field. These methods, however, primarily focus on optimizing a single objective function. While this has proven effective in many scenarios, real-world environments often present situations that require balancing multiple, potentially conflicting objectives. For example, in the context of robotic navigation, a robot might need to reach its destination quickly while also minimizing energy consumption and collision risk. The need to address these multifaceted objectives simultaneously has been recognized, leading to the development of Multi-Objective Reinforcement Learning (MORL) [5]. MORL extends the traditional RL paradigm by optimizing" 2312.07987v1,"S WITCH H EAD : A CCELERATING T RANSFORMERS WITH M IXTURE - OF -E XPERTS A TTENTION Róbert Csordás 1 Piotr Pi˛ekos 2 Kazuki Irie 3† Jürgen Schmidhuber 1,2 The Swiss AI Lab IDSIA, USI & SUPSI, Lugano, Switzerland 2 AI Initiative, KAUST, Thuwal, Saudi Arabia 3 Center for Brain Science, Harvard University, Cambridge, MA, USA robert@idsia.ch, piotr.piekos@kaust.edu.sa kirie@fas.harvard.edu, juergen@idsia.ch 1 A BSTRACT The costly self-attention layers in modern Transformers require memory and compute quadratic in sequence length. Existing approximation methods usually underperform and fail to obtain significant speedups in practice. Here we present SwitchHead—a novel method that reduces both compute and memory requirements and achieves wall-clock speedup, while matching the language modeling performance of baseline Transformers with the same parameter budget. Switch- Head uses Mixture-of-Experts (MoE) layers for the value and output projections and requires 4 to 8 times fewer attention matrices than standard Transformers. Our novel attention can also be combined with MoE MLP layers, resulting in an efficient fully-MoE “SwitchAll” Transformer model. Our code is public. 1 1 I NTRODUCTION Large language models (LLMs) have shown remarkable capabilities (Radford et al., 2019; Brown et al., 2020; OpenAI, 2022; 2023) and great versatility (Bubeck et al., 2023). However, training enormous Transformers (Vaswani et al., 2017; Schmidhuber, 1992) requires a considerable amount of computing power and memory, which is not accessible to most researchers, academic institutions, and even companies. Even running them in inference mode, which is much less resource-intensive, requires significant engineering effort (Gerganov, 2023). Accelerating big Transformers remains an important open research question. In the literature, Mixture of Experts (MoE)-based feedforward multi-layer perceptron (MLP) layers (Shazeer et al., 2017; Jacobs et al., 1991; Ivakhnenko & Lapa, 1965) have been popular methods to scale up Transformers to a large number of parameters (Lewis et al., 2021; Lepikhin et al., 2021; Fedus et al., 2022; Clark et al., 2022; Chi et al., 2022). However, in these works, the parameter efficiency of MoEs has not been studied; MoE models have been typically compared to dense baselines with the same number of FLOPs but with much less parameters. In fact, it has remained a common belief that they are not competitive against their dense counterparts with the same number of parameters. More recently, this parameter-efficiency perspective of MoEs has been studied by Csordás et al. (2023). They have proposed a novel MoE model, called σ-MoE, which not only speeds up Transformer training through reduced resource requirements, but also achieves performance comparable to or even superior to its parameter-matched dense counterparts; effectively demonstrating the promise of MoEs to scaling up neural networks. Such MoE research often focuses on accelerating MLPs. However, attention layers (Schmidhuber, 1991; Bahdanau et al., 2015) also account for a considerable amount of compute and memory usage in Transformers, especially for long context sizes. Existing methods, such as linear attention (Schmidhuber, 1991; Katharopoulos et al., 2020; Choromanski et al., 2021; Peng et al., 2021; Schlag et al., 2021), typically fail to achieve significant speedups in practice (Dao et al., 2022) and often underperform its quadratic counterpart. As an alternative, MoE-based approaches for attention have been also proposed (Zhang et al., 2022; Peng et al., 2020), but in practice, they only achieve a 1 https://github.com/robertcsordas/moe_attention † Work done at IDSIA. 1" 2312.07996v1,"THz spectroscopy on amino acids Sebastian Emmert, Peter Lunkenheimer, and Alois Loidl a) Experimental Physics V, Institute of Physics, University of Augsburg, 86135 Augsburg, Germany Abstract We present a detailed study on the temperature-dependent THz spectra of the polycrystalline amino acids L-serine and L-cysteine for wave numbers from 20 to 120 cm -1 and temperatures from 4 to 300 K. Even though the structure of these two amino acids is very similar, with a sulfur atom in the side chain of cysteine instead of an oxygen atom in serine, the excitation spectra are drastically different. Obviously, the vibrational dynamics strongly depend on the ability of cysteine to form sulfur-hydrogen bonds. In addition, cysteine undergoes an order-disorder type phase transition close to 80 K, with accompanying anomalies in our THz results. On increasing temperatures, well-defined vibrational excitations, exhibit significant shifts in eigenfrequencies with concomitant line-broadening yielding partly overlapping modes. Interestingly, several modes completely lose all their dipolar strength and are unobservable at ambient conditions. Comparing the recent results with published work utilizing THz, Raman, and neutron-scattering techniques, as well as with ab-initio simulations, we aim at a consistent analysis of the results ascribing certain eigenfrequencies to distinct collective lattice modes. We document that THz spectra can be used to fine-tune parameters of model calculations and as a fingerprint property of certain amino acids. In addition, we analyzed the temperature-dependent heat capacity of both compounds and detected strong excess heat capacities at low temperatures compared to the canonical Debye behavior of crystalline solids, indicating soft excitations and a strongly enhanced phonon-density of states at low frequencies. a) Author to whom correspondence should be addressed: alois.loidl@physik.uni-augsburg.de 1" 2312.08003v1,"Elliptic and triangular flow of light nuclei in Au+Au collisions in the BES-II energies using the STAR detector Rishabh Sharma 1,∗ , for the STAR Collaboration 1 Indian Institute of Science Education and Research (IISER), Tirupati 517507, India Abstract. Light nuclei might be formed in heavy-ion collisions by the coales- cence of produced (anti-)nucleons or transported nucleons. Due to their low binding energies, they are more likely to form at later stages of the hadronic fireball. In this proceedings, we report the transverse momentum and centrality dependence of elliptic (v 2 ) and triangular (v 3 ) flow of d, t, and 3 He in Au+Au √ collisions at s NN = 14.6 – 54.4 GeV. The mass number scaling of v 2 (p T ) and v 3 (p T ) of light nuclei is discussed. We also report the comparison of v 2 (p T ) and v 3 (p T ) of light nuclei with a transport-plus-coalescence model calculation. 1 Introduction High-energy heavy-ion collisions produce light nuclei in abundance. Thermal model proposes their formation near the chemical freezeout surface (CFO), however, due to their low binding energies it is unlikely that they survive at high CFO temperature [1]. In contrast, the coalescence model suggests their formation at later stages via nucleon recombination [2–5]. In the case of nucleon coalescence, the momentum space distributions of both the constituents (nucleons) and the products (light nuclei) are measurable in heavy-ion collision experiments. Therefore, studying the azimuthal anisotropy of light nuclei and comparing them with that of proton can give insights into the light nuclei production mechanism in heavy-ion collisions. In the following sections, elliptic (v 2 ) and triangular (v 3 ) flow of d, t, and 3 He in Au+Au √ collisions at s NN = 14.6, 19.6, 27, and 54.4 GeV are discussed. 2 Analysis details √ The data presented in this proceedings are from Au+Au collisions at s NN = 14.6, 19.6, 27, and 54.4 GeV collected by the STAR experiment at RHIC during the second phase of the Beam Energy Scan (BES-II) program. Light nuclei are identified using the Time Projection Chamber (TPC) [6] and the Time of Flight (TOF) [7] detectors. TPC uses specific ionization energy loss (dE/dx) in a large gas volume for nuclei identification. Further, the purity of light nuclei signal is enhanced by imposing a constraint on their mass-square (m 2 ), measured using the Time of Flight (TOF) detector. The quantities v 2 and v 3 are the second and third order Fourier coefficients, respectively, characterizing the azimuthal distribution of the produced nuclei relative to the symmetry planes (called event planes) of the Au+Au collision. We have constructed the second (Ψ 2 ) and third (Ψ 3 ) order event plane angle using tracks reconstructed in the TPC. The η-subevent plane method is used to avoid auto-correlation [8]. ∗ e-mail: rishabhsharma@students.iisertirupati.ac.in" 2312.08012v1,"uSF: Learning Neural Semantic Field with Uncertainty Vsevolod Skorokhodov 1[0009−0002−9840−761X] , Darya Drozdova , and Dmitry Yudin 1,2[0000−0002−1407−2633] 1[0009−0004−0333−5962] Moscow Institute of Physics and Technology, Moscow, Russia skorokhodov.vs@phystech.edu, daryadrozdova77@gmail.com 2 AIRI (Artificial Intelligence Research Institute), Moscow, Russia yudin@airi.net 1 Abstract. Recently, there has been an increased interest in NeRF methods which reconstruct differentiable representation of three-dimensional scenes. One of the main limitations of such methods is their inability to assess the confidence of the model in its predictions. In this paper, we propose a new neural network model for the formation of extended vector representations, called uSF, which allows the model to predict not only color and semantic label of each point, but also estimate the corresponding values of uncertainty. We show that with a small number of images available for training, a model quantifying uncertainty performs better than a model without such functionality. Code of the uSF approach is publicly available at https://github.com/sevashasla/usf/. Keywords: Neural semantic field · Neural network · Learning · Uncertainty · 3D-scene. 1 Introduction Over the past few years, many researchers have focused on the development of the field of differentiable scene representation. This development began with the appearance of the first NeRF method [9], which demonstrated the photo-realistic quality of novel views generation. Various modifications of the original method allow us to additionally solve such problems as depth estimation [18], semantic segmentation[20,6], object detection [4]. The disadvantages of NeRF methods include high computational complexity, the need for a large number of images in the training dataset and the inability to estimate the confidence of the model in its predictions. Quantifying uncertainty is a crucial aspect for minimizing possible risks for tasks in various fields, for example robotics and autonomous driving. As shown in Fig. 1 we propose a novel NeRF-based method that reconstructs the neural radiance and the neural semantic fields. The previously proposed NeRF methods only considered estimating the uncertainty for color predictions, i.e. regression task. Our method additionally introduces the possibility of quantifying uncertainty for predicted semantic labels, i.e. classification task. There are" 2312.08013v1,"MORSE PREDECOMPOSITION OF AN INVARIANT SET MICHA L LIPIŃSKI Intitute of Science and Technology Austria, Am Campus 1, 3400 Klosterneuburg, Austria KONSTANTIN MISCHAIKOW Department of Mathematics and BioMaPS Institute, Rutgers University, Piscataway, NJ 08854, USA MARIAN MROZEK Division of Computational Mathematics, Faculty of Mathematics and Computer Science, Jagiellonian University, ul. St. Lojasiewicza 6, 30-348 Kraków, Poland Abstract. Motivated by the study of the recurrent orbits in a Morse set of a Morse decomposition, we introduce the concept of Morse predecomposition of an isolated invariant set in the setting of combinatorial and classical dynamical systems. We prove that a Morse predecomposition indexed by a poset is a Morse decomposition and we show how a Morse predecomposition may be condensed back to a Morse decomposition. E-mail addresses: michal.lipinski@ist.ac.at, mischaik@math.rutgers.edu, marian.mrozek@uj.edu.pl. Date: Version compiled on December 14, 2023. 2010 Mathematics Subject Classification. primary 37B30, secondary 37B20,37B35. Key words and phrases. Morse decomposition, combinatorial dynamics, isolated invariant set, recurrene. Research of M.M. is partially supported by the Polish National Science Center under Opus Grant No. 2019/35/B/ST1/00874. M.L. acknowledge support by the Dioscuri program initiated by the Max Planck Society, jointly managed with the National Science Centre (Poland), and mutually funded by the Polish Ministry of Science and Higher Education and the German Federal Ministry of Education and Research. M.L. also acknowledge that this project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie Grant Agreement No. 101034413. The work of K.M. was partially supported by the National Science Foundation under awards DMS-1839294 and HDR TRIPODS award CCF-1934924, DARPA contract HR0011-16-2-0033, National Institutes of Health award R01 GM126555, Air Force Office of Scientific Research under award numbers FA9550-23-1-0011, AWD00010853- MOD002 and MURI FA9550-23-1-0400. K.M. was also supported by a grant from the Simons Foundation. 1" 2312.08015v1,"MNRAS 000, 1–11 (2023) Preprint 14 December 2023 Compiled using MNRAS L A TEX style file v3.0 First Intensity Interferometry Measurements with the H.E.S.S. Telescopes Andreas Zmija 1★ , Naomi Vogel 1 , Frederik Wohlleben 1,2 , Gisela Anton 1 , Adrian Zink 1 , Stefan Funk 1 1 Erlangen Centre for Astroparticle Physics, Friedrich-Alexander-Universität Erlangen-Nürnberg, Nikolaus-Fiebiger-Str. 2, Erlangen 91058, Germany 2 now at Max-Planck-Institut für Kernphysik, Saupfercheckweg 1, Heidelberg, 69117, Germany This is a pre-copyedited, author-produced PDF of an article accepted for publication in Monthly Notices of the Royal Astronomical Society following peer review. The version of record [Zmija et al. (2023)] is available online at: https://doi.org/10.1093/mnras/stad3676. ABSTRACT Intensity interferometry for astrophysical observations has gained increasing interest in the last decade. The method of correlating photon fluxes at different telescopes for high resolution astronomy without access to the phase of the incoming light is insensitive to atmospheric turbulence and doesn’t require high-precision optical path control. The necessary large collection areas can be provided by Imaging Atmospheric Cherenkov Telescopes. Implementation of intensity interferometers to existing telescope systems such as VERITAS and MAGIC has proven to be successful for high-resolution imaging of stars. In April 2022 we equipped two telescopes of the H.E.S.S. array in Namibia with an intensity interferometry setup to measure southern sky stars and star systems during the bright moon period. We mounted an external optical system to the lid of the telescope cameras, which splits the incoming light and feeds it into two photomultipliers in order to measure the zero-baseline correlation within one telescope in addition to the cross correlation between the telescopes. The optical elements are motorised, which enables live correction of tracking inaccuracies of the telescopes. During the campaign we measured the spatial correlation curves and thereby the angular diameters of 𝜆 Sco (Shaula) and 𝜎 Sgr (Nunki), while we also performed systematic studies of our interferometer using the multiple star system of 𝛼 Cru (Acrux). Key words: instrumentation: high angular resolution – instrumentation: interferometers – techniques: interferometric – stars: imaging – methods: observational – telescopes 1 INTRODUCTION Hanbury Brown and Twiss (HBT) were the pioneers of astronomical intensity interferometry in the 1960s, when they measured the angular diameter of 32 stars with the Narrabri Stellar Intensity Interferometer (Hanbury Brown et al. 1967, 1974). Due to the lack of fast electronics and large area collectors, this technique was subsequently abandoned which led to the development of stellar amplitude interferometry that is applied at instruments, such as the VLTI (Haguenauer et al. 2010) and CHARA (ten Brummelaar et al. 2005). Although they are highly sensitive, the length of the baseline between the telescopes of these experiments and therefore the optical resolution is limited due to atmospheric turbulence. As a consequence, over the last decade there has been renewed interest in intensity interferometry due to improvements in technology and new large area telescopes in arrays. (Dravins et al. 2013) While amplitude interferometry employs first order correlation of the electromagnetic wave field at a given spatial distance, intensity interferometry employs second order correlation of the electromagnetic wave field, which is the correlation of photon flux at a given spatial distance. The advantage of this is to make kilometer-scale baselines in the optical band accessible that are possible due to the insensitivity to atmospheric turbulence. Such baselines give rise to ★ E-mail: andi.zmija@fau.de © 2023 The Authors angular resolutions of the instrument on the scale of microarcseconds (Dravins 2016). The trade-off is a comparably small signal-to-noise for intensity interferometry observations due to the requirement of two-photoncoincidence measurements (Bojer et al. 2022), which is expressed by the small value of the coherence time (usually on the order of pico- to femtoseconds). Besides the quest for high-time-resolution detectors, one would like to collect as many photons as possible, which requires large light buckets. Arrays of Imaging Atmospheric Cherenkov Telescopes (IACTs), generally used as gamma-ray observatories, are perfectly suitable for intensity interferometry implementations: the telescopes are amongst the largest that exist on the planet which can focus optical light, observatories typically consist of multiple telescopes separated by baselines on the order of 100 m, and the detection mode doesn’t allow gamma-ray observations during bright moon times, so that intensity interferometry measurements can be carried out during that time. Two IACT observatories are already successfully performing intensity interferometry observations. In December 2019, (Abeysekara et al. 2020) measured the angular diameters of the two stars 𝛽 CMa and 𝜀 Ori using all 4 telescopes of the VERITAS array as a combined intensity interferometer (VSII). Recently, the VSII star survey has expanded also to fainter stars up to a magnitude of +4.2, while the angular diameters of bright stars can be measured with an accuracy of typically 3–4 per cent and will undergo further improvements" 2312.08028v1,"Provable Security for the Onion Routing and Mix Network Packet Format Sphinx Philip Scherer Christiane Weis Thorsten Strufe KIT Karlsruhe firstname.lastname@student.kit.edu NEC Laboratories Europe firstname.lastname@neclab.eu KIT Karlsruhe firstname.lastname@kit.edu ABSTRACT could include linkable information. Tor [11] is being broadly applied against local adversaries but mix networks against global adversaries are increasingly developed. The most efficient and commonly used mix network packet format is Sphinx [9]. In fact, Sphinx is not only used as a foundation for mix networks [18], but also for OR protocols [6, 7], and even inspired a recent improvement of Tor [14]. Sphinx [9] works in the service model and assumes an additional party, the nymserver 1 . Senders send onions with reply information to the nymserver. Exit relays send anonymous reply messages via the nymserver, which uses the reply information to build a reply packet. Sphinx packets consist of a header and a payload. The header contains encrypted routing information and keys. The payload contains the encrypted message. Using only group exponentiations and well-known symmetric cryptography, Sphinx is highly efficient [9]. Sphinx’s privacy has been proven previously using a proof strategy by Camenisch and Lysyanskaya [3] 2 . Camenisch and Lysyanskaya’s proof strategy first proposes an idealized version of OR in the form of an ideal functionality in the Universal Composability framework [4]. This ideal functionality is effectively an abstract version of an OR protocol, from which privacy guarantees can be derived more readily. As proving that a protocol securely realizes this functionality directly is cumbersome, they also create a set of game-based properties which they claim imply realization of the ideal functionality [3]. As it turns out, those properties, which were used in Sphinx’s privacy proof, are insufficent to realize the ideal functionality [15]. While Kuhn et al. propose new properties that indeed imply the ideal functionality [15], Sphinx is not able to achieve them for two reasons. First, Sphinx, along with many real-world applications, works in the service model, while the new proof strategy of Kuhn et al. is in the integrated-system model. Secondly, Sphinx does not protect the integrity of the payload at each hop and thus allows for a malleability attack on the payload: If the adversary tags (i.e., flips bits of the payload) an onion leaving its sender, the exit relay processing the Sphinx packet will notice that the payload has been modified and drop the message. If Sphinx is used in the integratedsystem model, this attack allows an adversarial receiver colluding with the first relay to learn which user was contacting it. As this violates the desired privacy goal, it follows that Sphinx does not achieve the integrated-system properties of the related work [15]. In the service model, this attack only allows an adversary to link the sender to the exit relay and completely destroys the message Onion routing and mix networks are fundamental concepts to provide users with anonymous access to the Internet. Various corresponding solutions rely on the efficient Sphinx packet format. However, flaws in Sphinx’s underlying proof strategy were found recently. It is thus currently unclear which guarantees Sphinx actually provides, and, even worse, there is no suitable proof strategy available. In this paper, we restore the security foundation for all these works by building a theoretical framework for Sphinx. We discover that the previously-used DDH assumption is insufficient for a security proof and show that the Gap Diffie-Hellman (GDH) assumption is required instead. We apply it to prove that a slightly adapted version of the Sphinx packet format is secure under the GDH assumption. Ours is the first work to provide a detailed, in-depth security proof for Sphinx in this manner. Our adaptations to Sphinx are necessary, as we demonstrate with an attack on sender privacy that would be possible otherwise. KEYWORDS Privacy, Anonymity, Provable Security, Onion Routing, Mix Networks, Sphinx 1 INTRODUCTION The majority of today’s Internet traffic fails to protect the privacy of its users since the exposed IP addresses serve as identifying information. Onion routing (OR) [13] and mix networks [5] are techniques that address this issue by hiding the users’ IP addresses. OR and mix networks are similar in the sense that both use relays together with multiple layers of encryption to hide the link between the sender and the message and receiver. The sender wraps the message in multiple encryption layers, thus creating an “onion” packet. The layers are peeled off one by one while traversing the relays on the onion’s path. As a critical distinction, mix networks protect against a global adversary by changing the order of packets at each relay (hence mixing the communications). This comes at the cost of introducing additional delays. OR networks avoid these delays, but become vulnerable to global passive adversaries. Proposed works for both OR and mix networks exist in two network models: In the integrated-system model, the receiver acts as the last relay. On the contrary, in the service model, the receiver is unaware of the OR or mix network. The last relay, which is called the exit relay, retrieves and forwards the message to the receiver as in the underlying protocol. To hide the link from senders to messages and receivers, protocol designers aim to make all incoming and outgoing packets at honest relays unlinkable for the adversary. This requires special care when designing the packet formats, as any part of the packet 1 While the name is the same, this server has nothing to do with the anonymization network “Nym” [10]. 2 In order to comply with [3] and to honor Sphinx’s applicability for OR protocols, we (ab-)use the onion terminology in the rest of this paper, while always meaning OR and mix networks and considering a global adversary. 1" 2312.08033v1,"Beyond Top-Class Agreement: Using Divergences to Forecast Performance under Distribution Shift Dan Zhang Bosch Center for AI & University of Tübingen Eric Nalisnick UvA-Bosch Delta Lab University of Amsterdam Abstract Knowing if a model will generalize to data ‘in the wild’ is crucial for safe deployment. To this end, we study model disagreement notions that consider the full predictive distribution - specifically disagreement based on Hellinger distance, Jensen-Shannon and Kullback–Leibler divergence. We find that divergence-based scores provide better test error estimates and detection rates on out-of-distribution data compared to their top-1 counterparts. Experiments involve standard vision and foundation models. Introduction 0 0.0 0.0 0 1 0 f 1 ( x ) 1.0 0.5 0 0.0 0 1 f 1 ( x ) 0.0 0 1 0 f 1 ( x ) Top-1 error 1 0.2 1.0 0.5 0 0.0 0 1 f 1 ( x ) 0.0 0 1 0 0.3 0 0.0 1 f 1 ( x ) KLD error 1 0.7 0 1 f 1 ( x ) JSD error 1 ≥ 2.0 1.0 f 1 ( x ) HD error 1 KLD disagreement 1 0.3 f 2 ( x ) 0 0.3 JSD disagreement 1 0.7 f 2 ( x ) 0.5 HD disagreement 1 ≥ 5.0 f 2 ( x ) 1.0 f 2 ( x ) Top-1 disagreement f 2 ( x ) 1 f 2 ( x ) When deployed to the wild, machine learning systems often encounter conditions unlike those on which the system was trained. These deviations from the training distribution pose significant risks in safety-critical applications, such as autonomous driving, since performance can suddenly and precipitously degrade. It is therefore essential to develop techniques that can anticipate system failures caused by operating under distribution shift. However, estimating test-time performance is difficult in even in-distribution (ID) settings. Out-ofdistribution (OOD) scenarios are especially challenging since a labeled OOD validation set is often impossible to obtain. f 2 ( x ) 1 f 2 ( x ) Mona Schirmer UvA-Bosch Delta Lab University of Amsterdam 2.5 0 0.0 0 1 f 1 ( x ) Figure 1: Disagreement and error notions for 3-class classification: x,y-axis represent predicted probability of model f for class 1, 2. First row: disagreement between f, f ′ with fixed f ′ (x) = (0.35, 0.325, 0.325). Second row: error for y = 1. To help with this problem, recent studies [19, 10, 1, 11, 22] have identified strong empirical correlations and theoretical connections between test error and model disagreement. [19, 10] found that model disagreement rates serve as an effective approximation of the test error and [10, 11] show that the two are equivalent under calibration. Moreover, [1] found that ID vs. OOD disagreement correlates linearly and the slope and bias match those of ID vs. OOD test error. These discoveries motivate the use of model disagreement for unlabeled OOD performance estimation. Previous approaches to estimate a model’s OOD accuracy are often based on either the model’s uncertainties [9, 5, 14] or top-1 disagreement with other models [10, 1, 22]. In this paper, we ask a natural next question; can we combine the best of both worlds by using model disagreement notions that consider the full predictive label distribution? Such distributional disagreement notions have already found applications in e.g. active learning [20, 17, 4] and uncertainty quantification [16]. However, its role for performance estimation has been unexplored. We argue that the use of the Workshop on Distribution Shifts, 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.08038v1,"Combined Approximations for Uniform Operational Consistent Query Answering Marco Calautti Ester Livshits University of Milan marco.calautti@unimi.it University of Edinburgh ester.livshits@ed.ac.uk Andreas Pieris Markus Schneider University of Edinburgh & University of Cyprus apieris@inf.ed.ac.uk University of Edinburgh m.schneider@ed.ac.uk ABSTRACT 1 Operational consistent query answering (CQA) is a recent framework for CQA based on revised definitions of repairs, which are built by applying a sequence of operations (e.g., fact deletions) starting from an inconsistent database until we reach a database that is consistent w.r.t. the given set of constraints. It has been recently shown that there are efficient approximations for computing the percentage of repairs, as well as of sequences of operations leading to repairs, that entail a given query when we focus on primary keys, conjunctive queries, and assuming the query is fixed (i.e., in data complexity). However, it has been left open whether such approximations exist when the query is part of the input (i.e., in combined complexity). We show that this is the case when we focus on self-join-free conjunctive queries of bounded generelized hypertreewidth. We also show that it is unlikely that efficient approximation schemes exist once we give up one of the adopted syntactic restrictions, i.e., self-join-freeness or bounding the generelized hypertreewidth. Towards the desired approximation schemes, we introduce a novel counting complexity class, called SpanTL, show that each problem in SpanTL admits an efficient approximation scheme by using a recent approximability result in the context of tree automata, and then place the problems of interest in SpanTL. Operational consistent query answering (CQA) is a recent framework, introduced in 2018 [11], that allows us to compute conceptually meaningful answers to queries posed over inconsistent databases, that is, databases that do not conform to their specifications given in the form of constraints, and it is based on revised definitions of repairs and consistent answers. In particular, the main idea underlying this new framework is to replace the declarative approach to repairs, introduced in the late 1990s by Arenas, Bertossi, and Chomicki [4], and adopted by numerous works (see, e.g., [9, 10, 12, 17–19, 23–26]), with an operational one that explains the process of constructing a repair. In other words, we can iteratively apply operations (e.g., fact deletions), starting from an inconsistent database, until we reach a database that is consistent w.r.t. the given set of integrity constraints. This gives us the flexibility of choosing the probability with which we apply an operation, which in turn allows us to calculate the probability of an operational repair, and thus, the probability with which an answer is entailed. Probabilities can be naturally assigned to operations in many scenarios leading to inconsistencies. This is illustrated using the following example from [11]. CCS CONCEPTS • Information systems → Data management systems. KEYWORDS inconsistency; consistent query answering; operational semantics; primary keys; conjunctive queries; approximation schemes ACM Reference Format: Marco Calautti, Ester Livshits, Andreas Pieris, and Markus Schneider. 2023. Combined Approximations for Uniform Operational Consistent Query Answering. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 30 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION Example 1.1. Consider a data integration scenario that results in a database containing the facts Emp(1, Alice) and Emp(1, Tom) that violate the constraint that the first attribute of the relation name Emp (the id) is a key. Suppose we have a level of trust in each of the sources; say we believe that each is 50% reliable. With probability 0.5 · 0.5 = 0.25 we do not trust either tuple and apply the operation that removes both facts. With probability (1 − 0.25)/2 = 0.375 we remove either Emp(1, Alice) or Emp(1, Tom). Therefore, we have three repairs, each with its probability: the empty repair with probability 0.25, and the repairs consisting of Emp(1, Alice) or Emp(1, Tom) with probability 0.375. Note that the standard CQA approach from [4] only allows the removal of one of the two facts (with equal probability 0.5). It somehow assumes that we trust at least one of the sources, even though they are conflicting. As recently discussed in [13], a natural way of choosing the probabilities assigned to operations is to follow the uniform probability distribution over a reasonable space. The obvious candidates for such a space are the set of operational repairs and the set of sequences of operations that lead to a repair (note that multiple such sequences can lead to the same repair). This led to the so-called uniform operational CQA. Let us note that in the case of uniform" 2312.08044v1,"Strong Error Bounds for Trotter & Strang-Splittings and Their Implications for Quantum Chemistry Daniel Burgarth, 1, 2 Paolo Facchi, 3, 4 Alexander Hahn, 2 Mattias Johnsson, 2 and Kazuya Yuasa 5 1 Department Physik, Friedrich-Alexander-Universität Erlangen-Nürnberg, Staudtstraße 7, 91058 Erlangen, Germany 2 Center for Engineered Quantum Systems, Macquarie University, 2109 NSW, Australia 3 Dipartimento di Fisica, Università di Bari, I-70126 Bari, Italy 4 INFN, Sezione di Bari, I-70126 Bari, Italy 5 Department of Physics, Waseda University, Tokyo 169-8555, Japan (Dated: December 14, 2023) Efficient error estimates for the Trotter product formula are central in quantum computing, mathematical physics, and numerical simulations. However, the Trotter error’s dependency on the input state and its application to unbounded operators remains unclear. Here, we present a general theory for error estimation, including higher-order product formulas, with explicit input state dependency. Our approach overcomes two limitations of the existing operator-norm estimates in the literature. First, previous bounds are too pessimistic as they quantify the worst-case scenario. Second, previous bounds become trivial for unbounded operators and cannot be applied to a wide class of Trotter scenarios, including atomic and molecular Hamiltonians. Our method enables analytical treatment of Trotter errors in chemistry simulations, illustrated through a case study on the hydrogen atom. Our findings reveal: (i) for states with fat-tailed energy distribution, such as low-angular-momentum states of the hydrogen atom, the Trotter error scales worse than expected (sublinearly) in the number of Trotter steps; (ii) certain states do not admit an advantage in the scaling from higher-order Trotterization, and thus, the higher-order Trotter hierarchy breaks down for these states, including the hydrogen atom’s ground state; (iii) the scaling of higher-order Trotter bounds might depend on the order of the Hamiltonians in the Trotter product for states with fat-tailed energy distribution. Physically, the enlarged Trotter error is caused by the atom’s ionization due to the Trotter dynamics. Mathematically, we find that certain domain conditions are not satisfied by some states so higher moments of the potential and kinetic energies diverge. Our analytical error analysis agrees with numerical simulations, indicating that we can estimate the state-dependent Trotter error scaling genuinely. I. INTRODUCTION Solving the Schrödinger equation is the most fundamental endeavor in quantum physics. However, depending on the model, this task is extremely difficult or even impossible to perform analytically. Therefore, methods to find approximate solutions are of paramount importance. Besides perturbation theory, the Trotter product formula serves as a powerful tool to approximate the time-evolution of a quantum system. By subdividing the total time into small steps and by switching between simpler components, it allows the implementation of the dynamics under the full Hamiltonian. The advantage of this approach is that the approximation becomes more accurate as the smaller time steps are chosen. Thus, one can tune the accuracy of the Trotter approximation according to the problem at hand. Due to this, the Trotter product formula has become the basic building block in many areas of physics. To name three of them: (i) Quantum computing — One of the most promising and powerful potential applications of quantum computers is simulating the dynamics of quantum systems. Already in 1982, Feynman conjectured an exponential quantum advantage from this approach [1]. Lloyd then delivered an explicit algorithm in 1996 to implement Feynman’s idea [2] on the basis of the Trotter product formula. Ever since, it has been an active area of research and the list of pa- pers referring to the exponential quantum advantage is rapidly growing [3]. A particularly important subclass of quantum simulation is that of quantum chemistry — the simulation of chemical materials [4–10]. It has been proposed as a potential pathway to developing new pharmaceuticals [11], catalysts [12], or fertilizers [13, 14]. All these simulations can be understood in terms of the Trotter product formula. (ii) Mathematical physics — Here, the study of the convergence of the Trotter product formula has a long history. See, for instance, Refs. [15, 16] for some early works. Apart from elementary interest in the Trotter product formula due to its fundamental importance for quantum physics, it also has practical implications for mathematical physics. For instance, it forms the basis for the path-integral formulation of quantum mechanics [17–19]. As such, the Trotter product formula can be the foundation for quantum field theory [20–23]. (iii) Numerical simulations — The standard algorithms to solve the Schrödinger equation numerically are based on the Trotter product formula. Most prominently, the split-step method (also known as strang-splitting) is used whenever the potential energy is reasonably well understood. This is the case for instance in the simulation of atoms and molecules [24–28] or quantum optics [29]. Furthermore, numerical algorithms for studying quantum many-body systems are based on Trotterization [30–33]. In all practical simulations of quantum systems, it is important to understand the Trotter error. That is, how" 2312.08045v1,"Theories Without Models: Uncontrolled Idealizations in Particle Physics Antonis Antoniou University of Bonn Karim P. Y. Thébault University of Bristol Abstract. The perturbative treatment of realistic quantum field theories, such as quantum electrodynamics, requires the use of mathematical idealizations in the approximation series for scattering amplitudes. Such mathematical idealisations are necessary to derive empirically relevant models from the theory. Mathematical idealizations can be either controlled or uncontrolled, depending on whether current scientific knowledge can explain whether the effects of the idealization are negligible or not. Drawing upon negative formal results in asymptotic analysis (failure of Borel summability) and renormalization group theory (failure of asymptotic safety), we argue that the mathematical idealizations applied in perturbative quantum electrodynamics should be understood as uncontrolled. This, in turn, leads to the problematic conclusion that such theories do not have theoretical models in the standard understanding of this term. The existence of unquestionable empirically successful theories without theoretical models has significant implications both for our understanding of the theory-model relationship in physics and the concept of empirical adequacy. Contents 1. Theories Without Models: An Argument 2. Background 3. Theoretical Models and Empirical Adequacy 4. Models in Perturbative QFT 5. Breaking the Theory-Model Link 6. Implications Acknowledgements References E-mail addresses: aanton@uni-bonn.de, karim.thebault@bristol.ac.uk. Date: Draft of December 14, 2023. 1 2 3 8 12 14 22 26 26" 2312.08047v1,"Trust and Acceptance of Multi-Robot Systems “in the Wild”. A Roadmap exemplified within the EU-Project BugWright2 Pete Schroepfer 1,3 , Nathalie Schauffel 4 , Jan Gründling 4 , Thomas Ellwart 4 , Benjamin Weyers 4 , Cédric Pradalier 1,2 Abstract— This paper outlines a roadmap to effectively leverage shared mental models in multi-robot, multi-stakeholder scenarios, drawing on experiences from the BugWright2 project. The discussion centers on an autonomous multi-robot systems designed for ship inspection and maintenance. A significant challenge in the development and implementation of this system is the calibration of trust. To address this, the paper proposes that trust calibration can be managed and optimized through the creation and continual updating of shared and accurate mental models of the robots. Strategies to promote these mental models, including cross-training, briefings, debriefings, and task-specific elaboration and visualization, are examined. Additionally, the crucial role of an adaptable, distributed, and well-structured user interface (UI) is discussed. I. INTRODUCTION BugWright2 is a research project developing an autonomous multi-robot system for inspection and maintenance of medium to large ships through a collaboration of multiple partners in academia and industry. These partners include roboticists, psychologists, user interface (UI) developers, and industrial maritime companies. The system employs Micro Aerial Vehicles (MAVs), Autonomous Underwater Vehicles (AUVs), and magnetic-wheeled crawlers, aiming to streamline maritime operations and reduce reliance on laborintensive manual processes. One key goal of this project is to enhance worker safety by automating potentially hazardous tasks. At the same time, calibrating trust in Human-Robot Interaction (HRI), particularly in the context of autonomous multi-robot systems like BugWright2, presents significant challenges. Here, each stakeholder’s level of trust needs to be calibrated in to avoid under-usage (not enough trust) and over-reliance (too much trust). Such trust calibration becomes increasingly complex when applied to real-world scenarios involving multiple ”trustors” and ”trustees” interacting within different specific contexts. With multiple trustors involved - including operators, supervisors, safety inspectors, and other stakeholders - the trust dynamics become multi-layered in addition to being multidimensional [1]. At the outset, different trustors have different levels of trust for the same trustees, are influenced *This project has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 871260. Corresponding author: cedric.pradalier@georgiatech-metz.fr 1 CNRS IRL2958 GT-CNRS, Metz, France 2 GeorgiaTech Lorraine, Metz, France 3 Georgia Institute of Technology, Atlanta, USA 4 Trier University, Trier, Germany by their role, their experiences, their understanding of the technology, and individual dispositions (cf. multiple layers of trust in [2]). Barring any planning and specific design choices, over time, trust levels will also likely further vary, as trust might increase and decreases differently for different individuals depending on situational experiences and HRI. It is our position, that one of the best ways to calibrate and manage trust in complex real-world environments is by ensuring accurate and shared mental models of the robots (e.g., the mental representations of the knowledge of system features, functionalities, maintenance, and sufficient use). Below, we begin by exploring the multifaceted trust issues in multi-robot/multi-stakeholder settings, share context-specific lessons learned, and finally, discuss how human-robot interaction and human-computer interaction principles aid in UI design to tackle these challenges. II. T RUST P ROBLEM S PACE FOR M ULTI -R OBOT /M ULTI -S TAKEHOLDER S ITUATIONS When viewed at the individual level, trust in HRI can be understood as a complex system consisting of several components and relationships [3]. Among the trust key components are the trustor, the trustee, and the context in which they reside. In addition, there are numerous internal and external factors that affect the trustor’s internal state and behavior, both at the outset and over time, such as the design of the robots, the trustor’s prior experience, and the trustor’s observations of the robots performing the task (e.g., [4], [5], [2], [1], [6]). In a multi-stakeholder/multi-robot scenario, this trust dynamic then exists not only between the individual stakeholders but each stakeholder and each robot. While this particular scenario adds to the complexity of the trust dynamic, it is possible to leverage the complex environment in a way that is not possible with one-to-one HRI through shared mental models. In the one-on-one case, typically the human participant will start with an initial mental model of the robot based on prior experience and first impressions. Over time, this model is only really updated through the interaction with and observation of the robot (cf., [2]). By contrast, in a multi-stakeholder/multi-robot scenario, mental models can be updated by observations and interactions with both other stakeholders and other robots. For example, an observer watching a robot move in a sort of erratic manner might normally view this as a defect by some stakeholders. Yet here, this individual could also look at the operator and, if the operator appeared" 2312.08048v1,"Compositional Inversion for Stable Diffusion Models Xu-Lu Zhang 1,2 , Xiao-Yong Wei 3,1 * , Jin-Lin Wu 2,4 , Tian-Yi Zhang 1 , Zhao-Xiang Zhang 2,4 , Zhen Lei 2,4 , Qing Li 1 3 1 Dept. of Computing, Hong Kong Polytechnic University, 2 Center for Artificial Intelligence and Robotics, HKISI, CAS, Dept. of Computer Science, Sichuan University, 4 State Key Laboratory of Multimodal Artificial Intelligence Systems, CASIA Input Images Textual Inversion / DreamBooth / Custom Diffusion Compositional Inversion vs. + On the street Cat* + On the street vs. + Chasing butterflies + Piloting a spaceship + Piloting a spaceship + Chasing butterflies vs. + Coding + Coding Dog* vs. + Gazing at galaxy + Wearing a hat + Wearing a hat + Gazing at galaxy Figure 1: Image synthesis using traditional inversion methods and the proposed compositional inversion: concepts of butterf lies, street, and spaceship are absent when composed with concepts inverted with traditional methods. Abstract Inversion methods, such as Textual Inversion, generate personalized images by incorporating concepts of interest provided by user images. However, existing methods often suffer from overfitting issues, where the dominant presence of inverted concepts leads to the absence of other desired concepts. It stems from the fact that during inversion, the irrelevant semantics in the user images are also encoded, forcing the inverted concepts to occupy locations far from the core distribution in the embedding space. To address this issue, we propose a method that guides the inversion process towards the core distribution for compositional embeddings. Additionally, we introduce a spatial regularization approach to balance the attention on the concepts being composed. Our method is designed as a post-training approach and can be seamlessly integrated with other inversion methods. Experimental results demonstrate the effectiveness of our proposed approach in mitigating the overfitting problem and generating more diverse and balanced compositions of concepts * Corresponding Author (x1wei@polyu.edu.hk). Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. in the synthesized images. The source code is available at https://github.com/zhangxulu1996/Compositional-Inversion. Introduction Recently, image synthesis has witnessed remarkable performance from text-to-image diffusion models such as DALL•E (Ramesh et al. 2021), Stable Diffusion (Rombach et al. 2022), Imagen (Saharia et al. 2022). These models typically consist of two modules: semantic embedding and diffusion. Given a simple text prompt like “a cat chasing butterflies”, the semantic embedding module represents the semantics as embeddings, while the diffusion module transforms the embeddings into images that incorporate the desired concepts (e.g., cat, butterflies). However, these models produce concepts in a general sense, resulting in randomly assigned appearances for the cat. This limitation becomes apparent when users seek specific concepts, such as their own cat. It raises challenges to these models in the era of pursuing personalized customization. Textual Inversion (TI) (Gal et al. 2022) remains a core technology to address this limitation. The underlying hy-" 2312.08065v1,"Hubbard physics with Rydberg atoms: using a quantum spin simulator to simulate strong fermionic correlations Antoine Michel, 1, 2, ∗ Loïc Henriet, 3 Christophe Domain, 1 Antoine Browaeys, 2 and Thomas Ayral 4 1 Electricité de France, EDF Recherche et Développement, Département Matériaux et Mécanique des Composants, Les Renardières, F-77250 Moret sur Loing, France 2 Université Paris-Saclay, Institut d’Optique Graduate School, CNRS, Laboratoire Charles Fabry, F-91127 Palaiseau Cedex, France 3 PASQAL, 7 rue Léonard de Vinci, F-91300 Massy, France 4 Eviden Quantum Laboratory, Les Clayes-sous-Bois, France We propose a hybrid quantum-classical method to investigate the equilibrium physics and the dynamics of strongly correlated fermionic models with spin-based quantum processors. Our proposal avoids the usual pitfalls of fermion-to-spin mappings thanks to a slave-spin method which allows to approximate the original Hamiltonian into a sum of self-correlated free-fermions and spin Hamiltonians. Taking as an example a Rydberg-based analog quantum processor to solve the interacting spin model, we avoid the challenges of variational algorithms or Trotterization methods. We explore the robustness of the method to experimental imperfections by applying it to the half-filled, single-orbital Hubbard model on the square lattice in and out of equilibrium. We show, through realistic numerical simulations of current Rydberg processors, that the method yields quantitatively viable results even in the presence of imperfections: it allows to gain insights into equilibrium Mott physics as well as the dynamics under interaction quenches. This method thus paves the way to the investigation of physical regimes—whether out-of-equilibrium, doped, or multiorbital—that are difficult to explore with classical processors. Decades of theoretical efforts have led to tremendous progress in the understanding of the exotic phases of strongly correlated electron systems. For instance, lots is known about the physics of their minimal model, the Hubbard model [1, 2]. Yet, the exponential difficulty of the underlying many-body problem still poses formidable challenges in low-temperature, doped phases relevant to cuprate superconductors, in multi-orbital settings relevant, for instance, to iron-based superconductors [3] and the recent Moiré superconductors [4], or in out-ofequilibrium situations like sudden quenches that lead to a fast growth of entanglement [5]. Quantum processors, i.e., controllable, synthetic quantum many-body systems [6], are promising to solve these outstanding challenges [7]. Ultracold fermionic atoms trapped in optical lattices were already implemented more than a decade ago [8–17] as the most direct, or ""analog"", quantum processors of fermions. They allowed to observe signatures of, for instance, Mott physics, while operating—so far—at temperatures too high to gain insights into pseudogap or superconducting phases. In contrast, universal ""digital"" quantum processors rely on quantum bits encoded on two-level or ""spin- 1/2"" systems, and operate logic gates on them. They in principle enable the simulation of the second-quantized fermionic problems explored in materials science [18] or chemistry [19]. Yet, early attempts are facing the physical limitations of these processors in terms of the number of qubits and number of gates that can be reliably executed before decoherence sets in. Fermionic systems are ∗ antoine.michel@edf.fr particularly demanding due to the loss of locality of the Hamiltonian [20, 21] or the need for auxiliary qubits [22– 24] that come with translating to a qubit language. Both constraints generically lead to longer quantum programs, and hence an increased sensitivity to imperfections. To alleviate those issues, hybrid quantum-classical methods [25, 26] such as the Variational Quantum Eigensolver (VQE, [27]) were proposed, with many developments but without clear-cut advantage so far. Despite remarkable recent progress towards large-size digital quantum processors, ""analog"" quantum processors remain a serious alternative to explore fermionic problems. Beyond the aforementioned ultracold atoms, analog platforms include systems of trapped ions and cold Rydberg atoms. The lesser degree of control of these processors—with a fixed, specific ""resource"" Hamiltonian that does not necessarily match the ""target"" Hamiltonian of interest—is compensated for by the large number of particles that can be controlled, with now up to a few hundreds of particles [28–30]. In addition, the parameters of the resource Hamiltonian are usually precisely controlled in time [28, 31–35]. This has enabled the use of such processors to study many-body problems in several recent works [34, 36–39]. For instance, [36] have investigated the physics of the Schwinger model—a toy problem for lattice quantum electrodynamics—by leveraging the similarity between the symmetries of a 20-ion quantum simulator and those of the Schwinger model. However, finding such a similarity between target an resource Hamiltonian is rare. For instance, the question of how to tackle a fermionic many-body problem with a spin-based, analog simulator is an open problem. In this Letter, we propose a method to address this" 2312.08074v1,"P Y SCIPO PT -ML: E MBEDDING T RAINED M ACHINE L EARNING M ODELS INTO M IXED -I NTEGER P ROGRAMS A P REPRINT Mark Turner ∗ turner@zib.de Antonia Chmiela ∗ chmiela@zib.de Thorsten Koch † ∗ koch@zib.de Michael Winkler ‡ winkler@gurobi.com December 14, 2023 A BSTRACT A standard tool for modelling real-world optimisation problems is mixed-integer programming (MIP). However, for many of these problems there is either incomplete information describing variable relations, or the relations between variables are highly complex. To overcome both these hurdles, machine learning (ML) models are often used and embedded in the MIP as surrogate models to represent these relations. Due to the large amount of available ML frameworks, formulating ML models into MIPs is highly nontrivial. In this paper we propose a tool for the automatic MIP formulation of trained ML models, allowing easy integration of ML constraints into MIPs. In addition, we introduce a library of MIP instances with embedded ML constraints. The project is available at https://github.com/Opt-Mucca/PySCIPOpt-ML. 1 Introduction and Related Work Many problems coming from real-world applications can be modelled using Mixed-Integer Programming (MIP). They can be expressed as min n f 0 (x) x∈R s.t. f i (x) ≤ 0, ∀i ∈ [m], x i ∈ Z, ∀i ∈ I, (P) where each f i : R n → R, i = 0, . . . , m is continuous and I ⊆ [n] denotes the index set of the integerconstrained variables. Due to its ability to represent complex systems and decision-making processes across various industries, MIP has become a standard tool to solve optimisation problems arising in real-world applications. A common challenge of finding a suitable MIP formulation (P) of a system is the presence of unknown or highly complex relationships. This poses a problem since traditional MIP approaches rely on precise definitions of constraints and the objective function. To address this challenge, Machine Learning (ML) predictors are often used to approximate these relationships and are then embedded in (P) as surrogate models. To embed a trained ML predictor g : R n → R, it must first be formulated as a MIP, before it can be added to (P). However, with the growing popularity and accessibility of different frameworks [1, 2, 3, 4, 5], automatically formulating trained ML models coming from these different architectures into MIPs has become a highly non-trivial, yet necessary task. Contribution. In this paper, we present PySCIPOpt-ML, an open-source tool for the automatic formulation of trained ML predictors as MIPs. By directly interfacing with a broad range of commonly used ML ∗ Zuse Institute Berlin, Department of Mathematical Optimization, Takustr. 7, 14195 Berlin Chair of Software and Algorithms for Discrete Optimization, Institute of Mathematics, Technische Universität Berlin, Straße des 17. Juni 135, 10623 Berlin, Germany ‡ Gurobi GmbH, Ulmenstr. 37-39, 60325 Frankfurt am Main, Germany †" 2312.08086v1,"Recursive Augmented Fernet (RAF) Token Alleviating the Pain of Stolen Tokens Reza Rahaeimehr, Augusta University, GA, USA, rrahaeimehr@augusta.edu Marten van Dijk, University of Connecticut, CT, USA, vandijk@engr.uconn.edu Abstract 1 Introduction Modularity and modular thinking and development models are the key to implementing an extensive system. For a modular system, a proper authentication and authorization mechanism is essential. Usually, there is a module, say the identity module, in a modular system that is in charge of authentication and authorization. Users present their credentials (usually a username and password) to the identity module and are granted tokens in exchange. Other modules only serve users who have valid tokens. Tokens are either a random bit string like a UUID that points to an entry in an authentication and authorization database, or a crafted piece of data that carries some authentication and authorization information like Fernet and JWT tokens (see section 2.2). Using token instead of username and password has three main advantages: A robust authentication and authorization mechanism is imperative in modular system development, where modularity and modular thinking are pivotal. Traditional systems often employ identity modules responsible for authentication and token issuance. Tokens, representing user credentials, offer advantages such as reduced reliance on passwords, limited lifespan, and scoped access. Despite these benefits, the ""bearer token"" problem persists, leaving systems vulnerable to abuse if tokens are compromised. We propose a token-based authentication mechanism addressing modular systems’ critical bearer token problem. The proposed mechanism includes a novel RAF (Recursive Augmented Fernet) token, a blacklist component, and a policy enforcer component. RAF tokens are one-time-use tokens, like tickets. They carry commands, and the receiver of an RAF token can issue new tokens using the received RAF token. The blacklist component guarantees an RAF token can not be approved more than once, and the policy enforcer checks the compatibility of commands carried by an RAF token. We introduce two variations of RAF tokens: User-tied RAF, offering simplicity and compatibility, and Fully-tied RAF, providing enhanced security through service-specific secret keys. We thoroughly discuss the security guarantees, technical definitions, and construction of RAF tokens backed by game-based proofs. We demonstrate a proof of concept in the context of OpenStack, involving modifications to Keystone and creating an RAFT library. The experimental results reveal minimal overhead in typical scenarios, establishing the practicality and effectiveness of RAF. Our experiments show that the RAF mechanism beats the idea of using short-life Fernet tokens while providing much better security. • Users do not need to use their passwords for every system access. Consequently, the probability of leaking passwords gets lower. • Every token has an expiration time. Hence, a stolen token can only be abused for a limited time. • It is possible to limit the scope of a token and let the user ask for a less privileged token. In this case, if an adversary steals the token, she will have limited access to the resources of the token owner. The above features allow a user to get a short-life scoped token from the identity module and delegate the authority to a third trusted party to accomplish a complicated task within the scope. Problem: Although the ability to use a token and make requests on behalf of a user (authorization delegation) is a 1" 2312.08091v1,"Purely elastic turbulence in pressure-driven channel flows Martin Lellep a , Moritz Linkmann b , and Alexander Morozov a,1 a School of Physics and Astronomy, The University of Edinburgh, James Clerk Maxwell Building, Peter Guthrie Tait Road, Edinburgh, EH9 3FD, United Kingdom; b School of Mathematics and Maxwell Institute for Mathematical Sciences, The University of Edinburgh, Edinburgh, EH9 3FD, United Kingdom Polymer solutions | Viscoelastic flows | Elastic turbulence | Direct numerical simulations M T (14), however, recent experiments present strong evidence of the presence of elastic turbulence in parallel shear geometries (15–17). Indeed, it was proposed that the transition to elastic turbulence in such geometries is a ‘bifurcation from infinity’ (18), i.e. it requires a finite-amplitude flow perturbation (19). Recently, the first steps were made in confirming this instability scenario theoretically. The development was spurred by the discovery of a linear instability in parallel shear geometries (20) that only exists in a remote part of the parameter space, with Wi ∼ O(10 3 ) and at extremely low polymer concentrations. Although this linear instability might not be accessible experimentally and is not directly responsible for triggering elastic turbulence, it was shown to give rise to two-dimensional nonlinear travelling-wave solutions (21). When continued outside this part of the parameter space, the travelling-wave solutions persist even in the absence of the underlying linear instability and can be found for a broad range of experimentally relevant parameters (22). Below, we refer to these as ‘narwhal’ solutions, reflecting the characteristic spatial profile of the associated polymer stretch. Although they resemble some features observed in experiments (15–17), the ‘narwhal’ states cannot be identified with elastic turbulence as they are not chaotic. Despite these advances, it is presently not known how elastic turbulence is sustained. The main obstacle to further progress is the lack of understanding of the three-dimensional spatial distribution of the polymeric stresses and the associated fluid velocity of elastic turbulence, and how they evolve in time. In the absence of experimental measurements, it is natural RA F Solutions of long, flexible polymer molecules are complex fluids that simultaneously exhibit fluid-like and solid-like behaviour. When subjected to an external flow, dilute polymer solutions exhibit elastic turbulence - a unique, chaotic flow state absent in Newtonian fluids, like water. Unlike its Newtonian counterpart, elastic turbulence is caused by polymer molecules stretching and aligning in the flow, and can occur at vanishing inertia. While experimental realisations of elastic turbulence are well-documented, there is currently no understanding of its mechanism. Here, we present large-scale direct numerical simulations of elastic turbulence in pressure-driven flows through straight channels. We demonstrate that the transition to elastic turbulence is sub-critical, giving rise to spot-like flow structures that, further away from the transition, eventually spread throughout the domain. We provide evidence that elastic turbulence is organised around unstable coherent states that are localised close to the channel midplane. ost of the materials around us do not flow like Newtonian fluids do. Polymer rod-climbing (1), colloidal shear-thickening (2), and shear-banding in worm-like micelles (3) are just a few examples of such non-Newtonian behaviour that stems from the microstructure of these materials changing under external deformations. Despite their relevance to a wide spectrum of phenomena, ranging from microorganism propulsion (4) and mechanics of biological tissues (5) to polymer processing (6), time-dependent flows of non-Newtonian fluids are often beyond the reach of the current theory. An archetypal example of such unsteady flows is observed in dilute solutions of long, flexible polymer molecules (7). When subjected to a steady external forcing, polymer solutions exhibit instabilities to unsteady, chaotic flows often referred to as elastic turbulence (8). Unlike its Newtonian counterpart, which is driven by fluid inertia, elastic turbulence originates in strongly anisotropic elastic stresses developing under external forcing, and can occur even in the absence of inertia (9, 10). The transition to elastic turbulence is then controlled by a dimensionless parameter, the Weissenberg number Wi - a product of the applied velocity gradient scale and the polymer relaxation time, that determines the strengths of the elastic stresses and plays the same role that the Reynolds number, Re, does in Newtonian turbulence. The route to elastic turbulence is best documented in model geometries with curved streamlines, where anisotropic elastic ‘hoop’ stresses lead to linear instabilities (11) followed by a transition to chaotic flows at higher Wi (12, 13). Much less is known about flows of dilute polymer solutions in straight channels and pipes. Parallel shear flows of model polymer fluids are linearly stable under the experimentally relevant conditions D This manuscript was compiled on December 14, 2023 www.pnas.org/cgi/doi/10.1073/pnas.XXXXXXXXXX Significance Statement Flows of complex fluids (such as polymers, colloids, emulsions, pastes, etc.) are abundant in everyday life. One can think of pouring shampoo or squeezing toothpaste from a tube, but also of fibre-spinning and plastic extrusion. Such flows often exhibit unexpected complexity with an archetypal example being elastic turbulence – chaotic motion exhibited by dilute polymer solutions. While its appearance is understood theoretically in flows with curved streamlines, little is known about elastic turbulence in straight pipes and channels. Here, we report the first simulations of elastic turbulence in a parallel flow geometry. Our results show that elastic turbulence is very different from its Newtonian counterpart and pave the way to understanding its mechanism. M. Linkmann and A.M. designed the research. All authors performed the numerical simulations and data analysis. M. Linkmann and A.M. wrote the paper. The authors declare no competing interests. 1 To whom correspondence should be addressed. E-mail: alexander.morozov@ed.ac.uk PNAS | December 14, 2023 | vol. XXX | no. XX | 1–7" 2312.08118v1,"Neural Radiance Fields for Transparent Object Using Visual Hull Heechan Yoon Seungkyu Lee Dept. of Computer Science and Engineering Kyunghee University Yongin, Republic of Korea harryyoon777@gmail.com Dept. of Computer Science and Engineering Kyunghee University Yongin, Republic of Korea seungkyu@khu.ac.kr Abstract—Unlike opaque object, novel view synthesis of transparent object is a challenging task, because transparent object refracts light of background causing visual distortions on the transparent object surface along the viewpoint change. Recently introduced Neural Radiance Fields (NeRF) is a view synthesis method. Thanks to its remarkable performance improvement, lots of following applications based on NeRF in various topics have been developed. However, if an object with a different refractive index is included in a scene such as transparent object, NeRF shows limited performance because refracted light ray at the surface of the transparent object is not appropriately considered. To resolve the problem, we propose a NeRF-based method consisting of the following three steps: First, we reconstruct a three-dimensional shape of a transparent object using visual hull. Second, we simulate the refraction of the rays inside of the transparent object according to Snell’s law. Last, we sample points through refracted rays and put them into NeRF. Experimental evaluation results demonstrate that our method addresses the limitation of conventional NeRF with transparent objects. Index Terms—transparent objects, refraction, view synthesis I. I NTRODUCTION AND R ELATED W ORKS In our daily experiences, we often see that background behind transparent object appears distorted as it passes through the object due to refraction. Light refraction occurring on the surface of transparent object is important to consider for realistic rendering of transparent objects. However, light refraction is influenced by the index of refraction (IOR) and geometry of transparent objects. Furthermore, the refraction varies along the viewpoint, leading to the changes in the object’s appearance. For the reasons, novel view synthesis of transparent objects based on color images is a challenging task. Existing works on novel view synthesis include transparent object reconstruction and neural rendering. To reconstruct transparent objects, special hardware setups like light field probes [1], turntables [2] have been required. Recently, Li et al. [3] propose neural network that obtains geometry of transparent objects using a few images. However this method has the constraint of requiring an environment map. Also, when presented with an image that significantly deviates from the training data, it often produces inaccurate estimates. The latter, neural rendering, has seen significant advancements. In particular, Neural Radiance Fields (NeRF) [4] has gained attention as a new approach in computer graphics and com- puter vision, offering high-quality novel view synthesis. NeRF generates 3D representations of scene from 2D images by using machine learning and volume rendering. NeRF uses multi-layer perceptrons (MLPs) which take 3D coordinates (x, y, z) of sample points on light ray and viewing direction (θ, ϕ) indicating the direction of the ray as inputs and estimating the density and color values at those coordinates. The density and color values are used to predict pixel value by applying volume rendering. NeRF does not consider the refraction of rays and uses only straight rays. NeRF samples points along straight rays, leading to a challenge in accurately representing scenes containing transparent objects where ray refraction occurs. Recent studies have proposed various approaches to address the problem. Bemana et al. [5] mark the area corresponding to transparent objects with a bounding box and optimize the 3D spatially-varying IoR inside the box. The curved way of light paths is determined by an eikonal equation that calculates based on the spatial gradients of the IoR field. However, bounding box approximately encompasses the area corresponding to transparent object, making it challenging to synthesize scene accurately for complex-shaped transparent objects. Fujitomi et al. [6] propose the offset field network which estimates an offset from the straight line starting at the camera center. This allows the network to train without prior knowledge such as IOR or the shape of the object. However, due to the implicit representation of light refraction, it can not handle complex light paths. In this paper, we tackle the problem of novel view synthesis for transparent objects, which involves requiring complex hardware setup or absense of geometry. To end this, we propose a method based on NeRF, mathematical equations for the description of light refraction, and visual hull [8], which reconstructs 3D volume from intersecting cones created by back projection of object silhouettes observed from multiple viewpoints. The reason why three concepts came out is as follows. NeRF shows outperforming performance in terms of view synthesis compared to existing models [9], [10]. However, because NeRF uses a straight ray, it is not suitable for synthesis a scene with transparent objects where light is refracted. To calculate light refraction, we use mathematical equations which require object’s geometry. So we get 3D object through visual hull reconstruction. One of the advantages" 2312.08132v1,"ULTRA LOW COMPLEXITY DEEP LEARNING BASED NOISE SUPPRESSION Shrishti Saha Shetu, Soumitro Chakrabarty, Oliver Thiergart, Edwin Mabande Fraunhofer IIS, Am Wolfsmantel 33, 91058 Erlangen, Germany {shrishti.saha.shetu, soumitro.chakrabarty, oliver.thiergart, edwin.mabande}@iis.fraunhofer.de ABSTRACT This paper introduces an innovative method for reducing the computational complexity of deep neural networks in realtime speech enhancement on resource-constrained devices. The proposed approach utilizes a two-stage processing framework, employing channelwise feature reorientation to reduce the computational load of convolutional operations. By combining this with a modified power law compression technique for enhanced perceptual quality, this approach achieves noise suppression performance comparable to state-of-the-art methods with significantly less computational requirements. Notably, our algorithm exhibits 3 to 4 times less computational complexity and memory usage than prior state-of-the-art approaches. Index Terms— speech enhancement, noise suppression, power law compression, two-stage processing 1. INTRODUCTION Speech enhancement (SE) aims to suppress interfering noise while preserving intelligibility and improving the perceived quality of the speech signal. In recent years, there has been a notable rise in the prominence of deep neural network (DNN) based techniques, which have demonstrated a substantial performance improvement over conventional signal processing-based methods [1, 2, 3, 4, 5]. State-of-the-art (SOTA) approaches often employ encoder-decoder DNN architectures, reminiscent of U-Net [6, 7, 8, 9], operating in the time-frequency (TF) domain. Most of these approaches demand significant computational resources due to the high number of frequency bins in the TF domain. To overcome this challenge, various techniques have been proposed including channelwise frequency splitting [10], multiband processing [11, 12], and using analysis filterbanks inspired by human auditory perception [13]. PercepNet [1] and DeepFilternet2 [14], address this challenge by employing a triangular equivalent rectangular bandwidth (ERB) filter bank. However, this approach only allows for estimating real-valued gains for the ERB bands. To further enhance the phase component of speech, a comb filter, and a deep filtering method [15, 16] were additionally applied. However, despite these recent advancements in reducing computational complexity, deploying these algorithms on resource-constrained embedded devices remains challenging because this typically comes at the cost of compromising on the noise suppression performance. Therefore, in this study, inspired by [14, 17], we propose a two-stage processing framework to address this issue. In the first stage, we employ a highly efficient convolutional recurrent network (CRN) architecture [18] to estimate an intermediate real magnitude mask. In the second stage, with the help of an even smaller and less complex convolutional neural network (CNN), we enhance the phase components of speech by combining the noisy phase information with the intermediate real magnitude mask. To reduce the computational complexity of the convolution operations in our CRN architecture, we employ the channelwise feature reorientation method described in [19]. Unlike common literature approaches [6, 7], we opt not to include a decoder for magnitude mask estimation from bottleneck features. Further, to ensure the robustness of the input features and training targets, we also use a modified power law compression method. Our study establishes that our proposed method achieves noise suppression performance comparable to, or even surpassing most SOTA approaches. Our proposed DNN model has only 688K parameters and achieves 0.127 real time factor for a 16 kHz sampling rate on a single core of a Cortex- A53 1.43 GHz processor with a complexity of 0.098 GMACS. This renders our approach highly suitable for deployment on resource-constrained embedded devices. 2. METHODS 2.1. Input Preprocessing We assume an additive signal model in the STFT domain where, X(n, k), S(n, k), and N (n, k) denote the noisy signal, the clean speech signal, and the noise components, and n, k denote the time-frame and frequency-bin indices, respectively. In our work, the input features provided to the DNN are the magnitude and phase features computed from the power law compressed real and imaginary parts of the noisy signal’s STFT. The power law compression method is detailed below. The complex-valued noisy signal X can be expressed in complex rectangular and polar coordinates as: X(n, k) = X r (n, k) + jX i (n, k) = |X(n, k)|e jθ X (1)" 2312.08148v1,"Fundamental limits on quantum measurement engines Guillermo Perna and Esteban Calzetta Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de Fı́sica. Buenos Aires, Argentina, and CONICET - Universidad de Buenos Aires, Instituto de Fı́sica de Buenos Aires (IFIBA). Buenos Aires, Argentina gperna@df.uba.ar ; calzetta@df.uba.ar December 14, 2023 Abstract A quantum measurement involves energy exchanges between the system to be measured and the measuring apparatus. Some of them involve energy losses, for example because energy is dissipated into the environment or is spent in recording the measurement outcome. Moreover, these processes take time. For this reason, these exchanges must be taken into account in the analysis of a quantum measurement engine, and set limits to its efficiency and power. We propose a quantum engine based on a spin 1/2 particle in a magnetic field and study its fundamental limitations due to the quantum nature of the evolution. The coupling with the electromagnetic vacuum is taken into account and plays the role of a measurement apparatus. We fully study its dynamics, work, power and efficiency. 1 Introduction The advancement of quantum measurement engines [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] not only offers significant technological potential but also carries profound implications for fundamental physics [11]. Therefore, it is crucial to develop precise methods for assessing their performance in terms of both efficiency and power. In a quantum measurement engine, as opposed to a thermal one [12, 13, 14, 15, 16, 17, 18, 19], energy is introduced into the system not in the form of heat but through an interaction with an external apparatus, typically interpreted as a measurement on the system. If this interaction indeed constitutes a measurement, the resulting information could be used to influence the subsequent operation of the engine, similar to a Maxwell’s demon scenario [20, 21, 22, 23, 24]. In a simpler context, the key is that a measurement is conducted, the specific outcome being inconsequential [25, 26]. This type of quantum measurement engine is the focus of our discussion. While a comprehensive theory of quantum measurement remains elusive [27, 28, 29, 30, 31, 32, 33, 34, 35], there is a general consensus that a measurement process comprises several stages, which can be summarised as follows: 1) The system to be measured comes into contact with the measuring device, which is usually a macroscopic body significantly larger than the system [36, 37], and they evolve unitarily into an entangled state. 2) This initially entangled, yet pure state, transforms into a mixed state where distinct measurement outcomes, stored within the apparatus, can be assigned definite probabilities. If the Schrödinger equation remains unaltered, this decoherence process is attributed to the interaction of the system-apparatus complex with an external environment [38, 39, 40, 41, 42, 43, 44, 45]. 3) The mixed state evolves into a single pure state, in which the measurement recorded by the apparatus displays a definite result [46, 47, 48, 49, 50]. Since we are concerned with engines that function regardless of the measurement outcome, the completion of this stage is not essential for our analysis. 1" 2312.08161v1,"The mentor-child paradigm for individuals with autism spectrum disorders Marion Dubois-Sage Baptiste Jacquet Laboratoire CHArt-UP8 RNSR 200515259U Saint-Denis, France Université Paris 8 Saint-Denis, France Laboratoire CHArt-UP8 RNSR 200515259U Saint-Denis, France Université Paris 8 Saint-Denis, France Frank Jamet Jean Baratgin ∗ Laboratoire CHArt-UP8 RNSR 200515259U Saint-Denis, France CY Cergy Université Cergy-Pontoise, France Laboratoire CHArt-UP8 RNSR 200515259U Saint-Denis, France Université Paris 8 Saint-Denis, France jean.baratgin@univ-paris8.fr ABSTRACT Our aim is to analyze the relevance of the mentor-child paradigm with a robot for individuals with Autism Spectrum Disorders, and the adaptations required. This method could allow a more reliable evaluation of the socio-cognitive abilities of individuals with autism, which may have been underestimated due to pragmatic factors. CCS CONCEPTS • Social and professional topics → People with disabilities; • Human-centered computing → Interaction design theory, concepts and paradigms. KEYWORDS developmental psychology, autism spectrum disorders, human-robot interaction, mentor-child paradigm ACM Reference Format: Marion Dubois-Sage, Baptiste Jacquet, Frank Jamet, and Jean Baratgin. 2023. The mentor-child paradigm for individuals with autism spectrum disorders. In Proceedings of 18th ACM/IEEE International Conference on Human-Robot Interaction (HRI 2023), March 13–16, 2023, Stockolm, SE. ACM, New York, NY, USA, 5 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The present article aims at highlighting the interest of the mentorchild paradigm [14] for individuals with Autism Spectrum Disorders (ASD). This experimental paradigm, which consists in replacing the interaction of a child with an adult by an interaction with a robot, has already shown its effectiveness in re-evaluating the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CONCATENATE - HRI, March 13, 2023, Stockholm, SE © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX performance of neurotypical children previously underestimated [3]. It could also have benefits for children with ASD, both experimentally by allowing a more detailed study of their socio-cognitive abilities, and developmentally by providing a supportive environment for learning. Autism is a neurodevelopmental disorder characterized by restricted or repetitive patterns of behavior, interests, or activities, as well as deficits in communication and social interactions, [1]. Therefore, although the mentor-child paradigm appears to be effective with neurotypical children, it may need to be adapted for implementation with individuals with autism. The way they perceive and interact with robots might differ from that of neurotypical individuals. Since the processing of robot features - both appearance and behavior - depends on the cognitive abilities of the user [16], and since individuals with ASD may have cognitive impairments, they will not necessarily interpret cues in the same way [38]. 2 AMBIGUITY IN CONVERSATIONAL TESTS Many psychological tests aimed at assessing children’s socio-cognitive development are based on conversational interaction, i.e., they involve a dialogue between an experimenter and a child. Four common features of these tests have been identified by Baratgin et al. [4] and [5]: 1) A problem situation is introduced to the child by the presence of a physical device (e.g., pictures or objects); 2) The adult examiner (or experimenter) initiates a conversation with the child to explain the problem situation (e.g., tells the child a story based on pictures); 3) The experimenter asks the child a test question. The child’s response to this target question will determine whether or not the child has acquired the concept being studied; 1 4) These studies take place mostly in a room provided at the child’s school which places them in a school context. In other words, when the child has to answer a question asked by the experimenter, they do not differentiate it from a question from their teacher. This teaching context determines the role assigned to each agent (the child has the role of student, and the adult has the role of the teacher). In these conversational tests, performance can be impacted by the pragmatics of language [31]. Indeed, success in this type of task 1 This response can be verbal - with an oral answer - or non-verbal - with a gesture." 2312.08166v1,"1 2PoA02-03 Magnetic Measurements and Alignment Results of LQXFA/B Cold Mass Assemblies at Fermilab J. DiMarco, P. Akella, G. Ambrosio, M. Baldini, G. Chlachidze, S. Feher, J. Nogiec, V. Nikolic, S. Stoynev, T. Strauss, M. Tartaglia, P. Thompson, D. Walbridge Abstract— MQXFA production series quadrupole magnets are being built for the Hi-Lumi (HL) LHC upgrade by the US Accelerator Upgrade Project (US-HL-LHC AUP). These magnets are being placed in pairs, as a cold mass, within cryostats at Fermilab, and are being tested to assess alignment and magnetic performance at Fermilab’s horizontal test stand facility. The ~10 m - long assembly must meet stringent specifications for quadrupole strength and harmonic field integrals determination, magnetic axis position, and for magnet variations in positioning and local field profile. This paper describes the results of the magnetic and alignment measurements which characterize the first LQXFA/B assembly. Index Terms— Accelerator magnets, electromagnetic measurements, superconducting magnets, magnetic measurements, magnet alignment. T I. INTRODUCTION he US-HiLumi Accelerator Upgrade Project (AUP), comprised of Fermilab, Brookhaven National Lab (BNL), and Lawrence Berkeley National Lab (LBNL), are currently in the process of producing 20 4.5 m-long Nb 3 Sn superconducting magnets for the final-focus interaction regions of the LHC. The final step in this production, after assembling pairs of magnets into a single cold-mass and inserting them into a cryogenic vessel, is horizontal testing at nominal LHC temperature and field conditions to demonstrate compliance with performance specifications in their final configuration. The first article cryo-assembly (CA) in the series, LQXFA/B01, containing magnets MQXFA03 (referred herein as A03) and MQXFA04 (A04), has recently undergone testing at Fermilab’s horizontal magnet test facility. An overview of fabrication, facilities, and quench performance test results for this CA is given elsewhere [1][2][3]. Here we present the results of the LQXFA/B01 magnetic measurements, including alignment, integrated quadrupole strength, geometrical field harmonics, and local magnet variations, as well as comparison to requirements specifications. Submitted for review September 19, 2023 This work was supported by the U.S. Department of Energy, Office of Science, Office of High Energy Physics, through the US HL-LHC Accelerator Upgrade Project.. The authors are with Fermi National Accelerator Laboratory, P.O. Box 500, Batavia, IL 60510, USA, (corresponding author e-mail: dimarco@fnal.gov). Color versions of one or more of the figures in this article are available online at http://ieeexplore.ieee.org II. FIELD DEFINITION AND MEASUREMENT SYSTEM The measured field of a quadrupole is expressed in a standard form of harmonic coefficients defined in a series expansion of a complex field function 𝐵𝐵 𝑦𝑦 + 𝑖𝑖𝐵𝐵 𝑥𝑥 = 𝐵𝐵 2 10 −4 ∞ 𝑥𝑥 + 𝑖𝑖𝑖𝑖 �(𝑏𝑏 𝑛𝑛 + 𝑖𝑖𝑎𝑎 𝑛𝑛 ) � � 𝑅𝑅 𝑟𝑟𝑟𝑟𝑟𝑟 𝑛𝑛−1 𝑛𝑛=1 where B x and B y are the field components in Cartesian coordinates, b n and a n are the normal and skew coefficients at reference radius R ref , normalized to the main field, B 2 , and scaled by a factor 10 4 so as to report the harmonics in convenient ‘units’. All measurements utilize R ref of 50 mm, and harmonics are reported after feed-down correction for the probe being off-center. Though the magnets are assembled ‘back-to-back’ in the cryostat and use a ‘thru-bus’ to power them so they function as a single unit (Fig. 1), harmonics are reported for each magnet individually in a frame that views each magnet from its lead-end, and powers the magnet to have a negative normal quadrupole as main field. For these individual magnet results, a right-handed measurement coordinate system is defined with the origin at the center of the magnetic aperture, centered axially on the magnetic length, with x-axis to the right, and z pointing towards the lead end. This matches the reporting frame requested by CERN [4], and also the frame used for harmonics results during fabrication obtained at LBNL [5] and vertical magnet testing at BNL [6]. Fig. 1. Schematic of test stand showing cryogenic components, SSW stages, and lead ends (LE) of magnets A03/A04 Magnetic measurements are performed with the systems and techniques described in [7], principally a Single Stretched Wire system (SSW), and translated rotating coil (RC) probe fitted with laser tracker targets. The rotating coil is made-up of 3 PCB-based probes with dipole and quadrupole buck windings: two back-to-back probes of 109 mm length (matching the transposition pitch of the cable in the magnet), and one of 436 mm length. The probe has a local encoder and 22 m-long driveshaft/push-tube which connects to a stepper motor external to the magnet on a drive rail [7]. The test plan" 2312.08168v1,"Chat-3D v2: Bridging 3D Scene and Large Language Models with Object Identifiers Luping Liu 1 Haifeng Huang 1 * Zehan Wang 1 * Rongjie Huang 1 1 2 1 Xize Cheng Yang Zhao Tao Jin Zhou Zhao 1 1 Zhejiang University 2 Bytedance Inc. {huanghaifeng, wangzehan01}@zju.edu.cn Abstract Recent research has evidenced the significant potentials of Large Language Models (LLMs) in handling challenging tasks within 3D scenes. However, current models are constrained to addressing object-centric tasks, where each question-answer pair focuses solely on an individual object. In real-world applications, users may pose queries involving multiple objects or expect for answers that precisely reference various objects. We introduce the use of object identifiers to freely reference objects during a conversation. While this solution appears straightforward, it presents two main challenges: 1) How to establish a reliable one-to-one correspondence between each object and its identifier? 2) How to incorporate complex spatial relationships among dozens of objects into the embedding space of the LLM? To address these challenges, we propose a two-stage alignment method, which involves learning an attribute-aware token and a relation-aware token for each object. These tokens capture the object’s attributes and spatial relationships with surrounding objects in the 3D scene. Once the alignment is established, we can fine-tune our model on various downstream tasks using instruction tuning. Experiments conducted on traditional datasets like ScanQA, Scan- Refer, and Nr3D/Sr3D showcase the effectiveness of our proposed method. Additionally, we create a 3D scene captioning dataset annotated with rich object identifiers, with the assistant of GPT-4. This dataset aims to further explore the capability of object identifiers in effective object referencing and precise scene understanding. 1 1. Introduction Researchers have recently shown a strong interest in general-purpose Multi-modal Large Language Models (MLLMs) [11–13, 21, 48]. These models, through estab- * Equal contribution 1 Code will be released at https://github.com/Chat-3D/Chat-3D-v2. Q: Find the closest trash bin to the chair at the southwest corner of the rightmost table. obj13 obj23 A: There are two trash bins, both located near the chair. One of them is positioned between the legs of the table, partially tucked under it. The other bin is placed on the floor against the wall. obj32 Q: Find the closest trash bin to obj13. A: There are two trash bins, obj32 and obj23, both located near the chair. Figure 1. An example of using object identifiers in the conversation. lishing alignment between language and various modalities such as images, audio, and point clouds, gain the ability to comprehend multi-modal content and tackle diverse tasks. Although methods like Imagebind-LLM [13] and Point- LLM [12] have been developed to align 3D point clouds with LLMs, adapting them to real-world 3D scenes remains challenging. This is primarily due to the intricate spatial relationships among numerous objects and the limited availability of 3D scene-text data used for effective alignment. 3D-LLM [14] and Chat-3D [33] take the initial efforts to incorporate 3D scenes into LLMs. They effectively address a wide range of 3D-language scene understanding tasks, highlighting the potential of LLMs in comprehending the complexities of real 3D scenes. 3D-LLM primarily relies on translating 3D features into the space of 2D Vision-Language Models (VLMs) [2, 19]. However, handling the intricate spatial relationships inherent in 3D scenes proves challenging for the 2D vision encoder of the VLM. On the other hand, Chat-3D offers a solution by directly mapping 3D features into the LLM space and employing a relation module to capture spatial relationships, which demonstrates impressive conversational capabilities within 3D scenes. Nevertheless, it requires specifying a target object for the conversation, which limits the range of dialogue" 2312.08171v1,"Individual Updating of Subjective Probability of Homicide Victimization: a “Natural Experiment” on Risk Communication José Raimundo Carvalho ∗ Diego de Maria André † Yuri Costa ‡ Abstract We investigate the dynamics of the update of subjective homicide victimization risk after an informational shock by developing two econometric models able to accommodate both optimal decisions of changing prior expectations which enable us to rationalize skeptical Bayesian agents with their disregard to new information. We apply our models to a unique household data (N = 4, 030) that consists of socioeconomic and victimization expectation variables in Brazil, coupled with an informational “natural experiment” brought by the sample design methodology, which randomized interviewers to interviewees. The higher priors about their own subjective homicide victimization risk are set, the more likely individuals are to change their initial perceptions. In case of an update, we find that elders and females are more reluctant to change priors and choose the new response level. In addition, even though the respondents’ level of education is not significant, the interviewers’ level of education has a key role in changing and updating decisions. The results show that our econometric approach fits reasonable well the available empirical evidence, stressing the salient role heterogeneity represented by individual characteristics of interviewees and interviewers have on belief updating and lack of it, say, skepticism. Furthermore, we can rationalize skeptics through an informational quality/credibility argument. Keywords: Economics of Crime, Bayesian Update, Subjective Probabilities JEL Classification Number: C24, D83, D84 ∗ Author for correspondence. Professor in the Graduate Program in Economics, CAEN/UFC and Director of the Colégio de Estudos Avançados, CEA/EIDEIA. Prédio da EIDEIA – Escola Integrada de Desenvolvimento e Inovação Acadêmica, Campus do Pici S/N - CEP 60455-760 - Fortaleza – CE, Brazil. E-mail: josecarv@ufc.br. Telephone: +5585-991232037. † Departament of Economics, Federal University of Rio Grande do Norte (UFRN). Av. Sen. Salgado Filho, 3000, Lagoa Nova, Natal/RN, CEP 59078-970, Brazil. E-mail:diego.andre@ufrn.br. Telephone: +5584-3215-3509 ‡ CIA HERING, São Paulo, Brazil 0" 2312.08174v1,"Double Machine Learning for Static Panel Models with Fixed Effects * Paul Clarke † Annalivia Polselli ‡ December 14, 2023 Abstract Machine Learning (ML) algorithms are powerful data-driven tools for approximating high- dimensional or non-linear nuisance functions which are useful in practice because the true functional form of the predictors is ex-ante unknown. In this paper, we develop estimators of policy interventions from panel data which allow for non-linear effects of the confounding regressors, and investigate the performance of these estimators using three well-known ML algorithms, specifically, LASSO, classification and regression trees, and random forests. We use Double Machine Learning (DML) (Chernozhukov et al., 2018) for the estimation of causal effects of homogeneous treatments with unobserved individual heterogeneity (fixed effects) and no unobserved confounding by extending Robinson (1988)’s partially linear regression model. We develop three alternative approaches for handling unobserved individual hetero- geneity based on extending the within-group estimator, first-difference estimator, and correlated random effect estimator (Mundlak, 1978) for non-linear models. Using Monte Carlo simulations, we find that conventional least squares estimators can perform well even if the data generating process is non-linear, but there are substantial performance gains in terms of bias reduction un- der a process where the true effect of the regressors is non-linear and discontinuous. However, for the same scenarios, we also find – despite extensive hyperparameter tuning – inference to be problematic for both tree-based learners because these lead to highly non-normal estima- tor distributions and the estimator variance being severely under-estimated. This contradicts the performance of trees in other circumstances and requires further investigation. Finally, we provide an illustrative example of DML for observational panel data showing the impact of the introduction of the national minimum wage in the UK. JEL codes: C14, C18, C33, C45. Keywords: Homogeneous treatment effect, LASSO, tree-based approaches, hyperparameter tuning. * We thank Thomas Cornelissen, Riccardo Di Francesco, Damian Machlanski, Spyros Samothrakis, David Zentler- Munro, and the participants to the Annual MiSoC Workshop, RSS 2023, ISER seminar, MiSoC Advisory Board, IADS Meeting group. This research was funded by the UK Economic and Social Research Council award ES/S012486/1 (MiSoC). The program is implemented in the statistical software R; the package XTDML is available at https://github.com/POLSEAN. † Institute for Social and Economic Research, University of Essex. (e-mail: pclarke@essex.ac.uk) ‡ Institute for Analytics and Data Science, University of Essex. (Corresponding author. e-mail: annalivia.polselli@essex.ac.uk. Postal address: Wivenhoe Park, Colchester CO4 3SQ, UK.) 1" 2312.08176v1,"1 ASC: Adaptive Scale Feature Map Compression For Deep Neural Network Yuan Yao, and Tian-Sheuan Chang, Senior Member, IEEE Abstract—Deep-learning accelerators are increasingly in demand; however, their performance is constrained by the size of the feature map, leading to high bandwidth requirements and large buffer sizes. We propose an adaptive scale feature map compression technique leveraging the unique properties of the feature map. This technique adopts independent channel indexing given the weak channel correlation and utilizes a cubical-like block shape to benefit from strong local correlations. The method further optimizes compression using a switchable endpoint mode and adaptive scale interpolation to handle unimodal data distributions, both with and without outliers. This results in 4× and up to 7.69× compression rates for 16-bit data in constant and variable bitrates, respectively. Our hardware design minimizes area cost by adjusting interpolation scales, which facilitates hardware sharing among interpolation points. Additionally, we introduce a threshold concept for straightforward interpolation, preventing the need for intricate hardware. The TSMC 28nm implementation showcases an equivalent gate count of 6135 for the 8-bit version. Furthermore, the hardware architecture scales effectively, with only a sublinear increase in area cost. Achieving a 32× throughput increase meets the theoretical bandwidth of DDR5-6400 at just 7.65× the hardware cost. Keywords : Compression, Feature maps, Deep learning, Hardware acceleration I. I NTRODUCTION Deep learning accelerators (DLAs) enable wide adoption of AI to various applications. However, its massive amount of feature maps demands high memory bandwidth, which becomes the performance bottleneck for real time execution, especially for edge devices. As shown in Table I, the amount of feature maps will become larger and larger for higher resolution input and complex tasks. For example, the real time execution of EDSR will need 504GB/s DRAM bandwidth for 30 frames per second and 16-bit data width. A promising approach is to compress feature maps on-the-fly during processing. Different feature map compression methods have been proposed: the lossless method, and the lossy method in either the time or frequency domain. Lossless methods such as EBPC [1] or AEC [2] leverage statistical redundancy to represent data in a reversible manner, ensuring that no information is lost during the compression process. However, their compression rates highly depend on input sparsity, which is only true for This work was supported by the National Science and Technology Council, Taiwan, under Grant 111-2622-8-A49-018-SB, 110-2221-E-A49-148-MY3, and 110-2218-E-A49-015-MBK. The authors are affiliated with the Institute of Electronics, National Yang Ming Chiao Tung University, Taiwan. (e-mail: yuan.yao.ee10@nycu.edu.tw, tschang@nycu.edu.tw) To be published in IEEE Transactions on Circuits and Systems I: Regular Papers, doi 10.1109/TCSI.2023.3337283 TABLE I: Number of the feature map and parameters in various tasks. Feature maps are counted twice, as they are both stored and fetched, while parameters are only fetched. The actual bitrate shall multiply these numbers with bitwidth and frames per second. Task Classification Semantic Segmentation Super Resolution Network AlexNet VGG16 ResNet34 ViT-small DeepLabv3+ (ResNet50) EDSR #Weights 62.3M 138M 21.3M 21.6M #Feature 0.66M 13.57M 2.96M 16.34M 513×513 39.7M 150.82M 1024×768 43M 8493.46M Input size 224×224 ReLU-based networks. Scaling up EBPC [1] and AEC [2] can be costly, exhibiting quadratic complexity due to the presence of a variable symbol size compressor. Additionally, AEC [2] is only applicable to the floating-point format. However, lossy methods sacrifice non-essential details to achieve size reduction, leading to a trade-off between information preservation and size reduction. These methods can be executed in the time domain, as seen with Least- Squares Fitting Compression (LSFC) [3] or revised texture compression [4]. Alternatively, they can be applied in the frequency domain with different transforms [5], [6]. However, LSFC offers a limited compression rate. The study in [4] modified S3TC [7] to have 32-point interpolation, but also leads to a low compression rate. The approach in [5] only supports 1x1 convolutions. Moreover, the transforms presented in [5], [6] come with a significant computational cost. Existing work has several weaknesses: limited hardware scalability, variable compression rates, and limited support for various types of layers and number formats. To address these issues, it is imperative to identify a compression and decompression scheme that demonstrates excellent hardware scalability. Additionally, a fixed compression rate is crucial for seamless integration into DLA. Finally, the chosen scheme should offer enhanced support for a diverse range of layer types and formats. This paper proposes an adaptive scale feature map compression (ASC) based on S3TC, but tailored to feature map characteristics to address memory bandwidth and buffer size bottlenecks. The proposed method employs independent channel indexing due to weaker channel correlation and a cubicallike block shape to enhance strong local correlations, further augmented by similarity-based reordering. It introduces a switchable endpoint mode for dynamic sparse layers and adaptive scale interpolation for unimodal distributions, both with and without outliers. Compatible with both fixed-point" 2312.08178v1,"Geometrical Interpretation of Neutrino Oscillation with decay Rajrupa Banerjee, 1, ∗ Kiran Sharma, 1, 2, † Sudhanwa Patra, 1, ‡ and Prasanta K. Panigrahi 3, § 1 Department of Physics, Indian Institute of Technology (IIT) Bhilai, Bhilai 491001, India 2 Institut für Astroteilchenphysik, Karlsruher Institut für Technologie(KIT), Hermann-von-Helmholtz-Platz 1, 76344, Eggenstein-Leopoldshafen, Germany. 3 Indian Institute of Science Education and Research Kolkata, 741246, WB, India The geometrical representation of two-flavor neutrino oscillation represents the neutrino’s flavor eigenstate as a magnetic moment-like vector that evolves around a magnetic field-like vector that depicts the Hamiltonian of the system. In the present work, we demonstrate the geometrical interpretation of neutrino in a vacuum in the presence of decay, which transforms this circular trajectory of neutrino into a helical track that effectively makes the neutrino system mimic a classical damped driven oscillator. We show that in the absence of the phase factor ξ in the decay Hamiltonian, the neutrino exactly behaves like the system of nuclear magnetic resonance(NMR); however, the inclusion of the phase part introduces a CP violation, which makes the system deviate from NMR. Finally, we make a qualitative discussion on under-damped, critically-damped, and over-damped scenarios geometrically by three different diagrams. In the end, we make a comparative study of geometrical picturization in vacuum, matter, and decay, which extrapolates the understanding of the geometrical representation of neutrino oscillation in a more straightforward way. I. INTRODUCTION The experimental shreds of evidence of neutrino oscillation have proven the existence of tiny but nonzero masses of neutrino, which leads to a new era of exploration of fundamental physics [1–5]. But for a better understanding of neutrino oscillation visually, the geometrical interpretation of neutrino oscillation had been proposed where neutrino oscillation was described as the rotation of a unit vector depicting the flavor state of the neutrinos around a magnetic field-like vector denoted by the Hamiltonian of the neutrino system [6–8]. Analogously, this picturization has been compared with the precession of the magnetic moment vector in the presence of an external magnetic field. The projection of the flavor state |ν α (t)⟩ at time t, over the mass basis |ν i ⟩ is connected to the amplitude of oscillation [6]. Although the geometrical interpretation makes it easier to understand the neutrino oscillation and realize it pictorially, such representation is not unique. Depending on the different choices of basis, some mathematical approaches have come up with a heuristic overview of the flavor state oscillation. For example, in Giunti. et al. [6] an orthogonal basis e iF , e iM describing the flavor and the mass basis of the neutrino has been investigated, where i stands for 1,2,3. The flavor state ν e revolves around the Hamiltonian vector B with an angle 2θ. A similar kind of picturization has been done in Smirnov. et al [8] with the choices of basis with axes ν 1 , Reν 1 , Imν 2 to describe the two generation neutrino oscillation. On the other hand, Kim. et al. [7, 9] discussed the geometrical interpretation of flavor oscillation of neutrino in three-dimensional Euclidean space deduced from the two-valued representation of the flavor space. They implemented their interpretation to study the MSW effect ∗ Electronic address: rajrupab@iitbhilai.ac.in † Electronic address: kirans@iitbhilai.ac.in ‡ Electronic address: sudhanwa@iitbhilai.ac.in § Electronic address: panigrahi.iiser@gmail.com in adiabatic and non-adiabatic scenarios. Oscillation experiments [10–12] and extensive literature [13–15] ambiguously prove that neutrinos possibly decay to lighter invisible states. The literature proclaims an extensive study of the analytical approach to neutrino oscillation in the presence of decay [16, 17]. However, due to the non-Hermiticity of decay-Hamiltonian, it is challenging to analyze the probability of oscillation analytically, making it harder to visualize the picture of the damped neutrino oscillation [16, 18]. Due to this, a geometrical approach to understanding the oscillation in the presence of decay Hamiltonian has not been proposed yet. In the present work, we address the above adversity of the non-hermitian nature of decay Hamiltonian by a simple mathematical approach analogous to the NMR system and illustrate the neutrino oscillation geometrically in the presence of decay Hamiltonian. The motivation for adopting such a procedure is to consider neutrino as an open quantum system with a similar viewpoint to an NMR system where the external magnetic field acts as a beam splitter; in the case of neutrino, the unitary transformation matrix performs the same [15, 19–21]. The result of the damped oscillation of neutrino also goes hand in hand with the NMR. However, introducing the phase factor ξ with the non-Harmitian decay Hamiltonian the introduces CP violation in two flavor neutrino oscillation even in absence of the Majorana phase which modifies the dynamic of the flavor state that introduces a significant difference from the NMR. For a simplistic overview, we restrict ourselves to only two-flavor neutrino oscillation. The construction of the paper is as follows. We start our work with the general theoretical framework(Section II) for the neutrino oscillation, where we define the two mass eigen states |ν 1 ⟩ and |ν 2 ⟩ as a two-level system. We also introduce the decay Hamiltonian along with it. Next, we follow the density matrix formalism to define the neutrino as an open quantum system in the presence of decay. To picture the oscillation vectorially, we vectorized the operator using the bra-flipper operator. We use the Pauli Matrix basis to represent the vectorized operator and construct the dynamical evolution equation. In" 2312.08181v1,"1 Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications Ahmad Ghasemi, Student Member, IEEE, Ehsan Zeraatkar, Majid Moradikia, and Seyed (Reza) Zekavat, Senior Member, IEEE Abstract—This paper introduces adversarial attacks targeting a Graph Neural Network (GNN)-based radio resource management system in point-to-point (P2P) communications. Our focus lies on perturbing the trained GNN model during the test phase, specifically targeting its vertices and edges. To achieve this, four distinct adversarial attacks are proposed, each accounting for different constraints, aiming to manipulate the behavior of the system. The proposed adversarial attacks are formulated as optimization problems, aiming to minimize the system’s communication quality. The efficacy of these attacks is investigated against the number of users, signal-to-noise ratio (SNR), and adversary power budget. Furthermore, we address the detection of such attacks from the perspective of the Central Processing Unit (CPU) of the system. To this end, we formulate an optimization problem that involves analyzing the distribution of channel eigenvalues before and after the attacks are applied. This formulation results in a Min-Max optimization problem, allowing us to detect the presence of attacks. Through extensive simulations, we observe that in the absence of adversarial attacks, the eigenvalues conform to Johnson’s SU distribution. However, the attacks significantly alter the characteristics of the eigenvalue distribution, and in the most effective attack, they even change the type of the eigenvalue distribution. Index Terms—Graph neural network, adversarial attack, P2P wireless communication, cumulative distribution function. I. I NTRODUCTION T HANKS to the powerful capability of Machine Learning (ML) in solving extremely complex communications problems, such as radio resource management, [2], [3], beam prediction [4], channel estimation [5], localization [6]–[8], and spectrum sensing [9], they have attracted a great deal of interest in academia and industry. However, ML, and in particular deep learning (DL) algorithms suffer from: 1) Poor generalization as they require a large amount of data for training, and, 2) poor scalability since their performance decreases as the problem size increases. To tackle these problems, graph neural networks (GNNs) have been recently introduced by integrating graph theory and DL. GNNs tackle these problems using different approaches such as graph-wise sampling, which constructs sub-graphs for the model inference [10]. GNN A. Ghasemi, M. Moradikia, and S. A. Zekavat are with the Department of Data Science, Worcester Polytechnic Institute (WPI), 100 Institute Road, Worcester, MA, 01609-2280, USA, e-mail: {aghasemi2, mmoradikia, rezaz}@wpi.edu., E. Zeraatkar is with Shiraz Urban Railway Organization, Shiraz, Iran, email: ezeraatkar@gmail.com. This work was presented in part at 2023 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Aveiro, Portugal [1]. algorithms provide powerful tools that has shown great success in many domains such as Computer Vision (CV) [11], [12] and Natural Language Processing (NLP) [13], [14]. Motivated by the success of GNNs in these domains, GNNs have been recently used in wireless communications [2], [3], [15]–[24]. However, similar to other ML algorithms, GNN-based wireless communications have been found vulnerable to manipulations and perturbations generated by adversaries that may target the training and/or testing process of DL [25], [26]. The corresponding study field, known as adversarial machine learning (AML), focuses on developing adversarial attack algorithms or defense algorithms to secure DL systems. One common form of AML called adversarial attack occurs when an adversary crafts small perturbations to the original input of a neural network or develops a means to manipulate the operation of a DL system to cause an error in the inference process. These perturbations are more destructive compared to jamming attacks [25] and are carefully crafted to produce a vector in the input feature space that is capable of misleading the DL algorithm. Therefore, it is also different from spoofing attacks, where the adversary generally aims to impersonate a legitimate user or device, sending false information or messages that alter the perceived feedback. Such adversarial attacks pose a significant threat to modern wireless network systems, including point-to-point (P2P) wireless communications such as device-to-device (D2D), machine-to-machine (M2M), and vehicle-to-vehicle (V2V) communication [27]. These systems are crucial components of modern wireless networks, facilitating efficient data transfer between short-range mobile devices. P2P wireless communications find applications in military systems as well as in 5G mobile communications to improve spectral efficiency [28]. For instance, D2D enables local data services via unicast transmission and can extend coverage to assist users at the cell edge or in disaster-hit areas. Moreover, it supports M2M communication, a key technology for the Internet of Things (IoT), involving autonomous connectivity and communication among IoT devices [29], [30]. Adversarial attacks targeting GNN-based radio resource management systems have significant implications for various real-world applications. In the realm of IoT networks, where efficient communication protocols are crucial for the increasing prevalence of IoT devices, these attacks pose a threat. An imperfect resource allocation in IoT networks leads to performance degradation, increased latency, and potential" 2312.08192v1,"PAD: Self-Supervised Pre-Training with Patchwise-Scale Adapter for Infrared Images Tao Zhang 1,2 1 Kun Ding 1,3 Jinyong Wen 1,2 Yu Xiong 1,2 Shiming Xiang 1,2 Chunhong Pan 1,3 Zeyu Zhang 3 State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, CAS, Beijing, China 2 School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China 3 Research Center of Aerospace Information, Institute of Automation, CAS, Beijing, China {zhangtao2021, kun.ding}@ia.ac.cn {smxiang, chpan}@nlpr.ia.ac.cn Step1: Infrared pre-training SSL MSIP Abstract Step2: Fine-tuning Det/Seg FLIR SODA … Self-supervised learning (SSL) for RGB images has achieved significant success, yet there is still limited research on SSL for infrared images, primarily due to three prominent challenges: 1) the lack of a suitable largescale infrared pre-training dataset, 2) the distinctiveness of non-iconic infrared images rendering common pre-training tasks like masked image modeling (MIM) less effective, and 3) the scarcity of fine-grained textures making it particularly challenging to learn general image features. To address these issues, we construct a Multi-Scene Infrared Pre-training (MSIP) dataset comprising 178,756 images, and introduce object-sensitive random RoI cropping, an image preprocessing method, to tackle the challenge posed by non-iconic images. To alleviate the impact of weak textures on feature learning, we propose a pre-training paradigm called Pre-training with ADapter (PAD), which uses adapters to learn domain-specific features while freezing parameters pre-trained on ImageNet to retain the general feature extraction capability. This new paradigm is applicable to any transformer-based SSL method. Furthermore, to achieve more flexible coordination between pre-trained and newly-learned features in different layers and patches, a patchwise-scale adapter with dynamically learnable scale factors is introduced. Extensive experiments on three downstream tasks show that PAD, with only 1.23M pre-trainable parameters, outperforms other baseline paradigms including continual full pre-training on MSIP. Our code and dataset are available at https: //github.com/casiatao/PAD. Step1: RGB pre-training SSL IN1K ViT Init ViTDet UperNet (a) Full pre-training from scratch Step1: RGB pre-training SSL/SL IN1K Step2: Fine-tuning Det/Seg FLIR SODA … Step3: Fine-tuning Det/Seg FLIR SODA … ViT Init ViTDet UperNet ViT Init Step2: Infrared pre-training SSL  ViT MSIP Adapter Init ViTDet UperNet (d) Pre-training with adapter (our method) mIoU (MFNet test) mIoU (MFNet val) (b) Cross-domain fine-tuning Step1: RGB pre-training IN1K SSL Step2: Infrared pre-training SSL MSIP Step3: Fine-tuning Det/Seg FLIR SODA … ViT AP (FLIR) mIoU (SODA) Init ViT (a) (b) (c) (d) Init ViTDet UperNet (c) Full pre-training from IN1K AP50 (FLIR) AP75 (FLIR) (e) Performance of each paradigm Figure 1. The baseline paradigms (a-c) and PAD paradigm (d) of pre-training and fine-tuning for infrared images, along with their performance (e). PAD achieves state-of-the-art performance on various downstream tasks compared to other paradigms. image modeling (MIM) methods [4, 9, 24] emerge and expand their scope beyond RGB images to other domains, including depth maps [3], point clouds [8], and remote sensing images [15]. However, there is a noticeable absence of SSL methods for infrared imagery. Infrared images, capturing thermal radiation, hold vast potential across domains such as surveillance [5], autonomous driving [29], and medical diagnostics [12]. Compared to the RGB domain, annotated infrared images are even scarcer, severely limiting the development of computer vision in this area. Therefore, it is urgent to bridge the current research gap. However, there are three primary distinctions between infrared and RGB pre-training that make infrared SSL more challenging. Firstly, the quantity and scale of publicly available infrared datasets are relatively limited, lacking a large- 1. Introduction Inspired by the masked language modeling (MLM) [6, 28, 46] in natural language processing (NLP), various masked 1" 2312.08194v1,"THIS WORK HAS BEEN SUBMITTED TO THE IEEE FOR POSSIBLE PUBLICATION. COPYRIGHT MAY BE TRANSFERRED WITHOUT NOTICE, AFTER WHICH THIS VERSION MAY NO LONGER BE ACCESSIBLE. 1 SVInvNet: A Densely Connected Encoder-Decoder Architecture for Seismic Velocity Inversion Mojtaba Najafi Khatounabad*, Hacer Yalim Keles, Selma Kadioglu Abstract—This study presents a deep learning-based approach to seismic velocity inversion problem, focusing on both noisy and noiseless training datasets of varying sizes. Our Seismic Velocity Inversion Network (SVInvNet) introduces a novel architecture that contains a multi-connection encoder-decoder structure enhanced with dense blocks. This design is specifically tuned to effectively process complex information, crucial for addressing the challenges of non-linear seismic velocity inversion. For training and testing, we created diverse seismic velocity models, including multi-layered, faulty, and salt dome categories. We also investigated how different kinds of ambient noise, both coherent and stochastic, and the size of the training dataset affect learning outcomes. SVInvNet is trained on datasets ranging from 750 to 6,000 samples and is tested using a large benchmark dataset of 12,000 samples. Despite its fewer parameters compared to the baseline, SVInvNet achieves superior performance with this dataset. The outcomes of the SVInvNet are additionally compared to those of the Full Waveform Inversion (FWI) method. The comparative analysis clearly reveals the effectiveness of the proposed model. Index Terms—Seismic velocity inversion, deep learning, encoder decoder architecture, convolutional neural network, CNN, densenet. I. I NTRODUCTION T HE seismic reflection method is widely utilized to mapping subsurface structures, and it plays a crucial role in the exploration of hydrocarbon reservoirs and geothermal energy sources. In the surface-to-surface seismic data acquisition technique, an artificial source on the surface generates seismic energy that is transmitted underground. As this seismic wavefield propagates beneath the surface, it undergoes reflection, refraction, and diffraction at interfaces with varying seismic velocity values, causing it to return to the surface. The returning waves are captured by receivers placed on the surface and recorded as a time series. These recordings, known as seismic traces, are aligned next to one another and create seismic shot gather. This assembly of seismic shot gathers is instrumental in probing and understanding the properties beneath the Earth’s surface. To extract depth-related information from time series seismic data, it’s essential to have a subsurface velocity distribution that can accurately predict the observed seismic data. The *Corresponding author: Mojtaba Najafi Khatounabad is with Institute of Science and Technology, Ankara University, Ankara, Türkiye. (email:najafim@ankara.edu.tr) Hacer Yalim Keles is with the Department of Computer Engineering, Hacettepe University, Ankara, Türkiye (email: hacerkeles@cs.hacettepe.edu.tr Selma Kadioglu is with the Department of Geophysical Engineering, Ankara University, Ankara, Türkiye (email:kadioglu@ankara.edu.tr) effectiveness of various seismic imaging techniques, including migration as detailed by Baysal et al. [1] and Berkhout [2] and also inversion methods as noted by Scales [3] and Schuster [4] depends on the precision of the velocity model. Although seismic data are crucial for developing the velocity model, their relationship is governed by the hyperbolic wave propagation equation, which is a nonlinear one. This complexity is compounded by the fact that different velocity models can yield identical seismic data, leading to an ill-posed inversion problem. This situation highlights the challenge of identifying a unique velocity model that aligns with the observed seismic data. One common approach to addressing the challenges of subsurface velocity modeling and seismic data interpretation is through derivative-based inversion methods. These methods involve iteratively adjusting the parameters of an initial model to develop a velocity model that predict seismic data with a heightened resemblance to the observed data. This process includes overlaying synthetic and observed seismic data to determine the direction and magnitude of each adjustment. Among these methods, full waveform inversion (FWI) stands out as particularly effective, as noted in studies by Tarantola [5], Gautheir et al. [6], Pan et al. [7], and Virieux and Operto [8]. FWI is distinguished by its use of both kinematic (arrival time) and dynamic (phase and amplitude) information from seismic data. However, it requires an initial velocity model that closely predicts the observed data, with differences less than half of the seismic wavelengths. If this condition isn’t met, the method risks converging on local minimums due to cyclic-skipping problems, a challenge highlighted in research by Bunk et al. [9] and Sirgue and Pratt [10]. In conjunction with ongoing investigations to address challenges associated with derivative-based methods, the effectiveness of innovative approaches is extensively examined. Significantly, within the realm of artificial intelligence advancements, deep neural networks stand out as a powerful tool for the mapping of seismic data to velocity model. The deep cascaded structure of these networks help learning complex non-linear functions from data. Through an iterative training process, the deep model adjusts the connections to capture the complex relationship between the seismic data and the velocity model. This approach allows the trained deep model to predict the velocity model accurately from seismic data, even if that data wasn’t part of the training set. This advancement reduces the reliance on initial velocity models, representing a major advancement in the efficiency and accuracy of seismic data interpretation. Due to the size and dimensional differences between seis-" 2312.08195v1,"Concept-centric Personalization with Large-scale Diffusion Priors Pu Cao 1,2 Lu Yang 1 Feng Zhou 1 Tianrui Huang 1 Qing Song 1 * 1 Beijing University of Posts and Telecommunications 2 Metavatar {caopu, soeaver, zhoufeng, htr, priv}@bupt.edu.cn Concept-centric Image Dataset + Concept-centric Generation Concept-centric Personalization Unconditional Generation Stable Diffusion Image-to-image Translation Controllability a photo of face a photo of face, wearing glasses ❌ Fidelity ❌ Photorealism ✔ Controllability ✔ Fidelity ✔ Photorealism Text-guided Generation ✔ Controllability wearing glasses Diversity Stylization Fidelity ✔ Compatibility Fine-tune SD by previous methods ( e.g. , Dreambooth) Ours Figure 1. Concept-centric personalization. In this work, we introduce a novel diffusion-based task, termed concept-centric personalization, where diffusion priors are customized to achieve faithful, diverse, and controllable generation of a given concept. Abstract Despite large-scale diffusion models being highly capable of generating diverse open-world content, they still struggle to match the photorealism and fidelity of conceptspecific generators. In this work, we present the task of customizing large-scale diffusion priors for specific concepts as concept-centric personalization. Our goal is to generate high-quality concept-centric images while maintaining the versatile controllability inherent to open-world models, enabling applications in diverse tasks such as conceptcentric stylization and image translation. Distinct from existing personalization tasks that focus on specific entities, the proposed task requires large-scale training to achieve reasonable results. It brings forth unique challenges: difficult fidelity and controllability balancing and severe unconditional guidance drift in classifier-free guidance. To tackle these challenges, we identify catastrophic forgetting of guidance prediction from diffusion priors as the fundamental issue. Consequently, we develop a guidancedecoupled personalization framework specifically designed to address this task. We propose Generalized Classifierfree Guidance (GCFG) as the foundational theory for our framework. This approach extends Classifier-free Guidance (CFG) to accommodate an arbitrary number of guidances, sourced from a variety of conditions and models. Employing GCFG enables us to separate conditional guidance into two distinct components: concept guidance for fidelity and control guidance for controllability. This division makes it feasible to train a specialized model for concept guidance, while ensuring both control and unconditional guidance remain intact. We then present a null-text Concept-centric Diffusion Model as a concept-specific generator to learn concept guidance without the need for text annotations. Furthermore, we demonstrate the seamless integration of our framework with existing techniques and underscore the vast potential of GCFG. Our extensive experiments confirm the superior efficacy of our proposed method in achieving concept-centric personalization. Code will be available at https://github.com/PRIV- Creation/ Concept-centric-Personalization. 1. Introduction Thanks to billion-scale image-text datasets [2, 33, 39, 40] and the development of large-scale natural language models [8, 31, 32], the research on diffusion models in recent years has expanded the boundaries of artificial intelligence generated content, significantly enhancing the diversity and controllability of the generated content [35]. However, a critical problem remains: these models fall short in achieving high levels of photorealism and fidelity in specific concepts, lagging notably behind concept-specific generators, as shown in gray block in Fig. 1. For instance, a face generator (e.g., StyleGAN3 [19]) trained on FFHQ [18] can produce lifelike facial images, whereas large-scale diffusion models, such as Stable Diffusion [35], struggle to achieve" 2312.08201v1,"Efficient solution of sequences of parametrized Lyapunov equations with applications Davide Palitta ∗ Zoran Tomljanović † Saak § Ivica Nakić ‡ Jens Università di Bologna, Centro AM 2 , Dipartimento di Matematica, Piazza di Porta S. Donato 5, 40127 Bologna, Italy. Email: davide.palitta@unibo.it, ORCID: 0000-0002-6987-4430 † School of Applied Mathematics and Informatics, J. J. Strossmayer University of Osijek, Trg Ljudevita Gaja 6, 31000 Osijek, Croatia. Email: ztomljan@mathos.hr, ORCID: 0000-0002-3239-760X ‡ Department of Mathematics, Faculty of Science, University of Zagreb, Bijenička 30, 10000 Zagreb, Croatia. Email: nakic@math.hr, ORCID: 0000-0001-6549-7220 § Computational Methods in Systems and Control Theory (CSC), Max Planck Institute for Dynamics of Complex Technical Systems, Sandtorstraße 1, 39106 Magdeburg, Germany. Email: saak@mpi-magdeburg.mpg.de, ORCID: 0000-0001-5567-9637 ∗ Abstract: Sequences of parametrized Lyapunov equations can be encountered in many application settings. Moreover, solutions of such equations are often intermediate steps of an overall procedure whose main goal is the computation of quantities of the form f (X) where X denotes the solution of a Lyapunov equation. We are interested in addressing problems where the parameter dependency of the coefficient matrix is encoded as a low-rank modification to a seed, fixed matrix. We propose two novel numerical procedures that fully exploit such a common structure. The first one builds upon recycling Krylov techniques, and it is well-suited for small dimensional problems as it makes use of dense numerical linear algebra tools. The second algorithm can instead address large-scale problems by relying on state-of-the-art projection techniques based on the extended Krylov subspace. We test the new algorithms on several problems arising in the study of damped vibrational systems and the analyses of output synchronization problems for multi-agent systems. Our results show that the algorithms we propose are superior to state-of-the-art techniques as they are able to remarkably speed up the computation of accurate solutions. Keywords: Parametrized Lyapunov equations, Recycling Krylov methods, Extended Krylov methods, Vibrational systems, Multi-agent systems. Mathematics subject classification: MSC1, MSC2, MSC3 Novelty statement: Novel, efficient methods for solving sequences of parametrized Lyapunov equations have been designed. By taking full advantage of the parameter dependency structure we are able to tackle both small-scale and large-scale problems. The numerical results show the superiority of the proposed methods when compared to state-of-the-art routines, especially in terms of computational time. Preprint (Max Planck Institute for Dynamics of Complex Technical Systems, Magdeburg). 2023-12-14" 2312.08206v1,"Towards podio v1.0 - A first stable release of the EDM toolkit Juan Miguel Carceller 1 , Frank Gaede 2 , Gerardo Ganis 1 , Benedikt Hegner 1 , Clement Helsens 1,3 , Thomas Madlener 2,∗ , André Sailer 1 , Graeme A Stewart 1 , and Valentin Volkl 1 1 CERN, Switzerland Deutsches Elektronen-Synchrotron, Germany 3 KIT, Germany 2 Abstract. A performant and easy-to-use event data model (EDM) is a key com- ponent of any HEP software stack. The podio EDM toolkit provides a user friendly way of generating such a performant implementation in C++ from a high level description in yaml format. Finalizing a few important developments, we are in the final stretches for release v1.0 of podio, a stable release with backward compatibility for datafiles written with podio from then on. We present an overview of the podio basics, and go into slighty more technical detail on the most important topics and developments. These include: schema evolution for generated EDMs, multithreading with podio generated EDMs, the implementation of them as well as the basics of I/O. Using EDM4hep, the common and shared EDM of the Key4hep project, we highlight a few of the smaller features in action as well as some lessons learned during the development of EDM4hep and podio. Finally, we show how podio has been integrated into the Gaudi based event processing framework that is used by Key4hep, before we conclude with a brief outlook on potential developments after v1.0. 1 Introduction A typical high energy physics (HEP) analysis workflow comprises many steps, where each is usually in charge of producing a specific result or of linking these results into a more comprehensive picture of the underlying physics event. A core part of such a software stack is the so called event data model (EDM) that enables the flow of information between the different components and also defines the language of this communication. Crucially, it is also the language in which users express their ideas. Defining the contents of such an EDM is one aspect, the other one is the efficient implementation of the schema that users come up with. The podio EDM toolkit [1–3] addresses the latter part, while EDM4hep [4, 5] defines the common EDM of the Key4hep project [6, 7] using podio. In these proceedings we focus on recent developments in podio towards a first stable release, which we plan to announce in the near future after finishing the necessary developments. We will discuss these final missing pieces in the text where appropriate. The structure of these proceedings is as follows: After a brief recap of the basics of podio in Section 2 we describe the Frame concept and how it relates to the multithreading concept ∗ e-mail: thomas.madlener@desy.de" 2312.08212v1,"LAMM: Label Alignment for Multi-Modal Prompt Learning Jingsheng Gao 1 , Jiacheng Ruan 1 , Suncheng Xiang 1 , Zefang Yu 1 Ke Ji 2 , Mingye Xie 1 , Ting Liu 1 , Yuzhuo Fu 1 * 1 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China 2 School of Computer Science and Engineering, Southeast University, China {gaojingsheng, jackchenruan, xiangsuncheng17, yuzefang, xiemingye, louisa liu, yzfu}@sjtu.edu.cn keji@seu.edu.cn Abstract With the success of pre-trained visual-language (VL) models such as CLIP in visual representation tasks, transferring pre-trained models to downstream tasks has become a crucial paradigm. Recently, the prompt tuning paradigm, which draws inspiration from natural language processing (NLP), has made significant progress in VL field. However, preceding methods mainly focus on constructing prompt templates for text and visual inputs, neglecting the gap in class label representations between the VL models and downstream tasks. To address this challenge, we introduce an innovative label alignment method named LAMM, which can dynamically adjust the category embeddings of downstream datasets through end-to-end training. Moreover, to achieve a more appropriate label distribution, we propose a hierarchical loss, encompassing the alignment of the parameter space, feature space, and logits space. We conduct experiments on 11 downstream vision datasets and demonstrate that our method significantly improves the performance of existing multi-modal prompt learning models in few-shot scenarios, exhibiting an average accuracy improvement of 2.31(%) compared to the state-of-the-art methods on 16 shots. Moreover, our methodology exhibits the preeminence in continual learning compared to other prompt tuning methods. Importantly, our method is synergistic with existing prompt tuning methods and can boost the performance on top of them. Our code and dataset will be publicly available at https://github.com/gaojingsheng/LAMM. Introduction Building machines to comprehend multi-modal information in real-world environments is one of the primary goals of artificial intelligence, where vision and language are the two crucial modalities (Du et al. 2022). One effective implementation method is to pre-train a foundational visionlanguage (VL) model on a large-scale visual-text dataset and then transfer it to downstream application scenarios (Radford et al. 2021; Jia et al. 2021). Typically, VL models employ two separate encoders to encode image and text features, followed by the design of an appropriate loss function for training. However, finetuning on extensively trained models is costly and intricate, thus making the question of * Corresponding Author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Feature space llama CLIP alpaca..? CLIP llama! alpaca A photo of [ CLASS ] Feature space A photo of [ Trained CLASS ] llama alpaca Figure 1: CLIP is more inclined to classify an image as belonging to a similar category. Altering the category text feature’s position can enhance CLIP’s recognition capabilities. how to effectively transfer pre-trained VL models to downstream tasks a inspiring and valuable issue. Prompt learning provides an effective solution to this problem, which provides downstream tasks with corresponding textual descriptions based on human prior knowledge and can effectively enhance the zero-shot and few-shot recognition capability of VL models. Through trainable templates with a small number of task-specific parameters, the process of constructing templates is further automated via gradient descent instead of manual constructions (Lester, Al-Rfou, and Constant 2021). Specifically, existing multimodal prompt tuning methods (Zhou et al. 2022b,a; Khattak et al. 2022) use the frozen CLIP (Radford et al. 2021) model and design trainable prompts separately for the textual and visual encoders. These approaches ensure that VL models could be better transferred to downstream tasks without any changes to the VL model’s parameters. However, their approach mainly focuses on the prompt template that is applicable to all categories, overlooking the feature representation of each category. The token in the text template is crucial in classifying an image into the proper category. For example, as depicted in Figure 1, llamas and alpacas are two animals that resemble each other closely. In CLIP, there exists a propensity to misclassify a llama as an alpaca owing to the overrepresentation of alpaca data in the pre-training dataset. A photo of [ ]" 2312.08226v1,"Graph operations and a unified method for kinds of Turán-type problems on paths, cycles and matchings Jiangdong Ai ∗ , Hui Lei † , Bo Ning ‡ , Yongtang Shi § Abstract: Let G be a connected graph and P(G) a graph parameter. We say that P(G) is feasible if P(G) satisfies the following properties: (I) P(G) ≤ P(G uv ), if G uv = G[u → v] for any u, v, where G uv is the graph obtained by applying Kelmans operation from u to v; (II) P(G) < P(G + e) for any edge e ∈ / E(G). Let P k be a path of order k, C ≥k the set of all cycles of length at least k and M k+1 a matching containing k + 1 independent edges. In this paper, we mainly prove the following three results:   . Let G be a 2-connected n-vertex C ≥k -free graph with (i) Let n ≥ k ≥ 5 and let t = k−1 2 1 the maximum P(G) where P(G) is feasible. Then, G ∈ G n,k = {W n,k,s = K s ∨ ((n − k + s)K 1 ∪ K k−2s ) : 2 ≤ s ≤ t}.   (ii) Let n ≥ k ≥ 4 and let t = k 2 − 1. Let G be a connected n-vertex P k -free graph with 2 the maximum P(G) where P(G) is feasible. Then, G ∈ G n,k = {W n,k−1,s = K s ∨ ((n − k + s + 1)K 1 ∪ K k−2s−1 ) : 1 ≤ s ≤ t}. (iii) Let G be a connected n-vertex M k+1 -free graph with the maximum P(G) where P(G) 3 is feasible. Then, G ∼ = {K s ∨ ((n − 2k + s − 1)K 1 ∪ = K n when n = 2k + 1 and G ∈ G n,k K 2k−2s+1 ) : 1 ≤ s ≤ k} when n ≥ 2k + 2. Directly derived from these three main results, we obtain a series of applications in Turántype problems, generalized Turán-type problems, powers of graph degrees in extremal graph theory, and problems related to spectral radius, and signless Laplacian spectral radius in spectral graph theory. Our results generalized classical results on cycles and matchings due to Kopylov and Erdős-Gallai, respectively, and provided a positive resolution to an open problem originally proposed by Nikiforov. We improve and extend the spectral extremal results on paths due to Nikiforov, and due to Nikiforov and Yuan. We also offer a comprehensive solution to a connected version of a problem on the degree power sum of a graph containing no P k , a topic initially studied by Caro and Yuster. Keywords: Feasible; Kelmans operation; Turán-type; Spectral radius; Matching AMS classification: 05C50 1 Introduction The main goal of this paper is to develop a method that provides a unified approach for solving some Turán and generalized Turán-type problems, degree power problems, and ∗ School of Mathmatical Sciences and LPMC, Nankai University, Tianjin 300071, P.R. China. Email: jd@nankai.edu.cn. Partially supported by the Fundamental Research Funds for the Central Universities, Nankai University. † School of Statistics and Data Science, LPMC and KLMDASR, Nankai University, Tianjin 300071, P.R. China. Email: hlei@nankai.edu.cn. Partially supported by the NSFC grant (No. 12371351). ‡ Corresponding author. College of Computer Science, Nankai University, Tianjin 300350, P.R. China. Email: bo.ning@nankai.edu.cn. Partially supported by the NSFC grant (No. 11971346). § Center for Combinatorics and LPMC, Nankai University, Tianjin 300071, P.R. China. Email: shi@nankai.edu.cn. Partially supported by the NSFC grant (No. 12161141006). 1" 2312.08232v1,"1 Green Operations of SWIPT Networks: The Role of End-User Devices Gianluca Rizzo, HES-SO Valais, Switzerland & Universita’ di Foggia, Italy - gianluca.rizzo@hevs.ch Marco Ajmone Marsan, Institute IMDEA Networks, Spain - marco.ajmone@polito.it Christian Esposito, Biagio Boi, Universita’ di Salerno, Italy - [esposito, bboi]@unisa.it Abstract Internet of Things (IoT) devices often come with batteries of limited capacity that are not easily replaceable or rechargeable, and that constrain significantly the sensing, computing, and communication tasks that they can perform. The Simultaneous Wireless Information and Power Transfer (SWIPT) paradigm addresses this issue by delivering power wirelessly to energy-harvesting IoT devices with the same signal used for information transfer. For their peculiarity, these networks require specific energy-efficient planning and management approaches. However, to date, it is not clear what are the most effective strategies for managing a SWIPT network for energy efficiency. In this paper, we address this issue by developing an analytical model based on stochastic geometry, accounting for the statistics of user-perceived performance and base station scheduling. We formulate an optimization problem for deriving the energy optimal configuration as a function of the main system parameters, and we propose a genetic algorithm approach to solve it. Our results enable a first-order evaluation of the most effective strategies for energy-efficient provisioning of power and communications in a SWIPT network. We show that the service capacity brought about by users brings energy-efficient dynamic network provisioning strategies that radically differ from those of networks with no wireless power transfer. I. I NTRODUCTION The advent of the Internet of Things (IoT) paradigm has significantly impacted the energy consumption of Radio Access Networks (RAN) [2]. On one side, the proliferation of IoT devices is leading to an exponential increase in the number of connected devices and in the amount of data generated and 0 This paper was presented in part at the 20th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) [1]." 2312.08266v1,"KEK-TH-2565, J-PARC-TH-0294 Spin relaxation rate for baryons in thermal pion gas Yoshimasa Hidaka, 1, 2, 3, 4, 5, ∗ Masaru Hongo, 6, 5, † Mikhail A. Stephanov, 7, 8, 9, ‡ and Ho-Ung Yee 7, 9, § 1 KEK Theory Center, Tsukuba 305-0801, Japan Graduate University for Advanced Studies (Sokendai), Tsukuba 305-0801, Japan 3 Department of Physics, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan 4 International Center for Quantum-field Measurement Systems for Studies of the Universe and Particles (QUP), KEK, Tsukuba, 305-0801, Japan 5 RIKEN iTHEMS, RIKEN, Wako 351-0198, Japan 6 Department of Physics, Niigata University, Niigata 950-2181, Japan 7 Department of Physics, University of Illinois, Chicago, Illinois 60607, USA 8 Kadanoff Center for Theoretical Physics, University of Chicago, Chicago, Illinois 60637, USA 9 Laboratory for Quantum Theory at the Extremes, University of Illinois, Chicago, Illinois 60607, USA (Dated: December 14, 2023) 2 We study the relaxation dynamics of the spin polarization of baryons (nucleon and Λ-baryon), in a thermal pion gas as a simple model of the hadronic phase of the QCD plasma produced in relativistic heavy-ion collisions. For this purpose, we formulate the quantum kinetic theory for the spin density matrix of baryons in the leading order of the gradient expansion. Considering the baryon-pion elastic scattering processes as the dominant interaction between baryons and thermal pions, we compute the spin relaxation rate of nucleons and Λ-baryons in a pion gas up to temperature 200 MeV. In the case of nucleons, we evaluate the spin relaxation rate in the s-channel resonance approximation, based on the known experimental data on ∆-resonances. We also estimate the spin relaxation rate for Λ-baryons, based on experimental inputs and theoretical models for the low-energy Λπ scattering, including the chiral perturbation theory. I. INTRODUCTION Experimentally observed spin polarization of hadrons aligned with the orbital angular momentum of the colliding nuclei [1–4] is the manifestation of a quantum mechanical response to the strong vorticity of the QCD plasma created in relativistic heavy-ion collisions. Broadly, theoretical predictions based on local thermal equilibrium of spin polarization and fluid vorticity are in reasonable agreement with the experimental observation. However, any quantitative comparison in detail clearly requires a more sophisticated treatment, which should take into account the time evolution of spin polarization locally out-of-equilibrium. Currently, two mainstream approaches for addressing the potentially out-ofequilibrium dynamics of spin polarization are under intense investigation: kinetic theory incorporating spin [5– 24] (see also Ref. [25] for a recent review on the quantum kinetic theory), and hydrodynamics incorporating spin [26–41]. Obviously, the key quantity in such out-of-equilibrium time-evolution is the relaxation rate of spin polarization toward its equilibrium value. The spin polarization in general is not a conserved quantity, and thus, gives one of the non-hydrodynamic modes not amenable to a hydro- ∗ hidaka@post.kek.jp † hongo@phys.sc.niigata-u.ac.jp ‡ misha@uic.edu § hyee@uic.edu dynamics description. In the specific case where spin polarization shows much slower relaxation than other nonhydrodynamic modes, a quasi-hydrodynamics or Hydro+ description [42], dubbed as the spin hydrodynamics, can be introduced to include the spin polarization as an additional quasi-hydrodynamic variable. The spin hydrodynamics, in this case, is characterized by a new transport coefficient, called rotational viscosity, which corresponds to the spin relaxation rate γ S . In Ref. [43], the spin relaxation rate for heavy quarks in a high-temperature weakly coupled quark-gluon plasma was computed to the leading-order of QCD coupling constant α s . It behaves as γ S ∼ α s 2 log(1/α s ) × (T 3 /M q 2 ) as a function of the heavy-quark mass M q (≫ T ) and the temperature T . In this work, we extend our study of spin relaxation in QCD plasma to a low-temperature hadronic phase, focusing on the spin polarization of baryons, e.g., nucleons and Λ baryons. It is directly motivated by the experimental observation of the spin-polarized Λ-baryons in RHIC [1–4]. The QCD plasma in the hadronic phase at low temperature and vanishing baryon chemical potential is mostly a gas of weakly interacting pions, described by chiral perturbation theory [44–46] (see, e.g., Ref. [47] for a recent pedagogical review). The chiral perturbation theory, however, becomes inadequate around T ≃ 100 MeV, although pions are still the major component of the plasma. Here f represents the pion decay constant. As a simple model for the hadronic phase in this work, we will therefore approximate the plasma by a thermal pion gas without heavy use of the chiral perturbation theory. We note that our approach works well for a low-temperature phase, while it eventually breaks" 2312.08314v1,"Orthonormal Strichartz estimates for Schrödinger operator and their applications to infinitely many particle systems Akitoshi Hoshiya ∗ December 14, 2023 Abstract We develop an abstract perturbation theory for the orthonormal Strichartz estimates, which were first studied by Frank-Lewin-Lieb-Seiringer. The method used in the proof is based on the duality principle and Kato’s smooth perturbation theory. We also deduce the refined Strichartz estimates for the Schrödinger operator in terms of the Besov space. Finally we prove the global existence of a solution for the Hartree equation with electromagnetic potentials describing the dynamics of infinitely many fermions. This would be the first result on the orthonormal Strichartz estimates for the Schrödinger operator with general time-independent potentials including very short range and inverse square type potentials. 1 Introduction This paper is devoted to the proof of the orthonormal Strichartz estimates for the Schrödinger operator and their applications. The orthonormal Strichartz estimates are studied by Frank-Lewin-Lieb-Seiringer [FLLS] for the first time. They are the following inequalities: ∞ X n=0 ν n |e it∆ f n | 2 L pt L qx . kν n k ℓ α . (1.1) Here {f n } is an orthonormal system in L 2 (R d ) and p, q, α ∈ [1, ∞] satisfy some conditions specified later. e it∆ denotes the free Schrödinger propagator. The aim of this paper is to extend the orthonormal Strichartz estimates to the Schrödinger operator: H = −∆ + V . We are going to develop an abstract perturbation method based on Kato’s smooth perturbation theory [K] and apply it to potentials of very short range ∗ Graduate School of Mathematical Sciences, The University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8914, Japan Email address: hoshiya@ms.u-tokyo.ac.jp 1" 2312.08315v1,"Draft version December 14, 2023 Typeset using L A TEX twocolumn style in AASTeX631 Modelling time-dependent convective penetration in 1D stellar evolution Cole Johnston, 1, 2, ∗ Mathias Michielsen, 2, ∗ Evan H. Anders, 3, 4, ∗ Mathieu Renzo, 5 Matteo Cantiello, 5, 6 P. Marchant, 2 Jared A. Goldberg, 5 Richard H. D. Townsend, 7 Gautham Sabhahit, 8 and Adam S. Jermyn 5 1 Department of Astrophysics/IMAPP, Radboud University, P.O.Box 9010, 6500 GL Nijmegen, The Netherlands 2 Institute of Astronomy, KU Leuven, Celestijnenlaan 200D, 3001 Leuven, Belgium 3 Center for Interdisciplinary Exploration and Research in Astrophysics (CIERA), Northwestern University, 1800 Sherman Ave, Evanston, 60201, IL, USA 4 Kavli Institute for Theoretical Physics, University of California, Santa Barbara, CA 93106, USA 5 Center for Computational Astrophysics, Flatiron Institute, New York, NY 10010, USA 6 Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08544, USA 7 Department of Astronomy, University of Wisconsin-Madison, Madison, WI 53706, USA 8 Armagh Observatory and Planetarium, College Hill, Armagh BT61 9DG, N. Ireland ABSTRACT 1D stellar evolution calculations produce uncertain predictions for quantities like the age, core mass, core compactness, and nucleo-synthetic yields; a key source of uncertainty is the modeling of interfaces between regions that are convectively stable and those that are not. Theoretical and numerical work has demonstrated that there should be numerous processes adjacent to the convective boundary that induce chemical and angular momentum transport, as well as modify the thermal structure of the star. One such process is called convective penetration, wherein vigorous convection extends beyond the nominal convective boundary and alters both the composition and thermal structure. In this work, we incorporate the process of convective penetration in stellar evolution calculations using the stellar evolution software instrument mesa. We implement convective penetration according to the description presented by Anders et al. (2022a) to calculate a grid of models from the pre main sequence to He core depletion. The extent of the convective penetration zone is self-consistently calculated at each time step without introducing new free parameters. We find both a substantial penetration zone in all models with a convective core and observable differences to global stellar properties such as the luminosity and radius. We preset how the predicted radial extent of the penetration zone scales with the total stellar mass, age and the metallicity of the star. We discuss our results in the context of existing numerical and observational studies. 1. CONVECTIVE CORE BOUNDARY MIXING Stars of all masses and at all stages of evolution rely on convection to transport energy, angular momentum, and chemicals throughout the stellar interior (Lebovitz 1965; Aerts et al. 2019; Jermyn et al. 2022a). As such, it is crucial to correctly determine the location where convective transport gives way to radiative transport Corresponding author: Cole Johnston colej@mpa-garching.mpg.de Corresponding author: Mathias Michielsen mathias.michielsen@kuleuven.be Corresponding author: Evan Anders evanhanders@ucsb.edu ∗ These authors contributed equally to this work within the star in order to accurately calculate stellar structure and evolution models (Gabriel et al. 2014a; Viallet et al. 2015). Convection is an inherently 3D process which typically occurs on very fast time scales compared to most evolutionary time scales (except late burning phases, e.g. silicon burning; Kippenhahn et al. 2012). Therefore, simplified parameterizations of convection are employed in 1D calculations. The most widely used description of convection in stellar evolution calculations is the Mixing Length Theory (MLT) and its variations and extensions (Böhm-Vitense 1958; Spiegel 1963; Arnett 1969; Canuto 1989; Grossman 1996; Kupka 1996; Gough & Houdek 2001; Salaris & Cassisi 2008; Smolec et al. 2011; Gough 2012; Lesaffre et al. 2013; Jermyn et al. 2018; Joyce & Tayar 2023). Despite success in broadly reproducing the structure of stars and their evolutionary trajectories, local im-" 2312.08322v1,"Concatenating quantum error correcting codes with decoherence-free subspaces, and vice versa Nihar Ranjan Dash, 1, ∗ Sanjoy Dutta, 2 R. Srikanth, 2, † and Subhashish Banerjee 1, ‡ 2 1 Indian Institute of Technology Jodhpur, Rajasthan 342030, India Poornaprajna Institute of Scientific Research (PPISR), Bidalur post, Devanahalli, Bengaluru 562164, India Quantum error correcting codes (QECCs) and decoherence-free subspace (DFS) codes provide active and passive means, respectively, to address certain errors that arise during quantum computation. The latter technique is suitable to correct correlated errors with certain symmetries, whilst the former to correct independent errors. The concatenation of a QECC and DFS code results in a degenerate code that splits into actively and passively correcting parts, with the degeneracy impacting either part, leading to degenerate errors as well as degenerate stabilizers. The concatenation of the two types of code can aid universal fault-tolerant quantum computation when a mix of correlated and independent errors is encountered. In particular, we show that for sufficiently strongly correlated errors, the concatenation with the DFS as the inner code provides better entanglement fidelity, whereas for sufficiently independent errors, the concatenation with QECC as the inner code is preferable. As illustrative examples, we examine in detail the concatenation of a 2-qubit DFS code and a 3-qubit repetition code or 5-qubit Knill-Laflamme code, under independent and correlated errors. I. INTRODUCTION The loss of quantum coherence, aka the decoherence process, is the biggest obstacle to realizing practical quantum computation and communication [1]. Errors also arise because of imperfections and faults in the quantum communication system or computation circuit. These errors, due to decoherence and device imperfections, reduce the fidelity and reliability of quantum operations [2]. To overcome these obstacles, there is a variety of methods employed, among them quantum error correcting codes (QECCs) [3–6], decoherencefree subspace (DFS) [7–9], dynamic decoupling (DD) [10], and error mitigation [11, 12]. QECCs offer an active method of intervention to protect quantum information from a wide variety of errors– including, most generally, independent errors– by correcting them when they occur. These codes can also be used to characterize quantum dynamics [13, 14]. DFS is a passive scheme to combat correlated errors and preserves the coherence of the quantum state by encoding information in subspaces that are immune to certain types of noise by virtue of symmetries in the dynamics. An interesting example of DFS arises in the study of quantum memory for photons, where a collective reservoir interaction can happen for the cluster of atoms that make up the memory. This motivates the construction of a two-dimensional decoherence-free quantum memory protected from collective errors [15]. Note that this is an extreme case, and in the other extreme, the atoms may be subjected to independent errors. The practice of concatenating block codes is extensively employed in the field of quantum information science and serves as a crucial element in nearly all fault-tolerant strategies [16, 17]. The basic concatenated code, even in the classical context [18], comprises an outer and an inner code. More generally, concatenation of codes is accomplished by iterative encoding of blocks of qubits in different levels. Embedding ∗ dash.1@iitj.ac.in † srik@ppisr.res.in ‡ subhashish@iitj.ac.in an inner code in an outer code decreases the effective error probability of the concatenated code, making its data qubits more reliable [19]. The establishment of the accuracy threshold theorem [20–22] relies substantially on these concatenated codes. There can be multiple layers in the concatenated quantum code [23–25], where the physical space of one code behaves as logical space for the next code. One can construct an efficient and robust error correction scheme using this hierarchical structure. Whilst recursive concatenation of the same QECC or different QECCs has been extensively studied [24–27], recently a few authors have explored hybrid concatenation schemes, such as DD and QECC [28, 29], DD and DFS [30, 31], as well as QECC and DFS [32]. The nature of errors in the given quantum information processor, for example whether the noise is “bursty” or independent, will determine the codes to concatenate as well the order in which they may be concatenated [33]. Such a concatenated setup, together with the availability of transversal gate operations [34, 35] enables universal fault-tolerant quantum computation. In particular, the combination of QECC and DFS can facilitate fault-tolerance [36] in the presence of correlated errors [37–39]. The experimental implementation of the hybrid concatenation of active and passive methods for fighting errors [36] paves the way for practical quantum computation in the presence of coherent errors [40]. A specific category of hybrid DFS-QECC codes has been developed to effectively address spontaneous emission errors and collective dephasing specifically intended to be compatible with the quantum optical and topological implementation of quantum dots in cavities and trapped ions [41, 42]. The efficiency of concatenated DFS-QECC codes is contingent upon the use of a practical set of universal quantum gates that can maintain states exclusively within the DFS. It also depends on the fault-tolerant execution of DFS state preparation and decoding processes [9]. The present work focuses on the two-layered (and, in general, multi-layered) protection based on the concatenation of QECC and DFS, in particular comparatively studying the concatenation of DFS with QECC layer and vice versa. The need for studying such a hybrid concatenation scheme naturally arises when both correlated and independent errors oc-" 2312.08367v1,"VLAP: Efficient Video-Language Alignment via Frame Prompting and Distilling for Video Question Answering Xijun Wang 1,2 , Junbang Liang 2 , Chun-Kai Wang 2 , Kenan Deng 2 , Yu Lou 2 , Ming Lin 1,2 , Shan Yang 2 1 2 University of Maryland, College Park Amazon {xijun, lin}@umd.edu, {junbangl, kenanden, ckwang, ylou, ssyang}@amazon.com Abstract Question: How did the man make sure that the lady does not bump into the tree when the lady arrives? Video Raw 16 Frames: In this work, we propose an efficient Video-Language Alignment via Frame-Prompting and Distilling (VLAP) network. Our VLAP model addresses both efficient frame sampling and effective cross-modal alignment in a unified way. In our VLAP network, we design a new learnable questionaware Frame-Prompter together with a new cross-modal distillation (QFormer-Distiller) module. Pre-trained large image-language models have shown promising results on problems such as visual question answering. However, how to efficiently and effectively sample image frames when adapting pre-trained large image-language model to videolanguage alignment is still the major challenge. Compared with prior work, our VLAP model demonstrates the capability of selecting key frames with critical contents, thus improving the video-language alignment accuracy while reducing the inference latency (+3.3% on NExT-QA Temporal with 3.0× speed up). Overall, our VLAP network outperforms (e.g. +4.6% on STAR Interaction and +2.2% on STAR average with 3.0× speed up, ours 2-frames out-perform SeViLA 4-frames on VLEP with 4.2× speed up) the state-of-the-art methods on the video question-answering benchmarks. QFormer- Distiller Frame- Prompter Selected Key-frames: Answer: Pull rope to change direction Large Language Model (LLM) Figure 1. Our efficient Vision-Language Alignment via Frame- Promper and distilling (VLAP) model, at core, contains two new modules: a question-aware Frame-Prompter and a cross-modal QFormer-Distiller. It learns to extract the most question-related frames while keeping the inference latency low. constraint remains a long-standing problem in video understanding research. Recent advances in pre-trained large-scale language models [6, 42] have greatly boosted the performance of the vision-language models. Especially for image-language models [1, 7, 23, 46], many state-of-the-art works leverage pretrained LLMs. These models [9, 57] achieve excellent performance across visual-language tasks such as image captioning [9], visual question answering [57] and more. Inherently, many video-language models [29, 62] are built from these pre-trained image-language models. These imagebased video-language models treat a video as a series of multi-channel images sampled randomly or uniformly [23]. While this strategy works well for short videos, for long videos or videos with non-uniform information distribution, random or uniform frame sampling may miss critical information. When it comes to video-language alignment, frame sampling efficiency and effectiveness goes hand-inhand. One needs to not only reduce the number of sampled frames but also select frames that are most related to the input question. Previous work such as SeViLA [62] trains 1. Introduction “If a picture is worth thousands of words, what is a video worth?” [32] Video watching is growing into a new social norm. Statistic shows YouTube has approximately 122 million daily active users, based all over the world. Visitors spend on average 19 minutes per day on YouTube. An average of close to 1 million hours of video are streamed by YouTube users each and every minute. As video data continue to grow through internet, video information retrieval becomes more and more demanding. Video data has tremendous capacity to store a vast variety of useful information. Compared to images, video understanding is difficult in the one extra temporal dimension. How to efficiently sample relevant frames from a video with the computing resource 1" 2312.08378v1,"Singular Value Penalization and Semantic Data Augmentation for Fully Test-Time Adaptation Houcheng Su 1 , Mengzhu Wang 2 , Daixian Liu 3 , Wei Wang 4 University of Macau 2 Alibaba Group 3 Sichuan Agricultural University 4 Sun Yat-Sen University mc25695@umac.mo, 202105787@stu.sicau.edu.cn, wangmengzhu.wmz@alibaba-inc.com, weiwei.transfer@gmail.com 1 Abstract Fully test-time adaptation (FTTA) adapts a model that is trained on a source domain to a target domain during the testing phase, where the two domains follow different distributions and source data is unavailable during the training phase. Existing methods usually adopt entropy minimization to reduce the uncertainty of target prediction results, and improve the FTTA performance accordingly. However, they fail to ensure the diversity in target prediction results. Recent domain adaptation study has shown that maximizing the sum of singular values of prediction results can simultaneously enhance their confidence (discriminability) and diversity. However, during the training phase, larger singular values usually take up a dominant position in loss maximization. This results in the model being more inclined to enhance discriminability for easily distinguishable classes, and the improvement in diversity is insufficiently effective. Furthermore, the adaptation and prediction in FTTA only use data from the current batch, which may lead to the risk of overfitting. To address the aforementioned issues, we propose maximizing the sum of singular values while minimizing their variance. This enables the model’s focus toward the smaller singular values, enhancing discriminability between more challenging classes and effectively increasing the diversity of prediction results. Moreover, we incorporate data from the previous batch to realize semantic data augmentation for the current batch, reducing the risk of overfitting. Extensive experiments on benchmark datasets show our proposed approach outperforms some compared state-of-the-art FTTA methods. Introduction Deep learning models have been remarkably successful in a wide range of applications, showing high performance when training and testing datasets follow the same or similar distributions (He et al. 2016; Vaswani et al. 2017; Liu et al. 2021). However, their performance significantly decreases when the two datasets are sampled from different distributions (Niu et al. 2023). Moreover, it is impractical or impossible to collect enough training data to encompass all possible data distributions present in real-world applications. Therefore, domain adaptation as an effective technique aims to train a model on a source domain that could be applied Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. into a target domain with strong generalization (Ganin and Lempitsky 2015; Kang et al. 2019; Ye et al. 2022a). Figure 1: (a) Analysis of discriminability and diversity by maximizing the sum of singular values; (b) Analysis of discriminability and diversity by maximizing the sum of singular values while minimizing their variance. The green circles denote samples that are wrongly labeled as class stars. However, in real-world scenarios, due to privacy and security concerns, we cannot obtain annotated data of source domain (Ye et al. 2022b; Mirza et al. 2022). In light of this, source-free domain adaptation aims to enhance the generalization of a pre-trained model from the source domain to the target domain, without access to source domain data (Lee et al. 2022; Zhao, Chen, and Xia 2023). For the convenience of deploying highly generalized models quickly, recent research has introduced a fully test-time adaptation (FTTA) setting. FTTA assumes that the target data is only involved during the testing phase. In this phase, the model not only needs to make predictions for the current batch but also needs to adjust the network’s parameters in real-time (Wang et al. 2020; Boudiaf et al. 2022). Existing FTTA studies typically utilize entropy minimization to reduce the uncertainty of target prediction results. However, they fail to ensure class diversity in target prediction results. In the field of domain adaptation, (Chen et al. 2019) utilize batch nuclear norm maximization (sum of singular values) to increase both label confidence and class diversity of prediction results. When we directly apply this method to FTTA, there are some issues that need to be addressed. As shown in the lower part of Figure 1 (a), larger" 2312.08382v1,"SCREW DISCRETE DYNAMICAL SYSTEMS AND THEIR APPLICATIONS TO EXACT SLOW NIM Vladimir Gurvich National Research University Higher School of Economics (HSE), Moscow, Russia vgurvich@hse.ru, vladimir.gurvich@gmail.com Mariya Naumova Rutgers Business School, Rutgers University, Piscataway, NJ, United States mnaumova@business.rutgers.edu Received: , Revised: , Accepted: , Published: Abstract Given integers n, k, ℓ such that 0 < k < n, 1 < ℓ and an integer vector x = (x 1 , . . . , x n ); denote by m = m(x) the number of entries of x that are multiple of ℓ. Choose n − k entries of x as follows: if n − k ≤ m(x), take n − k smallest entries of x multiple of ℓ; if n − k > m(x), take all m such entries, if any, and add remaining n − k − m entries arbitrarily, for example, take the largest ones. In one step, the chosen n − k entries (bears) keep their values, while the remaining k (bulls) are reduced by 1. Repeat such steps getting the sequence S = S(n, k, ℓ, x 0 ) = (x 0 → x 1 → . . . → x j → . . .). It is “quasi-periodic”. More precisely, there is a function N = N (n, k, ℓ, x 0 ) such that for all j ≥ N we have m(x j ) ≥ n − k and range(x j ) ≤ ℓ, where range(x) = (max(x i | i ∈ [n]) − min(x i | i ∈ [n]). Furthermore, N is a polynomial in n, k, ℓ, and range(x 0 ) and can be computed in time linear in n, k, ℓ, and log(1 + range(x 0 )). After N steps, the system moves “like a screw”. Assuming that x 1 ≤ · · · ≤ x n , introduce the cyclical order on [n] = {1, . . . , n} considering 1 and n as neighbors. Then, bears and bulls partition [n] into two intervals, rotating by the angle 2πk/n with every ℓ steps. Furthermore, after every p = ℓn/GCD(n, k) = ℓLCM (n, k)/k steps all entries of x are reduced by the same value δ = pk/n, that is, x j+p − x ji = δ i j for all i ∈ [n] and j ≥ N . We provide an algorithm computing N (and x ) in time linear in n, k, ℓ, log(1 + range(x 0 )) (and log(1 + j)). In case k = n− 1 and ℓ = 2 such screw dynamical system are applicable to impartial games; see Gurvich, Martynov, Maximchuk, and Vyalyi, “On Remoteness Functions of Exact Slow k-NIM with k + 1 Piles”, https://arxiv.org/abs/2304.06498 (2023). AMS subjects: 91A05, 91A46, 91A68 1" 2312.08391v1,"Performance of capture-recapture population size estimators under covariate information Layna Charlie Dennett and Dankmar Böhning Mathematical Sciences and Southampton Statistical Sciences Research Institute University of Southampton Abstract. Capture-recapture methods for estimating the total size of elusive populations are widely-used, however, due to the choice of estimator impacting upon the results and conclusions made, the question of performance of each estimator is raised. Motivated by an application of the estimators which allow covariate information to meta-analytic data focused on the prevalence rate of completed suicide after bariatric surgery, where studies with no completed suicides did not occur, this paper explores the performance of the estimators through use of a simulation study. The simulation study addresses the performance of the Horvitz-Thompson, generalised Chao and generalised Zelterman estimators, in addition to performance of the analytical approach to variance computation. Given that the estimators vary in their dependence on distributional assumptions, additional simulations are utilised to address the question of the impact outliers have on performance and inference. 1 Introduction and background Developed for use in ecology, capture-recapture methods are utilised for estimating the total size of elusive populations. An incomplete list of the individuals is used for the estimation, as given the nature of these populations, many individuals remain unobserved. Specifically for animal populations within ecology, traps are placed in a designated study area to capture the animals, where those in the captured sample are uniquely marked and released. On further occasions, additional samples of the animals are taken, recording previously marked individuals and uniquely marking the unmarked individuals. A capture history for each of the individual animals observed Keywords and phrases: Horvitz-Thompson, generalised Chao, generalised Zelterman, simulation study, performance, outliers L.C. Dennett, lcd1g18@soton.ac.uk, Southampton Statistical Sciences Research Institute, University of Southampton, Southampton, SO17 1BJ, UK D. Böhning, d.a.bohning@soton.ac.uk, Southampton Statistical Sciences Research Institute, University of Southampton, Southampton, SO17 1BJ, UK" 2312.08398v1,"Accepted to the ICLR 2020 workshop: Beyond tabula rasa in RL (BeTR-RL) A CCELERATING M ETA -L EARNING BY S HARING G RADIENTS Oscar Chang, Hod Lipson {oscar.chang,hod.lipson}@columbia.edu A BSTRACT The success of gradient-based meta-learning is primarily attributed to its ability to leverage related tasks to learn task-invariant information. However, the absence of interactions between different tasks in the inner loop leads to task-specific over-fitting in the initial phase of meta-training. While this is eventually corrected by the presence of these interactions in the outer loop, it comes at a significant cost of slower meta-learning. To address this limitation, we explicitly encode task relatedness via an inner loop regularization mechanism inspired by multi-task learning. Our algorithm shares gradient information from previously encountered tasks as well as concurrent tasks in the same task batch, and scales their contribution with meta-learned parameters. We show using two popular few-shot classification datasets that gradient sharing enables meta-learning under bigger inner loop learning rates and can accelerate the meta-training process by up to 134%. 1 I NTRODUCTION Like conventional machine learning, meta-learning algorithms can be prone to the risk of over-fitting. Over-fitting in meta-learning though can occur at both the level of the outer and the inner loop. Much prior work has dealt with the outer loop over-fitting to tasks in the meta-training distribution (Jamal & Qi, 2019; Khodak et al., 2019; Rajeswaran et al., 2019; Yin et al., 2020), but little attention has been paid towards the inner loop over-fitting to task-specific training data points. During the initial phase of meta-training, the scarce number of data points in each task, especially for few-shot learning setups, inevitably causes the over-fitting of comparatively much bigger neural network models. To counter this, meta-learning methods meta-learn the initialized weights of the inner loop learner as a parameter (Finn et al., 2017). By pooling information across different tasks in the meta-training distribution using the outer loop, the initialization eventually picks up task invariant information and gravitates towards a good basin of attraction that reduces the tendency for the inner loop learner to over-fit (Guiroy et al., 2019). Hence, unlike conventional or outer loop over-fitting, inner loop over-fitting does not always pose a problem to the generalization ability of the meta-learner. Nevertheless, limiting the interaction between tasks to take place only through the outer loop iteration significantly slows down the convergence of meta-learning. At the start of meta-training, the over-fitting of the inner loop learners causes them to suffer high test losses. Their parameters correspondingly fail to encode task specific information, reducing the signal available to the meta-test loss and thus, the outer loop. This problem is sustained until the model progresses towards more meaningful solutions in the inner loop, causing a significant number of wasteful initial model updates in the outer loop. In meta-learning, this issue is further exacerbated by the inordinate computational expense of a model update, which scales with the number of data points within each task, the number of tasks, the number of operations used by each inner loop learner, and the ultimate need to backpropagate through all of that. Our Contribution We propose an inner loop regularization mechanism inspired by multi-task learning (Caruana, 1997; Baxter, 1997) called gradient sharing. Historically, multi-task learning was a predominant approach to leveraging multiple related tasks to learn task-invariant information. Despite this common objective, the rapid development of meta-learning has occurred independently from the vast multi-task learning literature. The surprising insight from our work is that the two fields complement each other in a synergistic way. On one hand, sharing information across tasks in the inner loop via multi-task learning significantly reduces over-fitting. On the other hand, 1" 2312.08428v1,"MNRAS 000, 1–27 (2023) Preprint 15 December 2023 Compiled using MNRAS L A TEX style file v3.0 A unified accretion disc model for supermassive black holes in galaxy formation simulations: method and implementation Sophie Koudmani, 1,2★ Rachel S. Somerville, 1 Debora Sijacki, 3 Martin A. Bourne, 3 Yan-Fei Jiang (姜燕飞) 1 and Kasar Profit 1,4 1 Center for Computational Astrophysics, Flatiron Institute, 162 5 𝑡 ℎ Avenue, New York, NY 10010, USA 2 St Catharine’s College, University of Cambridge, Trumpington Street, Cambridge CB2 1RL, UK 3 Institute of Astronomy and Kavli Institute for Cosmology, University of Cambridge, Madingley Road, Cambridge, CB3 0HA, UK 4 Colgate University, 13 Oak Drive, Hamilton, NY 13346, USA Submitted to MNRAS ABSTRACT It is well established that supermassive black hole (SMBH) feedback is crucial for regulating the evolution of massive, if not all, galaxies. However, modelling the interplay between SMBHs and their host galaxies is challenging due to the vast dynamic range. Previous simulations have utilized simple subgrid models for SMBH accretion, while recent advancements track the properties of the unresolved accretion disc, usually based on the thin 𝛼-disc model. However, this neglects accretion in the radiatively inefficient regime, expected to occur through a thick disc for a significant portion of an SMBH’s lifetime. To address this, we present a novel ‘unified’ accretion disc model for SMBHs, harnessing results from the analytical advection-dominated inflowoutflow solution (ADIOS) model and state-of-the-art GR(R)MHD simulations. Going from low to high Eddington ratios, our model transitions from an ADIOS flow to a thin 𝛼-disc via a truncated disc, incorporating self-consistently SMBH spin evolution due to Lense-Thirring precession. Utilizing the moving mesh code arepo, we perform simulations of single and binary SMBHs within gaseous discs to validate our model and assess its impact. The disc state significantly affects observable luminosities, and we predict markedly different electromagnetic counterparts in SMBH binaries. Crucially, the assumed disc model shapes SMBH spin magnitudes and orientations, parameters that gravitational wave observatories like LISA and IPTA are poised to constrain. Our simulations emphasize the importance of accurately modelling SMBH accretion discs and spin evolution, as they modulate the available accretion power, profoundly shaping the interaction between SMBHs and their host galaxies. Key words: black hole physics – accretion, accretion discs – quasars: supermassive black holes – methods: numerical – black hole mergers – gravitational waves 1 INTRODUCTION Galaxy formation in the ΛCDM Universe is a hierarchical process whereby primordial density fluctuations collapse into dark matter haloes with cosmic time and grow via inflows and mergers. The gravitational pull of the dark matter leads the gas to collapse within these haloes, where it can radiatively cool and form stars. To prevent excessive star formation and reproduce the observed galaxy stellar mass function, theoretical models need to include feedback processes (see e.g. Somerville & Davé 2015; Vogelsberger et al. 2020, for recent reviews). Supernova feedback is commonly invoked for the regulation of the baryon cycle in low-mass galaxies, whilst the more energetic active galactic nuclei (AGN) feedback from supermassive black holes (SMBHs) is required to suppress star formation in massive galaxies. Recent tantalizing observations suggest that AGN feedback could also play a role at the low-mass end of the galaxy population, with observational hints at AGN-driven outflows in nearby dwarfs (e.g. Penny et al. 2018; Manzano-King et al. 2019; Liu et al. 2020; Davis et al. 2022; Aravindan et al. 2023) as well as indications of signifi- ★ E-mail: skoudmani@flatironinstitute.org © 2023 The Authors cant AGN activity from overmassive BHs in high-redshift low-mass galaxies (e.g. Harikane et al. 2023; Maiolino et al. 2023a,b; Übler et al. 2023a). SMBHs are likely to reside in the centre of the majority of massive galaxies (see e.g. review by Kormendy & Ho 2013) and intermediatemass black holes (IMBHs) may reside in the centres of the majority of massive dwarfs (Greene et al. 2020). As these galaxies are expected to undergo several major mergers with similarly sized galaxies over their cosmic lifetime, IMBHs and SMBHs also grow via mergers in addition to gas accretion. The merging process of stellar-mass BHs has been recently directly observed with the Advanced LiGO and VIRGO detectors which have opened a gravitational wave window on our Universe, even likely pushing into the IMBH regime (Abbott et al. 2020). While these ground-based detectors are not sensitive to the range of gravitational waves emitted by merging SMBHs, IPTA and LISA in future will be able to probe them. This potential has been spectacularly demonstrated by the detection of a signal consistent with a gravitational wave background from SMBH mergers by members of IPTA (Verbiest et al. 2016; The International Pulsar Timing Array Collaboration et al. 2023), NANOGrav (Agazie et al. 2023a), Parkes PTA (Reardon et al. 2023) and joint results from Eu-" 2312.08456v1,"The Cosmological Constant, Dark Matter and the ElectroWeak Scale meet in the Swampland Kazem Bitaghsir Fadafan ∗ Faculty of Physics, Shahrood University of Technology, P.O.Box 3619995161 Shahrood, Iran Giacomo Cacciapaglia † IP2I, Université de Lyon, UCBL, UMR 5822 CNRS/IN2P3, 4 rue Enrico Fermi, 69622 Villeurbanne Cedex, France The Swampland program, which looks for low energy theories consistent with quantum gravity, has led to the introduction of a dark dimension stemming from the cosmological constant. We show that the same argument leads to the emergence of the electroweak scale, once the dark dimension is realised in a warped background. A warped extra dimension at the TeV scale is, therefore, postulated, where the long-standing problem of the hierarchy between the electroweak scale and Planck scale can be addressed. In the emergent holistic picture of gravity and gauge interactions, both Planck and the electroweak scales are emergent from a theory with two fundamental scales: 10 −2 eV and 10 10 GeV. Hence, a bridge is established between the two standard models of particle physics and cosmology. During the last century, enormous progress in both theory and experiments helped establish solid models that describe the interactions among particles and the cosmological evolution of our Universe. Respectively, they are the standard model (SM) of particle physics [1–3], based on the gauge principle [4], and the ΛCDM model, based on cold dark matter with a cosmological constant Λ. Both ‘standard models’ entail energy scales that span many orders of magnitude: from the sub-eV scale of the cosmological constant and neutrino masses to the Planck scale (M Pl ∼ 10 28 eV), passing through the electroweak scale (∼ 10 11 eV). Such scales are connected via quantum effects, and the current standard models lack a theoretical understanding of their dynamic relation and relative quantum stability. This issue goes under the name of hierarchy problem. In particular, the cosmological constant [5] remains the most mysterious one: we do not have a clear understanding of its origin nor how its value emerges in a quantum context [6], the latter responsible for making it cosmologically relevant only at present days [7]. Many attempts can be found in the literature to offer a dynamical origin for the cosmological constant, the most famous example being quintessence [8], a special form of radiation generated typically by a time-varying scalar field [9, 10]. There have been also attempts to relate the value of the cosmological constant to that of neutrino masses, for instance drawing from the weak gravity conjecture [11]. Recently, a new proposal has been formulated based on the Swampland program, which aims at relating the consistency of low energy physics models to the ultraviolet embedding in a consistent quantum theory of gravity [12]. It has been argued that as a consequence of the Distance/Duality conjecture [13], the value of the 4- ∗ bitaghsir@shahroodut.ac.ir † g.cacciapaglia@ip2i.in2p3.fr dimensional (4D) cosmological constant predicts the existence of a single large extra dimension with characteristic size of the order of a fraction of eV [14]. This construction has been baptised Dark Dimension (DD) [15] as only gravity can probe it, while the standard model fields must remain localised on a 4D manifold. The main driver is a relation between the value of the effective 4D cosmological constant and the mass gap m in the towers of states coming from the extra dimension α−4 M Pl Λ ∼ (λm) α , (1) where α = 4 and λ̂ is a generic coupling of order 10 −1 ÷ 10 −3 . This relation has been questioned by arguments based on the existence of a natural cut-off in extra dimensional theories [16, 17], however, more appropriate handling of the cut-off seems to confirm the result in Eq. (1) [18, 19]. Swampland arguments also predict the existence of a new species scale [15] 2/3 M̂ ∼ λ̂ −1/3 Λ 1/12 M Pl ∼ 10 9 ÷ 10 10 GeV , (2) which can be associated with the fundamental Planck scale in the ultraviolet completion of the DD. Phenomenologically, the DD proposal offers a candidate for dark matter in the form of the tower of gravitational states [20, 21] as well as a connection with the generation of neutrino masses [15, 22]. Primordial black holes provide an additional component for dark matter [23, 24] due to the non-standard cosmology of the DD [25]. Finally, the realisation of the DD as a strongly warped throat has been studied [26], as well as a Swampland-motivated connection to the supersymmetry breaking scale at around the TeV scale [27]. In this letter, we build up on the DD proposal by applying the same Swampland-inspired conjecture above the eV scale. In fact, at energies larger than the scale of the DD, space-time is effectively 5-dimensional and characterised by its own 5D cosmological constant. Once the" 2312.08471v1,"Draft version December 15, 2023 Typeset using L A TEX twocolumn style in AASTeX63 Cross-correlation Techniques to Mitigate the Interloper Contamination for Line Intensity Mapping Experiments Anirban Roy 1, 2, 3 and Nicholas Battaglia 1 1 Department of Astronomy, Cornell University, Ithaca, NY 14853, USA 2 Department of Physics, New York University, 726 Broadway, New York, NY, 10003, USA 3 Center for Computational Astrophysics, Flatiron Institute, New York, NY 10010, USA Abstract Line intensity mapping (LIM) serves as a potent probe in astrophysics, relying on the statistical analysis of integrated spectral line emissions originating from distant star-forming galaxies. While LIM observations hold the promise of achieving a broad spectrum of scientific objectives, a significant hurdle for future experiments lies in distinguishing the targeted spectral line emitted at a specific redshift from undesired line emissions originating at different redshifts. The presence of these interloping lines poses a challenge to the accuracy of cosmological analyses. In this study, we introduce a novel approach to quantify line-line cross-correlations (LIM-LLX), enabling us to investigate the true signal amidst instrumental noise and interloping emissions. For example, at a redshift of approximately z ∼ 3.7, we observed that the measured auto-power spectrum of CII 158 exhibited substantial bias, from interloping line emission. However, cross-correlating CII 158 with CO (6-5) lines using a FYST-like experiment yielded a promising result, with a Signal-to-noise ratio (SNR) of ∼ 10. This measurement is notably unbiased. Additionally, we explore the extensive capabilities of cross-correlation by leveraging various CO transitions to probe the tomographic Universe at lower redshifts through LIM-LLX. We further demonstrate that incorporating low-frequency channels, such as 90 GHz and 150 GHz, into FYST’s EoR-Spec-like experiment can maximize the potential for cross-correlation studies, effectively reducing the bias introduced by instrumental noise and interlopers. Keywords: line intensity mapping, galaxy formation, reionization, structure formation 1. INTRODUCTION Line Intensity Mapping (LIM) is a promising approach that allows us to probe the three-dimensional (3D) structure of the Universe beyond the traditional galaxy-bygalaxy surveys and explore the collective properties of atomic and molecular emissions from the interstellar medium (ISM) of galaxies (Visbal & Loeb 2010; Visbal et al. 2011; Kovetz et al. 2017; Bernal & Kovetz 2022). By indirectly tracing the cumulative radiation from multiple atomic and molecular emission lines, LIM offers a unique statistical view of large-scale structures, providing valuable insights into galaxy formation and evolution across cosmic time (Sun et al. 2023; Zhang et al. 2023). This technique has emerged as a tool for investigating the cosmic landscape across vast cosmic volumes and exploring the evolution of galaxies, intergalactic gas, and cosmic star formation (Bernal & Kovetz 2022; Zhou et al. 2023). The exploration of several lines, including fine-structure emissions like [CII] (157.7 µm) and [OIII] (52 & 88.4 µm), along with rotational emission lines from CO, garners substantial interest in upcoming LIM experiments conducted at millimeter and sub-millimeter wavelengths (Suginohara et al. 1998; Righi et al. 2008; Lidz et al. 2011; Carilli 2011; Fonseca et al. 2017; Gong et al. 2017; Kovetz et al. 2017; Chung et al. 2020; Padmanabhan 2018, 2019; Dumitru et al. 2019; Chung et al. 2019; Kannan et al. 2022; Murmu et al. 2021; Karoumpis et al. 2022; Sun et al. 2023; Garcia et al. 2023). These lines are of particular interest due to their inherent brightness properties and frequency overlap with the current, millimeter and sub-millimeter wave LIM experiments. These experiments, including the EoR-Spec instrument at FYST 1 Corresponding author: Anirban Roy ar689@cornell.edu 1 https://www.ccatobservatory.org/" 2312.08475v1,"Emergent Fermion Dynamical Symmetry for Monolayer Graphene in a Strong Magnetic Field Mike Guidry (1) , ∗ Lian-Ao Wu (2) , † and Fletcher Williams (1)‡ (1) Department of Physics and Astronomy, University of Tennessee, Knoxville, Tennessee 37996, USA (2) Department of Physics, University of the Basque Country UPV/EHU, 48080 Bilbao, IKERBASQUE Basque Foundation for Science, 48013 Bilbao, EHU Quantum Center, University of the Basque Country UPV/EHU, Leioa, Biscay 48940, Spain (Dated: December 15, 2023) We review the physics of monolayer graphene in a strong magnetic field, with emphasis on highly collective states that emerge from the weakly interacting system because of correlations (emergent states). After reviewing the general properties of graphene and of electrons in a magnetic field, we give a brief introduction to the integer quantum Hall effect (IQHE) and the fractional quantum Hall effect (FQHE) in a 2D electron gas as foundation to show that monolayer graphene in a magnetic field exhibits both effects, but with properties modified by the influence of the graphene crystal. After giving an introduction to standard methods of dealing with emergent states for this system, we show that an SO(8) fermion dynamical symmetry governs the emergent degrees of freedom and that the algebraic and group properties of the dynamical symmetry provide a new view of strongly correlated states observed in monolayer graphene subject to a strong magnetic field. PACS numbers: 71.10.-w, 71.27.+a, 74.72.-h Contents ∗ I. Introduction 2 II. Some material properties of graphene 2 III. Fundamental properties of graphene 3 IV. Structure of Graphene A. Electronic structure B. Lattice structure C. Band structure 1. Tight binding approximation 2. Dispersion in graphene D. Low-energy excitations E. Chirality 3 3 3 4 4 6 7 9 V. Classical and Quantum Hall Effects A. The classical Hall effect B. Quantum Hall effects 9 9 10 VI. Non-Relativistic Landau Levels A. Schrödinger equation and solution B. Properties of Landau levels C. Degeneracy and level densities 10 11 11 11 VII. The Integer Quantum Hall Effect A. Discovery of the integer quantum Hall effect B. Understanding the integer quantum Hall effect 1. Impurity scattering and mobility gaps 2. Edge states and conduction 3. Topology of the 2D Brillouin Zone 4. Topological Protection of Hall Plateaus 12 12 12 13 15 15 16 Electronic address: guidry@utk.edu 5. Bulk–Boundary Correspondence 6. Incompressible States C. Summary: Integer Quantum Hall Effect 17 17 17 VIII. The Fractional Quantum Hall Effect A. Properties of the fractional quantum Hall state B. The Laughlin wavefunction 17 17 18 IX. Graphene in Strong Magnetic Fields A. Quantization of Dirac Landau levels B. Degeneracy of Landau levels 18 18 19 X. Quantum Hall Effects in Graphene A. Strength of correlations in graphene B. The graphene integer quantum Hall effect C. The effect of strong correlations in graphene D. The graphene fractional quantum Hall effect 21 21 21 22 22 XI. SU(4) Quantum Hall Ferromagnetism A. Degeneracies and filling of Landau levels B. SU(4) quantum Hall states in graphene 1. Effective Hamiltonian 2. Symmetry and explicit symmetry breaking 22 22 23 23 24 XII. Emergent States in Magnetic Fields A. The role of correlations B. Symmetry-breaking interactions 26 26 26 XIII. Low-Energy Collective Modes A. Basis states for collective modes B. Most general many-body wavefunction C. Explicit vs. spontaneous symmetry breaking 27 27 27 28 XIV. Fermion Dynamical Symmetry A. The microscopic dynamical symmetry method B. Dynamical symmetry solution algorithm C. Validity of the dynamical symmetry approach 29 29 29 30 XV. Dynamical Symmetry in Graphene 30 † Electronic address: lianaowu@gmail.com ‡ Electronic address: fletcher.williams@knoxvillecatholic.com" 2312.08481v1,"Physics-Guided Continual Learning for Accelerating Aqueous Organic Redox Flow Battery Material Discovery Yucheng Fu, Amanda Howard, Chao Zeng, and Panos Stinis Physical and Computational Sciences Directorate Pacific Northwest National Laboratory Richland, WA 99354 {yucheng.fu,amanda.howard,chao.zeng,panagiotis.stinis}@pnnl.gov Abstract Aqueous organic redox flow batteries (AORFBs) have gained popularity in renewable energy storage due to high energy density, low cost, and scalability. The rapid discovery of aqueous soluble organic (ASO) redox-active materials necessitates efficient machine learning surrogates for predicting battery performance. The physics-guided continual learning (PGCL) method proposed in this study can incrementally learn data from new ASO electrolytes while addressing catastrophic forgetting issues in conventional machine learning. Using a ASO anolyte database with 1024 materials generated by a large-scale 780cm 2 interdigitated cell model, PGCL incorporates AORFB physics to optimize the continual learning task formation and training process. This achieves a 5x training time speedup compared to the non-physics-guided continual learning method while retaining previously learned battery material knowledge. The trained PGCL demonstrates its capability in predicting battery performance when using unseen dihydroxyphenazine isomers in anolytes, thus showcasing the potential of PGCL to analyze and discover new ASO materials. 1 Introduction As global energy consumption continues to grow and the urgency of transitioning to renewable energy sources intensifies[1, 2], flow batteries have carved a significant niche for themselves in the market, primarily because of their ability to provide reliable and efficient energy storage solutions[3, 4, 5]. The evolution of redox flow batteries (RFBs) has transitioned from metalcentered redox-active materials to organic molecular systems due to concerns about cost, resource availability, and environmental impact[6, 7, 8]. Among these, the aqueous organic redox flow battery (AORFB) stands out as a compelling choice by combining the benefits of organic redox-active materials with a water-based electrolyte[9, 10]. The aqueous soluble organic (ASO) redox-active materials are favorable due to their high solubility, versatility, and fast kinetics[11, 12, 13]. With inherent flow battery advantages like scalability and safety, AORFBs hold significant promise for future energy storage solutions. Machine learning (ML) algorithms, including data-driven and physics-informed neural network models,[14, 15, 16, 17], have significantly advanced RFB development. They enable characterization of molecular properties, reaction kinetics, and prediction of cell performance across various scales [18, 19, 20, 21, 22, 23, 24]. Despite these advancements, predicting AORFB performance remains a challenging area due to the lack of well-curated ASO redoxactive material datasets. To maintain state-of-the-art performance, both data-driven and physics-informed ML models need updates with the addition of new ASO materials. However, ML models cannot be simply retrained using only new materials because they suffer from catastrophic forgetting and exhibit poorer performance on the previous data[25, 26]. This 1" 2312.08492v1,"A Multi-Harmonic NIR-UV Dual-Comb Spectrometer K RISTINA F. C HANG 1 , D ANIEL M. B. L ESKO 1,2 , C ARTER M ASHBURN 1,3 , P ETER C HANG 1,3 , E UGENE T SAO 1,4,† , A LEXANDER J. L IND 1,4,† , AND S COTT A. D IDDAMS 1,3,4,* 1 Time and Frequency Division, National Institute of Standards and Technology, 325 Broadway, Boulder, CO 80305, USA. 2 Department of Chemistry, University of Colorado Boulder, Cristol Chemistry and Biochemistry, Boulder, CO 80309, USA. 3 Department of Physics, University of Colorado Boulder, Libby Dr, Boulder, CO 80302, USA. 4 Department of Electrical, Computer, and Energy Engineering, University of Colorado Boulder, 425 UCB 1B55, Boulder, CO 80309, USA. * Corresponding author: scott.diddams@colorado.edu Dual-comb spectroscopy in the ultraviolet (UV) and visible would enable broad bandwidth electronic spectroscopy with unprecedented frequency resolution. However, there are significant challenges in generation, detection and processing of dual-comb data that have restricted its progress in this spectral region. In this work, we leverage robust 1550 nm few-cycle pulses to generate frequency combs in the UV-visible. We couple this source to a wavelength multiplexed dual-comb spectrometer and simultaneously retrieve 100 MHz comb-mode-resolved spectra over three distinct harmonics spanning 380-800 nm. The experiments highlight the path to continuous dual-comb coverage spanning 200-750 nm, offering extensive access to electronic transitions in atoms, molecules, and solids. Ultraviolet (UV) and visible spectroscopy of electronic transitions is an essential tool in chemistry, biology, and materials science [1, 2]. Grating-based spectrometers are typically used to measure absorption spectra in the UV-visible from 200-750 nm (400-1500 THz). Broadband measurements are crucial for fully characterizing electronic spectra, which often span hundreds of THz. Conventional spectrometers commonly employ multiple incoherent lamps to cover the UV-visible range (Fig. 1). However, these instruments are generally limited to >100 GHz resolution, hindering accurate spectral analyses required for applications from fundamental spectroscopy to remote sensing [1, 3]. Dual-comb spectroscopy (DCS) is an emerging technique with intrinsic advantages in resolution and precision over existing spectroscopy modalities [4–6]. However, DCS in the visible and UV across comparable bandwidths to conventional spectrometers requires (i) the challenging nonlinear generation of frequency combs across multiple harmonic orders [7–9] as well as (ii) methods for detecting and processing DCS signals over a wide spectral range. Due to inadequate optical powers and challenging phase control, UV DCS itself remains largely unexplored, with only a few recent examples [10–12]. This work addresses these challenges and achieves multi-harmonic DCS in the UV, visible, and near-infrared (NIR) simultaneously, filling a crucial gap in broad bandwidth and high-resolution (100 MHz) UV-visible spectroscopy. We employ intense few-cycle pulses from erbium fiber lasers (Er:fiber) to generate NIR to UV frequency combs from 380-800 nm in a single bulk crystal. The high peak intensities enable the cascaded generation of several bright harmonics, as shown in Fig. 1. A spectral multiplexing DCS setup yields simultaneous multi-octave detection over these harmonics with high signal-to-noise and comb mode resolution. The same few-cycle Er:fiber setup has been previously used for high-harmonic generation (HHG) in solids to produce frequency combs spanning the entire UV-visible down to 200 nm, illustrating a direct path to DCS with broader bandwidth coverage at shorter wavelengths. In linking few-cycle harmonic generation to multi-wavelength DCS with over 160,000 resolved comb modes at 100 MHz, our work establishes a foundation for spectroscopy with unparalleled resolution over the full UV-visible range to enable the complete mapping of electronic bands in numerous species. The DCS setup shown in Fig. 2(a) is based on a pair of repetition rate and phase-stabilized Er:fiber frequency combs at 1550 nm (193 THz) and ∼ 100 MHz repetition rate. We employ the amplification and compression procedure of Ref. [15] to generate near transform-limited 20 fs" 2312.08507v1,"PATIENT-ADAPTIVE AND LEARNED MRI DATA UNDERSAMPLING USING NEIGHBORHOOD CLUSTERING Siddhant Gautam ⋆ Angqi Li ⋆ Saiprasad Ravishankar ⋆† ⋆ Dept. of Computational Mathematics Science and Engineering, Michigan State University, East Lansing, MI, USA † Dept. of Biomedical Engineering, Michigan State University, East Lansing, MI, USA ABSTRACT There has been much recent interest in adapting undersampled trajectories in MRI based on training data. In this work, we propose a novel patient-adaptive MRI sampling algorithm based on grouping scans within a training set. Scan-adaptive sampling patterns are optimized together with an image reconstruction network for the training scans. The training optimization alternates between determining the best sampling pattern for each scan (based on a greedy search or iterative coordinate descent (ICD)) and training a reconstructor across the dataset. The eventual scan-adaptive sampling patterns on the training set are used as labels to predict sampling design using nearest neighbor search at test time. The proposed algorithm is applied to the fastMRI knee multicoil dataset and demonstrates improved performance over several baselines. Index Terms— Sampling optimization, iterative coordinate descent, greedy algorithm, machine learning, computational imaging. 1. INTRODUCTION Reconstructing MR images from undersampled measurements has been of considerable interest to the medical imaging community. Reducing scan time for MRI acquisition offers many benefits, including reducing patient discomfort, increasing scaling throughput, and alleviating motion and other artifacts. Pulse sequence and k-space trajectory design [1, 2] have been used to improve the sampling efficiency including partial or half Fourier methods [3] and parallel MRI (p-MRI) [4] were proposed to give hardware-based acceleration but they suffer from increased noise and imperfect artifact correction at higher undersampling rates. Compressive sensing-based techniques have been proposed in the past to recover MR images from sparse or subsampled measurements [5, 6]. In contrast to classical compressive sensing (CS), which presupposes familiarity with the sparsity bases of signals or incoherence between the basis and the measurement operator, approaches using learned image models for reconstruction have demonstrated greater efficacy. These methods include techniques like (patch-based) synthesis dictionary learning [7, 8]. Additionally, recent progress in transform learning [9, 10] presents an alternative framework for achieving efficient sparse modeling in MRI. With the advent of deep learning, the U-Net [11] and its variants [12, 13] have been quite successful in biomedical image segmentation and reconstruction. Unrolled methods such as modelbased deep learning (MoDL) [14] use the MRI forward model within a data consistency step and a CNN reconstructor as a denoiser to regularize the reconstruction. Recently, deep learning-based approaches have invited considerable interest for sampling prediction in accelerated MRI, including methods such as LOUPE [15, 16]. Some works have jointly learned sequential sampling along with a reconstruction strategy [17]. However, a limitation of approaches such as LOUPE, J-MoDL [18], and the method of [19] is that the learned sampling pattern is not adapted to every test case in a patient-adaptive manner, but rather fixed after it is learned on the training set. In this sense, LOUPE learns a sampling pattern that is adapted to the entire dataset (populationadaptive) rather than to individual scans. Patient or scan adaptive sampling prediction could lead to potentially improved sampling efficiency and reconstruction performance compared to populationadaptive methods. While most previous approaches focused on population adaptive sampling for MRI [15, 20], in this work, we focus on learning patient-adaptive MRI sampling patterns. The optimal sampling patterns are jointly estimated with a deep reconstructor network. Our previous work explored patient-adaptive mask-prediction networks for single-coil MRI data [21]. However, it suffers from drawbacks due to a lack of training labels and this problem is addressed in this work. We propose a training optimization that finds patient-adaptive sampling patterns and learned reconstruction models for multi-coil MRI. Our algorithm can alternatively estimate a reconstructor and a collection of sampling patterns from training data (Section 2.2). The novel contributions include generating patient-adaptive sampling patterns whereas earlier approaches have mostly designed population-adaptive masks [15, 22]. We use a greedy algorithm [22] to generate initial high-quality sampling patterns which are then used as starting points for mask optimization and are further refined using an iterative coordinate descent scheme to yield improved sampling masks on training data. The details of mask optimization are provided in Section 2.3. At testing time, a nearest neighbor search is used to estimate the high-frequency information to sample (from the pre-learned patient-adaptive masks) based on acquired low-frequency information in the test scan. Section 2.5 discusses in detail how the nearest neighbor search is used to obtain patientadaptive masks at testing time and Section 3 demonstrates the performance of the learned masks. 2. METHODOLOGY 2.1. Multi-coil MRI Reconstruction S. Gautam (gautamsi@msu.edu) and S. Ravishankar (ravisha3@msu.edu) are the corresponding authors. All authors were supported in part by the NIH grant R21 EB030762. The multi-coil MR image reconstruction problem from subsampled k-space measurements often takes the form of a regularized opti-" 2312.08512v1,"Event-Triggered Extremum Seeking Control Systems ⋆ Victor Hugo Pereira Rodrigues a , Tiago Roux Oliveira b , Liu Hsu a , Mamadou Diagne c , Miroslav Krstic c a Dept. of Electrical Engineering, Federal University of Rio de Janeiro (UFRJ), RJ 21945-970, Brazil. b Dept. of Electronics and Telecommunication Engineering, State University of Rio de Janeiro (UERJ), RJ 20550-900, Brazil. c Dept. of Mechanical and Aerospace Engineering, University of California - San Diego (UCSD), La Jolla, CA 92093-0411, USA. Abstract This paper proposes an event-triggered control scheme for multivariable extremum seeking of static maps. Both static and dynamic triggering conditions are developed. Integrating Lyapunov and averaging theories for discontinuous systems, a systematic design procedure and stability analysis are developed. Both event-based methods enable one to achieve an asymptotic stability result. Ultimately, the resulting closed-loop dynamics demonstrates the advantages of combining both approaches, namely, event-triggered control and extremum seeking. Although we keep the presentation using the classical event-triggered method, the extension of the results for the periodic event-triggered approach is also indicated. An illustration of the benefits of the new control method is presented using consistent simulation results, which compare the static and the dynamic triggering approaches. Key words: Extremum Seeking, Event-triggered Control, Discontinuous Averaging Theory, Multivariable Maps, Lyapunov Stability 1 Introduction In spite of the fact that the concept of extremum seeking control (ESC) was introduced 100 years ago by the French Engineer Maurice Leblanc already in 1922 [29], a rigorous demonstration of stability under feedback control only appeared about 20 years ago [28]. ESC based on the perturbation method adds a periodic excitation-dither signal of small amplitude to the input of the nonlinear map and estimates the gradient by using a suitable demodulation process with the same kind of periodic signals. Extremum seeking is a control strategy that allows the output of a nonlinear map to be held within a vicinity of its extremum. When the parameters of the nonlinear map are available, it is possible to obtain exactly the gradient of the nonlinearity and the control objective can be defined as its stabilization. However, be- ⋆ Preliminary versions of this paper were partially presented at the 14th IFAC International Workshop on Adaptive and Learning Control Systems [43], Casablanca, 2022, and the 22nd World Congress of the International Federation of Automatic Control [44], Yokohama, 2023. Email addresses: rodrigues.vhp@gmail.com (Victor Hugo Pereira Rodrigues), liu@coep.ufrj.br (Liu Hsu), tiagoroux@uerj.br (Tiago Roux Oliveira), mdiagne@eng.ucsd.edu (Mamadou Diagne), krstic@ucsd.edu (Miroslav Krstic) (Miroslav Krstic). Preprint submitted to arxiv.org cause of parametric uncertainties, the gradient is not always known and this control task is not always straightforward. Despite the several ESC strategies found in the literature, the methods based on perturbations (dither signals) are the oldest and, even remain nowadays quite popular. After the consolidation of ESC stability results for static and general nonlinear dynamic systems in continuous time [28], discrete-time systems [11], stochastic systems [30,31], multivariable systems [18], and non-cooperative games [17], the theoretical advances of ESC overcome the border of finitedimension systems to arrive in the world of Partial Differential Equations (PDEs). For such infinite-dimensional systems, boundary feedback controllers are designed to ensure convergence of the ESC in the closed-loop form by compensating the input and/or output under propagation through transport PDEs (delays) [37, 45], diffusion PDEs [16, 34], wave PDEs [35], Lighthill–Whitham–Richards PDEs [53], parabolic PDEs [33], and PDE-PDE cascades [35]. In the current technological age of network science, researchers are focusing on decreasing wiring costs by designing fast and reliable communication schemes where the plant and controller might not be physically connected, or might even be in different geographical locations. These networked control systems offer advantages in the financial cost of installation and maintenance [56]. However, one of 15 December 2023" 2312.08516v1,"A shooting-Newton procedure for solving fractional terminal value problems Luigi Brugnano ∗ Gianmarco Gurioli † Felice Iavernaro ‡ December 15, 2023 Abstract In this paper we consider the numerical solution of fractional terminal value problems (FDE-TVPs). In particular, the proposed procedure uses a Newton-type iteration which is particularly efficient when coupled with a recently-introduced step-by-step procedure for solving fractional initial value problems (FDE-IVPs), able to produce spectrally accurate solutions of FDE problems. Some numerical tests are reported to make evidence of its effectiveness. Keywords: fractional differential equations, fractional integrals, terminal value problems, Jacobi polynomials, Fractional Hamiltonian Boundary Value Methods, FHBVMs. MSC: 34A08, 65R20. 1 Introduction Fractional differential equations have gained more and more importance in many applications: we refer, e.g., to the classical references [13, 24] for an introduction. The present contribution is mainly motivated by the recent paper of Diethelm and Uhlig [16], where an iterative procedure, based on the secant method, is proposed for solving fractional terminal value problems (FDE-TVPs) that, without loss of generality, we assume in the form: y (α) (t) = f (y(t)), t ∈ [0, T ], y(T ) = η ∈ R m . (1) Here, for α ∈ (0, 1), y (α) (t) ≡ D α y(t) is the Caputo fractional derivative:   Z t 1 d α −α D g(t) = g(x) dx. (2) (t − x) Γ(1 − α) 0 dx ∗ L. Brugnano, Dipartimento di Matematica e Informatica “U. Dini”, Università di Firenze, Italy, luigi.brugnano@unifi.it, https://orcid.org/0000-0002-6290-4107 † G. Gurioli, Dipartimento di Matematica e Informatica “U. Dini”, Università di Firenze, Italy, gianmarco.gurioli@unifi.it, https://orcid.org/0000-0003-0922-8119 ‡ F. Iavernaro, Dipartimento di Matematica, Università di Bari Aldo Moro, Italy, felice.iavernaro@uniba.it, https://orcid.org/0000-0002-9716-7370 1" 2312.08517v1,"(Debiased) Contrastive Learning Loss for Recommendation (Technical Report) Ruoming Jin Dong Li rjin1@kent.edu dli12@kent.edu Kent State University Kent, Ohio, USA ABSTRACT In this paper 1 , we perform a systemic examination of the recom- mendation losses, including listwise (softmax), pairwise(BPR), and pointwise (mean-squared error, MSE, and Cosine Contrastive Loss, CCL) losses through the lens of contrastive learning. We introduce and study both debiased InfoNCE and mutual information neural estimator (MINE), for the first time, under the recommendation setting. We also relate and differentiate these two losses with the BPR loss through the lower bound analysis. Furthermore, we present the debiased pointwise loss (for both MSE and CCL) and theoretically certify both iALS and EASE, two of the most popular linear models, are inherently debiased. The empirical experimental results demonstrate the effectiveness of the debiased losses and newly introduced mutual-information losses outperform the existing (biased) ones. ACM Reference Format: Ruoming Jin and Dong Li. 2023. (Debiased) Contrastive Learning Loss for Recommendation (Technical Report). In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 13 pages. https://doi.org/ XXXXXXX.XXXXXXX 1 INTRODUCTION Machine learning, including recommender systems [1, 27], has played a pivotal role in transforming the way humans interact with and explore information on the internet [57], which has been ongoing for several years and continues to evolve with the integration of AI-generated content [32], significantly impacting the lives of individuals [59]. As recommendation algorithms continue to boom [1, 61], largely thanks to deep learning models, many models’ real effectiveness and claimed superiority has been called into question, such as various deep learning models vs. simple linear and heuristic methods [13], and the potential “inconsistent” issue of using itemsampling based evaluation [24, 26, 28–30], among others. A major problem in existing recommendation research is their “hyper-focus” on evaluation metrics with often weak or not-fully-tuned baselines 1 This manuscript was initially reviewed at KDD 2023 in February 2023. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, 2023, Woodstock, NY © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX to demonstrate the progress of their newly proposed model [13]. However, recent research has shown that properly evaluating (simple) baselines is indeed not an easy task [47]. To deal with the aforementioned challenges, aside from standardized benchmarks and evaluation criteria, research communities have devoted efforts to developing and optimizing simple and stronger baseline models, such as the latest effort on finetuning iALS [45, 46] and SimpleX (CCL) [37]. In the meantime, researchers [23] have started to theoretically analyze and compare different models, such as matrix factorization (iALS) vs. low-rank regression (EASE). By simplifying and unifying different models under a similar closed form, they observe how different approaches “shrink” singular values differently and thus provide a deep understanding and explain how and why the models behave differently, and the exact factor leads to a performance gap. However, the above work is limited only to linear models, and their regularization landscapes [31]. Taking the cue from the aforementioned research, this paper aims to rigorously analyze and compare the loss functions, which play a key role in designing recommendation models [37]. This paper is also particularly driven by the emergence of contrastive learning loss [7, 9, 40] has shown great success in various learning tasks, such as computer vision and NLP, etc. Even though there are a few research works [55, 63] in adopting contrastive learning paradigms into individual recommendation models, a systematic understanding of the recommendation loss function from the lens of contrastive learning is still lacking. For instance, how recommendation models can take advantage of (debiased) contrastive loss [9] (including mutual information-based losses [3]? How pairwise BPR [43] (Bayesian Pairwise Ranking) loss relate to these recent contrastive losses [3, 9, 40]? How can we debias the 𝐿2 (mean-squared-error, MSE) or 𝐿1 (mean-absolute-error, MAE) loss function with respect to the contrastive learning loss? Following this, does the well-known linear models, such as iALS [20, 45, 46] and EASE [51], needs to be debiased with respect to contrastive learning losses? To answer these questions, we made the following contribution to this paper: • (Section 2) We revisit the softmax loss (and BPR loss) using the latest debiased contrastive loss [9], which provides a natural debias approach instead of typically rather sophisticated debias methods through propensity score [64]. We also introduce a mutual information neural estimator (MINE) loss [3] to the recommendation setting. To the best of our knowledge, this is the first study to study MINE for recommendation" 2312.08519v1,"Toward a More Biologically Plausible Neural Network Model of Latent Cause Inference Qihong Lu 1* , Tan T. Nguyen 2 , Qiong Zhang 3 , Uri Hasson 1 , Thomas L. Griffiths 14 , Jeffrey M. Zacks 2 , Samuel J. Gershman 5 , Kenneth A. Norman 1 1. Department of Psychology and Princeton Neuroscience Institute, Princeton University 2. Department of Psychological and Brain Sciences, Washington University in St. Louis 3. Department of Psychology and Department of Computer Science, Rutgers University-New Brunswick 4. Department of Computer Science, Princeton University 5. Department of Psychology and Center for Brain Science, Harvard University *Correspondence and requests for materials should be addressed to qihong.lu@columbia.edu Abstract Humans spontaneously perceive a continuous stream of experience as discrete events. It has been hypothesized that this ability is supported by latent cause inference (LCI). We implemented this hypothesis using Latent Cause Network (LCNet), a neural network model of LCI. LCNet interacts with a Bayesian LCI mechanism that activates a unique context vector for each inferred latent cause. This architecture makes LCNet more biologically plausible than existing models of LCI and supports extraction of shared structure across latent causes. Across three simulations, we found that LCNet could 1) extract shared structure across latent causes in a function-learning task while avoiding catastrophic interference, 2) capture human data on curriculum effects in schema learning, and 3) infer the underlying event structure when processing naturalistic videos of daily activities. Our work provides a biologically plausible computational model that can operate in both laboratory experiment settings and naturalistic settings, opening up the possibility of providing a unified model of event cognition." 2312.08536v1,"M ARKOV D ECISION P ROCESSES WITH N OISY S TATE O BSERVATION Amirhossein Afsharrad, Sanjay Lall Department of Electrical Engineering Stanford University Stanford, CA {afsharrad, lall}@stanford.edu A BSTRACT This paper addresses the challenge of a particular class of noisy state observations in Markov Decision Processes (MDPs), a common issue in various real-world applications. We focus on modeling this uncertainty through a confusion matrix that captures the probabilities of misidentifying the true state. Our primary goal is to estimate the inherent measurement noise, and to this end, we propose two novel algorithmic approaches. The first, the method of second-order repetitive actions, is designed for efficient noise estimation within a finite time window, providing identifiable conditions for system analysis. The second approach comprises a family of Bayesian algorithms, which we thoroughly analyze and compare in terms of performance and limitations. We substantiate our theoretical findings with simulations, demonstrating the effectiveness of our methods in different scenarios, particularly highlighting their behavior in environments with varying stationary distributions. Our work advances the understanding of reinforcement learning in noisy environments, offering robust techniques for more accurate state estimation in MDPs. Keywords MDP, POMDP, reinforcement learning, Bayesian algorithms, state estimation, system identification 1 Introduction In the landscape of artificial intelligence, Markov Decision Processes (MDPs) are pivotal in reinforcement learning, providing a structured approach to tackle sequential decision-making problems under uncertainty [1, 2]. Their applicability spans a diverse range of fields, including robotics [3, 4], financial decision-making [5, 6], autonomous navigation [7, 8], healthcare management [9, 10], supply chain optimization [11, 12], and energy systems management [13, 14]. MDPs enable the optimization of actions based on probabilistic state transitions, which is fundamental in these domains. However, a critical challenge emerges when these theoretical models are applied to real-world scenarios characterized by noisy observations and measurements. This is a common occurrence in environments ranging from sensor data in autonomous vehicles [15] to fluctuating markets in finance [16], from patient data in healthcare [17] to demand variability in supply chains [18], and from renewable energy predictions to grid stability in energy systems [19]. Such inherent uncertainties in observations necessitate sophisticated methodologies for accurate state estimation, which is essential for making reliable and informed decisions. Our work addresses this challenge, proposing advanced techniques to enhance the robustness and effectiveness of MDP-based reinforcement learning models in the face of noise in state observations. In this work, we address a particular type of noisy observations by modeling the uncertainty through a confusion matrix, which represents the probabilities of observing states incorrectly. Our approach adopts a system identification perspective, aiming to estimate the inherent measurement noise characterized by this confusion matrix. The primary contribution of this paper lies in proposing two categories of algorithms designed to estimate these noise components, accompanied by a set of conditions and performance guarantees. Initially, we introduce an innovative method, the method of second-order repetitive actions. This approach efficiently estimates noise components within a finite time window, and we specify the conditions for the reliable identification of the system’s noise characteristics. Subsequently, we introduce a family of Bayesian algorithms, providing a comparative analysis of their performance and exploring" 2312.08542v1,"Tensions in cosmology: a discussion of statistical tools to determine inconsistencies Matı́as Leizerovich a,b , Susana J. Landau a,b , Claudia G. Scóccola c,1 a Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de Fı́sica., Ciudad Universitaria, 1428, Capital Federal, 1460, Buenos Aires, Argentina b CONICET - Universidad de Buenos Aires, Instituto de Fı́sica de Buenos Aires (IFIBA)., Ciudad Universitaria, 1428, Capital Federal, 1460, Buenos Aires, Argentina c Facultad de Ciencias Astronómicas y Geofı́sicas, Universidad Nacional de La Plata, Observatorio Astronómico, Paseo del Bosque, B1900FWA, La Plata, , Buenos Aires, Argentina d Consejo Nacional de Investigaciones Cientı́ficas y Técnicas (CONICET), Godoy Cruz 2290, Capital Federal, 1425, Buenos Aires, Argentina Abstract We present a comprehensive analysis of statistical tools for evaluating tensions in cosmological parameter estimates arising from distinct datasets. Focusing on the unresolved Hubble constant (H 0 ) tension, we explore the Pantheon Plus + SH0ES (PPS) compilation, which includes low-redshift Cepheid data from the SH0ES collaboration, and the Cosmic Chronometers (CC) dataset. Employing various tension metrics, we quantitatively assess the inconsistencies in parameter estimates, emphasizing the importance of capturing multidimensional tensions. Our results reveal substantial tension between PPS and Planck 2018 datasets. We highlight the importance of the adoption of these metrics to enhance the precision of future cosmological analyses and facilitate the resolution of existing tensions. Keywords: cosmology, statistical tools, tension metrics, Pantheon Plus + SH0ES, Cosmic Chronometers, Planck data 1. Introduction In the past twenty years, the amount and precision of cosmological data has increased significantly. As a result, stringent constraints were established for the cosmological parameters such as the baryon and dark matter density parameters, the Hubble constant, and others. On the other hand, it is well known that the predictions of the standard cosmological model are in agreement with the majority of the observations. However, there are tensions between the values of some of the cosmological parameters obtained with different datasets. These discrepancies remain an open question for cosmologists and are usually used as a motivation for studying alternative cosmological models. One of the most important unsolved issues is the socalled H 0 tension: the value of the current Hubble parameter H 0 that has been obtained using data from the Cosmic Microwave Background (CMB) assuming a standard cosmological model (Planck Collaboration et al., 2020) is not in agreement with the one inferred in a model-independent way, with data from type Ia supernovae and Cepheids (Riess et al., 2022). This issue has been extensively discussed in the literature but there is no agreement within the community about the source of the discrepancy (Freedman, 2021; Riess and Breuval, 2023; Schöneberg et al., 2022). Another issue is the one called S 8 tension, namely, the difference between the estimation of this parameter (defined as   0.5 S 8 = σ 8 Ω 3 m ) from CMB and BAO data with the one obtained from weak lensing and galaxy clustering data (Heymans Email address: mleize@df.uba.ar () Preprint submitted to Physics Letters B et al., 2021; Abbott et al., 2022). Hence, the ability to quantify differences in the estimation of cosmological parameters when different datasets are considered is essential for the success of present and future research in Cosmology. Given two posterior distributions obtained from two different datasets A and B, the most common method to study statistical tension is to evaluate the one-dimensional marginalization of the posterior distributions. A rule of thumb formula is introduced in Lemos et al. (2021) to measure the discrepancy, expressed in terms of the number of standard deviations σ, between parameter estimations θ derived from distinct datasets. The formulation is as follows: |µ A − µ B | N θ = q , σ 2 A + σ 2 B (1) where the means µ A/B and the variances σ A/B correspond to the ones of the posteriors obtained from each dataset. However, this method carries some problems. For instance, marginalization can hide tension that can only be seen in higher dimensions. This is caused by the fact that marginalization over some of the parameters necessarily implies a loss of information. Moreover, the number of dimensions of the problem also affects the inferred tension. The significance of the discrepancy in the parameter estimations from the two experiments depends on the number of shared parameters effectively constrained by both experiments. Therefore, a variety of methods have been developed to determine the consistency between the posterior distributions that are obtained from different datasets. For example, different tension metrics that quantify this problem in the December 15, 2023" 2312.08549v1,"A COLREGs-Compliant Conflict Resolution Strategy for Autonomous Surface Vehicles Raghav Thakar, Rajat Agrawal and Sujit PB Abstract— This paper presents a novel conflict resolution strategy for autonomous surface vehicles (ASVs) to safely navigate and avoid collisions in a multi-vessel environment at sea. Collisions between two or more marine vessels must be avoided by following the International Regulations for Preventing Collisions at Sea (COLREGs). We propose strategy a two-phase strategy called as COLREGs Compliant Conflict- Resolving (COMCORE) strategy, that generates collision-free trajectories for ASVs while complying with COLREGs. In phase-1, a shortest path for each agent is determined, while in phase-2 conflicts are detected and resolved by modifying the path in compliance with COLREGs. COMCORE solution optimises vessel trajectories for lower costs while also providing a safe and collision-free plan for each vessel. Simulation results are presented to show the applicability of COMCORE for larger number agents with very low computational requirement and hence scalable. Further, we experimentally demonstrate COMCORE for two ASVs in a lake to show its ability to determine solution and implementation capability in the realworld. I. INTRODUCTION The applications of Autonomous Surface Vehicles (ASVs) in the maritime domain are increasing day by day. These ASVs need to operate with other vessels that are manually driven. Thus, the ship captain/helmsman of the boat anticipates that the ASV to follow the very rules that other marine vessels follow to avoid collisions. Therefore, there is a need to develop collision avoidance algorithms for ASVs that adhere to the rules prescribed in International Regulations for Preventing Collisions at Sea (COLREGs). There are several collision avoidance approaches developed in the literature, like velocity obstacles based methods[1], [2], potential field based methods [3], [4], navigation function method [5], vector field-based methods [6], control based frameworks [7], [8], and geometry-based frameworks [9]. These approaches are not directly applicable for the marine vessels as they interact with manned marine vehicles and hence are required to meet deterministic behaviours by satisfying the COLREGs rules. Some of the above approaches have been modified to meet the COLREGs requirement. A survey of collision avoidance approaches for ASVs is given in [10]. We review some of the works that are closely related to our work where we would like to develop a collision avoidance system for This work is partially supported by the SERB CORE Grant CRG/2021/007916. Raghav Thakar is an undergraduate student at Manipal Institute of Technology, Manipal, Karnataka. Email: raghav.thakar@learner.manipal.edu Rajat Agrawal and P.B. Sujit are with the Department of Electrical Engineering and Computer Science at IISER Bhopal, Bhopal–462066, India. Email: (arajat,sujit)@iiserb.ac.in. ASVs while satisfying COLREGs requirements. In [11], an RRT-based approach with global and local optimisation techniques to generate feasible solutions is used. The paths generated by RRT can be highly sub-optimal. In [12], a model predictive control approach is developed such that only certain half-spaces are active for the MPC control evaluation. The MPC optimizes the control and deviation from the desired trajectory and hence its performance is better than the RRT approach. However, the MPC approach can become computationally heavy and requires model of the other vehicles. In [13], [14], the reciprocal velocity obstacle method [1] is modified to meet the COLREGs requirements. This approach is a reactive which may make the vehicle deviate more than required. The collision between two vessels occur when they are unable to resolve the conflict in their paths. We can think of collision avoidance as conflict-resolution, where the resolution is to find alternative paths for either a single vessel or for both the vessels. The conflict-resolution between two vessels then can be extended to multiple vessels by taking a pair of vessels at a time. In this paper, we propose to develop a collision avoidance and conflict resolution method influenced by search-based planning [15] approach but are not COL- REGs complaint. The main contributions of this paper are (i) to develop a novel COLREGs compliant conflict resolution strategy (COMCORE) for collision avoidance (ii) Evaluate the approach on larger of vessels and shows it scalability properties and (iii) experimentally validate COMCORE on ASVs in a lake. II. COLREG S -C OMPLIANT C OLLISION A VOIDANCE R ULES The guidelines outlined by COLREGs are spread across 41 rules. In this paper, we focus on Section II, Rules 8 and 13-17 of COLREGs, that occur the most in the maritime scenarios. These rules specify how to identify possible collision scenarios, and the actions to be taken by the involved vessels [11]. We define the following two collision situations that occur in the waters: Definition 1 (Head-On): The vessels are meeting on a reciprocal or near-reciprocal course with a risk of collision. The vessel headings angle are opposite to each other. Definition 2 (Crossing): The vessels are crossing so as to involve a risk of collision. In this scenario, the heading angle of the vessels are orthogonal. The action taken by both vessels is identical in Head-On situations. However, in Crossing situations, each of the two" 2312.08556v1,"Capacity planning of renewable energy systems using stochastic dual dynamic programming J. Hole a,b,c,∗ , A.B. Philpott a , O. Dowson a a Electric Power Optimization Centre, University of Auckland, New Zealand b Norwegian University of Science and Technology, Norway c Norwegian Water Resources and Energy Directorate, Norway Abstract We present a capacity expansion model for deciding the new electricity generation and trans- mission capacity to complement an existing hydroelectric reservoir system. The objective is to meet a forecast demand at least expected cost, namely the capital cost of the investment plus the expected discounted operating cost of the system. The optimal operating policy for any level of capacity investment can be computed using stochastic dual dynamic programming. We show how to combine a multistage stochastic operational model of the hydro system with a capacity expansion model to create a single model that can be solved by existing open-source solvers for multistage stochastic programs without the need for customized decomposition algorithms. We illustrate our method by applying it to a model of the New Zealand electricity system and comparing the solutions obtained with those found in a previous study. Keywords: OR in energy; stochastic dual dynamic programming; capacity expansion; multistage stochastic programming ∗ Corresponding author Email address: jarand.hole@ntnu.no (J. Hole) Preprint submitted to arXiv December 15, 2023" 2312.08561v1,"A data-driven approach for modeling large-amplitude aeroelastic oscillations of pitching wings Yuanhang Zhu a,1,∗ , Kenneth Breuer a a Center for Fluid Mechanics, School of Engineering, Brown University, Providence, RI, 02912, USA Abstract We propose and validate a data-driven approach for modeling large-amplitude flow-induced oscillations of elastically mounted pitching wings. We first train a neural networks regression model for the nonlinear aerodynamic moment using data obtained from purely prescribed oscillations and static measurements. We then embed this model into an ordinary differential equation solver to solve for the governing equation of the passive aeroelastic system with desired structural parameters. The system dynamics predicted by the proposed data-driven method are characterized and compared with those obtained from physical experiments. The predicted and experimental pitching amplitude, frequency and aerodynamic moment responses are found to be in excellent agreement. Both the structural mode of high-inertia wings and the hydrodynamic mode of lowinertia wings are successfully predicted. The transient growth and saturation of the oscillation amplitude and the aerodynamic moment are also faithfully captured by the proposed method. Additional test cases demonstrate the broad applicability of this approach. Keywords: Fluid-Structure Interaction, Aeroelasticity, Unsteady Aerodynamics, Neural Networks, Machine Learning 1. Introduction The interactions between free-stream flows and elastically supported structures can lead to large-amplitude self-sustained oscillations, such as vortex-induced vibrations of cylinders (Williamson and Govardhan, 2004; Gabbai and Benaroya, 2005; Williamson and Govardhan, 2008) and aeroelastic instabilities of airfoils (Dowell et al., 1989; Dowell and Hall, 2001; Dowell et al., 2003; Dimitriadis and Li, 2009; Dimitriadis, 2017). These flow-induced oscillations can pose severe risks, potentially leading to structural failure in extreme conditions (Larsen, 1998), but they also present opportunities for hydrokinetic energy harvesting from river or tidal flows (Xiao and Zhu, ∗ Corresponding author Email address: yuanhang_zhu@alumni.brown.edu (Yuanhang Zhu) 1 Present address: Department of Mechanical and Aerospace Engineering, University of Virginia, Charlottesville, VA 22904, USA Preprint submitted to Elsevier December 15, 2023" 2312.08566v1,"Preprint. Under review as a conference paper at ICLR 2024. L EARNING ADAPTIVE PLANNING REPRESENTATIONS WITH NATURAL LANGUAGE GUIDANCE Lionel Wong 1∗ Jiayuan Mao 1* Pratyusha Sharma 1* Zachary S. Siegel 2 Noa Korneev 4 Joshua B. Tenenbaum 1 Jacob Andreas 1 1 MIT 2 Princeton University 3 UC Berkeley 4 Microsoft Jiahai Feng 3 A BSTRACT Effective planning in the real world requires not only world knowledge, but the ability to leverage that knowledge to build the right representation of the task at hand. Decades of hierarchical planning techniques have used domain-specific temporal action abstractions to support efficient and accurate planning, almost always relying on human priors and domain knowledge to decompose hard tasks into smaller subproblems appropriate for a goal or set of goals. This paper describes Ada (Action Domain Acquisition), a framework for automatically constructing task-specific planning representations using task-general background knowledge from language models (LMs). Starting with a general-purpose hierarchical planner and a low-level goal-conditioned policy, Ada interactively learns a library of planner-compatible high-level action abstractions and low-level controllers adapted to a particular domain of planning tasks. On two language-guided interactive planning benchmarks (Mini Minecraft and ALFRED Household Tasks), Ada strongly outperforms other approaches that use LMs for sequential decisionmaking, offering more accurate plans and better generalization to complex tasks. 1 I NTRODUCTION People make complex plans over long timescales, flexibly adapting what we know about the world in general to govern how we act in specific situations. To make breakfast in the morning, we might convert a broad knowledge of cooking and kitchens into tens of fine-grained motor actions in order to find, crack, and fry a specific egg; to achieve a complex research objective, we might plan a routine over days or weeks that begins with the low-level actions necessary to ride the subway to work. The problem of adapting general world knowledge to support flexible long-term planning is one of the unifying challenges of AI. While decades of research have developed representations and algorithms for solving restricted and shorter-term planning problems, generalized and long-horizon planning remains a core, outstanding challenge for essentially all AI paradigms, including classical symbolic planning (Erol et al., 1994), reinforcement learning (Sutton et al., 1999), and modern generative AI (Wang et al., 2023a). How do humans solve this computational challenge? A growing body of work in cognitive science suggests that people come up with hierarchical, problem-specific representations of their actions and environment to suit their goals, tailoring how they represent, remember, and reason about the world to plan efficiently for a particular set of tasks (e.g., Ho et al., 2022). In AI, a large body of work has studied hierarchical planning using domain-specific temporal abstractions—progressively decomposing high-level goals into sequences abstract actions that eventually bottom out in low-level control. An extensive body of work has explored how to plan using these hierarchical action spaces, including robotic task-and-motion planning (TAMP) systems (Garrett et al., 2021) and hierarchical RL frameworks (Sutton et al., 1999). However, identifying a set of abstract actions that are relevant and useful for achieving any given set of goals remains the central bottleneck in general hierarchical planning. Intuitively, “useful” high-level actions must satisfy many different criteria: they should enable time-efficient high-level planning, correspond feasible low-level action sequences, and compose and generalize to new tasks. ∗ Asterisk indicates equal contribution. Correspondence to zyzzyva@mit.edu. Code for this paper will be released upon publication. 1" 2312.08568v1,"NViST: In the Wild New View Synthesis from a Single Image with Transformers Wonbong Jang Lourdes Agapito Department of Computer Science, University College London {ucabwja,l.agapito}@ucl.ac.uk Figure 1. We introduce NViST, a transformer-based architecture that enables synthesis from novel viewpoints given a single in the wild input image. We test our model not only on held-out scenes of MVImgNet, a large-scale dataset of casually captured videos of hundreds of object categories (Right) but also on out-of-distribution challenging phone-captured scenes (Left). Abstract dataset of real-world, casually-captured videos containing hundreds of object categories with diverse backgrounds. Secondly, our model does not require canonicalization of the training data – i.e. aligning all objects with a frontal view – only needing relative pose at training time which removes a substantial barrier to it being used on casually captured datasets. We show results on unseen objects and categories on MVImgNet and even casual phone captures. We conduct qualitative and quantitative evaluations on MVImgNet and ShapeNet to show that our model represents a step forward towards enabling true in-the-wild novelview synthesis from a single image. The project webpage is https://wbjang.github.io/nvist_webpage. We propose NViST, a transformer-based model for novelview synthesis from a single image, trained on a largescale dataset of in-the-wild images with complex backgrounds. NViST transforms image inputs directly into a radiance field, adopting a scalable transformer-based architecture. In practice, NViST exploits the self-supervised features learnt by a masked autoencoder (MAE), and learns a novel decoder that translates features to 3D tokens via cross-attention and adaptive layer normalization. Our model is efficient at inference since only a single forwardpass is needed to predict a 3D representation, unlike methods that require test-time optimization or sampling multiple times such as 3D-aware diffusion models. We tackle further limitations of current new-view synthesis models. First, unlike most generative models that are trained in a categoryspecific manner, often on synthetic datasets or on masked inputs, our model is trained on MVImgNet, a large-scale 1. Introduction Learning 3D scene representations from RGB images for novel view synthesis or 3D modelling remains a pivotal 1" 2312.08571v1,"PhasePerturbation: Speech Data Augmentation via Phase Perturbation for Automatic Speech Recognition Chengxi Lei ∗ Satwinder Singh † Feng Hou c.lei@massey.ac.nz School of Artificial Intelligence, Dalian Maritime University, China s.singh4@massey.ac.nz School of Mathematical and Computational Sciences, Massey University, New Zealand f.hou@massey.ac.nz School of Mathematical and Computational Sciences, Massey University, New Zealand Xiaoyun Jia Ruili Wang ∗† dr.sophiajia@outlook.com Institute of Governance & School of Political Science and Public Administration, Shandong University, China ruili.wang@massey.ac.nz School of Artificial Intelligence, Dalian Maritime University, China ABSTRACT Most of the current speech data augmentation methods operate on either the raw waveform or the amplitude spectrum of speech. In this paper, we propose a novel speech data augmentation method called PhasePerturbation that operates dynamically on the phase spectrum of speech. Instead of statically rotating a phase by a constant degree, PhasePerturbation utilizes three dynamic phase spectrum operations, i.e., a randomization operation, a frequency masking operation, and a temporal masking operation, to enhance the diversity of speech data. We conduct experiments on wav2vec2.0 pre-trained ASR models by fine-tuning them with the PhasePerturbation augmented TIMIT corpus. The experimental results demonstrate 10.9% relative reduction in the word error rate (WER) compared with the baseline model fine-tuned without any augmentation operation. Furthermore, the proposed method achieves additional improvements (12.9% and 15.9%) in WER by complementing the Vocal Tract Length Perturbation (VTLP) and the SpecAug, which are both amplitude spectrum-based augmentation methods. The results highlight the capability of PhasePerturbation to improve the current amplitude spectrum-based augmentation methods. KEYWORDS speech recognition, data augmentation, phase spectrum augmentation ∗ Chengxi Lei and Ruili Wang are also affiliated to School of Mathematical and Compu- tational Sciences, Massey University, New Zealand. † Corresponding authors: Satwinder Singh and Ruili Wang Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MMAsia ’23 Workshops, December 6–8, 2023, Tainan, Taiwan © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0326-3/23/12. . . $15.00 https://doi.org/10.1145/3611380.3628555 ACM Reference Format: Chengxi Lei, Satwinder Singh, Feng Hou, Xiaoyun Jia, and Ruili Wang. 2023. PhasePerturbation: Speech Data Augmentation via Phase Perturbation for Automatic Speech Recognition. In ACM Multimedia Asia Workshops (MMAsia ’23 Workshops), December 6–8, 2023, Tainan, Taiwan. ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/3611380.3628555 1 INTRODUCTION Deep learning has demonstrated remarkable effectiveness in the field of Automatic Speech Recognition (ASR) [8]. Extensive research efforts have been devoted to improving ASR model network architectures, leading to significant progress [5, 6, 9, 23, 28]. These ASR models often require extensive volumes of training data. However, over 80% of languages are categorized as low-resource languages, lacking such an amount of labeled data [4, 24]. To address this issue, data augmentation methods are used to generate synthetic speech data. There are mainly two approaches for data augmentation for ASR: (i) Manipulating raw waveforms to synthesize new data, such as introducing noise into clean audio to create noisy samples [7, 14, 21]; (ii) Applying data augmentation directly to Melspectrum, which is an amplitude spectrum. These Mel-spectrum based methods treat the amplitude spectrum as an image and use the corresponding data augmentation approaches [2, 10, 15, 16, 18, 25– 27, 29, 30]. Lately, there has been a growing interest in utilizing phase information to improve Generative Adversarial Network (GAN)-based vocoders used in speech synthesis. Morrison et al. [19] have shown that vocoder generators could reliably rebuild signal phases from the Mel-spectrum, even without the initial phase. PhaseAug [17] was proposed to address the overfitting of the discriminator. The proposed approach rotated the phase in the frequency domain to simulate one-to-many mapping. Intuitively, it is valuable to investigate speech data augmentation techniques applied to the phase spectrum of speech data, given the recent success in effectively utilizing phase information in voc-oders. Thus, in this paper, we propose a novel speech data" 2312.08572v1,"Under consideration for publication in J. Plasma Phys. 1 Quasisymmetric high-beta 3D MHD equilibria near axisymmetry Wrick Sengupta 1,2 †, Nikita Nikulsin 1,2 , Rahul Gaur 3 , Amitava Bhattacharjee 1,2 1 Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08543, USA 2 3 Princeton Plasma Physics Laboratory, Princeton, NJ, 08540, USA Department of Mechanical and Aerospace Engineering, Princeton University, Princeton, NJ 08544, USA (Received xx; revised xx; accepted xx) Quasisymmetry (QS), a hidden symmetry of the magnetic field strength, is known to support nested flux surfaces and provide superior particle confinement in stellarators. In this work, we study the ideal MHD equilibrium and stability of high-beta plasma in a large aspect-ratio stellarator. In particular, we show that the lowest-order description of a near-axisymmetric equilibrium vastly simplifies the problem of 3D quasisymmetric MHD equilibria, which can be reduced to a standard elliptic Grad-Shafranov equation for the flux function. We show that any large aspect-ratio tokamak, deformed periodically in the vertical direction, is a stellarator with approximate volumetric QS. We discuss exact analytical solutions and numerical benchmarks. Finally, we discuss the ideal ballooning and interchange stability of some of our equilibrium configurations. 1. Introduction An essential requirement of magnetic confinement is that the plasma must be in a stable magnetohydrodynamic (MHD) equilibrium. Since the confining magnetic field in a stellarator is mainly produced by external current-carrying coils or magnets, it does not suffer from the current-driven instabilities intrinsic to tokamaks. However, the lack of continuous symmetry in a stellarator can lead to a breakdown of nested flux surfaces and the formation of island chains and ergodic field line regions. Without symmetry, the trapped particles can drift out radially and be lost. Both of these effects are severely detrimental to confinement. Furthermore, the lack of symmetry and the nonlinear nature of ideal MHD equations seriously complicate our understanding of stellarator equilibrium. Consequently, compared to tokamaks, MHD equilibrium theory for generic stellarators still has major unanswered questions. A hidden symmetry of the magnetic field strength, called quasisymmetry (QS), can ameliorate some of the difficulties mentioned above. While the magnetic field remains fully three-dimensional (3D), exact QS leads to nested flux surfaces (Burby et al. (2020), Rodrı́guez et al. (2020)). Moreover, the continuous symmetry leads to a conserved canonical angular momentum (due to Noether’s theorem), ensuring particle confinement of the same quality as that of a tokamak. Indeed, one of the benefits of understanding † Email address for correspondence: wsengupta@princeton.edu" 2312.08573v1,"Probably approximately correct stability of allocations in uncertain coalitional games with private sampling George Pantazis G . PANTAZIS @ TUDELFT . NL Delft Center for Systems and Control, TU Delft, The Netherlands Filiberto Fele FFELE @ US . ES Department of Systems Engineering and Automation, University of Seville, Spain Filippo Fabiani FILIPPO . FABIANI @ IMTLUCCA . IT IMT School for Advanced Studies Lucca, Italy Sergio Grammatico S . GRAMMATICO @ TUDELFT . NL Delft Center for Systems and Control, TU Delft, The Netherlands Kostas Margellos KOSTAS . MARGELLOS @ ENG . OX . AC . UK Department of Engineering Science, University of Oxford, UK Abstract We study coalitional games with exogenous uncertainty in the coalition value, in which each agent is allowed to have private samples of the uncertainty. As a consequence, the agents may have a different perception of stability of the grand coalition. In this context, we propose a novel methodology to study the out-of-sample coalitional rationality of allocations in the set of stable allocations (i.e., the core). Our analysis builds on the framework of probably approximately correct learning. Initially, we state a priori and a posteriori guarantees for the entire core. Furthermore, we provide a distributed algorithm to compute a compression set that determines the generalization properties of the a posteriori statements. We then refine our probabilistic robustness bounds by specialising the analysis to a single payoff allocation, taking, also in this case, both a priori and a posteriori approaches. Finally, we consider a relaxed ζ -core to include nearby allocations and also address the case of empty core. For this case, probabilistic statements are given on the eventual stability of allocations in the ζ -core. Keywords: Uncertain coalitional games; Statistical learning; Data privacy 1. Introduction Multi-agent systems are pervasive across various fields, including engineering (Raja and Grammatico, 2021; Karaca and Kamgarpour, 2020; Han et al., 2019; Fele et al., 2017, 2018), economics, and social sciences (McCain, 2008). Even though agents often behave as self-interested entities, their limited ability to improve their utility can, in certain scenarios, motivate them to form coalitions to achieve a higher individual payoff. This situation can be modelled through coalitional games (Chalkiadakis et al., 2011). As each agent’s participation in a coalition is subject to their own payoff being maximised, a question emerges about how to allocate the total value of the coalition such that no agent deviates from it. This problem is known as stability of agents’ allocations. In real-world scenarios, the value of a coalition is typically affected by uncertainty. The consideration of uncertainty in the coalitional values of a game finds its roots in seminal works such as Charnes and Granot (1976, 1977, 1973), which provided solution concepts to yield stable allocations against uncertainty. Suijs et al. (1999) discussed non-emptiness of the core for a particular class of stochastic games. Chalkiadakis and Boutilier (2004) and Ieong and Shoham (2008)" 2312.08603v1,"NEXT-TDNN: MODERNIZING MULTI-SCALE TEMPORAL CONVOLUTION BACKBONE FOR SPEAKER VERIFICATION Hyun-Jun Heo 1,* , Ui-Hyeop Shin 1,* , Ran Lee 2 , YoungJu Cheon 2 , Hyung-Min Park 1,† 1 Department of Electronic Engineering, Sogang University, Seoul, Republic of Korea 2 Hyundai Motor Company, Seoul, Republic of Korea ABSTRACT In speaker verification, ECAPA-TDNN has shown remarkable improvement by utilizing one-dimensional(1D) Res2Net block and squeeze-and-excitation(SE) module, along with multi-layer feature aggregation (MFA). Meanwhile, in vision tasks, ConvNet structures have been modernized by referring to Transformer, resulting in improved performance. In this paper, we present an improved block design for TDNN in speaker verification. Inspired by recent ConvNet structures, we replace the SE-Res2Net block in ECAPA-TDNN with a novel 1D two-step multi-scale ConvNeXt block, which we call TS-ConvNeXt. The TS-ConvNeXt block is constructed using two separated sub-modules: a temporal multi-scale convolution (MSC) and a frame-wise feed-forward network (FFN). This two-step design allows for flexible capturing of inter-frame and intra-frame contexts. Additionally, we introduce global response normalization (GRN) for the FFN modules to enable more selective feature propagation, similar to the SE module in ECAPA-TDNN. Experimental results demonstrate that NeXt-TDNN, with a modernized backbone block, significantly improved performance in speaker verification tasks while reducing parameter size and inference time. We have released our code 1 for future studies. Index Terms— speaker recognition, speaker verification, TDNN, ConvNeXt, multi-scale 1. INTRODUCTION With the rise of deep neural networks, the conventional human-crafted embedding feature vector for speaker identity (i-vector) [1] was rapidly replaced with the DNN-based vector (d-vector) [2] in speaker verification. In particular, x-vector [3] has shown significantly improved performance through the use of time delay neural network (TDNN), and its various improvements have been studied [4, 5]. More recently, ECAPA-TDNN [6] has been proposed, which improved the TDNN architecture and achieved state-of-the-art This work was supported by Hyundai Motors Co. *Equal contribution. †Corresponding author: hpark@sogang.ac.kr. 1 https://github.com/dmlguq456/NeXt_TDNN_ASV 𝐶𝐶 mel × 𝑇𝑇 𝐶𝐶 × 𝑇𝑇 Conv1D (𝑘𝑘 = 4), C 𝐅𝐅 (0) LN 1D TS-ConvNeXt Stage 1 𝐶𝐶 × 𝑇𝑇 𝐅𝐅 (1) 1D TS-ConvNeXt Stage 2 𝐶𝐶 × 𝑇𝑇 𝐅𝐅 (2) 1D TS-ConvNeXt Stage 3 𝐶𝐶 × 𝑇𝑇 𝐅𝐅 (3) 𝐶𝐶 MFA × 𝑇𝑇 𝐇𝐇 192 × 1 𝐱𝐱 MFA LN ASP 2𝐶𝐶 MFA × 1 𝝁𝝁, 𝝈𝝈 Linear MSC 𝐶𝐶 × 𝑇𝑇 𝐶𝐶 × 𝑇𝑇 𝑠𝑠 Parallel 𝐶𝐶 × 𝑇𝑇 PConv1D, C′ 𝑠𝑠 Parallel DConv1D, C′ 𝑠𝑠⋅𝐶𝐶′×𝑇𝑇 GELU PConv1D, C FFN 𝐶𝐶 × 𝑇𝑇 LN PConv1D, 4C 4𝐶𝐶 × 𝑇𝑇 GELU, GRN PConv1D, C 𝐶𝐶 × 𝑇𝑇 ×B Fig. 1: Block diagram for the proposed NeXt-TDNN architecture. performance. To capture the spectral structure in multi-scales, it utilized Res2Net [7] with one-dimensional(1D) convolution as backbone layers. Additionally, squeeze-and-excitation(SE) blocks [8] were used for feature gating across the global temporal contexts. Finally, it introduced a multi-layer feature aggregation (MFA) structure for utilizing shallow-layer features before temporal pooling. Therefore, ECAPA-TDNN has become a standard model for speaker verification tasks and been used as a base model in mainstream works [9, 10, 11]. However, speech can be also regarded as spectral twodimensional(2D) visual features. Therefore, for extracting a speaker embedding vector, a simple 2D ResNet-based architecture [12] has been often used, which also exhibited stable results for speaker verification [13, 14, 15, 16]. In traditional vision tasks, on the other hand, ConvNets including the conventional ResNet structure have been repeatedly improved and modernized after the advent of the vision Transformer [17]. ConvNeXt [18] is one of those improvements, which refers to the architecture of the Transformer. In the following study, ConvNeXt-V2 [19] was presented with global response normalization (GRN), which emphasized the channel dimension in spatially global contexts. In this paper, we present a modernized backbone block for TDNN inspired by the recent ConvNeXt structure. As shown in Fig. 1, we have re-designed the ConvNeXt block to be a" 2312.08605v1,"Markov-bridge generation of transition paths and its application to cell-fate choice Guillaume Le Treut, 1, ∗ Sarah Ancheta, 1 Greg Huber, 1, † Henri Orland, 2 and David Yllanes 1, 3 1 Chan Zuckerberg Biohub—SF, 499 Illinois Street, San Francisco, CA 94158, USA 2 Institut de Physique Théorique, CEA, CNRS, Université Paris-Saclay, 91191 Gif-sur-Yvette, France 3 Instituto de Biocomputación y Fı́sica de Sistemas Complejos (BIFI), 50018 Zaragoza, Spain (Dated: December 15, 2023) We present a method to sample Markov-chain trajectories constrained to both the initial and final conditions, which we term Markov bridges. The trajectories are conditioned to end in a specific state at a given time. We derive the master equation for Markov bridges, which exhibits the original transition rates scaled by a timedependent factor. Trajectories can then be generated using a refined version of the Gillespie algorithm. We illustrate the benefits of our method by sampling trajectories in the Müller-Brown potential. This allows us to generate transition paths which would otherwise be obtained at a high computational cost with standard Kinetic Monte Carlo methods because commitment to a transition path is essentially a rare event. We then apply our method to a single-cell RNA sequencing dataset from mouse pancreatic cells to investigate the cell differentiation pathways of endocrine-cell precursors. By sampling Markov bridges for a specific differentiation pathway we obtain a time-resolved dynamics that can reveal features such as cell types which behave as bottlenecks. The ensemble of trajectories also gives information about the fluctuations around the most likely path. For example, we quantify the statistical weights of different branches in the differentiation pathway to alpha cells. I. INTRODUCTION In a world where computational capabilities are continually expanding, stochastic simulations have become indispensable tools, shedding light on myriad phenomena across physics, chemistry, and biology. These simulations are crucial for exploring processes such as the spontaneous folding and unfolding of proteins [1], allosteric transitions [2], glassy dynamics [3, 4], the binding of molecules [5], and more generally for computing physical observables of complex systems [6]. However, sampling realizations of stochastic processes is fraught with challenges, particularly when it involves trajectories that explore rare states. For instance, in protein folding, although the total folding time may be of the order of seconds, the time during which the system effectively jumps from an unfolded state to the folded state can be of the order of microseconds [7]. This most interesting part of the trajectory, during which the system effectively evolves from an unfolded state to the folded state, is called the transition path. More precisely, while the typical time between folding-unfolding events is given by the Kramers time [8], which is exponential in the barrier height (also known as activation energy), the duration of the folding process, denoted as the transition-path time (TPT), is logarithmic in the barrier height [9, 10]. This implies that the majority of a simulation is spent waiting for the rare event of interest to occur and that, to observe a transition, one might need to run extensive simulations, making the task daunting and resource intensive. Langevin bridges have been proposed as an elegant solution to address such challenges in the case of stochastic processes ∗ To whom correspondence should be addressed: guillaume.letreut@gmail.com † To whom correspondence should be addressed: gerghuber@gmail.com of a continuous variable [11–14]. They deal with the problem of sampling the stochastic trajectories of a system, which starts in a certain known configuration at the initial time and transitions to a known final state (or family of final states) in a given time 𝑡 f . The goal is to sample many such transition trajectories [15, 16], as they allow for the exploration of the dynamics of the system during the TPT, enabling the monitoring of large conformational changes undergone by the system. This is crucial for a microscopic determination of the transition states and the barrier height of the transition, knowledge pivotal for applications such as drug design, where modifying the barrier height or blocking the transition by binding to the transition state is of paramount importance [17–19]. In this article, we consider the counterpart of Langevin bridges for stochastic processes of a discrete variable, namely Markov bridges. While Langevin bridges are derived from a Fokker-Planck equation and, therefore, require that a force field be given, we derive Markov bridges from a master equation, which requires that transition rates between discrete states be given. The main difficulty in the practical implementation of this method resides in the efficient evaluation of a matrix exponential. Yet we will show through several examples that this is hardly a problem for most applications. In particular, in the context of developmental biology, we will use Markov bridges to investigate the dynamics of cell differentiation. A longstanding challenge in developmental biology is to reconstruct the temporal sequence of cell differentiation (i.e., cell fate), to understand commitment to competing cell types, and to understand how robust differentiation pathways are to fluctuations. Such questions have traditionally been studied experimentally with spatio-temporal microscopy data [20, 21], but in recent years single-cell RNA sequencing (scRNA-seq) has emerged as a pivotal technique giving molecular information [21] about cell differentiation. The meticulous examination of RNA abundance within individual cells has yielded insight into the diversity of cell states in a sample with remark-" 2312.08606v1,"VQCNIR: Clearer Night Image Restoration with Vector-Quantized Codebook Wenbin Zou†, 1 Hongxia Gao†, 1,2 * Tian Ye, 3 Liang Chen, 4 Weipeng Yang, 1 Shasha Huang, 1 Hongshen Chen, 1 Sixiang Chen 3 1 The School of Automation Science and Engineering, South China University of Technology, 2 Research Center for Brain-Computer Interface, Pazhou Laboratory, Guangzhou, 3 The Hong Kong University of Science and Technology, Guangzhou, 4 College of Photonic and Electronic Engineering, Fujian Normal University †Email: alexzou14@foxmail.com, hxgao@scut.edu.cn Abstract Night photography often struggles with challenges like low light and blurring, stemming from dark environments and prolonged exposures. Current methods either disregard priors and directly fitting end-to-end networks, leading to inconsistent illumination, or rely on unreliable handcrafted priors to constrain the network, thereby bringing the greater error to the final result. We believe in the strength of data-driven high-quality priors and strive to offer a reliable and consistent prior, circumventing the restrictions of manual priors. In this paper, we propose Clearer Night Image Restoration with Vector-Quantized Codebook (VQCNIR) to achieve remarkable and consistent restoration outcomes on real-world and synthetic benchmarks. To ensure the faithful restoration of details and illumination, we propose the incorporation of two essential modules: the Adaptive Illumination Enhancement Module (AIEM) and the Deformable Bi-directional Cross-Attention (DBCA) module. The AIEM leverages the inter-channel correlation of features to dynamically maintain illumination consistency between degraded features and high-quality codebook features. Meanwhile, the DBCA module effectively integrates texture and structural information through bi-directional cross-attention and deformable convolution, resulting in enhanced fine-grained detail and structural fidelity across parallel decoders. Extensive experiments validate the remarkable benefits of VQCNIR in enhancing image quality under low-light conditions, showcasing its state-of-the-art performance on both synthetic and real-world datasets. The code is available at https://github.com/AlexZou14/VQCNIR. 1 Introduction To obtain reliable images in night scenes, long exposure is often used to allow more available light to illuminate the image. However, images captured in this way still suffer from low visibility and color distortion issues. Moreover, long exposure is susceptible to external scene disturbances, such as camera shake and dynamic scenes, which can cause motion blur and noise in the images (2022). Therefore, night images often exhibit complex degradation problems (2022a; 2022; * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. (a) PSNR vs. LPIPS on the synthetic benchmark (b) Perceptual scores on the real-world benchmark Figure 1: Quantitative comparisons with state-of-the-art methods. (a) PSNR and LPIPS results on the LOL-Blur dataset. (b) Results for five perceptual metrics on the Real- LOL-Blur dataset. For PSNR, MUSIQ (2021), and NRQM (2017) higher is better, while lower is better for LPIPS (2018a), NIQE (2012), BRISQUE (2012), and PI (2018). 2023) such as low illumination and blur, making the recovery of high-quality images with realistic texture and normal lighting conditions extremely challenging. With the great success of deep learning methods (2022; 2023d; 2023b; 2023c; 2023; 2023a) in image restoration and video restoration, numerous deep learning-based algorithms have been proposed to tackle this challenging task. Currently, most researchers only consider the low illumination problem in night images and have proposed numerous low-light image enhancement (LLIE) methods (2017; 2018; 2019; 2020; 2021; 2019; 2021). Although these LLIE methods can produce visually pleasing results, their generalization ability is limited in real night scenes. This is mainly attributed to the fact that LLIE methods focus primarily on enhancing image luminance and reducing noise while ignoring the spatial degradation caused by blur that leads to ineffective recovery of sharp images. An intuitive idea is to combine image deblurring methods with LLIE methods to address this problem. However, most existing deblurring methods (2021; 2021; 2019; 2022; 2022b) are trained on datasets captured under normal illumination conditions, which makes them not suitable for night image deblurring. In particular, due to the poor visibility in dark regions of night images, these methods may fail to effectively capture" 2312.08607v1,"Parabolic Anderson model with rough initial condition: continuity in law of the solution Xiao Liang ∗ December, 2023 Abstract The parabolic Anderson model (PAM) is one of the most interesting and challenging SPDEs related to various physical phenomena, and can be described mathematically as a stochastic heat equation driven by linear multiplicative noise. In this paper, we consider PAM with initial condition given by a signed Borel measure on R d . The forcing term under investigation is examined in two cases: (i) the regular noise, with the spatial covariance given by the Riesz kernel of order α ∈ (0, d) in spatial dimension d ≥ 1; (ii) the rough noise, which is a fractional noise in space with Hurst index H < 1/2 and d = 1. In both cases, the noise is assumed to be colored in time and we consider a general initial condition. The objective of this article is to show that the solution is continuous in law with respect to the spatial noise parameter. The similar problem for the constant initial condition has been recently studied in [6]. MSC 2020: Primary 60H15; Secondary 60G60, 60H07 Keywords: stochastic partial differential equations, random fields, rough noise, rough initial condition 1 Introduction and Main Results In this article, we consider the following stochastic heat equation:  2   ∂u (t, x) = 1 ∂ u (t, x) + u(t, x) Ẇ (t, x), t > 0, x ∈ R d ∂t 2 ∂x 2   u(0, ·) = u (·), (1) 0 with initial condition given by a signed Borel measure u 0 on R d such that Z 2 e −a|x| |u 0 |(dx) < ∞, for all a > 0. (2) R d University of Ottawa, Department of Mathematics and Statistics, 150 Louis Pasteur Private, Ottawa, Ontario, K1G 0P8, Canada. E-mail address: tlian081@uottawa.ca ∗ 1" 2312.08611v1,"UniTeam: Open Vocabulary Mobile Manipulation Challenge Andrew Melnik Bielefeld University, Germany andrew.melnik.papers@gmail.com Leon Harz Bielefeld University, Germany Arjun PS IIIT-A, India Michael Büttner Bielefeld University, Germany mbuettner@techfak.uni-bielefeld.de Lyon Brown Bielefeld University, Germany Gaurav Kumar Yadav IIIT-A, India Rahul Kala ABV-IIIT-M, India Gora Chand Nandi IIIT-A, India Robert Haschke Bielefeld University, Germany Abstract This report introduces our UniTeam agent - an improved baseline for the Home- Robot: Open Vocabulary Mobile Manipulation challenge. The challenge poses problems of navigation in unfamiliar environments, manipulation of novel objects, and recognition of open-vocabulary object classes. This challenge aims to facilitate cross-cutting research in embodied AI using recent advances in machine learning, computer vision, natural language, and robotics. In this work, we conducted an exhaustive evaluation of the provided baseline agent; identified deficiencies in perception, navigation, and manipulation skills; and improved the baseline agent’s performance. Notably, enhancements were made in perception - minimizing misclassifications; navigation - preventing infinite loop commitments; picking - addressing failures due to changing object visibility; and placing - ensuring accurate positioning for successful object placement. 1 Baseline The challenge sets a Stretch robot [1] in simulated and real human indoor environments with the goal of moving the object from the start receptacle to the end receptacle. The receptacles, which are classes of furniture or fixtures, don’t have to be a single entity in the environment, for example if the end receptacle is ""table"", there are usually multiple tables in the apartment of which any of them is correct. The HomeRobot Framework [2] includes two primary baseline approaches: a heuristic baseline utilizing well-established motion planning techniques alongside simple rules for executing grasping and manipulation actions; and an reinforcement learning baseline, where exploration and manipulation skills are acquired using the off-the-shelf policy learning algorithm DD-PPO [3]. In this work, we will discuss the heuristic baseline and our improvements on it. The baseline agent’s capabilities are divided into the following key skills: 1. Detection: object detection and segmentation on the agent’s camera RGBD images. Building Bird’s Eye View (BEV) map with semantic areas. 2. Exploration: Exploring the environment to find start_receptacles and end_receptacle. Exploring start_receptacles to find the object. 3. Navigation: Move towards the specified navigation goal: the object, start- or end receptacle. 37th Conference on Neural Information Processing Systems (NeurIPS 2023) Competition Track." 2312.08613v1,"Femtosecond atomic-scale X-ray photon correlation spectroscopy enables direct probing of relaxation dynamics in fragile liquid Tomoki Fujita 1 , Yanwen Sun 2∗ , Haoyuan Li 2 , Thies J. Albert 3 , Sanghoon Song 2 , Takahiro Sato 2 , Jens Moesgaard 1 , Antoine Cornet 4 , Peihao Sun 5 , Ying Chen 2 , Mianzhen Mo 2 , Narges Amini 1 , Fan Yang 6 , Arune Makareviciute 1 , Garrett Coleman 7 , Pierre Lucas 7 , Jan Peter Embs 8 , Michael Sprung 9 , Vincent Esposito 2 , Joan Vila-Comamala 8 , Nan Wang 2 ,Talgat Mamyrbayev 8 , Christian David 8 , Peter Zalden 10 , Jerome Hastings 2 , Beatrice Ruta 4 , Paul Fuoss 2 , Klaus Sokolowski-Tinten 3 , Diling Zhu 2 , Shuai Wei 1,11∗ 1 Department of Chemistry, Aarhus University, 8000 Aarhus, Denmark 2 Linac Coherent Light Source, SLAC National Accelerator Laboratory, Menlo Park, CA 94025, USA 3 Faculty of Physics and Center for Nanointegration Duisburg-Essen (CENIDE), University of Duisburg-Essen, Lotharstrasse 1, 47048 Duisburg, Germany 4 Institut Néel, CNRS, 38042 Grenoble, France 5 Department of Physics, Università degli Studi di Padova, 35122 Padova, Italy 6 Institute of Materials Physics, Deutsches Zentrum für Luft- und Raumfahrt (DLR), Köln, Germany 7 Department of Materials Science and Engineering, University of Arizona, Tucson AZ 85721, USA 8 Paul Scherrer Institut, 5232 Villigen PSI, Switzerland 9 Deutsches Elektronen-Synchrotron DESY, 22607 Hamburg, Germany 10 European XFEL, 22869 Schenefeld, Germany 11 Centre for Integrated Materials Research, Aarhus University, 8000 Aarhus, Denmark ∗ To whom correspondence should be addressed; E-mail: yanwen@slac.stanford.edu, shuai.wei@chem.au.dk. Structural relaxations are intrinsic to all liquids and glasses. They are the fundamental processes underlying many material properties. However, the mechanism of structural relaxations is still unclear due to the experimental difficulties in directly characterizing the atomic-scale relaxations. The latter exhibit a wide range of timescales from geological times to sub-picoseconds. Here we show that, using split-delay coherent pulses from X-ray free electron 1" 2312.08616v1,"A Generalized Neural Diffusion Framework on Graphs Yibo Li 1 , Xiao Wang 2 , Hongrui Liu 3 , Chuan Shi 1 * 1 Beijing University of Posts and Telecommunications 2 Beihang University 3 Ant Group {yiboL, shichuan}@bupt.edu.cn, xiao_wang@buaa.edu.cn, liuhongrui.lhr@antgroup.com Abstract Recent studies reveal the connection between GNNs and the diffusion process, which motivates many diffusion-based GNNs to be proposed. However, since these two mechanisms are closely related, one fundamental question naturally arises: Is there a general diffusion framework that can formally unify these GNNs? The answer to this question can not only deepen our understanding of the learning process of GNNs, but also may open a new door to design a broad new class of GNNs. In this paper, we propose a general diffusion equation framework with the fidelity term, which formally establishes the relationship between the diffusion process with more GNNs. Meanwhile, with this framework, we identify one characteristic of graph diffusion networks, i.e., the current neural diffusion process only corresponds to the first-order diffusion equation. However, by an experimental investigation, we show that the labels of high-order neighbors actually exhibit monophily property, which induces the similarity based on labels among high-order neighbors without requiring the similarity among first-order neighbors. This discovery motives to design a new high-order neighbor-aware diffusion equation, and derive a new type of graph diffusion network (HiD-Net) based on the framework. With the high-order diffusion equation, HiD-Net is more robust against attacks and works on both homophily and heterophily graphs. We not only theoretically analyze the relation between HiD-Net with high-order random walk, but also provide a theoretical convergence guarantee. Extensive experimental results well demonstrate the effectiveness of HiD-Net over state-of-the-art graph diffusion networks. Introduction Graphs, such as traffic networks, social networks, citation networks, and molecular networks, are ubiquitous in the real world. Recently, Graph Neural Networks (GNNs), which are able to effectively learn the node representations based on the message-passing manner, have shown great popularity in tackling graph analytics problems. So far, GNNs have significantly promoted the development of graph analysis towards real-world applications. e.g, node classifification (Abu-El- Haija et al. 2019; Wu, He, and Xu 2019), link prediction (Kipf and Welling 2016b; You, Ying, and Leskovec 2019), * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. subgraph isomorphism counting (Yu et al. 2023), and graph classifification (Gao and Ji 2019; Zhang et al. 2018). Some recent studies show that GNNs are in fact intimately connected to diffusion equations (Chamberlain et al. 2021; Wang et al. 2021; Thorpe et al. 2022), which can be considered as information diffusion on graphs. Diffusion equation interprets GNNs from a continuous perspective (Chamberlain et al. 2021) and provides new insights to understand existing GNN architectures, which motives some diffusion-based GNNs. For instance, (Wang et al. 2021) proposes continuous graph diffusion. (Thorpe et al. 2022) utilizes the diffusion process to handle oversmoothing issue. (Song et al. 2022) considers a graph as a discretization of a Riemannian manifold and studies the robustness of the information propagation process on graphs. Diffusion equation can also build a bridge between traditional GNNs and control theory (Zang and Wang 2020). Although the diffusion process and graph convolution are closely related, little effort has been made to answer: Is there a unified diffusion equation framework to formally unify the current GNN architectures? A well-informed answer can deepen our understanding of the learning mechanism of GNNs, and may inspire to design a broad new class of GNNs based on diffusion equation. Actually, (Chamberlain et al. 2021) has explained GCN (Kipf and Welling 2016a) and GAT (Veličković et al. 2017) from diffusion equation. However, with more proposed GNN architectures, it is highly desired to formally revisit the relation between diffusion equation and GNNs. In this paper, we discover that many GNN architectures substantially can be unified with a general diffusion equation with the fidelity term, such as GCN/SGC [22], APPNP[14], GAT [19], AMP [16], DAGNN [15]. Basically, the diffusion equation describes that the change of a node representation depends on the movement of information on graphs from one node to its neighbors, and the fidelity term constraints that the change of a node representation depends on the difference with its initial feature. Furthermore, we show that the unified diffusion framework can also be derived from an energy function, which explains the whole framework as an energy minimization process in a global view. Compared with other unified frameworks (Zhu et al. 2021; Ma et al. 2021), our framework is from the diffusion perspective, which has many advantages. For example, diffusion-based methods are able to address the common plights of graph learning models such as" 2312.08628v1,"YOLO-OB: An improved anchor-free real-time multiscale colon polyp detector in colonoscopy Xiao Yang a , Enmin Song a , Guangzhi Ma a, * , Yunfeng Zhu a , Dongming Yu a , Bowen Ding a , Xianyuan Wang b a School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, 430074, China b Intelligent Image Analysis Department, Wuhan United Imaging Healthcare Surgical Technology Co., Ltd, Wuhan, Hubei, China * Corresponding author. E-mail address: maguangzhi@hust.edu.cn Postal address: School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, 430074, China Abstract Colon cancer is expected to become the second leading cause of cancer death in the United States in 2023. Although colonoscopy is one of the most effective methods for early prevention of colon cancer, up to 30% of polyps may be missed by endoscopists, thereby increasing patients' risk of developing colon cancer. Though deep neural networks have been proven to be an effective means of enhancing the detection rate of polyps. However, the variation of polyp size brings the following problems: (1) it is difficult to design an efficient and sufficient multi-scale feature fusion structure; (2) matching polyps of different sizes with fixed-size anchor boxes is a hard challenge. These problems reduce the performance of polyp detection and also lower the model’s training and detection efficiency. To address these challenges, this paper proposes a new model called YOLO- OB. Specifically, we developed a bidirectional multiscale feature fusion structure, BiSPFPN, which could enhance the feature fusion capability across different depths of a CNN. We employed the ObjectBox detection head, which used a center-based anchor-free box regression strategy that could detect polyps of different sizes on feature maps of any scale. Experiments on the public dataset SUN and the self-collected colon polyp dataset Union demonstrated that the proposed model significantly improved various performance metrics of polyp detection, especially the recall rate. Compared to the state-of-the-art results on the public dataset SUN, the proposed method achieved a 6.73% increase on recall rate from 91.5% to 98.23%. Furthermore, our YOLO-OB was able to achieve real-time polyp detection at a speed of 39 frames per second using a RTX3090 graphics card. The implementation of this paper can be found here: https://github.com/seanyan62/YOLO-OB. Keywords: Deep learning; Colonoscopy; Colorectal cancer; Polyp detection; Multi-scale detection; Anchor-free; polyp dataset SUN" 2312.08647v1,"INT-PUB-23-051 Toward A Ginsparg-Wilson Lattice Hamiltonian Michael Clancy 1, ∗ 1 Institute for Nuclear Theory, Box 351550, Seattle WA 98195-1550 To address quantum computation of quantities in quantum chromodynamics (QCD) for which chiral symmetry is important, it would be useful to have the Hamiltonian for a fermion satisfying the Ginsparg-Wilson (GW) equation. I work with an approximate solution to the GW equation which is fractional linear in time derivatives. The resulting Hamiltonian is non-local and has ghosts, but is free of doublers and has the correct continuum limit. This construction works in general odd spatial dimensions, and I provide an explicit expression for the Hamiltonian in 1 spatial dimension. I. the absence of gauge fields, can be written in momentum space as: INTRODUCTION There are a number of computations in QCD that require a good realization of chiral symmetry. These include the color-flavor-locking phase [1] and the chiral symmetry restoring phase transition [2], both of which one would hope to be able to study on the lattice. The overlap operator [3, 4] in the Euclidean Lagrangian formulation offers the ideal realization of lattice chiral symmetry in the form of Lüscher symmetry [5], a lattice symmetry which tends toward chiral symmetry in the continuum limit. However, computations using the path integral are afflicted by sign problems. A Hamiltonian approach on a quantum computer might be able to solve these issues, but there currently does not exist a Hamiltonian for GW fermions. Chiral symmetry can be expected to fail on the lattice because the lattice spacing introduces a mass scale, and masses violate chiral symmetry. This can be made more precise by the Nielsen-Ninomiya no-go theorem [6]; there is no lattice Dirac operator D in 4 spacetime dimensions which has chiral symmetry, i.e. satisfies {γ 5 , D} = 0, (1) and has other desirable features, namely the correct continuum limit, freedom from doublers, and locality [5]. Ginsparg and Wilson [7] suggested that this should be replaced by: {γ 5 , D} = aDγ 5 D, M (1 + V ) , 2 D w , V = q † D w D w 4 X µ=1 γ µ sin(p µ /M ) − 1 + (3) where M = 1/a is the inverse lattice spacing, and D w is the 4-dimensional Wilson Dirac operator, which, in µ=1 (1 − cos(p µ /M )). (4) γ 5 Dγ 5 = D † . (5) In fact, it can be quickly checked that any operator of the form D = M (1 + V ) ; 2 γ 5 V γ 5 = V † , V † V = I, (6) satisfies Eq. (2) [9]. In this case I say D is an overlap operator, though in general it may not necessarily be constructed in terms of a state overlap. Lüscher [5] first observed that this operator has the following symmetry:     1 − V 1 − V δψ = γ 5 ψ, δψ = ψ γ 5 . (7) 2 2 In the continuum limit, this becomes chiral symmetry. Lüscher noted that the Jacobian of this transformation produces the index of D, a lattice version of the Fujikawa calculation [5, 10] of the chiral anomaly. Indeed, there is a good deal of freedom in defining this Lüscher symmetry; hereafter I will refer to any symmetry δψ = Γψ, δψ = ψΓ, (8) lim Γ = lim Γ = γ 5 , (9) for which M→∞ M→∞ and whose determinant reproduces the index of D, as a Lüscher symmetry [5]. To find a Hamiltonian describing a GW fermion, one may try to compute the transfer matrix of Eq. (3) directly, but this involves square roots of the time derivative and is therefore challenging. Creutz et al. [11] considered the following construction. First, define the 3- dimensional overlap operator d = ∗ mclancy2@uw.edu 4 X This operator has the correct continuum limit, and is not hermitian, but is instead “γ 5 -hermitian”: (2) so that exact chiral symmetry fails at the order of the lattice spacing a. The first method for putting chiral fermions on the lattice involved edge states of a domain wall defect in one higher dimension [8]. Neuberger and Narayanan [3, 4] found that this system could be studied in 4 dimensions via the “overlap” operator, D = D w = i M (1 + v) , 2 d w , v = q d † w d w (10)" 2312.08648v1,"CLIP-guided Federated Learning on Heterogeneous and Long-Tailed Data ∗ Jiangming Shi 1 , Shanshan Zheng 2 , Xiangbo Yin 2 , Yang Lu 2 , Yuan Xie 3,4 , Yanyun Qu 1,2 * 3 1 Institute of Artificial Intelligence, 2 School of Informatics, Xiamen University East China Normal University, 4 Chongqing Institute of East China Normal University jiangming.shi@outlook.com, shanshanzheng@stu.xmu.edu.cn, S yinxb@163.com luyang@xmu.edu.cn, yxie@cs.ecnu.edu.cn, yyqu@xmu.edu.cn Abstract Federated learning (FL) provides a decentralized machine learning paradigm where a server collaborates with a group of clients to learn a global model without accessing the clients’ data. User heterogeneity is a significant challenge for FL, which together with the class-distribution imbalance further enhances the difficulty of FL. Great progress has been made in large vision-language models, such as Contrastive Language-Image Pre-training (CLIP), which paves a new way for image classification and object recognition. Inspired by the success of CLIP on few-shot and zero-shot learning, we use CLIP to optimize the federated learning between server and client models under its vision-language supervision. It is promising to mitigate the user heterogeneity and class-distribution balance due to the powerful cross-modality representation and rich open-vocabulary prior knowledge. In this paper, we propose the CLIP-guided FL (CLIP2FL) method on heterogeneous and long-tailed data. In CLIP2FL, the knowledge of the off-the-shelf CLIP model is transferred to the client-server models, and a bridge is built between the client and server. Specifically, for client-side learning, knowledge distillation is conducted between client models and CLIP to improve the ability of client-side feature representation. For server-side learning, in order to mitigate the heterogeneity and class-distribution imbalance, we generate federated features to retrain the server model. A prototype contrastive learning with the supervision of the text encoder of CLIP is introduced to generate federated features depending on the client-side gradients, and they are used to retrain a balanced server classifier. Extensive experimental results on several benchmarks demonstrate that CLIP2FL achieves impressive performance and effectively deals with data heterogeneity and long-tail distribution. Code is available at https://github.com/shijiangming1/CLIP2FL. Introduction With the demand for data privacy protection, federated learning (Shokri and Shmatikov 2015; Huang et al. 2023c) (FL) springs up, which only uses the local client models without their private data to train the server model, and it provides a distributed machine-learning paradigm with the communication efficiency and privacy protection. It allows users to collectively reap the benefits of a server model trained from client-side privacy data without accessing the client-side data (Li et al. 2021; Huang et al. 2023a). * Corresponding author. federated feature class prototype push pull Optimizing (a) Optimizing federated features with gradient supervision (b) Optimizing federated features with gradient supervision and class prototype Figure 1: The figure illustrates the differences between CR- eFF and CLIP2FL: CReFF uses only gradients for supervision, while CLIP2FL introduces the textual features of the CLIP as prototypes for federated feature learning. Accompanied by the prospect of FL, it faces the challenge of data heterogeneity, which is a universal issue arising from disparities in data distribution among clients due to data source differences between clients (Karimireddy et al. 2020; Huang, Ye, and Du 2022). Furthermore, real-world data frequently exhibits the long-tailed phenomenon (Shuai et al. 2022), that is, the class distribution is imbalanced, where the head classes have a large number of samples while the tail classes have a small number of samples. Longtailed data makes client-side models biased toward the head class (Shang et al. 2022). It is known that the server model based on client models is destined to not work well if the client models are poor in performance. Thus, heterogeneity and long-tailed data make FL more challenging. There are some FL methods for imbalanced data. In the works (Duan et al. 2020; Yang et al. 2021), the class distribution is appended to adopt client selection to match clients. Because clients need to upload the local class distribution to the server, the operation violates the principle of privacy protection of FL. In FedNova (Wang et al. 2021), the auxiliary balanced data on the server are used to compute the class distribution output by the global class, but they are unavailable in the real world. CReFF (Shang et al. 2022) is the latest solution, whose core idea is to implement the decoupling strategy to generate the class-distribution balanced federated features for the server model and to retrain the classifier by the federated features. However, in CReFF, the generation of" 2312.08651v1,"Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks Ao Liu 1 , Wenshan Li 2 * , Tao Li 1 , Beibei Li 1 , Hanyuan Huang 1 , Pan Zhou 3 1 Sichuan University Chengdu University of Information Technology 3 Huazhong University of Science and Technology {liuao, huanghanyuan}@stu.scu.edu.cn, helenali@cuit.edu.cn, {litao, libeibei}scu.edu.cn, panzhou@hust.edu.cn 2 Abstract Graph neural networks (GNNs) have recently been shown to be vulnerable to adversarial attacks, where slight perturbations in the graph structure can lead to erroneous predictions. However, current robust models for defending against such attacks inherit the transductive limitations of graph convolutional networks (GCNs). As a result, they are constrained by fixed structures and do not naturally generalize to unseen nodes. Here, we discover that transductive GCNs inherently possess a distillable robustness, achieved through a waveinduced resonance process. Based on this, we foster this resonance to facilitate inductive and robust learning. Specifically, we first prove that the signal formed by GCN-driven message passing (MP) is equivalent to the edge-based Laplacian wave, where, within a wave system, resonance can naturally emerge between the signal and its transmitting medium. This resonance provides inherent resistance to malicious perturbations inflicted on the signal system. We then prove that merely three MP iterations within GCNs can induce signal resonance between nodes and edges, manifesting as a coupling between nodes and their distillable surrounding local subgraph. Consequently, we present Graph Resonance-fostering Network (GRN) to foster this resonance via learning node representations from their distilled resonating subgraphs. By capturing the edge-transmitted signals within this subgraph and integrating them with the node signal, GRN embeds these combined signals into the central node’s representation. This node-wise embedding approach allows for generalization to unseen nodes. We validate our theoretical findings with experiments, and demonstrate that GRN generalizes robustness to unseen nodes, whilst maintaining state-of-the-art classification accuracy on perturbed graphs. Introduction In recent years, graph neural networks (GNNs), through the capabilities afforded by inductive learning, have emerged as the most potent instruments for node classification tasks. Nevertheless, earlier transductive models, such as graph convolutional networks (GCNs) (Kipf and Welling 2017), have inadvertently introduced vulnerabilities to adversarial attacks within the GNN framework. It has been observed that perturbed graphs derived from GCNs serv- * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. ing as surrogate models have the potential to compromise the outputs of inductive GNNs when transferred. In real-world applications, where trust and accuracy are nonnegotiable (Chen et al. 2021; Nadal et al. 2021; Zhao et al. 2022; Berberidis and Giannakis 2019; Xiao, Chen, and Shi 2019), such vulnerabilities can significantly jeopardize public trust (Kreps and Kriner 2020), distort human decisionmaking (Walt, Jack, and Christof 2019), and threaten human well-being (Samuel et al. 2019). Addressing the vulnerabilities introduced by transductive GCNs into the GNNs’ community is of paramount importance. Distinct from discrete feature data like images or text, graph data comprises a connected set of features through its topological structure. This interconnectedness naturally encourages the adoption of a global input-output mechanism to establish a learning channel from features to labels, a paradigm referred as transductive learning (Kipf and Welling 2017; Defferrard, Bresson, and Vandergheynst 2016; Bruna et al. 2013), with GCNs epitomizing this approach. This very transductive nature of GCNs offers adversaries an ideal environment for launching attacks (Liu et al. 2022). Leveraging this global input-output pattern, given sufficient computation, adversaries can invariably devise perturbations that are both concealment and effective (Sun et al. 2022). Given that adversaries exploit vulnerabilities inherent to transductive models to compromise the GNNs’ communities, the formulation of a more robust transductive model has ascended as the prevailing defensive approach. To defense adversarial attacks, early research predominantly sought to fortify GCN’s tolerance to perturbations by adversarial training through random edge drops (Dai et al. 2018). Recently, a shift towards self-supervised training methods has been observed. These techniques sidestep the trap set by adversaries, which bait the model into misclassifying specific inputs. Instead of singularly focusing on enhancing the model’s robustness to a given label space, they aim to expand the GCN’s overall robustness to potential perturbed graphs. Key representatives of these research endeavors include: (1) In RGCN (Zhu et al. 2019), the Gaussian distributions are employed to replace the node hidden representations across each GCN layer, aiming to mitigate the adversarial modifications’ impact. (2) By introducing a singular value decomposition (SVD) filter before the GCN processing, GCN-SVD (Entezari et al. 2020) is designed to" 2312.08671v1,"Uplifting the Expressive Power of Graph Neural Networks through Graph Partitioning Asela Hevapathige 1 , Qing Wang 1 1 School of Computing, Australian National University, Canberra, Australia asela.hevapathige@anu.edu.au, qing.wang@anu.edu.au Abstract Graph Neural Networks (GNNs) have paved its way for being a cornerstone in graph related learning tasks. From a theoretical perspective, the expressive power of GNNs is primarily characterised according to their ability to distinguish non-isomorphic graphs. It is a well-known fact that most of the conventional GNNs are upper-bounded by Weisfeiler- Lehman graph isomorphism test (1-WL). In this work, we study the expressive power of graph neural networks through the lens of graph partitioning. This follows from our observation that permutation invariant graph partitioning enables a powerful way of exploring structural interactions among vertex sets and subgraphs, and can help uplifting the expressive power of GNNs efficiently. Based on this, we first establish a theoretical connection between graph partitioning and graph isomorphism. Then we introduce a novel GNN architecture, namely Graph Partitioning Neural Networks (GPNNs). We theoretically analyse how a graph partitioning scheme and different kinds of structural interactions relate to the k-WL hierarchy. Empirically, we demonstrate its superior performance over existing GNN models in a variety of graph benchmark tasks. Introduction Graph Neural Networks (GNNs) have become the de facto paradigm in graph learning tasks (Horn et al. 2021; Bodnar et al. 2021; Bouritsas et al. 2022). Among numerous GNN models in the literature, Message-Passing Neural Network (MPNN) is a primary choice for many real-world applications due to its simplicity and efficiency. MPNNs use local neighborhood information of each node through a messagepassing scheme to retrieve node representations in an iterative manner (Gilmer et al. 2017; Kipf and Welling 2016). However, the representational power of MPNNs is well known to be upper-bounded by the Weisfeiler-Lehman test (1-WL) (Weisfeiler and Leman 1968; Xu et al. 2018; Morris et al. 2019). Various attempts have been made to enhance the expressivity of MPNNs going beyond 1-WL test, such as structural property injection (Bouritsas et al. 2022; Barceló et al. 2021; Wijesinghe and Wang 2022), consideration of higher-order substructures (Morris et al. 2019; Morris, Rattan, and Mutzel 2020; Abu-El-Haija et al. 2019), use enhanced receptive fields for message-passing (Nikolentzos, Dasoulas, and Vazirgiannis 2020; Feng et al. 2022; Wang et al. 2022), utilization of subgraphs(Zhao et al. 2021; Zhang Expressive Power λ ≥3−WL -GPNN ⋄ λ ≥3−WL -GPNN † λ ≥3−WL -GPNN ⋆ 3-WL λ ≤1−WL -GPNN 1-WL λ ⊥ -GPNN † λ ≤1−WL -GPNN † λ ≤1−WL -GPNN ⋄ ⋆ λ ⊥ -GPNN ⋄ λ ⊥ -GPNN ⋆ E ⋆ E ⋄ E † Interaction Type Figure 1: Expressive Power of GPNN variants: (1) Interaction type: The expressivity of GPNN is changed when considering different types of interactions (i.e., E ⋆ , E ⋄ , and E † ) or different graph partitioning schemes (i.e., λ ⊥ , λ ≤1-W L , and λ ≥3-W L ). (2) Expressive Power: Different GPNN variants are aligned with different levels in k-WL hierarchy, depending on interaction types and graph partition schemes being used. All related theoretical results are elaborated in Section ”Theoretical Analysis”. and Li 2021; Wang and Zhang 2022; Bevilacqua et al. 2021; Cotta, Morris, and Ribeiro 2021), and inductive coloring (You et al. 2021; Huang et al. 2022). Despite various advances in expressive GNNs, there is still little understanding of how different kinds of structural components in a graph (e.g., subgraphs that capture different graph properties) interact with each other and how such interactions may influence the expressivity of graph representations for learning tasks. Existing works are mostly restricted to learning representations through simple interactions between vertices and their neighbors, thereby lacking the ability to unravel intricate interactions among structural components of different characteristics. Present work. This work aims to address the aforementioned limitations. Our key observations are that partitioning a graph into a set of subgraphs that preserve structural" 2312.08688v1,"TigerBot: An Open Multilingual Multitask LLM Ye Chen Tiger Research Shanghai, China yechen@tigerbot.com Xiaowei Li Tiger Research Shanghai, China xiaowei.li@tigerbot.com Wei Cai Tiger Research Shanghai, China wei.cai@tigerbot.com Liangmin Wu Tiger Research Shanghai, China liangmin.wu@tigerbot.com Zhanxuan Xin Tiger Research Shanghai, China zhanxuan.xin@tigerbot.com Cong Fu Tiger Research Shanghai, China cong.fu@tigerbot.com Abstract We release and introduce the TigerBot family of large language models (LLMs) 1 , consisting of base and chat models, sized from 7, 13, 70 and 180 billion parameters. We develop our models embarking from Llama-2 and BLOOM, and push the boundary further in data, training algorithm, infrastructure, and application tools. Our models yield meaningful performance gain over SOTA open-source models, e.g., Llama-2, specifically 6% gain in English and 20% gain in Chinese. TigerBot model family also achieves leading performance in major academic and industrial benchmarks and leaderboards 2 . We believe that TigerBot represents just a snapshot of lightning-fast progression in LLM open-source community. Therefore, we are thrilled to give back by publicly releasing our models and reporting our approach behind, with additional emphases on building SOTA LLMs in a democratized way and making LLMs of use in real-world applications. 1 Introduction Large language models (LLMs) has shown unprecedented promise in a wide range of tasks. Since the phenomenal launch of ChatGPT, there have been breathtaking development in the community, mainly following three themes: 1. Fundamental capabilities, pushed forward by both proprietary models (GPT [4, 19], BARD [22], Claude [2]) and open-source models (BLOOM [27], Llama [32, 33]). 2. Computational economics, from data collection (e.g. Alpaca [31]), training (e.g. LoRA [11]), quantization (ExLlama [34]), and inference (e.g. TGI [12] and TensorRT [18]). 3. Application readiness, from APIs, plug-ins, function calling and agents, retrieval-augmented generation (RAG), long context window, to recently multimodality and role-playing. The mainstream approach to building LLMs has been pretraining decoder-only transformers [35] on an extensive corpus of unsupervised textual data, followed by alignment with human preferences with labelled demonstration or comparison data, using supervised fine-tuning (SFT) or reinforcement learning with human feedback (RLHF). We have followed the same methodology, albeit made the following contributions: 1 web: https://www.tigerbot.com/chat; github: https://github.com/TigerResearch/ TigerBot 2 As of this writing, TigerBot ranked top-tier open-source models in OpenCompass LLM Leaderboard , and CLiB Chinese LLM benchmark leaderboard. Preprint. Under review." 2312.08747v1,"Dissecting vocabulary biases datasets through statistical testing and automated data augmentation for artifact mitigation in Natural Language Inference Dat Thanh Nguyen Department of Computer Science, University of Texas at Austin ndat@utexas.edu Abstract In recent years, the availability of large-scale annotated datasets, such as the Stanford Natural Language Inference and the Multi-Genre Natural Language Inference, coupled with the advent of pre-trained language models, has significantly contributed to the development of the natural language inference domain. However, these crowdsourced annotated datasets often contain biases or dataset artifacts, leading to overestimated model performance and poor generalization. In this work, we focus on investigating dataset artifacts and developing strategies to address these issues. Through the utilization of a novel statistical testing procedure, we discover a significant association between vocabulary distribution and text entailment classes, emphasizing vocabulary as a notable source of biases. To mitigate these issues, we propose several automatic data augmentation strategies spanning character to word levels. By fine-tuning the ELECTRA pre-trained language model, we compare the performance of boosted models with augmented data against their baseline counterparts. The experiments demonstrate that the proposed approaches effectively enhance model accuracy and reduce biases by up to 0.66% and 1.14%, respectively. 1 Introduction In the last few years, natural language inference (NLI), a sub-domain of natural language processing (NLP), has been an active research field. In NLI, systems are asked to determine whether a hypothesis sentence (h) can be logically inferred (entailed) from a given premise sentence (p) (MacCartney and Manning, 2008). For example, a hypothesis, ""A family of three is at the beach"" would likely to be inferred from the premise of ""A man, woman, and child enjoying themselves on a beach"". This task has been proved challenging due to the complex nature of natural language, which involves logical reasoning, lexical semantic knowledge, and variations in linguistic expression. Recent years have witnessed significant research efforts in the field of NLI, notably marked by the creation of benchmark datasets such as the Stanford Natural Language Inference (SNLI) corpus (Bowman et al., 2015) and the Multi-Genre Natural Language Inference (MNLI) corpus (Williams et al., 2017). These datasets provide substantial amounts of annotated data, fostering the development and evaluation of NLP models. Additionally, the advent of pre-trained language models has played a key role in enhancing the efficacy of the NLI problem. Regardless of the usefulness of these large datasets in the training and evaluation of NLI systems, recent works showed that they contain biases or dataset artifacts, i.e., there are spurious patterns present in the datasets that NLI models can exploit to achieve high performance without learning relationships of the premise and hypothesis sentences (Poliak et al., 2018; Gururangan et al., 2018; Tsuchiya, 2018). The cause of this phenomenon possibly arises from the fact that crowdsourcing annotated datasets often employ a few strategies to obtain different entailment conditions. For example, negation words such as ""not, non, nobody"" are likely associated with contradiction (Gururangan et al., 2018). Furthermore, modifying or omitting gender information, and neutralizing gender information by simply counting the number of persons in the premise for neutral pairs are also common practices during the generation of entailment hypotheses. For instance, Table 1 includes three different examples from the SNLI dataset that simply modify the subject word ""people"" to a specific gender word such as ""man"", or ""woman"" to obtain the neutral hypothesis examples. As a result, NLI models trained on datasets with such artifacts may tend to overestimate their performance and generalize poorly in other settings. In this work, we focus on investigating dataset artifacts in NLI domain and developing strategies to mitigate these issues. Specifically, we identify" 2312.08763v1,"Learning from Polar Representation: An Extreme-Adaptive Model for Long-Term Time Series Forecasting Yanhong Li 1 and David C. Anastasiu 1 1 Department of Computer Science and Engineering, Santa Clara University, Santa Clara, CA, USA In the hydrology field, time series forecasting is crucial for efficient water resource management, improving flood and drought control and increasing the safety and quality of life for the general population. However, predicting long-term streamflow is a complex task due to the presence of extreme events. It requires the capture of long-range dependencies and the modeling of rare but important extreme values. Existing approaches often struggle to tackle these dual challenges simultaneously. In this paper, we specifically delve into these issues and propose Distance-weighted Auto-regularized Neural network (DAN), a novel extreme-adaptive model for long-range forecasting of stremflow enhanced by polar representation learning. DAN utilizes a distance-weighted multi-loss mechanism and stackable blocks to dynamically refine indicator sequences from exogenous data, while also being able to handle uni-variate time-series by employing Gaussian Mixture probability modeling to improve robustness to severe events. We also introduce Kruskal- Wallis sampling and gate control vectors to handle imbalanced extreme data. On four real-life hydrologic streamflow datasets, we demonstrate that DAN significantly outperforms both stateof-the-art hydrologic time series prediction methods and general methods designed for long-term time series prediction. multivariate time series analysis | hydrologic prediction | streamflow prediction | representation learning | deep learning models Introduction Time series forecasting has a critical role in diverse domains, enabling effective resource management and informed policy decisions. However, certain time series data pose a unique problem because they contain sporadic but significant extreme events, such as unexpected flash floods or climate change-induced droughts in the problem of streamflow prediction. The ability to forecast time series that include these types of extreme occurrences is an important research direction which has seen much attention in recent years (1–6). Traditionally, machine learning and statistics-based models were the basic foundation for time series prediction (7, 8). However, techniques like Autoregressive Integrated Moving Average (ARIMA) (9) seem to perform badly when dealing with large variations in the streamflow values, while other methods (10–12) are generally designed for short future horizon forecasting. Corresponding author: David C. Anastasiu. E-mail: danastasiu@ scu.edu A variety of neural network architectures have been investigated for hydrologic forecasting, including recurrent neural networks (13, 14), hybrid networks (15) and graph neural networks (16, 17). Some work employed Extreme Value Theory (EVT) to enhance the hydrologic time series performance (5, 6). However, these studies primarily concentrate on short-term forecasting and their performance on longer time horizons is doubtful. While there has been a surge in transformer-based forecasting models asserting their high-performance capabilities for long-horizon time series tasks (18–22), recent research has raised questions about their efficacy, indicating that simpler linear models can outperform them (23, 24). Moreover, imbalanced data or severe events might hurt all these state-of-art deep learning approaches when it comes to long-term predictions. We focus on these challenges and innovatively address them through representation learning (25–27), a burgeoning field in unsupervised learning. Our aim is to extract latent states containing the extreme features in data for downstream tasks. To achieve this, we explore the potential of multi-loss functions (28, 29) in shaping our training objective. The main contributions of this work are as follows: • We propose a Distance-weighted Auto-regularized Neural network (DAN), which uses expandable blocks to dynamically facilitate long-term prediction. • To improve the model’s robustness to severe events, DAN innovatively uses a distance-weighted multi-loss method to extract the polar representations from time series simultaneously. • We introduce a Kruskal-Wallis sampling policy to handle imbalanced extreme data and gate control vectors to boost the discriminatory capacity of indicators to accommodate imbalanced data. • We evaluate DAN and competing methods on four separate datasets and find that DAN significantly outperforms state-of-the-art baselines. Additionally, we carry out several ablation studies to comprehend the effects of specific design decisions. Related work Streamflow forecasting holds a pivotal role in enhancing water resource allocation, management, flood warning, and mitigation of flood-related damages. Traditional methods for streamflow forecasting included the univariate Autore- Li et al. | December 15, 2023 | 1–10" 2312.08764v1,"CattleEyeView: A Multi-task Top-down View Cattle Dataset for Smarter Precision Livestock Farming Kian Eng Ong 1 ‡ Sivaji Retta 2 ‡ Ramarajulu Srinivasan 2 ‡@ Shawn Tan 2 Jun Liu 1 1 Information Systems Technology and Design, Singapore University of Technology and Design, Singapore 2 AnimalEYEQ Private Limited, Singapore Abstract—Cattle farming is one of the important and profitable agricultural industries. Employing intelligent automated precision livestock farming systems that can count animals, track the animals and their poses will raise productivity and significantly reduce the heavy burden on its already limited labor pool. To achieve such intelligent systems, a large cattle video dataset is essential in developing and training such models. However, many current animal datasets are tailored to few tasks or other types of animals, which result in poorer model performance when applied to cattle. Moreover, they do not provide top-down views of cattle. To address such limitations, we introduce CattleEyeView dataset, the first top-down view multi-task cattle video dataset for a variety of inter-related tasks (i.e., counting, detection, pose estimation, tracking, instance segmentation) that are useful to count the number of cows and assess their growth and well-being. The dataset contains 753 distinct top-down cow instances in 30,703 frames (14 video sequences). We perform benchmark experiments to evaluate the model’s performance for each task. The dataset and codes can be found at https://github.com/AnimalEyeQ/CattleEyeView Index Terms—dataset, cow, detection, tracking, counting, pose estimation, instance segmentation I. I NTRODUCTION Monitoring and assessing the health, well-being, growth, and behaviors of animals are especially important in the livestock farming industry, as all of these ultimately impact farm production and profits [28]. Cattle farming is one of the important and profitable agricultural industries, especially in the United States [10]. Cows are raised for their meat as well as milk which is then further processed to dairy products (e.g., cheese, butter, yogurt). Globally, the demand for cattle is expected to increase by 5.8% in the next 10 years [2]. Given the strain on the farming industry with an increasing number of animals but decreasing number of farmers [5], employing automated Artificial Intelligence (AI) systems in the livestock farming industry will raise productivity and expedite the industry’s effort in digital transformation towards smart precision livestock farming while significantly reducing the heavy burden on its already limited labor pool [12, 22]. Precision livestock farming includes the use of intelligent systems to count animals, track and analyze poses and movements of animals and their heads, bodies, and limbs, as well as their activities and behaviors in the farm [5, 21]. ‡ Equal contributions. @ Corresponding author: rama@animaleyeq.com Accurate counting of livestock is particularly important in the livestock industry as each farm on average sells up to 5000 cows each day [8]. Counting errors are common when manually counted by humans and are substantially costly, given that each cow is priced at around USD$1000 [8]. Besides counting, tracking each animal in the farm is precursor to evaluating its state of health and analyzing its behaviors and interactions with others [27, 30]. Additionally, detecting its keypoints is important in many practical application scenarios such as animal identification, tracking, behavioral analysis (including lameness detection), part segmentation, and even gait analysis [4, 14]. On top of keypoints identification, segmentation can help to chart and assess the animal’s well-being (e.g., cleanliness and weight) [13]. All of these interrelated tasks are crucial to achieve a comprehensive understanding and analysis of the animal’s health and well-being. To develop intelligent systems for smart precision livestock farming, a large video dataset is essential in developing and training such models. However, there is a lack of sufficient detailed annotations of animal videos that can be used for training [14], which currently impedes research in this field. Although there are existing animal datasets, some contain a diversity of animals (e.g., Animal Pose [7], AP10K [29], Animal Kingdom [19]) while others are for specific types of animals (e.g., sheep [20], and pigs [22]). Models that are developed on such datasets are unable to achieve good performance when applied to cattle. Moreover, most existing animal datasets provide frontal and side views of the animals, but not the top-down views of animals. The advantages of using the top-down view, instead of frontal or side views, of the animal are (1) the animals are usually not severely occluded by other farm objects or animals, (2) the appearances of animals are more consistent (similar size and shape) as compared to isometric angled view that is commonly seen in CCTV footages [22], (3) the top-down view focuses on a particular animal, unlike isometric view which may contain differently sized animals in the background that will distract the model. This is important to achieve accurate counting of animals as well as taking into account the direction of movement of the animal for accurate counting. All of these advantages are important to accurately assess the growth and well-being of the animal. However, models that are developed on existing datasets based on frontal, side or isometric views of" 2312.08765v1,"Simulation-based Evaluation of Indoor Positioning Systems in Connected Aircraft Cabins Paul Schwarzbach a Michael Schultz b , Jonas Ninnemann a , Hagen Ußler a , Oliver Michler a and Chair of Transport Systems Information Technology, TUD Dresden University of Technology, Hettnerstr. 3, 01062 Dresden, DE; b Chair of Air Traffic Concepts, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, 85577 Neubiberg, DE ARTICLE HISTORY Compiled December 15, 2023 Pr ep rin t a ABSTRACT The manuscript discusses the increasing use of location-aware radio communication systems to support operational processes for the demanding aircraft cabin environment. In this context, the challenges for evaluation and integration of radio-based localization systems in the connected cabin are specifically addressed by proposing a hybrid deterministic and stochastic simulation approach, including both modelbased ray-tracing and empirical residual simulation. The simulation approach is detailed in the manuscript and a methodology for applying and evaluating localization methods based on obtained geometric relations is conducted. This can also be used as a data generation and validation tool for data-driven localization methods, which further increase the localization accuracy and robustness. The derived location information can in return be used in order to perform operational prediction and optimization for efficient and sustainable passenger handling. A dataset derived from the introduced simulation platform is publicly available. KEYWORDS Radio Propagation Simulation; Localization; Radio Positioning; Ultra-Wideband (UWB); Machine Learning; Connected Cabin; Indoor Positioning Systems (IPS); Location-awareness; Passenger (PAX) Boarding; Cabin Operation 1. Introduction Efficient air traffic management and ground handling are crucial factors that drive the performance of airline operations. The integration of aircraft and passenger (PAX) trajectories presents a major challenge in future mobility management. The COVID- 19 pandemic has significantly impacted the transportation network Schwarzbach et al. (2020), highlighting the need for effective PAX handling processes at bottlenecks. PAX handling processes such as boarding and disembarkation within the confined aircraft cabin pose a challenge to air transportation. A key metric known as aircraft turnaround constitutes all ground-handling processes, including freight and baggage unloading and loading, refueling, cleaning, catering, and PAX boarding and disembarking Schultz et al. (2020). PAX behavior largely influences the duration of boarding, and convenient and fast boarding is a priority for both PAX and airlines Schultz (2018c). Queuing at CONTACT Paul Schwarzbach. Email: paul.schwarzbach@tu-dresden.de" 2312.08771v1,"Anisotropic swelling due to hydration in fibrous biomaterials Xander A. Gouws, 1 Laurent Kreplak, 1 and Andrew D. Rutenberg 1, ∗ 1 Department of Physics & Atmospheric Science, Dalhousie University, Halifax, Nova Scotia, B3H 4R2, Canada (Dated: December 15, 2023) Naturally occurring protein fibres often undergo anisotropic swelling when hydrated. Within a tendon, a hydrated collagen fibril’s radius expands by 40% but its length only increases by 5%. The same effect, with similar magnitude, is observed for keratin microfibrils within hair. Nevertheless, current explanations for swelling anisotropy are based on molecular details that are unique to each material. Here, we describe a coarse-grained liquid-crystalline elastomer model for biomaterial hydration that allows for anisotropic swelling. We show that our model is consistent with previously observed behavior for both hair fibers and collagen fibrils. Despite a non-linear relationship between water saturation and relative humidity, we find that the squared deformation in the axial and radial directions is approximately linear with water saturation. We further find that anisotropic swelling is linear with respect to volume and shape changes. Hair and collagen exhibit remarkably similar behavior under hydration. We suggest that our model may also be useful for other biomaterials that exhibit anisotropic swelling. I. INTRODUCTION Many biomaterials absorb water in response to changes in the ambient humidity. Leonardo da Vinci used this effect to make the first hygrometer, or humidity sensor, in 1481 using the changing mass of cotton with humidity. In 1783, hair hygrometers were developed that used the changing length of hair with humidity [1], and were widely used until the last century. More generally, any biomaterial or biotextile will have changing water content with humidity (see, e.g., [2]) — and will also have changing structure at microscopic, mesoscopic, and bulk scales. The increasing development and use of biomaterials and biotextiles makes the systematic effects of hydration important to characterize. For relatively well-studied biological materials, such as hair fibers and collagen fibrils, the effects of hydration are dramatic. Mechanical properties of hair depend strongly on water content [3], as do modes of mechanical failure [4]. The Young’s modulus of collagen fibrils varies by orders of magnitude between dry and aqueous conditions [5]; similar scale changes are seen in bending [6] or indentation [5, 7] and in keratin [8]. Furthermore, mechanical effects of hydrated filaments are strongly affected by solution conditions [9–11]. Both hair and collagen are strongly anisotropic materials, with keratin intermediate filaments or collagen molecules predominantly aligned with the cylindrical axis of individual hair fibers or collagen fibrils, respectively. Substantial anisotropy is also observed with hydration effects. When hydrated, a collagen fibril’s radius may expand by 40% while its length only increases by 5% [11]. Similarly, when hair is hydrated, its radius expands by 14%, but its length expands by only 2% [12, 13]. While both hair and collagen have anisotropic structures and exhibit anisotropic swelling with similar relative magnitudes, microstructural explanations of their ∗ adr@dal.ca anisotropic response to hydration are quite different. For collagen fibrils, length changes are thought to be minimized by the sliding of collagen molecules past each other [11]. In contrast, intermediate filaments in hair do not themselves restructure, but rather guide the swelling of their surrounding amorphous matrix [14, 15]. We are agnostic with respect to microstructural models, rather we want to develop coarse grained explanations of the hydration of anisotropic fibers such as hair and collagen. Coarse-grained liquid-crystal elastomers (LCE) have recently proven useful for modelling mechanical effects of anisotropic collagen fibrils [16, 17]. The essential structural components of these LCE models is anisotropic alignment of collagen molecules together with mechanical cross-linking that orients with respect to the molecules. Hair exhibits similar anisotropic alignment of cross-linked keratin microfibrils [18] and so could be addressed by similar models. Characterizing hydration effects in such coarse-grained models would then enable the systematic theoretical characterization of the mechanical effects of hydration in these systems. Our goal in this paper is to simplify and summarize the observed phenomenology of anisotropic swelling due to hydration in both hair and collagen fibrils. Since the water content of protein fibers can vary by osmolarity even at a fixed relative humidity [9–11], we investigate how shape depends on water content. We obtain a simple phenomenological model for this relationship, and show how it can be naturally described within an LCE model. For simplicity, here we neglect molecular tilts observed in collagen fibrils [19] and the hair cortex [18], and so we consider an LCE fiber in the nematic limit — with molecules completely aligned with the cylindrical axis. II. METHODS AND RESULTS Relative dimensional changes induced by variations in relative humidity have been experimentally characterized by several groups for both collagen [10] and hair [13]." 2312.08773v1,"Offshore Wind Plant Instance Segmentation Using Sentinel-1 Time Series, GIS, and Semantic Segmentation Models Osmar Luiz Ferreira de Carvalho a , Osmar Abı́lio de Carvalho Júnior b,∗ , Anesmar Olino de Albuquerque b , Daniel Guerreiro e Silva a a University of Brasilia, Department of Electrical Engineering, Campus Universitario Darcy Ribeiro, Brasilia, 70910-900, Federal District, Brazil b University of Brasilia, Departament of Geography, Campus Universitario Darcy Ribeiro, Brasilia, 70910-900, Federal District, Brazil Abstract Offshore wind farms represent a renewable energy source with a significant global growth trend, and their monitoring is strategic for territorial and environmental planning. This study’s primary objective is to detect offshore wind plants at an instance level using semantic segmentation models and Sentinel-1 time series. The secondary objectives are: (a) to develop a database consisting of labeled data and S-1 time series; (b) to compare the performance of five deep semantic segmentation architectures (U- Net, U-Net++, Feature Pyramid Network - FPN, DeepLabv3+, and LinkNet); (c) develop a novel augmentation strategy that shuffles the positions of the images within the time series; (d) investigate different dimensions of time series intervals (1, 5, 10, and 15 images); and (e) evaluate the semantic-to- instance conversion procedure. LinkNet was the top-performing model, followed by U-Net++ and U-Net, while FPN and DeepLabv3+ presented the worst results. The evaluation of semantic segmentation models reveals enhanced Intersection over Union (IoU) (25%) and F-score metrics (18%) with the augmentation of time series images. The study showcases the augmentation strategy’s capability to mitigate biases and precisely detect invariant targets. Furthermore, the conversion from semantic to instance segmentation demonstrates its efficacy in accurately isolating individual instances within classified regions—simplifying training data and reducing annotation effort and complexity. Keywords: instance segmentation, semantic segmentation, renewable energy, wind energy, deep learning, time series ∗ Corresponding author: osmarjr@unb.br Email addresses: osmarcarvalho@ieee.org (Osmar Luiz Ferreira de Carvalho), anesmar@ieee.org (Anesmar Olino de Albuquerque), danielgs@unb.br (Daniel Guerreiro e Silva) Preprint December 15, 2023" 2312.08777v1,"Flip colouring of graphs Yair Caro Josef Lauri University of Haifa-Oranim University of Malta Xandru Mifsud University of Malta Raphael Yuster University of Haifa Christina Zarb University of Malta Abstract  − 1, It is proved that for integers b, r such that 3 ≤ b < r ≤ b+1 2 there exists a red/blue edge-colored graph such that the red degree of every vertex is r, the blue degree of every vertex is b, yet in the closed neighborhood of every  vertex there are more blue edges than red edges. The upper bound r ≤ b+1 2 −1 is best possible for any b ≥ 3. We further extend this theorem to more than two colours, and to larger neighbourhoods. A useful result required in some of our proofs, of independent interest, 2 is that for integers r, t such that 0 ≤ t ≤ r 2 −5r 3/2 , there exists an r-regular graph in which each open neighborhood induces precisely t edges. Several explicit constructions are introduced and relationships with constant linked graphs, (r, b)-regular graphs and vertex transitive graphs are revealed. 1 Introduction Local versus global phenomena are widely considered both in graph theory (combinatorics in general) and in social sciences [1, 4, 6, 11, 17, 18]. Such phenomena occur in the most elementary graph theory observations as well as in highly involved theorems and conjectures. A simple example dates back to Euler: Every degree is even (a local property), if and only if each component has an Eulerian circuit (a global property). More involved examples are Turán-type problems [12, 21, 22], broadly showing that if a graph does not contain some fixed graph (local property), then its number of edges cannot be too large (a global property). As an illustration of a somewhat 1" 2312.08781v1,"The von Bahr-Esseen type inequality under sub-linear expectations and applications ∗ Yi Wu a , Xuejun Wang b† a School of Big Data and Artificial Intelligence, Chizhou University, Chizhou, 247000, P.R. China b School of Big Data and Statistics, Anhui University, Hefei, 230601, P.R. China Abstract Moment inequalities play important roles in probability limit theory and mathematical statistics. In this work, the von Bahr-Esseen type inequality for extended negatively dependent random variables under sub-linear expectations is established successfully. By virtue of the inequality, we further obtain the Kolmogorov type weak law of large numbers for partial sums and the complete convergence for weighted sums, which extend and improve corresponding results in sub-linear expectation space. Keywords: von Bahr-Esseen type inequality; weak law of large numbers; complete convergence; sub-linear expectations Mathematics Subject Classification 2020: 60E15; 60F15 1 Introduction It is known that the moment inequalities are very powerful tools in classical probability theory and statistics. Due to these inequalities, many elegant results in probability theory and statistical applications were established successively in the past decades. For a sequence {X n , n ≥ 1} of independent and identically distributed random variables with mean zero and E|X n | p < ∞ for some 1 ≤ p ≤ 2, von Bahr and Esseen (1965) proved that, for each n ≥ 1, p n n X X E|X i | p , (1) X i ≤ C p E i=1 i=1 where C p is a positive constant depending only on p. The aforementioned inequality is called the p-th von Bahr-Esseen moment inequality. In view of the significance of this ∗ Supported by the National Natural Science Foundation of China (12201079), the Natural Science Foundation of Anhui Province (2108085MA06, 2108085QA15), and the Excellent Scientific Research and Innovation Team of Anhui Colleges (2022AH010098). † Corresponding author. Email address: wxjahdx2000@126.com 1" 2312.08786v1,"Heterogenous Network Analytics of Small Group Teamwork: Using Multimodal Data to Uncover Individual Behavioral Engagement Strategies SHIHUI FENG ∗ , University of Hong Kong, China LIXIANG YAN, Monash University, Australia LINXUAN ZHAO, Monash University, Australia ROBERTO MARTINEZ MALDONADO, Monash University, Australia DRAGAN GAŠEVIĆ, Monash University, Australia Individual behavioral engagement is an important indicator of active learning in collaborative settings, encompassing multidimensional behaviors mediated through various interaction modes. Little existing work has explored the use of multimodal process data to understand individual behavioral engagement in face-to-face collaborative learning settings. In this study we bridge this gap, for the first time, introducing a heterogeneous tripartite network approach to analyze the interconnections among multimodal process data in collaborative learning. Students’ behavioral engagement strategies are analyzed based on their interaction patterns with various spatial locations and verbal communication types using a heterogeneous tripartite network. The multimodal collaborative learning process data were collected from 15 teams of four students. We conducted stochastic blockmodeling on a projection of the heterogeneous tripartite network to cluster students into groups that shared similar spatial and oral engagement patterns. We found two distinct clusters of students, whose characteristic behavioural engagement strategies were identified by extracting interaction patterns that were statistically significant relative to a multinomial null model. The two identified clusters also exhibited a statistically significant difference regarding students’ perceived collaboration satisfaction and teacher-assessed team performance level. This study advances collaboration analytics methodology and provides new insights into personalized support in collaborative learning. CCS Concepts: • Applied computing → Collaborative learning. Additional Key Words and Phrases: collaborative learning, individual engagement, heterogeneous networks, multimodal learning analytics ACM Reference Format: Shihui Feng, Lixiang Yan, Linxuan Zhao, Roberto Martinez Maldonado, and Dragan Gašević. 2024. Heterogenous Network Analytics of Small Group Teamwork: Using Multimodal Data to Uncover Individual Behavioral Engagement Strategies. In The 14th Learning Analytics and Knowledge Conference (LAK ’24), March 18–22, 2024, Kyoto, Japan. ACM, New York, NY, USA, 16 pages. https://doi.org/10. 1145/3636555.3636918 1 INTRODUCTION Successful collaborative learning relies on the active participation of individuals [10, 25]. Behavioral engagement can be considered the observed actions of individuals in collaborative learning processes [13]. Understanding individual behavioral engagement in collaborative learning is critical for uncovering how learning occurs at the individual level, as well as for promoting cohesive and adaptive collaboration dynamics at the group level [25, 42]. The constitution of Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. Manuscript submitted to ACM 1" 2312.08806v1,"Google Tag Manager: Hidden Data Leaks and its Potential Violations under EU Data Protection Law Gilles Mertens Centre Inria de l’Université Grenoble-Alpes Grenoble, France gilles.mertens@inria.fr Nataliia Bielova Centre Inria d’Université Côte d’Azur Sophia Antipolis, France nataliia.bielova@inria.fr Cristiana Santos Michael Toth Utrecht University Utrecht, The Netherlands c.teixeirasantos@uu.nl Centre Inria de l’Université Grenoble-Alpes Grenoble, France michael.toth@inria.fr to copy and paste an external JavaScript library reference to the webpage’s source code. However, as publishers were installing more and more tags 1 , manual tag management became challenging and, as a result, “Tag Management Systems” (TMS) were developed by the industry. TMS allow publishers to install and configure tags in a centralized manner without tinkering with the website source code. Once installed on a website, TMS takes care of handling the installation, configuration and execution of third-party tags. In 2012, Google developed its own TMS called “Google Tag Manager” (GTM). It is currently the most installed TMS on the market, currently present on 28 million live websites according to BuiltWith [7]. GTM is a free service, offering a graphical interface and supporting a seamless inclusion of major marketing and analytic third-party scripts. GTM also benefits from a community of contributors, creating tags for services that are not officially supported by Google. Tags rely on the ability of browsers to communicate directly with third-party domains to download scripts, set cookies and send users’ data. Figure 1a shows the first GTM architecture proposed by Google that we call “Client-side GTM” since it loads all the tags inside the user’s browser. In the recent years, this architecture became crippled by measures taken by browser vendors. Many popular Web browsers, such as Safari, Firefox and Brave, already actively block third-party tracking scripts and cookies to defend users against Web tracking [6, 49, 58]. Moreover, Google’s own plan of phasing out third-party cookies in Chrome [52] will render a lot of tags that rely on third-party cookies ineffective. As a result, an alternative version of Google Tag Manager was created in 2020, officially called “GTM Server Container” [45]. This new architecture, shown in Figure 1b, loads and executes tags in a remote server, making it look like no third parties are present on the website. When the user’s data is collected with the GTM Web Container, there is only one data flow exiting the browser, and therefore, the final destination of data is impossible to trace for researchers and auditors that analyze outgoing browser requests. This architecture, called “Server-side GTM”, bypasses any browser restrictions and security measures, such as CSP [59] to control and secure third-party scripts and allows tags, that are now run on the server, to invisibly share users’ data to other third parties. ABSTRACT Tag Management Systems were developed in order to support website publishers in installing multiple third-party JavaScript scripts (Tags) on their websites. In 2012, Google developed its own TMS called “Google Tag Manager” (GTM) that is currently present on 28 million live websites. In 2020, a new “Server-side” GTM was introduced, allowing publishers to include Tags directly on the server. However, neither version of GTM has yet been thoroughly evaluated by the academic research community. In this work, we study, for the first time, the two versions of the Google Tag Management (GTM) architectures: Client- and Serverside GTM. By analyzing these systems with 78 Client-side Tags, 8 Server-side Tags and two Consent Management Platforms (CMPs) from the inside, we discover multiple hidden data leaks, Tags bypassing GTM permission system to inject scripts, and consent enabled by default. With a legal expert, we perform an in-depth legal analysis of GTM and its actors to identify potential legal violations and their liabilities. We provide recommendations and propose numerous improvements for GTM to facilitate legal compliance. KEYWORDS online tracking, server-side tracking, privacy, consent, GDPR compliance, website publishers, data controller, potential legal violation 1 Vincent Roca Centre Inria de l’Université Grenoble-Alpes Grenoble, France vincent.roca@inria.fr INTRODUCTION Today’s modern websites continuously collect their visitors’ data for various purposes, such as targeted advertising, and rely on third parties for such collection. Over the last decade, researchers have demonstrated that third-parties collect users’ data with the help of third-party JavaScript scripts [62]. These scripts, invisible to the users, are silently executed in the webpage’s background and are often called “tags” by the web marketing industry [46]. Initially, to install a tag on the webpage, the website publisher only needed This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license visit https://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Proceedings on Privacy Enhancing Technologies YYYY(X), 1–17 © YYYY Copyright held by the owner/author(s). https://doi.org/XXXXXXX.XXXXXXX 1 In 2016, Engelhard and Narayanan [19] measured that on average, a website contains 18 third-parties. 1" 2312.08827v1,"Artificial Intelligence and Human Geography Chapter in the Encyclopedia of Human Geography Song Gao Geospatial Data Science Lab, Department of Geography, University of Wisconsin-Madison, 550 N Park Stret, Madison, 53706, WI, USA. Contributing authors: song.gao@wisc.edu; Abstract This paper examines the recent advances and applications of AI in human geography especially the use of machine (deep) learning, including place representation and modeling, spatial analysis and predictive mapping, and urban planning and design. AI technologies have enabled deeper insights into complex humanenvironment interactions, contributing to more effective scientific exploration, understanding of social dynamics, and spatial decision-making. Furthermore, human geography offers crucial contributions to AI, particularly in context-aware model development, human-centered design, biases and ethical considerations, and data privacy. The synergy beween AI and human geography is essential for addressing global challenges like disaster resilience, poverty, and equitable resource access. This interdisciplinary collaboration between AI and geography will help advance the development of GeoAI and promise a better and sustainable world for all. Keywords: AI, GeoAI, human-in-the-loop, ethics, trustworthiness 1 Introduction Artificial intelligence (AI) is a field in computer science and engineering that focuses on developing intelligent machines capable of performing problem-solving tasks and achieving goals that typically require human intelligence (Turing, 1950; McCarthy, 2004). There are generally two types of AI: Weak AI and Strong AI. Weak AI sits at the foundation of AI development, with its focused human-like specific abilities (e.g., conversation in Siri) and practical applications (e.g., facial recognition from images and videos) in specific contexts, while Strong AI (known as Artificial General 1" 2312.08837v1,"Learning Safety Constraints From Demonstration Using One-Class Decision Trees Mattijs Baert, Sam Leroux, Pieter Simoens IDLab, Department of Information Technology at Ghent University - imec Technologiepark 126 B-9052 Ghent, Belgium {mattijs.baert, sam.leroux, pieter.simoens}@ugent.be Abstract The alignment of autonomous agents with human values is a pivotal challenge when deploying these agents within physical environments, where safety is an important concern. However, defining the agent’s objective as a reward and/or cost function is inherently complex and prone to human errors. In response to this challenge, we present a novel approach that leverages one-class decision trees to facilitate learning from expert demonstrations. These decision trees provide a foundation for representing a set of constraints pertinent to the given environment as a logical formula in disjunctive normal form. The learned constraints are subsequently employed within an oracle constrained reinforcement learning framework, enabling the acquisition of a safe policy. In contrast to other methods, our approach offers an interpretable representation of the constraints, a vital feature in safety-critical environments. To validate the effectiveness of our proposed method, we conduct experiments in synthetic benchmark domains and a realistic driving environment. Introduction Reinforcement Learning (RL) has made significant strides in training autonomous agents, but as these systems become more advanced, ensuring their safety and alignment with human intentions, often referred to as the alignment problem (Russell 2019), is becoming a critical concern. As a result, the objectives of autonomous agents extend beyond their primary task goals, also encompassing safety constraints, human values, legal regulations, and various other factors. For instance, an autonomous vehicle’s objective is not only to get passengers quickly to their destination but also to abide by traffic laws and ensure passenger comfort. To address these challenges and enhance the safety of RL agents, Constrained Reinforcement Learning (CRL) methods have emerged. CRL is designed to obtain safe RL agents by incorporating constraints into the learning process. CRL methods help ensure that the RL agent operates within predefined boundaries, reducing the risk of harmful or unintended actions. However, one key limitation of CRL methods is that they assume the availability of a well-defined set of constraints. Specifying these constraints correctly and completely is a complex task on its own (Krakovna et al. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 2020). It often requires a deep understanding of the environment, potential risks, and ethical considerations. Therefore, addressing the alignment problem in RL goes beyond the development of CRL methods; it also involves addressing the challenge of correctly specifying constraints as necessary. This research paper introduces a novel approach to reduce the need for manual specification of constraints by learning from expert demonstrations. First, a model of the expert behavior is learned as a one-class decision tree (Itani, Lecron, and Fortemps 2020). From this tree a logical formula in disjunctive normal form is extracted defining the constraints. Next, we demonstrate that the learned constraints can be used by a CRL method to learn a constraint abiding (i.e. safe) policy in synthetic and realistic environments. A notable advantage of this approach is the interpretability of both the learned expert model and the constraints themselves. By monitoring the evaluation-violation ratio of the constraints during training, we can refine the set of constraints after training, further enhancing interpretability. Additionally, as constraints are frequently shared across multiple agents and tasks, once they have been acquired, they can be seamlessly applied to other agents undertaking diverse tasks. This eliminates the need to separately learn constraints for each individual agent and task. We assess the effectiveness of the proposed approach through an evaluation on a series of synthetic benchmarks for safe RL (Ray, Achiam, and Amodei 2019) and in a real-world driving scenario (Krajewski et al. 2018). Background Markov Decision Process A Markov decision process (MDP) is characterized by a state space S, an action space A, a discount factor γ within the range [0,1], a transition distribution denoted as p(s ′ | s, a), an initial state distribution represented by I(s), and a reward function R : S × A 7→ [r min , r max ]. Within this framework, an agent interacts with the environment at discrete time steps, generating a sequence of state-action pairs known as a trajectory τ = ((s 0 , a 0 ), ..., (s T −1 , a T −1 )), where T is the length of the trajectory. The cumulative reward of a trajectory is calculated as the sum of rewards, each discounted by a factor of γ t , where t represents the time step: P T −1 R(τ ) = t=0 γ t R(s t , a t ). At each discrete time step, the" 2312.08879v1,"Regularizing Self-supervised 3D Scene Flows with Surface Awareness and Cyclic Consistency Patrik Vacek Czech Technical University David Hurych Valeo.ai Karel Zimmermann Czech Technical University Patrick Perez Valeo.ai vacekpa2@fel.cvut.cz Tomas Svoboda Czech Technical University Abstract Learning without supervision how to predict 3D scene flows from point clouds is central to many vision systems. We propose a novel learning framework for this task which improves the necessary regularization. Relying on the assumption that scene elements are mostly rigid, current smoothness losses are built on the definition of “rigid clusters” in the input point clouds. The definition of these clusters is challenging and has a major impact on the quality of predicted flows. We introduce two new consistency losses that enlarge clusters while preventing them from spreading over distinct objects. In particular, we enforce temporal consistency with a forward-backward cyclic loss and spatial consistency by considering surface orientation similarity in addition to spatial proximity. The proposed losses are model-independent and can thus be used in a plug-and-play fashion to significantly improve the performance of existing models, as demonstrated on two top-performing ones. We also showcase the effectiveness and generalization capability of our framework on four standard sensor-unique driving datasets, achieving state-of-the-art performance in 3D scene flow estimation. Our codes are available anonymously on https://github.com/vacany/sacflow. 1. Introduction Scene flow is defined as a three-dimensional motion field of points in the physical world. As it is a key input for many fundamental computer vision and robotics tasks, such as ego-motion estimation [2, 34], instance segmentation [13, 32], scene reconstruction [19] and object detection [9], its accurate estimation is crucial. Learning-based approaches to scene flow estimation were first fully supervised as in the seminal work [22]. However, ground-truth scene flows are usually synthetic as annotation of real-world Figure 1. Proposed self-supervised scene flow framework. Selfsupervised scene flow prediction is usually trained with losses that enforce the alignment of source and target point clouds and the smoothness of the flow (L dist and L smooth respectively). We improve the latter by introducing a surface-aware loss, L surf , and a cyclic temporal consistency one, L cyc . The proposed framework outperforms the state of the art on all tested datasets. scene flows is very scarce. This makes fully-supervised methods difficult to scale and adapt to real-world use cases." 2312.08884v1,"Global Rewards in Multi-Agent Deep Reinforcement Learning for Autonomous Mobility on Demand Systems Heiko Hoppe HEIKO . HOPPE @ TUM . DE Technical University of Munich, Germany Tobias Enders TOBIAS . ENDERS @ TUM . DE Technical University of Munich, Germany Quentin Cappart QUENTIN . CAPPART @ POLYMTL . CA Polytechnique Montréal, Canada Maximilian Schiffer SCHIFFER @ TUM . DE Technical University of Munich, Germany Abstract We study vehicle dispatching in autonomous mobility on demand (AMoD) systems, where a central operator assigns vehicles to customer requests or rejects these with the aim of maximizing its total profit. Recent approaches use multi-agent deep reinforcement learning (MADRL) to realize scalable yet performant algorithms, but train agents based on local rewards, which distorts the reward signal with respect to the system-wide profit, leading to lower performance. We therefore propose a novel global-rewards-based MADRL algorithm for vehicle dispatching in AMoD systems, which resolves so far existing goal conflicts between the trained agents and the operator by assigning rewards to agents leveraging a counterfactual baseline. Our algorithm shows statistically significant improvements across various settings on real-world data compared to state-of-the-art MADRL algorithms with local rewards. We further provide a structural analysis which shows that the utilization of global rewards can improve implicit vehicle balancing and demand forecasting abilities. Our code is available at https://github.com/tumBAIS/GR-MADRL-AMoD. Keywords: multi-agent learning, credit assignment, deep reinforcement learning, autonomous mobility on demand 1. Introduction Within the coming years, in autonomous mobility on demand (AMoD) promises to significantly improve urban passenger transportation. An AMoD system enables its operator to exercise full control over the vehicle fleet, thus improving vehicle dispatching performance, provided that the operator uses an effective control algorithm. This ultimately yields increased vehicle utilization while preserving the comfort of individual mobility. By deciding which requests to accept and assigning vehicles to these requests, the operator faces a contextual multi-stage stochastic control problem. Various approaches to solve this problem exist, ranging from model predictive control (e.g., Alonso-Mora et al., 2017) to deep reinforcement learning (DRL) (e.g., Xu et al., 2018; Wang et al., 2018; Enders et al., 2023). The latter shows better performance due to its model-free nature. In this context, multi-agent approaches allow to achieve scalability to large instances. To train the agents’ policy, existing work uses local, egoistic, per-agent rewards, which can lead to sub-optimal behavior from the perspective of the central operator interested in maximizing the system-wide profit. © H. Hoppe, T. Enders, Q. Cappart & M. Schiffer." 2312.08888v1,"Read Between the Layers: Leveraging Intra-Layer Representations for Rehearsal-Free Continual Learning with Pre-Trained Models Kyra Ahrens ∗ Hans Hergen Lehmann ∗ Jae Hee Lee University of Hamburg Stefan Wermter hergen.lehmann@studium.uni-hamburg.de Abstract We address the Continual Learning (CL) problem, where a model has to learn a sequence of tasks from non-stationary distributions while preserving prior knowledge as it encounters new experiences. With the advancement of foundation models, CL research has shifted focus from the initial learning-from-scratch paradigm to the use of generic features from large-scale pre-training. However, existing approaches to CL with pre-trained models only focus on separating the class-specific features from the final representation layer and neglect the power of intermediate representations that capture low- and mid-level features naturally more invariant to domain shifts. In this work, we propose LayUP, a new class-prototype-based approach to continual learning that leverages second-order feature statistics from multiple intermediate layers of a pre-trained network. Our method is conceptually simple, does not require any replay buffer, and works out of the box with any foundation model. LayUP improves over the state-of-the-art on four of the seven class-incremental learning settings at a considerably reduced memory and computational footprint compared with the next best baseline. Our results demonstrate that fully exhausting the representational capacities of pre-trained models in CL goes far beyond their final embeddings. The code will be made publicly available upon acceptance. Pre-trained Model {kyra.ahrens,jae.hee.lee,stefan.wermter}@uni-hamburg.de Prototypes Intra-Layer Representations Figure 1. Overview of LayUP: Enriching last layer representations of pre-trained models with features from intermediate layers leads to better calibrated similarity measures for prototype-based classification and more robustness to domain gaps in the continual learning setting. training. Continual learning with pre-trained models builds on the assumption that a large all-purpose feature extractor provides strong knowledge transfer capabilities and great robustness to catastrophic forgetting [39] during incremental adaptation to downstream tasks. 1. Introduction Such methods for downstream adaptation can be categorized into two general strategies [40, 61]: (i) Carefully finetuning the pre-trained representations (full body adaptation), or (ii) keeping the pre-trained backbone fixed while learning additional parameters (such as prompts [22, 31, 35], adapters [5, 7, 19, 20, 50], or other methods [25, 34, 38]). Both strategies have in common that they do not rely on rehearsal from past data to perform well, unlike many of the top-performing CL strategies used for models trained from scratch. Despite their merits, most approaches to CL with pre-trained Continual Learning (CL) is a subfield of machine learning that focuses on enabling models to learn from a stream of data and adapt to novel concepts without forgetting previously acquired knowledge [6, 45]. While traditional works on CL primarily focus on the learning-from-scratch paradigm, the introduction of large foundation models has initiated a growing interest in developing CL methods upon the powerful representations resulting from large-scale pre- * Equal contribution. 1" 2312.08905v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 On statistical zonostrophic instability and the effect of magnetic fields 1 Chen Wang 1,2,3 †, Joanne Mason 3 and Andrew D. Gilbert 3 Research Center of Mathematics, Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai 519087, PR China 2 Department of Mathematical Sciences, BNU-HKBU United International College, Zhuhai 519087, PR China 3 Department of Mathematics and Statistics, University of Exeter, Exeter, EX4 4QF, UK (Received xx; revised xx; accepted xx) Zonal flows are mean flows in the east–west direction, which are ubiquitous on planets, and can be formed through ‘zonostrophic instability’: within turbulence or random waves, a weak large-scale zonal flow can grow exponentially to become prominent. In this paper, we study the statistical behaviour of the zonostrophic instability and the effect of magnetic fields. We use a stochastic white noise forcing to drive random waves, and study the growth of a mean flow in this random system. The dispersion relation for the growth rate of the expectation of the mean flow is derived, and properties of the instability are discussed. In the limits of weak and strong magnetic diffusivity, the dispersion relation reduces to manageable expressions, which provide clear insights into the effect of the magnetic field and scaling laws for the threshold of instability. The magnetic field mainly plays a stabilising role and thus impedes the formation of the zonal flow, but under certain conditions it can also have destabilising effects. Numerical simulation of the stochastic flow is performed to confirm the theory. Results indicate that the magnetic field can significantly increase the randomness of the zonal flow. It is found that the zonal flow of an individual realisation may behave very differently from the expectation. For weak magnetic diffusivity and moderate magnetic field strengths, this leads to considerable variation of the outcome, that is whether zonostrophic instability takes place or not in individual realisations. 1. Introduction Zonal flows are mean flows in the east–west direction, and are commonly found on Earth and other planets. They are perhaps most prominent on Jupiter, where belts of strong zonal jets are the main visible feature of its surface. Numerous studies have been undertaken to understand the properties of zonal flows. A review of this topic can be found in the recent book Galperin & Read (2019); here we summarise representative literature most relevant to our study. Rhines p (1975) identified that zonal jets have a scale associated with the wavenumber β/2U , where U is the root-mean square (rms) zonal velocity and β is the k β = gradient of the Coriolis parameter. This scale is now known as the Rhines scale. Above this length scale, the inverse cascade of turbulence is suppressed by the β-effect, and turbulence transfers energy to the zonal jets. Williams (1978) performed numerical simulations that reproduce the zonal flows on both the Earth and Jupiter. From the conditions under which zonal flows emerge, he concluded that the β-effect and forcing † Email address for correspondence: wangchen@uic.edu.cn" 2312.08912v1,"Preprint D ATASET D ISTILLATION VIA A DVERSARIAL P REDIC - TION M ATCHING Mingyang Chen 1,2 Bo Huang 1,2 Junda Lu 3 Bing Li 4 Yi Wang 5 Minhao Cheng 2 Wei Wang 1 1 The Hong Kong University of Science and Technology (Guangzhou) 2 The Hong Kong University of Science and Technology 3 CSIRO Data61, Australia 4 University of Electronic Science and Technology of China 5 Dongguan University of Technology {mchenbt,bhuangas}@connect.ust.hk, Junda.Lu@data61.csiro.au indof47@gmail.com, wangyi@dgut.edu.cn, {minhaocheng,weiwcs}@ust.hk A BSTRACT Dataset distillation is the technique of synthesizing smaller condensed datasets from large original datasets while retaining necessary information to persist the effect. In this paper, we approach the dataset distillation problem from a novel perspective: we regard minimizing the prediction discrepancy on the real data distribution between models, which are respectively trained on the large original dataset and on the small distilled dataset, as a conduit for condensing information from the raw data into the distilled version. An adversarial framework is proposed to solve the problem efficiently. In contrast to existing distillation methods involving nested optimization or long-range gradient unrolling, our approach hinges on single-level optimization. This ensures the memory efficiency of our method and provides a flexible tradeoff between time and memory budgets, allowing us to distil ImageNet-1K using a minimum of only 6.5GB of GPU memory. Under the optimal tradeoff strategy, it requires only 2.5× less memory and 5× less runtime compared to the state-of-the-art. Empirically, our method can produce synthetic datasets just 10% the size of the original, yet achieve, on average, 94% of the test accuracy of models trained on the full original datasets including ImageNet-1K, significantly surpassing state-of-the-art. Additionally, extensive tests reveal that our distilled datasets excel in cross-architecture generalization capabilities. Our code is available at https://github.com/mchen725/DD_APM/. 1 I NTRODUCTION Cutting-edge machine learning models across diverse domains are progressively dependent on extensive datasets. Nevertheless, the enormity of these datasets introduces formidable challenges in aspects such as data storage, preprocessing, model training, continual learning (Aljundi et al., 2019a; Zhao & Bilen, 2021a), and other auxiliary tasks including hyperparameter tuning (Bergstra et al., 2011; Baik et al., 2020) and architecture search (Pham et al., 2018; Jin et al., 2019). Exploring surrogate datasets emerges as a viable solution, offering comparable efficacy while significantly reducing scale. While existing research on core-set selection has underscored the feasibility of employing representative subsets from the original datasets (Chen et al., 2010; Rebuffi et al., 2017; Aljundi et al., 2019b; Toneva et al., 2019), Dataset Distillation (DD) is a nascent approach that generate new data instances not present in the original sets. This methodology notably expands the scope for optimization, potentially retaining optimal training signals from the principal dataset, and has demonstrated remarkable efficacy and effectiveness 1 . Dataset distillation via imitating the behaviour of “teacher models” acquired through training on original datasets, by the intermediary “student models” trained on distilled datasets is perceived as an effective solution (Zhao & Bilen, 2021a; Cazenavette et al., 2022). These methods utilize the teacher-student paradigm as a medium to condense knowledge from raw data into a more succinct form. Particularly, Matching Training Trajectory (MTT) frameworks (Du et al., 2023; Cui et al., 1 https://github.com/Guang000/Awesome-Dataset-Distillation 1" 2312.08916v1,"Progressive Uncertain Feature Self-reinforcement for Weakly Supervised Semantic Segmentation Jingxuan He 1 , Lechao Cheng 1 * , Chaowei Fang 3 , Zunlei Feng 2 , Tingting Mu 4 , Mingli Song 2 Zhejiang Lab, 2 Zhejiang University, 3 Xidian University, 4 University of Manchester 22021025@zju.edu.cn, chenglc@zhejianglab.com, chaoweifang@outlook.com, zunleifeng@zju.edu.cn, tingting.mu@manchester.ac.uk, brooksong@zju.edu.cn 1 Abstract Compared to conventional semantic segmentation with pixellevel supervision, Weakly Supervised Semantic Segmentation (WSSS) with image-level labels poses the challenge that it always focuses on the most discriminative regions, resulting in a disparity between fully supervised conditions. A typical manifestation is the diminished precision on the object boundaries, leading to a deteriorated accuracy of WSSS. To alleviate this issue, we propose to adaptively partition the image content into deterministic regions (e.g., confident foreground and background) and uncertain regions (e.g., object boundaries and misclassified categories) for separate processing. For uncertain cues, we employ an activation-based masking strategy and seek to recover the local information with self-distilled knowledge. We further assume that the unmasked confident regions should be robust enough to preserve the global semantics. Building upon this, we introduce a complementary self-enhancement method that constrains the semantic consistency between these confident regions and an augmented image with the same class labels. Extensive experiments conducted on PASCAL VOC 2012 and MS COCO 2014 demonstrate that our proposed single-stage approach for WSSS not only outperforms state-of-the-art benchmarks remarkably but also surpasses multi-stage methodologies that trade complexity for accuracy. The code can be found at https://github.com/Jessie459/feature-self-reinforcement. Introduction Weakly supervised semantic segmentation (WSSS) reduces the cost of annotating “strong” pixel-level labels by using “weak” labels such as bounding boxes (Dai, He, and Sun 2015; Song et al. 2019; Su et al. 2022a), scribbles (Lin et al. 2016; Vernaza and Chandraker 2017), points (Bearman et al. 2016; Su et al. 2022b) and image-level class labels (Araslanov and Roth 2020; Zhang et al. 2021a; Ru et al. 2022; Wu et al. 2023; Ru et al. 2023). Among these, imagelevel class labels are the most affordable, but challenging to exploit. A commonly used WSSS approach based on imagelevel class labels typically includes the following steps: (1) to train a neural network for image classification; (2) to use the network to generate class activation maps (CAMs) (Zhou et al. 2016) as seed regions; (3) to refine the CAMs to pseudo * corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Regions with low confidence activation value is moderate • boundaries between foreground and background • boundaries within semanticallydifferent objects Reinforce by recovering local information Image & GT uncertain regions Regions with high confidence activation value is high • person • chair activation value is low • background Reinforce by constraining global information CAM confident regions Figure 1: Our main idea. The flawed CAM only identifies discriminative regions. To solve this, we propose to partition the image into uncertain regions (e.g., object boundaries) and confident regions (e.g., the main body of an object) and reinforce features of these regions in a complementary way. segmentation labels that will be used as the ground truth for supervising a segmentation network. These steps can either be implemented as separate stages or as a single collaborative stage, and single-stage frameworks are usually more efficient as they streamline the training pipeline. In general, high-quality pseudo labels lead to superior semantic segmentation performance. In this work, we focus on developing an effective single-stage approach to generate more accurate pseudo labels from image-level class labels. Unfortunately, CAMs are essentially flawed because they are intended for classification, i.e., they strive to identify the most discriminative regions of an object for improved classification accuracy. To tackle this, one can improve the initial seeds (Lee et al. 2019; Wang et al. 2020; He et al. 2023) or refine pseudo labels (Ahn, Cho, and Kwak 2019; Chen et al. 2020a), by expanding activations or labels to semantically consistent pixels in the neighborhood. Recent studies have found that the restricted receptive field of convolution negatively affects the recognition of integral objects (Ru et al. 2022, 2023) and use vision transformer (Dosovitskiy et al. 2020) to model the global relationships for improvement. But this does not resolve the issue of CAM seeds or pseudo labels, and we still observe empirically high uncer-" 2312.08938v1,"QUANTITATIVE WEIGHTED ESTIMATES FOR THE MULTILINEAR PSEUDO-DIFFERENTIAL OPERATORS IN FUNCTION SPACES JIAWEI TAN AND QINGYING XUE ∗ Abstract. In this paper, the weighted estimates for multilinear pseudo-differential operators were systematically studied in rearrangement invariant Banach and quasi- Banach spaces. These spaces contain the Lebesgue space, the classical Lorentz space and Marcinkiewicz space as typical examples. More precisely, the weighted boundedness and weighted modular estimates, including the weak endpoint case, were established for multilinear pseudo-differential operators and their commutators. As applications, we show that the above results also hold for the multilinear Fourier multipliers, multilinear square functions, and a class of multilinear Calderón-Zygmund operators. 1. Introduction and main results The main purpose of the article is to establish the weighted boundedness of the multilinear pseudo-differential operators in the rearrangement invariant Banach and quasi-Banach spaces, and establish the associated modular inequalities. The study of the pseudo-differential operators can be traced back to the celebrated works of Kohn and Nirenberg [36] and Hörmander [29]. As was well known, the pseudodifferential operators play an important role in Harmonic analysis as well as in other fields, such as PDEs and mathematical physics. Particularly, the theory of the pseudo-differential operators has not only been widely used in quantum field and exponential theory, but also played an indispensable role in the first proof of the Atiyah-Singer index theorem [3]. Further important applications were given in the works of Hörmander [28] and Fefferman and Kohn [25]. A generalized class of pseudo-differential operators related to hypoelliptic equations was introduced in [28] and applied to study the existence and regularity of the solutions. By using the tools of microlocal analysis and the pseudo-differential operators on R 3 , Fefferman and Kohn [25] obtained the optimal Hölder estimates for the Bergman projection. The corresponding estimates for the Szegö projection on 3-D CR manifolds of finite type were also given in [25]. We now consider the boundedness of the pseudo-differential operators on Lebesgue spaces and Hardy spaces. The minimum smoothness and decay conditions assumed on the symbols to guarantee their boundedness in these function spaces are what we are interested in. To make the statement of known results clearly, we need to introduce some definitions and briefly describe the literature of this problem. Definition 1.1 (Hörmander’s class). Let m ∈ N, r ∈ R and 0 ≤ ρ, δ ≤ 1, σ is a smooth r (n, m) if for each triple of multi-indices function defined on R n × R mn . We say σ ∈ S ρ,δ α := (α 1 , . . . , α n ) and β 1 , . . . , β m , there exists a constant C α,β such that ~ ≤ C α,β (1 + |ξ 1 | + · · · + |ξ m |) r−ρ ∂ x α ∂ ξ β 1 1 · · · ∂ ξ β m m σ(x, ξ) P m j=1 |β j |+δ|α| . Date: December 15, 2023. Key words and phrases. pseudo-differential operators, commutators, sparse operators, modular inequalities 2020 Mathematics Subject Classification. Primary 42B20, Secondary 42B35. The authors were partly supported by the National Key R&D Program of China (No. 2020YFA0712900) and NNSF of China (No. 12271041). ∗ Corresponding author, e-mail address: qyxue@bnu.edu.cn. 1" 2312.08948v1,"LSTM NETWORK ANALYSIS OF VEHICLE-TYPE FATALITIES ON GREAT BRITAIN’S ROADS Abiodun Finbarrs Oketunji ∗ University of Oxford Oxford, United Kingdom abiodun.oketunji@conted.ox.ac.uk James Hanify † Driver and Vehicle Standards Agency Nottingham, United Kingdom james.hanify@dvsa.gov.uk Abstract 1 Salter He�ron-Smith ‡ Driver and Vehicle Standards Agency Swansea, United Kingdom salter.he�ronsmith@dvsa.gov.uk Introduction This study harnesses the predictive capabilities of Long Short- Term Memory (LSTM) networks to analyse and predict road tra�c accidents in Great Britain. It addresses the challenge of tra�c accident forecasting, which is paramount for devising e�ective preventive measures. We utilised an extensive dataset encompassing reported collisions, casualties, and vehicles involvements from 1926 to 2022, provided by the Department for Transport (DfT). The data underwent stringent processing to rectify missing values and normalise features, ensuring robust LSTM network input. 1.1 Road Tra�c Accidents: A Persistent Challenge Road Tra�c Accidents (RTAs) in the Great Britain remain a signi�cant public health and safety challenge despite advancements in vehicle safety and roadway engineering. The Department for Transport (DfT) reports that in 2019, there were 153,158 casualties of all severities in reported road traf- �c accidents in Great Britain (Department for Transport, 2020) [1]. This statistic underscores the persistent nature of road tra�c accidents and the need for innovative approaches to mitigate their impact. Our methodology entailed the deployment of an LSTM model, capitalising on its pro�ciency in managing time-series data to unravel patterns and forecast accident trends. Quantitative evaluation of the model’s predictive performance through Root Mean Squared Error (RMSE) and Mean Absolute Error(MAE) provided insightful benchmarks for the LSTM’s accuracy. 1.2 Additionally, a trend analysis illustrated the temporal dynamics of road user fatalities, underscoring signi�cant �uctuations and enabling a nuanced understanding of accident prevalence over time. The results demonstrated LSTM’s substantial potential in forecasting, albeit with room for re�nement. The discussion synthesises the model’s implications, reconciling its computational forecasts with real-world applicability and aligning with contemporary scholarly discourse. We concluded the analysis by asserting the need to enhance LSTM predictive precision in future research by accounting for the interplay of socioeconomic factors and technological advancements in tra�c dynamics; it reinforces the premise that advanced machine learning techniques like LSTM can signi�cantly improve road safety. Keywords LSTM, Trend Analysis, Road Tra�c Accidents, Road Safety, Road Casualties, Policy Making ∗ Engineering Manager (Data/Software Engineer) † Senior Data Engineer ‡ ETL Developer LSTM Networks in Tra�c Accident Analysis Long Short-Term Memory (LSTM) networks, a recurrent neural network, have opened new avenues in tra�c accident analysis and prediction. LSTMs are particularly adept at handling time-series data, making them well-suited for analysing and predicting trends in road tra�c accidents, which are inherently temporal in nature (Hochreiter & Schmidhuber, 1997) [2]. Their capacity to retain information over extended periods enables a more subtle understanding of the elements contributing to accidents. 1.3 Objectives and Scope of the Study This research focuses on leveraging the predictive power of LSTM networks to examine and forecast road tra�c incidents in Great Britain. It employs a comprehensive dataset covering 1926 to 2022, aiming to provide valuable insights into the patterns of road tra�c accidents over time. The goal is to o�er predictive tools for developing impactful road safety policies. 1.4 Signi�cance and Contribution to the Field The signi�cance of this study lies in its potential to contribute to reducing road tra�c accidents through advanced predictive analytics. By leveraging LSTM networks, the research o�ers a novel approach to tra�c safety, potentially in�uencing policy and preventive measures. This study’s �ndings could contribute to shaping future road safety initiatives in Great Britain and globally." 2312.08952v1,"UCMCTrack: Multi-Object Tracking with Uniform Camera Motion Compensation Kefu Yi 1 * , Kai Luo 2 , Xiaolei Luo 2 , Jiangui Huang 2 , Hao Wu 2 , Rongdong Hu 3 , Wei Hao 1 * 1 School of Traffic and Transportation, Changsha University of Science and Technology, Changsha, China College of Automotive and Mechanical Engineering, Changsha University of Science and Technology, Changsha, China 3 Changsha Intelligent Driving Institute, Changsha, China {corfyi, haowei}@csust.edu.cn Abstract 66.0 Multi-object tracking (MOT) in video sequences remains a challenging task, especially in scenarios with significant camera movements. This is because targets can drift considerably on the image plane, leading to erroneous tracking outcomes. Addressing such challenges typically requires supplementary appearance cues or Camera Motion Compensation (CMC). While these strategies are effective, they also introduce a considerable computational burden, posing challenges for real-time MOT. In response to this, we introduce UCMCTrack, a novel motion model-based tracker robust to camera movements. Unlike conventional CMC that computes compensation parameters frame-by-frame, UCM- CTrack consistently applies the same compensation parameters throughout a video sequence. It employs a Kalman filter on the ground plane and introduces the Mapped Mahalanobis Distance (MMD) as an alternative to the traditional Intersection over Union (IoU) distance measure. By leveraging projected probability distributions on the ground plane, our approach efficiently captures motion patterns and adeptly manages uncertainties introduced by homography projections. Remarkably, UCMCTrack, relying solely on motion cues, achieves state-of-the-art performance across a variety of challenging datasets, including MOT17, MOT20, Dance- Track and KITTI, with an exceptional speed of over 1000 FPS on a single CPU. More details and code are available at https://github.com/corfyi/UCMCTrack. 65.5 Introduction At the core of tracking-by-detection paradigm of multiobject tracking (MOT) is the accurate association of detections with tracked objects. Motion cues are widely used due to their effectiveness and simplicity. However, the application of motion model in scenarios with frequent camera movement is highly challenging. This issue is usually addressed by applying additional appearance cues or performing frame-by-frame Camera Motion Compensation (CMC) on video captured by the moving camera. While effective, these additional measures introduce a non-negligible computational burden, posing a obstacle for real-time MOT. Thus, a pertinent question arises: Is it possible to employ motion cues in MOT that are robust to camera movement * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. UCMCTrack+(ours) MOT17 test MotionTrack& SparseTrack 65.0 HOTA 2 StrongSORT 64.5 C-BIoU ByteTrack 63.0 62.5 62.0 Deep OCSORT UCMCTrack(ours) 64.0 63.5 Bot-SORT OC-SORT Quo Vadis GHOST FCG 77 78 appearance & motion motion 79 80 81 82 IDF1 Figure 1: IDF1-HOTA-AssA comparisons of different trackers on the test set of MOT17. The horizontal axis is IDF1,the vertical axis is HOTA, and the radius of circle is AssA. Our UCMCTrack+ achieves 65.8 HOTA, 81.1 IDF1 on MOT17 test, possessing significant competitiveness compared to SOTA trackers. Details are given in Table 1. without resorting to the cumbersome frame-by-frame CMC? Our answer is YES. We have developed a pure motion model-based multi-object tracker that is robust to camera movement. For the same video sequence, it suffices to use the same camera motion compensation parameters, rather than computing the camera motion compensation parameters for every frame as traditional CMC does. We choose to model the target’s motion using a simple Kalman filter on the ground plane, instead of on the imaging plane as most MOT algorithms do, and effectively compensate the motion estimation errors caused by camera movement through the process noise parameters of the Kalman filter. We abandon the commonly used Intersection over Union (IoU) , and instead propose the Mapped Mahalanobis Distance (MMD). It computes the projected probability distribution on the ground plane, and utilizes the Mahalanobis distance to calculate the matching costs between targets. It not only effectively leverages the underlying motion patterns of the targets on the ground plane but also efficiently handles the uncertainties" 2312.08958v1,"LiFT: Unsupervised Reinforcement Learning with Foundation Models as Teachers Taewook Nam 1∗ Juyong Lee 1∗ Jesse Zhang 2 Sung Ju Hwang 1 Joseph J. Lim 1 Karl Pertsch 3,4 1 KAIST 2 University of Southern California 3 University of California, Berkeley 4 Stanford University {namsan,agi.is}@kaist.ac.kr Abstract We propose a framework that leverages foundation models as teachers, guiding a reinforcement learning agent to acquire semantically meaningful behavior without human feedback. In our framework, the agent receives task instructions grounded in a training environment from large language models. Then, a vision-language model guides the agent in learning the multi-task language-conditioned policy by providing reward feedback. We demonstrate that our method can learn semantically meaningful skills in a challenging open-ended MineDojo environment while prior unsupervised skill discovery methods struggle. Additionally, we discuss observed challenges of using off-the-shelf foundation models as teachers and our efforts to address them. 1 Introduction A longstanding goal of robot learning and reinforcement learning (RL) is to train general agents that can perform a wide variety of helpful tasks in many different environments. Recently, researchers have used imitation learning and RL to train such general agents [1–7], but these methods generally require costly supervision in the form of large-scale human demonstration datasets, which is hard to scale. Unsupervised RL attempts to mitigate this issue by equipping agents with diverse skills through unsupervised learning objectives. Prior work generally teaches agents skills by optimizing information-theoretic diversity measures [8–13], but the learned skills are often meaningless for downstream tasks as diversity measures do not induce meaningful skills. Imagine if instead, an agent deployed in a new environment had a human teacher, e.g., a robot dropped into a hospital with medical staff teaching them to perform important hospital duties. Not only would the teacher be able to guide the agent towards meaningful tasks to learn (e.g., finding certain medicines, checking on patients, etc.), but also the teacher could give feedback about how well the agent performed the task. This is a clear intuitive way of teaching agents, but the required supervision is too costly to scale. Can we teach RL agents in this manner but without human supervision? Our key insight is to use foundation models (FMs) as teachers; by leveraging the common sense knowledge captured in FMs through web-scale pre-training, the agent can learn semantically meaningful behaviors, similar to how human teachers can steer the agent’s learning process. Prior works have indeed demonstrated that the knowledge captured by FMs is useful for recognizing diverse objects [14], executable tasks [15–18] and task successes [19–22]. In this work, we leverage FMs to design an unsupervised RL approach to learn complex visuomotor tasks in lieu of any human supervision over what tasks to learn or how to reward the agent for those tasks. ∗ Equal contribution. 2nd Workshop on Agent Learning in Open-Endedness (ALOE) at NeurIPS 2023." 2312.08977v1,"Weighted Ensemble Models Are Strong Continual Learners Imad Eddine Marouf 1 1 Subhankar Roy 2 Enzo Tartaglione 1 Stéphane Lathuilière 1 LTCI, Télécom-Paris, Institut Polytechnique de Paris 2 University of Aberdeen imad.marouf@ip-paris.fr Abstract In this work we study the problem of continual learning (CL) where the goal is to learn a model on a sequence of tasks, such that the data from the previous tasks becomes unavailable while learning on the current task data. CL is essentially a balancing act between being able to learn on the new task (i.e plasticity) and maintaining the performance on the previously learned concepts (i.e stability). With an aim to address the stability-plasticity trade-off we propose to perform weight-ensembling of the model parameters of the previous and current task. This weight-ensembled model, which we call Continual Model Averaging (or CoMA), attains high accuracy on the current task by leveraging plasticity, while not deviating too far from the previous weight configuration, ensuring stability. We also propose an improved variant of CoMA, named Continual Fisher-weighted Model Averaging (or CoFiMA), that selectively weighs each parameter in the weight ensemble by leveraging the Fisher information of the weights of the model. Both the variants are conceptually simple, easy to implement and effective in attaining state-ofthe-art performance on several standard CL benchmarks. 1 1. Introduction Deep learning models have achieved impressive results in many tasks such as image classification [11, 20], object detection [64] and semantic segmentation [27]. These advances are largely due to training with extensive offline datasets [8, 54] for a finite set of categories. Contrary to these controlled conditions, real-world applications often involve continuous learning from data streams that introduce novel categories [17, 19]. This process typically results in catastrophic forgetting (CF) [17], where the acquisition of new information leads to the erosion of the previously learned knowledge. Continual Learning (CL) 1 Code is available: https://github.com/IemProg/CoFiMA Figure 1. Comparison of CoFiMA with sequential fine-tuning in Continual Learning. In sequential finetuning, the model from the previous task serves as the starting point for the current task. Conversely, CoFiMA employs an averaging strategy: the model from the previous task t−1 is merged with the one fine-tuned on the current task t, using a Fisher-weighted averaging (FWA) technique. emerges as a solution, allowing models to assimilate new classes from the temporal data stores while retaining classification capabilities for the previously learned classes using a unified classifier [37]. In prior work on CL, the common approach is to train the networks (usually ResNets [20]) from scratch on the current task while regularizing them to counteract forgetting [37, 70]. The emergence of pre-trained models (PTMs) [11, 13, 50] (i.e Vision Transformer (ViT) [11, 36]), trained on large datasets such as ImageNet [54], has provided an effective alternative for CL tasks [66, 71–73, 84]. PTM-based CL methods [72, 73, 82] enhance data efficiency and consistently excel over traditional CL methods. In particular, Zhang et al. [82] showed that a simple solution such as sequential fine-tuning using PTMs yields competitive results, outperforming modern CL approaches involving prompting [72, 73] and the traditional ones using regularization [28, 33]. This is further validated in recent works [12, 40], where it has been shown that PTMs, owing to their strong and diverse pre-training, are inherently less susceptible to catastrophic forgetting. Despite the significant advancements in CL with PTMs, there remains a challenge in achieving an optimal balance" 2312.08981v1,"Matching Noisy Keys for Obfuscation Charlie Dickens Eric Bax Yahoo! charlie.dickens@yahooinc.com Yahoo! ebax@yahooinc.com Abstract—Data sketching has emerged as a key infrastructure for large-scale data analysis on streaming and distributed data. Merging sketches enables efficient estimation of cardinalities and frequency histograms over distributed data. However, merging sketches can require that each sketch stores hash codes for identifiers in different data sets or partitions, in order to perform effective matching. This can reveal identifiers during merging or across different data set or partition owners. This paper presents a framework to use noisy hash codes, with the noise level selected to obfuscate identifiers while allowing matching, with high probability. We give probabilistic error bounds on simultaneous obfuscation and matching, concluding that this is a viable approach. Index Terms—data sketches, big data, privacy, information theory I. I NTRODUCTION Large data sets are now used across a variety of domains, including biosciences, language processing, and online advertising. Despite the variety of applications, data analysis at scale often requires answering a common set of similar queries for different data sets [1]–[4]. For example, estimating the number of unique identifiers in a dataset is called the count distinct problem. Another canonical problem is the frequency estimation problem – estimating the distribution of item frequencies over items in a data set. For small data sets, these queries are simple to evaluate. However, streaming and/or distributed data sets are much more challenging. For them, there are a range of useful algorithms, known as sketching algorithms or data sketches, that make a single pass through the data, in parallel for distributed data sets, maintaining a small data structure in memory, called a sketch. Sketches from multiple data sets can be merged to form a single sketch for the combined data set, and sketches maintain data sufficient to compute estimates that are accurate, with high confidence. Such mergeable sketches have seen widespread use in industry, for example in Google’s BigQuery engine [5] and in the open-source Apache DataS- ketches library [6]. After processing, a merged sketch can be stored independently of the sketches from which it was built, and it can be used to answer multiple queries about the entire data set. Conceptually, traditional mergeable sketches operate in a paradigm where the entity sketching the data is the same as the entity merging the sketches. However, with changing privacy regulations [7], this assumption may be invalid. For example, a multinational company may own data warehouses in jurisdictions with differing privacy regulations which could prevent data-sharing across geographies even within the same organization. Rather than sending raw data, which could contravene regulation (and is slow at scale), organizations can send sketches to efficiently answer queries over data from multiple locations, if the data sketches can be shown to preserve privacy. More generally, entities holding data may differ from the entity wishing to answer a query. For example, an online advertising broker that runs campaigns across different vendors needs to estimate statistics for advertising campaigns over multiple vendors, yet the vendors want to avoid revealing sensitive statistics or data to the broker or other vendors. As a solution, vendors can send data sketches with sufficient noise to obfuscate each vendor’s contribution to query results over the combined data. This has prompted novel multiparty computation and communication models for aggregating statistics, as presented in [8]–[10]. One challenge in developing such combined estimates is that merging many sketches relies on a key feature of hashing: that the same input always maps to the same output. Some sketches hash identifiers to produce hash codes, then transmit hash code-value pairs as the sketch, where the value is a count or some other number, for example Bottom-k–type sketches [11]–[13]. But using the hash codes as keys to compare allows parties with the hash function to hash identifiers and compare them to the hash codes transmitted in data sketches. If they match, then the party can infer, with high probability, that the identifier was contained in the data that generated the sketch. We address the issue of key obfuscation in this paper which is necessary in sketches that rely on key matching in the merge step such as [10], [13]. Data privacy research more often addresses obfuscation of the values [14], [15] but both are important in practice. Our work addresses how to merge based on keys among untrusted parties, to understand how sketches with non-matching hashes can be merged. In particular, we assume that entities sketching the data and merging the sketches do not trust each other. This invalidates the approach of [16] who assume that the hash function seed is a secret shared among those parties, and do not add noise to the hash codes. While we use noise to achieve obfuscation, another option is to encrypt the sketch prior to merging, but this is time- and resource-intensive [10]. Our contribution is to design a noisy hashing scheme that permits matching among noisy hashes and only has a small, controllable probability of revealing any true hash code shared by two non-trusting entities. We achieve this by using a hash function with a seed shared" 2312.08999v1,"Conformalised data synthesis with statistical quality guarantees Julia A. Meister 1* and Khuong An Nguyen 2 1 Computing and Maths Division, University of Brighton, Lewes Road, Brighton, BN2 4AT, East Sussex, UK. 2 Department of Computer Science, Royal Holloway, University of London, Egham Hill, Egham, TW20 0EX, Surrey, UK. *Corresponding author(s). E-mail(s): J.Meister@brighton.ac.uk; Contributing authors: Khuong.Nguyen@rhul.ac.uk; Abstract With the proliferation of ever more complicated Deep Learning architectures, data synthesis is a highly promising technique to address the demand of datahungry models. However, reliably assessing the quality of a ‘synthesiser’ model’s output is an open research question with significant associated risks for high-stake domains. To address this challenge, we have designed a unique confident data synthesis algorithm that introduces statistical confidence guarantees through a novel extension of the Conformal Prediction framework. We support our proposed algorithm with theoretical proofs and an extensive empirical evaluation of five benchmark datasets. To show our approach’s versatility on ubiquitous real-world challenges, the datasets were carefully selected for their variety of difficult characteristics: low sample count, class imbalance and non-separability, and privacy-sensitive data. In all trials, training sets extended with our confident synthesised data performed at least as well as the original, and frequently significantly improved Deep Learning performance by up to +65% F 1 -score. Keywords: Conformal Prediction, uncertainty quantification, statistical confidence, synthetic data, data generation MSC Classification: 68T37 1" 2312.09018v1,"Fault Diagnosis and Prognosis Capabilities for Wind Turbine Hydraulic Pitch Systems: An Overview Alessio Dallabona a,∗ , Mogens Blanke a , Henrik C. Pedersen b , Dimitrios Papageorgiou a a Department of Electrical and Photonics Engineering, Technical University of Denmark, Elektrovej 326, Lyngby, 2800, Denmark b Department of Energy Technology, Aalborg University, Pontoppidanstræde 111, Aalborg, 9220, Denmark Abstract Wind energy is the leading non-hydro renewable technology. Increasing reliability is a key factor in reducing the downtime of high-power wind turbines installed in remote off-shore places, where maintenance is costly and less reactive. Defects in the pitch system are responsible for up to 20% of a wind turbine downtime. Thus, prognosis and condition monitoring of such defects are essential for avoiding downtime. This paper presents a generic assessment of diagnosis capabilities in hydraulic pitch systems characterizing high-power wind turbines. A mathematical model of the non-linear system dynamics is presented along with a description of the most frequent faults that can affect it. Structural analysis is employed to assess the diagnosis and prognosis capabilities of defects in the pitch system. The structural properties are furthermore explored to investigate possible sensor reduction without compromising fault diagnosis capabilities. Keywords: fault diagnosis, condition monitoring, wind turbine, pitch system, hydraulic actuator, fluid power systems Corresponding author. Email addresses: aldall@dtu.dk (Alessio Dallabona), mobl@dtu.dk (Mogens Blanke), hcp@energy.aau.dk (Henrik C. Pedersen), dimpa@dtu.dk (Dimitrios Papageorgiou) ∗ Preprint submitted to Renewable Energy December 15, 2023" 2312.09037v1,"Impact of Ground Truth Quality on Handwriting Recognition Michael Jungo ∗ Lars Vögtlin ∗ Atefeh Fakhari michael.jungo@hefr.ch University of Fribourg and HES-SO Fribourg, Switzerland lars.voegltin@unifr.ch University of Fribourg Fribourg, Switzerland atefeh.fakhari@unifr.ch University of Fribourg Fribourg, Switzerland Nathan Wegmann Rolf Ingold Andreas Fischer nathan.wegmann@unifr.ch University of Fribourg Fribourg, Switzerland rolf.ingold@unifr.ch University of Fribourg Fribourg, Switzerland andreas.fischer@hefr.ch University of Fribourg and HES-SO Fribourg, Switzerland Anna Scius-Bertrand anna.scius-bertrand@hefr.ch University of Fribourg and HES-SO Fribourg, Switzerland Figure 1: An extract of a letter from the Bullinger dataset. ABSTRACT CCS CONCEPTS Handwriting recognition is a key technology for accessing the content of old manuscripts, helping to preserve cultural heritage. Deep learning shows an impressive performance in solving this task. However, to achieve its full potential, it requires a large amount of labeled data, which is difficult to obtain for ancient languages and scripts. Often, a trade-off has to be made between ground truth quantity and quality, as is the case for the recently introduced Bullinger database. It contains an impressive amount of over a hundred thousand labeled text line images of mostly premodern German and Latin texts that were obtained by automatically aligning existing page-level transcriptions with text line images. However, the alignment process introduces systematic errors, such as wrongly hyphenated words. In this paper, we investigate the impact of such errors on training and evaluation and suggest means to detect and correct typical alignment errors. • Computing methodologies → Object recognition. ∗ Both authors contributed equally to this research. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). SOICT 2023, December 7–8, 2023, Ho Chi Minh, Vietnam © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0891-6/23/12. https://doi.org/10.1145/3628797.3628976 KEYWORDS Handwriting recognition, Diplomatic transcription, Ground truth improvement, Deep Learning, Historical document, Hyphenated word ACM Reference Format: Michael Jungo, Lars Vögtlin, Atefeh Fakhari, Nathan Wegmann, Rolf Ingold, Andreas Fischer, and Anna Scius-Bertrand. 2023. Impact of Ground Truth Quality on Handwriting Recognition. In The 12th International Symposium on Information and Communication Technology (SOICT 2023), December 7–8, 2023, Ho Chi Minh, Vietnam. ACM, New York, NY, USA, 6 pages. https: //doi.org/10.1145/3628797.3628976 1 INTRODUCTION Libraries worldwide are in the process of digitizing millions of handwritten documents to preserve our cultural heritage. In order to access the textual content of these documents and make them available in digital libraries, handwritten text recognition (HTR) is needed. The automatic transcription of handwriting images to machine-readable text is a challenging problem, considering the large number of historical scripts, languages, writing supports, and writing instruments used [9]. Furthermore, many ancient languages" 2312.09046v1,"High-contrast random systems of PDEs: homogenisation and spectral theory Matteo Capoferri ∗ Mikhail Cherdantsev † Igor Velčić ‡ 15th December 2023 Abstract We develop a qualitative homogenisation and spectral theory for elliptic systems of partial differential equations in divergence form with highly contrasting (i.e., non uniformly elliptic) random coefficients. The focus of the paper is on the behaviour of the spectrum as the heterogeneity parameter tends to zero; in particular, we show that in general one doesn’t have Hausdorff convergence of spectra. The theoretical analysis is complemented by several explicit examples, showcasing the wider range of applications and physical effects of systems with random coefficients, when compared with systems with periodic coefficients or with scalar operators (both random and periodic). Keywords: high-contrast media, random media, stochastic homogenisation, systems of PDEs. 2020 MSC classes: primary 74S25, 74A40; secondary 35B27, 74Q15, 35B40, 60H15, 35P05. Contents 1 Introduction Structure of the paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 4 2 Statement of the problem 2.1 Probabilistic and geometric setting . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Our mathematical model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . List of notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 9 10 3 Main results 11 4 The limiting operator and its spectrum 12 5 Spectral convergence 19 5.1 Upper bound for the limiting spectrum . . . . . . . . . . . . . . . . . . . . . . . . 20 5.2 Lower bound on the limiting spectrum . . . . . . . . . . . . . . . . . . . . . . . . 24 ∗ Maxwell Institute for Mathematical Sciences, Edinburgh and Department of Mathematics, Heriot-Watt University, Edinburgh EH14 4AS, UK; m.capoferri@hw.ac.uk, https://mcapoferri.com. † School of Mathematics, Cardiff University, Senghennydd Road, Cardiff CF24 4AG, UK; CherdantsevM@cardiff.ac.uk. ‡ Faculty of Electrical Engineering and Computing, University of Zagreb, Unska 3, 10000 Zagreb, Croatia; igor.velcic@fer.hr. 1" 2312.09053v1,"111 A Survey on Green Computing in Video Games: The Dawn of Green Video Games CARLOS PÉREZ, Universidad San Jorge, Spain and Universitat Politècnica de València, Spain ANA C. MARCÉN, Universidad San Jorge, Spain JAVIER VERÓN, Universidad San Jorge, Spain and Universitat Politècnica de València, Spain CARLOS CETINA, Universidad San Jorge, Spain Today, the large number of players and the high computational requirements of video games have motivated research on Green Video Games. We present a survey that provides an overview of this recent research area. A total of 2,637 papers were reviewed, selecting 69 papers as primary studies for further analysis. Through a detailed analysis of the results, we propose a new way to define the Green Video Game issues based on motivation, device, and layer of the primary studies. Then, we analyze the different applied techniques, the limitations and levels of evidence, and specific aspects of video games. CCS Concepts: • General and reference → Surveys and overviews; • Hardware → Impact on the environment; • Applied computing → Computer games. Additional Key Words and Phrases: Green Computing, Green Software, Video Games, Energy-Efficiency, Green Video Games ACM Reference Format: Carlos Pérez, Ana C. Marcén, Javier Verón, and Carlos Cetina. 2018. A Survey on Green Computing in Video Games: The Dawn of Green Video Games. Proc. ACM Meas. Anal. Comput. Syst. 37, 4, Article 111 (August 2018), 35 pages. https: //doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Video games are no longer a niche hobby but a mass phenomenon. Today, the number of video game players is estimated to be approximately three billion worldwide [3] [4]. This figure is expected to continue to grow considerably in the coming years. Video game players use everything from game consoles that are created specifically for playing video games to computers or even mobiles. These computers or mobiles are usually high-performance devices and are known as gaming computers or mobiles. In addition, it is very common for video games to also need a network infrastructure and servers to get from the popular online games to the latest cloud gaming platforms such as Xbox Cloud Gaming [5] or Geforce Now [2]. The combination of the large number of players (i.e., users) with the high computational requirements of modern video games has motivated recent research work in the field of what we call Green Video Games. We Authors’ addresses: Carlos Pérez, cperez@usj.es, Universidad San Jorge, Campus Universitario, Autovía Mudéjar, km. 299, Villanueva de Gállego, Zaragoza, Spain, 50830 and Universitat Politècnica de València, Camí de Vera, s/n, Valencia, Spain, 46022; Ana C. Marcén, acmarcen@usj.es, Universidad San Jorge, Campus Universitario, Autovía Mudéjar, km. 299, Villanueva de Gállego, Zaragoza, Spain, 50830; Javier Verón, jveron@usj.es, Universidad San Jorge, Campus Universitario, Autovía Mudéjar, km. 299, Villanueva de Gállego, Zaragoza, Spain, 50830 and Universitat Politècnica de València, Camí de Vera, s/n, Valencia, Spain, 46022; Carlos Cetina, ccetina@usj.es, Universidad San Jorge, Campus Universitario, Autovía Mudéjar, km. 299, Villanueva de Gállego, Zaragoza, Spain, 50830. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. 2476-1249/2018/8-ART111 $15.00 https://doi.org/XXXXXXX.XXXXXXX Proc. ACM Meas. Anal. Comput. Syst., Vol. 37, No. 4, Article 111. Publication date: August 2018." 2312.09056v1,"ReCoRe: Regularized Contrastive Representation Learning of World Model Rudra P.K. Poudel Harit Pandya Stephan Liwicki Cambridge Research Laboratory Toshiba Europe Limited, UK Roberto Cipolla Department of Engineering University of Cambridge, UK first-name.last-name@toshiba.eu rc10001@cam.ac.uk True depth World-model depth predictions Abstract While recent model-free Reinforcement Learning (RL) methods have demonstrated human-level effectiveness in gaming environments, their success in everyday tasks like visual navigation has been limited, particularly under significant appearance variations. This limitation arises from (i) poor sample efficiency and (ii) over-fitting to training scenarios. To address these challenges, we present a world model that learns invariant features using (i) contrastive unsupervised learning and (ii) an intervention-invariant regularizer. Learning an explicit representation of the world dynamics i.e. a world model, improves sample efficiency while contrastive learning implicitly enforces learning of invariant features, which improves generalization. However, the naı̈ve integration of contrastive loss to world models fails due to a lack of supervisory signals to the visual encoder, as world-model-based RL methods independently optimize representation learning and agent policy. To overcome this issue, we propose an intervention-invariant regularizer in the form of an auxiliary task such as depth prediction, image denoising, etc., that explicitly enforces invariance to style-interventions. Our method outperforms current stateof-the-art model-based and model-free RL methods and significantly on out-of-distribution point navigation task evaluated on the iGibson benchmark. We further demonstrate that our approach, with only visual observations, outperforms recent language-guided foundation models for point navigation, which is essential for deployment on robots with limited computation capabilities. Finally, we demonstrate that our proposed model excels at the sim-to-real transfer of its perception module on Gibson benchmark. Image Appearance variations Figure 1. Out-of-distribution depth prediction from world model. ReCoRe learns robust representations that are invariant to appearance variations which help in generalization of downstream task. Notice the consistent depth predictions despite texture variations on iGibson evaluation set. servations. As a result they require a large number of training samples, which makes it difficult to deploy them on real robots where obtaining a large amount of training data is resource intensive, especially for safety critical tasks such as autonomous navigation [9]. On the contrary, in model-based RL, an explicit predictive model of the world is learned i.e. world model, enabling the agent to plan by thinking ahead [6, 10, 13, 31]. The world model is learned separately from the policy, therefore, the policy can use the world model as a surrogate for real world. Consequently, model-based methods have higher sample efficiency [10, 13] making them more suitable in real environments since they can be trained with a small amount of data. Nevertheless, even current model-based RL struggles with generalization, as model-based approaches have to learn the world model purely from experience, which poses several challenges. The central issue is the training bias in the model, which can be exploited by an agent, which leads to poor performance when deployed [10]. Another issue is that the latent representation is learned from a reconstruction loss, for example, the state abstraction of variational autoencoders (VAE) [18], is not sufficient to separate the task relevant states from irrelevant ones. Hence, the RL policy may still over-fit to environment-specific characteristics [40]. Thus, the aim of this paper is invariant features ab- 1. Introduction In recent years, deep RL algorithms have been successfully employed for designing optimal strategies for games [25, 31] and shown a promise for controlling robots [21, 35]. Model-free RL approaches learn the policy along with the visual encoder in an end-to-end fashion from raw ob- 1" 2312.09066v1,"CMOSE: Comprehensive Multi-Modality Online Student Engagement Dataset with High-Quality Labels Wu Chi hsuan 1 , Shih-yang Liu 1 , Xijie Huang 1 , Xingbo Wang 1 , Rong Zhang 1 , Luca Minciullo 2 , Wong Kai Yiu 2 , Kenny Kwan 2 , Kwang-Ting Cheng 1 1 Hong Kong University of Science and Technology 2 LifeHikes {cwuau, sliuau, xhuangbs, xingbo.wang, rzhangab} @connect.ust.hk {luca.minciullo, tim.wong, kenny.kwan} @lifehikes.com Abstract Online learning is a rapidly growing industry due to its convenience. However, a major challenge in online learning is whether students are as engaged as they are in face-to-face classes. An engagement recognition system can significantly improve the learning experience in online classes. Current challenges in engagement detection involve poor label quality in the dataset, intra-class variation, and extreme data imbalance. To address these problems, we present the CMOSE dataset, which contains a large number of data in different engagement levels and high-quality labels generated according to the psychological advice. We demonstrate the advantage of transferability by analyzing the model performance on other engagement datasets. We also develop a training mechanism, MocoRank, to handle the intra-class variation, the ordinal relationship between different classes, and the data imbalance problem. MocoRank outperforms prior engagement detection losses, achieving a 1.32% enhancement in overall accuracy and 5.05% improvement in average accuracy. We further demonstrate the effectiveness of multi-modality by conducting ablation studies on features such as pre-trained video features, high-level facial features, and audio features. Introduction Online learning has greatly drawn people’s attention in recent years. The outbreak of COVID-19 also increased the demand for online classes. However, people doubt whether online classes are as effective as face-to-face classes. Research has also shown that students often have a lower attention level in online classes (Smith and Schreder 2021). Therefore, detecting student engagement in online classes is essential to improve the learning effect. Existing Datasets such as DAiSEE (Gupta et al. 2016) and EngageWild (Kaur et al. 2018) that were collected for engagement prediction tasks separate the degree of engagement into four classes, namely highly disengaged (HD), disengaged (DE), engaged (EG), and highly engaged (HE). In this work, we also formulate the problem of engagement detection into classifying the degree of engagement of each subject into four classes. To capture the nuance difference in the engagement level of different subjects, we let the model output a scalar as the engagement score and further assign the class based on a set of thresholds. A model capable of classifying students’ engagement levels can inform the instructors to pay caution to specific participants and reflect Human Recognition Split by time stamped utterances Openface Action Units Gaze Direction Head Pose I3D Visual Features TalkNet Speaking or not ParselMouth Acoustics Live Transcript Speech Content Figure 1: Multi-modality features in CMOSE dataset. the overall effectiveness of the online classes. In face-to-face classes, the instructors usually rely on interactions between the students, their emotions, facial expressions, and speech to verify the engagement level of each student (Walker and Koralesky 2021). However, interaction features are missing in online classes because the students are muted and cannot discuss with each other most of the time. Also, there are other challenges, such as the noisy background from each webcam and various illumination levels. Therefore, we need an automatic detection of engagement levels specifically designed for online scenarios to enhance the learning outcome. One crucial problem in existing engagement detection datasets is the data imbalance problem, which is universal because students engage most of the time while only disengaging for a short period. Another characteristic of the engagement datasets is the ordinal relationship among the four classes. Prior works in Emotiw2020 Challenge (Dhall et al. 2020) transformed the class labels into scalars and trained the model with MSE Loss. However, such transformation may be inferior because the class label only indicates that a student may have an engagement level in a range, and students with the same label may still have different engagement levels. For instance, some “engaged” students may appear more highly engaged than others in the same class. These facts reflect intra-class variations in Facial Expression Recognition (FER) (Farzaneh and Qi 2021), thus imposing a strict ground truth on all the data from the same class may be unsuitable. To address these challenges, we introduce contrastive learning to engagement detection and propose MocoRank, a training mechanism for data imbal-" 2312.09078v1,"Coevolutionary Algorithm for Building Robust Decision Trees under Minimax Regret 1 Adam Żychowski 1 , Andrew Perrault 2 , Jacek Mańdziuk 1, 3, 4 Faculty of Mathematics and Information Science, Warsaw University of Technology 2 Department of Computer Science and Engineering, The Ohio State University 3 Faculty of Computer Science, AGH University of Krakow 4 Center of Excellence in Artificial Intelligence, AGH University of Krakow adam.zychowski@pw.edu.pl, perrault.17@osu.edu, jacek.mandziuk@pw.edu.pl Abstract In recent years, there has been growing interest in developing robust machine learning (ML) models that can withstand adversarial attacks, including one of the most widely adopted, efficient, and interpretable ML algorithms—decision trees (DTs). This paper proposes a novel coevolutionary algorithm (CoEvoRDT) designed to create robust DTs capable of handling noisy high-dimensional data in adversarial contexts. Motivated by the limitations of traditional DT algorithms, we leverage adaptive coevolution to allow DTs to evolve and learn from interactions with perturbed input data. CoEvoRDT alternately evolves competing populations of DTs and perturbed features, enabling construction of DTs with desired properties. CoEvoRDT is easily adaptable to various target metrics, allowing the use of tailored robustness criteria such as minimax regret. Furthermore, CoEvoRDT has potential to improve the results of other state-of-the-art methods by incorporating their outcomes (DTs they produce) into the initial population and optimize them in the process of coevolution. Inspired by the game theory, CoEvoRDT utilizes mixed Nash equilibrium to enhance convergence. The method is tested on 20 popular datasets and shows superior performance compared to 4 state-of-the-art algorithms. It outperformed all competing methods on 13 datasets with adversarial accuracy metrics, and on all 20 considered datasets with minimax regret. Strong experimental results and flexibility in choosing the error measure make CoEvoRDT a promising approach for constructing robust DTs in real-world applications. Introduction Decision trees (DTs) is a popular, easily interpretable machine learning (ML) algorithm for classification and regression tasks. One of the primary challenges in DT construction is dealing with noisy and high-dimensional data. In particular, it has been shown that ML models (including DTs) are vulnerable to adversarial, perturbed samples that trick the model into misclassifying them (Kantchelian, Tygar, and Joseph 2016; Zhang, Zhang, and Hsieh 2020; Grosse et al. 2017). To address this challenge, researchers have proposed new defensive algorithms for creating robust classification models (see, e.g., Chakraborty et al. (2021)). A model is defined to be robust to some perturbation range of its input samples when it assigns the same class to all the samples within that perturbation range, so that small malicious alterations of input objects should not deceive a robust classifier. The vast majority of defensive algorithms for DTs focus on adversarial accuracy (Kantchelian, Tygar, and Joseph 2016; Chen et al. 2019; Guo et al. 2022; Ranzato and Zanella 2021; Justin et al. 2021). We argue that there are better metrics in principle, and the focus on adversarial accuracy has been driven by computational tractability. Adversarial accuracy is highly sensitive to accuracy on the worst-case perturbation, and when the perturbation range can be large, this can lead to a flattening of intuitively good models and bad ones, as the worst-case perturbations can “defeat” all models. There are other metrics that can better evaluate model robustness, like max regret (Savage 1951). Max regret is defined as the maximum difference between the result of the given model and the result of the optimal model for any input data perturbation within a given range. Minimizing max regret is referred to as the minimax regret decision criterion. Adversarial accuracy might provide an overly optimistic or pessimistic view of the model’s robustness by focusing only on absolute accuracy value. In contrast, max regret is a more realistic approach since it counts the magnitude of the potential loss by considering the model trained on perturbed data. However, max regret cannot be directly optimized and used as a splitting criterion in the state-of-the-art algorithms. In recent years, researchers successfully explored the potential of coevolutionary algorithms to various optimization problems (Mahdavi, Shiri, and Rahnamayan 2015) including DTs induction (Aitkenhead 2008). Coevolutionary algorithms consist in simultaneous evolution of multiple populations, each of them representing a different aspect of the problem. By fostering competition between populations, coevolutionary algorithms can guide the search towards the optimal solutions. Considering the limitations of traditional DT algorithms and the promises of coevolutionary computation, we propose a novel coevolutionary algorithm specifically tailored for creating robust decision trees (RDTs) in adversarial contexts. Our approach leverages the power of adaptive coevolution, allowing to exploit the competitive interactions between populations of decision trees and adversarial perturbations to adapt and converge toward robust and accurate classifications for complex and noisy data. In this process, we can freely define robustness metrics to optimize (including max regret) which leads to the models better tailored to han-" 2312.09091v1,"Multiple New Important Conjectures on Pythagorean Triple and Biquadratic Diophantine Equation ∗ S. Maiti 1,2 † 1 Department of Mathematics, The LNM Institute of Information Technology Jaipur 302031, India 2 Department of Mathematical Sciences, Indian Institute of Technology (BHU), Varanasi-221005, India Abstract During investigations of some famous open problems related to Pythagorean triple, I have found some new important conjectures on Pythagorean triples and biquadratic Diophantine equation [4]. The details of the conjectures have been provided in Section 2-3. Keywords: Pythagorean Triple Conjecture; Diophantine Equation Conjecture; Biquadratic Diophantine Equation Conjecture; Number Theory Conjecture. 1 Introduction Pythagorean triples[1] {x, y, z} are natural numbers x, y, z > 1 which satisfy the equation x 2 + y 2 = z 2 and an ordered Pythagorean triple (x, y, z) is a triple that also satisfies the order relation x < y < z. For any natural number r and for any Pythagorean triple (x, y, z); the triple {rx, ry, rz} is also Pythagorean triple. A Pythagorean triple {(x, y, z} is called primitive if gcd(x, y, z) = 1. All primitive Pythagorean triples {x, y, z} can be given parametrically as x = u 2 − v 2 , y = 2uv, z = u 2 + v 2 ; ∗ † AMS 2010 Mathematics Subject Classification: 11Dxx Corresponding author, Email address: maiti0000000somnath@gmail.com (S. Maiti) 1" 2312.09126v1,"Towards Trustworthy AI Software Development Assistance Daniel Maninger Technische Universität Darmstadt Hessian Center for Artificial Intelligence (hessian.AI) Darmstadt, Germany maninger@cs.tu-darmstadt.de Krishna Narasimhan ∗ AI Quality & Testing Hub Frankfurt am Main, Germany k.narasimhan@aiqualityhub.com ABSTRACT It is expected that in the near future, AI software development assistants will play an important role in the software industry. However, current software development assistants tend to be unreliable, often producing incorrect, unsafe, or low-quality code. We seek to resolve these issues by introducing a holistic architecture for constructing, training, and using trustworthy AI software development assistants. In the center of the architecture, there is a foundational LLM trained on datasets representative of real-world coding scenarios and complex software architectures, and fine-tuned on code quality criteria beyond correctness. The LLM will make use of graph-based code representations for advanced semantic comprehension. We envision a knowledge graph integrated into the system to provide up-to-date background knowledge and to enable the assistant to provide appropriate explanations. Finally, a modular framework for constrained decoding will ensure that certain guarantees (e.g., for correctness and security) hold for the generated code. ACM Reference Format: Daniel Maninger, Krishna Narasimhan, and Mira Mezini. 2023. Towards Trustworthy AI Software Development Assistance. In Proceedings of 46th International Conference on Software Engineering (ICSE ’24). ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Software development (SD) is a complex, expensive process [3]. In times of ever-increasing digitalization of our society and scarcity of IT talent, it makes sense to (partially) automate this process – the popularity that AI-assisted code generation has gained since the appearance of large language models (LLMs) indicates this need. At the same time, given that software dominates our digitized society, guaranteeing the quality of the generated code is paramount. Moreover, for the acceptance of AI software development assistants, it is essential that they cover a broad range of software engineering tasks and faithfully mimic existing well-understood and proven SD methods and practices. Mira Mezini Technische Universität Darmstadt Hessian Center for Artificial Intelligence (hessian.AI) National Research Center for Applied Cybersecurity ATHENE Darmstadt, Germany mezini@cs.tu-darmstadt.de Although existing LLMs, when pre-trained or fine-tuned on code 1 , have shown promise in handling coding-related queries and synthesizing coherent-looking code, they exhibit concerning issues. For instance, AIs like ChatGPT produce erroneous code suggestions: On Stack Overflow, the large number of ChatGPT-generated inaccurate answers led to a ban on its use. The moderators stated that “the posting of answers created by ChatGPT [. . . ] is substantially harmful to the site and to users who are asking questions and looking for correct answers” 2 . A later study made similar observations [12]. Moreover, a recent study on GitHub Copilot revealed that 40% of the generated code contained critical security vulnerabilities [25]. Further emphasizing the dangers of such issues in the domain of software engineering is an early investigation that discovered that “participants who had access to the AI assistant were more likely to introduce security vulnerabilities [. . . ], yet also more likely to rate their insecure answers as secure” [26]. These studies highlight quality and security problems with current industrial AI software development assistants. To remedy these problems, we seek to establish the foundations of a next-generation AI software development assistant system 3 . Given the software engineer’s natural language queries, the assistant should suggest high-quality code, i.e., correct but also secure, readable, and otherwise compliant with best practices. Beyond that, the assistant should be able to serve the role of a virtual pair programmer, explaining its suggestions, helping with debugging, etc., similar to how a human would. The positive effects of pair programming practices on code correctness and quality [39], as well as on collaborative learning [22], are well known. Despite this, pair programming has not been widely adopted because working closely with a teammate is challenging 4 . A virtual pair programmer would not cause such problems. Moreover, we envision the system we build as an AI counterpart to the traditional DevOps pipeline. Therefore, our assistant should be able to support the software engineer in all phases, from software design to deployment. The listed objectives are highly ambitious and require addressing various challenges. This paper is intended to outline a way forward for us and other researchers trying to develop better AI software ∗ Work conducted while afiliated with Technische Universität Darmstadt. ICSE ’24, April 14–20, 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of 46th International Conference on Software Engineering (ICSE ’24), https://doi.org/10.1145/ nnnnnnn.nnnnnnn. 1 For brevity, we will use the term code model. 2 https://meta.stackoverflow.com/questions/421831/temporary-policy-chatgpt-is- banned 3 For brevity, we will also refer to it simply as (AI SD) assistant. 4 https://martinfowler.com/articles/on-pair-programming.html#Challenges" 2312.09129v1,"A Vision for the Science of Rare Isotopes H. L. Crawford 1 , K. Fossez 2,3 , S. König 4 and A. Spyrou 5,6 1 Nuclear Science Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA; email: hlcrawford@lbl.gov 2 Department of Physics, Florida State University, Tallahassee, FL 32306, USA; email: kfossez@fsu.edu 3 Physics Division, Argonne National Laboratory, Lemont, Illinois 60439, USA 4 Department of Physics, North Carolina State University, Raleigh, NC 27695, USA; email: skoenig@ncsu.edu 5 Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48823, USA 6 Facility for Rare Isotope Beams, East Lansing, MI 48823, USA; email: spyrou@frib.msu.edu Xxxx. Xxx. Xxx. Xxx. YYYY. AA:1–34 Keywords https://doi.org/10.1146/((please add article doi)) exotic nuclei, nuclear structure, effective field theory, nuclear astrophysics, nuclear reactions Copyright © YYYY by Annual Reviews. All rights reserved Abstract The field of nuclear science has considerably advanced since its beginning just over a century ago. Today, the science of rare isotopes is on the cusp of a new era with theoretical and computing advances complementing experimental capabilities at new facilities internationally. In this article we present a vision for the science of rare isotope beams (RIBs). We do not attempt to cover the full breadth of the field, but rather provide a perspective and address a selection of topics that reflect our own interests and expertise. We focus in particular on systems near the drip lines, where one often finds nuclei that are referred to as “exotic,” and where the role of the “nuclear continuum” is only just starting to be explored. An important aspect of this article is the attempt to highlight the crucial connections between nuclear structure and nuclear reactions required to fully interpret and leverage the rich data to be collected in the next years at RIB facilities. Further, we connect the efforts in structure and reactions to key questions of nuclear astrophysics. 1" 2312.09133v1,"Deep learning with plasma plume image sequences for anomaly detection and prediction of growth kinetics during pulsed laser deposition Sumner B. Harris, 1 Christopher M. Rouleau, 1 Kai Xiao, 1 and Rama K. Vasudevan 1 Center for Nanophase Materials Sciences, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, United States (*Author to whom correspondence should be addressed: harrissb@ornl.gov) (Dated: 15 December 2023) Materials synthesis platforms that are designed for autonomous experimentation are capa- ble of collecting multimodal diagnostic data that can be utilized for feedback to optimize material properties. Pulsed laser deposition (PLD) is emerging as a viable autonomous synthesis tool, and so the need arises to develop machine learning (ML) techniques that are capable of extracting information from in situ diagnostics. Here, we demonstrate that intensified-CCD image sequences of the plasma plume generated during PLD can be used for anomaly detection and the prediction of thin film growth kinetics. We developed a multi-output (2+1)D convolutional neural network regression model that extracts deep features from plume dynamics that not only correlate with the measured chamber pressure and incident laser energy, but more importantly, predict parameters of an auto-catalytic film growth model derived from in situ laser reflectivity experiments. Our results are the first demonstration of how ML with in situ plume diagnostics data in PLD can be utilized to maintain deposition conditions in an optimal regime. Further, the predictive capabilities of plume dynamics on the kinetics of film growth or other film properties prior to depo- sition provides a means for rapid pre-screening of growth conditions for the non-expert, which promises to accelerate materials optimization with PLD. Notice: This manuscript has been authored by UT-Battelle, LLC, under Contract No. DE-AC05- 00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public ac- cess to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe- public-access-plan). 1" 2312.09143v1,"F1-EV SCORE: MEASURING THE LIKELIHOOD OF ESTIMATING A GOOD DECISION THRESHOLD FOR SEMI-SUPERVISED ANOMALY DETECTION Kevin Wilkinghoff 1 and Keisuke Imoto 2 1 Fraunhofer FKIE, Fraunhoferstraße 20, 53343 Wachtberg, Germany 2 Doshisha University, 1-3 Tatara Miyakodani, Kyotanabe, Kyoto, Japan kevin.wilkinghoff@ieee.org, keisuke.imoto@ieee.org ABSTRACT Anomalous sound detection (ASD) systems are usually compared by using threshold-independent performance measures such as AUC- ROC. However, for practical applications a decision threshold is needed to decide whether a given test sample is normal or anomalous. Estimating such a threshold is highly non-trivial in a semisupervised setting where only normal training samples are available. In this work, F1-EV a novel threshold-independent performance measure for ASD systems that also includes the likelihood of estimating a good decision threshold is proposed and motivated using specific toy examples. In experimental evaluations, multiple performance measures are evaluated for all systems submitted to the ASD task of the DCASE Challenge 2023. It is shown that F1-EV is strongly correlated with AUC-ROC while having a significantly stronger correlation with the F1-score obtained with estimated and optimal decision thresholds than AUC-ROC. Index Terms— performance measure, anomaly detection, decision threshold, domain generalization 1. INTRODUCTION There are several performance measures for sound event detection [1, 2] and anomalous sound detection (ASD) systems or binary classifiers in general [3, 4, 5, 6]. Usually, threshold-independent performance measures such as the area under the receiver operating characteristic curve (AUC-ROC) are used because they are more objective [7, 8] compared to threshold-dependent measures such as the F1-score, which rely on a single chosen decision threshold. However, it has been shown that the AUC-ROC has a few weaknesses [9] as for example that AUC-ROC does not work well for imbalanced class distributions since equal weight is given for positive and negative samples [9, 10]. Moreover, for practical applications a decision threshold is needed to be able to decide whether a test sample is normal or anomalous. In semi-supervised ASD settings, estimating this threshold boils down to separating the extreme values of the anomaly scores, e.g. scores larger than the 90th percentile, belonging to normal samples from the rest and hoping that the estimated decision threshold also works well for separating the scores of normal samples from the ones obtained with anomalous samples [11]. Hence, it is implicitly assumed that the anomaly scores belonging to the normal training and test samples follow the same distribution. Estimating a good decision threshold is a difficult task that is vital when developing a system for a practical ASD application. If only AUC-ROC is used as a performance measure, this difficulty is not explicitly captured by the resulting score. A naı̈ve solution to this problem is to use multiple performance measures, for example a threshold-independent and a threshold- dependent measure such as the AUC-ROC and the F1-score. However, a single threshold-independent measure is much more favorable to objectively compare the performance of multiple systems. In this work, we propose the F1-expected value (EV) score for measuring the performance of an ASD system. Similar to AUC-ROC, F1- EV is a threshold-independent performance measure but also takes the likelihood of estimating a good decision threshold into account. The contributions of this work are the following: First, it is shown experimentally and through toy examples that AUC-ROC alone is not a sufficient performance measure for ASD. Second, F1-EV 1 a threshold-independent performance measure for anomaly detection is presented. Furthermore, multiple performance measures are evaluated and compared using all systems submitted to the ASD task of the DCASE 2023 Challenge. It is shown that bounding the F1-EV score is important and F1-EV is strongly correlated with AUC-ROC while also having a significantly higher correlation with the F1-score than AUC-ROC. As a last contribution, fine-tuning the bounds of F1-EV score is investigated in an ablation study. 2. PERFORMANCE MEASURES Throughout this work, anomaly scores are positive scalar values, and their magnitude corresponds to the degree of anomaly. 2.1. AUC-ROC First, we will recall the definition of the AUC-ROC score. For a set of N ∈ N threshold values θ(n) ∈ R indexed by n ∈ {1, ..., N }, let x(n), y(n) ∈ [0, 1] be the monotone increasing sequences of sorted false positive rates (FPRs) and sorted true positive rates (TPRs) of the receiver operating characteristic (ROC)-curve resulting from the anomaly scores, respectively. Define ∆x(n) ∶= x(n + 1) − x(n). More concretely, the sequence (θ(n)) n=1,...,N is set to all sorted anomaly score values belonging to the evaluation samples because these are the points where the intermediate statistics, i.e. TPR and FPR, change. Compared to linearly scaled thresholds, which require an infinitesimal resolution to yield exact results, this particular choice of evaluation thresholds has two advantages [8]: improved computational efficiency and improved accuracy of the ROC curve. Then, using the trapezoidal rule, the AUC-ROC score can be approximated by calculating AUC-ROC(x, y) ≈ ∑ N −1 n=1 y(n + 1) + y(n) ⋅ ∆x(n) 2 1 An open-source implementation of F1-EV is available at: https:// github.com/wilkinghoff/f1-ev" 2312.09173v1,"Safe Motion Planning for Quadruped Robots Using Density Functions Sriram S.K.S Narayanan ∗1 , Andrew Zheng ∗1 and Umesh Vaidya 1 Abstract— This paper presents a motion planning algorithm for quadruped locomotion based on density functions. We decompose the locomotion problem into a high-level density planner and a model predictive controller (MPC). Due to density functions having a physical interpretation through the notion of occupancy, it is intuitive to represent the environment with safety constraints. Hence, there is an ease of use to constructing the planning problem with density. The proposed method uses a simplified the model of the robot into an integrator system, where the high-level plan is in a feedback form formulated through an analytically constructed density function. We then use the MPC to optimize the reference trajectory, in which a low-level PID controller is used to obtain the torque level control. The overall framework is implemented in simulation, demonstrating our feedback density planner for legged locomotion. The implementation of work is available at https://github.com/AndrewZheng-1011/legged_ planner Fig. 1: Motion Planning framework using density where (a) shows the density function defined on the environment, and (b) shows occupancy measure, which physically denotes the duration of system trajectories occupying the set. I. I NTRODUCTION Quadruped research has seen considerable growth over the past few years [1]. This is highlighted through the DARPA Subterranean Challenge, where top contenders used legged robots as a core component to their underground autonomy challenge [2], [3]. This shift in legged systems rather than mobile bases can be attributed to advancements in the algorithmic development and improvements in real-time optimization that have improved the legged systems’ capabilities in traversing over challenging environments. However, despite the successes, navigating under safety constraints for legged robots in complex environments still has its difficulties. Sample-based planners such as rapidly exploring random tree search (RRT) and probabilistic roadmaps (PRM) [4], [5] are very efficient in generating safe motion plans. Here, safety is enforced through local collision checks at each sample point, which can be inefficient for complex environments. More recently control barrier functions (CBF) have seen great success in enforcing safety. The barrier functions act as a safety certificate and can be implemented as a safety filter using a quadratic program (QP) [6], [7]. However, designing these CBFs for high-dimensional nonlinear systems are nontrivial [8], [9]. Alternatively, the motion planning problem can be formulated in the dual space of density. It has been shown that density functions can be viewed as an alternative safety *These authors contributed equally Financial support from of NSF CPS award 1932458 and NSF 2031573 is greatly acknowledged. Sriram S.K.S Narayanan, Andrew Zheng, and Umesh Vaidya are with the Department of Mechanical Engineering, Clemson University, Clemson, SC 29630, USA email: sriramk@clemson.edu; azheng@clemson.edu; uvaidya@clemson.edu certificate, enabling synthesis of safe controllers [10], [11], [12]. Moreso, a convex formulation for synthesizing safe controllers using navigation measure was introduced in [13]. These works were extended to the data-driven setting based on the linear transfer operators with safety constraints in [14], [15]. However, recently, an analytically constructed density functions was proposed that jointly solves the obstacle avoidance and convergence problem through a feedback control fashion in [16]. The main contribution of this work is to design a safe motion plan for quadruped robots using density functions. Unlike potential functions, which are known to exist but hard to construct for arbitrary environments, [16] provides a systematic way to construct density functions for any arbitrary environment. As the density function formulated has nice physical interpretation with occupation as seen in Figure 1 (i.e. the proposed density function formulated has zero density at the unsafe set, hence zero occupation in the set), we exploit this occupancy-based physical interpretation of the density function to design collision-free plans. More specifically, the plan is obtained as the gradient of the density function and can be received in a feedback form. From the received feedback plan, we then use a nonlinear model predictive controller (NMPC) as an optimizer to obtain reference foot forces to track the high-level reference trajectories. Finally, the optimized foot forces are converted to joint torques using a low-level PID controller. The rest of the paper is organized as follows. In Section II, we introduce the preliminaries of formulating the almost everywhere navigation problem. In section III, we provide the analytical construction of density functions. In Section" 2312.09176v1,"Reconstruction of Fields from Sparse Sensing: Differentiable Sensor Placement Enhances Generalization Agnese Marcato Earth and Enviromental Sciences Los Alamos National Laboratory, Politecnico di Torino agnese.marcato@polito.it Daniel O’Malley Earth and Enviromental Sciences Los Alamos National Laboratory omalled@lanl.gov Hari Viswanathan Earth and Enviromental Sciences Los Alamos National Laboratory viswana@lanl.gov Eric Guiltinan Earth and Enviromental Sciences Los Alamos National Laboratory eric.guiltinan@lanl.gov Javier E. Santos Earth and Enviromental Sciences Los Alamos National Laboratory jesantos@lanl.gov Abstract Recreating complex, high-dimensional global fields from limited data points is a grand challenge across various scientific and industrial domains. Given the prohibitive costs of specialized sensors and the frequent inaccessibility of certain regions of the domain, achieving full field coverage is typically not feasible. Therefore, the development of algorithms that intelligently improve sensor placement is of significant value. In this study, we introduce a general approach that employs differentiable programming to exploit sensor placement within the training of a neural network model in order to improve field reconstruction. We evaluated our method using two distinct datasets; the results show that our approach improved test scores. Ultimately, our method of differentiable placement strategies has the potential to significantly increase data collection efficiency, enable more thorough area coverage, and reduce redundancy in sensor deployment. 1 Introduction The challenge of reconstructing spatial fields that change over time from limited sensor data has been a focal point for many research studies [13, 7, 9]. Various machine learning methods have been used in attempts to address this complex issue, including several types of neural networks. For instance, shallow neural networks [3], as well as convolutional neural networks [4], have been employed. More recently, attention-based neural networks [11] have been investigated. Despite their different architectures, all of these methods share the common requirement that the user needs to manually determine the sensor positions. This requirement remains a limiting factor in the ongoing quest for efficient learning and accurate field reconstruction. The strategic placement of sensors is perhaps the most critical aspect of sparse sensing. It deeply influences the performance and efficiency of data collection systems and, consequently, the methods Machine Learning and the Physical Sciences Workshop, NeurIPS 2023." 2312.09211v1,"Mitigating Outlier Activations in Low-Precision Fine-Tuning of Language Models Alireza Ghaffari 1 , Justin Yu 1 , Mahsa Ghazvini Nejad 1 , Masoud Asgharian 2 , Boxing Chen 1 and Vahid Partovi Nia 1 1 Huawei Noah’s Ark Lab, Montreal, Canada 2 Department of Mathmematics and Statistics, McGill University, Montreal canada. alireza.ghaffari@huawei.com Keywords: Accelerated Training, Compressed Training, Low-precision Fine-tuning, Language Models. Abstract: Low-precision fine-tuning of language models has gained prominence as a cost-effective and energy-efficient approach to deploying large-scale models in various applications. However, this approach is susceptible to the existence of outlier values in activation. The outlier values in the activation can negatively affect the performance of fine-tuning language models in the low-precision regime since they affect the scaling factor and thus make representing smaller values harder. This paper investigates techniques for mitigating outlier activation in low-precision integer fine-tuning of the language models. Our proposed novel approach enables us to represent the outlier activation values in 8-bit integers instead of floating-point (FP16) values. The benefit of using integers for outlier values is that it enables us to use operator tiling to avoid performing 16-bit integer matrix multiplication to address this problem effectively. We provide theoretical analysis and supporting experiments to demonstrate the effectiveness of our approach in improving the robustness and performance of low-precision fine-tuned language models. 1 INTRODUCTION Language models have achieved remarkable success in various NLP tasks, owing to their ability to capture the intricacies of text data. Fine-tuning large language models, however, often requires substantial computational resources and memory bandwidth that hinder its accessibility to users with limited computational resources. To make large language models accessible and efficient for real-world applications, researchers have explored various techniques for making finetuning pre-trained models more efficient on devices with lower computational power. To mitigate these challenges, low-precision fine-tuning has emerged as a promising approach. Low-precision fine-tuning involves representing the model’s weights, activations, and also gradients to lower bit-width representations, such as 8-bit integer or floating-point numbers. This approach reduces memory and computational requirements, making it feasible to fine-tune and deploy large-scale models on resource-constrained devices. However, both in finetuning and inference, this approach introduces the problem of outlier activation, where a small number of activations exhibit extreme values, causing numer- Figure 1: Computation flow of proposed linear layers for forward and backward propagation. Integer computation significantly reduces the computational cost of computeintensive linear layers. ical instability and degradation in model performance. In this paper, we delve into the problem of outlier" 2312.09236v1,"A framework for conditional diffusion modelling with applications in motif scaffolding for protein design Kieran Didi* University of Cambridge ked48@cam.ac.uk ∗ Simon Mathis* University of Cambridge svm34@cam.ac.uk Francisco Vargas* University of Cambridge fav25@cam.ac.uk Vincent Dutordoir* University of Cambridge vd309@cam.ac.uk Urszula Julia Komorowska University of Cambridge ujk21@cam.ac.uk Emile Mathieu* University of Cambridge ebm32@cam.ac.uk Pietro Lio University of Cambridge pl219@cam.ac.uk Abstract Many protein design applications, such as binder or enzyme design, require scaffolding a structural motif with high precision. Generative modelling paradigms based on denoising diffusion processes emerged as a leading candidate to address this motif scaffolding problem and have shown early experimental success in some cases. In the diffusion paradigm, motif scaffolding is treated as a conditional generation task, and several conditional generation protocols were proposed or imported from the Computer Vision literature. However, most of these protocols are motivated heuristically, e.g. via analogies to Langevin dynamics, and lack a unifying framework, obscuring connections between the different approaches. In this work, we unify conditional training and conditional sampling procedures under one common framework based on the mathematically well-understood Doob’s h-transform. This new perspective allows us to draw connections between existing methods and propose a new variation on existing conditional training protocols. We illustrate the effectiveness of this new protocol in both, image outpainting and motif scaffolding and find that it outperforms standard methods. 1 Introduction Denoising diffusion models are a powerful class of generative models where noise is gradually added to data samples until they converge to pure noise. The time-reversal of this noising process then allows to transform noise into samples. This process has been widely successful in generating high-quality images [Ho et al., 2020] and has more recently shown promise in designing protein backbones that were validated in experimental protein design workflows [Watson et al., 2023]. Importantly for protein design, diffusion models allow to subject this time-reversed sampling process to a target condition. For proteins, a key condition is the inclusion of a structural motif that grants the protein a particular function, such as binding to a specific target or forming an enzyme active site. However, for these motifs to be foldable and stable, they often need to be integrated into a larger protein structure. While there have been notable successes in scaffolding some motifs experimentally, ∗ equal contributions The NeurIPS 2023 Workshop on New Frontiers of AI for Drug Discovery and Development (AI4D3 2023), New Orleans, LA, USA, 2023." 2312.09238v1,"Auto MC-Reward: Automated Dense Reward Design with Large Language Models for Minecraft Hao Li 1∗ , Xue Yang 2∗ , Zhaokai Wang 2,3∗ , Xizhou Zhu 4,5 , Jie Zhou , Yu Qiao 2 , Xiaogang Wang 1,5 , Hongsheng Li 1 , Lewei Lu 5 , Jifeng Dai 4,2B 4 1 CUHK-SenseTime Joint Laboratory, The Chinese University of Hong Kong 2 OpenGVLab, Shanghai AI Laboratory 3 Shanghai Jiao Tong University 4 Tsinghua University 5 SenseTime Research https://yangxue0827.github.io/auto_mc-reward.html Figure 1. Overview of our Auto MC-Reward. Auto MC-Reward consists of three key LLM-based components: Reward Designer, Reward Critic, and Trajectory Analyzer. A suitable dense reward function is iterated through the continuous interaction between the agent and the environment for reinforcement learning training of specific tasks, so that the model can better complete the task. An example of exploring diamond ore is shown in the figure: i) Trajectory Analyzer finds that the agent dies from lava in the failed trajectory, and then gives suggestion for punishment when encountering lava; ii) Reward Designer adopts the suggestion and updates the reward function; iii) The revised reward function passes the review of Reward Critic, and finally the agent avoids the lava by turning left. Abstract hancing the learning efficiency. Auto MC-Reward consists of three important components: Reward Designer, Reward Critic, and Trajectory Analyzer. Given the environment information and task descriptions, the Reward Designer first design the reward function by coding an executable Python function with predefined observation inputs. Then, our Reward Critic will be responsible for verifying the code, checking whether the code is self-consistent and free of syntax and semantic errors. Further, the Trajectory Analyzer summarizes possible failure causes and provides refinement suggestions according to collected trajectories. In the next round, Reward Designer will take further refine and iterate the dense reward function based on feedback. Experi- Traditional reinforcement-learning-based agents rely on sparse rewards that often only use binary values to indicate task completion or failure. The challenge in exploration efficiency makes it difficult to effectively learn complex tasks in Minecraft. To address this, this paper introduces an advanced learning system, named Auto MC- Reward, that leverages Large Language Models (LLMs) to automatically design dense reward functions, thereby en- ∗ Equal contribution. This work was completed by Hao Li and Zhaokai Wang during their internship at Shanghai Artificial Intelligence Laboratory. B Corresponding author: Jifeng Dai . 1" 2312.09242v1,"Text2Immersion: Generative Immersive Scene with 3D Gaussians Hao Ouyang HKUST Stephen Lombardi Google Kathryn Heal Google Tiancheng Sun Google (a) (b) (c) Prompt: Autumn Park Figure 1. Generation results of high-fidelity 3D immersive scenery of Text2Immersive pipeline. (a) Examples of renderings, as viewed from four selected directions. (b) Associated depth maps for each view, simultaneously generated by our method. (c) Point cloud demonstrating the global structure of the produced immersive scene, a collection of 3D Gaussian primitives. Shown is only the centers of the Gaussians. To capture the consistency of our generated scenes, we encourage readers to view the accompanying supplementary videos. Abstract We introduce Text2Immersion, an elegant method for producing high-quality 3D immersive scenes from text prompts. Our proposed pipeline initiates by progressively generating a Gaussian cloud using pre-trained 2D diffusion and depth estimation models. This is followed by a refining stage on the Gaussian cloud, interpolating and refining it to enhance the details of the generated scene. Distinct from prevalent methods that focus on single object or indoor scenes, or employ zoom-out trajectories, our approach generates diverse scenes with various objects, even extending to the creation of imaginary scenes. Consequently, Text2Immersion can have wide-ranging implications for various applications such as virtual reality, game development, and automated content creation. Extensive evaluations demonstrate that our system surpasses other methods in rendering quality and diversity, further progressing towards text-driven 3D scene generation. We will make the source code publicly accessible at the project page . 1. Introduction Three-dimensional content generation has numerous potential applications, most notably in gaming, film production, and virtual reality environments. The capability to generate" 2312.09245v1,"DriveMLM: Aligning Multi-Modal Large Language Models with Behavioral Planning States for Autonomous Driving Wenhai Wang 1,2∗ , Jiangwei Xie 3∗ , ChuanYang Hu 3∗ , Haoming Zou 4∗ , Jianan Fan 3∗ , Wenwen Tong 3∗ , Yang Wen 3∗ , Silei Wu 3∗ , Hanming Deng 3∗ , Zhiqi Li 1,5∗ , Hao Tian 3 , Lewei Lu 3 , Xizhou Zhu 6 , Xiaogang Wang 2,3 , Yu Qiao 1 , Jifeng Dai 1,6B 1 OpenGVLab, Shanghai AI Laboratory 2 The Chinese University of Hong Kong 3 SenseTime Research 4 Stanford University 5 Nanjing University 6 Tsinghua University https://github.com/OpenGVLab/DriveMLM Abstract Ego Vehicle Other Vehicle Trajectory Keep Driving Scene Large language models (LLMs) have opened up new possibilities for intelligent agents, endowing them with humanlike thinking and cognitive abilities. In this work, we delve into the potential of large language models (LLMs) in autonomous driving (AD). We introduce DriveMLM, an LLM-based AD framework that can perform close-loop autonomous driving in realistic simulators. To this end, (1) we bridge the gap between the language decisions and the vehicle control commands by standardizing the decision states according to the off-the-shelf motion planning module. (2) We employ a multi-modal LLM (MLLM) to model the behavior planning module of a module AD system, which uses driving rules, user commands, and inputs from various sensors (e.g., camera, lidar) as input and makes driving decisions and provide explanations; This model can plug-andplay in existing AD systems such as Apollo for close-loop driving. (3) We design an effective data engine to collect a dataset that includes decision state and corresponding explanation annotation for model training and evaluation. We conduct extensive experiments and show that our model achieves 76.1 driving score on the CARLA Town05 Long, and surpasses the Apollo baseline by 4.7 points under the same settings, demonstrating the effectiveness of our model. We hope this work can serve as a baseline for autonomous driving with LLMs. 1. Multi-View Images 2. LiDAR Point Clouds 3. Traffic Rules ... Prior Knowledge Experts Control Rule-Based State Machine (a) Rule-Based Autonomous Driving System [3] Keep Driving Scene 1. Multi-View Images 2. LiDAR Point Clouds 3. Traffic Rules ... Data-Driven Data Peception Planning Control (b) End-to-End Autonomous Driving System [25, 27, 57] I'm in a hurry, overtake. Driving Scene 1. Multi-View Images 2. LiDAR Point Clouds 3. Traffic Rules ... User Instructions Overtake MLLM-based Planner Control Aligning Decision State Behavioral Planning Module (c) Autonomous Driving System with Large Language Model (Ours) Figure 1. Comparison of different AD systems. (a) is the rulebased system constrained by the limitation of pre-defined and manual rules, (b) is a data-driven system restricted by the diversity of generated data, (c) we apply the capability of LLMs to the AD system and align the decision state with the planner to achieve closed-loop driving. end-to-end systems, as demonstrated in Figure 1b. Despite their advancements, these systems have encountered limitations due to the constraints of expert knowledge or the diversity of training data. This has made it challenging for them to handle corner-case situations, even though human drivers might find them intuitive to deal with. In contrast to these traditional rule-based or data-driven AD planners, Large language models (LLMs) trained with web-scale text corpus, are equipped with extensive world knowledge, robust logical reasoning, and advanced cognitive capabilities. 1. Introduction Autonomous driving (AD) has undergone significant advancements in recent years, evolving from traditional rulebased systems, which rely on a predefined set of rules informed by prior knowledge (see Figure 1a), to data-driven, ∗ equal contribution, B corresponding author (daijifeng@tsinghua. edu.cn) 1" 2312.09279v1,"Nanoscale magnetism and magnetic phase transitions in atomically thin CrSBr Märta A. Tschudin, 1, ∗ David A. Broadway, 1, † Patrick Reiser, 1 Carolin Schrader, 1 Evan J. Telford, 2, 3 Boris Gross, 1 Jordan Cox, 3 Adrien E. E. Dubois, 1, 4 Daniel G. Chica, 3 Ricardo Rama-Eiroa, 5, 6 Elton J. G. Santos, 6, 7, 5 Martino Poggio, 1, 8 Michael E. Ziebel, 3 Cory R. Dean, 2 Xavier Roy, 3 and Patrick Maletinsky 1, ‡ 1 Department of Physics, University of Basel, Basel, Switzerland Department of Physics, Columbia University, New York, NY, USA 3 Department of Chemistry, Columbia University, New York, NY, USA 4 QNAMI AG, Hofackerstrasse 40 B, Muttenz CH-4132, Switzerland 5 Donostia International Physics Center (DIPC), 20018 Donostia-San Sebastián, Basque Country, Spain 6 Institute for Condensed Matter Physics and Complex Systems, School of Physics and Astronomy, The University of Edinburgh, Edinburgh, EH9 3FD, United Kingdom 7 Higgs Centre for Theoretical Physics, The University of Edinburgh, Edinburgh EH9 3FD, United Kingdom 8 Swiss Nanoscience Institute, University of Basel, Basel, Swizterland (Dated: December 18, 2023) 2 Since their first observation in 2017 , 1,2 atomically thin van der Waals (vdW) magnets have attracted significant fundamental, and applicationdriven attention . 3–5 However, their low ordering temperatures, T c , 1,2,6,7 sensitivity to atmospheric conditions 8,9 and difficulties in preparing clean large-area samples 10 still present major limitations to further progress. The remarkably stable , 11 high-T c vdW magnet CrSBr 12,13 has the potential to overcome these key shortcomings, but its nanoscale properties and rich magnetic phase diagram remain poorly understood. Here we use single spin magnetometry 14 to quantitatively characterise saturation magnetization, magnetic anisotropy constants, and magnetic phase transitions in few-layer CrSBr by direct magnetic imaging. We show pristine magnetic phases, devoid of defects on micron length-scales, and demonstrate remarkable air-stability down the monolayer limit. We address the spin-flip transition in bilayer CrSBr by direct imaging of the emerging antiferromagnetic (AFM) to ferromagnetic (FM) phase wall and elucidate the magnetic properties of CrSBr around its ordering temperature. Our work will enable the engineering of exotic electronic and magnetic phases in CrSBr and the realisation of novel nanomagnetic devices based on this highly promising vdW magnet. Heterostructures based on 2D vdW materials have had a profound impact on our understanding and control of a vast range of electronic and optical phenomena in condensed matter physics . 16–18 By comparison, explorations of 2D vdW magnets, which are typically highly fragile and exhibit low ordering temperatures, are still in their infancy, despite remarkable progress in observing exotic forms of magnetism, including 2D-XY ∗ These authors contributed equally † david.broadway@rmit.edu.au; These authors contributed equally ‡ patrick.maletinksy@unibas.ch magnetism , 19 orbital ferromagnetism , 20 and Moiré magnetism . 21 The magnetically ordered vdW semiconductor CrSBr has emerged as a highly attractive candidate to overcome these shortcomings. Next to its in-plane, A- type AFM ordering (Fig. 1 a), CrSBr exhibits unusual transport properties , 22 an intriguing interplay between magnetic and optical properties , 23 and a remarkable tunability of its magnetism by strain . 24 Importantly, and unlike other 2D magnetic vdW materials, CrSBr shows remarkable structural stability , 11 magnetically orders at a relatively high (Néel) temperature T N ≈ 132 K, with evidence for FM intralayer interactions persisting to even higher temperatures . 11,12,25 Yet, little is thus far known about the nanoscale properties of CrSBr and how its various magnetic phases develop and transition in few layer thin samples, which have so far been addressed only by non-quantitative 25,26 and invasive 27 imaging methods. Here, we employ single-spin scanning magnetometry 14 using an individual nitrogen vacancy (NV) center in diamond 28 – a nanoscale imaging technique that is noninvasive and sensitive enough to image magnetism in vdW monolayers 6 – to explore magnetic order in CrSBr in a quantitative way. The NV spin is situated at the tip of an atomic force microscope and scanned across the CrSBr flakes (Fig. 1 a) to quantitatively image magnetic stray fields through Zeeman-shifts of the spin’s energy levels. The NV thereby enables a quantitative 29 determination of B NV – the projection of the total magnetic field onto the NV axis – which in turn allows us to determine CrSBr’s sample magnetization and magnetic anisotropy energy, down to the monolayer limit. Furthermore, building on the high stability and spatial resolution of our approach, we provide direct visualizations of key magnetic phase transitions in mono- and bilayers of CrSBr. We start by investigating few-layer CrSBr samples at T ≈ 4 K and at low magnetic fields (B ≈ 5 mT), where the CrSBr layers exhibit AFM interlayer alignment , 12 and where a nonzero net sample magnetization can thus only be expected from odd numbers of layers. Our samples were fabricated by mechanically exfoliating bulk CrSBr crystals onto a Si/SiO 2 substrate," 2312.09292v1,"IPPP/23/72, JLAB-THY-23-3968 Exploring thermal equilibria of the Fermi–Hubbard model with variational quantum algorithms Jack Y. Araz ∗ Jefferson Lab, Newport News, VA 23606, United States Michael Spannowsky † Institute for Particle Physics Phenomenology, Durham University, Durham, United Kingdom Matthew Wingate ‡ DAMTP, University of Cambridge, Cambridge, CB3 0WA, United Kingdom This study investigates the thermal properties of the repulsive Fermi-Hubbard model with chemical potential using variational quantum algorithms, crucial in comprehending particle behaviour within lattices at high temperatures in condensed matter systems. Conventional computational methods encounter challenges, especially in managing chemical potential, prompting exploration into Hamiltonian approaches. Despite the promise of quantum algorithms, their efficacy is hampered by coherence limitations when simulating extended imaginary time evolution sequences. To overcome such constraints, this research focuses on optimizing variational quantum algorithms to probe the thermal properties of the Fermi-Hubbard model. Physics-inspired circuit designs are tailored to alleviate coherence constraints, facilitating a more comprehensive exploration of materials at elevated temperatures. Our study demonstrates the potential of variational algorithms in simulating the thermal properties of the Fermi-Hubbard model while acknowledging limitations stemming from error sources in quantum devices and encountering barren plateaus. INTRODUCTION methods in capturing the thermal equilibria of these systems. Quantum physics presents profound challenges in unravelling the intricate dynamics governing particle interactions within condensed matter systems. Among the pivotal models illuminating such phenomena, the Fermi- Hubbard model [1, 2] encapsulates correlated particles’ behaviour within a lattice framework. A crucial facet in comprehending these systems lies in probing their thermal properties. However, the computational scrutiny of models encounter substantial hurdles, especially when traditional methodologies confront facets like the introduction of a chemical potential [3] or topological terms [4]. Notably, Monte Carlo algorithms falter in handling such characteristics, compelling the exploration of Hamiltonian methodologies for their robustness in navigating these complexities. Despite the promise inherent in Hamiltonian methods, challenges endure. Due to their Hamiltonian-based approach, Tensor Networks do not suffer from sign problems. Employing imaginary time evolution through techniques like Time Evolving Block Decimation (TEBD) allows for accurate simulation of thermal states for lattice field theories [5–8]. However, while potent, TEBD confronts computational bottlenecks; the escalating computational demand due to large bond dimensions associated with extensive time steps restricts the efficacy of such To address these challenges, attention has pivoted towards leveraging the capabilities of quantum computing. Quantum algorithms, immune to specific computational roadblocks faced by classical algorithms, offer a promising avenue for exploring complex condensed matter systems. Although it is possible to implement imaginary time evolution for quantum algorithms to study the thermal properties of lattice systems without suffering from large bond dimensions [9], the finite coherence time in quantum devices imposes constraints on simulating prolonged time evolution sequences, necessitating alternative strategies. ∗ jackaraz@jlab.org † michael.spannowsky@durham.ac.uk ‡ m.wingate@damtp.cam.ac.uk This study focuses on employing variational quantum algorithms to investigate the thermal characteristics of the spin- 12 Fermi-Hubbard model. These techniques find their roots in the Variational Quantum Eigensolver (VQE) [10–12], which utilizes a trainable unitary gate sequence to approximate the diagonalization of a given Hamiltonian. Previous studies have applied this method to analyze the ground state properties of the Fermi- Hubbard model [13, 14]. Furthermore, references [15–17] have extended VQE techniques to learn thermal state density matrices using hybrid classical-quantum network systems. Despite their success, integrating classical and quantum computing methods creates unavoidable bottlenecks, as evidenced in data analysis applications [18]. These challenges have prompted exploring and developing alternative quantum-based algorithms [19–22]. We employ the quantum Variational Quantum Thermaliser (qVQT) algorithm, proposed in ref. [20]. Through efficient circuit designs, we aim to surmount" 2312.09303v1,"A P HYSICS B ASED S URROGATE M ODEL IN B AYESIAN U NCERTAINTY Q UANTIFICATION INVOLVING E LLIPTIC PDE S A. Galaviz, J. A. Christen Centro de Investigación en Matemáticas (CIMAT) Guanajuato, México {anel.galaviz, jac}@cimat.mx A. Capella Instituto de Matemáticas Universidad Nacional Autónoma de México (UNAM) Ciudad de México, México capella@im.unam.mx A BSTRACT The paper addresses Bayesian inferences in inverse problems with uncertainty quantification involving a computationally expensive forward map associated with solving a partial differential equations. To mitigate the computational cost, the paper proposes a new surrogate model informed by the physics of the problem, specifically when the forward map involves solving a linear elliptic partial differential equation. The study establishes the consistency of the posterior distribution for this surrogate model and demonstrates its effectiveness through numerical examples with synthetic data. The results indicate a substantial improvement in computational speed, reducing the processing time from several months with the exact forward map to a few minutes, while maintaining negligible loss of accuracy in the posterior distribution. Keywords Surrogate Model · PDE · Bayesian inference · Uncertainty Quantification 1 Introduction The goal of Bayesian inference with uncertainty quantification applied to inverse problems is to calculate a posterior distribution for the unknown parameters. In instances involving complex models where obtaining an exact solution for the posterior distribution is impractical, approximations are often employed, typically generated by sampling algorithms like Markov Chain Monte Carlo (MCMC) methods [1, 2]. Each step of the MCMC algorithm involves evaluating the posterior distribution, which includes likelihood and forward map evaluations. In cases where forward map evaluations are computationally demanding, a common strategy is to utilize a surrogate model for the forward map. While this approach reduces computational time and facilitates inference, it introduces numerical and approximation errors. In science, multiple computational models, each with varying costs and fidelities, are employed to describe a system of interest. High-fidelity models offer accurate descriptions but come with significant computational cost. For instance, models involving complex Partial Differential Equations (PDEs) with multiple parameters and fine meshes require considerable computational time, ranging from minutes to days, for a single forward simulation. Applications, such as design optimization or Bayesian inversion with uncertainty quantification, demand thousands to millions of model evaluations [3]. Unfortunately, the associated computational costs often render these tasks practically inaccessible. These challenges motivate the need for the development of computationally efficient surrogate models. Typically, surrogate models are computationally fast but less accurate, so we describe them as low-fidelity. Choosing a low-fidelity model depends heavily on the particular application. A common practice involves leveraging both low and high-fidelity models to expedite simulations while gauging accuracy, necessitating a well-defined model management strategy [4]. Surrogate models can be broadly categorized into four main types: projection-based reduced models, data-fit interpolation and regression models, machine-learning-based models, and simplified surrogate models [4, 5]. The Projection-based reduced surrogate model aims to reduce the complexity of the Forward Map by altering the mathematical structure of the forward’s map numerical scheme[6, 7, 8]. The basic idea is to project the solutions of the elliptic partial differential equations (PDEs) into a low-dimensional subspace to derive a reduced model. The success of this projection step relies on a good understanding of the Forward Map’s structure. Various methods exist for constructing" 2312.09324v1,"Nonequilibrium model for compressible two-phase two-pressure flows with surface tension Ilya Peshkov 1 Evgeniy Romenski 2 Michal Pavelka 3 December 18, 2023 In continuum thermodynamics, models of two-phase mixtures typically obey the condition of pressure equilibrium across interfaces between the phases. We propose a new non-equilibrium model beyond that condition, allowing for microinertia of the interfaces, surface tension, and different phase pressures. The model is formulated within the framework of Symmetric Hyperbolic Thermodynamically Compatible equations, and it possesses variational and Hamiltonian structures. Finally, via formal asymptotic analysis, we show how the pressure equilibrium is restored when fast degrees of freedom relax to their equilibrium values. 1. Introduction When dealing with multi-fluid flows of several immiscible fluids (gas-liquid or liquid-liquid mixtures), one needs to take into account the effect of surface tension, for instance in dispersed flows, bubbly fluid, sprays droplets, or (super-)fluids undergoing phase transitions [24, 57]. The interface between the mixture constituents can be either well-resolved or under-resolved. In the former, surface tension defines the shape of the macroscopic interface, while in the latter, it introduces microinertia due to the bubbles/droplets oscillations. In this paper, we propose a continuum mechanics model for multi-phase flows with macroscopically resolved or continuously distribute interfaces that adheres to both the principles of thermodynamics and Hamiltonian mechanics. In continuum mechanics, there are two alternative approaches to address the effect of surface tension: the sharp interface and diffuse interface approaches, e.g. see [43, 55]. The sharp interface approach treats an interface as a true hypersurface of zero thickness separating pure phases. This is a pure geometrical approach, and any extra physics (e.g. phase transition, mass transfer, etc.) must be introduced as a boundary effect on the interface. On the other hand, in diffuse-interface-type approaches, a new state variable is introduced as a continuous field representing the interface as a narrow mixing zone in which all constituents coexist. In contrast to the sharp interface approaches, extra physics must be added via coupling of the interface field with other physical fields both at the governing-equation level and through the constitutive relations. Modeling surface tension with a diffuse interface approach represents the subject of this paper. In turn, inside of the diffuse interface community, the multi-fluid system can be considered from the two different perspectives. According to the first viewpoint, the mixture is treated as a single continuous medium (singlefluid approach) without distinguishing the individual constituents. The famous examples of such theories are 1 Department of Civil, Environmental and Mechanical Engineering, University of Trento, Via Mesiano 77, Trento 38123, Italy ilya.peshkov@unitn.it 2 Sobolev Institue of Mathematics, 4 Acad. Koptyug avenue, Novosibirsk, Russia, evrom@math.nsc.ru 3 Mathematical Institute, Faculty of Mathematics and Physics, Charles University, Sokolovská 83, Prague 186 75, Czech Republic, pavelka@karlin.mff.cuni.cz 1" 2312.09328v1,"Physical models of bacterial chromosomes Janni Harju 1 and Chase P. Brodersz 1,2, 1 Department of Physics and Astronomy, Vrije Universiteit Amsterdam, 1081 HV Amsterdam, The Netherlands Arnold Sommerfeld Center for Theoretical Physics and Center for NanoScience, Department of Physics, Ludwig-Maximilian-University Munich, Theresienstr. 37, D-80333 Munich, Germany Correspondence: c.p.broedersz @vu.nl 1. Introduction FT The recent surge in experimental techniques to quantitatively probe bacterial chromosome organization poses new and exciting challenges for biophysical modeling. Theoretical and computational biophysical models use concepts from polymer physics to explore how different mechanisms, such as macromolecular crowding (Rivas and Minton, 2016; Polson and Kerry, 2018) or bridging by NAPs (Dame et al., 2020; Amemiya et al., 2021), can affect chromosome organization and dynamics. This minireview focuses on recent models for bacterial chromosome organization, grouped according to their underlying modeling approach, and ordered by increasing complexity. First, we discuss polymer models that study how geometrical and topological constraints affect bacterial chromosomes, such as how cellular confinement or polymer branching influence chromosome conformation and dynamics. Second, we explore bottom-up models, which study how chromosome organization emerges from microscopic mechanisms, like how loop-extrusion by SMC complexes (∼ 50 nm) (Fudenberg et al., 2017; Banigan and Mirny, 2020) can organize chromosomes at the nucleoid scale (∼ 1 µm). Finally, we consider data-driven approaches, which seek to infer a model for chromosome organization, given experimental data, providing a physical interpretation for Hi-C maps. We discuss various benefits and limitations of these different modeling approaches, explore future modeling opportunities and challenges, and summarize key insights into bacterial chromosome organization gained via biophysical modeling. RA The interplay between bacterial chromosome organization and functions such as transcription and replication can be studied in increasing detail using novel experimental techniques. Interpreting the resulting quantitative data, however, can be theoretically challenging. In this minireview, we discuss how connecting experimental observations to biophysical theory and modeling can give rise to new insights on bacterial chromosome organization. We consider three flavors of models of increasing complexity: simple polymer models that explore how physical constraints, such as confinement or plectoneme branching, can affect bacterial chromosome organization; bottom-up mechanistic models that connect these constraints to their underlying causes, for instance chromosome compaction to macromolecular crowding, or supercoiling to transcription; and finally, data-driven methods for inferring interpretable and quantitative models directly from complex experimental data. Using recent examples, we discuss how biophysical models can both deepen our understanding of how bacterial chromosomes are structured, and give rise to novel predictions about bacterial chromosome organization. The genome of many bacterial species is contained in a single circular chromosome, which is compressed by orders of magnitude into the bacterial cell. Microscopy studies have revealed that various factors, such as transcription, Nucleoid Associated Proteins (NAPs), supercoiling, loop-extrusion by SMC complexes, and replication shape bacterial chromosome organization (Dame et al., 2019; Lioy et al., 2021; Yáñez-Cuna and Koszul, 2023; Gogou et al., 2021). However, since microscopy experiments cannot resolve the full 3D conformation of a bacterial chromosome, the effects of genetic and pharmocological perturbations on chromosome organization are often only explored indirectly, for instance by observing how they affect chromosome compaction or segregation. Alternatively, chromosome organization can be studied using sequencing-based methods, including Chromosome Conformation Capture experiments such as Hi-C (Le et al., 2013). Hi-C experiments measure how often pairs of loci are spatially proximate, or “in contact”, averaged over a population of cells. Although interpreting Hi-C data remains challenging, these and other high-resolution quantitative data open new avenues to address old, yet unanswered questions: how are bacterial chromosomes organized across scales? how do various biological mechanisms control this organization? and, how does chromosome organization facilitate biological functions? D 2 2. Geometric and topological constraints determine chromosome organization In its essence, a bacterial chromosome is a long polymer confined to a small volume. The simplest physical models for bacterial chromosome organization explore how different, often biologically motivated, forces and constraints affect the polymer’s organization and dynamics (Fig. 1A). 2.1. Geometric constraints The volume of confinement and constraining loci within the cell are examples of geometric constraints on a bacterial chromosome. Even these minimal constraints can explain well-known features of bacterial chromosome organization: tethering the origin of replication to a cell pole can give rise to linear chromosome organization (Buenemann and Lenz, 2010, 2011), as seen in species such as C. crescentus, while tight confinement can drastically change the way that polymers interact, with implications for bacterial chromosome segregation. Harju & Broedersz | December 18, 2023 | 1–9" 2312.09357v1,"DSS: A Diverse Sample Selection Method to Preserve Knowledge in Class-Incremental Learning Sahil Nokhwal Nirman Kumar Dept. Computer Science University of Memphis Memphis, USA nokhwal.official@gmail.com Dept. Computer Science University of Memphis Memphis, USA nkumar8@memphis.edu Abstract Rehearsal-based techniques are commonly used to mitigate catastrophic forgetting (CF) in Incremental learning (IL). The quality of the exemplars selected is important for this purpose and most methods do not ensure the appropriate diversity of the selected exemplars. We propose a new technique “DSS” – Diverse Selection of Samples from the input data stream in the Class-incremental learning (CIL) setup under both disjoint and fuzzy task boundary scenarios. Our method outperforms state-of-the-art methods and is much simpler to understand and implement. Index Terms Incremental Learning, Continual Learning, Machine Learning, Class-Incremental Learning, Catastrophic Forgetting I. I NTRODUCTION In an incremental learning (IL) scenario, learning is done on a continuous stream of data, rather than on a batch of data. The model is updated regularly (at so-called “task boundaries”) and the learning algorithm cannot store all seen data due to space and computational limitations. Catastrophic forgetting [1] is a problem with the model whereby it forgets what it has learned because old data is no longer accessible. One of the most common approaches to mitigate this problem is to store a representative sample of the previous data, known as exemplars. In the task-incremental model of data, the model during inference has access to the task-ID by which it can refine its inference based on the knowledge of the set of classes in the task. In the classincremental model, no such task-ID is present although the data stream is divided into tasks, and re-training happens at task boundaries. This paper refers to the class-incremental scenario and addresses both disjoint and fuzzy tasks. In disjoint tasks, classes in the tasks are disjoint and in the fuzzy model, some can repeat. Our contributions are as follows: • We propose an exemplar sampling technique(DSS) based on k-center clustering and is robust to outliers. • We demonstrate using extensive experiments on the CIFAR100 [2] dataset, that both for disjoint and fuzzy10 (see Section III for definition), the IL system using DSS outperforms the state-of-the-art methods. II. R ELATED WORK We present a brief overview of existing research on offline methods. Refer to [3] for detailed review." 2312.09358v1,"Echo chamber formation sharpened by priority users Henrique F. de Arruda 1,* , Kleber A. Oliveira 1 , and Yamir Moreno 1,2,3 1 CENTAI Institute, Turin, Italy 2 Institute for Biocomputation and Physics of Complex Systems (BIFI), University of Zaragoza, Zaragoza, Spain 3 Department of Theoretical Physics, Faculty of Sciences, University of Zaragoza, Zaragoza, Spain * henrique.f.arruda@centai.eu ABSTRACT Priority users (e.g., verified profiles on Twitter) are social media users whose content is promoted by recommendation algorithms. However, the impact of this heterogeneous user influence on opinion dynamics, such as polarization phenomena, is unknown. We conduct a computational mechanistic investigation of such consequences in a stylized setting. First, we allow priority users, whose content has greater reach (similar to algorithmic boosting), into an opinion model on adaptive networks. Then, to exploit this gain in influence, we incorporate stubborn user behavior, i.e., zealot users who remain committed to opinions throughout the dynamics. Using a novel measure of echo chamber formation, we find that prioritizing users can inadvertently reduce polarization if they post according to the same rule but sharpen echo chamber formation if they behave heterogeneously. Moreover, we show that a minority of extremist ideologues (i.e., users who are both stubborn and priority) can push the system into a transition from consensus to polarization with echo chambers. Our findings imply that the implementation of the platform’s prioritization policy should be carefully monitored in order to ensure there is no abuse of users with extra influence. 1 Introduction After undergoing a recent shift in its business model, Twitter, a well-studied social media platform [1], has introduced substantial revisions to its verification policy. Users labeled as verified by the platform went from being “active, notable, and authentic” [2] to those who meet substantially more permissive criteria [3] and pay a monthly fee to a subscription plan. The benefits of the subscription involve forms of algorithmic boosting, such as prioritized ranking in replies and searches. However, inadvertently promoting these users may trigger unknown macroscopic effects in the system, especially regarding opinion dynamics [4]. Given this problem, our paper addresses the following research question: what is the effect of inadvertent social media content promotion on opinion polarization and the formation of echo chambers? Social media platforms implemented verification processes to label some users differently than the rest. On Facebook [5] and Instagram [6], it means the platform itself vouches for the authenticity of the associated user account. Concurrently, the role influential individuals play in the spread of information and opinion has been known from much before social media platforms [7, 8]. Hence, many people in society who are famous or influential regardless of social media tend to rely on this feature so that their online influence is not misused or mischaracterized. In prominent cases, a verified account of an influential individual is an active public speech stage where they can perform and carry marketing or political campaigns [9]. The rules for each verification procedure and benefits associated with verified accounts change according to the business model of the platform. As a consequence, there has been much debate [10–13] about how these verified users exert more influence compared to the other users. In the case of Twitter, the change of verification policy has been a cause for concern for institutions that design policies involving situations affected by opinion polarization. For instance, the French Commission for Campaign Accounts and Political Financing (CNCCFP) decided not to allow candidates to subscribe to Twitter’s new verification system ahead of the 2024 French elections [14]. They understand the subscription constitutes an increase of visibility and reach of the subscribed account and hence a form of sponsored advertising. It is not surprising to see policymakers acting preemptively toward perturbation on already polarized scenarios. Opinion polarization is not an easy phenomenon to intervene or control, and as such has been increasingly studied because it is critical to public debate and collective decisions [15, 16]. Many researchers turned their attention to studying this phenomenon ever since measurement via social media data [17, 18] become available, particularly in significant periods (such as upcoming elections or referenda) of democracies around the world [19–22]. Computational models of opinion dynamics have been developed to explain the formative mechanisms behind polarization [23]. Agent-based models are a class of such models that computationally simulate the system through numerous agents whose automated behavior is ore-specified by a set of rules. The majority of the agent-based models encode opinion mechanisms formed from the interaction among agents [24–27]. As a result, network descriptions are largely used in the field. For instance, the persuasion mechanism, characteristic of social networks, has been modeled in the Sznajd model [28, 29]. Adaptive networks have also been modeled and thus identified as a 1" 2312.09359v1,"Children, Parents, and Misinformation on Social Media Filipo Sharevski Jennifer Vander Loop School of Computing DePaul University Chicago, IL 60604 Email: fsharevs@depaul.edu School of Computing DePaul University Chicago, IL 60604 Email: jvande27@depaul.edu Abstract—Children encounter misinformation on social media in a similar capacity as their parents. Unlike their parents, children are an exceptionally vulnerable population because their cognitive abilities and emotional regulation are still maturing, rendering them more susceptible to misinformation and falsehoods online. Yet, little is known about children’s experience with misinformation as well as what their parents think of the misinformation’s effect on child development. To answer these questions, we combined a qualitative survey of parents (n=87) with semi-structured interviews of both parents and children (n=12). We found that children usually encounter deep fakes, memes with political context, or celebrity/influencer rumors on social media. Children revealed they ask Siri whether a social media video or post is true or not before they search on Google or ask their parents about it. Parents expressed discontent that their children are impressionable to misinformation, stating that the burden falls on them to help their children develop critical thinking skills for navigating falsehoods on social media. Here, the majority of parents felt that schools should also teach these skills as well as media literacy to their children. Misinformation, according to both parents and children affects the family relationships especially with grandparents with different political views than theirs. 1. Introduction Social media has become an integral part of the lives of children aged 11 to 17. According to a 2021 census, 32% of the surveyed children expressed that they couldn’t live without YouTube, spending approximately two hours a day on this or other platforms like TikTok [1]. YouTube is the platform that 54% of teenagers use as their main source of news, in addition to the educational and entertainment content they consume there [2]. But YouTube and TikTok are, at the same time, the platforms that host considerable misinformation [3], [4], despite their active moderation of falsehoods and inaccurate content [5], [6]. Though the content appropriateness on social media platforms among children is regulated through age restrictions under the Children’s Online Privacy Protection Act (COPPA) [7], it remains relatively easy for children to falsify their date of birth or use older family members’ accounts to gain access to social media platforms, potentially exposing them to content that is not suitable for their age [8]. In addition, YouTube’s and TikTok’s algorithmic incentives do appear to distort children’s content in potentially unhealthy ways [9], [10], not excluding misinformation [11], [12]. The impact of social media is particularly pronounced in the context of children’s development, as they find themselves at a stage where their social and emotional growth leaves them susceptible to influence, and their capacity for self-regulation is still limited [13]. Extensive research has thus delved into the various developmental challenges children face as a result of their interactions with (un)suitable content on social media, such as anxiety, depression, dietary concerns, and sleep disturbances [13], [14], [15]. For example, the extended use of social media during the early stages of the COVID-19 pandemic caused increased anxiety among both children and their parents [16]. Yet, little to none is known about what misinformation content children encounter on social media and how that affects their development. Furthermore, there is a gap in the understanding of the concerns, experiences, and opinions parents have relative to how misinformation shapes both the interpersonal relationships and the development of their children. To address these gaps, we conducted a two-staged study where we first surveyed 87 parents to answer the following research questions: • RQ1: What experience do parents have relative to their children’s exposure to misinformation on social media? • • RQ2a: What opinions do parents have relative to how children’s exposure to misinformation should be handled from a parenting perspective? RQ2b: What opinions do parents have relative to how children’s exposure to misinformation should be handled from an educational/literacy perspective? RQ3: How does misinformation affect the development of children, in the opinion of their parents? We followed up with the parents we surveyed to do a semi-structured interview in the second stage of their study, together with their child, in order to broaden our understanding of how parents and children deal with misinformation. Twelve families agreed to do an interview relative to the •" 2312.09367v1,"Text-Guided Face Recognition using Multi-Granularity Cross-Modal Contrastive Learning Md Mahedi Hasan, Shoaib Meraj Sami, and Nasser Nasrabadi West Virginia University, Morgantown, West Virginia, USA mh00062@mix.wvu.edu, sms00052@mix.wvu.edu, nasser.nasrabadi@mail.wvu.edu Abstract State-of-the-art face recognition (FR) models often experience a significant performance drop when dealing with facial images in surveillance scenarios where images are in low quality and often corrupted with noise. Leveraging facial characteristics, such as freckles, scars, gender, and ethnicity, becomes highly beneficial in improving FR performance in such scenarios. In this paper, we introduce text-guided face recognition (TGFR) to analyze the impact of integrating facial attributes in the form of natural language descriptions. We hypothesize that adding semantic information into the loop can significantly improve the image understanding capability of an FR algorithm compared to other soft biometrics. However, learning a discriminative joint embedding within the multimodal space poses a considerable challenge due to the semantic gap in the unaligned image-text representations, along with the complexities arising from ambiguous and incoherent textual descriptions of the face. To address these challenges, we introduce a face-caption alignment module (FCAM), which incorporates cross-modal contrastive losses across multiple granularities to maximize the mutual information between local and global features of the face-caption pair. Within FCAM, we refine both facial and textual features for learning aligned and discriminative features. We also design a face-caption fusion module (FCFM) that applies fine-grained interactions and coarse-grained associations among cross-modal features. Through extensive experiments conducted on three face-caption datasets, proposed TGFR demonstrates remarkable improvements, particularly on low-quality images, over existing FR models and outperforms other related methods and benchmarks. 1. Introduction Current one-to-one face recognition (FR) algorithms such as ArcFace [5] and AdaFace [22] face challenges in achieving high verification rates (VR), particularly in surveillance-based applications [13, 47], where a lowresolution face probe is captured under non-ideal conditions. Covariate factors like non-uniform lighting, occlusion, and non-frontal pose in such scenarios, severely degrade the image quality, leading to decreased matching performance [27, 47]. One way to improve the performance of an FR algorithm is to integrate auxiliary information, such as facial marks, gender, age, skin and hair color, facial expression, and other distinctive facial attributes to a face recognition model [11, 19, 49]. Natural language descriptions, which highlight the distinct characteristics of a face image, can also be employed as a soft biometric to improve the performance of a FR model [14]. In this research, we hypothesize that semantic information can substantially improve the image understanding capability of an FR algorithm compared to other soft biometrics. Therefore, the core idea of this research is to develop a model that effectively integrates textual descriptions with facial images, thereby maximizing performance. As both image and textual modalities are complementary to each other, the combination of textual and facial features will result in a significant performance leap. This text-guided face recognition (TGFR) has great potential for applications in systems where face images are captured in real-world settings, such as criminal investigations and intelligent video surveillance [14]. In criminal investigations, the testimony of the witnesses can be effectively utilized within the TGFR model to find or narrow down the potential suspects even from low-quality images. However, integrating textual descriptions or captions within a FR loop poses several challenges. Firstly, natural language captions are inherently more abstract than facial images. A limited set of facial attributes may be insufficient to convey all the fine-grained details of a complex face image. Secondly, as describing a face image involves subjective judgment, captions written by different annotators for a particular face can be completely or partially different. Sometimes, an attribute, which one annotator considers important may be ignored by others. Thirdly, different captions of a particular face image may contain large word" 2312.09379v1,"Enhanced EEG-Based Mental State Classification : A novel approach to eliminate data leakage and improve training optimization for Machine Learning Maxime Girard, Rémi Nahon, Enzo Tartaglione and Van-Tam Nguyen LTCI, Télécom Paris, Institut Polytechnique de Paris maxime.girard@telecom-paris.fr Abstract—In this paper, we explore prior research and introduce a new methodology for classifying mental state levels based on EEG signals utilizing machine learning (ML). Our method proposes an optimized training method by introducing a validation set and a refined standardization process to rectify data leakage shortcomings observed in preceding studies. Furthermore, we establish novel benchmark figures for various models, including random forest and deep neural networks. Keywords—Attention standardization I. state classification, EEG, DNN, I NTRODUCTION Attention is the cognitive process involving the selection of environmental information for conscious processing [1]. Electroencephalographic (EEG) signals provide insights into the level of attention [2]. The surge in algorithms and machine learning models for attention level determination is driven by the diverse applications of attention classification. These applications span from educational tools incorporating workload monitoring to medical interventions for conditions like depression, schizophrenia, and anxiety disorders [3]. Recent studies employ signal analysis methods to leverage the frequency properties of brain signals [4][5]. Various models, such as LSTM [6], deep neural networks [4], or SVM [5][7], are trained to categorize frequencies derived from raw signals. In this paper, we draw upon the findings of previous research, specifically [4] and [5], to present a new approach to split a public dataset containing raw EEG signals for enhanced mental state classification. We delve into the standardization method outlined in [4] and propose an alternative technique to standardize the feature vector, addressing shortcomings inherent in the prior method. Ultimately, we define updated benchmark accuracy metrics on the dataset employing various models, encompassing random forest and deep neural networks. II. D ATASET AND METHOD A. Raw signals dataset used We utilized a publicly accessible dataset proposed in [5]. This dataset comprises raw signals captured from seven electrodes of a modified EEG Epoc headset placed on the brain cavity, identified as F3, F4, Fz, C3, C4, Cz, and Pz in the 10-20 electrode system [8]. The sampling frequency for the records is 128Hz. The dataset was formed from a population of five individuals. For each participant, except one, seven sessions have been recorded, each lasting at least 40 minutes. For the remaining participant, only six sessions were recorded. Each recording session consisted of three phases: in the initial ten minutes, participants were asked to control a train on a simulator (focused state); in the next ten minutes, participants were instructed to watch the screen without controlling anything, with the instruction not to close their eyes (unfocused state); and after that, participants were asked to relax and close their eyes (drowsed state). The first two records for each participant were used for habituation and are not suitable for classification [4]. It is important to note that the dataset's size is limited, which may pose a challenge for generalization [9]. B. Previous works Prior studies proposed the categorization of the dataset into three classes (focused, unfocused, drowsed) using diverse techniques [4][5]. Within these studies, three main paradigms for training a classifier can be identified: 1. Common-subject paradigm. The dataset is split into two parts, independently of the subject. 80% of the data is used for training, while the remaining 20% is reserved for evaluation. 2. Subject-specific paradigm. The classifier is trained on a single subject. For this specific subject, 80% of the data is used for training, while the remaining 20% is reserved for evaluation. 3. Leave-one-out paradigm. A subject is chosen as the test subject. The data from all other subjects are employed for training, and the classifier is evaluated using the data from the designated test subject. Research work [5] uses SVM to classify on subjectspecific paradigm and found an accuracy of 96.70% for subject 1. Using a 6 layers deep neural network, [4] found an accuracy of 99.9% on the best subject. Research work [4] also found an accuracy of 99.2% using SVM with the commonsubject paradigm. In the leave-one-out paradigm, accuracy is computed by averaging the accuracy obtained when iterating the test subject across the five subjects in the dataset. In [4], the best accuracy for leave-one-out is 67%. C. Splitting method In this paper, our focus centers on the leave-one-out paradigm, which closely aligns with real-life situations, particularly given the high variability among subjects in EEG signals [10]. Unlike previous studies [4][5] where the dataset is divided into train and test sets, we introduce a new method for dataset splitting ( Fig. 1.a ). Here, the dataset is partitioned into three segments: train, validation, and test [15]. Similar to the leave-one-out paradigm in prior works [4][5], one subject is designated as the test subject. To construct a validation set, we opt to select the last record from the four remaining subjects, with the remaining records allocated for training. Recognizing the limited diversity in our dataset, we refrain from using all records of a specific subject as a validation set to ensure ample variety in the training set for generalization purposes [9]. The introduction of a validation set is essential for implementing a learning rate scheduler and an early" 2312.09397v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Large Language Models for Autonomous Driving: Real-World Experiments Can Cui, Student Member, IEEE, Zichong Yang, Student Member, IEEE, Yupeng Zhou, Yunsheng Ma, Student Member, IEEE, Juanwu Lu, Student Member, IEEE, and Ziran Wang, Member, IEEE Abstract—Autonomous driving systems are increasingly popular in today’s technological landscape, where vehicles with partial automation have already been widely available on the market, and the full automation era with “driverless” capabilities is near the horizon. However, accurately understanding humans’ commands, particularly for autonomous vehicles that have only passengers instead of drivers, and achieving a high level of personalization remain challenging tasks in the development of autonomous driving systems. In this paper, we introduce a Large Language Model (LLM)-based framework Talk-to-Drive (Talk2Drive) to process verbal commands from humans and make autonomous driving decisions with contextual information, satisfying their personalized preferences for safety, efficiency, and comfort. First, a speech recognition module is developed for Talk2Drive to interpret verbal inputs from humans to textual instructions, which are then sent to LLMs for reasoning. Then, appropriate commands for the Electrical Control Unit (ECU) are generated, achieving a 100% success rate in executing codes. Real-world experiments show that our framework can substantially reduce the takeover rate for a diverse range of drivers by up to 90.1%. To the best of our knowledge, Talk2Drive marks the first instance of employing an LLM-based system in a real-world autonomous driving environment, and the experiment videos are available on https://youtube.com/ playlist?list=PLgcRcf9w8BmJfZigDhk1SAfXV0FY65cO7&si= 0WlBDsahyTcdvFWe Index Terms—Large language models, autonomous driving, intelligent vehicles, personalization, experiment I. INTRODUCTION A. Background Making wise and sound decisions based on verbal commands from human drivers and passengers is essential for the safety and reliability of autonomous vehicles [1], [2], [3]. This requires not only a technical translation and understanding of commands but also a common-sense grasp and an emotional understanding of the nuances inherent in human speech. Consequently, Large Language Models (LLMs) have emerged in popularity among researchers in this field [4], [5], [6], [7]. Their comprehensive knowledge base, sourced from numerous data, and strong reasoning abilities enable them to interpret and act upon a wide range of human inputs with remarkable accuracy and human-like understanding. C. Cui, Z. Yang, Y. Zhou, Y. Ma, J. Lu, and Z. Wang are with the College of Engineering, Purdue University, West Lafayette, IN 47907, USA (e-mail: cancui@purdue.edu; zichong@purdue.edu; zhou1346@purdue.edu; yunsheng@purdue.edu; juanwu@purdue.edu; ryanwang11@hotmail.com). Copyright (c) 2023 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. Traditional approaches in the field of autonomous driving, while effective in certain aspects, confront several critical limitations when it comes to understanding and adapting to the complex commands from humans: Traditional autonomous driving systems rely on manually configured human preferences. When it encounters similar driving scenarios, the system lacks the ability to create a profile from historical configuration data and adjust accordingly to bring human preferences to the scenario. • Conventional systems struggle to interpret and adapt to the abstract instructions from humans. Humans are good at expressing their feelings on whether the current driving pattern is comfortable to them, but find it hard to give commands in exact numerical expressions. Such indirectness poses challenges to traditional autonomous driving systems as they lack deeper contextual and emotional understanding. • Most current autonomous driving systems are trained on limited and model-specific driving data, which results in the deficiency of driving context information and a large database of common sense that would greatly help decision-making. Therefore, there are underlying risks for the system to make bad decisions in unseen or rare scenarios. • To tackle these challenges and successfully integrate LLMs into autonomous driving systems, we introduce a novel framework known as Talk2Drive. In particular, it transforms verbal commands from humans into textual instructions, which are then processed by LLMs in the cloud. LLMs generate specific driving codes that are executed by the autonomous vehicle, adjusting driving behaviors and control parameters to align with the human’s preferences. A memory module in the vehicle stores all human-vehicle interaction data, ensuring each driving experience is personalized based on the human’s historical preferences and commands. This approach is designed to overcome several key challenges faced by traditional autonomous driving systems. One of the standout features of the Talk2Drive framework is its personalization capability, which is achieved through a novel memory module that records historical commands and feedback between the human and the vehicle. Each time the LLMs are activated, this memory module is loaded, enabling the system to recall previous interactions and preferences. This historical context allows the LLMs to enhance their responses and driving modes to the individual human, enhancing the personalization of the driving experience." 2312.09403v1,"Physics-Informed Deep Learning of Rate-and-State Fault Friction Cody Rucker a,∗ , Brittany A. Erickson a,b a Department of Computer Science, University of Oregon, 1477 E 13th Ave, 97403, Eugene, United States of America b Department of Earth Sciences, University of Oregon, 1272 University of Oregon, Eugene, 97403, United States of America Abstract Direct observations of earthquake nucleation and propagation are few and yet the next decade will likely see an unprecedented increase in indirect, surface observations that must be integrated into modeling efforts. Machine learning (ML) excels in the presence of large data and is an actively growing field in seismology. However, not all ML methods incorporate rigorous physics, and purely data-driven models can predict physically unrealistic outcomes due to observational bias or extrapolation. Our work focuses on the recently emergent Physics-Informed Neural Network (PINN), which seamlessly integrates data while ensuring that model outcomes satisfy rigorous physical constraints. In this work we develop a multi-network PINN for both the forward problem as well as for direct inversion of nonlinear fault friction parameters, constrained by the physics of motion in the solid Earth, which have direct implications for assessing seismic hazard. We present the computational PINN framework for strike-slip faults in 1D and 2D subject to rate-and-state friction. Initial and boundary conditions define the data on which the PINN is trained. While the PINN is capable of approximating the solution to the governing equations to low-errors, our primary interest lies in the network’s capacity to infer friction parameters during the training loop. We find that the network for the parameter inversion at the fault performs much better than the network for material displacements to which it is coupled. Additional training iterations and model tuning resolves this discrepancy, enabling a robust surrogate model for solving both forward and inverse problems relevant to seismic faulting. Keywords: physics-informed neural network, rate-and-state friction, earthquake, inverse problem, fully dynamic ∗ Corresponding author Email address: crucker@uoregon.edu (Cody Rucker)" 2312.09411v1,"OTOv3: Automatic Architecture-Agnostic Neural Network Training and Compression from Structured Pruning to Erasing Operators Tianyi Chen TIACHEN @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA Tianyu Ding TIANYUDING @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA Zhihui Zhu ZHU .3440@ OSU . EDU The Ohio State of University Columbus, OH 43210, USA Zeyu Chen ZEYU . CHEN @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA HsiangTao Wu MUSCLEWU @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA Ilya Zharkov ZHARKOV @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA Luming Liang LULIAN @ MICROSOFT . COM Microsoft Redmond, WA 98052, USA Abstract Compressing a predefined deep neural network (DNN) into a compact sub-network with competitive performance is crucial in the efficient machine learning realm. This topic spans various techniques, from structured pruning to neural architecture search, encompassing both pruning and erasing operators perspectives. Despite advancements, existing methods suffers from complex, multistage processes that demand substantial engineering and domain knowledge, limiting their broader applications. We introduce the third-generation Only-Train-Once (OTOv3), which first automatically trains and compresses a general DNN through pruning and erasing operations, creating a compact and competitive sub-network without the need of fine-tuning. OTOv3 simplifies and automates the training and compression process, minimizes the engineering efforts required from users. It offers key technological advancements: (i) automatic search space construction for general DNNs based on dependency graph analysis; (ii) Dual Half-Space Projected Gradient (DHSPG) and its enhanced version with hierarchical search (H2SPG) to reliably solve (hierarchical) structured sparsity problems and ensure sub-network validity; and (iii) automated sub-network construction using solutions from DHSPG/H2SPG and dependency graphs. Our empirical results demonstrate OTOv3’s effectiveness across various benchmarks in structured pruning and neural architecture search. OTOv3 produces sub-networks that match or exceed the state-of-the-arts. The source code will be available at https://github.com/tianyic/only_train_once. ©2023 Tianyi Chen. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/." 2312.09424v1,"Open Domain Knowledge Extraction for Knowledge Graphs Kun Qian, Anton Belyi, Fei Wu, Samira Khorshidi, Azadeh Nikfarjam, Rahul Khot, Yisi Sang, Katherine Luna, Xianqi Chu, Eric Choi, Yash Govind, Chloe Seivwright, Yiwen Sun, Ahmed Fakhry, Theo Rekatsinas, Ihab Ilyas, Xiaoguang Qi, Yunyao Li Apple {kunqian, a belyy, fwu7, samiraa, anikfarjam}@apple.com {r khot, yisi sang, kluna, xchu23, eyhchoi}@apple.com {yash govind, cseivwright, yiwen sun, afakhry}@apple.com {trekatsinas, iilyas, xiaoguang qi, yunyaoli}@apple.com Abstract—The quality of a knowledge graph directly impacts the quality of downstream applications (e.g. the number of answerable questions using the graph). One ongoing challenge when building a knowledge graph is to ensure completeness and freshness of the graph’s entities and facts. In this paper, we introduce ODKE, a scalable and extensible framework that sources high-quality entities and facts from open web at scale. ODKE utilizes a wide range of extraction models and supports both streaming and batch processing at different latency. We reflect on the challenges and design decisions made and share lessons learned when building and deploying ODKE to grow an industry-scale open domain knowledge graph. Index Terms—knowledge graph, knowledge extraction I. I NTRODUCTION A knowledge graph (KG) organizes open-domain knowledge in a structured way by capturing relationships and semantic connections between entities. It provides a comprehensive and interconnected view of information that powers many realworld applications, such as question answering, relationship extraction, entity disambiguation, and data integration [1], [2]. The usefulness and importance of knowledge graphs become even more pronounced in the era of large language models (LLMs), as LLMs are known for lack of factual knowledge and therefore often hallucinate factually incorrect claims [3], [4]. Curated KGs, known for their high quality and reliability, offer dependable, structured, and explainable knowledge, which black-box models like LLMs are unable to offer [5], [6]. Traditionally, ensuring accurate knowledge ingestion into KGs has involved tedious and costly human curation [7]. To avoid or mitigate the labor intensive and obviously nonscalable process, it is essential to develop an automated knowledge extraction and ingestion framework that can continuously update KGs with highly accurate facts to maintain their completeness and freshness. However, several challenges must be addressed in order to achieve this goal: • Large volume of data. The amount of data and facts contained on the Web is enormous and continuously growing. According to an estimation by WorldWideWebSize.com, there are about 40-50 billion web pages indexed by Google as of July 2023. In fact, Wikipedia alone contains 58M articles [8]. We need to handle the scalability challenge posed by Web-scale data. • Wide variety of data and tasks. The Web contains a wide variety of data, from plain text to semi-structured data and mixtures of both. Figure 1 illustrates the various forms in which knowledge can be expressed on the open Web. To extract high-quality facts from the Web, we need extractors that are capable of extracting high-quality facts for different types of entities in various modalities from different data sources. • High veracity. The Web is noisy and often contains wrong and conflicting facts, e.g., NBA player Antetokounmpo’s height is “2.13 m” according to his Wikipedia page (Fig. 1(b)) and NBA official page (accessed June 2023), while his Wikidata page shows “211 cm” (Fig.1(d)). Additionally, certain facts, such as an individual’s marital status and the head coach of a professional sports team, may change over time. As such, it becomes imperative to identify the most accurate and current facts. Various velocity. Timely extracting fresh knowledge from Web and ingesting into KG is crucial for many downstream applications. Everyday, new popular entities such as trendy YouTubers and TikTokers emerge, and their fans eagerly seek up-to-date information about them. Take English Wikipedia pages as an example, roughly 2 million English Wikipedia pages got edited monthly and an average of 549 new articles are created per day [9]. Although non-time-sensitive facts can be updated in a weekly batch fashion, some facts need to be updated much more faster (e.g., newly announced Academy Award winners). Most prior work focuses on some individual problems such as extracting knowledge from semi-structured data [10]–[12]. Few of these works actually build an end-to-end automated extraction and ingestion framework at industrial scale. One exception is [13], which proposed an end-to-end KG completion framework with search-based question answering. The •" 2312.09425v1,"YouTube Videos for Public Health Literacy? A Machine Learning Pipeline to Curate Covid-19 Videos Yawen GUO a , Xiao LIU b , Anjana SUSARLA c , Rema PADMAN d a University of California, Irvine b Arizona State University c Michigan State University d Carnegie Mellon University Abstract. The COVID-19 pandemic has highlighted the dire necessity to improve public health literacy for societal resilience. YouTube, the largest video-sharing social media platform, provides a vast repository of user-generated health information in a multi-media-rich format which may be easier for the public to understand and use if major concerns about content quality and accuracy are addressed. This study develops an automated solution to identify, retrieve and shortlist medically relevant and understandable YouTube videos that domain experts can subsequently review and recommend for disseminating and educating the public on the COVID-19 pandemic and similar public health outbreaks. Our approach leverages domain knowledge from human experts and machine learning and natural language processing methods to provide a scalable, replicable, and generalizable approach that can also be applied to enhance the management of many health conditions. Keywords. Visual social media, machine learning, natural language processing, healthcare informatics, COVID-19 literacy 1. Introduction The easy availability of vast amounts of medical information on the Internet, coupled with the rapid growth in the use of social media by the public, patients, and clinicians alike, has transformed how consumers access medical information to manage their health information needs and illnesses [1]. Traditionally, patients receive such information and instructions in text format from their healthcare providers and organizations. However, purely text-based medical information has been found to reduce user attention, understanding, recall, and compliance, especially for patients with low literacy levels [2]. Hence, it is important to design educational materials for patients and the general public that increase engagement and participation in health-related decision-making. YouTube hosts millions of health-related videos about the pathogenesis, diagnosis, treatment, and prevention of many medical conditions, including COVID-19. This vast repository of audio-visual content, created by both professional healthcare organizations and random individuals, is of widely varying quality and a challenge for both the public and healthcare professionals to search and retrieve credible and relevant videos as a justin-time, contextualized, prescriptive, digital therapeutic and educational intervention." 2312.09456v1,"Pioneering EEG Motor Imagery Classification Through Counterfactual Analysis Kang Yin Hye-Bin Shin Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea charles kang@korea.ac.kr Dept. of Brain and Cognitive Engineering Korea University Seoul, Republic of Korea hb shin@korea.ac.kr Hee-Dong Kim Seong-Whan Lee Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea hd kim@korea.ac.kr Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea sw.lee@korea.ac.kr Abstract—The application of counterfactual explanation (CE) techniques in the realm of electroencephalography (EEG) classification has been relatively infrequent in contemporary research. In this study, we attempt to introduce and explore a novel non-generative approach to CE, specifically tailored for the analysis of EEG signals. This innovative approach assesses the model’s decision-making process by strategically swapping patches derived from time-frequency analyses. By meticulously examining the variations and nuances introduced in the classification outcomes through this method, we aim to derive insights that can enhance interpretability. The empirical results obtained from our experimental investigations serve not only to validate the efficacy of our proposed approach but also to reinforce human confidence in the model’s predictive capabilities. Consequently, these findings underscore the significance and potential value of conducting further, more extensive research in this promising direction. The implementation is available at https://github.com/Kang1121/EEG-Counterfactual. Keywords–electroencephalography, counterfactual explanation; I. INTRODUCTION The evolution of electroencephalograph (EEG) analysis and brain-computer interfaces (BCI) has greatly benefited from emerging computational techniques. Kim et al. [1] highlight the integration of convolutional neural network (CNN) in single-trial electromyography (EMG) analysis. Thung et al. [2] delve into predictive modeling for cognitive impairments using matrix completion techniques. Ma et al. [3] integrate CNN with attention for motor imagery (MI) classification. In parallel, Lee et al. [4] have showcased the potential influence of auditory stimuli on brain functions, and Roy [5] fuses multiscale features for multi-classification. Such advancements co- This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant, funded by the Korea government (MSIT) (No. 2019-0-00079, Artificial Intelligence Graduate School Program (Korea University)) and was partly supported by the Institute of Information & communications Technology Planning & Evaluation (IITP) grant, funded by the Korea government (MSIT) (No. 2021-0-02068, Artificial Intelligence Innovation Hub). exist with intriguing research into the neural underpinnings of emotion representation [6] and state-of-the-art multi-view CNN architectures [7] for BCI. But while these methods show promise, it’s unclear how they make predictions about EEG data. The comprehension of deep learning, indeed, can often be challenging and complex. Some research [8], [9] try to explain EEG models using tools like shapley additive explanations (SHAP) [10] and layer-wise relevance propagation (LRP) [11], focusing on the importance of certain features or neurons. Yet, these tools may not offer clear or actionable insights. Another approach, counterfactual explanation (CE), offers more direct advice by suggesting specific changes to input data. While CE is popular in image studies, it’s less common in brain-machine research. Our paper looks at how CE might help clarify EEG model predictions, drawing from previous research [12] in image analysis. In this study, we apply CE to vividly illustrate how a model gives its predictions from specific regions within EEG spectrogram. We emphasize the connection between the counterfactuals and their original data samples. Our findings indicate that implementing CE in EEG studies is not only feasible but also holds considerable potential for further exploration. This research makes two significant advancements: • We present an innovative approach by employing CE to shed light on EEG classifications. As far as we’re aware, ours is a pioneering effort in this domain with EEG signals. • We consciously bypass generative CE. Such a decision guarantees that the resulting CE remains consistent with genuine, credible data and is particularly apt for the more compact datasets common in EEG research. II. METHODOLOGY A. Problem Formulation Consider an EEG spectrogram dataset I with C classes. For a class c with n samples, let query set Q = {I i c } ni=1 and" 2312.09461v1,"Improving Generalization of Drowsiness State Classification by Domain-Specific Normalization Dong-Young Kim Dong-Kyun Han Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea dy kim@korea.ac.kr Dept. of Brain and Cognitive Engineering Korea University Seoul, Republic of Korea dk han@korea.ac.kr Seo-Hyeon Park Geun-Deok Jang Seong-Whan Lee Dept. of Brain and Cognitive Engineering Korea University Seoul, Republic of Korea tjgus9190@korea.ac.kr Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea gd jang@korea.ac.kr Dept. of Artificial Intelligence Korea University Seoul, Republic of Korea sw.lee@korea.ac.kr Abstract—Abnormal driver states, particularly have been major concerns for road safety, emphasizing the importance of accurate drowsiness detection to prevent accidents. Electroencephalogram (EEG) signals are recognized for their effectiveness in monitoring a driver’s mental state by monitoring brain activities. However, the challenge lies in the requirement for prior calibration due to the variation of EEG signals among and within individuals. The necessity of calibration has made the brain-computer interface (BCI) less accessible. We propose a practical generalized framework for classifying driver drowsiness states to improve accessibility and convenience. We separate the normalization process for each driver, treating them as individual domains. The goal of developing a general model is similar to that of domain generalization. The framework considers the statistics of each domain separately since they vary among domains. We experimented with various normalization methods to enhance the ability to generalize across subjects, i.e. the model’s generalization performance of unseen domains. The experiments showed that applying individual domain-specific normalization yielded an outstanding improvement in generalizability. Furthermore, our framework demonstrates the potential and accessibility by removing the need for calibration in BCI applications. Keywords—driver drowsiness classification, electroencephalogram, domain generalization, normalization I. INTRODUCTION Brain-computer interface (BCI) is a technology that connects our brains to external devices or computers [1], [2]. Among the different types of BCI, using electroencephalogram (EEG) signals to detect emotional and mental states is referred to as passive BCI [3]. Passive BCI systems don’t require us to actively think about things unlike active BCI [4]–[7] and quietly observe our mental states. Affective BCI, which is a part of passive BCI, focuses on understanding and recognizing our feelings and emotions [8], [9] like motion sickness [10], This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant, funded by the Korea government (MSIT) (No. 2019-0-00079, Artificial Intelligence Graduate School Program (Korea University); No. 2021-0-02068, Artificial Intelligence Innovation Hub). drowsiness [11]. These states are detected by EEG, galvanic skin response, heart rate, etc. Abnormal driver states, including drowsiness and motion sickness, have long been a major cause of road accidents [12]. Therefore, early detection and prevention of abnormal drive states is necessary [13]. Among various monitoring methods, physiological signals, particularly electroencephalogram (EEG) signals, are effective for monitoring driver states because they directly measure brain activity, reflecting the driver’s mental condition [14], [15]. EEG signal, on the other hand, is a challenging method to use due to its intra-variability and inter-variability [16]. It varies based on factors such as measurement duration, the person’s physical condition, and mood, and the placement of sensors. Typically, a calibration session is needed to fine-tune the system for each user by collecting user-specific data for about 30 minutes. Calibration is not only time-consuming but can also result in a negative user experience. Therefore, transfer learning [17], especially domain generalization (DG) has been widely used to enhance user convenience by eliminating calibration. We addressed the problem from a DG perspective by considering users as independent domains and treating the variability as a domain shift. The goal of developing a generalized drowsiness classification framework without calibration is similar to DG [3]. There has been an increase in interest recently in specifying it as a DG task. Cui et al. [18] extracted power spectral density features and applied episodic training, a DG method in computer vision. Kim et al. [19] applied augmentation and regularization inspired by DG methods. In particular, normalization in deep neural networks has shown an impact on DG tasks [20], [21]. A straightforward approach would involve training a deep neural network with domain-invariant normalization, applying all training samples regardless of their respective domain. However, as statistics vary across different source domains, using mixed statistics" 2312.09496v1,"Image Deblurring using GAN Zhengdong Li Department of Electronic and Computer Engineering HKUST zlifd@connect.ust.hk Abstract In recent years, deep generative models, such as Generative Adversarial Network (GAN), has grabbed significant attention in the field of computer vision. This project focuses on the application of GAN in image deblurring with the aim of generating clearer images from blurry inputs caused by factors such as motion blur. However, traditional image restoration techniques have limitations in handling complex blurring patterns. Hence, a GAN-based framework is proposed as a solution to generate high-quality deblurred images. The project defines a GAN model in Tensorflow and trains it with GoPRO dataset. The Generator will intake blur images directly to create fake images to convince the Discriminator which will receive clear images at the same time and distinguish between the real image and the fake image. After obtaining the trained parameters, the model was used to deblur motion-blur images taken in daily life as well as testing set for validation. The result shows that the pretrained network of GAN can obtain sharper pixels in image, achieving an average of 29.3 Peak Signal-to-Noise Ratio (PSNR) and 0.72 Structural Similarity Assessment (SSIM). This help to effectively address the challenges posed by image blurring, leading to the generation of visually pleasing and sharp images. By exploiting the adversarial learning framework, the proposed approach enhances the potential for real-world applications in image restoration. 1 Introduction Generative adversarial networks (GANs), introduced by Ian J. Goodfellow [1] in 2014, is unsupervised deep learning machine . It involves 2 components: the Generator and the Discriminator. The Generator tries to mimic a target data distribution while the Discriminator tries to distinguish the samples coming from the Generator and the real data. In the recent years, with the rising concepts of deep learning, multiple methods based on GAN have been proposed for image 1" 2312.09499v1,"The limit theorems on extreme order statistics and partial sums of i.i.d. random variables ∗ Gaoyu Li 1,2 Zhongquan Tan 2† 1. Department of Mathematic, Zhejiang Normal University, Jinhua 321004, PR China 2. College of Data Science, Jiaxing University, Jiaxing 314001, PR China Abstract: This paper proves several weak limit theorems for the joint version of extreme order statistics and partial sums of independently and identically distributed random vari- ables. The results are also extended to almost sure limit version. Key Words: extreme order statistics; partial sums; point process; almost sure limit theorem AMS Classification: Primary 60G70; secondary 60G55 1 Introduction Since the maxima and partial sums of a sequence of random variables played very important role in theoretical and applied probability, many authors studied their joint asymptotic proper- ties. Chow and Teugels (1978) first investigated asymptotic relation between the maxima and partial sums of a sequence of independently and identically distributed (i.i.d.) random vari- ables {X n , n ≥ 1}. Denote by M n and S n the maximum and partial sum of {X 1 , X 2 , · · · , X n }, respectively. Suppose that there exist constants a n > 0, b n ∈ R, n ≥ 1 and a non-degenerate distribution G(x) such that lim P (a n (M n − b n ) ≤ x) = G(x), n→∞ where G must be one of the following three types of extreme value distributions:  Gumbel: Λ(x) = exp −e −x , −∞ < x < +∞;  0, x ≤ 0, Frechet: Φ α (x) = α ≥ 0; exp (−x −α ) , x > 0,  exp (−(−x) α ) , x ≤ 0, Weibull: Ψ α (x) = α > 0. 1, x > 0, If {X n , n ≥ 1} has finite variance, Chow and Teugels (1978) showed that   S n lim P a n (M n − b n ) ≤ x, √ ≤ y = G(x)Φ(y), n→∞ n (1) which indicates the maximum and the partial sum are asymptotically independent. If {X n , n ≥ 1} has infinite variance, Chow and Teugels (1978) showed that the maximum and the partial sum are asymptotically dependent. ∗ Research supported by Innovation of Jiaxing City: a program to support the talented persons and Project of new economy research center of Jiaxing City (No. WYZB202254). † Corresponding author. E-mail address: tzq728@163.com 1" 2312.09514v1,"SINGLE PLANE WAVE TAKES A SHORTCUT TO PLANE WAVE COMPOUNDING IN ULTRASOUND IMAGING Zhiqiang Li † , Hengrong Lan † , Lijie Huang, Qiong He, and Jianwen Luo * Department of Biomedical Engineering, School of Medicine, Tsinghua University, Beijing, China * E-mail: luo_jianwen@tsinghua.edu.cn ABSTRACT Reconstruction of ultrasound (US) images from radio-frequency data can be conceptualized as a linear inverse problem. Traditional deep learning approaches, which aim to improve the quality of US images by directly learning priors, often encounter challenges in generalization. Recently, diffusion-based generative models have received significant attention within the research community due to their robust performance in image reconstruction tasks. However, a limitation of these models is their inherent low speed in generating image samples from pure Gaussian noise progressively. In this study, we exploit the inherent similarity between the US images reconstructed from a single plane wave (PW) and PW compounding (PWC). We hypothesize that a single PW can take a shortcut to reach the diffusion trajectory of PWC, removing the need to begin with Gaussian noise. By employing an advanced diffusion model, we demonstrate its effectiveness in US image reconstruction, achieving a substantial reduction in sampling steps. In-vivo experimental results indicate that our approach can reduce sampling steps by 60%, while preserving comparable performance metrics with the conventional diffusion model. Index Terms— Ultrasound imaging, Diffusion model, Image reconstruction, Plane wave 1. INTRODUCTION Ultrasound (US) imaging is widely used in medical diagnostics, attributed to its noninvasiveness, real-time feature, and costeffectiveness. Plane wave US (PWUS) imaging has emerged as a research hotspot, especially due to its capabilities to achieve frame rates as high as 10,000 Hz [1]. However, B-mode images reconstructed from PW utilizing the delay-and-sum (DAS) algorithm often exhibit lower image quality due to the absence of transmit focus. To enhance image clarity, PWUS often resorts to plane wave compounding (PWC) with multiple steering angles, albeit at the expense of frame rate reduction. Many methods have been proposed to enhance the image quality of PWUS [2, 3]. In recent years, deep learning (DL) has attracted much attention in US image reconstruction. These models, predominantly trained on paired data [4, 5], have shown to be promise. However, a challenge is their limited ability to adapt to various situations and their tendency to either introduce or amplify specific attributes or features within the learned images [6]. Recent advancements in diffusion generative models have drawn the interest of the research community, primarily due to their † These authors contributed equally to this work. state-of-the-art performance, even in situations where paired datasets are not available. Their capability to model intricate, highdimensional distributions makes diffusion models powerful tools for addressing reconstruction challenges. In image reconstruction problem, the objective often revolves around deducing the original image from given measured data [7-10]. However, a notable limitation of using diffusion models to reconstruct images is their iterative approach to image sampling from Gaussian noise, which leads to substantial computational demands [11]. In this study, our emphasis is on accelerating conditional diffusion models by leveraging the structural similarities in the same imaging region between single PW and PWC images. We find that the forward diffusion trajectories of the single PW and PWC images have a confluence (when noise level σ = σ * ). As they pass through this confluence point (noise level σ ≥ σ * ), in the forward diffusion process, the noisy US images reconstructed from PW or PWC follow similar trajectories to Gaussian distribution. This suggests that starting the reverse diffusion process from the original Gaussian distribution (noise level σ = σ max ) or from the point after confluence (noise level σ ≥ σ * ) would yield similar sampling results. To reduce the number of sampling steps, we introduce perturbations to the single PW image, adding noise to it to reach a noise level σ k (σ * < σ k < σ max ). We then commence the reverse diffusion from σ k . This approach utilizes the structural similarities between the single PW image and the PWC image, making it possible to take a shortcut to the PWC image within the reverse diffusion trajectory. Additionally, we incorporate the configurations of diffusion-based generative models (EDM) as delineated in [12], which significantly reduces the total number of steps to 50. Consequently, the total number of reverse diffusion steps required to reconstruct an image through our method is further reduced. Employing a training dataset comprised of B-modes compounded with 75 PWs, which is denoted as 75 PWs in the rest of paper, we leverage EDM to learn the distribution of the dataset. We demonstrate the effectiveness of our method using in-vivo data. In EDM, the low-quality single PW data, the input of the EDM, serves not only as the sampling condition for guiding the reverse diffusion process but also as the basis for initialization sampling as described above. As a result, a high-quality image can be effectively sampled from the learned model in a limited number of steps (i.e., 20 steps). The quantitative evaluations of some results even surpass the image compounded with 75 PWs. Moreover, the performance metrics is close to the that of the EDM result initializing from the original Gaussian distribution." 2312.09515v1,"Osmotic Pressure and Swelling Behavior of Ionic Microcapsules Mohammed O. Alziyadi ∗ and Alan R. Denton † Department of Physics, North Dakota State University, Fargo, ND 58108-6050, USA Ionic microcapsules are hollow shells of hydrogel, typically 10-1000 nm in radius, composed of cross-linked polymer networks that become charged and swollen in a good solvent. The ability of microcapsules to swell/deswell in response to changes in external stimuli (e.g., temperature, pH, ionic strength) suits them to applications, such as drug delivery, biosensing, and catalysis. Equilibrium swelling behavior of ionic microcapsules is determined by a balance of electrostatic and elastic forces. The electrostatic component of the osmotic pressure of a microcapsule – the difference in pressure between the inside and outside of the particle – plays a vital role in determining swelling behavior. Within the spherical cell model, we derive exact expressions for the radial pressure profile and for the electrostatic and gel components of the osmotic pressure of a microcapsule, which we compute via Poisson-Boltzmann theory and molecular dynamics simulation. For the gel component, we use the Flory-Rehner theory of polymer networks. By combining the electrostatic and gel components of the osmotic pressure, we compute the equilibrium size of ionic microcapsules as a function of particle concentration, shell thickness, and valence. We predict concentration-driven deswelling at relatively low concentrations at which steric interactions between particles are weak, and demonstrate that this response can be attributed to crowding-induced redistribution of counterions. Our approach may help to guide the design and applications of smart, stimuli-responsive colloidal particles. I. INTRODUCTION Microcapsules are soft colloidal particles, typically 10− 1000 nm in radius, comprising solvent-permeable shells made of cross-linked polymer (hydrogel) networks [1– 4] or polyelectrolyte multilayers [5–8]. When dispersed in a good, polar solvent, such as water, ionic gels become charged by dissociating counterions from the polymer backbones and swell by absorbing solvent into the polymer network [9]. Microcapsules have the additional freedom to swell by absorbing solvent into their cavities. The degree of swelling depends on externally controllable parameters, such as temperature, pH, ionic strength, particle concentration, and solvent quality [10, 11]. For example, variations in temperature can drive a volume phase transition, in which a hydrogel suddenly collapses upon increasing temperature [12, 13], while changes in pH can affect the degree of ionization and thereby the strength of electrostatic interactions [14, 15]. Due to their sensitive and tunable response to changes in environmental conditions, microcapsules are of fundamental interest for understanding colloidal self-assembly, including the glass transition. Moreover, the ability of microcapsules to encapsulate and transport fluorescent dyes and drug molecules enables applications, e.g., to drug delivery [16–19] and optical biosensing [20–25] for monitoring ion concentrations. In suspensions of ionic microcapsules (also known as hollow microgels), mobile counterions (and coions, if salt is present) redistribute themselves in the solution until local Donnan equilibria are established between the cav- ∗ Current address: Department of Mathematics, College of Science and Humanities-Shaqra, Shaqra University, Riyadh, Saudi Arabia † alan.denton@ndsu.edu ity, shell, and exterior regions of the microcapsules. Differences in concentration of counterions across the interfaces separating the cavity from the shell and the shell from the exterior contribute to the osmotic pressure of a microcapsule, which in turn affects swelling behavior. In equilibrium, swelling of these permeable, compressible particles is governed by a delicate balance between electrostatic and elastic components of the osmotic pressure. The electrostatic component of the osmotic pressure of a microcapsule depends on the distributions of free counterions and coions inside, within, and outside the shell and of immobile ions fixed on the polymer network. The elastic component depends on mechanical properties of the polymeric shell and polymer-solvent interactions. While previous modeling studies of microcapsules and shells have focused on the electrostatic contribution to the osmotic pressure [26–30], the present study analyzes the interplay between the two contributions, specifically for hydrogel microcapsules. In our previous work on ionic microcapsules, we implemented Poisson-Boltzmann theory in the spherical cell model to study the dependence of microcapsule osmotic pressure on ionic strength [4] and the dependence of ion density distributions and local pH on microcapsule valence, concentration, and permeability [31, 32]. In related work on ionic microgels, we analyzed the relationship between the pressure tensor, osmotic pressure, and equilibrium swelling [33, 34]. The purpose of the present paper is to further investigate the dependence of osmotic pressure and swelling of ionic hydrogel microcapsules on particle concentration, architecture, and valence. The remainder of the paper is organized as follows. Section II first defines the primitive and cell models of permeable ionic microcapsules. In Sec. III, we then analyze the pressure tensor of ionic hydrogel microcapsules in the cell model and derive some exact statistical mechanical relations for the electrostatic component of the os-" 2312.09519v1,"Osmotic Swelling Behavior of Surface-Charged Ionic Microgels Mohammed O. Alziyadi ∗ and Alan R. Denton † Department of Physics, North Dakota State University, Fargo, ND 58108-6050, USA In recent years, ionic microgels have garnered much attention due to their unique properties, especially their stimulus-sensitive swelling behavior. The tunable response of these soft, permeable, compressible, charged colloidal particles is increasingly attractive for applications in medicine and biotechnologies, such as controlled drug delivery, tissue engineering, and biosensing. The ability to model and predict variation of the osmotic pressure of a single microgel with respect to changes in particle properties and environmental conditions proves vital to such applications. In this work, we apply both nonlinear Poisson-Boltzmann theory and molecular dynamics simulation to ionic microgels (macroions) in the cell model to compute density profiles of microions (counterions, coions), single-microgel osmotic pressure, and equilibrium swelling ratios of spherical microgels whose fixed charge is confined to the macroion surface. The basis of our approach is an exact theorem that relates the electrostatic component of the osmotic pressure to the microion density profiles. Close agreement between theory and simulation serves as a consistency check to validate our approach. We predict that surface-charged microgels progressively deswell with increasing microgel concentration, starting well below close packing, and with increasing salt concentration, in qualitative agreement with experiments. Comparison with previous results for microgels with fixed charge uniformly distributed over their volume demonstrates that surface-charged microgels deswell more rapidly than volume-charged microgels. We conclude that swelling behavior of ionic microgels in solution is sensitive to the distribution of fixed charge within the polymer-network gel and strongly depends on bulk concentrations of both microgels and salt ions. I. INTRODUCTION Microgels are soft colloidal particles, made of a crosslinked polymer network gel, that become swollen in a good solvent [1–4]. Depending on the procedure for their chemical synthesis [5], microgels can be designed to swell/deswell in response to external parameters, such as temperature, pH, and ionic strength [6]. Swelling behavior depends on mechanical (elastic) properties of the gel and polymer-solvent interactions [7, 8]. When microgels are dispersed in a polar solvent (e.g., water), dissociation of counterions from the polymer chains can turn the particles into colloidal macroions with a fixed (immobile) charge [9, 10]. Swelling behavior of ionic microgels is influenced by electrostatic interactions between fixed charge, counterions, and coions (from added salt) [11]. Microgels and, in particular, ionic microgels have been extensively investigated due to their applications in biomedical, food, pharmaceutical, and petroleum industries [12–16]. The swelling behavior of microgels, in contrast to that of bulk gels [17–20], is fundamentally determined by the single-particle osmotic pressure, defined as the difference in pressure between the interior and exterior regions [21, 22]. In thermodynamic equilibrium, this singleparticle osmotic pressure must vanish, achieved only through a delicate balance between electrostatic, elastic, and mixing entropic contributions. In concentrated suspensions of microgels, equilibrium particle sizes respond ∗ Current address: Department of Physics, College of Science and Humanities-Shaqra, Shaqra University, Riyadh, Saudi Arabia † alan.denton@ndsu.edu also to self-crowding, as each particle adjusts its internal degrees of freedom to the local environment, with relevance for macroscopic phase behavior. Swelling properties of microgels (ionic and nonionic) have been investigated by several complementary experimental methods, including light scattering [23–26], neutron scattering [27–30], osmometry [31, 32], and dielectric spectroscopy [33]. Compressible microgels and suspensions thereof have been modeled by a variety of theoretical methods, including mean-field theories [34–38], integral-equation theories [39], effective interaction theories [40–43], and cell model-based theories [21, 22, 44]. Simulation studies have applied various molecular dynamics [45–49] and Monte Carlo [42, 50–53] methods. From past work, swelling behavior is known to depend sensitively on single-particle properties, including the distribution of cross-links in the polymer network comprising the gel [54, 55]. In general, the lower the cross-link concentration, the softer and more compressible the particles, although the spatial distribution of cross-links is also relevant. Less well understood is the connection between swelling and the distribution of fixed charge on the polymer network. In chemical synthesis protocols developed to produce ionic microgels, the fixed charge distribution can be controlled, to some extent, by adjusting the concentration and chemical species of the initiator for the polymerization reaction in the synthesis. In some microgel systems, initiator molecules themselves are charged and tend to deposit near the particle’s periphery, yielding a surface-localized fixed charge [32, 56–59]. How in detail the fixed charge distribution affects osmotic pressure and equilibrium swelling of ionic microgels is a largely unresolved question." 2312.09543v1,"Effective interactions, structure, and pressure in charge-stabilized colloidal suspensions: Critical assessment of charge renormalization methods Mariano E. Brito ∗ and Gerhard Nägele † Institute of Biological Information Processing, IBI-4, Forschungszentrum Jülich GmbH, 52425 Jülich, Germany Alan R. Denton ‡ Department of Physics, North Dakota State University, Fargo, ND 58108-6050 USA (Dated: December 18, 2023) Charge-stabilized colloidal suspensions display a rich variety of microstructural and thermodynamic properties, which are determined by electro-steric interactions between all ionic species. The large size asymmetry between molecular-scale microions and colloidal macroions allows the microion degrees of freedom to be integrated out, leading to an effective one-component model of microion-dressed colloidal quasi-particles. For highly-charged colloids with strong macroion-microion correlations, nonlinear effects can be incorporated into effective interactions by means of charge renormalization methods. Here, we compare and partially extend several practical mean-field methods of calculating renormalized colloidal interaction parameters, including effective charges and screening constants, as functions of concentration and ionic strength. Within the onecomponent description, we compute structural and thermodynamic properties from the effective interactions and assess the accuracy of the different methods by comparing predictions with elaborate primitive-model simulations [P. Linse, J. Chem. Phys. 113, 4359 (2000)]. We also compare various prescriptions for the osmotic pressure of suspensions in Donnan equilibrium with a salt ion reservoir, and analyze instances where the macroion effective charge becomes larger than the bare one. The methods assessed include single-center cell, jellium, and multi-center mean-field theories. The strengths and weaknesses of the various methods are critically assessed, with the aim of guiding optimal and accurate implementations. I. INTRODUCTION Charge-stabilized colloidal suspensions consist of mesoscopic particles (macroions), typically a few nanometers to microns in size, suspended in a polar, low-molecular-weight solvent (e.g., water) and carrying ionizable chemical groups, which can dissociate, releasing oppositely charged counterions into solution. In the presence of salt in solution, the charged colloids and released counterions coexist with solvent-dissolved counterions and coions (microions). As first explained by the Derjaguin–Landau–Verwey–Overbeek (DLVO 1 ) theory [1, 2], surrounding each colloid is an electric double layer, resulting from the buildup of an inhomogeneous mobile cloud of microions, which carries a charge of opposite sign to that of the colloidal particles and tends to screen their electrostatic potential [3]. The overlap of the double layers of two neighboring colloids generates a repulsive force, which stabilizes the particles against aggregation [4]. Chargestabilization is important in many practical applications, including water purification and stability of clays, foods, pharmaceuticals, and consumer products. By taking advantage of the large size and charge asymmetries between macroions and microions, the electrostatic part of the corresponding effective pair potential can be derived from the mean-field Poisson–Boltzmann (PB) theory, where microion-microion correlations are neglected [5–7]. ∗ Current address: Institute for Computational Physics, University of Stuttgart, D-70569 Stuttgart, Germany, mariano.brito@icp.uni-stuttgart.de † g.naegele@fz-juelich.de ‡ alan.denton@ndsu.edu 1 A list of commonly used acronyms is given at the end in Table I. The nonlinear PB equation for the electrostatic potential can be solved analytically only in certain geometries (planar and cylindrical). Linearizing the PB equation allows for an analytical solution also in spherical geometry. Within the linear Debye–Hückel (DH) approximation [8], in which the Boltzmann factor for the electrostatic potential is linearized, one obtains an effective macroion-macroion pair potential of Yukawa (screened-Coulomb) form, characterized by the bare valence of the macroions Z and a screening constant κ (inverse screening length), which depends on the concentrations of microions. The DH approximation is most accurate for weakly charged species, where the macroion–microion interaction energy is low compared with the thermal energy [7]. With increasing charge, when the characteristic Coulomb energy rivals the thermal energy in magnitude, nonlinear screening effects grow and the DH approximation becomes increasingly inaccurate [9]. These nonlinear effects arise from a strong electrostatic coupling between oppositely charged colloids and counterions, inducing a significant accumulation of counterions in the vicinity of the macroion surfaces [9–12]. Even though the nonlinear PB equation for the electrostatic potential cannot be solved analytically in spherical geometry, the concept of charge renormalization allows for the incorporation of nonlinear effects in a linear DH-like treatment. Numerical simulations also indicate that the electrostatic potential far from colloidal particles saturates as a function of the bare colloidal charge [13], suggesting that the thermodynamics of highly charged colloidal systems can be based on a linear treatment [6]. The basic premise of charge renormalization theories is that a colloidal particle and its cloud of quasi-condensed counterions may be treated as a composite particle that carries a charge much lower than the bare charge [5, 9], thereby re-" 2312.09546v1,"On a Functional Definition of Intelligence Warisa Sritriratanarak 1*† and Paulo Garcia 2† 1 Computer Engineering, Chulalongkorn University, Bangkok, Thailand. 2 AI & Robotics Program: International School of Engineering, Chulalongkorn University, Bangkok, Thailand. * Address correspondence to: Paulo.G@chula.ac.th † These authors contributed equally to this work. Abstract Without an agreed-upon definition of intelligence, asking “is this system intelligent?” is an untestable question. This lack of consensus hinders research, and public perception, on Artificial Intelligence (AI), particularly since the rise of generative- and large-language models. Most work on precisely capturing what we mean by “intelligence” has come from the fields of philosophy, psychology, and cognitive science. Because these perspectives are intrinsically linked to intelligence as it is demonstrated by natural creatures, we argue such fields cannot, and will not, provide a sufficiently rigorous definition that can be applied to artificial means. Thus, we present an argument for a purely functional, black-box definition of intelligence, distinct from how that intelligence is actually achieved; focusing on the “what”, rather than the “how”. To achieve this, we first distinguish other related concepts (sentience, sensation, agency, etc.) from the notion of intelligence, particularly identifying how these concepts pertain to artificial intelligent systems. As a result, we achieve a formal definition of intelligence that is conceptually testable from only external observation, that suggests intelligence is a continuous variable. We conclude by identifying challenges that still remain towards quantifiable measurement. This work provides a useful perspective for both the development of AI, and for public perception of the capabilities and risks of AI. 1 Introduction The rise in power and popularity of recent machine learning technologies (particularly, Large Lan- guage Models (LLMs) such as ChatGPT [Spitale et al., 2023]) have fueled the debate on intelligence, as well as on the dangers of sufficiently powerful Artificial Intelligence (AI) [Thomas et al., 2019]. Considerations on Ethical AI, AI alignment, and related concepts, are now part of popular discourse [Hosny and Aerts, 2019]. These discussions, as well as more fundamental debates about the differences between AI, Ar- tificial General Intelligence (AGI), and super-intelligence, have been hindered (and, in the au- 1" 2312.09548v1,"Integrating AI and Learning Analytics for Data-Driven Pedagogical Decisions and Personalized Interventions in Education Ramteja Sajja 1,3 (ramteja-sajja@uiowa.edu) Yusuf Sermet 3 ( msermet@uiowa.edu) David Cwiertny 2,3,4,5 ( david-cwiertny@uiowa.edu) Ibrahim Demir 1,2,3 (ibrahim-demir@uiowa.edu) 1 Department of Electrical Computer Engineering, University of Iowa Department of Civil and Environmental Engineering, University of Iowa 3 IIHR Hydroscience and Engineering, University of Iowa 4 Department of Chemistry, University of Iowa 5 Center for Health Effects of Environmental Contamination, University of Iowa 2 Corresponding Author Ramteja Sajja ramteja-sajja@uiowa.edu IIHR – Hydroscience & Engineering, University of Iowa 300 S. Riverside Dr., Iowa City, IA, 52246, USA Orcid Ramteja Sajja: https://orcid.org/0000-0002-2432-2472 Yusuf Sermet: http://orcid.org/0000-0003-1516-8335 David Cwiertny: http://orcid.org/0000-0001-6161-731X Ibrahim Demir: http://orcid.org/0000-0002-0461-1242 Competing Interests The authors declare that they have no competing interests. Contributions RS: Conceptualization, Methodology, Software, Validation, Formal analysis, Investigation, Data Curation, Writing - Original Draft, and Visualization. YS: Conceptualization, Methodology, Formal analysis, Writing - Original Draft, Investigation, Validation. DC: Writing - Review & Editing, Funding acquisition. ID: Conceptualization, Methodology, Writing - Review & Editing, Project administration, Supervision, Funding acquisition, and Resources. Funding This project was funded by the National Oceanic & Atmospheric Administration (NOAA) via a cooperative agreement with The University of Alabama (NA22NWS4320003) awarded to the Cooperative Institute for Research to Operations in Hydrology (CIROH), the National Science Foundation (#2230710), and the University of Iowa's Innovations in Teaching with Technology Awards. Acknowledgements During the preparation of this work, the authors used ChatGPT in order to improve the flow of the text, correct any potential grammatical errors, and improve the writing. After using this tool, the authors reviewed and edited the content as needed and take full responsibility for the content of the publication." 2312.09578v1,"SELF-SUPERVISED LEARNING FOR ANOMALOUS SOUND DETECTION Kevin Wilkinghoff Fraunhofer FKIE, Fraunhoferstraße 20, 53343 Wachtberg, Germany kevin.wilkinghoff@ieee.org ABSTRACT State-of-the-art anomalous sound detection (ASD) systems are often trained by using an auxiliary classification task to learn an embedding space. Doing so enables the system to learn embeddings that are robust to noise and are ignoring non-target sound events but requires manually annotated meta information to be used as class labels. However, the less difficult the classification task becomes, the less informative are the embeddings and the worse is the resulting ASD performance. A solution to this problem is to utilize selfsupervised learning (SSL). In this work, feature exchange (FeatEx), a simple yet effective SSL approach for ASD, is proposed. In addition, FeatEx is compared to and combined with existing SSL approaches. As the main result, a new state-of-the-art performance for the DCASE2023 ASD dataset is obtained that outperforms all other published results on this dataset by a large margin. Index Terms— self-supervised learning, anomalous sound detection, domain generalization, machine listening 1. INTRODUCTION In contrast to supervised learning, self-supervised learning (SSL) [1] does not require manually annotated class labels. Instead, data is augmented in different, specifically chosen ways, each defining another artificially created class and a model is taught to discriminate between these classes. The underlying assumption is that the model needs to understand the structure of the data to correctly predict the artificially introduced classes. SSL is a type of unsupervised learning and has been successfully applied to learning speech representations [2] or general purpose audio representations [3, 4] using large datasets of unlabeled data. SSL has also been applied to anomalous sound detection (ASD): In [5], combinations of pitch-shifting and time-stretching are used to create additional classes. [6] uses linear combinations of similar target sounds, created by applying mixup [7], as pseudo-anomalous classes. Statistics exchange (StatEx) [8] is an SSL approach that mixes first- and second-order statistics of time-frequency representations to create new classes. In [9], a modified version of varianceinvariance-covariance regularization [10], called domain generalization mixup, is used to pre-train autoencoders. Note that some works on ASD use the term SSL for supervised learning of embeddings with auxiliary classification tasks [11, 12]. Since classification tasks require manually labeled data whereas SSL does not require any manual annotations, we will use two different terms. In [13], it was shown that class labels alone are very beneficial to detect anomalous sounds in noisy conditions as the model learns to closely monitor the target sounds. When not using class labels, many non-target sounds contained in an acoustic scene have a much stronger impact than subtle changes of the target sounds that need to be detected in order to identify anomalous sounds. However, as the available classes become less similar to each other, the embeddings acquired through the discrimination of these classes capture less meaningful information. In these cases, also utilizing SSL is a very promising approach to increase the degree of information being captured and thus is expected to improve the ASD performance. The goal of this work is to investigate different approaches of using SSL for ASD. The contributions are the following: First, two existing SSL approaches for ASD, namely mixup and StatEx, are reviewed. Second, feature exchange (FeatEx), a novel SSL approach for ASD, and a combination with the other two SSL approaches are proposed. In experimental evaluations conducted on the DCASE2022 ASD dataset and the DCASE2023 ASD dataset, it is shown that the proposed approach improves the performance over a baseline system not using any SSL. As a result, a new state-ofthe-art performance significantly outperforming all published ASD results is obtained on the DCASE2023 ASD dataset 1 . 2. STATE-OF-THE-ART BASELINE SYSTEM Throughout this work, the ASD system presented in our prior work [15], which is trained in a supervised manner by using an auxiliary classification task, is used as a baseline system. Our goal is to improve the performance obtained with this system by applying SSL approaches. This system ranked 4th in the DCASE2023 Challenge [14] and the winning team of the challenge [16] extended this system by adding an attention mechanism to the embedding model. This shows that the ASD system can be considered state-of-the-art, which justifies choosing it as a baseline system. An overview of the baseline system can be found in Figure 1. The system is based on learning discriminative embeddings by using all available meta information, in this case all combinations of machine types, machine IDs and attribute information, as classes. To this end, two convolutional sub-networks are used and their outputs are concatenated to obtain a single embedding. One sub-network utilizes the full magnitude frequency spectrum as an input representation to ensure the highest possible frequency resolution. The other sub-network uses magnitude spectrograms while subtracting the temporal mean to remove static frequency information and make the input representation more different from the other one. The neural network is trained for 10 epochs using a batch size of 64 by minimizing the angular margin loss sub-cluster AdaCos [17] with 16 sub-clusters. To improve the resulting ASD performance, no bias terms are used in any layer of the networks and the cluster centers are randomly initialized and not adapted during training. Apart from mixup, no other data augmentation technique is used. As a backend, k-means is applied to the embeddings obtained with the normal training samples of the source domain, for which many training sam- 1 An open-source implementation of the system is available at: https://github.com/wilkinghoff/ssl4asd" 2312.09597v1,"Deep Generative Models for Detector Signature Simulation: An Analytical Taxonomy Submitted to Reviews in Physics Hosein Hashemi Faculty of Physics Ludwig Maximilians University of Munich, Munich, Germany Gh.Hashemi@physik.uni-muenchen.de Claudius Krause Institute for High-Energy Physics (HEPHY), Austrian Academy of Sciences (OeAW), Vienna, Austria Claudius.Krause@oeaw.ac.at December 18, 2023 Abstract In modern collider experiments, the quest to explore fundamental interactions between elementary particles has reached unparalleled levels of precision. Signatures from particle physics detectors are low-level objects encoding the physics of collisions. The complete simulation of them in a detector is a memory and storage-intensive task. To address this computational bottleneck in particle physics, “Fast Simulation” has been introduced and refined over the years. The field has seen a surge in interest in surrogate modeling the detector simulation, fueled by the advancements in deep generative models. These models aim to generate responses that are statistically identical to the observed data. In this paper, we conduct a comprehensive and exhaustive taxonomic review of the existing literature on the simulation of detector signatures from both methodological and application-wise perspectives. Initially, we formulate the problem of detector signature simulation and discuss its different variations that can be unified. Next, we classify the state-of-the-art methods into four distinct categories based on their underlying model architectures, summarizing their respective generation strategies. We then identify and discuss three key application areas. Finally, we shed light on the challenges and opportunities that lie ahead in detector signature simulation, setting the stage for future research and development. 1 Introduction The core concept of generative models is derived from the training of a density estimator that produces samples approximating the distribution of the training data. The initial generation of neural network-based generative models, also known as energy-based models [1, 2], attempted to accomplish this by establishing an energy function proportional to the likelihood for data points. However, these models faced challenges in scaling up to high-dimensional, complex data, like natural images. Thus, they necessitated the use of Markov Chain Monte Carlo (MCMC) sampling [3], a method required during both training and inference stages. The goal of energy-based models is to adjust the model parameters so that the energy function assigns lower energy (i.e., higher likelihood) to real data points and higher energy to improbable ones. However, the challenge is that these energy landscapes can be very complex, especially for high-dimensional data. Calculating likelihoods or gradients directly becomes computationally infeasible or extremely difficult. That’s where MCMC comes in. This method, characterized by its iterative nature, often resulted in a very slow and inefficient process. The resurgence of interest in generative models in the past few years can be attributed to the availability of larger datasets and significant advancements in Deep Generative Models (DGMs) [4] for natural images. These DGMs have pushed the boundaries in terms of visual quality, sample diversity, and speed of sampling. In Particle Physics, the application of DGMs was first studied in the “Fast and Efficient Simulation” campaign [5] that sparked the search for faster and more storage-efficient surrogate models and simulation" 2312.09603v1,"STETHOSCOPE-GUIDED SUPERVISED CONTRASTIVE LEARNING FOR CROSS-DOMAIN ADAPTATION ON RESPIRATORY SOUND CLASSIFICATION June-Woo Kim 1,5 , Sangmin Bae 2,5 , Won-Yang Cho 3,5 , Byungjo Lee 4,5 , Ho-Young Jung 1† 1 2 Department of Artificial Intelligence, Kyungpook National University KAIST AI 3 SMARTSOUND 4 National Cancer Center 5 RSC LAB, MODULABS {kaen2891, hoyjung}@knu.ac.kr Before Stethoscope Domain Adaptation ABSTRACT After Stethoscope Domain Adapted Domain A Despite the remarkable advances in deep learning technology, achieving satisfactory performance in lung sound classification remains a challenge due to the scarcity of available data. Moreover, the respiratory sound samples are collected from a variety of electronic stethoscopes, which could potentially introduce biases into the trained models. When a significant distribution shift occurs within the test dataset or in a practical scenario, it can substantially decrease the performance. To tackle this issue, we introduce cross-domain adaptation techniques, which transfer the knowledge from a source domain to a distinct target domain. In particular, by considering different stethoscope types as individual domains, we propose a novel stethoscope-guided supervised contrastive learning approach. This method can mitigate any domain-related disparities and thus enables the model to distinguish respiratory sounds of the recording variation of the stethoscope. The experimental results on the ICBHI dataset demonstrate that the proposed methods are effective in reducing the domain dependency and achieving the ICBHI Score of 61.71%, which is a significant improvement of 2.16% over the baseline. Index Terms— Cross-domain adaptation, stethoscopeguided supervised contrastive learning, adversarial training, respiratory sound classification, domain-shift problem 1. INTRODUCTION An electronic stethoscope is a device utilized by medical professionals to analyze sounds within the human body, including those produced by the heart, lungs, and other organs. In general, the design and construction of the electronic stethoscope can influence its efficacy in capturing and recording respiratory sounds [1, 2]. Despite the significant advancements originating from artificial intelligence and signal-processing † corresponding author, This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2024-2020-0-01808) supervised by the IITP(Institute of Information & Communications Technology Planning & Evaluation), and by Brian Impact, a non-profit organization dedicated to the advancement of science and technology. Minimize Domain Dependency Domain B Different Classes Stethoscope A Stethoscope B Domain Classifier Label Classifier Fig. 1: Overview of the proposed stethoscope-guided crossdomain adaptation. The proposed method attempts to minimize the dependency or distribution shift between respiratory sounds recorded by different stethoscopes. domain in respiratory sound analysis [3, 4, 5, 6, 7], the type and quality of the stethoscope used, as well as the characteristics of the surrounding environment, can introduce bias into the recorded breath sounds and affect their interpretation. This may lead to a shift in data distribution [8], resulting in biased representations within neural network models and hindering their ability to generalize [9, 10]. To address this, we focus on the domain adaptation method that uses data collected from the source domain to train the model for the target domain, as in Fig. 1. The domain adaptation techniques facilitate the training of effective models capable of extracting domain-invariant features, thereby overcoming the challenges posed by domain dependencies in the data distribution. Therefore, in the context of respiratory sound classification, we consider each type of stethoscope as an individual domain for cross-domain adaptation. Although there are differences in the perception of respiratory sounds across different stethoscopes, we aim to consistently learn the characteristics of both abnormal and normal sounds, even in the presence of mixed samples in data distribution. In this paper, we introduce two methods for cross-domain adaptation in a supervised manner. First, we present a straightforward methodology that leverages domain adversarial training inspired by [11]. And, for more effective cross-domain adaptation, we propose a novel approach that simultaneously considers both domain adversarial training" 2312.09613v1,"Rethinking Causal Relationships Learning in Graph Neural Networks Hang Gao 1, 2 * , Chengyu Yao 1, 2 * , Jiangmeng Li 1, 3 , Lingyu Si 1, 2 , Yifan Jin 1, 2 , Fengge Wu 1, 2† , Changwen Zheng 1, 2† , Huaping Liu 4 1 Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences 2 University of Chinese Academy of Sciences 3 State Key Laboratory of Intelligent Game 4 Department of Computer Science and Technology, Tsinghua University {gaohang, yaochengyu2023, jiangmeng2019, lingyu, yifan2020, changwen, fengge}@iscas.ac.cn, hpliu@tsinghua.edu.cn Abstract Graph Neural Networks (GNNs) demonstrate their significance by effectively modeling complex interrelationships within graph-structured data. To enhance the credibility and robustness of GNNs, it becomes exceptionally crucial to bolster their ability to capture causal relationships. However, despite recent advancements that have indeed strengthened GNNs from a causal learning perspective, conducting an in-depth analysis specifically targeting the causal modeling prowess of GNNs remains an unresolved issue. In order to comprehensively analyze various GNN models from a causal learning perspective, we constructed an artificially synthesized dataset with known and controllable causal relationships between data and labels. The rationality of the generated data is further ensured through theoretical foundations. Drawing insights from analyses conducted using our dataset, we introduce a lightweight and highly adaptable GNN module designed to strengthen GNNs’ causal learning capabilities across a diverse range of tasks. Through a series of experiments conducted on both synthetic datasets and other real-world datasets, we empirically validate the effectiveness of the proposed module. The codes are available at https: //github.com/yaoyao-yaoyao-cell/CRCG. Introduction Graph representation learning is a fundamental challenge across diverse domains. It involves mapping intricate graphs into compact vector representations while retaining vital structural and semantic insights. By incorporating neural networks, GNNs (Bilot et al. 2023) have emerged as potent tools for addressing such a challenge. However, GNNs typically model statistical, not causal, relationships between data and labels. This can compromise reliability, especially with intricate graph data. Recognizing this, there’s a growing emphasis on enhancing GNNs’ causal modeling capabilities. Enabling GNNs to grasp causal links between data and labels can bolster robustness and credibility, leading to superior outcomes in various real-world scenarios. * These authors contributed equally. † Corresponding authors. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Currently, there are several emerging approaches aimed at enhancing the causal modeling capability of GNNs while maintaining an end-to-end framework. These methods aim to eliminate the influence of confounder within graph data, as confounder can create a false association between the cause and effect due to its correlation with both (Pearl 2002). Specifically, some approaches (Wu et al. 2022; Fan et al. 2022a) involve partitioning the training data into causal components and confounders, followed by separate processing to enable the model to disregard the confounders. Alternatively, other methods (Chen et al. 2022; Gao et al. 2023) aim to directly identify causal data or eliminate confounders to achieve the modeling of causal relationships. Furthermore, there exists a multitude of techniques that center their focus on studying the modeling capability of GNNs for specific causal relationships in practical application scenarios (Cao et al. 2023; Gao, Luo, and Wang 2022; Wang et al. 2022b). These GNN causal enhancement methods have all demonstrated favorable outcomes, effectively enhancing the robustness and credibility of GNN models. Furthermore, these approaches don’t alter the network backbone; rather, they introduce new modules or adjust training processes to enhance causality. While relevant models have achieved some progress in enhancing the modeling of causal relationships within the GNNs, there is still a lack of in-depth research in this area. To address such an issue, we aim at conducting a comprehensive and detailed analysis. The analysis starts by studying the dataset and observing how confounders in the data might impact GNN training. However, due to the complexity of graph data, manually identifying such confounders and their specific effects is challenging. Thus, we constructed a synthetic dataset called Causal Relationship Configurable Graph (CRCG) dataset, which can generate complex graph data with explicitly identifiable and controllable causal relationships. We have also theoretically demonstrated the rationality of the data generation process for the CRCG dataset. Utilizing the CRCG dataset, we conducted a series of experiments to compare the performance differences between GNN with causal enhancement and conventional GNN under different scenarios. Figure 1 presents the results. It is" 2312.09623v1,"A novel dual-stream time-frequency contrastive pretext tasks framework for sleep stage classification Sergio Kazatzidis, Siamak Mehrkanoon ∗ Department of Information and Computing Sciences, Utrecht University, Utrecht, Netherlands s.kazatzidis@gmail.com, s.mehrkanoon@uu.nl Abstract—Self-supervised learning addresses the challenge encountered by many supervised methods, i.e. the requirement of large amounts of annotated data. This challenge is particularly pronounced in fields such as the electroencephalography (EEG) research domain. Self-supervised learning operates instead by utilizing pseudo-labels, which are generated by pretext tasks, to obtain a rich and meaningful data representation. In this study, we aim at introducing a dual-stream pretext task architecture that operates both in the time and frequency domains. In particular, we have examined the incorporation of the novel Frequency Similarity (FS) pretext task into two existing pretext tasks, Relative Positioning (RP) and Temporal Shuffling (TS). We assess the accuracy of these models using the Physionet Challenge 2018 (PC18) dataset in the context of the downstream task sleep stage classification. The inclusion of FS resulted in a notable improvement in downstream task accuracy, with a 1.28 percent improvement on RP and a 2.02 percent improvement on TS. Furthermore, when visualizing the learned embeddings using Uniform Manifold Approximation and Projection (UMAP), distinct clusters emerge, indicating that the learned representations carry meaningful information. Index Terms—Self-supervised learning, Sleep Staging, Pretext tasks I. I NTRODUCTION Large annotated data sets are generally necessary to train deep neural networks. However, obtaining these data sets can be time-consuming and costly [1]. Self-supervised learning has recently garnered considerable attention due to its capacity to circumvent the need for labeled data, addressing this fundamental challenge. This paradigm utilizes self-generated pseudo-labels during the pre-training phase. These pseudolabels are generated by pretext tasks in order to obtain a meaningful representation of the data. The choice of the appropriate pretext tasks is important in capturing the general features of the data. Furthermore, these learned features could be utilized in downstream tasks such as classification and segmentation [2]. Self-supervised learning has been successfully applied in diverse fields such as Natural Language Processing [3]– [5], and Computer Vision [6]–[8]. However, the utilization of Self-supervised learning in the field of EEG processing is still in its early phases. This is notable given the resourceintensive nature of obtaining annotations in EEG research [9]. For instance, annotating a 24-hour EEG sleep signal segment requires roughly five hours of concentrated effort by an expert [10]. *Corresponding author. The significance of sleep quality for overall health highlights the need for thorough investigation, including the classification of sleep stages, which can aid in detecting sleep disorders like sleep apnea. Deep learning networks, particularly Convolutional Neural Networks (CNNs), offer a viable approach for this classification task [11] and various other tasks [12], [13]. However, this method still requires a substantial volume of labeled data. The authors in [14] devised three pretext tasks, Relative Positioning (RP), Temporal Shuffling (TS), and Contrastive Predictive Coding (CPC), to facilitate the learning of meaningful representations of the data without the requirement for large volumes of labeled data. In this paper, we specifically focus on RP and TS. RP is a pretext task where the model determines whether a second segment of EEG-data is temporally close or distant from the first segment, which is referred to as the anchor segment, operating on the assumption that nearby EEG data is more similar, while more distant data is less similar. In TS the model determines whether three windows of EEG-data are ordered or shuffled in time. In this paper we present an improvement of the aforementioned pretext tasks, by incorporating the novel Frequency Similarity (FS) task. To this end, we propose a dual-stream pretext tasks architecture that concatenates the learned features of RP or TS with those of FS, introducing a frequency component to the features to enhance the data representation. In the FS pretext task the model evaluates whether a window exhibits greater similarity in the frequency domain to the anchor window than another window. This paper is organized as follows. Section II provides a brief overview of related work, while Section III covers preliminaries. Section IV introduces the FS pretext task and the novel architecture. Section V showcases the obtained results, which are subsequently discussed. The conclusion is drawn in Section VI. II. R ELATED WORKS A. Self-supervised learning The major challenge of supervised machine learning techniques is their heavy reliance on the amount and the quality of the labeled data. Data annotation can be a laborious and expensive endeavor, motivating the exploration of self-supervised learning as a viable alternative. In self-supervised learning one uses the unannotated data to learn the underlying structure and to obtain a rich representation of the data. The adoption of the right pretext tasks is often pivotal in learning meaningful data" 2312.09626v1,"Exploring Gender Disparities in Bumble's Match Recommendations Exploring Gender Disparities in Bumble's Match Recommendations Research-in-Progress Paper Ritvik Kalra International Institute of Information Technology Hyderabad, India, ritvik.kalra@research.iiit.ac.in Pratham Gupta International Institute of Information Technology Hyderabad, India, gupta.pratham@research.iiit.ac.in Ben Varghese International Institute of Information Technology Hyderabad, India, ben.varghese@students.iiit.ac.in Nimmi Rangaswamy International Institute of Information Technology Hyderabad, India, nimmi.rangaswamy@iiit.ac.in Abstract We study bias and discrimination in the context of Bumble, an online dating platform in India. Drawing on research in AI fairness and inclusion studies we analyze algorithmic bias and their propensity to reproduce bias. We conducted an experiment to identify and address the presence of bias in the matching algorithms Bumble pushes to its users in the form of profiles for potential dates in the real world. Dating apps like Bumble utilize algorithms that learn from user data to make recommendations. Even if the algorithm does not have intentions or consciousness, it is a system created and maintained by humans. We attribute moral agency of such systems to be compositely derived from algorithmic mediations, the design and utilization of these platforms. Developers, designers, and operators of dating platforms thus have a moral obligation to mitigate biases in the algorithms to create inclusive platforms that affirm diverse social identities. Keywords: Algorithmic Bias, Dating Applications and Gender Introduction Anti-discrimination represents a critical area of study for researchers, policymakers, and designers of technical systems. We study bias and discrimination in the context of Bumble, an online dating platform among users in India. Drawing on AI fairness and inclusion studies research, we analyze algorithmic bias and their propensity to reproduce bias [Selbst et al., 2019]. Our study conducts an experiment on the Bumble platform to identify and address the presence of discrimination in the matching algorithms the platform pushes to its users in the form of profiles for potential dates in the real world. There has been a transformation in India's romantic and social interaction landscape, propelled by technological advancements and a shift in cultural attitudes. Dating applications have become increasingly popular for these kinds of interactions. The rise in internet users in India is projected to reach 1.3 billion in 2023 [Statista, 2023]. Online dating applications typically involve creating a profile on a dating website or app and then searching for and communicating with potential partners. These services use various technologies, such as location-based services and algorithms, to match users with compatible partners. Bumble’s recommendation algorithm understands the dating preferences of the user and recommends other users based on these preferences. User preferences are based on learning a user's “swipe” behavior on the profiles displayed to them and how other profiles swipe on the user profile. Although the exact details of the recommendation engines are not public, we believe that Bumble’s algorithm would be using an “Elo Score” which Tinder uses for their recommendation engine [Carr, 2016]. This score does not objectify Proceedings of the 15th Annual AIS SIG GlobDev Pre-ICIS Workshop, Hyderabad, India, Sunday December 10, 2023 1" 2312.09636v1,"A MALWARE CLASSIFICATION SURVEY ON ADVERSARIAL ATTACKS AND DEFENSES Ponnuru Mahesh Datta Sai 1 , Likhitha Amasala 2 , Tanu Sree Bhimavarapu 3 , Guna Chaitanya Garikipati 4 mp1366@srmist.edu.in, likhitha.21bce9931@vitapstudent.ac.in, durga.21bce9938@vitapstudent.ac.in, chaitanya.21bce7607@vitapstudent.ac.in ABSTRACT As the number and complexity of malware attacks continue to increase, there is an urgent need for effective malware detection systems. While deep learning models are effective at detecting malware, they are vulnerable to adversarial attacks. Attacks like this can create malicious files that are resistant to detection, creating a significant cybersecurity risk. Recent research has seen the development of several adversarial attack and response approaches aiming at strengthening deep learning models' resilience to such attacks. This survey study offers an in-depth look at current research in adversarial attack and defensive strategies for malware classification in cybersecurity. The methods are classified into four categories: generative models, feature-based approaches, ensemble methods, and hybrid tactics. The article outlines cutting-edge procedures within each area, assessing their benefits and drawbacks. Each topic presents cutting-edge approaches and explores their advantages and disadvantages. In addition, the study discusses the datasets and assessment criteria that are often utilized on this subject. Finally, it identifies open research difficulties and suggests future study options. This document is a significant resource for malware categorization and cyber security researchers and practitioners. Keywords: - cybersecurity, malware detection, deep learning models, machine learning, evasion attacks, defense strategies. I. INTRODUCTION A. HISTORY Many susceptible devices are now connected to the internet as a result of the development of information and communication technologies like cloud computing and the Internet of Things, which makes them simple targets for attackers. This intentional exploitation has resulted in significant security challenges. The globe has been significantly impacted by the COVID-19 pandemic [13], which has led to a rise in cybercrime and cyberattacks. In recent years, the Internet of Things (IoT) has grown at a remarkable rate [14]. However, due to its diverse application areas and lack of security protocols, IoT has become a prime target for attackers. Various types of cyber-attacks exist, including but not limited to malware attacks, Denial of Service, phishing, and social engineering. According to IBM's [15] cyber threat report, malware has become a significant threat to cyber security and is commonly used by attackers to disrupt the normal operation of systems such as personal computers, servers, mobile and IoT devices [16][17]. Malware is developed intentionally by attackers to achieve their malicious purposes, which includes unauthorized access, leakage of confidential information, system damage, blackmailing, etc. [18]. Based on its harmful properties, malware may be categorized into many types such as viruses, worms, trojans, ransomware, downloaders, and rogue software. Cybersecurity is seriously threatened by the ever-rising quantity of malware instances [19]. Thus, in order to stop malware from inflicting significant harm, it is imperative to find and examine malware instances. B. THE DEFENSE-ATTACK-ENHANCED-DEFENSE PROCESS The Defense Attack Enhanced Defense Process is a cycle of iterative steps taken to improve the security of a system against cyber threats. The process begins with a defensive strategy aimed at preventing attacks, followed by an attack phase that simulates real-world scenarios to identify vulnerabilities. In the enhanced defense phase, the weaknesses discovered in the previous stage are addressed, and the security measures are strengthened. The process then starts again, with each iteration aiming to further enhance the security of the system. The cycle is repeated continuously to keep up with the evolving threat landscape and to ensure that the system remains resilient" 2312.09647v1,"Hydrogen Atom Scattering at the Al 2 O 3 (0001) Surface: A Combined Experimental and Theoretical Study Martin Liebetrau 1,2 , Yvonne Dorenkamp 3 , Oliver Bünermann 3,4,5,∗ and Jörg Behler 1,2,∗∗ Investigating atom-surface interactions is the key to an in-depth understanding of chemical processes at interfaces, which are of central importance in many fields – from heterogeneous catalysis to corrosion. In this work, we present a joint experimental and theoretical effort to gain insights into the atomistic details of hydrogen atom scattering at the α-Al 2 O 3 (0001) surface. Surprisingly, this system has been hardly studied to date, although hydrogen atoms as well as α-Al 2 O 3 are omnipresent in catalysis as reactive species and support oxide, respectively. We address this system by performing hydrogen atom beam scattering experiments and molecular dynamics (MD) simulations based on a high-dimensional machine learning potential trained to density functional theory data. Using this combination of methods we are able to probe the properties of the multidimensional potential energy surface governing the scattering process. Specifically, we compare the angular distribution and the kinetic energy loss of the scattered atoms obtained in experiment with a large number of MD trajectories, which, moreover, allow to identify the underlying impact sites at the surface. 1 Introduction Heterogeneously catalyzed reactions are of utmost economical importance, as a substantial part of the bulk products in chemical industry is made through reactions at solid catalyst surfaces 1,2 . Prominent examples are the Haber-Bosch process for ammonia synthesis 3 , the cracking of long-chain hydrocarbons in the petroleum industry 4 , and the oxidation of sulphur dioxide to sulphur trioxide finally yielding sulphuric acid 5,6 . The improvement of such catalytic systems crucially depends on a detailed understanding of the reaction mechanisms at the atomic scale that are governed by the potential energy surface (PES), which is a high-dimensional function providing the energy and forces for any given atomic configuration. Thus, the PES determines the dynamics of the reactants at the surface, the making and breaking of bonds and, finally, product formation. Insights into the interactions between atoms or molecules and surfaces can be obtained from both, experimental as well as the- 1 Lehrstuhl für Theoretische Chemie II, Ruhr-Universität Bochum, D-44780 Bochum, Germany 2 Research Center Chemical Sciences and Sustainability, Research Alliance Ruhr, D- 44780 Bochum, Germany 3 Georg-August-Universität Göttingen, Institut für Physikalische Chemie, Tammannstraße 6, D-37077 Göttingen, Germany 4 Department of Dynamics at Surfaces, Max-Planck-Institute for Multidisciplinary Sciences, Am Fassberg 11, D-37007 Göttingen, Germany 5 International Center of Advanced Studies of Energy Conversion, Georg-August- Universität Göttingen, Tammannstraße 6, D-37077 Göttingen, Germany ∗ Corresponding Author: oliver.buenermann@chemie.uni-goettingen.de ∗∗ Corresponding Author: joerg.behler@rub.de oretical studies. In particular atom and molecular beam experiments under well-defined conditions can provide invaluable details of processes at single-crystal surfaces 7–9 . For instance, information about the interaction potential and energy transfer between atoms or molecules and surfaces can be derived from inelastic scattering experiments. Moreover, using rare-gas atoms, surface phonons of a material can be studied 10,11 . Further, the role of rotational, vibrational and translational energy on surface reactivity is of central interest in molecule-surface scattering experiments 8,12–15 . Finally, scattering of open-shell atoms like hydrogen or oxygen provides detailed information about chemical bond formation in surface reactions 9,16 . Next to experiment, theoretical studies have become an indispensable tool in surface science and heterogeneous catalysis in the past two decades 17–20 . Still, in spite of the substantial increase in computational power, first-principles methods like density functional theory (DFT), which have been very successfully applied to the calculation of properties like adsorption energies and surface structures, remain too demanding for determining a large number of molecular dynamics (MD) trajectories when computing the forces on-the-fly for each new MD step. Thus, it is common practice to perform extended MD simulations for scattering at surfaces employing atomistic potentials, which – after fitting to accurate electronic structure data – can provide a direct relation between atomic positions and forces while they are much cheaper to evaluate. A wide range of methods has been proposed to represent atomistic potentials for surface scattering processes 21–23 , J our na l Na me, [ y ea r ] , [ vol . ] , 1–13 | 1" 2312.09654v1,"The cost of artificial latency in the PBS context Umberto Natale ∗ Chorus One umberto@chorus.one Michael Moser Chorus One michael.moser@chorus.one December 18, 2023 Abstract We present a comprehensive analysis of the implications of artificial latency in the Proposer-Builder Separation framework on the Ethereum network. Focusing on the MEV-Boost auction system, we analyze how strategic latency manipulation affects Maximum Extractable Value yields and network integrity. Our findings reveal both increased profitability for node operators and significant systemic challenges, including heightened network inefficiencies and centralization risks. We empirically validates these insights with a pilot that Chorus One has been operating on Ethereum mainnet. We demonstrate the nuanced effects of latency on bid selection and validator dynamics. Ultimately, this research underscores the need for balanced strategies that optimize Maximum Extractable Value capture while preserving the Ethereum network’s decentralization ethos. Keywords— MEV, PBS 1 Introduction In music, a piece played “adagio” is performed slowly, and with great expression. This concept extends to an MEV-Boost [9] pilot that Chorus One [16] has been operating on Ethereum mainnet. Our setup strategically delays getHeader requests to maximize Maximum Extractable Value (MEV) capture; correspondingly, we’ve dubbed it Adagio. We are committed to operational honesty and rational competition. This study will disclose our results and initial parameters, alongside an extensive discussion of node operator incentives and potential adverse knock-on effects on the Ethereum network. We argue that strategic latency optimization is a zero sum game which may increasingly compromise node operator independence in favor of statistical arbitrageurs. The practical consequence is centralization pressure over the entire Proposer-Builder Separation (PBS) value chain, leading to ongoing and escalating costs for Ethereum users, and ultimately node operators themselves. This effect is likely to perpetuate as a self-reinforcing cycle, and favors large node operators systematically through reduced payoff variance and a data edge that scales with voting power, leading to centralization. The goal of the article is to address and mitigate these competitive dynamics by providing an extensive analysis informed by proprietary data from our Adagio study. Our primary objective is to describe the auction dynamics that give rise to latency strategies, and the associated externalities imposed on the Ethereum network. Our secondary objective is to provide practical context through a discussion of the Adagio setup, and node operator incentives. PBS inefficiencies and MEV returns is discussed in Sec. 2. The concept of MEV is intrinsically linked to time via the inherent volatility of asset prices. In the current PBS landscape, there exists an inefficiency with regards to auction timing, which can be strategically exploited to consistently generate excess MEV returns [17]. Our study highlights this inefficiency by examining the MEV-Boost auction’s bid dynamics in the context of timing games. The cost of artificial latency is discussed in Sec. 3. We examine how latency optimization generates excess MEV rewards at the expense of subsequent proposers, while increasing the Ethereum burn rate, contributing to gas cost. Further, we discuss how a delayed auction imposes additional Loss-Versus-Rebalancing (LVR) [12] burden on liquidity providers (LPs) by exacerbating the disconnect between on-chain asset prices and other venues, while decreasing inventory risk for statistical arbitrageurs. We argue that all of the above contributes to node operator centralization, and that not engaging in timing games imposes an excess opportunity cost on node operators of any voting power. Empirical results from the Adagio pilot are discussed in Sec. 4. We present our experimental setup and benchmark its performance against the network. Further, the chapter discusses the idiosyncrasies of optimistic- ∗ Contact Author" 2312.09674v1,"Proceedings of Machine Learning Research vol XYZ:1–17, 2024 35th International Conference on Algorithmic Learning Theory Optimal Regret Bounds for Collaborative Learning in Bandits Amitis Shidani AMITIS . SHIDANI @ STATS . OX . AC . UK University of Oxford Sattar Vakili SV 388@ CORNELL . EDU MediaTek Research Editors: Claire Verdane and Daniel Hsu Abstract We consider regret minimization in a general collaborative multi-agent multi-armed bandit model, in which each agent faces a finite set of arms and may communicate with other agents through a central controller. The optimal arm for each agent in this model is the arm with the largest expected mixed reward, where the mixed reward of each arm is a weighted average of its rewards across all agents, making communication among agents crucial. While near-optimal sample complexities for best arm identification are known under this collaborative model, the question of optimal regret remains open. In this work, we address this problem and propose the first algorithm with order optimal regret bounds under this collaborative bandit model. Furthermore, we show that only a small constant number of expected communication rounds is needed. Keywords: Multi-agent multi-armed bandit, Collaborative learning 1. Introduction In the classic multi-armed bandit problem (Lai and Robbins, 1985; Auer et al., 2002) an agent sequentially interacts with a set of arms. At each time, the agent selects one of the arms and receives the corresponding reward drawn from an unknown distribution. The goal of the agent is to minimize regret defined as the total loss in the rewards compared to always selecting the arm with the highest expected reward. The trade-off between exploration —selecting each arm several times to learn the unknown distributions— and exploitation —capitalizing on the information gathered so far to select the arm with the highest reward— is central to designing efficient bandit algorithms that minimize the regret. The bandit problem has also been studied under a different setting, referred to as the best arm identification, where the goal of the agent is to identify the optimal arm with high probability with as a small number of samples as possible (Even-Dar et al., 2006; Jamieson et al., 2014). There is an increasing interest in collaborative learning due to modern applications in traffic routing, communication systems, social dynamics, federated learning, and the Internet of Things (IoT). We consider a statistical learning point of view to collaborative learning through a general multi-agent multi-armed bandit model. This collaborative bandit model was proposed in Réda et al. (2022), which itself was a generalization of the federated learning with the personalization model introduced in Shi et al. (2021). In this model, M agents interact with K arms. An agent m ∈ [M ] observes a local reward X k,m (t) for playing arm k ∈ [K] at time t ∈ [T ]. The actual reward that ′ (t) that is a weighted average of local rewards the agent receives, however, is a mixed reward X k,m over all M agents for the same arm k. A special case of this collaborative bandit model limited to particular weights was introduced in Shi et al. (2021) for a federated learning setting. A detailed problem formulation highlighting the special case of Shi et al. (2021) is given in Section 2. © 2024 A. Shidani & S. Vakili." 2312.09704v1,"Quantum Hall effect in InAsSb quantum wells at elevated temperatures M.E. Bal, 1, 2, ∗ E. Cheah, 3, 4 Z. Lei, 3, 4 R. Schott, 3, 4 C. A. Lehner, 3 H. Engelkamp, 1, 2 W. Wegscheider, 3, 4 and U. Zeitler 1, 2, † 1 High Field Magnet Laboratory (HFML-EMFL), Radboud University, Toernooiveld 7, 6525 ED Nijmegen, The Netherlands 2 Institute for Molecules and Materials, Radboud University, Heyendaalseweg 135, 6525 AJ Nijmegen, The Netherlands 3 Solid State Physics Laboratory, ETH Zurich, CH-8093 Zurich, Switzerland 4 Quantum Center, ETH Zürich, CH-8093, Switzerland (Dated: December 18, 2023) We have characterized the electronic properties of a high-mobility two-dimensional electron system in modulation doped InAsSb quantum wells and compare them to InSb quantum wells grown in a similar fashion. Using temperature-dependent Shubnikov-de Haas experiments as well as FIR transmission we find an effective mass of m ∗ ≈ 0.022m e , which is lower than in the investigated InSb quantum well, but due to a rather strong confinement still higher than in the corresponding bulk compound. The effective g-factor was determined to be g ∗ ≈ 21.9. These results are also corroborated by k · p band structure calculations. When spin polarizing the electrons in a tilted magnetic field, the g-factor is significantly enhanced by electron-electron interactions, reaching a value as large as g ∗ = 60 at a spin polarization P = 0.75. Finally, we show that due to the low effective mass the quantum Hall effect in our particular sample can be observed up to a temperature of 60 K and we propose scenarios how to increase this temperature even further. I. INTRODUCTION Since its discovery in 1980 by von Klitzing et al., the quantum Hall effect (QHE) has been observed in a variety of high-mobility 2D systems, ranging from MOS- FETs [1], quantum wells (QWs) [2, 3] as well as intrinsic 2D materials [4–7]. This resulted in the definition of the resistance quantum, which enabled an incredibly precise determination of the fine-structure constant. Another breakthrough was achieved with the discovery of room temperature (RT) QHE in graphene, making it a convenient platform for performing metrological experiments [8–13]. Since the robustness of the QHE is, amongst others, governed by the Landau level (LL) spacing (∆ LL ∼ 2000 K at 30 T for graphene), InSb with its small effective mass (m ∗ bulk = 0.014m e ), would conceptually also be a good material for the observation of a RT QHE. Optimally alloying InSb with InAs can reduce the effective mass even further, by utilizing the band bending commonly observed in ternary III-V compound semiconductors [14, 15]. The QHE in InSb QWs has been investigated from several perspectives, e.g. FQHE [16, 17], spin effects [16, 17], high-current breakdown [3] and Ising quantum Hall ferromagnetism [18], whereas the literature on InAsSb QWs is less abundant. However, this material has become the subject of renewed interest because of its strong spin-orbit interaction [19, 20] and small direct band gap [21]. ∗ Correspondence email address: maurice.bal@ru.nl † Correspondence email address: uli.zeitler@ru.nl In this paper, we present magneto-transport and far infrared (FIR) transmission data of InSb and InAsSb modulation doped QWs, enabling a direct comparison between the parent compound and the alloy. Firstly, the temperature dependence of Shubnikov-de Haas (SdH) oscillations enables the determination of the effective mass. Simultaneously, we acquire the temperature where the QHE disappears. The results for the effective mass are consistent with those obtained from cyclotron resonance (CR) measurements. Coincidence experiments in tilted magnetic fields are used to extract the g-factors, which are consistent with band-structure calculations based on k · p theory. Additionally, an interaction-induced enhancement of the g-factor for low filling factors, i.e. high spin polarization, is observed. II. SAMPLES AND METHODS Both the InSb as well as the InAsSb QW discussed in this manuscript, were grown by molecular beam epitaxy (MBE). The sample structure is based on the work of Lehner et al. [22], who systematically investigated the effect of employing buffer layers to overcome the lattice mismatch between (100) GaAs substrates and the InSb QWs [23]. On the other hand, the InAsSb QW was grown on a (001) GaSb substrate, thereby removing the AlSb/GaSb intermediate transition. The underlying In 1−y Al y Sb/In 1−x Al x Sb (x=0.42, y=0.54) buffer was adjusted to the InAsSb QW lattice constant. The InSb (InAs 0.38 Sb 0.62 ) 21 nm thick QW was surrounded by an Al 0.1 In 0.9 Sb (Al 0.42 In 0.58 Sb) confinement barrier, which contained an asymmetric double-" 2312.09718v1,"Discovering Highly Influential Shortcut Reasoning: An Automated Template-Free Approach Daichi Haraguchi 1 , Kiyoaki Shirai 1 , Naoya Inoue 1,2 , Natthawut Kertkeidkachorn 1 1 Japan Advanced Institute of Science and Technology 2 RIKEN {s2110137,kshirai,naoya-i,natt}@jaist.ac.jp Abstract Shortcut reasoning is an irrational process of inference, which degrades the robustness of an NLP model. While a number of previous work has tackled the identification of shortcut reasoning, there are still two major limitations: (i) a method for quantifying the severity of the discovered shortcut reasoning is not provided; (ii) certain types of shortcut reasoning may be missed. To address these issues, we propose a novel method for identifying shortcut reasoning. The proposed method quantifies the severity of the shortcut reasoning by leveraging out-of-distribution data and does not make any assumptions about the type of tokens triggering the shortcut reasoning. Our experiments on Natural Language Inference and Sentiment Analysis demonstrate that our framework successfully discovers known and unknown shortcut reasoning in the previous work. 1 1 Introduction While Transformer-based large language models have remarkably improved various NLP tasks, the issue of shortcut reasoning has been identified as a severe problem (Schlegel et al., 2020; Wang et al., 2022b; Ho et al., 2022). Shortcut reasoning usually refers to the irrational inference of a model, which is derived from spurious correlations in the training data (Gururangan et al., 2018; Poliak et al., 2018; McCoy et al., 2019). For example, sentiment analysis models could learn to classify any sentences containing the word Spielberg into P OSI - TIVE , given a training dataset with many positive movie reviews containing Spielberg (e.g., Spielberg is a great director!). Shortcut reasoning makes models brittle against Out of Distribution (OOD) data (i.e., data from a different distribution from the training data) compared to Independent and Identically Distributed 1 Our code is available at https://github.com/ homoscribens/shortcut_reasoning.git (IID) data (i.e., data from an identical distribution as the training data) (Geirhos et al., 2020). In the aforementioned example, the reasoning for movie reviews would not be valid for OOD data (e.g., news articles) because the sentiment of news articles containing Spielberg could be arbitrary. Although many studies have explored the detection of spurious correlations or shortcut reasoning (Ribeiro et al., 2020; Pezeshkpour et al., 2022; Han et al., 2020), several challenges persist. Wang et al. (2022a) propose a state-of-the-art method for discovering shortcut reasoning, which implements an automated framework to discover shortcuts without predefining shortcut templates. Still, their approach suffers from two major limitations. Firstly, their framework lacks a method for quantifying the severity of the discovered shortcut reasoning on OOD data. Even if the shortcuts are identified, we do not have to necessarily be concerned about them as long as they have little negative impact on the model’s robustness. Secondly, their approach assumes that genuine tokens, useful tokens for predicting labels across different datasets (e.g., “good”, “bad”), do not lead to shortcut reasoning. While this assumption seems reasonable, Joshi et al. (2022) argue that such tokens are still prevalent among spurious correlations. This is because such tokens are indeed necessary to predict the label, but these tokens alone may not provide sufficient information to accurately predict labels. For example, a genuine token “good” in a sentence This movie is not good can be spurious, since “good” is a necessary but insufficient token for determining its sentiment label. Therefore, genuine tokens can not be ignored when identifying shortcut reasoning. To address these problems, we propose a new method for discovering shortcut reasoning. Our contributions can be summarized as follows: • We present an automated method for identifying shortcut reasoning." 2312.09731v1,"Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs Mia Mohammad Imran Preetha Chatterjee Kostadin Damevski Virginia Commonwealth University Richmond, Virginia, USA imranm3@vcu.edu Drexel University Philadelphia, Pennsylvania, USA pc697@drexel.edu Virginia Commonwealth University Richmond, Virginia, USA kdamevski@vcu.edu ABSTRACT Understanding and identifying the causes behind developers’ emotions (e.g., Frustration caused by ‘delays in merging pull requests’) can be crucial towards finding solutions to problems and fostering collaboration in open-source communities. Effectively identifying such information in the high volume of communications across the different project channels, such as chats, emails, and issue comments, requires automated recognition of emotions and their causes. To enable this automation, large-scale software engineering-specific datasets that can be used to train accurate machine learning models are required. However, such datasets are expensive to create with the variety and informal nature of software projects’ communication channels. In this paper, we explore zero-shot LLMs that are pre-trained on massive datasets but without being fine-tuned specifically for the task of detecting emotion causes in software engineering: ChatGPT, GPT-4, and flan-alpaca. Our evaluation indicates that these recently available models can identify emotion categories when given detailed emotions, although they perform worse than the top-rated models. For emotion cause identification, our results indicate that zero-shot LLMs are effective at recognizing the correct emotion cause with a BLEU-2 score of 0.598. To highlight the potential use of these techniques, we conduct a case study of the causes of Frustration in the last year of development of a popular open-source project, revealing several interesting insights. ACM Reference Format: Mia Mohammad Imran, Preetha Chatterjee, and Kostadin Damevski. 2023. Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Emotions play a crucial role in software engineering, influencing individual and team performance, communication, and decisionmaking. Numerous software engineering tasks have been found to be impacted by developer emotions, e.g., bug fixing efficiency [1, 2], build success of continuous integration [3]. Previous research has Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn also studied the link between developers’ emotions, their productivity, and their attrition in software development projects [4–6]. Open source projects’ success depends on attracting and retaining volunteer participants. Automatically detecting the emotions in the communication channels of a software project, e.g., pull requests and issues comments, chats, and discussion boards, can provide valuable insights into improving the outcomes of open-source software projects. Going beyond detecting the occurrence of different emotions in developer communication channels, identifying the causes of those emotions is key for many uses. Simply knowing the existence of an emotion is often insufficient for understanding what or whom the expressed emotion is towards and for determining the appropriate reaction [7]. However, when the emotion cause is known, along with the type of emotion, it becomes possible to reliably assess potential implications. This could allow for understanding developer opinion towards different aspects of the project like technical debt [8] or code reviews [9]. For instance, a developer made the following comment on an open issue in the flutter/flutter GitHub project, “this is a really severe issue, the ux is pretty awful when you have a splash and then a landing page to simulate splash because it is very obvious that is a different view than the splash"", which expresses Frustration (a sub-emotion of Anger). The cause of this emotion is the text span, “the ux is pretty awful"". Extracting emotion causes automatically is challenging because of the distinct nature of software engineering communication (e.g., it includes domain-specific idioms like ‘spaghetti code’), the variety of different channels (e.g., chats vs. issue comments), and the informal nature of developer communication (e.g., often containing informal abbreviations like ‘AFAIK’ [10]). It is likely that emotion-cause extraction requires a large amount of software engineering-specific training data that can capture this variability, in both emotion and language [11, 12]. Large Language Models (LLMs) have recently emerged as a new powerful type of deep learning technique. These models are built by unsupervised pre-training on a very large dataset, followed by supervised fine-tuning on a smaller dataset. During pre-training, the model learns to predict the next word, given a sequence of words. During fine-tuning, the model is provided with labeled data relevant to a specific task. Some of the largest and most powerful LLMs, such as ChatGPT [13] and GPT-4 [14], are now widely available but do not disclose details about their dataset, training process, or model weights. Consequently, fine-tuning them for a specific task or dataset, such as detecting emotion-causes in software engineering text, is not possible. However, these LLMs can still be used as “zeroshot"" models, where no task-specific fine-tuning is performed. Since constructing a large training dataset for emotion-cause extraction task in software engineering communication is expensive, using" 2312.09734v1,"Learning of Hamiltonian Dynamics with Reproducing Kernel Hilbert Spaces Torbjørn Smith and Olav Egeland, Senior Member, IEEE Abstract— This paper presents a method for learning Hamiltonian dynamics from a limited set of data points. The Hamiltonian vector field is found by regularized optimization over a reproducing kernel Hilbert space of vector fields that are inherently Hamiltonian, and where the vector field is required to be odd or even. This is done with a symplectic kernel, and it is shown how this symplectic kernel can be modified to be odd or even. The performance of the method is validated in simulations for two Hamiltonian systems. It is shown that the learned dynamics are Hamiltonian, and that the learned Hamiltonian vector field can be prescribed to be odd or even. I. INTRODUCTION Data-driven techniques have proven to be a powerful method for use in system identification of dynamical systems. When a set of measurements is given, machine learning techniques can be used to identify the dynamics of the underlying system [1]. Since data-driven methods infer from a data set, the performance of the learned system is dependent on the quality of the data set used for learning. Data-driven methods may fail to generalize beyond the given data set [2], and may suffer from overfitting if the data set is limited or noisy [3]. In practice, assembling a viable data set can be labor-intensive and impractical for real-world or online applications. As the data set grows, the computational cost of learning the model increases, as does the inference time of the final learned model for some learning methods [2] [4]. Producing stable and robust models for safety-critical and control applications is also vital [5]. To deal with these challenges, researchers have deployed various methods to inform or constrain the learning of dynamical systems using priors, achieving satisfactory results even when the data set is limited. Related work: Price prediction for financial futures contracts was studied in [6] using a data-driven approach with functions in a reproducing kernel Hilbert space (RKHS). Odd symmetric price action was assumed, and a reproducing kernel was proposed so that the learned functions in the RKHS satisfied this constraint. The odd symmetry constraint improved prediction and reduced overfitting compared to an unconstrained implementation. Kernel-based methods with an RKHS were used in [7] to learn inverse dynamics by learning the Lagrangian of the system. Polynomial basis functions were used in [8], where the control-oriented learning of Lagrangian and Hamiltonian systems was investigated. It was shown that learning The authors are with the Department of Mechanical and Industrial Engineering, The Norwegian University of Science and Technology (NTNU), NO-7491 Trondheim, Norway. (email: torbjorn.smith@ntnu.no; olav.egeland@ntnu.no) of the Lagrangian and Hamiltonian functions allowed for accurate and generalized learning from a limited number of trajectories. The learning-from-demonstrations problem was addressed in [2], where a dynamical system was learned to copy human demonstrations. Human-drawn shapes were imitated using a data-driven approach, learning a dynamical system with desired equilibrium points in an RKHS with random Fourier features for dimensionality reduction. Pointwise contraction constraints were enforced along the data set trajectory to create a contraction region around the desired trajectory and to condition the learned vector field. The Hamiltonian dynamics of energy-conserving systems was learned in [9] as a parametric function for the Hamiltonian using neural nets. This significantly improved the predictive accuracy of the learned system. This work was developed further in [10], where the need for higher-order derivatives of the generalized coordinate was eliminated, and the option for energy-based control was included. In [11], the work in [9] was further developed by using the symplectic Leapfrog integrator to integrate the partial derivatives of the learned Hamiltonian and by back-propagating the loss through the integrator over multiple time steps. This improved the learning of more complex and noisy Hamiltonian systems. The learning of nonlinear dynamics with a side constraint of stabilizability was investigated in [4]. They learned the nonlinear dynamics under a contraction constraint and evaluated the method using a planar drone model. The contraction constraint improved the learned trajectory generation and tracking while making the learning process more data efficient. The model was learned in an RKHS, and random Fourier features were used for dimensionality reduction. Nonlinear system identification using a data-driven approach was investigated in [12] by including constraints that enforce prior knowledge of the region of attraction. The stability region was enforced using a Lyapunov function, and the hypothesis space for the learned system was an RKHS. In [13], they learned dynamical systems with prior knowledge in an RKHS, with the addition of a bias term in the regularized least squares cost. The bias term was used to embed prior knowledge of the underlying system to aid the learning process, improving data efficiency and out-ofsample generalization. A method for optimization-based learning of vector fields with side constraints from a limited number of trajectories was presented in [3]. Polynomial basis functions were used, and it was shown how to include side constraints in semidefinite programming, which improved learning accuracy. Side" 2312.09742v1,"Dynamics and condensation of polaritons in an optical nanocavity coupled to two-dimensional materials Maria Vittoria Gurrieri, 1, 2, ∗ Emil V. Denning, 1, 2, 3 Kristian Seegert, 1, 2 Philip T. Kristensen, 1, 2 and Jesper Mørk 1, 2 Department of Photonics Engineering, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark 2 NanoPhoton - Center for Nanophotonics, Technical University of Denmark, Ørsteds Plads 345A, DK-2800 Kgs. Lyngby, Denmark 3 Nichtlineare Optik und Quantenelektronik, Institut für Theoretische Physik, Technische Universität Berlin, 10623 Berlin, Germany (Dated: December 18, 2023) We present a comprehensive investigation of the light-matter interaction dynamics in twodimensional materials coupled with a spectrally isolated cavity mode in the strong coupling regime. The interaction between light and matter breaks the translational symmetry of excitons in the twodimensional lattice and results in the emergence of a localized polariton state. Employing a novel approach involving transformation to exciton reaction coordinates, we derive a Markovian master equation to describe the formation of a macroscopic population in the localized polariton state. Our study shows that the construction of a large-scale polariton population is affected by correction terms addressing the breakdown of translational symmetry. Increasing the spatial width of the cavity mode increases the Coulomb scattering rates while the correction terms saturate and affect the system’s dynamics progressively less. Tuning the lattice temperature can induce bistability and hysteresis with different origins than those recognized for quantum wells in larger microcavities. We identify a limit temperature T l as a key factor for stimulated emissions and forming a macroscopic population, enriching our understanding of strong coupling dynamics in systems with extreme confinement. I. Introduction In the study of light-matter interaction, strong coupling refers to the condition where the coupling strength between photons and excitations in a material dominates over dissipative processes [1]. This gives rise to many fascinating phenomena because of the formation of polaritons, quasi-particles that combine the properties of light and matter. In particular, when the excitons in a quantum well or a two-dimensional (2D) semiconductor [2] hybridize with the light field confined in an optical cavity, a condensate of polaritons can be observed [3– 7]. One mechanism behind the formation of a macroscopic population of quasi-particles has been traced back to stimulated scattering due to the quasi-bosonic nature of polaritons. Many experiments have been conducted to study 2D and zero-dimensional (0D) polariton systems [8], where these particles are confined in either one or three dimensions. Theoretical studies in quantum wells describe polariton dynamics through scattering processes conserving both energy and momentum [9–11]. These models predict that by increasing the confinement, i.e. reducing the in-plane cavity length, the threshold to quantum degeneracy effects is reached at progressively smaller pump powers. Such behaviour is illustrated in Fig. 1, where the ground state polariton occupation number N 0 is plotted as a function of pump power p x for different confinement lengths of a 2D structure. The reduction in condensation threshold with in-plane confinement motivates the interest in studying polariton condensation ∗ mgurr@dtu.dk Polariton occupation number N 0 1 10 5 10 3 L=5 m L=1 m L=500 nm L=100 nm L=50 nm 10 1 10 1 10 5 10 4 10 3 10 2 10 1 10 0 Pump rate p x [ W] 10 1 FIG. 1. Ground state polariton occupation as a function of pump power for different in-plane confinement lengths, L, of the optical cavity. The curves are computed by adapting the model from Ref. [10] to the case of a system with a single optical mode. For each confinement length, the star indicates the Mott transition. in systems with extreme confinement. Current theoretical models, however, are derived for to 2D structures with transverse extent on the order of micrometres and larger. Therefore, the usefulness and validity of these models are not guaranteed when the optical cavity is scaled down to a transverse extent so small that the system response is dominated by a single or a few resonances rather than a continuum of modes. In particular, the assumption of translational symmetry used in previous works [10]" 2312.09751v1,"Comptes Rendus Mathématique Draft The Dual Characteristic-Galerkin Method La méthode des caractéristiques-Galerkin duale Frédéric Hecht a and Olivier Pironneau b a LJLL, Boite 187, Sorbonne Université, Place Jussieu, 75005 Paris, France b LJLL, Boite 187, Sorbonne Université, Place Jussieu, 75005 Paris, France E-mails: frederic.hecht@academie-sciences.fr, olivier.pironneau@academie-sciences.fr Abstract. The Dual Characteristic-Galerkin method (DCGM) is conservative, precise and experimentally positive. We present the method and prove convergence and L 2 -stability in the case of Neumann boundary conditions. In a 2D numerical finite element setting (FEM), the method is compared to Primal Characteristic- Galerkin (PCGM), Streamline upwinding (SUPG), the Dual Discontinuous Galerkin method (DDG) and centered FEM without upwinding. DCGM is difficult to implement numerically but, in the numerical context of this note, it is far superior to all others. Résumé. La méthode Dual Characteristic-Galerkin (DCGM) est conservative, précise et expérimentalement positive. Nous prouvons la convergence et la stabilité L 2 . Dans le cadre numérique des méthodes d’éléments finis (FEM) en 2D, la méthode est comparée à la méthode Primal Characteristic-Galerkin (PCGM), au Streamline upwinding (SUPG), à la méthode Dual Discontinuous Galerkin (DDG) et à une discretisation FEM sans décentrage. La méthode DCGM est difficile à mettre en œuvre numériquement, mais elle est de loin supérieure à toutes les autres dans le cadre étudié dans cette note. 2020 Mathematics Subject Classification. : 35Q35, 65M06, 65M15, 65M25, 65M60. This article is a draft (not yet accepted!) Introduction A good numerical method for the convection-diffusion equation is important in itself but it is also a test bed for more complex systems such as the Navier-Stokes equations. A finite element method (FEM) combined with a first or second order implicit in time discretization without upwinding works only if a CFL condition is satisfied, a severe constraint if the viscous coefficient is small (the method is also known as Arakawa’s scheme in meteorology [7]). Hence in the eighties a number of upwinding schemes have been proposed in particular by K. Baba et al [9], J.-P. Benque et al [1] T.J.R. Hughes [6] and O. Pironneau [11]. Later, in the nineties Finite Volume methods and Discontinuous Galerkin methods were proposed for non-solenoidal convective velocities (see for example A. Ern et al [3].) Recently we were faced with the problem of finding a good method for the computation of the probability density of a process via the Kolmogorov forward equation. Here positivity and conservativity are essential. A more subjective criteria is the numerical diffusivity. It became an ISSN (electronic) : 1778-3569 https://comptes-rendus.academie-sciences.fr/mathematique/" 2312.09768v1,"< Society logo(s) and publication title will appear here. > Received XX Month, XXXX; revised XX Month, XXXX; accepted XX Month, XXXX; Date of publication XX Month, XXXX; date of current version XX Month, XXXX. Digital Object Identifier 10.1109/XXXX.2022.1234567 Decoding Envelope and Frequency-Following EEG Responses to Continuous Speech Using Deep Neural Networks Mike Thornton 1 , Danilo P. Mandic 2 , Fellow, IEEE, and Tobias Reichenbach 3 1 Department of Computing, Imperial College London, SW7 2RH, U.K. Department of Electrical and Electronic Engineering, Imperial College London, SW7 2RH, U.K. 3 Department for Artificial Intelligence in Biomedical Engineering, Friedrich-Alexander-University Erlangen-Nürnberg, 91052 Erlangen, Germany 2 Corresponding author: Tobias Reichenbach (email: tobias.j.reichenbach@fau.de). Mike Thornton is supported by the UKRI CDT in AI for Healthcare http://ai4health.io (Grant No. P/S023283/1) ABSTRACT The electroencephalogram (EEG) offers a non-invasive means by which a listener’s auditory system may be monitored during continuous speech perception. Reliable auditory-EEG decoders could facilitate the objective diagnosis of hearing disorders, or find applications in cognitively-steered hearing aids. Previously, we developed decoders for the ICASSP Auditory EEG Signal Processing Grand Challenge (SPGC). These decoders aimed to solve the match-mismatch task: given a short temporal segment of EEG recordings, and two candidate speech segments, the task is to identify which of the two speech segments is temporally aligned, or matched, with the EEG segment. The decoders made use of cortical responses to the speech envelope, as well as speech-related frequency-following responses, to relate the EEG recordings to the speech stimuli. Here we comprehensively document the methods by which the decoders were developed. We extend our previous analysis by exploring the association between speaker characteristics (pitch and sex) and classification accuracy, and provide a full statistical analysis of the final performance of the decoders as evaluated on a heldout portion of the dataset. Finally, the generalisation capabilities of the decoders are characterised, by evaluating them using an entirely different dataset which contains EEG recorded under a variety of speech-listening conditions. The results show that the match-mismatch decoders achieve accurate and robust classification accuracies, and they can even serve as auditory attention decoders without additional training. INDEX TERMS Auditory attention decoding, Deep learning, EEG signal processing I. INTRODUCTION T HE neural processes by which normal-hearing human listeners perceive and understand spoken language are not well understood. These processes must be executed rapidly enough for listeners to be able to comprehend speech in real time, and resilient enough to preserve speech comprehension under adverse listening conditions. For example, during selective attention to one of several speech streams, the auditory system performs processing to enhance the attended speech stream: this is the famous cocktail-party effect [1]. The auditory system produces electric and magnetic signals during speech perception. These signals may be recorded noninvasively and at high sampling rates, offering the opportunity to study the rapid nature of continuous speech processing. Such signals are notoriously noisy, due to artefacts originating from the activity of participants’ hearts, eyes, and muscles, as well as external electromagnetic fields. Moreover, noninvasive recordings of electric and magnetic signals are inevitably contaminated by background neural activity which is not related to auditory processing. A sig- This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME , 1" 2312.09788v1,"Collaborating Foundation models for Domain Generalized Semantic Segmentation Yasser Benigmim 1,2 Subhankar Roy Slim Essid 1 Vicky Kalogeiton 2 Stéphane Lathuilière 1 LTCI, Télécom-Paris, Institut Polytechnique de Paris 2 LIX, Ecole Polytechnique, CNRS, Institut Polytechnique de Paris 1 yasser.benigmim@telecom-paris.fr mIoU 60 Abstract Ours Traditional DGSS FC-CLIP Open-vocabulary Domain Generalized Semantic Segmentation (DGSS) deals with training a model on a labeled source domain with the aim of generalizing to unseen domains during inference. Existing DGSS methods typically effectuate robust features by means of Domain Randomization (DR). Such an approach is often limited as it can only account for style diversification and not content. In this work, we take an orthogonal approach to DGSS and propose to use an assembly of CoLlaborative FOUndation models for Domain Generalized Semantic Segmentation (CLOUDS). In detail, CLOUDS is a framework that integrates FMs of various kinds: (i) CLIP backbone for its robust feature representation, (ii) generative models to diversify the content, thereby covering various modes of the possible target distribution, and (iii) Segment Anything Model (SAM) for iteratively refining the predictions of the segmentation model. Extensive experiments show that our CLOUDS excels in adapting from synthetic to real DGSS benchmarks and under varying weather conditions, notably outperforming prior methods by 5.6% and 6.7% on averaged mIoU, respectively. The code is available at : https://github.com/ yasserben/CLOUDS 55 DGSS with foundation models HRDA CATSeg 50 ODISE SHADE 45 MoDify DRPC 40 2019 2020 2021 2022 2023 Year Figure 1. Performance over time by various methods on the GTA → {Cityscapes, BDD, Mapillary} benchmark. Recent openvocabulary approaches, like FC-CLIP, are shown to surpass traditional domain generalization methods trained in closed-set scenarios, challenging the relevance of the DGSS setting. CLOUDS, by harnessing multiple foundation models, demonstrates its ability to effectively utilize the source dataset, thereby outperforming both conventional DGSS and open-vocabulary methods. of traditional DNNs in handling unseen environments. Recently, the advent of large-scale pretrained models, often referred to as foundation models (FMs) [1, 33, 53, 57, 65], have brought a paradigm shift in computer vision tasks. The FMs comprise of contrastively trained image classification models (e.g., CLIP [53], ALIGN [28]), text conditioned generative models (e.g., Stable Diffusion [57], DALL-E [54]), vision transformer-based segmentation model trained on mammoth dataset (e.g., Segment Anything Model (SAM) [33]), to name a few. Of particular interest to SS, SAM is a promptable segmentation model that accepts as input an image and geometric prompts (points, scribbles, boxes, masks) and outputs classagnostic masks. Owing to its pre-training on billion-scale dataset [33], SAM has demonstrated excellent performance on varied out-of-distribution tasks namely, medical imaging [20, 42, 69], crater detection [17], and so on. In summary, large-scale pre-training holds promise for DGSS as robust- 1. Introduction Deep Neural Networks have showcased remarkable ability in scene understanding tasks like Semantic Segmentation (SS) [6, 68, 70], when the training and test distribution are the same. This dependency reveals a significant vulnerability: their performance substantially diminishes when encountering domain shifts [64], highlighting a fundamental challenge in generalizing these networks to unseen domains [41, 44, 59]. To address this, Domain Generalized Semantic Segmentation (DGSS) has gained prominence [26, 29, 31, 80]. DGSS aims to develop models that leverage a source annotated dataset while remaining effective across unseen domains, thus overcoming the limitations 1" 2312.09818v1,"SMILE: Multimodal Dataset for Understanding Laughter in Video with Language Models Lee Hyun 1∗ Kim Sung-Bin 1∗ Seungju Han 2 Youngjae Yu 3 Tae-Hyun Oh 1,4,5 1 Dept. of Electrical Engineering and 4 Grad. School of Artificial Intelligence, POSTECH 2 3 Seoul National University Yonsei University 5 Institute for Convergence Research and Education in Advanced Technology, Yonsei University {hyunlee, sungbin, taehyun.oh}@postech.ac.kr Abstract Despite the recent advances of the artificial intelligence, building social intelligence remains a challenge. Among social signals, laughter is one of the distinctive expressions that occurs during social interactions between humans. In this work, we tackle a new challenge for machines to understand the rationale behind laughter in video, Video Laugh Reasoning. We introduce this new task to explain why people laugh in a particular video and a dataset for this task. Our proposed dataset, SMILE, comprises video clips and language descriptions of why people laugh. We propose a baseline by leveraging the reasoning capacity of large language models (LLMs) with textual video representation. Experiments show that our baseline can generate plausible explanations for laughter. We further investigate the scalability of our baseline by probing other video understanding tasks and in-the-wild videos. We release our dataset, code, and model checkpoints on https://github.com/SMILE-data/SMILE. 1 Introduction “Laughter is the shortest distance between two people.” —V ICTOR B ORGE We, human beings, are immersed in laughter. Laughter is a distinctive non-verbal social signal, associated with bonding, agreement, affection, and emotional regulation (Scott et al., 2014). It is often purposedly elicited to establish intimacy (Stauffer, 1999), grab attention (Wanzer et al., 2010), or build faith (Vartabedian and Vartabedian, 1993); i.e., serving as a powerful medium to express a wide range of social and emotional implications beyond the capacity of mere words. Thus, understanding laughter is a crucial problem with huge potential in artificial social intelligence (Bainbridge et al., 1994; Williams et al., 2022; Dautenhahn, ∗ equally contributed 2007) to build empathetic machines with humanmachine interaction (Lee et al., 2017; Nijholt et al., 2017; Inoue et al., 2022). However, understanding and modeling laughter reactions is challenging. Even a simple joke is associated with language skills, context knowledge, theory-of-mind, abstract thinking, and social perception, and complex entanglement of these makes laughter reaction arguably the most complex cognitive attribute humankind may have (McDonald, 2013). In this work, we take the first stepping stone to tackle the challenge of understanding laughter by introducing a task, Video Laugh Reasoning that aims to interpret the reasons behind laughter in a video. For this task, we curate a new dataset, SMILE, consisting of video clips and corresponding text annotations explaining reasons for laughter. We probe through the question “Why do people laugh?” and reason through the answer in a language form; thus, we define the task as a free-form text generation task in which the model generates an explanation for the laughter with a given video clip (See Figure 1). While reasoning laughter by answering the question is an effective way of probing the level of understanding, laughter itself has an inherently complex nature which can be influenced by diverse factors (Apte, 1985; Provine, 2001; Martin et al., 2003; Martin and Ford, 2018), e.g., the subjectivity (Warren et al., 2021), context knowledge (Nijholt et al., 2017), and multimodality (Hasan et al., 2019). To build a clearer resource for understanding laughter and its social norm behind it, we design the dataset to focus on audience laughter, a cohesive form from social influence in distinct contexts (Greatbatch and Clark, 2003), and thereby alleviating the subjectivity associated with individual laughter. Also, for our task, we propose a baseline based on large language models (LLMs) with multimodal textual representation by converting multimodal attributes and features on video into a textual format." 2312.09834v1,"Anisotropic Proximal Point Algorithm Emanuel Laude ∗ Panagiotis Patrinos ∗ December 18, 2023 Abstract In this paper we study a nonlinear dual space preconditioning approach for the relaxed Proximal Point Algorithm (PPA) with application to monotone inclusions, called anisotropic PPA. The algorithm is an instance of Luque’s nonlinear PPA wherein the nonlinear preconditioner is chosen as the gradient of a Legendre convex function. Since the preconditioned operator is nonmonotone in general, convergence cannot be shown using standard arguments, unless the preconditioner exhibits isotropy (preserves directions) as in existing literature. To address the broader applicability we show convergence along subsequences invoking a Bregman version of Fejèr-monotonicity in the dual space. Via a nonlinear generalization of Moreau’s decomposition for operators, we provide a dual interpretation of the algorithm in terms of a forward iteration applied to a D-firmly nonexpansive mapping which involves the Bregman resolvent. For a suitable preconditioner, superlinear convergence rates of arbitrary order are derived under a mild Hölder growth condition. Finally, we discuss an anisotropic generalization of the proximal augmented Lagrangian method obtained via the propsed scheme. This has strong connections to Rockafellar’s generalized and sharp Lagrangian functions. Keywords: proximal point algorithm, duality, Bregman distance, D-resolvent, D-firm nonexpansiveness AMS Subject Classification: 1 Introduction 1.1 Motivation 65K05, 49J52, 90C30 This paper introduces a nonlinear dual space preconditioning scheme for the relaxed Proximal Point Algorithm (PPA) aimed at solving monotone inclusion problems. Our proposed algorithm left-preconditions the operator with the gradient of a Legendre convex function which renders our method akin to an adapted version of the classical PPA. Specifically, our proposed scheme represents an instance of Luque’s nonlinear PPA [16, 15], wherein the preconditioner itself is another maximal monotone mapping. However, to establish convergence using standard arguments, Luque’s framework assumes isotropy in the preconditioner, which implies the preservation of the update direction in relation to the classical PPA update. This assumption can restrict the general applicability of ∗ KU Leuven, Department of Electrical Engineering (ESAT-STADIUS), Kasteelpark Arenberg 10, 3001 Leuven, Belgium {emanuel.laude,panos.patrinos}@esat.kuleuven.be 1" 2312.09841v1,"Monoculture in Matching Markets Kenny Peng Nikhil Garg kennypeng@cs.cornell.edu, ngarg@cornell.edu Abstract Algorithmic monoculture arises when many decision-makers rely on the same algorithm to evaluate applicants. An emerging body of work investigates possible harms of this kind of homogeneity, but has been limited by the challenge of incorporating market effects in which the preferences and behavior of many applicants and decision-makers jointly interact to determine outcomes. Addressing this challenge, we introduce a tractable theoretical model of algorithmic monoculture in a two-sided matching market with many participants. We use the model to analyze outcomes under monoculture (when decision-makers all evaluate applicants using a common algorithm) and under polyculture (when decision-makers evaluate applicants independently). All else equal, monoculture (1) selects less-preferred applicants when noise is well-behaved, (2) matches more applicants to their top choice, though individual applicants may be worse off depending on their value to decision-makers and risk tolerance, and (3) is more robust to disparities in the number of applications submitted. 1 Introduction What happens when many decision-makers—in consequential domains like employment and college admissions—all evaluate applicants using the same algorithm? This possibility has been termed “algorithmic monoculture”—a name that references the problems arising in agriculture when a single crop is farmed extensively, amplifying the risk of correlated widespread failures. A recent line of work considers how a lack of variety in algorithms may warrant similar concerns. Initial inquiries into the consequences of algorithmic monoculture have identified potential harms to both decision-makers and applicants. In seminal work initiating the formal study of algorithmic monoculture, Kleinberg and Raghavan (2021) demonstrated that firms relying on a common algorithm may hire weaker applicants than when using idiosyncratic (but less individually accurate) hiring processes. On the applicant side, an emerging set of work highlights the concern of systemic exclusion, which occurs when an applicant is denied from all opportunities (Creel and Hellman, 2022; Bommasani et al., 2022; Toups et al., 2023; Jain et al., 2023). This emerging literature has been limited by the challenge of incorporating market effects. Domains where monoculture may be especially impactful—such as employment and college admissions— share some common properties. First, participants on both sides of the market are in competition: workers compete over a limited number of job openings, and firms compete over workers who can each accept only one offer. Second, outcomes are determined by the preferences of participants on both sides: roughly speaking, a match is formed only if both a worker and firm prefer each other 1" 2312.09852v1,"Learning Distributions on Manifolds with Free-form Flows Peter Sorrenson*, Felix Draxler*, Armand Rousselot*, Sander Hummerich, Ullrich Köthe Computer Vision and Learning Lab, Heidelberg University *equal contribution, firstname.lastname@iwr.uni-heidelberg.de Abstract Many real world data, particularly in the natural sciences and computer vision, lie on known Riemannian manifolds such as spheres, tori or the group of rotation matrices. The predominant approaches to learning a distribution on such a manifold require solving a differential equation in order to sample from the model and evaluate densities. The resulting sampling times are slowed down by a high number of function evaluations. In this work, we propose an alternative approach which only requires a single function evaluation followed by a projection to the manifold. Training is achieved by an adaptation of the recently proposed free-form flow framework to Riemannian manifolds. The central idea is to estimate the gradient of the negative log-likelihood via a trace evaluated in the tangent space. We evaluate our method on various manifolds, and find significantly faster inference at competitive performance compared to previous work. We make our code public at https://github.com/vislearn/FFF. Function in embedding space Project to manifold 0 0 Figure 1. Manifold free-form flows (M-FFF) learn a distribution directly on the manifold via a generator network in the embedding space g̃ ϕ : R m → R m (top left) whose outputs are projected to the manifold (top right). In this example, a uniform distribution (bottom left) is mapped to a bimodal distribution on the circle (bottom right), which we show as a histogram over model samples and the learned density as a function of the angle. The embedding conserves the topology so that the resulting distribution is periodic and continuous everywhere. 1. Introduction In recent years, generative models have achieved remarkable success in various domains like image synthesis [44], natural language processing [6], science [39] and more. However, the approaches are not naively applicable when dealing with data inherently structured in non-Euclidean spaces, particularly prevalent in fields such as the natural sciences and computer vision. Examples of such data are earth science data supported on a sphere, angles between functional groups in proteins, which are naturally represented on a torus, as well as the orientation of real world objects given as a rotation matrix in SO(3). Naively, data on such an n-dimensional manifold M can be represented using internal coordinates such as angles. However, this may not respect the topology, causing discontinuities or artifacts. Luckily, many generative models can be generalized to arbitrary manifolds. Most existing methods involve solving differential equations, either stochastic (SDEs) or ordinary (ODEs), for sampling and density estimation such as [8, 10, 20, 30, 45]. While theoretically sound, these approaches are computationally intensive due to the need for numerous function evaluations during integration, slowing down sampling. In this paper, we introduce a novel approach for modeling distributions on arbitrary Riemannian manifolds that circumvents the computational burden of previous methods. We achieve this by using a single feed-forward neural network on an embedding space as a generator whose outputs are projected to the manifold Fig. 1. We learn this network as a normalizing flow, made possible through adapting the free-form flow framework [11], recently proposed for Euclidean spaces, to Riemannian manifolds. The Preprint. Under review. 1" 2312.09864v1,"A CCELERATING S PATIO -T EXTUAL Q UERIES WITH L EARNED I NDICES Georgios Chatzigeorgakidis 1 , Kostas Patroumpas 2 , Dimitrios Skoutas 3 , and Spiros Athanasiou 4 1 IMSI, Athena R.C., Greece, email: gchatzi@athenarc.gr IMSI, Athena R.C., Greece, email: kpatro@athenarc.gr 3 IMSI, Athena R.C., Greece, email: dskoutas@athenarc.gr 4 IMSI, Athena R.C., Greece, email: spathan@athenarc.gr 2 A BSTRACT Efficiently computing spatio-textual queries has become increasingly important in various applications that need to quickly retrieve geolocated entities associated with textual information, such as in location-based services and social networks. To accelerate such queries, several works have proposed combining spatial and textual indices into hybrid index structures. Recently, the novel idea of replacing traditional indices with ML models has attracted a lot of attention. This includes works on learned spatial indices, where the main challenge is to address the lack of a total ordering among objects in a multidimensional space. In this work, we investigate how to extend this novel type of index design to the case of spatio-textual data. We study different design choices, based on either loose or tight coupling between the spatial and textual part, as well as a hybrid index that combines a traditional and a learned component. We also perform an experimental evaluation using several real-world datasets to assess the potential benefits of using a learned index for evaluating spatio-textual queries. 1 Introduction The ubiquity of mobile devices, along with the proliferation of location-based services and geosocial networks, has set off an unprecedented generation of geotagged content. Efficiently querying and exploring spatio-textual data has become increasingly important for various applications. Typically, query execution must be very fast in order to enable interactive response times. To address this need, several spatio-textual indices have been proposed over the past decade. These are hybrid structures that combine a spatial index, such as grid or R-tree, with a textual part, such as bitmap or inverted file, to allow pruning the search space using both criteria. Recently, the novel idea of thinking of indices as ML models has been proposed [14]. According to it, an index can be formulated as a function f that maps an input key to a set of candidate objects (e.g., stored in a page on disk). Naturally, this has attracted a lot of interest, as it opens up a fundamentally new approach to the decades old problem of index design. Initial works focused on designing learned indices for one-dimensional data, leveraging the total ordering that exists among such objects. Following this novel line of research, learned spatial indices have been recently introduced [8, 18], extending the concept of learned indices from 1-dimensional data to two or more dimensions. Coping with more than one dimension raises additional challenges, most importantly the lack of a total ordering among objects. This is typically addressed by employing a space-filling curve (SFC) to impose an ordering. However, the higher the dimensionality, the less the accuracy of the resulting ordering, which also means a higher error for the ML model that tries to learn the data distribution based on it. Consequently, learned indices over multidimensional data typically focus on a low number of dimensions. Many spatial objects, such as Points of Interest or geotagged posts in social media, are described by some textual information, which is or can be represented as a set of keywords. Spatio-textual queries allow retrieving such objects based on both spatial and textual criteria. Perhaps the two most common types of such queries are Boolean Window Queries (BWQ) and Boolean k-nearest neighbor Queries (BkQ). A BWQ retrieves objects located within a rectangular spatial region that match all query keywords. A BkQ retrieves the k nearest objects to the query location that also match all given keywords." 2312.09871v1,"ChemTime: Rapid and Early Classification for Multivariate Time Series Classification of Chemical Sensors Alexander M. Moore Randy C. Paffenroth Worcester Polytechnic Institute Worcester MA, USA ammoore@wpi.edu Worcester Polytechnic Institute Worcester MA, USA rcpaffenroth@wpi.edu Ken T. Ngo Joshua R. Uzarski Chemical/Biological Innovative Material and Ensemble Development Team U.S. Army DEVCOM Soldier Center Natick MA, USA ken.a.ngo.civ@army.mil Chemical/Biological Innovative Material and Ensemble Development Team U.S. Army DEVCOM Soldier Center Natick MA, USA joshua.r.uzarski.civ@army.mil Abstract—Multivariate time series data are ubiquitous in the application of machine learning to problems in the physical sciences. Chemiresistive sensor arrays are highly promising in chemical detection tasks relevant to industrial, safety, and military applications. Sensor arrays are an inherently multivariate time series data collection tool which demand rapid and accurate classification of arbitrary chemical analytes. Previous research has benchmarked dataagnostic multivariate time series classifiers across diverse multivariate time series supervised tasks in order to find general-purpose classification algorithms. To our knowledge, there has yet to be an effort to survey machine learning and time series classification approaches to chemiresistive hardware sensor arrays for the detection of chemical analytes. In addition to benchmarking existing approaches to multivariate time series classifiers, we incorporate findings from a model survey to propose the novel ChemTime approach to sensor array classification for chemical sensing. We design experiments addressing the unique challenges of hardware sensor arrays classification including the rapid classification ability of classifiers and minimization of inference time while maintaining performance for deployed lightweight hardware sensing devices. We find that ChemTime is uniquely positioned for the chemical sensing task by combining rapid and early classification of time series with beneficial inference and high accuracy. Index Terms—Chemical sensors, machine learning, multivariate time series, representation learning I. I NTRODUCTION Chemical sensors use an array of chemiresistive sensors to produce characteristic resistance signals. Multivariate time series classifiers may be trained to classify the presence of chemical analytes given training examples containing characteristic responses. Chemical analyte detection is vital to industrial and military applications, and carries unique challenges for the application of multivariate time series classifiers. In order to approach the topic of optimal chemical discrimination for a novel hardware sensor array, we propose a variety of supervised learning experiments with additional modifications to account for the challenges unique to the chemical sensing space. Our findings on the optimal discrimination of chemical analytes leads us to propose a new multivariate time series classifier designed explicitly for chemical sensing. ChemTime utilizes inductive 978-1-4673-9563-2/15/$31.00 ©2022 IEEE" 2312.09873v1,"A NOTE ON HAMILTON DECOMPOSITIONS OF EVEN-REGULAR MULTIGRAPHS VINCENT PFENNINGER Abstract. In this note, we prove that every even regular multigraph on n vertices with multiplicity at most r and minimum degree at least rn/2 + o(n) has a Hamilton decomposition. This generalises a result of Vaughan who proved an asymptotic version of the multigraph 1-factorisation conjecture. We derive our result by proving a more general result which states that dense regular multidigraphs that are robust outexpanders have a Hamilton decomposition. This in turn is derived from the corresponding result of Kühn and Osthus about simple digraphs. 1. Introduction A multidigraph (or directed multigraph) D is a pair (V (D), E(D)) where V (D) is a finite set and E(D) is a multiset with elements from the set (V (D) × V (D)) \ {(v, v) : v ∈ V (D)} (so loops are not allowed). We call V (D) the set of vertices of D and E(D) the multiset of edges of D. The multiplicity of a multidigraph D is the maximum number of times an edge appears in E(D). For a vertex v ∈ V (D), we denote by d + D (v) the number of outedges at v in D, that is, edges of the form (v, x) for some x ∈ V (D) (counting multiplicities). Similarly, d − D (v) is the number of inedges − (v) = s for every v ∈ V (D). A Hamilton (v) = d at v in D. We say that D is s-regular, if d + D D cycle in a multidigraph is a directed cycle covering all the vertices. A Hamilton decomposition of a multidigraph D is a partition of E(D) such that every part is the edge set of a Hamilton cycle of D. We also use analogous definitions for multigraphs (the undirected analogue to multidigraphs). Vaughan proved that if n is even and G is a regular multigraph on n vertices with multiplicity at most r and minimum degree at least rn/2 + o(n), then G has a 1-factorisation 1 [9]. This is an approximate version of the multigraph 1-factorisation conjecture of Plantholt and Tipnis [8] which is a generalisation of the 1-factorisation conjecture [1]. The 1-factorisation conjecture states that if G is an s-regular graph on n vertices where n is an even integer and s ≥ n/2, then G has a 1- factorisation. The multigraph 1-factorisation conjecture states that if G is an s-regular multigraph on n vertices with multiplicity at most r where n is an even integer and s ≥ rn/2, then G has a 1-factorisation. The 1-factorisation conjecture was proved for all large graphs by Csaba, Kühn, Lo, Osthus, and Treglown [2]. Our aim in this note is to generalise the result of Vaughan by showing that if in addition the multigraph is even-regular, then it has a Hamilton decomposition. Theorem 1.1. For every ε ∈ (0, 1) and r ∈ N, there exists n 0 ∈ N such that the following holds for all n ≥ n 0 . Let G be an s-regular n-vertex multigraph with multiplicity at most r where s ∈ 2N with s ≥ rn/2 + εn. Then G has a Hamilton decomposition. Observe that this does indeed imply the theorem of Vaughan since if G is an odd-regular graph on an even number of vertices we can first remove a perfect matching and then apply our result to the remaining graph. We also prove a directed analogue of Theorem 1.1. Institute of Discrete Mathematics, Graz University of Technology E-mail address: pfenninger@math.tugraz.at. This project has received partial funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement no. 786198). 1 A 1-factorisation is a decomposition of the edge set into perfect matchings. 1" 2312.09907v1,"Exploring Automatic Text Simplification of German Narrative Documents Thorben Schomacker Tillmann Dönicke Marina Tropmann-Frick Hamburg Univ. of Applied Sciences Univ. of Göttingen Hamburg Univ. of Applied Sciences thorben.schomacker@ tillmann.doenicke@ marina.tropmann-frick@ haw-hamburg.de uni-goettingen.de haw-hamburg.de Abstract In this paper, we apply transformer-based Natural Language Generation (NLG) techniques to the problem of text simplification. Currently, there are only a few German datasets available for text simplification, even fewer with larger and aligned documents, and not a single one with narrative texts. In this paper, we explore to which degree modern NLG techniques can be applied to German narrative text simplifications. We use Longformer attention and a pre-trained mBART model. Our findings indicate that the existing approaches for German are not able to solve the task properly. We conclude on a few directions for future research to address this problem. 1 Introduction 1.1 Motivation With the rise of the internet, it has become convenient and often free to access an abundance of texts. However, not all people who have access can fully read and understand the texts, even though they speak the language that the text is written in. Most often this problem originates in the complex nature of the texts. Text simplification can help to overcome this barrier. Narrative forms are one of the primary ways humans create meaning (Felluga, 2011). Narrative texts, then, make an important contribution to how we describe and shape our environment. Simple language also contributes to involving as many people as possible in this process. Providing narrative texts in a Simple Language (Einfache Sprache) version, enables a large audience to read them. So, we present the first approach for the automatic text simplification of German narrative texts. 1.2 Related Works Automatic text simplification started in 2010 (Specia, 2010) as statistical machine translation to the rule-based automatic text simplification task, using a Portuguese corpus (4500 parallel sentences). The first German text simplification dataset was created by (Hancke et al., 2012) to train a readability classifier. The dataset consisted of unaligned articles from one adult-targeting and one childtargeting journal, and was later improved and enlarged by (Weiß and Meurers, 2018), which added unaligned transcripts from one adult-targeting and one child-targeting German TV news show. Similarly, (Aumiller and Gertz, 2022) published a German document-aligned dataset with lexicon articles for adults and for children. The first sentencealigned German simplification dataset was published in 2013 (Klaper et al., 2013) with 270 articles from five different websites, mainly of organizations that support people with disabilities. In 2016 the first (rule-based) automatic text simplification system for German was released (Suter et al., 2016). The first parallel corpus for data-driven automatic text simplification for German was introduced by (Säuberli et al., 2020). The corpus contains 3616 sentence pairs from news articles. They additionally were the first to use transformer models for German text simplification and found out that their corpus was not large enough to train them. (Battisti et al., 2020) collected a larger corpus with 378 text pairs, mostly from websites of governments, specialized institutions, and non-profit organizations. (Rios et al., 2021) investigated the usage of an adapted mBART (Liu et al., 2020) version with Longformer attention (Beltagy et al., 2020) on Swiss newspaper articles. These results have been further improved with a sentence-based approach (Ebling et al., 2022). Most recently, the first detailed surveys about German text simplification have been released (Anschütz et al., 2023; Stodden et al., 2023; Schomacker et al., 2023)." 2312.09909v1,"1 TMP: Temporal Motion Propagation for Online Video Super-Resolution Zhengqiang Zhang, Ruihuang Li, Shi Guo, Yang Cao, and Lei Zhang Frame t-1 Abstract—Online video super-resolution (online-VSR) highly relies on an effective alignment module to aggregate temporal information, while the strict latency requirement makes accurate and efficient alignment very challenging. Though much progress has been achieved, most of the existing online-VSR methods estimate the motion fields of each frame separately to perform alignment, which is computationally redundant and ignores the fact that the motion fields of adjacent frames are correlated. In this work, we propose an efficient Temporal Motion Propagation (TMP) method, which leverages the continuity of motion field to achieve fast pixel-level alignment among consecutive frames. Specifically, we first propagate the offsets from previous frames to the current frame, and then refine them in the neighborhood, which significantly reduces the matching space and speeds up the offset estimation process. Furthermore, to enhance the robustness of alignment, we perform spatial-wise weighting on the warped features, where the positions with more precise offsets are assigned higher importance. Experiments on benchmark datasets demonstrate that the proposed TMP method achieves leading online-VSR accuracy as well as inference speed. The source code of TMP can be found at https://github.com/xtudbxk/TMP. I. I NTRODUCTION V IDEO super-resolution (VSR) aims to reconstruct a highresolution (HR) video sequence from its low-resolution (LR) counterpart. In recent years, due to the increasing popularity of online video conference, live broadcasting, etc., online-VSR has attracted growing attention from researchers [1]–[3]. In online-VSR, the enhancement of the current frame is achieved by using only the information from past frames in an online manner. Compared with other VSR problems, the stricter constraint on latency of online-VSR brings more challenges to frame alignment, which is critical for the efficiency of a VSR model. Compared to single image super-resolution (SISR) [4]– [10], VSR employs an additional alignment module to aggregate the complementary information from adjacent frames for achieving higher reconstruction ability and better visual quality on the current frame. As a fundamental part of VSR models, a few frame alignment methods [11]–[20] have been developed to improve the performance of VSR methods. Some methods [14], [15], [21], [22] adopt the deformable strategy to predict the offsets for every pixel, while some Z. Zhang, R. Li, S. Guo, and L. Zhang are with the Department of Computing, The Hong Kong Polytechnic University, Hong Kong (email: zhengqiang.zhang@connect.polyu.hk; csrhli@comp.polyu.edu.hk; guoshi28@outlook.com; cslzhang@comp.polyu.edu.hk). This work is supported by the Hong Kong RGC RIF grant (R5001-18) and the PolyU-OPPO Joint Innovation Lab. Y. Cao is with the Department of Computer Science and Engineering, The Hong Kong University of Science and Technology (e-mail: yangcao.cs@gmail.com). Frame t Offsets Module Offsets Module Motion Fields Field Motion Fields Field Frame t-1 Frame t Finetune Finetune Motion Propagate Motion Fields Fields Field Field Alignment Module Warping/Attention Aligned Frame t-1 Aligned Frame t (a) Aligned Frame t-1 (b) Fig. 1. (a) Existing online-VSR methods compute the motion field of each frame separately via a weight-sharing offsets estimation module, while (b) our method propagates the motion field of previous frame to the current frame, reducing much the computational cost. methods [16], [17], [23] enlarge the searching range by using a non-local attention module to handle large motions. Though having achieved considerable improvement in VSR performance, these methods can hardly be applied to online- VSR tasks due to their long latency and high complexity. To solve this issue, DAP [1] employs a deformable attention pyramid module, which dynamically predicts a limited number of offsets for each pixel and merges the corresponding features in a weighted average manner. On the other hand, FRVSR [13] and CKBG [2] resort to the optical flow for frame alignment. They adopt a lightweight optical flow network to estimate the displacement between two frames and align them by warping. Nonetheless, those methods still waste much computation on the repeated estimation of offsets. As shown in Figure 1(a), most of the existing VSR methods apply a shared alignment module to each frame and compute their motion fields separately, ignoring the fact that the motion fields of neigboring frames are highly correlated. In this work, we propose an efficient Temporal Motion Propagation (TMP) method to speed up the alignment process by replacing the complex offsets estimation module with an efficient motion field temporal propagation scheme. As illustrated in Figure 1(b), instead of computing the motion field of each frame from scratch, we inherit the motion field from the previous frame, and apply a fast finetuning process to refine it. Considering the different behaviors of different types of motions, we design two propagation paths. One is the object motion propagation path, which locates the potential destinations of moving objects in the current frame, while the" 2312.09915v1,"Cite as: Goodwin, C., Woolley, S., de Quincey, E., Collins, T. (2023). Quantifying Device Usefulness - How Useful is an Obsolete Device? Human-Computer Interaction – INTERACT 2023. Lecture Notes in Computer Science, vol 14145. Springer, Cham. https://doi.org/10.1007/978-3-031-42293-5_8 The final publication is available at Springer via https://doi.org/10.1007/978-3-031-42293-5_8 Quantifying Device Usefulness - How Useful is an Obsolete Device? Craig Goodwin 1 [0000-0003-3296-7200] , Sandra Woolley 1 [0000-0002-7623-2866] , Ed de Quincey 1[0000-0002-3824-4444] and Tim Collins 2[0000-0003-2841-1947] 1 2 Keele University, Staffordshire, UK Manchester Metropolitan University, Manchester, UK c.goodwin@keele.ac.uk Abstract. Obsolete devices add to the rising levels of electronic waste, a major environmental concern, and a contributing factor to climate change. In recent years, device manufacturers have established environmental commitments and launched initiatives such as supporting the recycling of obsolete devices by making more ways available for consumers to safely dispose of their old devices. However, little support is available for individuals who want to continue using legacy or ‘end-of-life’ devices and few studies have explored the usefulness of these older devices, the barriers to their continued use and the associated user experiences. With a human-computer interaction lens, this paper reflects on device usefulness as a function of utility and usability, and on the barriers to continued device use and app installation. Additionally, the paper contributes insights from a sequel study that extends on prior work evaluating app functionality of a ‘vintage’ Apple device with new empirical data on app downloadability and functionality for the same device when newly classified as ‘obsolete’. A total of 230 apps, comprising the top 10 free App Store apps for each of 23 categories, were assessed for downloadability and functionality on an Apple iPad Mini tablet. Although only 20 apps (8.7%) could be downloaded directly onto the newly obsolete device, 143 apps (62.2%) could be downloaded with the use of a different non-legacy device. Of these 163 downloadable apps, 131 apps (comprising 57% of all 230 apps and 80.4% of the downloadable apps) successfully installed, opened, and functioned. This was a decrease of only 4.3% in functional apps (of the 230 total apps) compared to the performance of the device when previously classified as ‘vintage’. Keywords: Device obsolescence, Application obsolescence, Usefulness, Digital sustainability, Electronic waste 1 Introduction Sustainable HCI [6, 14, 27, 29] and the study of device longevity and usefulness are particularly important whilst the number of obsolete devices and the levels of global ewaste continue to rise. The “Internet of Trash” [7, 15] has been used to describe the billions of end-of-life mobile and Internet-connected devices [9, 18] that contribute to the 53 million tons of e-waste generated per year [10]. In a review of the literature," 2312.09925v1,"CNC-Net: Self-Supervised Learning for CNC Machining Operations Kyoung Mu Lee 1,2 Reyhaneh Neshatavar 1 * Sangmin Hong 2 * Mohsen Yavartanoo 1 * 1 Dept. of ECE & ASRI, 2 IPAI, Seoul National University, Seoul, Korea {myavartanoo,mchiash2,reyhanehneshat,kyoungmu}@snu.ac.kr Abstract adaptability. Traditional CNC programming requires intricate sets of instructions crafted by Computer-Aided Manufacturing (CAM) software that guide machine tools, including mills and drills, to produce the intended object. However, despite its effectiveness, this process introduces bottlenecks due to its labor-intensive nature and reliance on expert knowledge. Furthermore, adapting CNC machines to new tasks typically involves extensive reprogramming, hindering their agility and responsiveness in dynamic manufacturing environments. Incorporating deep learning techniques into CNC machining offers a transformative solution to address these challenges. In particular, several recent studies use deep neural networks (DNNs) to explore 3D objects using Constructive Solid Geometry (CSG) [19] operations, employing both a set of simple [31, 34] and more complex [6, 36, 37] primitives. Therefore, the ability of DNNs to learn complex patterns from data makes them an ideal candidate for revolutionizing CNC manufacturing, which can pave the way for automation, adaptive programming, and efficient utilization of CNC machines. However, the intricate search space for operations on complex objects involving NP-hard problems presents a challenge in labeling optimal solutions as ground truth (GT). Consequently, lacking a dataset with such a GT as supervision poses challenges in training a DNN model. CNC manufacturing is a process that employs computer numerical control (CNC) machines to govern the movements of various industrial tools and machinery, encompassing equipment ranging from grinders and lathes to mills and CNC routers. However, the reliance on manual CNC programming has become a bottleneck, and the requirement for expert knowledge can result in significant costs. Therefore, we introduce a pioneering approach named CNC-Net, representing the use of deep neural networks (DNNs) to simulate CNC machines and grasp intricate operations when supplied with raw materials. CNC- Net constitutes a self-supervised framework that exclusively takes an input 3D model and subsequently generates the essential operation parameters required by the CNC machine to construct the object. Our method has the potential to transformative automation in manufacturing by offering a cost-effective alternative to the high costs of manual CNC programming while maintaining exceptional precision in 3D object production. Our experiments underscore the effectiveness of our CNC-Net in constructing the desired 3D objects through the utilization of CNC operations. Notably, it excels in preserving finer local details, exhibiting a marked enhancement in precision compared to the state-ofthe-art 3D CAD reconstruction approaches. To mitigate these challenges, we propose CNC-Net, a DNN-based approach designed to simulate generic CNC machines in a self-supervised manner. Our approach can construct target objects without relying on the GT labels (i.e., a set of sequential operations). CNC-Net is structured to incrementally learn the production of target 3D shapes, thereby determining the subsequent set of operations by implicitly modeling milling and drilling operations. This capability enables CNC-Net to generate the necessary machining steps effectively. At each operational step, the tools are represented as cylindric primitives, and the CNC- Net determines the radius of the tool and identifies the path coordinates for the subsequent milling or drilling action. To enhance the carving capabilities of a CNC machine, we introduced a feature that enables the machine to rotate the workpiece along the X and Y axes. This functionality is 1. Introduction Manufacturing processes have undergone remarkable transformations over the past decades, driven by automation and the advancement of computational techniques. A domain that has witnessed substantial innovation is Computer Numerical Control (CNC) machining, a pivotal pillar of modern manufacturing. CNC machines have revolutionized manufacturing by producing complex products with better precision, efficiency, and robustness [1] in diverse industries, from aerospace to medical devices. Despite their numerous advantages, CNC machines still grapple with certain limitations, particularly in manual programming and * equal contribution 1" 2312.09932v1,"RDR: the Recap, Deliberate, and Respond Method for Enhanced Language Understanding Yuxin Zi 1* , Hariram Veeramani 2* , Kaushik Roy 1 , Amit Sheth 1 1 Artificial Intelligence Institute, University of South Carolina, Columbia, SC, USA 2 University of California, Los Angeles (UCLA) yzi@email.sc.edu, hariram@ucla.edu, kaushikr@email.sc.edu, amit@sc.edu Abstract Natural language understanding (NLU) using neural network pipelines often requires additional context that is not solely present in the input data. Through Prior research, it has been evident that NLU benchmarks are susceptible to manipulation by neural models, wherein these models exploit statistical artifacts within the encoded external knowledge to artificially inflate performance metrics for downstream tasks. Our proposed approach, known as the Recap, Deliberate, and Respond (RDR) paradigm, addresses this issue by incorporating three distinct objectives within the neural network pipeline. Firstly, the Recap objective involves paraphrasing the input text using a paraphrasing model in order to summarize and encapsulate its essence. Secondly, the Deliberation objective entails encoding external graph information related to entities mentioned in the input text, utilizing a graph embedding model. Finally, the Respond objective employs a classification head model that utilizes representations from the Recap and Deliberation modules to generate the final prediction. By cascading these three models and minimizing a combined loss, we mitigate the potential for gaming the benchmark and establish a robust method for capturing the underlying semantic patterns, thus enabling accurate predictions. To evaluate the effectiveness of the RDR method, we conduct tests on multiple GLUE benchmark tasks. Our results demonstrate improved performance compared to competitive baselines, with an enhancement of up to 2% on standard metrics. Furthermore, we analyze the observed evidence for semantic understanding exhibited by RDR models, emphasizing their ability to avoid gaming the benchmark and instead accurately capture the true underlying semantic patterns. Introduction Previous research in the field of natural language understanding (NLU) and neural network pipelines has acknowledged the necessity of incorporating additional context beyond input data (Sheth et al. 2021). Studies have recognized that achieving accurate language understanding and interpretation requires more than just input data. To address this limitation, one well-established approach is to integrate external knowledge graphs as supplementary context (Zhu et al. 2023). These knowledge graphs contain structured information about entities, relationships, and concepts. This Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. * These authors contributed equally to this work. enables the neural network to infer semantic connections between entities, even when such relations are not explicitly stated in the data alone, thus uncovering implicit or missing contextual associations. However, a notable concern raised by previous research pertains to the vulnerability of NLU benchmarks to manipulation by neural models (Bender and Koller 2020; McCoy, Pavlick, and Linzen 2019). This issue casts doubt on the reliability and generalizability of the performance metrics reported by neural models on benchmark datasets and has undergone extensive scrutiny in the NLU community. Researchers have explored various methods to mitigate benchmark gaming and ensure that NLU models exhibit authentic language understanding. These methods include introducing more comprehensive evaluation protocols, employing adversarial testing, and designing different types of knowledgeinfusion architectures. However, unified evaluation of the integrity of these diverse methodologies remains a challenge. We propose a novel approach called the Recap, Deliberate, and Respond (RDR) paradigm, which addresses these limitations by integrating three distinct objectives within the neural network pipeline. The first objective, Recap, involves paraphrasing the input text using a dedicated model. This process captures the essential information and essence of the input. The second objective, Deliberation, focuses on encoding external graph information related to entities mentioned in the input text. This step utilizes a graph embedding model to leverage the knowledge within external knowledge graphs. By integrating this external context into the neural network pipeline, the Deliberation objective enhances the model’s ability to comprehend the relationships between entities and extract relevant information for downstream tasks. The final objective in the RDR paradigm is Respond, which employs a classification head model. This model utilizes representations from the Recap and Deliberation modules to generate the final prediction. By incorporating insights gained from the Recap and Deliberation stages, the Respond objective enables more accurate and informed predictions. The cascading structure of the three objectives, combined with the minimization of a combined loss, prevents models from exploiting statistical artifacts to artificially inflate performance metrics. This robust methodology facilitates capturing the true underlying semantic patterns within the combined data and external knowledge, leading to more reliable" 2312.09939v1,"Quantum Generative Adversarial Networks: Bridging Classical and Quantum Realms Sahil Nokhwal Suman Nokhwal Ram Swaroop Computer Science Dept. University of Memphis Memphis, TN, USA nokhwal.official@gmail.com Staff Engineer Intercontinental Exchange, Inc. Pleasanton, CA, USA suman148@gmail.com Co-founder ResearchMentorship Sirsa, Haryana, India ram.hdm@gmail.com Raj Bala Ankit Chaudhary Co-founder ResearchMentorship Sirsa, Haryana, India rajbala.contact@gmail.com Associate Professor Jawaharlal Nehru University New Delhi, Delhi, India dr.ankit@ieee.org Abstract In this pioneering research paper, we present a groundbreaking exploration into the synergistic fusion of classical and quantum computing paradigms within the realm of Generative Adversarial Networks (GANs). Our objective is to seamlessly integrate quantum computational elements into the conventional GAN architecture, thereby unlocking novel pathways for enhanced training processes. Drawing inspiration from the inherent capabilities of quantum bits (qubits), we delve into the incorporation of quantum data representation methodologies within the GAN framework. By capitalizing on the unique quantum features, we aim to accelerate the training process of GANs, offering a fresh perspective on the optimization of generative models. Our investigation deals with theoretical considerations and evaluates the potential quantum advantages that may manifest in terms of training efficiency and generative quality. We confront the challenges inherent in the quantum-classical amalgamation, addressing issues related to quantum hardware constraints, error correction mechanisms, and scalability considerations. This research is positioned at the forefront of quantum-enhanced machine learning, presenting a critical stride towards harnessing the computational power of quantum systems to expedite the training of Generative Adversarial Networks. Through our comprehensive examination of the interface between classical and quantum realms, we aim to uncover transformative insights that will propel the field forward, fostering innovation and advancing the frontier of quantum machine learning. Index Terms Quantum Machine Learning, Quantum Generative, Adversarial Networks (QGANs), Generative Modeling, Quantum Speedup I. I NTRODUCTION Using quantum mechanics, quantum computing can achieve computing power never before achieved. Quantum computing has become integral to machine learning as it continues to evolve. The QGAN is a quantum version of the classic Generative Adversarial Network (GAN). Using generative models, we aim to bridge the classical and quantum worlds." 2312.09947v1,"Prompting Datasets: Data Discovery with Conversational Agents JOHANNA WALKER ∗ , King’s College London, United Kingdom ELISAVET KOUTSIANA ∗ , King’s College London, United Kingdom JOE MASSEY † , Open Data Institute, United Kingdom GEFION THEURMER ∗ , King’s College London, United Kingdom ELENA SIMPERL ∗ , King’s College London, United Kingdom Can large language models assist in data discovery? Data discovery predominantly happens via search on a data portal or the web, followed by assessment of the dataset to ensure it is fit for the intended purpose. The ability of conversational generative AI (CGAI) to support recommendations with reasoning implies it can suggest datasets to users, explain why it has done so, and provide information akin to documentation regarding the dataset in order to support a use decision. We hold 3 workshops with data users and find that, despite limitations around web capabilities, CGAIs are able to suggest relevant datasets and provide many of the required sensemaking activities, as well as support dataset analysis and manipulation. However, CGAIs may also suggest fictional datasets, and perform inaccurate analysis. We identify emerging practices in data discovery and present a model of these to inform future research directions and data prompt design. CCS Concepts: • Human-centered computing → Natural language interfaces; Empirical studies in HCI; • Information systems → Task models; Retrieval tasks and goals; Evaluation of retrieval results; Users and interactive retrieval. Additional Key Words and Phrases: datasets, conversational agents, search ACM Reference Format: Johanna Walker, Elisavet Koutsiana, Joe Massey, Gefion Theurmer, and Elena Simperl. 2023. Prompting Datasets: Data Discovery with Conversational Agents . In . ACM, New York, NY, USA, 27 pages. https://doi.org/0000000000 1 INTRODUCTION Dataset discovery, or identifying secondary data useful for research, business, or individual purposes, is a vital activity in contemporary life [6, 20]. This is increasingly true for not only data experts, but also for more casual users, who typically do not require large scale, well promoted datasets [6]. Dataset discovery is composed of two parts: searching for data, and assessing the data to ensure it is fit for the intended purpose. This second part is often characterized as sense-making [9]. The predominant methods of discovery currently are searching on a data portal (e.g. data.europa.eu) or via a search engine, including specialist search such as Google Dataset Search [19]. Making data useable requires tools that support individuals’ “data journey” [22, 25]. This includes specifying a goal and finding the data they need; exploring new sources of data; assessing the data’s relevance and credibility, and deriving insights. Additionally, to support non-expert users, such tools need to function effectively in low- to no-code interactions that are suitable to populations with diverse economic, cultural and educational backgrounds [17, 41]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM 1" 2312.09961v1,"Risk-Aware Continuous Control with Neural Contextual Bandits Jose A. Ayala-Romero 1 Andres Garcia-Saavedra 1 Xavier Costa-Perez 2,1 1 NEC Laboratories Europe i2CAT Fundation and ICREA {jose.ayala, andres.garcia.saavedra, xavier.costa}@neclab.eu 2 Abstract Recent advances in learning techniques have garnered attention for their applicability to a diverse range of real-world sequential decision-making problems. Yet, many practical applications have critical constraints for operation in real environments. Most learning solutions often neglect the risk of failing to meet these constraints, hindering their implementation in real-world contexts. In this paper, we propose a risk-aware decision-making framework for contextual bandit problems, accommodating constraints and continuous action spaces. Our approach employs an actor multi-critic architecture, with each critic characterizing the distribution of performance and constraint metrics. Our framework is designed to cater to various risk levels, effectively balancing constraint satisfaction against performance. To demonstrate the effectiveness of our approach, we first compare it against stateof-the-art baseline methods in a synthetic environment, highlighting the impact of intrinsic environmental noise across different risk configurations. Finally, we evaluate our framework in a real-world use case involving a 5G mobile network where only our approach consistently satisfies the system constraint (a signal processing reliability target) with a small performance toll (8.5% increase in power consumption). 1 Introduction Recent progress in the domain of decision-making learning techniques has garnered considerable attention owing to their extensive applicability in diverse real-world sequential decision-making problems (Silver et al. 2016; Brown and Sandholm 2019; Meta Fundamental AI Research Diplomacy Team (FAIR) et al. 2022). Nevertheless, the practical deployment of these techniques necessitates careful consideration of critical operational constraints inherent in real environments. Regrettably, existing learning solutions often overlook the risk associated with violating these constraints, thereby impeding their viability in real-world scenarios. Motivated by many real-world applications, we address the contextual bandit (CB) problem with constraints, which has been applied to many different problems in diverse fields, e.g., industrial control and temperature tunning (Fiducioso et al. 2019), parameter optimization in robotics (Berkenkamp et al. 2021), mobile networks optimization Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. (Ayala-Romero et al. 2019), or video analytics optimization (Galanopoulos et al. 2021). In this framework, one metric needs to be maximized, while one or more other metrics must be bounded at each time step (step-wise constraints). In practice, performance metrics — whether utility or constraints — often possess random components. These can arise from measurement errors or be intrinsic to the metric, a phenomenon called aleatoric uncertainty. Such uncertainty hinders constraint satisfaction, which is a crucial aspect in most applications, further complicating the problem. Previous works address the aforementioned constrained contextual bandit problem considering long-term budget constraints (Badanidiyuru et al. 2014; Agrawal et al. 2014), which does not fit our setting where the constraints must be satisfied at each step. Other works propose linear contextual bandits with safety constraints (Amani et al. 2019; Kazerouni et al. 2017; Daulton et al. 2019). These solutions aim to achieve at least a percentage of the performance of a baseline policy. However, none of these works consider aleatoric uncertainty, which is a key aspect to design risk-aware decision-making algorithms. Berkenkamp et al. (2021) propose a Bayesian optimization algorithm called SafeOPT that handles noisy observation and constraints at each step as we do. Although SafeOPT is data-efficient, it presents important disadvantages over our solution concerning its computational complexity and requirements on prior knowledge, aspects that we discuss in detail later. In this paper, we present a novel algorithmic framework for risk-aware decision-making. In particular, we propose an actor multi-critic architecture. We use different critics to separately characterize the distribution of each of the metrics — both utility and constraints. We use these critics to train a deterministic actor that enables our solution to operate in continuous action spaces. Previous works adopt the strategy of learning the mean value of the metric of interest (Mnih et al. 2015; Fujimoto et al. 2018; Zhou et al. 2020a). Other works consider a unique utility function capturing the reward with a Lagrangian-like penalty term (Tessler et al. 2018; Solozabal et al. 2020). However, such strategies can lead to constraint violations that depend on the aleatoric uncertainty inherent in the metrics. In contrast, our approach seeks to characterize the aleatoric uncertainty for each performance metric, which allows us to modulate the risk level in the decision-making process. To this end, we introduce a" 2312.09965v1,"Toward fluid radiofrequency ablation of cardiac tissue: modeling, analysis and simulations Mostafa Bendahmane a , Youssef Ouakrim b , Yassine Ouzrour b and Mohamed Zagour c a Institut de Mathématiques de Bordeaux, Université de Bordeaux, 33076 Bordeaux Cedex, France b Laboratoire de Mathématiques, Modélisation et Physique Appliquée, Ecole Normale Supérieure de Fès, Université Sidi Mohamed Ben Abdellah, Maroc. c Euromed Research Center, Euromed University of Fes, Morocco ARTICLE INFO ABSTRACT Keywords: Bio-heat equation Navier-Stokes equation Thermistor problem Radiofrequency ablation Cardiac tissue Finite element method. This paper deals with the modeling, mathematical analysis and numerical simulations of a new model of nonlinear radiofrequency ablation of cardiac tissue. The model consists of a coupled thermistor and the incompressible Navier-Stokes equations that describe the evolution of temperature, velocity, and additional potential in cardiac tissue. Based on Schauder’s fixed-point theory, we establish the global existence of the solution in two- and three-dimensional space. Moreover, we prove the uniqueness of the solution under some additional conditions on the data and the solution. Finally, we discuss some numerical results for the proposed model using the finite element method. 1. Introduction In recent years, radiofrequency ablation (RFA) techniques have been applied in various medical fields, for example in the elimination of cardiac arrhythmia, where the objective is to eliminate the tissue responsible for this disease or the destruction of tumors. During this procedure, catheters are directed into the heart to map its electrical activity and locate diseased areas, which are then removed through an ablation catheter, see Figure 1. Figure 1: Radiofrequency ablation procedure in cardiac tissue 1 . For this reason, the desire to provide fast and low-cost essential information on the electrical and thermal behavior of ablation has motivated several theoretical and numerical studies to develop new techniques or to improve those currently used. mostafa.bendahmane@u-bordeaux.fr (M. Bendahmane); youssef.ouakrim@usmba.ac.ma (Y. Ouakrim); yassine.ouzrour@usmba.ac.ma (Y. Ouzrour); m.zagour@insa.ueuromed.org (M. Zagour) ORCID (s): 1 https://thoracickey.com/principles-of-catheter-ablation/ Bendahmane, Ouakrim, Ouzrour and Zagour: Preprint submitted to Elsevier Page 1 of 22" 2312.09966v1,"Data and Approaches for German Text simplification – towards an Accessibility-enhanced Communication Thorben Schomacker, Michael Gille, Jörg von der Hülls and Marina Tropmann-Frick Hamburg University of Applied Sciences thorben.schomacker@haw-hamburg.de michael.gille@haw-hamburg.de joerg.vonderhuells@haw-hamburg.de marina.tropmann-frick@haw-hamburg.de Abstract This paper examines the current state-of-theart of German text simplification, focusing on parallel and monolingual German corpora. It reviews neural language models for simplifying German texts and assesses their suitability for legal texts and accessibility requirements. Our findings highlight the need for additional training data and more appropriate approaches that consider the specific linguistic characteristics of German, as well as the importance of the needs and preferences of target groups with cognitive or language impairments. The authors launched the interdisciplinary OPEN- LS 1 project in April 2023 to address these research gaps. The project aims to develop a framework for text formats tailored to individuals with low literacy levels, integrate legal texts, and enhance comprehensibility for those with linguistic or cognitive impairments. It will also explore cost-effective ways to enhance the data with audience-specific illustrations using image-generating AI. 1 Introduction In German-speaking countries, the majority of the population uses everyday language (Alltagssprache) in their daily affairs, with slight regional variations. However, in written texts, a more standardized vocabulary but with similar complexity (Bredel and Maaß, 2016) is typically preferred. In contrast, 12% of the German population faces challenges in comprehending and utilizing standard language due to reduced literacy (Grotlüschen and Buddeberg, 2020). For more accessible and inclusive communication, this group depends on comprehensibility-enhanced language. Currently, specialized human translators convert standard language texts into simplified versions including easy language, with legal texts posing a particular challenge due to their technical nature and normative 1 For more and up-to-date information, please visit our project homepage https://open-ls.entavis.com subject matter. Technical language texts represent one end of the complexity spectrum and easy language texts the other. This is further amplified by the fact that both text forms are linguistic expressions of constructed languages. To categorize training data effectively, we differentiate between ""easy language"" (Leichte Sprache) and ""simple language"" (einfache Sprache). ""Easy language"" refers to a highly comprehensible and rule-based form of German, whereby ""simple language"" is used to describe a variety of simplified language versions in the gray area between standard language and easy language (Hansen-Schirra and Maaß, 2020). Easy language is roughly equivalent with level A2 of the Common European Framework of Reference for Languages (CEFR). Since public entities in Germany are required by law to translate information and communication texts into an accessible language version (BGG, 2022) the costs of this task burden the public budget. Automated approaches based on machine learning techniques promise to solve many of the challenges of text simplification, including the difficulties caused by technical language. A tool to simplify documents from different domains to a degree that facilitates these texts’ comprehensibility for people with language or cognitive disabilities does not only improve understanding of these texts. It is also a key to inclusion and social participation (UN, 2008). This holds especially for domain-specific legal texts that are the starting point for the intra-lingual translation. In the course of our project we aim to build on existing simplification approaches using NLMs and adjust them with respect to the demands of the application domain. To achieve this objective, two specific aspects must be considered: First, the identification and systematic categorization of training data from the legal domain to build a quality-assured dataset to train a large language model for the domain specific simplification tasks in German. Second, the fine-tuning of an NLM under consideration of" 2312.09982v1,"Under revision at ACM Transactions on Architecture and Code Optimization (TACO) Received 26 June 2023; Revised 20 Nov 2023 LLVM Dev 2023 Presentation: https://youtu.be/jzT-tar_X0U ACPO: AI-Enabled Compiler-Driven Program Optimization AMIR H. ASHOURI, Huawei Technologies, Canada MUHAMMAD ASIF MANZOOR, Huawei Technologies, Canada DUC MINH VU, Huawei Technologies, Canada RAYMOND ZHANG, Huawei Technologies, Canada ZIWEN WANG, Huawei Technologies, Canada ANGEL ZHANG, Huawei Technologies, Canada BRYAN CHAN, Huawei Technologies, Canada TOMASZ S. CZAJKOWSKI, Huawei Technologies, Canada YAOQING GAO, Huawei Technologies, Canada The key to performance optimization of a program is to decide correctly when a certain transformation should be applied by a compiler. Traditionally, such profitability decisions are made by hand-coded algorithms tuned for a very small number of benchmarks, usually requiring a great deal of effort to be retuned when the benchmark suite changes. This is an ideal opportunity to apply machine-learning models to speed up the tuning process; while this realization has been around since the late 90s, only recent advancements in ML enabled a practical application of ML to compilers as an end-to-end framework. Even so, seamless integration of ML into the compiler would require constant rebuilding of the compiler when models are updated. This paper presents ACPO: AI-Enabled Compiler-driven Program Optimization; a novel framework to provide LLVM with simple and comprehensive tools to benefit from employing ML models for different optimization passes. We first showcase the high-level view, class hierarchy, and functionalities of ACPO and subsequently, demonstrate a couple of use cases of ACPO by ML-enabling the Loop Unroll and Function Inlining passes and describe how ACPO can be leveraged to optimize other passes. Experimental results reveal that ACPO model for Loop Unroll is able to gain on average 4% and 3%, 5.4%, 0.2% compared to LLVM’s O3 optimization when deployed on Polybench, Coral-2, CoreMark, and Graph-500, respectively. Furthermore, by adding the Inliner model as well, ACPO is able to provide up to 4.5% and 2.4% on Polybench and Cbench compared with LLVM’s O3 optimization, respectively. CCS Concepts: • Software and its engineering → Compilers; • Computing methodologies → Machine learning. Additional Key Words and Phrases: Compilers, Optimization Framework, Loop Unrolling, Inlining, Deep Learning, LLVM ACM Reference Format: Amir H. Ashouri, Muhammad Asif Manzoor, Duc Minh Vu, Raymond Zhang, Ziwen Wang, Angel Zhang, Bryan Chan, Tomasz S. Czajkowski, and Yaoqing Gao. 2023. ACPO: AI-Enabled Compiler-Driven Program Optimization. ACM Trans. Arch. Code Optim. 1, 1 (December 2023), 25 pages. https://doi.org/10.1145/nnnnnnn. nnnnnnn Authors’ addresses: Amir H. Ashouri, amirhossein.ashouri@gmail.com, Huawei Technologies, Canada; Muhammad Asif Manzoor, muhammad.asif.manzoor1@huawei.com, Huawei Technologies, Canada; Duc Minh Vu, duc.minh.vu1@huawei. com, Huawei Technologies, Canada; Raymond Zhang, raymond.zhang1@huawei.com, Huawei Technologies, Canada; Ziwen Wang, ziwen.wang1@huawei.com, Huawei Technologies, Canada; Angel Zhang, angel.zhang3@huawei.com, Huawei Technologies, Canada; Bryan Chan, bryan.chan@huawei.com, Huawei Technologies, Canada; Tomasz S. Czajkowski, tomasz. czajkowski@huawei.com, Huawei Technologies, Canada; Yaoqing Gao, yaoqing.gao@huawei.com, Huawei Technologies, Canada. 2023. 1544-3566/2023/12-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Trans. Arch. Code Optim., Vol. 1, No. 1, Article . Publication date: December 2023." 2312.10011v1,"A potential missile guidance law based-on chaos Dhrubajyoti Mandal ∗ Department of Science & Technology New Delhi-110016, India Abstract An important field of research in defense-related technology is the design of guidance laws. A guided missile is generally challenging to intercept if its trajectory becomes unpredictable. In this short communication, we have discussed a possible application of the chaos theory in developing an advanced guided missile, where the guidance law is based upon a robust chaotic map. This type of guided missile may be almost impossible to intercept by existing missile defense systems due to its unpredictable trajectory. Keywords: Guided Missile; Chaos Theory. 1. Introduction Chaos theory has found many applications in Physics & Engineering [1, 2]. However, many more are yet to be explored. Chaos can occur in nonlinear continuous as well as discrete systems. One of the major characteristics of the trajectories of a chaotic system is that they remain bounded in a certain area of the phase space, although any two nearby trajectories separate from each other exponentially fast. Therefore, it is very difficult to predict the future dynamics of any trajectory of a chaotic system, although the system is deterministic in nature and the mathematical form governing the dynamics is already known. Next, let us briefly discuss about guided missiles. Guided missiles are those missiles whose trajectory is determined by a certain fixed set of rules. In other words, guided missiles are given input at various instances during their flight to change their direction, velocity etc. This input is supplied according to some law, which is often known as ’Guidance Law’. Due to this guidance law, guided missiles do not follow simple projectile motion, rather, they follow a relatively complicated path to reach the target. Again, the external input determining the guidance law in a guided missile can be supplied in two different ways mainly. An input can be given from an external control point. Otherwise, an input can be supplied from some internal input generator or feedback system already installed in the missile, which is often called ’Inertial Navigation’. Extensive research on the guidance law of missiles has already been done in the literature [3, 4, 5, 6, 7]. Missile guidance law based-on chaotic perception has also been proposed [8]. Also, there has already been extensive research in the literature on the defense system against guided missiles. However, If the trajectory of an incoming missile is highly unpredictable, then it is very difficult to determine the guidance law for the interceptor deployed for defense. Due to the aforesaid reason, guided missiles are a lot more difficult to intercept as they do not follow a pre-determined projectile motion. ∗ Corresponding author Email address: dmandal93@gmail.com (Dhrubajyoti Mandal)" 2312.10014v1,"Astronomy & Astrophysics manuscript no. Charting_Circumstellar_Chemistry_of_Carbon-rich_AGB_Stars December 15, 2023 ©ESO 2023 Charting Circumstellar Chemistry of Carbon-rich AGB Stars ⋆ I. ALMA 3 mm spectral surveys R. Unnikrishnan 1 , E. De Beck 1 , L.-Å. Nyman 1, 3, 4 , H. Olofsson 1 , W. H. T. Vlemmings 1 , D. Tafoya 2 , M. Maercker 1 , S. B. Charnley 5 , M.A. Cordiner 6, 7 , I. de Gregorio 4 , E. Humphreys 3, 4 , T. J. Millar 8 , and M. G. Rawlings 9, 10 1 Department of Space, Earth and Environment, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden e-mail: ramlal.unnikrishnan@chalmers.se 2 Department of Space, Earth and Environment, Chalmers University of Technology, Onsala Space Observatory (OSO), SE-439 92, Onsala, Sweden 3 Joint ALMA Observatory (JAO), Alonso de Córdova 3107, Vitacura 763-0355, Casilla 19001, Santiago, Chile 4 European Southern Observatory (ESO), Alonso de Córdova 3107, Vitacura 763-0355, Santiago, Chile 5 NASA Goddard Space Flight Center, 8800 Greenbelt Road, Greenbelt, MD 20771, USA 6 Solar System Exploration Division, NASA Goddard Space Flight Center, 8800 Greenbelt Road, Greenbelt, MD 20771, USA. 7 Department of Physics, Catholic University of America, Washington, DC 20064, USA 8 Astrophysics Research Centre, School of Mathematics and Physics, Queen’s University Belfast, University Road, Belfast, BT7 1NN, UK 9 Gemini Observatory / NSF’s NOIRLab, 670 N. A’ohoku Place, Hilo, Hawai’i, 96720, USA 10 East Asian Observatory / James Clerk Maxwell Telescope, 660 N. A’ohoku Place, Hilo, HI 96720, USA Received 28 February 2023 / Accepted 4 December 2023 ABSTRACT Context. Asymptotic giant branch (AGB) stars are major contributors to the chemical enrichment of the interstellar medium (ISM) through nucleosynthesis and extensive mass loss. Direct measures of both processes can be obtained by studying their circumstellar envelopes in molecular line emission. The relation between circumstellar molecular abundances and stellar elemental abundances is determined by atmospheric and circumstellar chemistry. Most of our current knowledge of these, in particular in a C-rich environment, is based on observations of the carbon star IRC +10 216. Aims. We aim to obtain a more generalised understanding of the chemistry in C-rich AGB circumstellar envelopes by studying a sample of three carbon stars, IRAS 15194−5115, IRAS 15082−4808, and IRAS 07454−7112, and observationally test the archetypal status often attributed to IRC +10 216. Methods. We performed spatially resolved, unbiased spectral surveys in ALMA Band 3 (85 − 116 GHz). We estimated the sizes of the molecular emitting regions using azimuthally-averaged radial profiles of the line brightness distributions. We derived abundance estimates using a population diagram analysis for molecules with multiple detected lines, and using single-line analytical calculations for the others. Results. We identify a total of 132 rotational transitions from 49 molecular species. There are two main morphologies of the brightness distributions: centrally-peaked (CS, SiO, SiS, HCN) and shell-like (CN, HNC, C 2 H, C 3 H, C 4 H, C 3 N, HC 5 N, c-C 3 H 2 ). The brightness distributions of HC 3 N and SiC 2 have both a central and a shell component. The qualitative behaviour of the brightness distributions of all detected molecules, in particular their relative locations with respect to the central star, is the same for the three stars, and consistent with those observed towards IRC +10 216. Of the shell distributions, the cyanopolyynes peak at slightly smaller radii than the hydrocarbons, and CN and HNC show the most extended emission. The emitting regions for each species are the smallest for IRAS 07454−7112, consistent with this object having the lowest circumstellar density within our sample. We find that, within the uncertainties of the analysis, the three stars present similar abundances for most species, also compared to IRC +10 216. We find that SiO is more abundant in our three stars compared to IRC+10 216, and that the hydrocarbons are tentatively under-abundant in IRAS 07454−7112 compared to the other stars and IRC +10 216. Our estimated 12 C/ 13 C ratios match well the literature values for the three sources and our estimated silicon and sulphur isotopic ratios are very similar across the three stars and IRC +10 216. Conclusions. The observed circumstellar chemistry appears very similar across our sample and compared to that of IRC +10 216, both in terms of the relative location of the emitting regions and molecular abundances. This implies that, to a first approximation, the chemical models tailored to IRC +10 216 are, at least, able to reproduce the observed chemistry in C-rich envelopes across roughly an order of magnitude in wind density. Key words. stars: AGB and post-AGB – stars: mass-loss – stars: winds, outflows – circumstellar matter – submillimeter: stars – astrochemistry 1. Introduction ⋆ Tables B.1 and B.2 are available in electronic form at the CDS, along with the reprocessed ALMA cubes and line spectra, via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http: //cdsweb.u-strasbg.fr/cgi-bin/qcat?J/A+A/. Stars of low-to-intermediate zero-age-main-sequence mass (∼0.8M ⊙ < M < 8M ⊙ ) populate the asymptotic giant branch (AGB) during their late evolution, after the end of helium fusion Article number, page 1 of 114" 2312.10022v1,"Article Zeeman Splitting of Torsional Oscillation Frequencies of Magnetars Dmitry Yakovlev † Ioffe Institute, Politekhnicheskaya 26, 194021 St Petersburg, Russia; yak@astro.ioffe.ru Abstract: Magnetars form a special class of neutron stars possessing superstrong magnetic fields and demonstrating power flares triggered likely by these fields. Observations of such flares reveal the presence of quasi-periodic oscillations (QPOs) at certain frequencies; they are thought to be excited in the flares. QPOs carry potentially important information on magnetar structure, magnetic field, and mechanisms of magnetar activity. We calculate frequencies of torsional (magneto-elastic) oscillations of the magnetar crust treating the magnetic field effects in the first order of perturbation theory. The theory predicts splitting of non-magnetic oscillation frequencies into Zeeman components. Zeeman splitting of torsional oscillation spectrum of magnetars was suggested, clearly described and estimated by Shaisultanov and Eichler (2009) but their work has not been given considerable attention. To extend it we suggest the technique of calculating oscillation frequencies including Zeeman splitting at not too strong magnetic fields for arbitrary magnetic field configuration. Zeeman splitting enriches the oscillation spectrum and simplifies theoretical interpretation of observations. We calculate several low-frequency oscillations of magnetars with pure dipole magnetic field in the crust. The results qualitatively agree with low-frequency QPOs detected in the hyperflare of SGR 1806–20, and in the giant flare of SGR 1900+14. Keywords: stars: neutron – dense matter – stars: oscillations (including pulsations) 1. Introduction    Citation: Yakovlev, D. Zeeman splitting of torsional oscillations. Preprints 2023, 1, 0. https://doi.org/ Academic Editor: Prof. Chengmin Zhang; Guest Editors: Prof. Dr. David Blaschke and Dr. Jerome Petri Received: Accepted: Published: Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affili- ations. It is well known that neutron stars are most compact stars and contain superdense matter in their interiors (e.g. [1]). These stars have massive liquid cores and thin envelopes. The core contains matter of supranuclear density; its equation of state (EOS) and other properties are still not certain and remain the fundamental problem of physics and astrophysics. The envelope above the core is also important; its thickness is ∼ 1 km and its mass is ∼ 0.01 M ⊙ . The envelope consists mostly of electrons and atomic nuclei. In addition, at densities ρ larger than the neutron drip density ρ drip ≈ 4.3 × 10 11 g cm − 3 , there appear quasi-free neutrons. The atomic nuclei in the envelope form Coulomb crystals (e.g. [2]) which melt near the very surface layers of the star. The solidified envelope is called the crust; one distinguishes the outer (ρ < ρ drip ) and the inner (ρ > ρ drip ) crust. The density of matter at the crust-core interface is ρ cc ∼ 1.4 × 10 14 g cm − 3 . This paper studies torsional oscillations of the star due to elasticity of crystalline lattice. In a non-magnetic star, such pure torsion oscillations are confined in the crust. Foundation of the theory was laid by Hansen and Chioffi [3], Schumaker and Thorne [4], and McDermott et al. [5] in 1980s. Later the theory was developed in numerous publications (see, e.g., [6–15] and references therein). The theory attracted great attention after the discovery of quasi-periodic oscillations (QPOs) in spectra of soft-gamma repeaters (SGRs) (see [16–21]). SGRs belong to a class of magnetars. They are neutron stars possessing very strong magnetic fields B ∼ 10 15 G (e.g. [22–24]) and demonstrating flaring activity that was most probably triggered by these fields. The activity is accompanied by the processes of enormous energy release in the form of hyperflares, supeflares and ordinary flares. The QPOs have been discovered at fading stages of such flares. Seismic activity of SGRs was predicted by Duncan [25] in 1998. The detected QPO frequencies range from a few tens of Hz to several kHz. This is just the range typical for theoretical torsion frequencies of non-magnetic neutron stars. Magnetar QPOs are separated into low-frequency ( ≲ a few hundred Hz) and high-frequency ones." 2312.10024v1,"Accelerating Neural Network Training: A Brief Review Sahil Nokhwal Priyanka Chilakalapudi Preeti Donekal Manoj Chandrasekharan Computer Science Dept. Computer Science Dept. Data Science Dept. Computer Engineering Dept. University of Memphis University of Memphis University of Memphis University of Memphis Memphis, USA Memphis, USA Memphis, USA Memphis, USA nokhwal.official@gmail.com pchlklpd@memphis.edu pdonekal@memphis.edu manoj.c@memphis.edu Suman Nokhwal Ram Swaroop Raj Bala Saurabh Pahune Staff Engineer Co-founder Co-founder Software Engineering Intercontinental Exchange, Inc. ResearchMentorship ResearchMentorship Cardinal Health Pleasanton, California, USA Sirsa, Haryana, India Sirsa, Haryana, India Dublin, Ohio, USA suman148@gmail.com ram.hdm@gmail.com rajbala.contact@gmail.com saurabhpahune214@gmail.com Ankit Chaudhary Associate Professor Jawaharlal Nehru University New Delhi, Delhi, India dr.ankit@ieee.org Abstract The process of training a deep neural network is characterized by significant time requirements and associated costs. Although researchers have made considerable progress in this area, further work is still required due to resource constraints. This study examines innovative approaches to expedite the training process of deep neural networks (DNN), with specific emphasis on three state-of-the-art models such as ResNet50, Vision Transformer (ViT), and EfficientNet. The research utilizes sophisticated methodologies, including Gradient Accumulation (GA), Automatic Mixed Precision (AMP), and Pin Memory (PM), in order to optimize performance and accelerate the training procedure. The study examines the effects of these methodologies on the DNN models discussed earlier, assessing their efficacy with regard to training rate and computational efficacy. The study showcases the efficacy of including GA as a strategic approach, resulting in a noteworthy decrease in the duration required for training. This enables the models to converge at a faster pace. The utilization of AMP enhances the speed of computations by taking advantage of the advantages offered by lower precision arithmetic while maintaining the correctness of the model. Furthermore, this study investigates the application of Pin Memory as a strategy to enhance the efficiency of data transmission between the central processing unit and the graphics processing unit, thereby offering a promising opportunity for enhancing overall performance. The experimental findings demonstrate that the combination of these sophisticated methodologies significantly accelerates the training of DNNs, offering vital insights for experts seeking to improve the effectiveness of deep learning processes. Index Terms Neural Network Training, Acceleration Techniques, Training Optimization, Deep Learning Speedup, Model Training Efficiency, Machine Learning Accelerators, Training Time Reduction, Optimization Strategies I. I NTRODUCTION The task of image classification can be addressed by the application of many machine-learning methodologies. However, contemporary research has predominantly emphasized the utilization of deep-learning neural network architectures, including ResNet50 [1], Vision Transformer [2], and EfficientNet [3]. Despite the notable progress made by the computer vision and deep learning research communities in the field of image classification, there 1" 2312.10036v1,"THE FUNDAMENTAL THEOREM OF TROPICAL DIFFERENTIAL ALGEBRA FOR FORMAL PUISEUX SERIES SEBASTIAN FALKENSTEINER AND STEFANO MERETA Abstract. The fundamental theorem of tropical differential algebra has been established for formal power series solutions of systems of algebraic differential equations. It has been shown that the direct extension to formal Puiseux series solutions fails. In this paper, we overcome this issue by transforming the given differential system and such a generalization is presented. Moreover, we explain why such transformations do not work for generalizing the fundamental theorem to transseries solutions, but show that one inclusion still holds for this case even without using any transformation. 1. Introduction Even though the first appearances of tropical methods in the area of optimization can be traced back to the 1970’s, it is with the beginning of the new millennium that these techniques have started to be applied more and more often, and fruitfully, to geometry, eventually developing into an independent and rich new branch of mathematics, with connections spreading as far as computational biology and machine learning. The fundamental notion linking the classical world and the tropical one is that of tropicalization: by means of a valuation, this process moves problems of algebro-geometric nature to tropical ones, the latter having an intrinsic combinatorial and polyhedral nature. A comprehensive text to approach the subject is [MS21]. More recently, following the revival of interest around algebraic methods for differential equations, and differential algebra in general, see e.g. [Rob14, LH14, FMSW23], a tropical approach to the study of solutions to set of ODEs have been introduced in [Gri17]. In this work the author gives a definition of tropical differential equations and other objects needed to state a fundamental theorem (similar to the fundamental theorem of tropical geometry, see for example [MS21, Theorem 3.2.3]) in this context. This theorem was successfully proven in [AGT16] and subsequently extended to the case of partial differential equations in [FGLH + 20], see [BFNS21] for a more algorithmic description. Drawing inspiration from recent works where tropical geometry is developed as geometry over the tropical semiring, such as [GG16, MR18], a more general framework encompassing that of [Gri17] have been proposed in [GM21]. This allows for a tropical theory of differential equations to be developed also in the case of nontrivially valued fields of coefficients and in this context a fundamental theorem for tropical differential algebra, extending that of [AGT16], have been proven in [Mer23]. We will state our results in this language. The fundamental theorem of tropical differential equations states equality between the (weighted) support of formal power series solutions of a differential ideal and the tropical solutions of the corresponding tropicalized differential system over a valued uncountable algebraically closed field of characteristic zero K, see Theorem 2.4. The direct extension to more general formal series solutions such as formal Laurent series and formal Puiseux series fails as it is presented in [FMSW23, Section 7]. In Max Planck Institute for Mathematics in the Sciences, Inselstraße 22, 04103 Leipzig, Germany E-mail addresses: Sebastian.Falkensteiner@mis.mpg.de, Stefano.Mereta@mis.mpg.de. Date: December 19, 2023. 2010 Mathematics Subject Classification. Primary 14A20; Secondary 12H99, 13N99, 14T90, 14T99. Key words and phrases. tropical geometry; algebraic differential equations; fundamental theorem; Puiseux series. 1" 2312.10047v1,"I.J. Modern Education and Computer Science, 2023, 6, 31-43 Published Online on December 8, 2023 by MECS Press (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2023.06.03 Clustering Students According to their Academic Achievement Using Fuzzy Logic Serhiy Balovsyak Yuriy Fedkovych Chernivtsi National University, Chernivtsi, 58012, Ukraine E-mail: s.balovsyak@chnu.edu.ua ORCID iD: https://orcid.org/0000-0002-3253-9006 Oleksandr Derevyanchuk* Yuriy Fedkovych Chernivtsi National University, Chernivtsi, 58012, Ukraine E-mail: o.v.derevyanchuk@chnu.edu.ua ORCID iD: https://orcid.org/0000-0002-3749-9998 *Corresponding Author Hanna Kravchenko High State Educational Establishment «Chernivtsi transport college», Chernivtsi, 58000, Ukraine E-mail: hannakravchenko81@gmail.com ORCID iD: https://orcid.org/0009-0004-7609-0345 Yuriy Ushenko Yuriy Fedkovych Chernivtsi National University, Chernivtsi, 58012, Ukraine E-mail: y.ushenko@chnu.edu.ua ORCID iD: https://orcid.org/0000-0003-1767-1882 Zhengbing Hu School of Computer Science, Hubei University of Technology, Wuhan, China E-mail: drzbhu@gmail.com ORCID iD: https://orcid.org/0000-0002-6140-3351 Received: 12 June, 2023; Revised: 13 July, 2023; Accepted: 08 August, 2023; Published: 08 December, 2023 Abstract: The software for clustering students according to their educational achievements using fuzzy logic was developed in Python using the Google Colab cloud service. In the process of analyzing educational data, the problems of Data Mining are solved, since only some characteristics of the educational process are obtained from a large sample of data. Data clustering was performed using the classic K-Means method, which is characterized by simplicity and high speed. Cluster analysis was performed in the space of two features using the machine learning library scikit-learn (Python). The obtained clusters are described by fuzzy triangular membership functions, which allowed to correctly determine the membership of each student to a certain cluster. Creation of fuzzy membership functions is done using the scikit-fuzzy library. The development of fuzzy functions of objects belonging to clusters is also useful for educational purposes, as it allows a better understanding of the principles of using fuzzy logic. As a result of processing test educational data using the developed software, correct results were obtained. It is shown that the use of fuzzy membership functions makes it possible to correctly determine the belonging of students to certain clusters, even if such clusters are not clearly separated. Due to this, it is possible to more accurately determine the recommended level of difficulty of tasks for each student, depending on his previous evaluations. Index Terms: Clustering methods, K-Means, Data Mining, Fuzzy Logic, Educational Data, Python. 1. Introduction At present, large volumes of data are processed in education, which are obtained at various stages of the educational process [1-4]. For example, the parameters of students and the results of their studies in various subjects are This work is open access and licensed under the Creative Commons CC BY 4.0 License. Volume 15 (2023), Issue 6" 2312.10053v1,"Towards Goal-oriented Intelligent Tutoring Systems in Online Education Yang Deng ∗ Zifeng Ren ∗ An Zhang National University of Singapore Singapore ydeng@nus.edu.sg National University of Singapore Singapore renzifeng@u.nus.edu National University of Singapore Singapore an_zhang@nus.edu.sg Wenqiang Lei Tat-Seng Chua Sichuan University China wenqianglei@gmail.com National University of Singapore Singapore chuats@comp.nus.edu.sg ABSTRACT Interactive Intelligent Tutoring Systems (ITSs) enhance traditional ITSs by promoting effective learning through interactions and problem resolution in online education. Yet, proactive engagement, prioritizing resource optimization with planning and assessment capabilities, is often overlooked in current ITS designs. In this work, we investigate a new task, named Goal-oriented Intelligent Tutoring Systems (GITS), which aims to enable the student’s mastery of a designated concept by strategically planning a customized sequence of exercises and assessment. To address the problem of goal-oriented policy learning in GITS, we propose a novel graph-based reinforcement learning framework, named Planning-Assessment-Interaction (PAI). Specifically, we first leverage cognitive structure information to improve state representation learning and action selection for planning the next action, which can be either to tutor an exercise or to assess the target concept. Further, we use a dynamically updated cognitive diagnosis model to simulate student responses to exercises and concepts. Three benchmark datasets across different subjects are constructed for enabling offline academic research on GITS. Experimental results demonstrate the effectiveness and efficiency of PAI and extensive analyses of various types of students are conducted to showcase the challenges in this task. 1 INTRODUCTION Intelligent tutoring systems (ITSs) [35], which aim to provide personalized and effective instructional support to students, have gained increasing importance due to the growing demand for adaptive and accessible education in the society, especially in remote or online learning environments. They are applied in a wide range of web applications, such as MOOCs (Massive Open Online Courses) and various mobile learning apps, under the context from K-12 to higher education. Traditional ITSs often offer static and predefined ∗ Equal contribution. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2024, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Set a Target Concept Planning Tutor an Exercise Master the Target Concept Assess the Concept Interaction Teacher Student Fail to Learn Succeed in Learning Quit End Assessment Figure 1: The workflow of GITS. content, which lack the dynamic interactivity and adaptability. Recent studies develop interactive ITSs [20, 47] that can provide realtime feedback [7, 9], engage in natural conversations [30, 39, 40, 44], and customize their teaching content based on individual student needs [5, 28, 41]. The advent of large language models (LLMs) further empowers interactive ITSs with exceptional capabilities on natural language interactions [7, 9, 33]. However, these studies mainly focus on the reactive engagement [31] of the interactive ITSs - to ensure that students acquire the necessary knowledge and to address questions raised by students during the interactions. While the proactive engagement [31] is often overlooked in the design of current interactive ITSs - to design and curate an optimal use of resources for achieving specific pedagogical goals, which requires the capabilities of planning and assessment. Inspired by the remarkable success of goal-oriented interactive systems [10, 48] that can proactively guide the human-computer interaction toward predefined objectives, we introduce a new task, called Goal-oriented Intelligent Tutoring Systems (GITS), to investigate the proactive engagement in ITSs. As the workflow illustrated in Figure 1, an ITS engages in interactions with students, delivering a tailored sequence of exercises with a specific pedagogical goal that is to facilitate and accelerate the mastery of a predefined target concept by the student. Unlike those reactive ITSs, which may focus on individual exercises in isolation, GITS provides a cohesive and strategic learning experience, aligning closely with the student’s long-term educational objectives. Two fundamental roles of proactive engagement in GITS are to determine: 1) What kinds of knowledge to be presented to students? The ITS needs to determine which exercise to teach the student with two basic criteria: (i) The student can comprehend this exercise without losing their learning interests, ensuring that the exercise" 2312.10057v1,"Hypothesis Generative AI in Writing Research Papers: A New Type of Algorithmic Bias and Uncertainty in Scholarly Work Rishab Jain 1,2 , Aditya Jain 3 1 2 3 * Citation: Jain, R., Jain, A. Generative AI in Writing Research Papers: A New Type of Algorithmic Bias and Uncertainty in Scholarly Work. Preprints 2023, 1, 0. https://doi.org/to-be-added Copyright: © 2023 by the authors. Submitted to Preprints for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Harvard University, Cambridge, MA 02138, USA States; Department of Neurosurgery, Massachusetts General Hospital, Boston, MA 02114, USA; Harvard Medical School, Boston, MA 02115, USA Correspondence: rishabjain@college.harvard.edu Abstract: The use of artificial intelligence (AI) in research across all disciplines is becoming ubiquitous. However, this ubiquity is largely driven by hyperspecific AI models developed during scientific studies for accomplishing a well-defined, data-dense task. These AI models introduce apparent, human-recognizable biases because they are trained with finite, specific data sets and parameters. However, the efficacy of using large language models (LLMs)—and LLM-powered generative AI tools, such as ChatGPT—to assist the research process is currently indeterminate. These generative AI tools, trained on general and imperceptibly large datasets along with human feedback, present challenges in identifying and addressing biases. Furthermore, these models are susceptible to goal misgeneralization, hallucinations, and adversarial attacks such as red teaming prompts—which can be unintentionally performed by human researchers, resulting in harmful outputs. These outputs are reinforced in research—where an increasing number of individuals have begun to use generative AI to compose manuscripts. Efforts into AI interpretability lag behind development, and the implicit variations that occur when prompting and providing context to a chatbot introduce uncertainty and irreproducibility. We thereby find that incorporating generative AI in the process of writing research manuscripts introduces a new type of context-induced algorithmic bias and has unintended side effects that are largely detrimental to academia, knowledge production, and communicating research. Keywords: ChatGPT; generative AI; academic writing; algorithmic bias; large language models; AI interpretability; algorithmic transparency; XAI; red teaming 1. Introduction Research that utilizes artificial intelligence (AI), machine learning, or deep learning technologies have shown an exponential growth in terms of the gross number of publications and citations [1,2]. However, not all aspects of AI research are created equally: some fields employ AI more than others, and for different purposes. Medicine, for instance, has utilized AI as a tool for predicting clinical outcomes, whilst philosophy has used AI as a thought experiment to explore arguments about morality [2]. Generative AI—now capable of writing human-like text—has been most recently shaped by the advent of large language models (LLMs) such as GPT-3 [3]. LLMs are trained artificial neural networks that can generate large outputs based on seed text. They can predict the next token in sequence based on the tokens before it, and are able to effectively generate text that is statistically similar to the human language it is trained on. Because LLM chatbots are trained on large swaths of human-written natural language (i.e. data from OpenWebText, Wikipedia, and online journalism), they incorporate human biases in their outputs [4]. While the biases present for AI models created for a certain domain—e.g. machine learning on the electronic health record [5]—may be more easy to intuit, generative AI can be more unpredictable [6,7]. Generative AI may have biases lurking under the surface, making it difficult to reproduce and definitively diagnose bias [8–10]. These may be data-driven or purely algorithmic, caused by training methods and model architectures [10]. These biases are more concerning when factoring in hallucinations and goal misgeneralization: some of the biggest problems in AI interpretability and safety research [8,11]. Generative AI is" 2312.10059v1,"A collection of principles for guiding and evaluating large language models Konstantin Hebenstreit Institute of Artificial Intelligence Medical University of Vienna 1090 Vienna, Austria Robert Praas KTH Royal Institute of Technology 114 28 Stockholm, Sweden Matthias Samwald Institute of Artificial Intelligence Medical University of Vienna 1090 Vienna, Austria matthias.samwald [@] meduniwien.ac.at Abstract Large language models (LLMs) demonstrate outstanding capabilities, but challenges remain regarding their ability to solve complex reasoning tasks, as well as their transparency, robustness, truthfulness, and ethical alignment. In this preliminary study, we compile a set of core principles for steering and evaluating the reasoning of LLMs by curating literature from several relevant strands of work: structured reasoning in LLMs, self-evaluation/self-reflection, explainability, AI system safety/security, guidelines for human critical thinking, and ethical/regulatory guidelines for AI. We identify and curate a list of 220 principles from literature, and derive a set of 37 core principles organized into seven categories: assumptions and perspectives, reasoning, information and evidence, robustness and security, ethics, utility, and implications. We conduct a small-scale expert survey, eliciting the subjective importance experts assign to different principles and lay out avenues for future work beyond our preliminary results. We envision that the development of a shared model of principles can serve multiple purposes: monitoring and steering models at inference time, improving model behavior during training, and guiding human evaluation of model reasoning. 1 Background Large language models (LLMs) such as GPT-4 [29], Flan-PaLM [4] and Claude [2] demonstrate outstanding abilities on a wide variety of tasks. However, LLMs still encounter significant challenges when addressing complex reasoning tasks [47, 26, 24, 34, 15, 35], and there are substantial concerns regarding their truthfulness, transparency, robustness and alignment with ethical values [6, 42, 45, 23, 9]. These limitations hinder the applicability of LLMs in complex and critical domains, such as automating scientific research or augmenting medical decision-making. In this work, we review literature from six distinct fields of research to establish a conceptual model of high-level principles for guiding the reasoning and responses of LLMs (Figure 1). Recent work on structured reasoning was initiated by the finding that LLMs can generate ‘chains of thought’ that improve reasoning performance on complex tasks and improve the transparency of reasoning processes [43, 19]. Succeeding work aimed at further improving reasoning performance 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.10063v1,"Accelerating pathways to leadership for underrepresented groups in STEM New strategies to broaden opportunities for STEM researchers and professionals from underrepresented groups to drive decision-making roles across sectors from philanthropy, industry, to academia, and policy Authors: 2030STEM. 2030STEM Inc., NY, NY USA Jennifer D. Adams, PhD, 2030STEM Salon Series Editor; University of Calgary, Calgary, Alberta, CAN Cameron Bess, PhD, Project Officer and Biologist, U.S. Department of Health and Human Services; Board Member 2030STEM, Washington D.C., USA Joshua C. Brumberg, Ph.D., Dean of the Sciences, The Graduate Center, CUNY, NY, NY, USA Ruth Cohen, Interim Executive Director and Strategic Advisor, CoFounder 2030STEM, New York, New York, USA Jacqueline K. Faherty*, PhD, American Museum of Natural History; CoFounder 2030STEM, New York, New York, USA, ORCID 0000-0001-6251-0573 Daren R. Ginete, PhD, Associate Advisor, Science Philanthropy Alliance, Menlo Park, CA, USA Mandë Holford*, PhD, Hunter College; American Museum of Natural History; CoFounder 2030STEM, New York, New York, USA ORCID 0000-0001-9476-2687 Bobby Jefferson, Vice President and Global Head of Diversity, Equity, Engagement, and Inclusion, DAI, Washington D.C., USA Jeanne Garbarino, PhD, Executive Director, RockEDU Science Outreach, The Rockefeller University, New York, NY, USA ORCID 0000-0002-8824-9294 Alfred Mays, Chief Diversity Officer and Strategist, Senior Program Officer – Diversity and Education Burroughs Wellcome Fund, Chinyere Nwafor-Okoli, DVM, PhD, Provincial Epidemiologist, Alberta Trauma Services, Alberta Health Services, Foothills Medical Center, Calgary, Alberta. Enrico Ramirez-Ruiz, PhD, Astronomy and Astrophysics Department, University of California Santa Cruz, Santa Cruz, California, USA *Corresponding authors: jfaherty@amnh.org ; mholford@hunter.cuny.edu ABSTRACT The vision of 2030STEM is to address systemic barriers in institutional structures and funding mechanisms required to achieve full inclusion in Science, Technology, Engineering, and Mathematics (STEM) and 1" 2312.10067v1,"Teenagers and Artificial Intelligence: Bootcamp Experience and Lessons Learned Uzay Macar, Blake Castleman, Noah Mauchly, Michael Jiang, Asma Aouissi, Salma Aouissi, Xena Maayah, Kaan Erdem, Rohith Ravindranath, Andrea Clark-Sevilla, Ansaf Salleb-Aouissi Aiphabet Inc. contact@aiphabet.org Abstract Artificial intelligence (AI) stands out as a game-changer in today’s technology landscape. However, the integration of AI education in classroom curricula currently lags behind, leaving teenagers inadequately prepared for an imminent AI- driven future. In this pilot study, we designed a three-day bootcamp offered in the summer of 2023 to a cohort of 60 high school students. The curriculum was delivered in person through animated video content, easy-to-follow slides, interactive playgrounds, and quizzes. These were packaged in the early version of an online learning platform we are developing. Results from the post-bootcamp survey conveyed a 91.4% overall satisfaction. Despite the short bootcamp duration, 88.5% and 71.4% of teenagers responded that they had an improved understanding of AI concepts and programming, respectively. Overall, we found that employing diverse modalities effectively engaged students, and building foundational modules proved beneficial for introducing more complex topics. Furthermore, using Google Colab notebooks for coding assignments proved challenging to most students. Students’ activity on the platform and their answers to quizzes showed proficient engagement and a grasp of the material. Our results strongly highlight the need for compelling and accessible AI education methods for the next generation and the potential for informal learning to fill the gap of providing early AI education to teenagers. Keywords: AI education, AI curriculum, AI bootcamp, online learning platform, informal learning, teenagers and AI. Introduction We are witnessing an incredible leap in artificial intelligence (AI) research and applications, affecting every aspect of our lives. As AI continues to shape and revolutionize numerous domains, addressing the existing knowledge gap is crucial, particularly among teenagers (Forsyth et al. 2021). Youth’s perceptions of AI are often encompassed by science fiction and popular culture (Greenwald, Leitner, and Wang 2021), leading to common misconceptions. It is critical to create powerful learning opportunities to empower teenagers with the necessary skills and ethical awareness to navigate the AI- driven world responsibly, harness its potential, and address the challenges that arise from its adoption. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Growing motivation and evidence exist for an early AI education installation adapted to young learners before college. There is also a strong interest from different stakeholders, including academia, industry, and governments. Different institutions have called for designing a K-12 AI education agenda on how to create curriculum that is engaging from both the technical and ethical perspectives (Miao and Shiohira 2022; Zhang et al. 2023), and prepare an AI-ready workforce (Department of Defense 2019). There is also growing literature in education research and fantastic efforts from the AI in education community (Schaper et al. 2023; Lane 2023; Bellas et al. 2022; Hasse et al. 2019; Zhang et al. 2023; Rizvi, Waite, and Sentance 2023). Despite rich contributions so far, there is a need for more research to fit AI into formal education in schools. Indeed, there are unique challenges to overcome. These challenges, to name a few, include: • Training teachers for AI education in the classroom. • Addressing disparities in schools’ computing resources. • Homogenizing CS education across schools. • Fitting AI learning into packed school schedules. • Designing AI curriculum that encompasses an appropriate depth level for diverse age ranges. • Figuring out entry points to AI across the K-12 spectrum. • Researching and standardizing AI content and evaluation framework for K-12. Prior literature from the AI4K12 team (Touretzky, Gardner-McCune, and Seehorn 2023; Touretzky et al. 2019, 2022) provide a useful framework, called the “five big ideas.” The authors propose guidelines on how to structure AI curricula around perception, representation and reasoning, learning, natural interaction, and societal impact for different K-12 age groups. While this framework is adopted, AI’s full integration into school curriculum will take time. Perhaps, as pointed out by (Lane 2023), a realistic approach is to strengthen the K-12 curriculum to provide the AI prerequisites in school thus preparing students for college. This would include a more robust mathematical background, ideally including discrete mathematics, proofs and critical thinking, calculus, linear algebra, probability, and statistics. It also means enforcing stronger computer science (CS) preparedness (Kunda 2021)." 2312.10082v1,"Finding Paths for Explainable MOOC Recommendation: A Learner Perspective JIBRIL FREJ, EPFL, Switzerland NEEL SHAH, EPFL, Switzerland MARTA KNEŽEVIĆ, EPFL, Switzerland TANYA NAZARETSKY, EPFL, Switzerland TANJA KÄSER, EPFL, Switzerland The increasing availability of Massive Open Online Courses (MOOCs) has created a necessity for personalized course recommendation systems. These systems often combine neural networks with Knowledge Graphs (KGs) to achieve richer representations of learners and courses. While these enriched representations allow more accurate and personalized recommendations, explainability remains a significant challenge which is especially problematic for certain domains with significant impact such as education and online learning. Recently, a novel class of recommender systems that uses reinforcement learning and graph reasoning over KGs has been proposed to generate explainable recommendations in the form of paths over a KG. Despite their accuracy and interpretability on e-commerce datasets, these approaches have scarcely been applied to the educational domain and their use in practice has not been studied. In this work, we propose an explainable recommendation system for MOOCs that uses graph reasoning. To validate the practical implications of our approach, we conducted a user study examining user perceptions of our new explainable recommendations. We demonstrate the generalizability of our approach by conducting experiments on two educational datasets: COCO and Xuetang. CCS Concepts: • Human-centered computing → Human computer interaction (HCI); • Computing methodologies → Neural networks. Additional Key Words and Phrases: MOOCs, Recommendation, Explainable AI, User study ACM Reference Format: Jibril Frej, Neel Shah, Marta Knežević, Tanya Nazaretsky, and Tanja Käser. 2024. Finding Paths for Explainable MOOC Recommendation: A Learner Perspective. In The 14th Learning Analytics and Knowledge Conference (LAK ’24), March 18–22, 2024, Kyoto, Japan. ACM, New York, NY, USA, 17 pages. https://doi.org/10.1145/3636555.3636898 1 INTRODUCTION The proliferation of Massive Open Online Courses (MOOCs) has led to a democratization of educational resources, yet it has also introduced an information overload problem. To illustrate, Udemy provides over 213,000 courses, including 10,500 accredited ones, while Coursera hosts over 14,000 courses, with 7,000 being accredited. This overwhelming variety highlights the essential role of effective recommendation systems in assisting learners in selecting from the myriad of available courses. These systems are essential in helping learners find the most suitable courses based on their individual needs (e.g., goals, backgrounds, and motivations). They can facilitate optimal learning experiences and play a pivotal role in effectively steering learners’ academic and professional paths. Indeed, for a recommendation to be truly impactful, it must be tailored to address the students’ diverse learning objectives, skill levels, and aspirations. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. Manuscript submitted to ACM 1" 2312.10086v1,"A Necessary Optimality Condition for Extended Weighted Generalized Fractional Optimal Control Problems 1 Houssine Zine 1 zinehoussine@ua.pt El Mehdi Lotfi 2 elmehdi.lotfi@univh2c.ma Delfim F. M. Torres 1,∗ delfim@ua.pt Noura Yousfi 2 nourayousfi.fsb@gmail.com Center for Research and Development in Mathematics and Applications (CIDMA), Department of Mathematics, University of Aveiro, 3810-193 Aveiro, Portugal 2 Laboratory of Analysis, Modeling and Simulation (LAMS), Faculty of Sciences Ben M’sik, Hassan II University of Casablanca, P.O. Box 7955 Sidi Othman, Casablanca, Morocco Abstract Using the recent weighted generalized fractional order operators of Hattaf, a general fractional optimal control problem without constraints on the values of the control functions is formulated and a corresponding (weak) version of Pontryagin’s maximum principle is proved. As corollaries, necessary optimality conditions for Caputo–Fabrizio, Atangana–Baleanu and weighted Atangana–Baleanu fractional dynamic optimization problems are trivially obtained. As an application, the weighted generalized fractional problem of the calculus of variations is investigated and a new more general fractional Euler–Lagrange equation is given. Keywords: extended weighted generalized fractional optimal control problems; weak Pontryagin’s maximum principle; fractional calculus of variations; fractional Euler–Lagrange equation and Hamiltonian approach; weighted generalized integration by parts. MSC: 26A33; 49K05. 1 Introduction In 1744, Euler published his “Methodus inveniendi lineas curvas maximi minimive proprietate gaudentes sive solutio problematis isoperimetrici latissimo sensu accepti” [1]. In this work, Euler seeks a method to find a curve that minimizes or maximizes any quantity expressed by an integral, generalizing the problems studied before by the Bernoulli brothers’, but retaining the geometrical approach developed by Johann Bernoulli to solve them. Euler found what is now known as the Euler–Lagrange differential equation, which is a necessary condition for a function to maximize or minimize a given integral functional that depends on the unknown function and its derivative. In 1760, Lagrange published an “Essay on a new method of determining the maxima and minima of indefinite integral formulas” [2], giving the analytic method that allows to attack all types of variational problems [3, 4]. In 1996, Riewe introduced the fractional calculus of variations [5, 6], from which many scholars reintroduced several variants of the fractional calculus of variations and obtained some wonderful ∗ This is a preprint version of the paper published open access in ’Results in Control and Optimization’ [https://doi.org/10.1016/j.rico.2023.100356]. ∗ Corresponding author. 1" 2312.10088v1,"Published in Transactions on Machine Learning Research (08/2022) On Robustness to Missing Video for Audiovisual Speech Recognition Oscar Chang oscarchang@google.com Google LLC, USA Otavio Braga obraga@google.com Google LLC, USA Hank Liao hankliao@google.com Google LLC, USA Dmitriy Serdyuk dserdyuk@google.com Google LLC, USA Olivier Siohan siohan@google.com Google LLC, USA Reviewed on OpenReview: https: // openreview. net/ forum? id= fXorxxbDvO Abstract It has been shown that learning audiovisual features can lead to improved speech recognition performance over audio-only features, especially for noisy speech. However, in many common applications, the visual features are partially or entirely missing, e.g. the speaker might move off screen. Multi-modal models need to be robust: missing video frames should not degrade the performance of an audiovisual model to be worse than that of a single-modality audioonly model. While there have been many attempts at building robust models, there is little consensus on how robustness should be evaluated. To address this, we introduce a framework that allows claims about robustness to be evaluated in a precise and testable way. We also conduct a systematic empirical study of the robustness of common audiovisual speech recognition architectures on a range of acoustic noise conditions and test suites. Finally, we show that an architecture-agnostic solution based on cascades can consistently achieve robustness to missing video, even in settings where existing techniques for robustness like dropout fall short. 1 Introduction Learning from multiple modalities using large-scale datasets has increasingly been shown to produce stronger representations over those learned from a single modality. Such approaches have led to state-of-the-art performance on numerous tasks in computer vision, natural language processing, and speech recognition (Radford et al., 2021; Ramesh et al., 2021; Yuan et al., 2021; Shi et al., 2022). As multi-modal learning becomes more popular, it is paramount that it should be developed and deployed in a trustworthy manner. This means that multi-modal systems have to be architected in ways that not just leverage features from additional modalities when they are present, but are also robust to missing features from these modalities when they are absent. In this paper, we study the problem of building audiovisual automatic speech recognition (ASR) models that are robust to missing video. This problem is decidedly asymmetric: only robustness to missing video, and not audio, is desired. This is because state-of-the-art lip-reading models still are not performant enough for many practical ASR applications, which makes only the audio, and not video, indispensable (Serdyuk et al., 2021). 1" 2312.10089v1,"Advancements in Content-Based Image Retrieval: A Comprehensive Survey of Relevance Feedback Techniques Hamed Qazanfari Image Processing and Data Mining Lab, Shahrood University of Technology, Shahrood, Iran hamedmit.gh@gmail.com Mohammad M. AlyanNezhadi Faculty of Science, University of Science and Technology of Mazandaran, Behshahr, Iran alyan.nezhadi@mazust.ac.ir Abstract— Content-based image retrieval (CBIR) systems have emerged as crucial tools in the field of computer vision, allowing for image search based on visual content rather than relying solely on metadata. This survey paper presents a comprehensive overview of CBIR, emphasizing its role in object detection and its potential to identify and retrieve visually similar images based on content features. Challenges faced by CBIR systems, including the semantic gap and scalability, are discussed, along with potential solutions. It elaborates on the semantic gap, which arises from the disparity between low-level features and high-level semantic concepts, and explores approaches to bridge this gap. One notable solution is the integration of relevance feedback (RF), empowering users to provide feedback on retrieved images and refine search results iteratively. The survey encompasses longterm and short-term learning approaches that leverage RF for enhanced CBIR accuracy and relevance. These methods focus on weight optimization and the utilization of active learning algorithms to select samples for training classifiers. Furthermore, the paper investigates machine learning techniques and the utilization of deep learning and convolutional neural networks to enhance CBIR performance. This survey paper plays a significant role in advancing the understanding of CBIR and RF techniques. It guides researchers and practitioners in comprehending existing methodologies, challenges, and potential solutions while fostering knowledge dissemination and identifying research gaps. By addressing future research directions, it sets the stage for advancements in CBIR that will enhance retrieval accuracy, usability, and effectiveness in various application domains. Keywords— Content-based image retrieval (CBIR), Relevance feedback (RF), Semantic gap, Short term learning, Long term learning, Object detection, Feature extraction, Convolutional neural networks (CNNs) I. I NTRODUCTION Content-based image retrieval (CBIR) systems play an important role in the field of computer vision. These systems search for images based on their visual content rather than metadata, such as keywords and tags. While CBIR focuses on image retrieval, it can be closely related to the broader topic of object detection [1]. Object detection involves identifying and localizing specific objects within an image [2]. This automated approach allows for the retrieval of images that share visual similarities with the query image. Overall, content-based image retrieval approaches enhance the object detection process by enabling the identification Zohreh Nozari Khoshdaregi Department of Computer Engineering University of Bojnord, Iran z.nozari222@gmail.com and retrieval of visually similar images based on their content features [1]. In CBIR systems, low-level features like color, texture, and shape are extracted to describe the content of images. These features can be utilized in object detection to detect and classify objects based on their visual characteristics [3]. Challenges in CBIR include the semantic gap, where low-level visual features don't directly correspond to highlevel semantic concepts humans use to interpret images. Bridging this gap is crucial to improve CBIR accuracy and relevance [4]. One of the solutions to address these challenges is Relevance Feedback (RF). RF allows users to provide feedback on the retrieved images, indicating their preferences and iteratively refining the search results. Incorporating RF into CBIR systems enhances accuracy by adapting to user preferences and reducing the semantic gap [4]. In general, CBIR is a vital component of object detection and computer vision, and providing a survey on CBIR and RF is crucial. A comprehensive survey helps researchers and practitioners understand the existing techniques, challenges, and potential solutions. It facilitates knowledge sharing, identifies research gaps, and paves the way for advancements in CBIR and RF in the future. The rest of this paper is organized as follows. We discuss the CBIR and The RF in more detail in the next sections. Then in section 2 the categories of the RF method and some of the related works will be discussed. The paper concludes in Section III with a discussion of the results achieved and some suggestions for future work. A. CBIR Systems Content-Based Image Retrieval (CBIR) is a crucial component of computer vision, enabling the retrieval of images based on their visual content rather than relying on metadata or textual descriptions. CBIR has various applications, including object detection, image recognition, and multimedia retrieval [5,6]. However, CBIR faces several challenges that affect its performance and usability. Here is an overview of the CBIR system, its challenges, and potential solutions: CBIR involves feature extraction, where low-level visual features are extracted from images. These features are used to build a representation of the image content. CBIR algorithms compare these feature representations to retrieve 1" 2312.10091v1,"Look Before You Leap: A Universal Emergent Decomposition of Retrieval Tasks in Language Models Alexandre Variengien ∗ École Normale Supérieure de Lyon École Polytechnique Fédérale de Lausanne Eric Winsor Conjecture Abstract When solving challenging problems, language models (LMs) are able to identify relevant information from long and complicated contexts. To study how LMs solve retrieval tasks in diverse situations, we introduce ORION, a collection of structured retrieval tasks spanning six domains, from text understanding to coding. Each task in ORION can be represented abstractly by a request (e.g. a question) that retrieves an attribute (e.g. the character name) from a context (e.g. a story). We apply causal analysis on 18 open-source language models with sizes ranging from 125 million to 70 billion parameters. We find that LMs internally decompose retrieval tasks in a modular way: middle layers at the last token position process the request, while late layers retrieve the correct entity from the context. After causally enforcing this decomposition, models are still able to solve the original task, preserving 70% of the original correct token probability in 98 of the 106 studied model-task pairs. We connect our macroscopic decomposition with a microscopic description by performing a fine-grained case study of a questionanswering task on Pythia-2.8b. Building on our high-level understanding, we demonstrate a proof of concept application for scalable internal oversight of LMs to mitigate prompt-injection while requiring human supervision on only a single input. Our solution improves accuracy drastically (15.5% → 97.5% on Pythia- 12b). This work presents evidence of a universal emergent modular processing of tasks across varied domains and models and is a pioneering effort in applying interpretability for scalable internal oversight of LMs. Code available at https: //github.com/aVariengien/causal-checker. 1 Introduction Recent advances in language models (LMs) (Vaswani et al., 2017) have demonstrated their flexible problem-solving abilities and their expert-level knowledge in a wide range of fields (Bubeck et al., 2023; OpenAI, 2023). Researchers have developed a series of techniques such as fine-tuning (Ouyang et al., 2022) and Reinforcement Learning from Human Feedback (RLHF) (Ouyang et al., 2022) to ensure models output honest and helpful answer. However, as their abilities reach human level, supervision from human feedback becomes costly and even impossible. This necessitates more efficient or automated methods of supervision, known generally as scalable oversight. Moreover, existing methods only control for the output of the model while leaving the internals of the model unexamined (Casper et al., 2023; Ngo et al., 2023). This is a critical limitation as many internal processes can elicit the same output while using trustworthy or untrustworthy mechanisms. For instance, we would like to know whether a model answers faithfully based on available information or simply gives a users’ preferred answer (Perez et al., 2022). We call this problem internal oversight. ∗ Work done during an internship at Conjecture. Correspondence to alexandre.variengien@gmail.com." 2312.10095v1,"JeDEM 15(1) 1-21, 2023 ISSN 2075-9517 http://www.jedem.org Date of submission: 06.06.2022 Date of acceptance: 07.11.2022 Article DOI: 10.29379/jedem.v15i1.738 Casual Social Media Use among the Youth: Effects on Online and Offline Political Participation Mehdi Barati ORCID Nr: 0000-0002-3447-4197 Department of Information Science, CEHC, State University of New York at Albany, New York, U.S. mbarati@albany.edu Abstract: Previous studies suggest that social media use among the youth is correlated with online and offline political participation. There is also a mixed and inconclusive debate on whether online political participation in the youth increases offline political participation. This study uses three models of OLS, two-way fixed effects, and an instrumental variable approach to make causal inferences about the social media use and online and offline political participation of the youth. The analyses provide evidence of a significant effect of casual social media use on online political participation and no effect or negligible effect on offline political activity and voting behavior. The results from fixed effects and instrumental variable models provide strong evidence of elasticity between online political participation and offline political activity in young individuals. On average, a one percent increase in online political participation increases the offline political activity index by 0.12 percent. Keywords: Casual Social Media Use, Political Communication, Online Political Participation, Causal Inference, Clicktivism Acknowledgment: I am very grateful to Dr. Bahareh Ansari for her insightful comments. 1. Introduction Social media use has been increasing exponentially during the last decade. According to the Pew Research Center, the social media use rate among American adults increased from only 5% in 2005 to 72% in 2018 (Pew Research Center, 2021). Another survey from the same center found that, in 2018, 95 % of teens had access to a smartphone, and 45% said they are online 'almost constantly' (Anderson & Jiang, 2018). A more recent survey found that the majority of Americans say they use YouTube and Facebook, while use of Instagram, Snapchat and TikTok is especially common among adults under 30 (Auxier & Anderson, 2021). This extensive presence of social media in everyday life 1 Creative Commons Attribution 3.0 Austria (CC BY 3.0), 2023." 2312.10096v1,"JeDEM 15(1): 73-123, 2023 ISSN 2075-9517 http://www.jedem.org Date of submission: 10.09.2023 Date of acceptance: 28.03.2023 Article DOI: 10.29379/jedem.v15i1.759 Open Government Data Programs and Information Privacy Concerns: A Literature Review Mehdi Barati ORCID Nr: 0000-0002-3447-4197 Department of Information Science, CEHC, State University of New York at Albany, New York, U.S. mbarati@albany.edu Abstract: This study presents a narrative review of the literature on privacy concerns of Open Government Data (OGD) programs and identifies suggested technical, procedural, and legal remedies. Peer-reviewed articles were identified and analysed from major bibliographic databases, including Web of Science, Digital ACM Library, IEEE Explore Digital Library, and Science Direct. Included articles focus on identifying individual information privacy concerns from the viewpoint of OGD stakeholders or providing solutions for mitigating concerns and risks. Papers that discussed and focused on general privacy issues or privacy concerns of open data in general or open science privacy concerns were excluded. Three streams of research were identified: 1) exploring privacy concerns and balance with OGD value propositions, 2) proposing solutions for mitigating privacy concerns, and 3) developing risk-based frameworks for the OGD program at different governmental levels. Findings suggest that contradictions with Fair Information Practices, reidentification risks, conflicts with OGD value propositions, and smart city data practices are significant privacy concerns in the literature. Proposed solutions include technical, legal, and procedural measures to mitigate privacy concerns. Building on the findings, practical implications and suggested future research directions are provided. Keywords: Open Government Data; Information Privacy; De-identification; Privacy Risks; Cybersecurity Acknowledgment: I am very grateful to Dr. Bahareh Ansari, Dr. Behlendorf, Dr. Tatar, and Dr. Yankson for their insightful comments. 1. Introduction Open Government Data (OGD) initiatives have been proposed and implemented by many governments as a tool to enhance transparency, accountability, efficiency, and effectiveness of government and public sector functions, public participation and collaboration among public, private, and civic organizations, and innovative creation of knowledge, services, and businesses (Ansari, 2021; 73 Creative Commons Attribution 3.0 Austria (CC BY 3.0), 2023" 2312.10102v1,"Robust Estimation of Causal Heteroscedastic Noise Models Quang-Duy Tran ∗† Bao Duong † Phuoc Nguyen † Gaussian 1 Introduction The aim of the causal discovery is to uncover the underlying causal relationships of the data. This task is relevant in various scientific disciplines such as biology, economics, and sociology [17]. One foundational challenge in causal discovery involves identifying the cause and effect between two variables X and Y . Randomized controlled trials (RCT) are considered the ideal solution for determining causal relationships, particularly in medicine [6]. However, RCTs require active intervention in variables and observation of corresponding feedback, making them resource-intensive and sometimes ethically impractical. To overcome the limitations of RCT, studying observational data becomes a more challenging yet necessary approach for identifying causal re- ∗ Corresponding author, q.tran@deakin.edu.au † Applied Artificial Intelligence Institute (A 2 I 2 ), Deakin University, Australia Student’s t Effect Y 4 2 0 −2 (X) Residual Y −f g(X) Abstract Distinguishing the cause and effect from bivariate observational data is the foundational problem that finds applications in many scientific disciplines. One solution to this problem is assuming that cause and effect are generated from a structural causal model, enabling identification of the causal direction after estimating the model in each direction. The heteroscedastic noise model is a type of structural causal model where the cause can contribute to both the mean and variance of the noise. Current methods for estimating heteroscedastic noise models choose the Gaussian likelihood as the optimization objective which can be suboptimal and unstable when the data has a non-Gaussian distribution. To address this limitation, we propose a novel approach to estimating this model with Student’s t-distribution, which is known for its robustness in accounting for sampling variability with smaller sample sizes and extreme values without significantly altering the overall distribution shape. This adaptability is beneficial for capturing the parameters of the noise distribution in heteroscedastic noise models. Our empirical evaluations demonstrate that our estimators are more robust and achieve better overall performance across synthetic and real benchmarks. Thin Nguyen † 2 0 −2 −2 0 Cause X 2 −2 0 2 Cause X Figure 1: Heteroscedastic noise models estimated with Gaussian distribution and Student’s t-distribution for the likelihood p (Y | X) on pair 82 of the LS-s dataset. The Gaussian estimation fails to capture the regions with small sample sizes and low variances, which causes suboptimal fits in these regions. In contrast, estimating with a more robust Student’s t-distribution allows the model to better capture the distribution of the noise. Accordingly, our estimation method with t-distribution (X) can correctly retrieve the residual N Y = Y −f that is g(X) independent of the cause X. lationships. With solely observational data, determining the causal direction between X and Y requires prior assumptions of the data-generating process, which is commonly represented by structural causal models (SCMs) [17]. In general, an SCM includes a cause variable X, an independent noise term N Y (N Y ⊥⊥ X), and an effect variable Y generated from X and N Y via a function f . By restricting the formulation of f , the identifiability or the ability to identify the causal direction from observational data has been intensively studied. The earliest and the most comprehensively examined model is the branch of additive noise models (ANMs), where the noise term is added after applying the function f : Y := f (X) + N Y . This model is proven to be identifiable when f is linear and N has a non-Gaussian Copyright © 2023 by SIAM Unauthorized reproduction of this article is prohibited" 2312.10111v1,"Plasticine3D: Non-rigid 3D editting with text guidance Yige Chen, Ang Chen, Siyuan Chen, Ran Yi Shanghai Jiao Tong University 800 Dongchuan RD. Minhang District, Shanghai, China. foxie arctic@sjtu.edu.cn Abstract latest progress in generative models has paved the way, empowering people to embark on artistic endeavors using only a handful of words[8, 11]. Recently, utilizing the 2D prior of text-to-image diffusion models and leveraging inductive bias of implicit 3D representation, score distillation sampling(SDS) based 3D generative methods have shown the great potential in semantic-driven 3D object generation[4, 20, 30]. Unlike traditional methods that rely on training pure 3D generative models with limited categories[18, 27, 33], this approach provides a more computation-saving way to generate diverse 3D objects using pretrained T2I diffusion models. Besides generating 3D objects, there’s also significant potential in editing towards existing 3D objects. Its applications span from visualization and communication to scientific research, art design, making it a research subject with a wide range of practical and creative uses. Since SDS methods have proven successful in generating and manipulating 3D geometry, it immediately raises the intriguing question of whether a similar approach could be developed to edit 3D shapes. With the help of Score Distillation Sampling(SDS) and the rapid development of various trainable 3D representations, Text-to-Image(T2I) diffusion models have been applied to 3D generation tasks and achieved considerable results. There are also some attempts toward the task of editing 3D objects leveraging this Text-to-3D pipeline. However, most methods currently focus on adding additional geometries, overwriting textures or both. But few of them can perform non-rigid transformation of 3D objects. For those who can perform non-rigid editing, on the other hand, suffer from low-resolution, lack of fidelity and poor flexibility. In order to address these issues, we present: Plasticine3D, a general, high-fidelity, photo-realistic and controllable nonrigid editing pipeline. Firstly, our work divides the editing process into a geometry editing stage and a texture editing stage to achieve more detailed and photo-realistic results ; Secondly, in order to perform non-rigid transformation with controllable results while maintain the fidelity towards original 3D models in the same time, we propose a multiview-embedding(MVE) optimization strategy to ensure that the diffusion model learns the overall features of the original object and an embedding-fusion(EF) to control the degree of editing by adjusting the value of the fusing rate. We also design a geometry processing step before optimizing on the base geometry to cope with different needs of various editing tasks. Further more, to fully leverage the geometric prior from the original 3D object, we provide an optional replacement of score distillation sampling named score projection sampling(SPS) which enables us to directly perform optimization from the origin 3D mesh in most common median non-rigid editing scenarios. We demonstrate the effectiveness of our method on both the non-rigid 3D editing task and general 3D editing task. Recent techniques for addressing semantic-driven 3D edit task can be categorized as one of the following: (1) Performing considerable global editing for style transfer tasks on appearance of the object[5, 7, 13, 32]. But these methods have no ability in changing the shape of an object. (2) Using a self-generated attention mask/grid [25, 34], a provided sketch[19] or a determined region[15] to accurately targeting specific local regions, leading to satisfying editing result on the base 3D shape. However, these methods supporting only minor shape insertion and replacement of objects of the same type with the same pose or simple addition task, which make them incapable to perform non-rigid editing tasks since they often require addition, removal and deformation at the same time. (3) Fine-tuning a T2I generative model as the guidance for SDS to perform semanticguided non-rigid 3D editing[22], however, it leads to uncontrollable degrees of editing. (4) Directly perform a controllable non-rigid transformation with a modified 3D NeRF representation[3], however they often require an additional guidance (e.g. an edited 2D image) and are lacking in ability 1. Introduction Throughout history, art has served as a boundless platform for human imagination and creative expression. The 1" 2312.10118v1,"From-Ground-To-Objects: Coarse-to-Fine Self-supervised Monocular Depth Estimation of Dynamic Objects with Ground Contact Prior Jaeho Moon Juan Luis Gonzalez Bello Byeongjun Kwon KAIST Munchurl Kim {jaeho.moon, juanluisgb, kbj2738, mkimee}@kaist.ac.kr https://kaist-viclab.github.io/From_Ground_To_Objects_site/ Abstract Image Self-supervised monocular depth estimation (DE) is an approach to learning depth without costly depth ground truths. However, it often struggles with moving objects that violate the static scene assumption during training. To address this issue, we introduce a coarse-to-fine training strategy leveraging the ground contacting prior based on the observation that most moving objects in outdoor scenes contact the ground. In the coarse training stage, we exclude the objects in dynamic classes from the reprojection loss calculation to avoid inaccurate depth learning. To provide precise supervision on the depth of the objects, we present a novel Ground-contacting-prior Disparity Smoothness Loss (GDS-Loss) that encourages a DE network to align the depth of the objects with their ground-contacting points. Subsequently, in the fine training stage, we refine the DE network to learn the detailed depth of the objects from the reprojection loss, while ensuring accurate DE on the moving object regions by employing our regularization loss with a cost-volume-based weighting factor. Our overall coarseto-fine training strategy can easily be integrated with existing DE methods without any modifications, significantly enhancing DE performance on challenging Cityscapes and KITTI datasets, especially in the moving object regions. Ground Truth 𝑎 1 : 0.661 𝑎𝑏𝑠_𝑟𝑒𝑙: 0.422 Error Map Depth Map 1.0 0.0 Point Cloud Reconstruction MonoViT [52] 1 𝑎 : 0.913 Depth Map 𝑎𝑏𝑠_𝑟𝑒𝑙: 0.095 Error Map 1.0 0.0 Point Cloud Reconstruction Ours-MonoViT Figure 1. The effect of our coarse-to-fine self-supervised DE training strategy applied to MonoViT [52]. In the error maps, blue indicates small errors, and red indicates large errors. monocular videos, a depth estimation (DE) network often learns inaccurate depth of moving objects that break the static scene assumption but still minimize the reprojection loss for self-supervision [13, 17, 18, 27]. To handle the moving object problem, the ‘automasking’ [13] was proposed to exclude the static pixels in sequential frames from the reprojection loss calculation. However, automasking is limited to handling the objects moving at the same speed and direction as the camera. More recent work suggested to estimate 3D object motions [22, 30–32] or to disentangle object motion for cost volume construction [9]. However, these self-supervised learning DE methods confront inherent ambiguities in learning the depth and motion of the ob- 1. Introduction Recent neural-network-based methods for depth estimation from 2D images have shown promising performance as the demand for 3D information grows with navigation, robotics, and AR/VR applications. While supervised methods [2, 10, 29, 33, 43] utilize expensive and sparse ground truth (GT) depth for training, self-supervised methods learn depth by minimizing photometric errors (or reprojection loss) between the target frame and the warped frames from stereo images [11, 12, 14, 15, 46, 48] or consecutive frames in monocular videos [13, 17, 49, 52]. In the pipeline of self-supervised depth learning for 1" 2312.10126v1,"Do Text Simplification Systems Preserve Meaning? A Human Evaluation via Reading Comprehension Sweta Agrawal Department of Computer Science University of Maryland sweagraw@umd.edu Abstract Automatic text simplification (TS) aims to automate the process of rewriting text to make it easier for people to read. A prerequisite for TS to be useful is that it should convey information that is consistent with the meaning of the original text. However, current TS evaluation protocols assess system outputs for simplicity and meaning preservation without regard for the document context in which output sentences occur and for how people understand them. In this work, we introduce a human evaluation framework to assess whether simplified texts preserve meaning using reading comprehension questions. With this framework, we conduct a thorough human evaluation of texts by humans and by nine automatic systems. Supervised systems that leverage pre-training knowledge achieve the highest scores on the reading comprehension (RC) tasks amongst the automatic controllable TS systems. However, even the best-performing supervised system struggles with at least 14% of the questions, marking them as “unanswerable” based on simplified content. We further investigate how existing TS evaluation metrics and automatic question-answering systems approximate the human judgments we obtained. 1 Introduction Rewriting text so that it is easier to understand has the potential to help a wide range of audiences including non-native speakers (Petersen and Ostendorf, 2007; Allen, 2009; Crossley et al., 2014), children (Watanabe et al., 2009) or people with reading or cognitive disabilities (Alonzo et al., 2020) access information more easily (Chandrasekar et al., 1996; Stajner, 2021). Online resources such as the Newsela (Inc, 2023) and OneStopEnglish (Education, 2023) or the Cochrane systematic reviews (Collaboration, 2023), provide text articles simplified by human editors so that they are easier Marine Carpuat Department of Computer Science University of Maryland marine@umd.edu to understand by K-12 students, English speakers with limited proficiency, and lay people seeking to understand medical literature respectively. This has motivated a wealth of Natural Language Processing research on text simplification, framed as the task of rewriting an input text into a simpler version while preserving the core meaning of the original (Chandrasekar and Srinivas, 1997), which has been addressed with approaches ranging from dedicated supervised systems (Specia, 2010; Zhang and Lapata, 2017; Scarton and Specia, 2018; Martin et al., 2020; Jiang et al., 2020; Devaraj et al., 2021; Sheang and Saggion, 2021; Agrawal and Carpuat, 2022; Martin et al., 2022) to prompting black-box pre-trained models (Feng et al., 2023; Kew et al., 2023). However, texts that are easier to read are not helpful if they mislead readers by providing information that is not consistent with the original document. This can happen with automatic TS outputs where deletions or inaccurate rewrites can change how a text is understood (Devaraj et al., 2022). Assessing to what extent the meaning of the original text is preserved should therefore be a critical dimension of TS evaluation (Stajner, 2021), and a pre-requisite to determining whether and how TS can be used in practice. Additionally, evaluating individual sentences out of context may not be sufficient to establish whether model-generated texts preserve meaning, as human simplifications often occur at the document or the passage level (Devaraj et al., 2022). Yet, TS outputs are primarily evaluated intrinsically, with automatic metrics that compare system outputs with human-written reference simplifications and/or the original source (Papineni et al., 2002; Xu et al., 2016; Maddela et al., 2023), or with generic human assessments of simplicity and meaning preservation of individual sentences outside of a context of use (Schwarzer and Kauchak, 2018). While these evaluations can guide model development, they do not address whether" 2312.10127v1,"How Does It Function? Characterizing Long-term Trends in Production Serverless Workloads Artjom Joosen, Ahmed Hassan, Martin Asenov, Rajkarn Singh, Luke Darlow Jianfeng Wang Adam Barker Hangzhou Research Centre, Central Software Institute, Huawei Hangzhou City, China sirlab@huawei.com Huawei Edinburgh Research Centre and School of Computer Science, University of St Andrews United Kingdom Huawei Edinburgh Research Centre Edinburgh, United Kingdom ABSTRACT CCS CONCEPTS This paper releases and analyzes two new Huawei cloud serverless traces. The traces span a period of over 7 months with over 1.4 trillion function invocations combined. The first trace is derived from Huawei’s internal workloads and contains detailed per-second statistics for 200 functions running across multiple Huawei cloud data centers. The second trace is a representative workload from Huawei’s public FaaS platform. This trace contains per-minute arrival rates for over 5000 functions running in a single Huawei data center. We present the internals of a production FaaS platform by characterizing resource consumption, cold-start times, programming languages used, periodicity, per-second versus per-minute burstiness, correlations, and popularity. Our findings show that there is considerable diversity in how serverless functions behave: requests vary by up to 9 orders of magnitude across functions, with some functions executed over 1 billion times per day; scheduling time, execution time and cold-start distributions vary across 2 to 4 orders of magnitude and have very long tails; and function invocation counts demonstrate strong periodicity for many individual functions and on an aggregate level. Our analysis also highlights the need for further research in estimating resource reservations and time-series prediction to account for the huge diversity in how serverless functions behave. • Computing methodologies → Neural networks; • Computer systems organization → Cloud computing. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SoCC ’23, October 30–November 1, 2023, Santa Cruz, CA, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0387-4/23/11. . . $15.00 https://doi.org/10.1145/3620678.3624783 KEYWORDS cloud, serverless, datasets, neural networks, time series ACM Reference Format: Artjom Joosen, Ahmed Hassan, Martin Asenov, Rajkarn Singh, Luke Darlow, Jianfeng Wang, and Adam Barker. 2023. How Does It Function? Characterizing Long-term Trends in Production Serverless Workloads. In ACM Symposium on Cloud Computing (SoCC ’23), October 30–November 1, 2023, Santa Cruz, CA, USA. ACM, New York, NY, USA, 16 pages. https://doi.org/10.1145/3620678.3624783 1 INTRODUCTION Serverless computing and Function-as-a-Service (FaaS) provides cloud programmers with a convenient programming paradigm for event-based workloads [29]. Today, serverless computing is widely used for applications ranging from media processing [22] to processing requests from vending machines [19]. While serverless adoption has been increasing, there are few available studies into how production serverless systems actually perform, characterizing behavior of both users and systems in operation [29]. However, such an understanding is important for systems research on how to build, manage, and enhance serverless offerings in cloud data centers. In addition, having open datasets allows for new insights into these systems and how they operate. To the best of our knowledge, there is only one existing serverless dataset available for the research community spanning 14 days of Azure function invocations [26]. This dataset contains over 70 thousand functions, but provides only a limited number of features, a short duration of 14 days, and a coarse-grained log of per-minute invocations. In this paper, we analyze and open-source two traces from Huawei serverless systems 1 . The first trace is at per-second 1 Huawei traces available at https://github.com/sir-lab/data-release" 2312.10144v1,"Data-Efficient Multimodal Fusion on a Single GPU Noël Vouitsis * Jesse C. Cresswell Zhaoyan Liu * Guangwei Yu Satya Krishna Gorti * Valentin Villecroze Gabriel Loaiza-Ganem Maksims Volkovs Abstract 80 (ALIGN, 1B) The goal of multimodal alignment is to learn a single latent space that is shared between multimodal inputs. The most powerful models in this space have been trained using massive datasets of paired inputs and large-scale computational resources, making them prohibitively expensive to train in many practical scenarios. We surmise that existing unimodal encoders pre-trained on large amounts of unimodal data should provide an effective bootstrap to create multimodal models from unimodal ones at much lower costs. We therefore propose FuseMix, a multimodal augmentation scheme that operates on the latent spaces of arbitrary pre-trained unimodal encoders. Using FuseMix for multimodal alignment, we achieve competitive performance – and in certain cases outperform state-of-the art methods – in both image-text and audio-text retrieval, with orders of magnitude less compute and data: for example, we outperform CLIP on the Flickr30K text-to-image retrieval task with ∼ 600× fewer GPU days and ∼ 80× fewer image-text pairs. Additionally, we show how our method can be applied to convert pre-trained text-to-image generative models into audio-to-image ones. Code is available at: https: //github.com/layer6ai-labs/fusemix. 1. Introduction Recent advances in multimodal machine learning have unlocked unprecedented capabilities across a wide array of understanding-based [47, 48] and generation-based [22, 46, 49, 54] applications, some of which have even garnered mainstream attention [1, 72, 73, 102]. Of particular interest to us for this work is multimodal alignment [28, 30, 36], which we alternatively refer to as multimodal fusion, wherein the goal is to learn a single latent space that is shared between inputs of various modalities. Recent successes in multimodal fusion have been largely driven * Authors contributed equally to this work. (FILIP, 300M) Recall@1 Layer 6 AI {noel, zhaoyan, satya, valentin.v, jesse, guang, gabriel, maks}@layer6.ai 70 (3T, 5B) (FuseMix, 5M) (LiT, 4B) (CLIP, 400M) (FuseMix, 2.5M) 60 (FuseMix, 1.5M) (FuseMix, 500K) 50 10 6 10 7 10 8 10 9 # of training image-text pairs 10 10 Figure 1. Text-to-image retrieval performance as a function of the number of image-text pairs used during training, evaluated on the Flickr30K test set [104]. Note the x-axis is in log-scale. by large-scale training regimes requiring many GPUs, and often relying on datasets of billions of multimodal pairs [40, 70, 105]. This presents a cost that is unacceptable for many practical scenarios where access to compute is limited and where multimodal data is scarce [56, 91]. It is thus of paramount importance to design efficient frameworks that can democratize research in multimodal fusion. In this work, our key insight is that off-the-shelf unimodal encoders that have been pre-trained on large amounts of unimodal data already encode rich semantics that should provide an effective bootstrap for multimodal fusion. We introduce FuseMix, a simple and easy-to-implement data augmentation scheme for multimodal fusion inspired by mixup [109], where we share the mixing coefficient across modalities. We show that by aligning the latent spaces of existing pre-trained unimodal encoders using FuseMix, we obtain highly competitive fused multimodal models, which in certain cases even outperform state-of-the-art methods in both image-text and audio-text retrieval tasks, all while using orders of magnitude less compute and data. For example, we" 2312.10147v1,"Relations between Markovian and non-Markovian correlations in multi-time quantum processes Guilherme Zambon and Diogo O. Soares-Pinto Instituto de Fı́sica de São Carlos, Universidade de São Paulo, CP 369, 13560-970, São Carlos, SP, Brasil. In the dynamics of open quantum systems, information may propagate in time through either the system or the environment, giving rise to Markovian and non-Markovian temporal correlations, respectively. However, despite their notable coexistence in most physical situations, it is not yet clear how these two quantities may limit the existence of one another. Here, we address this issue by deriving several inequalities relating the temporal correlations of general multi-time quantum processes. The dynamics are described by process tensors and the correlations are quantified by the mutual information between subsystems of their Choi states. First, we prove a set of upper bounds to the non-Markovianity of a process given the degree of Markovianity in each of its steps. This immediately implies a nontrivial maximum value for the non-Markovianity of any process, independently of its Markovianity. Finally, we obtain how the non-Markovianity limits the amount of total temporal correlations that could be present in a given process. These results show that, although any multi-time process must pay a price in total correlations to have a given amount of non-Markovianity, this price vanishes exponentially with the number of steps of the process, while the maximum non-Markovianity grows only linearly. This implies that even a highly non-Markovian process might be arbitrarily close to having maximum total correlations if it has a sufficiently large number of steps. Figure 1: Markovian and non-Markovian correlations in a two-step quantum process. While M j quantifies how much information is transmitted through the system in the j-th step, N quantifies how much information is transmitted through the environment from the first step to the second one. In this two-step setting, we show that N ≤ 2(2 log d − M 1 ) and N ≤ 2 log d − M 2 . The generalization of this result to the n-step scenario implies that the maximum non-Markovianity of an n-step process tensor is 2(n − 1) log d, and not 2n log d as it could seem at first, and also that the total correlations I of the process are upper bounded by 2n log d − N/(2 n − 2), meaning that a process can only approach the maximum amount 2n log d of total correlations if it has low non- Markovianity or a large number of steps. system of interest inevitably interacts with an uncontrolled environment [1, 2], crucial information stored on the system may get lost along the dynamics [3, 4], which constitutes the main challenge for experimental implementation of quantum information processing protocols [5]. Sometimes, however, this information returns. Such information backflow is what characterizes non- Markovian quantum processes [6–9], whose dynamics are best described within the process tensor framework [10]. Unlike traditional approaches, that typically employ quantum channels mapping an initial state to an evolved one [1–4], process tensors are generalizations of joint probabilities to the quantum realm [11], which allows for a consistent definition of quantum Markovianity [12] and a proper treatment 1 Introduction Understanding how information flows in quantum processes is a central task for developing quantum technologies and for better comprehending fundamental aspects of quantum theory. As any quantum Guilherme Zambon: guilhermezambon@usp.br Diogo O. Soares-Pinto: dosp@ifsc.usp.br 1" 2312.10162v1,"Surface wrinkling of a film coated to a graded substrate Rui-Cheng Liu a , Yang Liu a,b,c,∗ , Alain Goriely c,∗ a Department of Mechanics, School of Mechanical Engineering, Tianjin University, Tianjin 300354, China b Tianjin Key Laboratory of Modern Engineering Mechanics, Tianjin 300354, China c Mathematical Institute, University of Oxford, Oxford, OX2 6GG, UK Abstract We study the surface wrinkling of a stiff thin elastic film bonded to a compliant graded elastic substrate subject to compressive stress generated either by compression or growth of the bilayer. Our aim is to clarify the influence of the modulus gradient on the onset and surface pattern in this bilayers. Within the framework of finite elasticity, an exact bifurcation condition is obtained using the Stroh formulation and the surface impedance matrix method. Further analytical progress is made by focusing on the case of short wavelength limit for which the Wentzel-Kramers-Brillouin method can be used to resolve the eigenvalue problem of ordinary differential equations with variable coefficients. An explicit bifurcation condition is obtained from which asymptotic the critical buckling load and the critical wavelength are derived. In particular, we consider two distinct situations depending on the ratio β of the shear modulus at the substrate surface to that at infinity. If β is of O(1) or small, the parameters related to modulus gradient all appear in the high order terms and play an insignificant role in the bifurcation. In that case, it is the modulus ratio between the film and substrate surface that governs the onset of surface wrinkling. If, however, β ≫ 1, the modulus gradient affects the critical condition through leading-order terms. Through our analysis we unravel the influence of different material and geometric parameters, including the modulus gradient, on the bifurcation threshold and the associated wavelength which can be of importance in many biological and technological settings. Keywords: Surface wrinkling, Graded materials, Film/substrate structures, Nonlinear elasticity, WKB method, Asymptotic analysis, Stroh formulation. 1. Introduction The wrinkling of thin layers on substrates is a universal morphological phenomenon of great importance in engineering materials and biological tissues [54, 35]. A typical set-up to study wrinkling is to consider a thin hard film coated to a soft substrate. If the film shrinks, grows, is prestrained, or the entire system is loaded, the film may develop wrinkles [1]. This type of wrinkling morphologies appear in biological systems and is known to establish some of their physiological functions such as folds in human brain [10, 38, 4] or in gastrointestinal tracts and airway walls [5, 30, 29]. From the viewpoint of mechanics, wrinkled or buckled shapes in skins, fruits or vegetables can be viewed as a result of a bifurcation process related to growth or aging [48, 94, 25]. In engineering, wrinkling in film/substrate bilayers can be used to design specific patterns that can be used to alter the optical property [83, 56, 52], to regulate surface adhesion or tension [19, 93, 51], ∗ Corresponding author. Email addresses: tracy_liu@tju.edu.cn (Yang Liu), goriely@maths.ox.ac.uk (Alain Goriely) Preprint submitted to Elsevier December 19, 2023" 2312.10165v1,"Test-Time Domain Adaptation by Learning Domain-Aware Batch Normalization Yanan Wu 1,2 * , Zhixiang Chi 3 * , Yang Wang 4 , Konstantinos N. Plataniotis 3 , Songhe Feng 1,2† 1 Key Laboratory of Big Data & Artificial Intelligence in Transportation, Ministry of Education, Beijing Jiaotong University, Beijing, 100044, China 2 School of Computer and Information Technology, Beijing Jiaotong University, Beijing, 100044, China 3 The Edward S Rogers Sr. ECE Department, University of Toronto, Toronto, M5S3G8, Canada 4 Department of Computer Science and Software Engineering, Concordia University, Montreal, H3G2J1, Canada {ynwu0510,shfeng}@bjtu.edu.cn , zhixiang.chi@mail.utoronto.ca yang.wang@concordia.ca , kostas@ece.utoronto.ca Abstract Test-time domain adaptation aims to adapt the model trained on source domains to unseen target domains using a few unlabeled images. Emerging research has shown that the label and domain information is separately embedded in the weight matrix and batch normalization (BN) layer. Previous works normally update the whole network naively without explicitly decoupling the knowledge between label and domain. As a result, it leads to knowledge interference and defective distribution adaptation. In this work, we propose to reduce such learning interference and elevate the domain knowledge learning by only manipulating the BN layer. However, the normalization step in BN is intrinsically unstable when the statistics are re-estimated from a few samples. We find that ambiguities can be greatly reduced when only updating the two affine parameters in BN while keeping the source domain statistics. To further enhance the domain knowledge extraction from unlabeled data, we construct an auxiliary branch with label-independent self-supervised learning (SSL) to provide supervision. Moreover, we propose a bi-level optimization based on meta-learning to enforce the alignment of two learning objectives of auxiliary and main branches. The goal is to use the auxiliary branch to adapt the domain and benefit main task for subsequent inference. Our method keeps the same computational cost at inference as the auxiliary branch can be thoroughly discarded after adaptation. Extensive experiments show that our method outperforms the prior works on five WILDS real-world domain shift datasets. Our method can also be integrated with methods with label-dependent optimization to further push the performance boundary. Our code is available at https://github.com/ynanwu/MABN. Introduction Deep models achieve astonishing performance due to the matched training and testing data distributions (Choi et al. 2018; Wu et al. 2021). However, such assumption is vulnerable in the real world as it is impossible to collect training data to cover the universal distribution. Therefore, unseen distributions at inference lead to degenerate performance stemming from distribution shift (Geirhos et al. 2018). * The authors contributed equally to this work. † Corresponding Author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. TT-DA setting for an unseen target domain ... Unlabeled image data Adaptation Weight matrix (label info.) BN (domain info.) Norm. Affine Inference SSL loss Gradient Frozen Target BN output Adaptation Tuned Figure 1: Top: Illustration of TT-DA setting. Given an unseen target domain at test-time, a few unlabeled data are used for adaptation and the adapted model is then used for inference. Bottom: To maximize the extraction of domain knowledge from unlabeled data, we only update the two affine parameters in BN using the label-independent self-supervised loss. The goal is to enforce the adapted affine parameters to correct the feature distribution towards target domain. Unsupervised domain adaptation (UDA) is a line of research to mitigate the distribution shift by incorporating mutual dependence of labeled source data and unlabeled target data (Wang and Deng 2018; Ganin et al. 2016; Shu et al. 2018; Long et al. 2018). Clearly, it is impractical to repetitively perform UDA for every unseen target domain. In contrast, domain generalization (DG) aims to overcome this limitation by aspiring to train a model on source data that can effectively generalize across unseen target domains (Muandet, Balduzzi, and Schölkopf 2013; Seo et al. 2020). Nevertheless, it is unrealistic to expect a universal model to handle all diverse unseen domains. To address such limitation, pioneer works such as ARM (Zhang et al. 2021) and Meta- DMoE (Zhong et al. 2022) propose to introduce an additional phase where the model is adapted to each target domain using a few unlabeled data prior to inference. We refer to this scenario as test-time domain adaptation (TT-DA) as shown in the top of Fig. 1. The motivation behind TT-DA is that a small number of unlabeled data in a target domain are easy to obtain (e.g., images obtained during camera calibration) and they provide a cue of the underlying distribution of the target domain (Zhang et al. 2021)." 2312.10178v1,"A solvable two-dimensional swarmalator model Kevin O’Keeffe, , ∗ Gourab Kumar Sar, 1, † Md Sayeed Anwar, 1 Joao U. F. Lizárraga, 2 Marcus A. M. de Aguiar, 2 and Dibakar Ghosh 1 1 Physics and Applied Mathematics Unit, Indian Statistical Institute, 203 B. T. Road, Kolkata 700108, India 2 Instituto de Fı́sica Gleb Wataghin, Universidade Estadual de Campinas, Unicamp 13083-970, Campinas, São Paulo, Brazil (Received XX MONTH XX; accepted XX MONTH XX; published XX MONTH XX) Swarmalators are oscillators that swarm through space as they synchronize in time. Introduced a few years ago to model many systems which mix synchrony with self-assembly, they remain poorly understood theoretically. Here we obtain the first analytic results on swarmalators moving in two-dimensional (2D) plane by enforcing periodic boundary conditions; this simpler topology allows expressions for order parameters, stabilities, and bifurcations to be derived exactly. We suggest some future directions for swarmalator research and point out some connections to the Kuramoto model and the Vicsek model from active matter; these are intended as a call-toarms for the sync community and other researchers looking for new problems and puzzles to work on. DOI: XXXXXXX I. INTRODUCTION Swarmalators are mobile oscillators whose internal phases couple to their external motions [1]. They are toy models for the many systems in which sync and swarming interact, such as biological microswimmers [2, 3], magnetic domain walls [4], migratory cells [5], forced colloids [6–9] and robotic swarms [10–14]. This paper is part of a research program [15–17] aimed to develop a theory for swarmalators. Our north star goal is to find the ‘right’ model for swarmalators – like the Kuramoto model from sync studies or the Ising model from statistical physics – which captures universal behavior but is also solvable. Our hope is the swarmalator model in [1] could fill this role, as it imitates real-world swarmalators and appears tractable. Figure 1 shows its collective states and bifurcation structure by plotting the rainbow order parameter S := max(S + , S − ) where S ± = |W ± | = |⟨e i(ϕ i ±θ i ) ⟩| and ϕ i = arctan(y i /x i ) is the spatial angle (states with S + > S − and S − < S + are equally likely; we define S as the max of these to break the degeneracy). At K = K m , S spikes up from zero as static async melts into an active phase wave where swarmalators run in a space-phase vortex. At a later K = K s , S starts to decline as the the vortex splits into a ring of mini-vortices called the splintered phase wave. Our aim is to predict the melting point K m , the splitting point K s , and ideally the stable branches of S(K). We see these as first steps towards building a theory. Take the melting point K m . How could you find it? You might think you could use linearization to find the stability spectrum of the asynchronous state ρ(x, θ) = (4π 2 ) −1 H(r −R), where H(r) is Heaviside’s function and ∗ Electronic address: Corresponding to: kevin.p.okeeffe@gmail.com † Electronic address: mr.gksar@gmail.com Figure 1: Rainbow order parameter S(K) of the 2D swarmalator model Eqs. (3), (4). Insets show the collective states of the model where swarmalators are represented as colored dots in the (x, y) plane where the color denotes the swarmalators phase. Static async: (J, K) = (0.5, −0.8), active phase wave (J, K) = (0.5, −0.4), splintered phase wave (J, K) = (0.5, −0.1), static phase wave (J, K) = (0.5, 0), static sync (J, K) = (0.5, 0.2). In the three static states, swarmalators do not move in space or phase. In the splintered phase wave, each colored chunk is a vortex: the swarmalators oscillate in both space and phase. In the active phase wave, the oscillations are excited into rotations. The swarmalators split into two groups with counter-rotate in x and θ. R is the disk’s radius. But the sharp edges of the disk come with a hard mathematical wall. They lead to nonstandard eigenvalue equations R of form λb(x) = H(r − R R) b(y)/|x − y|dy + δ(r − R) b(y)(y − R x)dy for which standard tools falter. Convolutions like b(y)/|x − y|dy are already hard to deal with. The Heaviside and delta functions out front make things even worse. Another idea might be to find K m using Kuramoto’s classic self-consistency method [18, 19]. But that path has its own blocker. The reason is technical, but the essence is that in 1D, a zero divergence condition is easy," 2312.10181v1,"C OUPLING F AIRNESS AND P RUNING IN A S INGLE R UN : A B I - LEVEL O PTIMIZATION P ERSPECTIVE A BSTRACT Deep neural networks have demonstrated remarkable performance in various tasks. With a growing need for sparse deep learning, model compression techniques, especially pruning, have gained significant attention. However, conventional pruning techniques can inadvertently exacerbate algorithmic bias, resulting in unequal predictions. To address this, we define a fair pruning task where a sparse model is derived subject to fairness requirements. In particular, we propose a framework to jointly optimize the pruning mask and weight update processes with fairness constraints. This framework is engineered to compress models that maintain performance while ensuring fairness in a single execution. To this end, we formulate the fair pruning problem as a novel constrained bi-level optimization task and derive efficient and effective solving strategies. We design experiments spanning various datasets and settings to validate our proposed method. Our empirical analysis contrasts our framework with several mainstream pruning strategies, emphasizing our method’s superiority in maintaining model fairness, performance, and efficiency. I NTRODUCTION The great success of Artificial Intelligence applications in diverse domains owes much of its achievement to the remarkable capabilities of Deep Neural Networks (DNNs) (He et al., 2016; Dong et al., 2015). To achieve stateof-the-art performance, DNNs often require an immense number of parameters to capture complex relationships within data, which is both computationally and storage intensive. In the pursuit of high performance and efficiency, various DNN model compression techniques have been developed (Han et al., 2015; He et al., 2017; Guo et al., 2016; Molchanov et al., 2016). Although these methods achieve high performance in efficient ways, researchers find that model compression techniques, like pruning, can introduce or exacerbate societal bias (Hooker et al., 2019; Liebenwein et al., 2021; Iofinova et al., 2023). It is crucial to address these concerns to ensure fairness and trust in deploying compressed models into real worlds. FPGM Lottery F&P P&F 0.15 Bias 1 0.10 0.05 1.00 0.95 Acc Yucong Dai, Gen Li, Feng Luo, Xiaolong Ma, Yongkai Wu Clemson University, Clemson, SC 29634, USA {yucongd,gen,luofeng,xiaolom,yongkaw}@clemson.edu 0.90 0.85 0.80 0.2 0.3 0.4 0.5 Sparsity 0.6 0.7 0.8 Figure 1: The accuracy and bias of different pruning methods and Prune & Fair patterns. Addressing demographic disparity challenges in machine learning has received much attention in the recent literature on deep learning (Salvador et al., 2022; Wang et al., 2023; Zhu et al., 2023). The primary strategies include fairness-constrained optimization (Zafar et al., 2017) and adversarial machine learning (Madras et al., 2018). Notably, the majority of the current methodologies predominantly target dense deep neural networks that possess a vast parameter space. With a growing need for sparse deep learning, there is an emerging need to delve into the concept of fair pruning to harmonize the triad of performance, fairness, and efficiency. However, achieving this delicate balance in pruning is far from trivial. Network pruning is designed to identify an optimal mask for weights while ensuring high performance, whereas traditional fairness methods prioritize weight adjustments to reduce bias. This dilemma introduces challenges in simultaneously achieving fair- 1" 2312.10195v1,"SoloPose: One-Shot Kinematic 3D Human Pose Estimation with Video Data Augmentation David C. Jeong, Hongji Liu, Saunder Salazar, Jessie Jiang, Christopher A. Kitts Santa Clara University dcjeong@scu.edu, hliu4@scu.edu, ssalazar@scu.edu jjiang3@scu.edu, ckitts@scu.edu Abstract While recent two-stage many-to-one deep learning models have demonstrated great success in 3D human pose estimation, such models are inefficient ways to detect 3D key points in a sequential video relative to one-shot and manyto-many models. Another key drawback of two-stage and many-to-one models is that errors in the first stage will be passed onto the second stage. In this paper, we introduce SoloPose, a novel one-shot, many-to-many spatio-temporal transformer model for kinematic 3D human pose estimation of video. SoloPose is further fortified by HeatPose, a 3D heatmap based on Gaussian Mixture Model distributions that factors target key points as well as kinematically adjacent key points. Finally, we address data diversity constraints with the 3D AugMotion Toolkit, a methodology to augment existing 3D human pose datasets, specifically by projecting four top public 3D human pose datasets (Humans3.6M, MADS, AIST Dance++, MPI INF 3DHP) into a novel dataset (Humans7.1M) with a universal coordinate system. Extensive experiments are conducted on Human3.6M as well as the augmented Humans7.1M dataset, and SoloPose demonstrates superior results relative to the state-of-the-art approaches. 1. Introduction Monocular pose estimation takes 2D images or videos as input, and generates 2D or 3D coordinates of skeletal key points. This task has a variety of applications such as action recognition, sports analysis, medical rehabilitation, and collaborative robotics [16, 17]. Models to generate 2D skeleton key points have been greatly improved in recent years [2,8,12,20,25,27], but there is still room for improvement for 3D human pose estimators due to the following. First, there is a lack of high-quality 3D datasets for pose estimation. Many pose estimation models [2, 8, 12, 20, 25, 27] are trained on Human3.6M [5], which is limited in image resolution and data diversity (e.g., limited actors, ac- tions) [3]. The disproportionate use of the Human3.6M dataset constrains the accuracy and efficiency of existing 3D human pose estimation models. The natural solution to such data diversity issues is to train on alternative datsets, such as MADS [26], AIST Dance++ [23] and MPI INF 3DHP [11]. Of course, each additional dataset requires respective training due their unique marker format, data distribution, and ground truth. Ultimately, addressing data diversity issues with alternative datasets presents added costs in training time and performance accuracy on data in-thewild, thus severely constraining downstream applications. Second, most 3D human pose estimators are two-stage models [2, 8, 12, 20, 25, 27] that are a) highly dependent on the accuracy of 2D estimators, and b) solely take 2D skeletal keypoints as input, thus omitting valuable contextual information needed for computational efficiency during 3D human pose estimation. Finally, recent pose estimators utilize transformers as the deep learning network [2, 8, 12, 20, 27]. Most video-based models process frames in a time-consuming many-to-one approach [8, 20, 27], which take multiple frames as input but select solely the middle frame to estimate coordinates, neglecting frames at the beginning and end of videos. In sum, 3D human pose estimators are constrained by limitations in 1) 3D human pose datasets, 2) two-stage models, and 3) many-to-one approaches. To address these challenges, we propose the following contributions: 1. We introduce SoloPose 1 , a cost-efficient one-shot, many-to-many spatio-temporal transformer model of 3D human pose estimation that takes frame sequences of monocular 2D video as input to directly estimate 3D key point coordinates. 2. We propose the 3D AugMotion Toolkit to augment existing datasets (e.g., Humans3.6M, MADS, AIST Dance++, MPI INF 3DHP) by increasing diversity and reducing noise, yielding an augmented dataset that we refer to as Humans7.1M. 1 All relevant code and documentation may be found on GitHub: http://tinyurl.com/3m488z83" 2312.10197v1,"Optimal Transport of Linear Systems over Equilibrium Measures Karthik Elamvazhuthi a , Matt Jacobs b a Department of Mechanical Engineering, University of California, Riverside b Department of Mathematics, University of California, Santa Barbara Abstract We consider the optimal transport problem over convex costs arising from optimal control of linear time-invariant(LTI) systems when the initial and target measures are assumed to be supported on the set of equilibrium points of the LTI system. In this case, the probability measures are singular with respect to the Lebesgue measure, thus not considered in previous results on optimal transport of linear systems. This problem is motivated by applications, such as robotics, where the initial and target configurations of robots, represented by measures, are in equilibrium or stationary. Despite the singular nature of the measures, for many cases of practical interest, we show that the Monge problem has a solution by applying classical optimal transport results. Moreover, the problem is computationally tractable even if the state space of the LTI system is moderately high in dimension, provided the equilibrium set lives in a low dimensional space. In fact, for an important subclass of linear quadratic problems, such as control of the double integrator with linear quadratic cost, the optimal transport map happens to coincide with that of the Euclidean cost. We demonstrate our results by computing the optimal transport map for the minimum energy cost for a two dimensional double integrator, despite the fact that the state space is four dimensional due to position and velocity variables. Key words: Optimal Transport; Linear Time Invariant Systems; Distribution Control. 1 Introduction The optimal transportion problem is the study of transferring resources from one configuration to another, where resources are modeled as probability distributions. Motivated initially by problems in economics, it has since been a subject of intense research in the mathematics literature [21,20] and has found applications in a wide range of areas such as computer vision [19], signal processing [15] and multi-robot control [13]. Classical formulations of optimal transport problems consider situations where the cost of the particle is defined explicitly between any two points in space. However, this excludes a large class of costs arising from control theory where the cost itself is a solution to an optimal control problem. Towards this end, there has been some recent effort on considering optimal transport problems for optimal control costs [1,18,5,6,7,8]. See also related work on control of densities of stochastic systems [14,9,17], Schrodinger bridges [11,4], covariance steering of control ⋆ This paper was not presented at any IFAC meeting. Email addresses: karthike@ucr.edu (Karthik Elamvazhuthi), majaco@ucsb.edu (Matt Jacobs). Preprint submitted to Automatica systems [16,2] and stabilization of probability measures [3]. Existing works on optimal transport of control systems have focused on the case when the source and target measures are absolutely continuous with respect to the Lebesgue measure, where it has been shown that techniques from optimal transport theory can be combined with optimal control principles to construct transport maps. However, there exists a distinctive class of problems within this domain that has garnered less attention but holds significance in various practical scenarios – those involving probability measures supported on the set of equilibrium points. This paper introduces the optimal transport problem over convex costs for linear time invariant control systems with initial and target measures assumed to be supported exclusively on equilibrium points. Unlike typical scenarios, this particular problem deals with measures that are singular with respect to the Lebesgue measure. This singular nature of the measures has, until now, been largely unexplored within the context of optimal transport for linear systems. 19 December 2023" 2312.10214v1,"1 Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach Md Al Amin, Hemanth Tummala, Seshamalini Mohan, and Indrajit Ray Computer Science Department, Colorado State University, Fort Collins, Colorado, USA E-mail: { Alamin, Hemanth.Tummala, Sesh, Indrajit.Ray } @colostate.edu Abstract—This paper addresses the critical challenge of ensuring healthcare policy compliance in the context of Electronic Health Records (EHRs). Despite stringent regulations like HIPAA, significant gaps in policy compliance often remain undetected until a data breach occurs. To bridge this gap, we propose a novel blockchain-powered, smart contract-based access control model. This model is specifically designed to enforce patient-provider agreements (PPAs) and other relevant policies, thereby ensuring both policy compliance and provenance. Our approach integrates components of informed consent into PPAs, employing blockchain smart contracts to automate and secure policy enforcement. The authorization module utilizes these contracts to make informed access decisions, recording all actions in a transparent, immutable blockchain ledger. This system not only ensures that policies are rigorously applied but also maintains a verifiable record of all actions taken, thus facilitating an easy audit and proving compliance. We implement this model in a private Ethereum blockchain setup, focusing on maintaining the integrity and lineage of policies and ensuring that audit trails are accurately and securely recorded. The Proof of Compliance (PoC) consensus mechanism enables decentralized, independent auditor nodes to verify compliance status based on the audit trails recorded. Experimental evaluation demonstrates the effectiveness of the proposed model in a simulated healthcare environment. The results show that our approach not only strengthens policy compliance and provenance but also enhances the transparency and accountability of the entire process. In summary, this paper presents a comprehensive, blockchain-based solution to a longstanding problem in healthcare data management, offering a robust framework for ensuring policy compliance and provenance through smart contracts and blockchain technology. Index Terms—Healthcare, Policy, Compliance, Noncompliance, Regulatory Agency, Informed Consent, PPA, Security Policy, Privacy Policy, Blockchain, Smart Contract, Ethereum, Solidity. I. I NTRODUCTION E LECTRONIC health records (EHRs) have emerged as a cornerstone in modernizing healthcare, offering numerous benefits that enhance efficiency and quality of care. These systems facilitate immediate and remote access to patient data, a critical feature that streamlines the medical care decisionmaking process. By transitioning from paper-based systems, EHRs significantly reduce errors commonly associated with manual record-keeping, thereby enhancing patient safety and care quality [1]–[3]. One of the key advantages of EHRs is their ability to promote interoperability across different healthcare platforms. This interconnectedness allows for the seamless sharing of patient data among various healthcare providers, leading to improved continuity of care and a more cohesive healthcare experience. Additionally, the shift to EHRs results in notable cost savings by eliminating the expenses related to paper records and optimizing resources [2]. Furthermore, EHR systems play a vital role in strengthening healthcare services. They enhance clinical cooperation and increase the accuracy of diagnostics. The constant availability of up-to-date patient medical records is crucial for maximizing treatment productivity and ensuring timely and accurate medical interventions [4]–[6]. The trend of storing patient information electronically on local databases or cloud servers underscores the healthcare industry’s commitment to making patient care more efficient and precise [7]. EHRs represent a significant leap forward in healthcare technology. They streamline administrative processes, improve care coordination, and contribute to better clinical outcomes. As healthcare organizations continue to adopt and refine EHR systems, they pave the way for a more efficient, accurate, and patientcentered approach to healthcare service delivery. The transition to EHRs has marked a significant advancement in healthcare technology, improving the efficiency and quality of patient care. However, this digital transformation also brings forth complex information security and privacy challenges, which are critical to address for maintaining patient trust and compliance with regulatory standards. Data security and privacy violations are increasingly seen across the healthcare sector. Many of these can be attributed to this industry’s widespread use of smartphones, internet-connected devices, sensors, wearable devices, mobile-based health applications, and other IT-dependent services. Cybersecurity risks, potential breaches, and the need for stringent access controls raise significant questions. Additionally, interoperability issues, human factors such as user authentication, and the imperative of legal compliance further compound the challenges associated with implementing and maintaining EHR systems [8], [9]. Laws, policies, and regulations are pivotal in addressing EHR challenges and safeguarding healthcare data security and patient privacy. In various global regions, diverse privacy standards, including the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States (US), and My Health Record (MHR) in Australia, have been established to protect patient privacy and personal data [10]. The HIPAA policy standards and guidelines help mitigate the risks associated with EHR and promote trust between patients and healthcare providers.HIPAA requires healthcare organizations to implement technical, administrative, and physical safeguards" 2312.10215v1,"Gated InAs quantum dots embedded in surface acoustic wave cavities for low-noise optomechanics Z IXUAN W ANG , 1,2,† R YAN A. D E C RESCENT , 1 P OOLAD I MANY , 1,2,3 J OSEPH T. B USH , 1,2 D ILEEP V. R EDDY , 1,2 S AE W OO N AM , 1 R ICHARD P. M IRIN , 1 AND K EVIN L. S ILVERMAN 1,* 1 National Institute of Standards and Technology, Boulder, Colorado 80305, USA 2 Department of Physics, University of Colorado, Boulder, Colorado 80309, USA 3 Icarus Quantum Inc., Boulder, Colorado 80302, USA † zixuan.wang@colorado.edu * kevin.silverman@nist.gov Abstract: Self-assembled InAs quantum dots (QDs) are promising optomechanical elements due to their excellent photonic properties and sensitivity to local strain fields. Microwavefrequency modulation of photons scattered from these efficient quantum emitters has been recently demonstrated using surface acoustic wave (SAW) cavities. However, for optimal performance, a gate structure is required to deterministically control the charge state and reduce charge noise of the QDs. Here, we integrate gated QDs and SAW cavities using molecular beam epitaxy and nanofabrication. We demonstrate that with careful design of the substrate layer structure, integration of the two systems can be accomplished while retaining the optimal performance of each subsystem. These results mark a critical step toward efficient and low-noise optomechanical systems for microwave-to-optical quantum transduction. Microwave-to-optical quantum transducers are crucial to unlock the potential of future quantum networks, leveraging the unique strengths of diverse quantum systems [1, 2]. They bridge the gap between microwave frequencies that are characteristic of superconducting [3, 4] or spinbased [5, 6] quantum processors and optical frequencies that are ideal for transmitting quantum information over long distances [7, 8]. These devices would thus allow the exchange of quantum information between quantum nodes over distances that would otherwise be infeasible. An ideal transducer would convert microwave signals to optical frequencies with 100% efficiency and no added noise. However, a five-orders-of-magnitude energy gap between microwave and optical domains makes it challenging to build such transducers with high efficiency. Heralding protocols can largely bypass this obstacle, improving fidelity at the expense of communication rate. Therefore, minimizing added noise is perhaps a more important immediate consideration for such transducers [9]. Among various approaches for quantum transduction, hybrid systems involving mechanical resonators (confined phonons) are promising [10]. These electro-optomechanical systems take advantage of the slower speed of phonons compared to photons, resulting in phonons at gigahertz (GHz) frequencies with wavelengths comparable to optical photons. This is key for mediating interactions across the energy gap. It has been shown that phonons interact well with various types of quantum systems. For example, they piezoelectrically interact with superconducting qubits [11] and parametrically modulate various optical systems such as optical cavities [12] and single photon emitters (SPEs) in 2D materials [13–15], defect centers [16–18], and semiconductor quantum dots (QDs) [19–23]. However, integrating two standalone electromechanical and optomechanical systems is challenging due to the added system complexity and possible incompatibility [24]. In this paper, we address this integration challenge in an electro-optomechanical system involving gated InAs QDs and surface acoustic wave (SAW) resonator phonons. Our system combines peak optical performance in gated InAs QDs with state-of-the-art surface acoustic" 2312.10226v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Sedimentation dynamics of passive particles in dilute bacterial suspensions: emergence of bioconvection Bryan O. Torres Maldonado 1 , Shravan Pradeep 2 , Ranjiangshang Ran 1 , Douglas Jerolmack 1,2 and Paulo E. Arratia 1 † 1 Department of Mechanical Engineering & Applied Mechanics, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA 2 Department of Earth and Environmental Science, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA (Received xx; revised xx; accepted xx) Microorganisms are ubiquitous in nature and technology. They inhabit diverse environments ranging from small river tributaries and lakes to oceans, as well as wastewater treatment plants and food manufacturing. In many of these environments, microorganisms coexist with settling particles. Here, we investigate the effects of microbial activity (swimming E. coli ) on the settling dynamics of passive colloidal particles using particle tracking methods. Our results reveal the existence of two distinct regimes in the correlation length scale (L u ) and the effective diffusivity of the colloidal particles (D eff ), with increasing bacterial concentration (ϕ b ). At low ϕ b , the parameters L u and D eff monotonically increases with increasing ϕ b . Beyond a critical ϕ b , second regime is found in which both D eff and L u are independent of ϕ b . We demonstrate that the transition between these regimes is characterized by the emergence of bioconvection. We use experimentally-measured particle-scale quantities (L u , D eff ) to predict the critical bacterial concentration for the diffusion-bioconvection transition. Key words: active fluids, sedimentation dynamics, bacteria, bioconvection 1. Introduction Microorganisms are ubiquitous in both natural environments and technological applications. They are highly adaptable and inhabit diverse ecosystems such as swamps, oceans, and rivers [Schallenberg & Kalff (1993); Zhang et al. (2020); Roberto et al. (2018); Nealson (1997); Herndl & Reinthaler (2013)]. They also play a significant role in numerous technological applications [Falkowski (2012); Savage (2011); Falkowski et al. (1998)] including fermentation processes for vaccine and food production and wastewater treatment processes [Lorenzo et al. (2018); Swartz (2001); van Loosdrecht & Brdjanovic (2014); Honda et al. (2023)]. Controlling the sedimentation process in biofuel production, for instance, can lead to improvements in algae separation from the fluid medium and an accumulation of algal biomass at the bottom of the production pond [Savage (2011)]. Suspensions of swimming microorganisms (e.g., E. coli ) or active particles (e.g., phoretic colloids) are typical examples of so-called active fluids [Ramaswamy (2010); † Email address for correspondence: parratia@seas.upenn.edu" 2312.10233v1,"B AYESIAN C HARACTERIZATION AND I DENTIFIABILITY OF M ULTILEVEL Q UANTUM S YSTEMS A P REPRINT Sohail Reddy ˚ Center for Applied Scientific Computing Lawrence Livermore National Laboratory Liveremore, CA 94550 reddy6@llnl.gov December 19, 2023 A BSTRACT Robust control of a quantum system is essential to utilize the current noisy quantum hardware to their full potential, such as quantum algorithms. To achieve such a goal, systematic search for an optimal control for any given experiment is essential. Design of optimal control pulses require accurate numerical models, and therefore, accurate characterization of the system parameters. We present an online, Bayesian approach for quantum characterization of qutrit systems which automatically and systematically identifies the optimal experiments that provide maximum information on the system parameters, thereby greatly reducing the number of experiments that need to be performed on the quantum testbed. Unlike most characterization protocols that provide point-estimates of the parameters, the proposed approach is able to estimate their probability distribution. The applicability of the Bayesian experimental design technique was demonstrated on test problems where each experiment was defined by a parameterized control pulse. In addition to this, we also presented an approach for adaptive pulse parameterization which is robust under uncertainties in transition frequencies and coherence times, and shot noise, despite being initialized with wide uninformative priors. Furthermore, we provide a mathematical proof of the theoretical identifiability of the model parameters and present conditions on the quantum state under which the parameters are identifiable. The proof and conditions for identifiability are presented for both closed and open quantum systems using the Schroedinger equation and the Lindblad master equation respectively. Keywords Quantum characterization ¨ Bayesian experimental design ¨ Identifiability 1 Introduction The Noisy Intermediate Scale Quantum (NISQ) devices are poised to demonstrate quantum advantage [1]. They are, however, very sensitive to a myriad of noise sources such as from interaction with the environment, characterized by coherence times [2, 3], and fluctuating quantum systems and interaction with defects [4, 5], causing uncertainties in qubit transition frequencies. This instability requires quantum error correction and dynamical decoupling techniques which rely on a larger number of qubits and lengthy circuit depth to encode quantum information and cancel out the noises [6], thereby limiting the quantum algorithms that can be implemented within the device’s coherence times. Hence, variational quantum algorithms (VQA) [7, 8], which couple computations on the stable classical hardware with the noisy quantum processing units (QPUs), have emerged as a promising strategy to address these drawbacks. Such classical-quantum algorithms typically require accurate modeling of the quantum systems. These numerical models can be parameterized by a few quantities of the QPUs, thus, accurate determination of these parameters is paramount for high-fidelity simulation of the QPU. However, the noisy behavior of current devices poses a great challenge to identifying the testbed characteristics, particularly, providing point-estimates of these parameters. Under such circumstance, posing the characterization problem within a probabilistic Bayesian framework is ideal. Regardless ˚ Corresponding author." 2312.10236v1,"Quantum to classical parton evolution in the QGP João Barata 1,∗ , Jean-Paul Blaizot 2, , and Yacine Mehtar-Tani 1, 1 Physics Department, Brookhaven National Laboratory, Upton, NY 11973, USA 2 Institut de Physique Théorique, Université Paris Saclay, CEA, CNRS, F-91191 Gif-sur-Yvette, France Abstract. We study the time evolution of the density matrix of a high energy quark in the presence of a dense QCD background that is modeled as a stochastic Gaussian color field. At late times, we find that only the color singlet component of the quark’s reduced density matrix survives the in-medium evolution and that the density matrix becomes asymptotically diagonal in both transverse position and momentum spaces. In addition, we observe that the quantum and classical quark entropies converge at late times. We further observe that the quark state loses all memory of the initial condition. Combined with the fact that the reduced density matrix satisfies Boltzmann-diffusion transport, we conclude that the quark reduced density matrix can be interpreted as a classical phase space distribution. 1 Introduction Jets offer an optimal tool to explore the multiple stages involved in the time evolution of hot QCD matter created in heavy ion collisions. To that end, several jet observables have been studied over recent years, capturing both global and local properties of the fragmentation cascade in the medium. In parallel, a lot of progress has been achieved in the description of medium induced modifications to the jet structure due to the interactions with the matter. One important question, which we follow to address at the level of single parton evolution, is the extent to which the medium effects are truly quantum, and can not be consistently captured in a classical description. These aspects can, in general, be addressed by analyzing the jet density matrix. Moreover, this description allows to directly compute interesting observables such as the jet entropy. Below, we show an exploratory calculation of this quantity in the of heavy ion collisions and argue that it can be highly sensitive to the medium scales. 2 Single parton density matrix evolution in a QGP We consider first the single parton case, where the jet evolution is dominated by the dynamics of the leading parton. We consider that this particle evolves in the presence of a dense quark ∗ email: jlourenco@bnl.gov" 2312.10244v1,"Muchisim: A Simulation Framework for Design Exploration of Multi-Chip Manycore Systems Marcelo Orenes-Vera, Esin Tureci, Margaret Martonosi, David Wentzlaff Princeton University, Princeton, New Jersey, USA { movera, esin.tureci, mrm, wentzlaf } @princeton.edu become the limiting factor for performance. This is especially true for DCI applications but also other application domains such as spectral methods [65], which necessitate a careful balance between computational, memory and network resources. Thus, in manycore systems with thousands to millions of cores, factors such as the number of cores per silicon die, the number of chiplet dies per package, memory hierarchy (integration and coherence), network-on-chip (NoC) and interchip interconnect, become critical design considerations. Lack of ability to consider these at large scale can create significant gaps between designed systems and their actual realizations. To address these issues, we introduce Muchisim, 1 a parallel simulator that allows exploration of the manycore architecture design space, with a special focus on communication-intensive applications. 2 Muchisim scales up to millions of interconnected PEs by relying on user instrumentation for code runtime on the compute units while simulating data movement and communication in a cycle-accurate manner. It also includes energy, area and cost models for multi-chip distributed systems, which are critical to reason about design tradeoffs. In addition, Muchisim includes an application benchmark suite and data I. I NTRODUCTION visualization tools to facilitate the analysis of its outputs. The end of Moore’s law and the increase in dataset sizes As the industry leans towards explicit data movement for to be processed have driven the recent surge in develop- large manycores due to the prohibitive cost of hardware-based ment of scale-out manycore systems [15], [17], [29], [38], coherence, Muchisim becomes particularly relevant. Muchisim [43], [91], [94], [101]. Design-space exploration for these is applicable for architectures with software-managed coherence architectures at large scales employs roofline and analytical and distributed-memory, providing an accurate representation models to estimate performance, by relying on the deterministic of modern scale-out systems. Muchisim facilitates exploring nature of communications as well as computations for many the integration granularity and balance between memory and machine learning and dense applications. Alternatively, for computation units, as well as constraints related to chiplet data-dependent communication-intensive (DCI) applications, integration and inter-chip communication. With a multifaceted such as graph analytics, sparse linear algebra, and database analysis aimed at expanding current understanding of manyoperations, the communication is not deterministic, requiring core architectures for communication-intensive applications, simulation tools to accurately estimate performance. However, Muchisim offers a flexible yet powerful framework for explorcurrent simulators cannot evaluate DCI applications at scale ing many design configurations, thereby contributing to the due to the limited scalability of model processing units in design and optimization of future large-scale systems. detail. Because of that, recent work on architecture designs for Our main technical contributions are: DCI applications are evaluated on relatively small scales, and • A novel performance modeling approach for distributed thus, their network design—whose performance impact would manycore architectures that allows for scalable simulations be exacerbated at larger scales—is not well explored [18], [19], of DCI applications across millions of PEs. [30], [52], [56], [60], [61], [64]. 1 Muchisim is derived from the Spanish word muchisimo (very much), Current manycore architectures typically emphasize speeding up computation, dedicating significant chip area to it at the alluding to its ability to simulate a large number of PEs in a multi-chip setting. Muchisim is pronounced as ”moo-chee-sim”. expense of memory and network resources. However, when 2 At large scale, memory-intensive applications lead to a communication the workload is highly parallelized, data movement starts to bottleneck, so we englobe them in the communication-intensive category. Abstract—Current design-space exploration tools cannot accurately evaluate communication-intensive applications whose execution is data-dependent (e.g., graph analytics and sparse linear algebra) on scale-out manycore systems, due to either lack of scalability or lack of detail in modeling the network. This paper presents Muchisim, a novel parallel simulator designed to address the challenges in exploring the design space of distributed multi-chiplet manycore architectures for communication-intensive applications. We evaluate Muchisim at simulating systems with up to a million interconnected processing elements (PEs) while modeling data movement and communication in a cycle-accurate manner. In addition to performance, Muchisim reports the energy, area, and cost of the simulated system, and it comes with a benchmark application suite and two data visualization tools. Muchisim supports various parallelization strategies and communication primitives such as task-based parallelization and message passing, making it highly relevant for architectures with software-managed coherence and distributed memory. Via a case study, we show that Muchisim helps users explore the balance between memory and computation units and the constraints related to chiplet integration and inter-chip communication. Muchisim enables scaling up the systems in which new techniques or design parameters are evaluated, opening the gate for further research in this area." 2312.10251v1,"Advancing Surgical VQA with Scene Graph Knowledge Kun Yuan a,c , Manasi Kattel a,b , Joël L. Lavanchy b , Nassir Navab c , Vinkle Srivastav a,b , Nicolas Padoy a,b a ICube, University of Strasbourg, CNRS, Strasbourg, France b IHU Strasbourg, Strasbourg, France c CAMP, Technische Universität München, Munich, Germany Purpose: The modern operating room is becoming increasingly complex, requiring innovative intra-operative support systems. While the focus of surgical data science has largely been on video analysis, integrating surgical computer vision with natural language capabilities is emerging as a necessity. Our work aims to advance Visual Question Answering (VQA) in the surgical context with scene graph knowledge, addressing two main challenges in the current surgical VQA systems: removing questioncondition bias in the surgical VQA dataset and incorporating scene-aware reasoning in the surgical VQA model design. Methods: First, we propose a Surgical Scene Graph-based dataset, SSG-QA, generated by employing segmentation and detection models on publicly available datasets. We build surgical scene graphs using spatial and action information of instruments and anatomies. These graphs are fed into a question engine, generating diverse QA pairs. Our SSG-QA dataset provides a more complex, diverse, geometrically grounded, unbiased, and surgical action-oriented dataset compared to existing surgical VQA datasets. We then propose SSG-QA-Net, a novel surgical VQA model incorporating a lightweight Scene-embedded Interaction Module (SIM), which integrates geometric scene knowledge in the VQA model design by employing cross-attention between the textual and the scene features. Results: Our comprehensive analysis of the SSG-QA dataset shows that SSG-QA-Net outperforms existing methods across different question types and complexities. We highlight that the primary limitation in the current surgical VQA systems is the lack of scene knowledge to answer complex queries. Conclusion: We present a novel surgical VQA dataset and model and show that results can be significantly improved by incorporating geometric scene features in the VQA model design. The source code and the dataset will be made publicly available at: https://github.com/CAMMA-public/SSG-QA Keywords: Visual question answering, Multi-modality learning, Surgical Data Science. 1. Introduction Surgical data science is a rapidly growing field that aims to streamline clinical workflows and enable the development of real-time intra-operative decision-support systems [16, 18]. Recent advancements in surgical video analysis, such as surgical workflow phase recognition, fine-grained surgical action detection, and surgical semantic scene segmentation, show evidence of the progress [17, 3, 21]. However, the scope of these methods is confined as it mainly focus on visual-only data to perform classification or recognition tasks, thereby offering limited user interaction. The next generation of surgical data science applications also demands approaches operating at the crucial intersection of vision and language to offer intuitive user interaction during intra-operative surgical procedures. Surgical Visual Question Answering (VQA) is emerging as a notable solution in that direction, which aims to provide precise answers to user queries in a natural language by analyzing a given surgical image [1, 10, 20, 19]. Developing an effective surgical VQA system is inherently challenging for a typical surgical scene, which contains mul- ∗ Corresponding author: Tel.: +33-390413530 e-mail: npadoy@unistra.fr (Nicolas Padoy) tiple anatomical structures and instruments connected through diverse spatial and action relationships. While a few works have explored VQA tasks in the surgical context [20, 19], they are typically limited to datasets and models that ignore detailed scene knowledge. From the dataset perspective, one key challenge is the lack of a dataset with potentially a vast set of question-answer pairs covering various aspects of the surgical scene. The current surgical VQA datasets are small and only consider simple scene information, e.g., object/action occurrence, as shown in Fig. 1. Moreover, these datasets contain question-answer pairs with significant question-condition bias, where answers can be derived from just the questions without performing any visual processing. This hinders the utility of these datasets to serve as appropriate surgical VQA benchmarks. From the model perspective, the current surgical VQA architectures operate on the global visual representation of the surgical image, ignoring the detailed understanding of surgical scene knowledge. This can be detrimental, especially when object-level visual reasoning is essential to answer fine-grained questions. Our key contributions are therefore twofold: the introduction of a new surgical scene-aware VQA dataset called SSG-QA and a novel surgical VQA model called SSG-QA-Net." 2312.10253v1,"Catwalk: A Unified Language Model Evaluation Framework for Many Datasets Dirk Groeneveld ♠ Anas Awadalla ♢ Iz Beltagy ♠ Akshita Bhagia ♠ Ian Magnusson ♠ Hao Peng ♠ Oyvind Tafjord ♠ Pete Walsh ♠ Kyle Richardson ♠ Jesse Dodge ♠ ♠ Allen Institute for Artificial Intelligence ♢ Paul G. Allen School of Computer Science & Engineering, University of Washington anasa2@cs.washington.edu {dirkg,beltagy,akshitab,ianm,haop,oyvindt,petew,kyler,jessed}@allenai.org Abstract The success of large language models has shifted the evaluation paradigms in natural language processing (NLP). The community’s interest has drifted towards comparing NLP models across many tasks, domains, and datasets, often at an extreme scale. This imposes new engineering challenges: efforts in constructing datasets and models have been fragmented, and their formats and interfaces are incompatible. As a result, it often takes extensive (re)implementation efforts to make fair and controlled comparisons at scale. Catwalk aims to address these issues. Catwalk provides a unified interface to a broad range of existing NLP datasets and models, ranging from both canonical supervised training and fine-tuning, to more modern paradigms like in-context learning. Its carefully-designed abstractions allow for easy extensions to many others. Catwalk substantially lowers the barriers to conducting controlled experiments at scale. For example, we finetuned and evaluated over 64 models on over 86 datasets with a single command, without writing any code. Maintained by the AllenNLP team at the Allen Institute for Artificial Intelligence (AI2), Catwalk is an ongoing open-source effort: https: //github.com/allenai/catwalk. 1 Introduction Large language models (LLMs) have led to a paradigm shift in NLP. Before, a system would be built to tackle a specific task and trained and evaluated on a dedicated dataset. Now, generalpurpose pretrained language models are adapted to a broad range of tasks through techniques like finetuning and in-context learning. The new paradigm opens research opportunities to investigate models’ generalization and robustness across many tasks and domains. This imposes new engineering challenges. The fragmented efforts in producing models and datasets have led to countless codebases GPT2 DeBERTa MRQA BERT ··· T5 T0 BLOOM Wikitext SQuAD RoBERTa OPT MRPC Catwalk COPA RTE ··· MNLI LAMBADA Models Tasks (a) Catwalk provides a unified interfaces to connect models and datasets. This compares n models on m tasks with only n + m custom implementations, substantially reducing the implementation workload compared to current practice where nm implementations are needed. GPT-2 Medium Ranked Class. RTE Finetune GPT-2 Large Prompt Source Wino Grande 0-shot GPT-2 XL MetaICL LogiQA 1-shot T5 Base Eleutherstyle MNLI 2-shot Accuracy 0.653 Accuracy 0.553 (b) Illustration of some decisions a user of Catwalk makes to get a result. For example, choosing GPT-2 Large, with Ranked Classification, on WinoGrande gives an accuracy of 0.553, while choosing T5-Base on RTE gives an accuracy of 0.653. Figure 1: Catwalk and its workflow. and data formats that are hardly compatible. Fairly comparing n models on m datasets often require nm custom implementations, substantially raising the barriers to conducting controlled experiments at scale. Catwalk aims to reduce practitioners’ workload in projects involving making fair comparisons among many models and datasets. At a high level, Catwalk can be thought of as a nexus connecting n models and m datasets. Through Catwalk’s unified interfaces, training and evaluating all models on all datasets requires n + m customizations instead of mn, many of which have already been implemented. To include a new model or dataset" 2312.10256v1,"Multi-agent Reinforcement Learning: A Comprehensive Survey Dom Huh 1 and Prasant Mohapatra 1,3 1 University of California, Davis {dhuh, pmohapatra}@ucdavis.edu 3 University of South Florida Abstract The prevalence of multi-agent applications pervades various interconnected systems in our everyday lives. Despite their ubiquity, the integration and development of intelligent decision-making agents in a shared environment pose challenges to their effective implementation. This survey delves into the domain of multiagent systems (MAS), placing a specific emphasis on unraveling the intricacies of learning optimal control within the MAS framework, commonly known as multiagent reinforcement learning (MARL). The objective of this survey is to provide comprehensive insights into various dimensions of MAS, shedding light on myriad opportunities while highlighting the inherent challenges that accompany multiagent applications. We hope not only to contribute to a deeper understanding of the MAS landscape but also to provide valuable perspectives for both researchers and practitioners. By doing so, we aim to facilitate informed exploration and foster development within the dynamic realm of MAS, recognizing the need for adaptive strategies and continuous evolution in addressing emerging complexities in MARL. 1 Introduction Multi-agent reinforcement learning (MARL) have long been a pivotal domain in artificial intelligence, offering solutions to complex tasks involving multiple interacting entities. The significance of modeling multiple agents that adapt and learn in coordination with one another is evident, as it enables the realization of novel applications across diverse fields, where collective decision-making among agents is paramount. The process of developing decision-making and goal-oriented agents within MAS is centered around facilitating the emergence of complex control and social behaviors. Through proper modeling and learning, these agents will not only be capable of understanding intricate social dynamics but also skilled at leveraging the collective nature of their environment to achieve their individual goals. By focusing on these behaviors and their underlying mechanisms, the goal of MARL is to provide agents with the ability to navigate and excel in complex social landscapes, ultimately leading to more effective and strategic decision-making. This effort entails the integration of ideas from domains like game theory and machine learning, all the while concurrently addressing the distinctive challenges posed by a MAS [Stone and Veloso, 2000, Bowling, 2004, Shoham et al., 2007, Bernstein et al., 2013]. Moreover, future efforts in this domain are poised to endow the desirable behavioral qualities that characterize intelligent social agents through data-driven learning processes. These learning processes embody models of bounded rationality [Shoham et al., 2007], wherein agents progressively refine their behaviors in a myopic and iterative manner over time and experience. Despite the many successes in this domain, challenges persist, paving the way for ongoing research endeavors. The" 2312.10257v1,"Springer Nature 2021 L A TEX template The Physics-Informed Neural Network Gravity Model Generation III John Martin 1* and Hanspeter Schaub 2 1* Department of Aerospace Engineering, University of Maryland, 4298 Campus Dr, College Park, 20742, MD, USA. 2 Ann and H. J. Smead Department of Aerospace Engineering Sciences, University of Colorado Boulder, 431 UCB, Boulder, 80309, CO, USA. *Corresponding author(s). E-mail(s): jrmartin@umd.edu; Contributing authors: hanspeter.schaub@colorado.edu; Abstract Scientific machine learning and the advent of the Physics-Informed Neural Network (PINN) show considerable potential in their capacity to identify solutions to complex differential equations. Over the past two years, much work has gone into the development of PINNs capable of solving the gravity field modeling problem — i.e. learning a differentiable form of the gravitational potential from position and acceleration estimates. While the past PINN gravity models (PINN- GMs) have demonstrated advantages in model compactness, robustness to noise, and sample efficiency; there remain key modeling challenges which this paper aims to address. Specifically, this paper introduces the third generation of the Physics-Informed Neural Network Gravity Model (PINN-GM-III) which solves the problems of extrapolation error, bias towards low-altitude samples, numerical instability at high-altitudes, and compliant boundary conditions through numerous modifications to the model’s design. The PINN-GM-III is tested by modeling a known heterogeneous density asteroid, and its performance is evaluated using seven core metrics which showcases its strengths against its predecessors and other analytic and numerical gravity models. Keywords: Scientific Machine Learning, Physics Informed Neural Networks, Astrodynamics, Gravity Modeling 1" 2312.10273v1,"User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity Measurement Rui Jin Pengyuan Zhou Yong Liao jinrui1@mail.ustc.edu.cn University of Science and Technology of China Hefei, Anhui, China pyzhou@ustc.edu.cn University of Science and Technology of China Hefei, Anhui, China yliao@ustc.edu.cn University of Science and Technology of China Hefei, Anhui, China CCS CONCEPTS • Security and privacy → Biometrics. pu KEYWORDS Mouse, Biometrics, Authentication ACM Reference Format: Rui Jin, Pengyuan Zhou, and Yong Liao. 2023. User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity Measurement. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Handwriting analysis can be used as evidence in court. Signatures can be verified based on the kinematic theory of rapid human movements [12]. Traditional biometrics such as fingerprint, iris, Permission to make digital or hard copies of all or part of this work for personal or Unpublished working for distribution. classroom use is granted without fee draft. provided Not that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn 2023-12-19 02:55. Page 1 of 1–11. and face are only collected when they are needed for authentication or identification. Mouse movements, on the other hand, are captured whenever the user performs operations that require the participant of the cursor, thus making it possible to verify the user’s identity throughout the session. Besides, since recording mouse behaviors does not require additional devices, the cost of deployment is relatively low. In 2003, Everitt and McOwan first attempted to use the users’ signatures drawn using a mouse to develop an authentication system [11]. Since then, researchers have attempted to realize mouse-based authentication using statistical methods, machine learning, and deep learning [2, 3, 6, 13, 20, 21, 26]. Surprisingly, studies that applied statistical analysis or manual feature engineering usually yield better results. It could be that such methods can extract information from typically 10 minutes to half an hour which is too long for deep learning approaches. However, such a long authentication time also leaves security risks as the attacker can accomplish its task before being detected. Another issue is the cost of training authentication classifiers because most existing studies trained an individual classifier for each registered user. This causes a rapid increase in processing power demands and an unbalanced dataset when scaling up. One-class SVM and multi-output deep learning have been introduced to solve this problem, but the results have not been encouraging. The usage of biometrics is not limited to authentication and identification. For example, mouse dynamics, keystroke behavior, and images of hands are used to detect automated bots [5, 7]. Such tests, also known as Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHA) [24], aim to recognize and block automated programs. CAPTCHAs are widely used in registration to avoid fake accounts in authentication systems. However, CAPTCHAs have made solving CAPTCHAs a profitable business [18]. The cost of such attacks can be as low as 3$ per 1,000 CAPTCHAs 1 . More importantly, existing CAPTCHA can not defend farming since CAPTCHAs are designed to be easy for humans. This issue has been largely overlooked so far. We notice that CAPTCHA farm detection and mouse-based authentication can share the same solution: measuring the similarity between two mouse trajectories. If the given mouse trajectories are matched by those recorded by the user it claims to be, it passes the authentication, and vice versa. Similarly, if the mouse trajectories recorded when solving the CAPTCHA have significant differences from those recorded later, we can predict that the CAPTCHA is solved by someone else. To build a model capable of calculating the similarity between two given mouse trajectories, we apply an No blis t f he or d w di o str rk ib ing ut d io ra n. ft . Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHA) is a type of challenge–response test widely used in authentication systems. A well-known challenge it faces is the CAPTCHA farm, where workers are hired to solve CAPTCHAs manually. In this work, we propose to tackle this challenge from a novel perspective, converting CAPTCHA farm detection to identity inconsistency detection, which essentially becomes an authentication process. Specifically, we develop a novel embedding model, which measures the similarity between mouse trajectories collected during the session and when registering/solving CAPTCHA, to authenticate and detect identity inconsistency. Moreover, unlike most existing works that employ a separate mouse movement classifier for each individual user, which brings in considerable costs when serving a large number of users, our model performs detection tasks using only one classifier for all users, significantly reducing the cost. Experiment results validate the superiority of our method over the state-of-the-art time series classification methods, achieving 94.3% and 97.7% of AUC in identity and authentication inconsistency detection, respectively. Un ABSTRACT 1 https://2captcha.com/" 2312.10289v1,"Active Reinforcement Learning for Robust Building Control Doseok Jang, Larry Yan, Lucas Spangher, Costas Spanos UC Berkeley djang@berkeley.edu, yanlarry@berkeley.edu, lucas spangher@berkeley.edu, spanos@berkeley.edu Abstract Reinforcement learning (RL) is a powerful tool for optimal control that has found great success in Atari games, the game of Go, robotic control, and building optimization. RL is also very brittle; agents often overfit to their training environment and fail to generalize to new settings. Unsupervised environment design (UED) has been proposed as a solution to this problem, in which the agent trains in environments that have been specially selected to help it learn. Previous UED algorithms focus on trying to train an RL agent that generalizes across a large distribution of environments. This is not necessarily desirable when we wish to prioritize performance in one environment over others. In this work, we will be examining the setting of robust RL building control, where we wish to train an RL agent that prioritizes performing well in normal weather while still being robust to extreme weather conditions. We demonstrate a novel UED algorithm, ActivePLR, that uses uncertainty-aware neural network architectures to generate new training environments at the limit of the RL agent’s ability while being able to prioritize performance in a desired base environment. We show that ActivePLR is able to outperform state-of-the-art UED algorithms in minimizing energy usage while maximizing occupant comfort in the setting of building control. 1 Introduction Reinforcement learning has demonstrated remarkable success in solving sequential decision-making tasks such as the game of Go (Silver et al. 2017), Atari games (Mnih et al. 2013), energy pricing (Jang et al. 2021; Gunn et al. 2022), and many others. However, RL agents often overfit to their training environment and fail to generalize to new environments(Zhang et al. 2018). This is a serious issue in tasks where we expect underlying dynamics in the environment not to stay static, e.g. when there is distribution shift between the training environment and the test environment. Here, we explore the use of RL in residential and commercial building control, where most often an agent is trained to optimize performance in normal weather conditions. When underlying weather conditions exhibit extremes or drift due to long term effects such as climate change, control often fails. We endeavor to address distribution shift by using uncertainty to Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. select training environments such that the resulting RL agent performs well in average conditions and is also robust to uncommon but dangerous scenarios in the test environment. Overview of HVAC Setpoint Control Our focus is on robust RL for building energy consumption, which represent 73% of electricity usage and 40% of greenhouse gases in the US (U.S. Department of Energy—EIA 2020). Buildings are generating increasingly large amounts of sensory information that can be used to increase energy efficiency, such as temperature, airflow, humidity, occupancy, light, and energy usage (Hayat et al. 2019). There are several ways buildings can be automatically controlled: heating, ventilation, and air conditioning (HVAC) units, energy storage systems, plug-in electric vehicles, photovoltaic power sources, and lights (Gong et al. 2022). We will focus on HVAC as it represents roughly a third of total building energy consumption (Wemhoff and Frank 2010). Traditionally, HVAC setpoint control has been approached through model-predictive control (MPC, Kou et al. 2021) or a heuristic rule-based-controller (RBC, Mathews et al. 2001). 1 MPC is generally not scalable to high dimensional input or output spaces compared to RL, and heuristics are inflexible. Recently, RL-based HVAC setpoint control has grown in popularity(Das et al. 2022). Rizvi and Pertzborn (2022) used Q-learning to control HVAC setpoints in the presence of unseen disturbances. Kurte et al. (2020) demonstrated how RL and meta-RL could train an RL HVAC agent that quickly adapts to different buildings. Xu et al. (2020) explored how to use transfer learning to train an RL HVAC controller that outperforms a RBC baseline across a variety of simulated buildings and climates. Figure 1 illustrates the flow of information in our RL HVAC control setup. As climate change continues, we will experience more droughts, heat waves, rising temperatures, and cold snaps (Masson-Delmotte et al. 2021). These extreme weather events are likely underrepresented in the training data, but are essential to account for in reliable and safe building control. For example, consider an RL controller trained on the 1 ”setpoints” are the numbers a human might input into their thermostat to tell the HVAC systems their desired temperature. ”Setpoint control” is the problem of automatically determining these setpoints to optimize some objective." 2312.10291v1,"MNRAS 000, 1–11 (2023) Preprint 19 December 2023 Compiled using MNRAS L A TEX style file v3.0 Soft X-ray and FUV observations of Nova Her 2021 (V1674 Her) with AstroSat Yash Bhargava, 1,2★ Gulab Chand Dewangan, 1 G. C. Anupama, 3 U. S. Kamath, 3 L. S. Sonith, 3 Kulinder Pal Singh, 4 J. J. Drake, 5,6 A. Beardmore, 7 G. J. M. Luna, 8 M. Orio, 9,10 K. L. Page 7 1 Inter-University Centre for Astronomy and Astrophysics, Ganeshkhind, Pune 411007, India 2 Department of Astronomy and Astrophysics, Tata Institute of Fundamental Research, 1 Homi Bhabha Road, Colaba, Mumbai 400005, India 3 Indian Institute of Astrophysics, II Block Koramangala, Bengaluru 560034, India 4 Department of Physical Sciences, Indian Institute of Science Education and Research Mohali, Knowledge City, Sector 81, SAS Nagar, Punjab 140306, India 5 Center for Astrophysics | Harvard and Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA 6 Lockheed Martin, 3251 Hanover St, Palo Alto, CA 94304, USA 7 School of Physics and Astronomy, The University of Leicester, University Road, Leicester LE1 7RH, UK 8 CONICET/Universidad Nacional de Hurlingham, Av. Gdor. Vergara 2222, Villa Tesei, Buenos Aires, Argentina 9 INAF-Osservatorio di Padova, Vicolo Osservatorio 5, I-35122 Padova, Italy 10 Department of Astronomy, University of Wisconsin, 475 N, Charter Street, Madison, WI 53706, USA Accepted XXX. Received YYY; in original form ZZZ ABSTRACT Nova Her 2021 or V1674 Her was one of the fastest novae to be observed so far. We report here the results from our timing and spectral studies of the source observed at multiple epochs with AstroSat. We report the detection of a periodicity in the source in soft X-rays at a period of 501.4–501.5 s which was detected with high significance after the peak of the super-soft phase, but was not detected in the far ultraviolet (FUV) band of AstroSat. The shape of the phase-folded X-ray light curves has varied significantly as the nova evolved. The phase-resolved spectral studies reveal the likely presence of various absorption features in the soft X-ray band of 0.5–2 keV, and suggest that the optical depth of these absorption features may be marginally dependent on the pulse phase. Strong emission lines from Si, N and O are detected in the FUV, and their strength declined continuously as the nova evolved and went through a bright X-ray state. Key words: novae: cataclysmic variables – observational – X-rays: binaries – ultraviolet– general 1 INTRODUCTION Novae are interacting binaries with a white dwarf accreting hydrogen rich material from a (predominantly) low mass, late-type main sequence star. This material forms an accretion disc around the white dwarf. With the accretion of sufficient material a thermonuclear runaway (TNR) occurs in the matter that is electron degenerate (Starrfield et al. 2012, 2020), or under ideal gas conditions for accretion > 3 × 10 −9 M ⊙ yr −1 (Chomiuk et al. 2021). The TNR causes rates ∼ the nova eruption, an event that is accompanied by the ejection of the accreted material with velocities ranging from a few hundreds to several thousands km s −1 and an increase in the luminosity of the object by ∼ 5 − 19 magnitudes (Vogt 1990; Özdönmez et al. 2018; Kawash et al. 2021). Nova outbursts typically occur for accretion rates of 𝑀 ¤ ≤ 10 −8 M ⊙ yr −1 , while in some systems, where the white dwarf mass is higher, nova outbursts can occur for a higher accretion rate. Systems with one recorded outburst are termed classical novae, while those with multiple outbursts are termed recurrent novae. The white dwarf in some nova systems could be magnetic. A strong magnetic field prevents the formation of an accretion disc, with accretion happening along the magnetic poles of the white dwarf (polars), while ★ E-mail: yash.bhargava_003@tifr.res.in © 2023 The Authors in some cases the strength of the magnetic field is weaker, enough to just disrupt and truncate the inner regions of the accretion disc (intermediate polars), with accretion in such cases happening via accretion curtains on the magnetic poles of the white dwarf (see Della Valle & Izzo 2020, for a recent review). The classical nova V1674 Her (Nova Her 2021; TCP J18573095+1653396) was discovered on 2021 June 12.537 UT by Seiji Ueda at a visual magnitude of 8.4, and on the rise (http://www.cbat.eps.harvard.edu/unconf/followups/ J18573095+1653396.html, Li 2021a). Data from the All-Sky Automated Survey for Supernovae (ASAS-SN) revealed a pre-discovery detection, on 2021 June 12.1903 (Aydi et al. 2021). Spectroscopic observations on 2021 June 12.84 by Munari et al. (2021) showed the presence of broad P Cygni absorption features of hydrogen Balmer lines at a velocity ∼ 3000 km s −1 confirming it to be a nova. Based on magnitudes in the AAVSO database, Woodward et al. (2021) estimate the maximum occurred on June 12.96 at 𝑉 = 6.14 mag. With the estimated decline rates of 𝑡 2 = 1.2 day, 𝑡 3 = 2.2 days and 𝑡 6 = 14 days corresponding to change in magnitudes Δ𝑚 = 2, 3 and 6 relative to the maximum, respectively (Quimby et al. 2021; Woodward et al. 2021), nova V1674 Her is the fastest Galactic nova known to date. Early UV and optical spectra obtained during the first two-three" 2312.10294v1,"Implementing A Middleware API for Facilitating Heterogeneous IoT Device Communication Protocols and Data Retrieval Sasoun Krikorian Benjamin Skarnes Sai Varun Vadlamudi Computer Science Worcester Polytechnic Institute Worcester, United States smkrikorian@wpi.edu Computer Science Worcester Polytechnic Institute Worcester, United States bcskarnes@wpi.edu Computer Science Worcester Polytechnic Institute Worcester, United States svadlamudi2@wpi.edu Abstract—Currently, there are over 14 billion IoT devices [7], and with many devices come many protocols, the main ones being MQTT and CoAP. We are interested in connecting the many diverse IoT devices to the cloud. To do so, we use the middleware architecture proposed by article [8] in which a device, called the middleware, acts as the middleman between the various IoT networks and the cloud. Since IoT devices typically operate in real-time, performance is of great concern. Therefore, we conducted a simulation to measure the data latency of using middleware and the overall fairness between different IoT networks. Our simulation had an MQTT and a CoAP network interacting with the middleware. The simulation results showed that CoAP always had a lower travel time than MQTT, mainly because CoAP is a more lightweight protocol. However, we also found that MQTT had slightly more throughput, which was unexpected since we initially thought that CoAP would have had higher throughput. We have shown that analyzing data via a middleware device is possible and that there are potential directions to explore, such as evaluating different Quality of Service Algorithms in the context of having a middleware device. I. I NTRODUCTION A. Background The Internet of Things, or IoT, is an emerging paradigm that aims to bring humanity into the next generation of a high-tech lifestyle. IoT aims to connect smart devices to the internet to provide efficiency, connectivity, and an overall higher quality of life for its users. These devices can range from intelligent wearables, fitness devices, and smart utilities, such as thermostats, to even entire smart homes. A few of the most widely used communication protocols include MQTT and CoAP, which are specific to IoT devices that match their requirements as resource-constrained devices. MQTT and CoAP are widespread because they scale and are modular [1]. Scalability in the context of IoT is essential because an IoT network can contain many IoT devices, and having the devices work in real-time is a crucial feature. Message Queue Telemetry Transport, or MQTT, is a lightweight and scalable publish/subscribe IoT messaging protocol that can be easily implemented to relay data through a central server, also known as a broker. In the context of MQTT, the broker acts most like a post office. The client (IoT device) sends a message to the broker (server), and then the message is forwarded or “published” to everyone who is “subscribed” to this particular topic of message [2]. The Constrained Application Protocol, or CoAP, is an application-layer protocol developed as a highly lightweight communications protocol for resource-constrained devices. CoAP uses the GET, PUT, POST, and DELETE methods and response codes similarly but not precisely like HTTP. CoAP uses the resource model mapped to the Universal Resource Identifier instead of the topic-based system that MQTT operates on [2]. MQTT generally uses a publish/subscribe-based model, whereas CoAP uses a request/response-based model. MQTT can support multiple publishers and subscribers, whereas CoAP is a one-to-one protocol. The other main difference is that MQTT necessitates a reliable, lossless, in-order transport that typically requires the TCP/IP stack. On the other hand, CoAP runs on top of User Datagram Protocol, or UDP [2]. This is where middleware comes into play. In 2018, the market for IoT middleware was valued at 6.44 billion dollars and is expected to reach 18.68 billion dollars by 2024. Middleware can be described as a software layer between the applications and the “things” of the Internet of Things. It is used to hide the heterogeneity of IoT devices and provides solutions to problems mentioned above, such as interoperability [3] [4]. Roy Fielding introduced REST in his dissertation. REST stands for REpresentational State Transfer. REST is guided by a set of constraints that an API must follow [5]. The advantage of REST API is that the server becomes more accessible to manage from the constraints. Enforcing the stateless constraint is helpful since the user will be guaranteed to receive the same response if they send the same data. If the server were not stateless, the user could get a different reaction, making debugging more challenging, as reproducing errors could now take many more steps. Also, statelessness helps with ensuring that the code is data-driven. Also, the statelessness constraint can allow the user to cache the server’s response since they know that sending the same data will result in the same" 2312.10297v1,"Shedding Light on Software Engineering-specific Metaphors and Idioms Mia Mohammad Imran Preetha Chatterjee Kostadin Damevski Virginia Commonwealth University Richmond, Virginia, USA imranm3@vcu.edu Drexel University Philadelphia, Pennsylvania, USA preetha.chatterjee@drexel.edu Virginia Commonwealth University Richmond, Virginia, USA kdamevski@vcu.edu ABSTRACT Use of figurative language, such as metaphors and idioms, is common in our daily-life communications, and it can also be found in Software Engineering (SE) channels, such as comments on GitHub. Automatically interpreting figurative language is a challenging task, even with modern Large Language Models (LLMs), as it often involves subtle nuances. This is particularly true in the SE domain, where figurative language is frequently used to convey technical concepts, often bearing developer affect (e.g., ‘spaghetti code’). Surprisingly, there is a lack of studies on how figurative language in SE communications impacts the performance of automatic tools that focus on understanding developer communications, e.g., bug prioritization, incivility detection. Furthermore, it is an open question to what extent state-of-the-art LLMs interpret figurative expressions in domain-specific communication such as software engineering. To address this gap, we study the prevalence and impact of figurative language in SE communication channels. This study contributes to understanding the role of figurative language in SE, the potential of LLMs in interpreting them, and its impact on automated SE communication analysis. Our results demonstrate the effectiveness of fine-tuning LLMs with figurative language in SE and its potential impact on automated tasks that involve affect. We found that, among three state-of-the-art LLMs, the best improved fine-tuned versions have an average improvement of 6.66% on a GitHub emotion classification dataset, 7.07% on a GitHub incivility classification dataset, and 3.71% on a Bugzilla bug report prioritization dataset. ACM Reference Format: Mia Mohammad Imran, Preetha Chatterjee, and Kostadin Damevski. 2023. Shedding Light on Software Engineering-specific Metaphors and Idioms. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/nnnnnnn. nnnnnnn 1 INTRODUCTION Figurative language is the use of words or phrases in a way that deviates from their literal meaning, aiming to evoke specific concepts or imagery within one’s imagination [13]. Figurative language Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn consists of different types [53], such as metaphors, which use comparisons to describe something differently (e.g., “the road ahead is a long and winding journey”); idioms, which are common phrases that have alternate meanings (e.g., ‘to beat around the bush’); similes, which use ‘like’ or ‘as’ to compare two things (e.g., ‘as light as a feather’); and personification, which gives human qualities to objects or animals (e.g., ‘the leaves danced in the wind’). Within the software engineering (SE) community, professionals often employ various distinctive figurative expressions that are not commonly used in everyday discourse. For instance, developers utilize the metaphorical term ‘anti-pattern’ to communicate the idea of a recurring problem that should be avoided [89]. Idioms, another frequently employed form of figurative expression, play a crucial role in SE communication by succinctly and colloquially conveying common ideas or concepts. An example of this is when developers describe poorly written code as ‘spaghetti code’, implying that it is convoluted and challenging to comprehend [107]. Just as humans use phrases like ‘boil’ with anger or ‘a breath of fresh air’ for relief [71], developers might say ‘a thorn in my side’ [9] to express persistent annoyance or difficulty with an API or a feature. Use of pejorative terms like ‘garbage code’ [5] can be indicators of severe negative emotions, leading to toxic discussions. Therefore, understanding the use of figurative language in software development discourse can help detect the use of offensive language [41] and provide valuable insights into the overall health of a software project [48]. Developers also use figurative expressions to indicate the impact and severity of a bug. For instance, while expressions like ‘a ticking time bomb’ [10], suggests significant future problems, ‘showstopper’ [4] and ‘critical roadblock’ [3], emphasize the urgency of addressing the bug at the present. Recent studies highlighted that flaws in SE emotion and sentiment detection tools often stem from the use of figurative language [35, 65, 91, 93]. On a Stack Overflow and GitHub dataset, Novielli et al. [93] found that 9% of the errors in sentiment analysis were due to figurative language, noting that it poses an open challenge for sentiment detection in software engineering. Despite its potential impact on the performance of automatic tools focused on understanding SE text, there have been very limited studies on analyzing figurative language in SE, e.g., there have been some studies on SE synonyms [32, 33] and programming language-specific idioms [19]. In this paper, we aim to go beyond the synonyms and explore the broader landscape of figurative language in SE. We aim to ‘shed light on’ or analyze the use of figurative language (specifically, metaphors and idioms) in SE communication channels and contribute to the understanding of how recently proposed language models that target software-related text can be made to recognize figurative expressions." 2312.10298v1,"Integrated Qubit Reuse and Circuit Cutting for Large Quantum Circuit Evaluation Aditya Pawar, Yingheng Li, Zewei Mo, Yanan Guo, Youtao Zhang, Xulong Tang, Jun Yang University of Pittsburgh {adp110, yil392, zewei.mo, yag45, tax6, juy9}@pitt.edu, zhangyt@cs.pitt.edu Abstract software simulation offers a noise-free execution environment for quantum circuits. However, the simulation cost increases exponentially with the number of qubits [44] and thus faces intrinsic drawbacks for scalability. Recently proposed schemes, i.e., wire cutting, qubit reuse, and gate cutting, help to mitigate the challenge. The wirecutting schemes [33, 37, 39] partition a large quantum circuit into several smaller subcircuits, run subcircuits on quantum devices, and then reconstruct the output of the original circuit through classical post-processing. That is, they adopt a hybrid approach that combines physical quantum execution and classical software post-processing. Since the classical post-processing overhead increases exponentially with the number of wire cuts, minimizing cut numbers is one of the major design goals in these schemes. The qubit-reuse technique [12, 18, 31] addresses the challenge by exploiting the hardware support for Mid-Circuit Measurement and Reset (MR) [20] such that the physical qubits that have finished all their operations can be redeployed as other logical qubits during circuit execution. Another circuit-cutting approach, gate cutting [26], was recently proposed to cut a two-qubit gate into a linear sum of single-qubit gates, and exploit classical post-processing to reconstruct the original result. Gate cutting has not been well-studied at the circuit level, i.e., deciding the best cut locations for a given large circuit. Unfortunately, we observe that these schemes are currently applied individually and tend to produce sub-optimal results. Qubit reuse can reuse physical qubits only after their initially assigned operations finish. Its effectiveness diminishes as the circuits grow larger — only a few qubits can start their operations after some other qubits have finished. Wire cutting introduces one extra qubit (initialization qubit in [39]) after each cut, which may artificially increase the total number of physical qubits required for partitioning circuits. Gate cutting has not been well-studied at the circuit level. In addition, gate cutting, since its post-processing cannot reconstruct the distribution result, can only be applied to the quantum circuits that compute expectation values. In this work, we present IQRC, a framework for evaluating larger quantum circuits on small quantum devices through integrated Qubit-Reuse and Circuit Cutting.IQRC is an endto-end approach that models a large quantum circuit using ILP (integer linear programming), finds a good cutting solution using an ILP solver, maps the decision to subcircuits, Quantum computing has recently emerged as a promising computing paradigm for many application domains. However, the size of quantum circuits that can run with high fidelity is constrained by the limited quantity and quality of physical qubits. Recently proposed schemes, such as wire cutting and qubit reuse, mitigate the problem but produce sub-optimal results as they address the problem individually. In addition, gate cutting, an alternative circuit-cutting strategy, has not been fully explored in the field. In this paper, we propose IQRC, an integrated approach that exploits qubit reuse and circuit cutting (including wire cutting and gate cutting) to run large circuits on small quantum computers. Circuit-cutting techniques introduce nonnegligible post-processing overhead, which increases exponentially with the number of cuts. IQRC exploits qubit reuse to find better cutting solutions to minimize the cut numbers and thus the post-processing overhead. Our evaluation results show that on average we reduce the number of cuts by 34% and additional reduction when considering gate cuts. 1 Introduction Quantum computing has recently emerged as a promising computing paradigm for many application domains, such as machine learning [4, 24, 41], chemistry simulation [1, 22, 36], and optimization [27, 30]. The problems from these domains scale quickly such that they require increasingly larger faulttolerant quantum computers. Unfortunately, we are currently in the NISQ (noisy intermediate-scale quantum) era [11] where quantum devices suffer from various noises, e.g., short coherence time and crosstalk among qubits, and small device sizes, e.g., current quantum devices only have up to 100s of qubits. It has become one of the major challenges to run large quantum circuits in the NISQ era. Large quantum computers, e.g., IBM 433 osprey, often have limited availability to the general public. In addition, not all qubits of large quantum computers exhibit high computation fidelity — some noisy qubits have to be frozen, i.e., not used, for some computation tasks [2]. Error mitigation schemes [8, 10, 35, 45] help to improve computation fidelity [11, 40, 41] but have limited effectiveness due to the limited availability of physical qubits on devices. As an alternative to physical quantum execution, 1" 2312.10299v1,"I MAGE R ESTORATION T HROUGH G ENERALIZED O RNSTEIN -U HLENBECK B RIDGE Conghan Yue Department of Computer Science Sun Yat-sen University yuech5@mail2.sysu.edu.cn Zhengwei Peng Department of Computer Science Sun Yat-sen University pengzhw23@mail2.sysu.edu.cn Junlong Ma Department of Computer Science Sun Yat-sen University majlong3@mail2.sysu.edu.cn Shiyan Du Department of Computer Science Sun Yat-sen University dushy5@mail2.sysu.edu.cn Pengxu Wei Department of Computer Science Sun Yat-sen University weipx3@mail.sysu.edu.cn Dongyu Zhang Department of Computer Science Sun Yat-sen University zhangdy27@mail.sysu.edu.cn A BSTRACT Diffusion models possess powerful generative capabilities enabling the mapping of noise to data using reverse stochastic differential equations. However, in image restoration tasks, the focus is on the mapping relationship from low-quality images to high-quality images. To address this, we introduced the Generalized Ornstein-Uhlenbeck Bridge (GOUB) model. By leveraging the natural mean-reverting property of the generalized OU process and further adjusting the variance of its steady-state distribution through the Doob’s h–transform, we achieve diffusion mappings from point to point with minimal cost. This allows for end-to-end training, enabling the recovery of highquality images from low-quality ones. Additionally, we uncovered the mathematical essence of some bridge models, all of which are special cases of the GOUB and empirically demonstrated the optimality of our proposed models. Furthermore, benefiting from our distinctive parameterization mechanism, we proposed the Mean-ODE model that is better at capturing pixel-level information and structural perceptions. Experimental results show that both models achieved state-of-the-art results in various tasks, including inpainting, deraining, and super-resolution. Code is available at https://github.com/Hammour-steak/GOUB. 1 Introduction Image restoration is the process of transforming low-quality images into their high-quality counterparts in the field of computer vision, boasts a long and rich history (Banham and Katsaggelos, 1997; Zhou et al., 1988; Liang et al., 2021; Luo et al., 2023a). It encompasses a suite of classical tasks, including deraining (Zhang and Patel, 2017; Yang et al., 2020; Xiao et al., 2022), denoising (Zhang et al., 2018a; Li et al., 2022; Soh and Cho, 2022; Zhang et al., 2023a), deblurring (Yuan et al., 2007; Kong et al., 2023), inpainting (Jain et al., 2023; Zhang et al., 2023b), and super-resolution (Dong et al., 2015; Zamfir et al., 2023), among others. Owing to the diminution of critical information during the degradation from high-quality to low-quality images, image restoration is also characterized as an ill-posed inverse problem: it is not feasible to losslessly reconstruct high-dimensional information from low-dimensional data. In recent years, diffusion models (Sohl-Dickstein et al., 2015; Ho et al., 2020; Song and Ermon, 2019; Song et al., 2020; Karras et al., 2022) have garnered significant attention for their remarkable performance in generative tasks. Essentially, they utilize neural networks to learn the reverse-time Stochastic Differential Equation (SDE) (Anderson, 1982) corresponding to a given forward SDE. More precisely, they are oriented towards learning the scores (Song et al., 2020), i.e., the gradients of the logarithm of probability densities. Consequently, leveraging the significant advantages of diffusion models in generative tasks, several studies have applied them to image restoration and have achieved favorable results. A majority of these studies utilize the concept of" 2312.10301v1,"FCBench: Cross-Domain Benchmarking of Lossless Compression for Floating-Point Data [Experiment, Analysis & Benchmark] Xinyu Chen Jiannan Tian Ian Beaver Cynthia Freeman Washington State University Pullman, WA, USA xinyu.chen1@wsu.edu Indiana University Bloomington, IN, USA jti1@iu.edu Verint Systems Inc Melville, NY, USA ian.beaver@verint.com Verint Systems Inc Melville, NY, USA cynthiaw2004@gmail.com Yan Yan Jianguo Wang Dingwen Tao ∗ Washington State University Pullman, WA, USA yan.yan1@wsu.edu Purdue University West Lafayette, IN, USA csjgwang@purdue.edu Indiana University Bloomington, IN, USA ditao@iu.edu ABSTRACT While both the database and high-performance computing (HPC) communities utilize lossless compression methods to minimize floating-point data size, a disconnect persists between them. Each community designs and assesses methods in a domain-specific manner, making it unclear if HPC compression techniques can benefit database applications or vice versa. With the HPC community increasingly leaning towards in-situ analysis and visualization, more floating-point data from scientific simulations are being stored in databases like Key-Value Stores and queried using in-memory retrieval paradigms. This trend underscores the urgent need for a collective study of these compression methods’ strengths and limitations, not only based on their performance in compressing data from various domains but also on their runtime characteristics. Our study extensively evaluates the performance of eight CPU-based and five GPU-based compression methods developed by both communities, using 33 real-world datasets assembled in the Floating-point Compressor Benchmark (FCBench). Additionally, we utilize the roofline model to profile their runtime bottlenecks. Our goal is to offer insights into these compression methods that could assist researchers in selecting existing methods or developing new ones for integrated database and HPC applications. in rounding errors in floating-point calculations [20]. Consequently, system designers favor using the highest available precision to minimize the problems caused by rounding errors [60]. Similarly, due to concerns about data precision, lossless compression is preferred over lossy compression, even with lower compression ratios, when information loss is not tolerable. For instance, medical imaging data is almost always compressed losslessly for practical and legal reasons, while checkpointing for large-scale HPC simulations often employs lossless compression to avoid error propagation [18]. Lossless compression is also essential for inter-node communication in a majority of distributed applications [43]. This is because data is typically exchanged between nodes at least once per time step. Utilizing lossy compression would accumulate compression errors beyond acceptable levels, ultimately impacting the accuracy and correctness of the results. Another example is astronomers often insist that they can only accept lossless compression because astronomical spectra images are known to be noisy [15, 68]. With the background (sky) occupying more than 95% of the images, lossy compressions would incur unpredictable global distortions [56]. 1.1 PVLDB Reference Format: Xinyu Chen, Jiannan Tian, Ian Beaver, Cynthia Freeman, Yan Yan, Jianguo Wang, and Dingwen Tao. FCBench: Cross-Domain Benchmarking of Lossless Compression for Floating-Point Data [Experiment, Analysis & Benchmark]. PVLDB, 17(1): XXX-XXX, 2020. doi:XX.XX/XXX.XX PVLDB Artifact Availability: The source code, data, and/or other artifacts have been made available at https://github.com/papersub2023/FCBench. 1 INTRODUCTION Floating-point data is widely used in various domains, such as scientific simulations, geospatial analysis, and medical imaging [18, 23, 61]. As the scale of these applications increases, compressing floating-point data can help reduce data storage and communication overhead, thereby improving performance [59]. Why lossless compression? Using a fixed number of bits (e.g., 32 bits for single-precision data) to represent real numbers often results ∗ Corresponding author: Dingwen Tao. Study Motivation Both the HPC and database communities have developed lossless compression methods for floating-point data. However, there are fundamental differences between the floating-point data of these two domains. Typically, numeric values stored in database systems do not necessarily display structural correlations except for timeseries data. In contrast, HPC systems often deal with structured high-dimensional floating-point data produced by scientific simulations or observations, such as satellites and telescopes. The result is that the two communities have developed floating-point data compression methods for different types of data within their respective domains. Naturally, an intriguing question arises: Can the compression methods developed in one community be applied to the data from the other community, and vice versa? The urgency to answer this question arises from the growing trend of utilizing database tools on HPC systems. Practical use cases include in-situ visualization, which allows domain scientists to monitor and analyze large scientific simulations. For instance, Grosset and Ahrens developed Seer-Dash, a tool that utilizes Mochi’s Key- Value storage microservice [58] and Google’s LevelDB engine [1] to generate in-situ visualizations for the HACC simulation [23]." 2312.10319v1,"Building AI and Human Capital Building AI and Human Capital for Road Safety Research-in-Progress Paper Yug Dedhia International Institute of Information Technology, India yug.dedhia@research.iiit.ac.in Anjali Singh International Institute of Information Technology, India anjali.s@students.iiit.ac.in Vaibhav Singh Tomar International Institute of Information Technology, India vaibhav.tomar@students.iiit.ac.in Nimmi Rangaswamy International Institute of Information Technology, India nimmi.rangaswamy@iiit.ac.in Dev Singh Thakur i-Hub Data, International Institute of Information Technology, India dev.singh@ihub-data.iiit.ac.in Abstract AI is about learning algorithms and huge amounts of data and are drivers of economic growth- what does this mean for the field of development studies? Can we re-orient to twin AI studies and development theory and practice to generate how development challenges are identified and researched? To do this a good grasp is needed of AI’s internal mechanisms and outcomes in addressing development issues – this argument will be developed through a case study of the ADAS [ Advanced Driver Assistance System] deployment in India. Over and above discussing the ADAS we bring an anthropological lens to understand the social context that surrounds the system. Focusing on bus drivers, we offer findings from a qualitative and ethnographic study of drivers in a collaborative effort to achieve road safety by deploying AI-driven technology and empowering stakeholders in the transport industry in India especially, bus drivers as critical actors in the city’s transport network. Keywords: Information Technology for Development (ICT4D), Human Capital, AI Capital, Anthropology, Road Safety, India Proceedings of the 15th Annual AIS SIG GlobDev Pre-ICIS Workshop, Hyderabad, India, Sunday December 10, 2023 1" 2312.10332v1,"ProTIP: Progressive Tool Retrieval Improves Planning Raviteja Anantha*, Bortik Bandyopadhyay*, Anirudh Kashi, Sayantan Mahinder, Andrew W Hill, Srinivas Chappidi Apple Abstract Large language models (LLMs) are increasingly employed for complex multi-step planning tasks, where the tool retrieval (TR) step is crucial for achieving successful outcomes. Two prevalent approaches for TR are single-step retrieval, which utilizes the complete query, and sequential retrieval using task decomposition (TD), where a full query is segmented into discrete atomic subtasks. While single-step retrieval lacks the flexibility to handle “intertool dependency,"" the TD approach necessitates maintaining “subtask-tool atomicity alignment,"" as the toolbox can evolve dynamically. To address these limitations, we introduce the Progressive Tool retrieval to Improve Planning (ProTIP) framework. ProTIP is a lightweight, contrastive learning-based framework that implicitly performs TD without the explicit requirement of subtask labels, while simultaneously maintaining subtask-tool atomicity. On the ToolBench dataset, ProTIP outperforms the ChatGPT task decomposition-based approach by a remarkable margin, achieving a 24% improvement in Recall@K=10 for TR and a 41% enhancement in tool accuracy for plan generation. 1 Introduction Large language models (LLMs) (Brown et al., 2020; Chowdhery et al., 2022; Ouyang et al., 2022; Zhang et al., 2022; Zeng et al., 2022; OpenAI, 2023b; Touvron et al., 2023; Bubeck et al., 2023; Thoppilan et al., 2022) have witnessed remarkable advancements in recent years, driven by efficient pre-training on massive text datasets and the application of sophisticated algorithms like reinforcement learning from human feedback (RLHF) (Ouyang et al., 2022) to better align these models with human preferences. This progress has unlocked emergent capabilities (Wei et al., 2022a) * Equal contributions. in LLMs, which can be further refined to enhance their instruction-following abilities (Taori et al., 2023; Chiang et al., 2023). Additionally, LLMs have demonstrated the potential for in-context learning (Brown et al., 2020; Xie et al., 2021; Min et al., 2022) and chain-of-thought prompting (Wei et al., 2022b; Kojima et al., 2022; Wang et al., 2022), expanding their applicability across a wide spectrum of application domains. Harnessing the power of LLMs as language understanding agent (Shen et al., 2023a) to tackle complex tasks has emerged as a burgeoning research area. This endeavor presents a challenge due to the inherent complexity of multi-step planning (Huang et al., 2022; Ahn et al., 2022; Singh et al., 2022). To address this challenge, we employ a flexible planning framework that seamlessly integrates an LLM with an external toolbox containing application specific atomic actions. The LLM planner bridges the gap between natural language instructions and executable actions by effectively selecting appropriate APIs/tools from a curated list presented in the LLM prompt. These tools are retrieved using specialized techniques from the external toolbox (Schick et al., 2023; Qin et al., 2023a; Patil et al., 2023; Qin et al., 2023b; Shen et al., 2023a). The terms tool and API are used interchangeably throughout this paper. Within multi-step planning framework with an external toolbox, the tool retrieval (TR) step plays a crucial role in determining the overall planner’s performance. The TR step can be implemented either as a single-step process utilizing the entire query or as an iterative approach that decomposes the query into individual atomic subtasks (Khot et al., 2022; Wu et al., 2023). The single-step TR approach, however, is unable to handle “inter-tool dependency"" in multi-step execution scenarios. This limitation becomes evident, for instance, when selecting between tool-A and tool-B, where the choice depends on the successful execution" 2312.10338v1,"Material Point Methods on Unstructured Tessellations: A Stable Kernel Approach With Continuous Gradient Reconstruction Yadi Cao a , Yidong Zhao d,a , Minchen Li b,a , Yin Yang c , Jinhyun Choo d , Demetri Terzopoulos a , Chenfanfu Jiang a a University of California, Los Angeles, United States b Carnegie Mellon University, United States c University of Utah, United States d KAIST, South Korea Abstract The Material Point Method (MPM) is a hybrid Eulerian-Lagrangian simulation technique for solid mechanics with significant deformation. Structured background grids are commonly employed in the standard MPM, but they may give rise to several accuracy problems in handling complex geometries. When using (2D) unstructured triangular or (3D) tetrahedral background elements, however, significant challenges arise (e.g., cell-crossing error). Substantial numerical errors develop due to the inherent C 0 continuity property of the interpolation function, which causes discontinuous gradients across element boundaries. Prior efforts in constructing C 1 continuous interpolation functions have either not been adapted for unstructured grids or have only been applied to 2D triangular meshes. In this study, an Unstructured Moving Least Squares MPM (UMLS-MPM) is introduced to accommodate 2D and 3D simplex tessellation. The central idea is to incorporate a diminishing function into the sample weights of the MLS kernel, ensuring an analytically continuous velocity gradient estimation. Numerical analyses confirm the method’s capability in mitigating cell crossing inaccuracies and realizing expected convergence. Keywords: Material Point Method, Unstructured Grid, Cell Crossing Instability, Moving Least Squares 1. Introduction The Material Point Method (MPM) [1] was introduced to solid mechanics as an extension of both the Fluid-Implicit Particle (FLIP) method [2] and the Particle-in-Cell (PIC) method [3]. The MPM is a hybrid Eulerian-Lagrangian method, often referred to as a particle-grid method that retains and monitors all physical attributes on a collection of particles. A background grid serves Email addresses: yadicao95@ucla.edu (Yadi Cao), cffjiang@ucla.edu (Chenfanfu Jiang)" 2312.10342v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Self-supervised Adaptive Weighting for Cooperative Perception in V2V Communications Chenguang Liu, Jianjun Chen, Yunfei Chen, Senior Member, IEEE, Ryan Payton, Michael Riley, and Shuang-Hua Yang, Senior Member, IEEE Abstract—Perception of the driving environment is critical for collision avoidance and route planning to ensure driving safety. Cooperative perception has been widely studied as an effective approach to addressing the shortcomings of single-vehicle perception. However, the practical limitations of vehicle-to-vehicle (V2V) communications have not been adequately investigated. In particular, current cooperative fusion models rely on supervised models and do not address dynamic performance degradation caused by arbitrary channel impairments. In this paper, a selfsupervised adaptive weighting model is proposed for intermediate fusion to mitigate the adverse effects of channel distortion. The performance of cooperative perception is investigated in different system settings. Rician fading and imperfect channel state information (CSI) are also considered. Numerical results demonstrate that the proposed adaptive weighting algorithm significantly outperforms the benchmarks without weighting. Visualization examples validate that the proposed weighting algorithm can flexibly adapt to various channel conditions. Moreover, the adaptive weighting algorithm demonstrates good generalization to untrained channels and test datasets from different domains. Index Terms—Adaptive weighting, cooperative perception, selfsupervised learning, V2V communications. I. I NTRODUCTION Cooperative perception enabled by vehicular communications facilitates the exchange of complementary perceptual information among multiple connected and autonomous vehicles (CAVs), leading to a more comprehensive and integrated perception for autonomous driving [1]. By aggregating the information from multiple viewpoints, it provides an effective framework to alleviate the limitations of single-vehicle perception, to detect occluded or distantly located objects. Such collaboration schemes highly rely on the vehicular communications system to transmit the shared information from This work was supported in part by Oracle Cloud credits and related resources provided by the Oracle for Research program, the National Natural Science Foundation of China (Grant No. 92067109, 61873119, 62211530106), and Shenzhen Science and Technology Program (Grant No. ZDSYS20210623092007023, GJHZ20210705141808024). (Corresponding author: Shuang-Hua Yang.) Chenguang Liu is with the School of Engineering, University of Warwick, Coventry, UK, CV4 7AL. e-mail: chenguang.liu@warwick.ac.uk Jianjun Chen is with the Faculty of Engineering and Information Technology, University of Technology Sydney, Australia. e-mail: jianjun.chen@student.uts.edu.au Yunfei Chen is with the Department of Engineering, University of Durham, Durham, UK, DH1 3LE. e-mail: yunfei.chen@durham.ac.uk Ryan Payton and Michael Riley are with Oracle for Research. email: ryan.payton@oracle.com; michael.riley@oracle.com Shuang-Hua Yang is with Shenzhen Key laboratory of Safety and Security for Next Generation of Industrial Internet, Southern University of Science and Technology, Shenzhen, China, and also with Department of Computer Science, University of Reading, UK. e-mail: yangsh@sustech.edu.cn CAVs to the ego vehicle. In practice, the reliability of vehicleto-vehicle (V2V) communications is constrained by limited bandwidth and channel distortion. Therefore, addressing the practical limitations imposed by the V2V communications system on collaborative perception is vital, which has garnered considerable interest from researchers. Based on the previous works in 3D detection backbones [2]–[4], related works have been widely conducted to develop efficient collaborative fusion schemes, including sharing raw point clouds (i.e. early fusion) [5], intermediate features (i.e. intermediate fusion) [6]–[14] and detection results (i.e. late fusion) [15]. Most of these works focus on improving perception accuracy and reducing bandwidth utilization, assuming ideal exchange of information. To consider more realistic V2V communication, some studies examined the effects of communications delay [12], pose error [7], and lossy communications [13]. However, they have still assumed perfect communications channel without any channel impairments, except [16], which considered Rician fading and free-space path loss by incorporating the learning-based communication channel into cooperative perception. Moreover, the work in [16] demonstrated that the intermediate features are more robust to channel impairments than raw point clouds and detection results. Also, the intermediate fusion can be further improved in the presence of channel impairments. In realistic V2V communications, the information shared among vehicles could potentially enhance the detection performance, but if it suffers from severe channel distortion, it may instead manifest as interference that undermines detection accuracy. Especially for intermediate features, it is more challenging to identify the corrupted features than the raw point clouds and detection outputs since latent features do not have a physical detection range. Therefore, it is vital to prevent the severely distorted information from taking part in the fusion or collaboration. On the other hand, the channel distortion in realistic V2V communication may exhibit arbitrary and dynamic characteristics, leading to signal strength fluctuation [17]. This nonstationarity of the V2V channel is mainly caused by the high velocity of the transmitter, receiver and moving scatterers in the V2V environment [18]. This necessitates the cooperative system to adapt to various levels of channel impairment. In this regard, relying solely on the supervised training with the well-labeled dataset is inefficient when dealing with various communication environments, since labeling the received intermediate features is difficult due to their latent representation. Consequently, the cost of training and labeling" 2312.10343v1,"In-Sensor Radio Frequency Computing for Energy-Efficient Intelligent Radar Yang Sui Minning Zhu Lingyi Huang Rutgers University yang.sui@rutgers.edu Rutgers University minning.zhu@rutgers.edu Rutgers University lingyi.huang@rutgers.edu Chung-Tse Michael Wu Bo Yuan Rutgers University ctm.wu@rutgers.edu Rutgers University bo.yuan@soe.rutgers.edu Abstract—Radio Frequency Neural Networks (RFNNs) have demonstrated advantages in realizing intelligent applications across various domains. However, as the model size of deep neural networks rapidly increases, implementing large-scale RFNN in practice requires an extensive number of RF interferometers and consumes a substantial amount of energy. To address this challenge, we propose to utilize low-rank decomposition to transform a large-scale RFNN into a compact RFNN while almost preserving its accuracy. Specifically, we develop a Tensor-Train RFNN (TT-RFNN) where each layer comprises a sequence of lowrank third-order tensors, leading to a notable reduction in parameter count, thereby optimizing RF interferometer utilization in comparison to the original large-scale RFNN. Additionally, considering the inherent physical errors when mapping TT- RFNN to RF device parameters in real-world deployment, from a general perspective, we construct the Robust TT-RFNN (RTT- RFNN) by incorporating a robustness solver on TT-RFNN to enhance its robustness. To adapt the RTT-RFNN to varying requirements of reshaping operations, we further provide a reconfigurable reshaping solution employing RF switch matrices. Empirical evaluations conducted on MNIST and CIFAR-10 datasets show the effectiveness of our proposed method. Index Terms—Radio frequency neural network, tensor-train decomposition, model compression, efficiency, robustness I. I NTRODUCTION Radar, as the fundamental and important remote sensing system, has served as the backbone sensing solution in a variety of scientific and engineering applications, such as weather prediction, cosmic exploration, and autonomous navigation. By transmitting the radio waves and receiving the reflected waves, radar can determine the distance, angle, and/or radical velocity of the stationary or moving objects. Traditionally, a radar system consists of a sensing module that generates, transmits, and receives electromagnetic waves, and a computing module that processes and analyzes the physical signals. By adopting advanced signal processing and machine learning algorithms, the state-of-the-art computing modules of the radar systems can extract and perceive richer high-level characteristics of the target object, e.g., the shape and category. From the perspective of hardware design, the split sensing and computing modules bring insufficient hardware efficiency. More specifically, the use of costly ADCs connecting the RF- domain sensor and digital-domain processor not only brings significant data movement but also high power consumption. To address this challenge, very recently some works have proposed to perform computing in the RF domain, i.e., insensor RF computing. In particular, our prior work RFNN [1], proposes to move the execution of neural networks, which are typically implemented in the back-end digital processor, to the front-end RF sensor. By leveraging the characteristic that the 2×2 RF interferometer, a basic computing unit that the RF circuit can maturely implement, can be used to build arbitrary matrices, the topology of a feedforward neural network, in principle, can be conveniently mapped on the RF circuit, enabling the RF-domain neural network computing. Notice that though such Mach-Zehnder Interferometer (MZI)-like mapping is also used in optical computing, the required unit interferometer cell usually goes up to 100× of its wavelength, while in the RF domain, the unit cell is of sub-wavelength size. Moreover, optic-electric/electric-optic conversion, as a costly overhead component in the system, can be completely removed when performing the computation in the RF domain, implying the promising potential of in-sensor RF computing. In this work, we investigate the feasibility of RFNN from a more practical perspective. More specifically, considering the neural network models deployed in real-world applications typically consist of multiple layers with hundreds of even thousands of neurons per layer, the original RFNN designed for very small neural networks, due to the physical constraints of RF circuit size, cannot be readily used in practical applications. To address this challenge, we propose to apply low-rank tensor train (TT) decomposition [2]–[4], an effective model compression technique [5]–[7], to develop a compact RFNN with negligible accuracy loss. The resulting more efficient design, namely TT-RFNN, can notably reduce the number of the required computational RF interferometers and hence the overall power consumption of entire RF circuits. Moreover, considering mapping the neural network models on RF devices would inevitably introduce physical errors, which may be incurred by various noise sources such as phase bias and device variations, we further develop a robust" 2312.10366v1,"Fusing Conditional Submodular GAN and Programmatic Weak Supervision Kumar Shubham, Pranav Sastry, Prathosh AP Indian Institute of Science, Bangalore, India shubhamkuma3@iisc.ac.in, pranavsastry@iisc.ac.in, prathosh@iisc.ac.in Abstract Programmatic Weak Supervision (PWS) and generative models serve as crucial tools that enable researchers to maximize the utility of existing datasets without resorting to laborious data gathering and manual annotation processes. PWS uses various weak supervision techniques to estimate the underlying class labels of data, while generative models primarily concentrate on sampling from the underlying distribution of the given dataset. Although these methods have the potential to complement each other, they have mostly been studied independently. Recently, WSGAN proposed a mechanism to fuse these two models. Their approach utilizes the discrete latent factors of InfoGAN to train the label model and leverages the class-dependent information of the label model to generate images of specific classes. However, the disentangled latent factors learned by InfoGAN might not necessarily be class-specific and could potentially affect the label model’s accuracy. Moreover, prediction made by the label model is often noisy in nature and can have a detrimental impact on the quality of images generated by GAN. In our work, we address these challenges by (i) implementing a noise-aware classifier using the pseudo labels generated by the label model (ii) utilizing the noise-aware classifier’s prediction to train the label model and generate class-conditional images. Additionally, we also investigate the effect of training the classifier with a subset of the dataset within a defined uncertainty budget on pseudo labels. We accomplish this by formalizing the subset selection problem as a submodular maximization objective with a knapsack constraint on the entropy of pseudo labels. We conduct experiments on multiple datasets and demonstrate the efficacy of our methods on several tasks vis-a-vis the current state-of-the-art methods. Our implementation is available at https://github.com/kyrs/subpws-gan Introduction The success of many deep learning methods is often credited to the availability of large amounts of labeled data (Deng et al. 2009; Cao et al. 2018; Roberts et al. 2021; Chen et al. 2020a). However, labeling necessitates manual annotation, which is a time-consuming and labor-intensive process. Distant supervision or weak supervision methods address this issue by using an external knowledge base (Hoffmann et al. 2011), pre-trained models (Bach et al. 2019), and heuristics Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. approaches (Awasthi et al. 2020) to generate inexpensive but potentially noisy class labels for downstream tasks. These methods use an alternative source of information to assign labels to the training data and thus avoid the need for extensive manual annotation. However, the pseudo labels generated by such methods are often noisy in nature and can have a detrimental impact on downstream performance. Programmatic weak supervision (Zhang et al. 2022a; Dehghani et al. 2017; Lang and Poon 2021; Ratner et al. 2016, 2020; Riedel, Yao, and McCallum 2010) addresses this issue by combining the prediction of multiple such noisy sources of labels often known as label functions (LFs) systematically. In PWS, a label model is trained to combine the prediction of these label functions to estimate the unobserved ground truth label for a given training sample. The generated pseudo label is then used for downstream training. For a given set of label functions, the quality of the pseudo label is often determined by the performance of the label model. Various approaches have been suggested to effectively train the label model (Zhang et al. 2022a) without knowing the underlying ground truth class labels. While approaches like (Ratner et al. 2016, 2020, 2019; Fu et al. 2020) use only the prediction of label functions to estimate the pseudo label, encoder-based label models also consider data features to estimate pseudo labels (Cachay et al. 2021; Boecking et al. 2023). Recently, Boecking et al. (2023) proposed WSGAN, a novel training strategy to efficiently generate pseudo labels for a given image dataset. Their approach combines Info- GAN with an encoder-based label model (Cachay et al. 2021). The key idea is to train both InfoGAN (Chen et al. 2016) and label model simultaneously and leverage the disentangled latent factors learned by InfoGAN to align the label model’s predictions. This training process offers several advantages. The synchronized training of the label model and InfoGAN allows the efficient utilization of the disentangled latent factors of InfoGAN for the training of the label model. Simultaneously, the pseudo labels generated by the label model facilitate the generation of class-conditioned images, which can benefit downstream tasks as an additional form of data augmentation. Nevertheless, the implementation of such a training process presents several challenges. The disentangled latent representation of InfoGAN is learned by maximizing the" 2312.10375v1,"Collect and Connect Data Leaves to Feature Concepts: Interactive Graph Generation Toward Wellbeing Yukio Ohsawa 1 , Tomohide Maekawa 2 , Hiroki Yamaguchi 2 , Hiro Yoshida 1 , Kaira Sekiguchi 1 1: The University of Tokyo, Tokyo 113-8656 Japan 2: Trust Architecture, Inc., Tokyo 107-0052 Japan Abstract Feature concepts and data leaves have been invented using datasets to foster creative thoughts for creating well-being in daily life. The idea, simply put, is to attach selected and collected data leaves that are summaries of event flows to be discovered from corresponding datasets, on the target feature concept representing the well-being aimed. A graph of existing or expected datasets to be attached to a feature concept is generated semi-automatically. Rather than sheer automated generative AI, our work addresses the process of generative artificial and natural intelligence to create the basis for data use and reuse. Keywords 1 Mobile-sensor data, multi-scale diversity, well-being, community, crowd 1. Introduction Career, social, financial, physical, and community well-being. defined as the five factors of well-being [1] are interrelated: social relationships via interaction among communities affect individuals’ health [2], and vice versa. A symposium in 2023 discussed the contribution of AI to these factors using various datasets [3]. In this paper, we present a tool for visualizing a graph showing the interconnectivity of social requirements toward well-being and useful datasets. Here, we focus on federating datasets to enhance well-being, positioning the physical dataset at the cross-point of social, community, and individual well-being. 2. Feature Concept with Data Leaves The FC is an abstraction of the knowledge expected to be acquired from the dataset(s). An FC is represented in various ways, including text, images, or logical trees [4] corresponding to the requirements. DL is metadata that represents a latent event structure behind the dataset, corresponding to the FC for a single dataset. The DLs were selected and collected from a prepared DL base and connected to the FC. Coving up the FC by DLs, as shown in Figure 1, means envisioning data utilization to satisfy a requirement. *Corresponding author: info@panda.sys.t.u-tokyo.ac.jp Figure 1 Feature Concept (background) and Dat Leaves (foreground leaves) attached to the FC. 3. Visualizing a FC/DL graph Here, we show a tool to create a graph composed of nodes representing events or actions to satisfy a requirement, and edges implying latent causalities between them. Once the user(s) provides text  about requirement(s), the tool starts the procedure below setting G to null. Create_FC_graph (T) 1: Divide  into segments  := {S 1 , S 2 , …S m }, and create their abstracts  S i  2: Create clusters {C 1 , C 2 , …C n } of segments i.e. C j ={S k , S k+1 , …S k+cj } on the semantic distance d(S h , S k ). Add node F j to G and connect the cj nodes in C j to F j to in G via new edges. Collect_connect_DLs_to_G 3:  := all DL i, s.t. d(DL i , F j ) <  for each F j ." 2312.10376v1,"SA 2 VP: Spatially Aligned-and-Adapted Visual Prompt Wenjie Pei 1 * , Tongqi Xia 1 * , Fanglin Chen 1 , Jinsong Li 2 , Jiandong Tian 3 , Guangming Lu 1† 1 Harbin Institute of Technology, Shenzhen Shenzhen Jiang & Associates Creative Design Co., Ltd 3 Shenyang Institute of Automation, Chinese Academy of Sciences wenjiecoder@outlook.com, tongqixia325@gmail.com, chenfanglin@hit.edu.cn, as@jaid.cn, tianjd@sia.cn, luguangm@hit.edu.cn 2 Abstract As a prominent parameter-efficient fine-tuning technique in NLP, prompt tuning is being explored its potential in computer vision. Typical methods for visual prompt tuning follow the sequential modeling paradigm stemming from NLP, which represents an input image as a flattened sequence of token embeddings and then learns a set of unordered parameterized tokens prefixed to the sequence representation as the visual prompts for task adaptation of large vision models. While such sequential modeling paradigm of visual prompt has shown great promise, there are two potential limitations. First, the learned visual prompts cannot model the underlying spatial relations in the input image, which is crucial for image encoding. Second, since all prompt tokens play the same role of prompting for all image tokens without distinction, it lacks the fine-grained prompting capability, i.e., individual prompting for different image tokens. In this work, we propose the Spatially Aligned-and-Adapted Visual Prompt model (SA 2 VP), which learns a two-dimensional prompt token map with equal (or scaled) size to the image token map, thereby being able to spatially align with the image map. Each prompt token is designated to prompt knowledge only for the spatially corresponding image tokens. As a result, our model can conduct individual prompting for different image tokens in a fine-grained manner. Moreover, benefiting from the capability of preserving the spatial structure by the learned prompt token map, our SA 2 VP is able to model the spatial relations in the input image, leading to more effective prompting. Extensive experiments on three challenging benchmarks for image classification demonstrate the superiority of our model over other state-of-the-art methods for visual prompt tuning. Code is available at https://github.com/tommy-xq/SA2VP. Introduction Adapting large pre-trained vision models to a specific downstream vision task via parameter-efficient fine-tuning (PEFT) has proven to be an effective and efficient strategy, particularly in the scenarios where the training data is limited. It not only distills the prior knowledge relevant to the downstream task from the pre-trained model to achieve better performance, but also substantially improves the training efficiency by incurring only a small amount of parametertuning overhead. As a prominent PEFT method, prompt tun- * These authors contributed equally. † Corresponding author. Figure 1: Typical methods for visual prompting tuning follow the sequential modeling paradigm which learns an unordered sequence of prompts prefixed to the image representation. All prompt tokens play the same role of prompting for all image tokens. In contrast, our SA 2 VP learns a 2D prompt token map, which aligns with the image token map spatially. As a result, our SA 2 VP is able to 1) conduct individual prompting for different image tokens in a fine-grained manner and 2) model the spatial relations in the input image by preserving the spatial structure in the prompt map. ing has achieved remarkable success in NLP field and is being explored its potential in computer vision (Bahng et al. 2022; Huang et al. 2023; Jia et al. 2022; Das et al. 2023; Han et al. 2023; Bar et al. 2022). Most of existing methods for visual prompt tuning (Jia et al. 2022; Das et al. 2023; Han et al. 2023) follow the sequential modeling paradigm, which stems from the learning way of prompt in NLP, as shown in Figure 1. A prominent example is VPT (Jia et al. 2022), which encodes an input image as a sequential representation using pre-trained vision Transformer models and then learns a set of prompt tokens as auxiliary input prefixed to the image representation. The learned vision prompts are expected to distill the relevant knowledge from the pre-trained model, thereby adapting the pre-trained model to the downstream target task. While such sequential modeling paradigm of visual prompts has shown great promise, it suffers from two potential limitations. First, since no spatial structure can be captured by the simple unordered sequence structure of the prompt tokens, it cannot" 2312.10378v1,"The Dijkgraaf-Witten invariants from second Chern classes Takefumi Nosaka 1 Abstract Given a 3-cocycle ψ in the cohomology of a finite group G, we can define the Dijkgraaf-Witten invariant of closed 3-manifolds. In this paper, we focus on the case where ψ is a 3-cocycle canonically obtained from the second Chern class of a representation of G, and show some procedures for computing the invariant, and clarify its topological interpretation under some conditions. Keywords Group cohomology, 3-manifold, Chern classes, splitting principle Subject Codes 20J06, 57K31, 19L10, 58J28, 1 Introduction Let M be a connected closed 3-manifold with orientation 3-class [M ] ∈ H 3 (M ; Z) ∼ = Z. Let G be a group G, and BG be an Eilenberg-MacLane space of type (G, 1). Fix a group 3- cocycle ψ ∈ H 3 (BG; A) = H 3 (G; A) with trivial coefficient module A. Then, for a group homomorphism f : π 1 (M ) → G, we can consider the pairing ⟨f ∗ (ψ), [M ]⟩ ∈ A. As an important example, if G is a Lie group and ψ is a Chern-Simons 3-class, the pairing is called the Chern-Simons invariant with relation to hyperbolic volume. Meanwhile, as another example, the Dijkgraaf-Witten invariant [DW, §6] is a toy model of the Chern-Simons invariant when G is of finite order. Precisely, the invariant is defined as the following formal sum in the group ring Z[A]: X DW ψ (M ) := 1 Z ⟨f ∗ (ψ), [M ]⟩ ∈ Z[A]. (1) f ∈Hom(π 1 (M ),G) Here, 1 Z is the unit of Z. The DW invariant seems simple; however, there are few examples of the resulting computations and studies of the invariant, unless G is abelian or nilpotent. However, to further explore the invariant (1) and to compute the pairing, it is a problem to examine what kind of ψ we should choose, and how we find an explicit expression of ψ when G is not abelian. Since the Chern-Simons 3-class is, roughly speaking, considered to be an inverse of a transgression of the second Chern-class of the Lie group (see, e.g., [CS] or [DW, §§3–5]), it is sensible to focus on a class of group 3-cocycles as such inverses from second Chern-classes of G with |G| < ∞. For this, if |G| < ∞, notice from the universal coefficient theorem the following isomorphisms among the group (co)-homology: H n+1 β −1 (G; Z) ∼ = H n (G; Z/|G|Z) ∼ = H n (G; Q/Z) ∼ = H n (G; Z), (2) where the first isomorphism is given by the inverse of the Bockstein map from |G|-times 0 −→ Z −−−−−−→ Z −→ Z/|G|Z −→ 0 (exact). 1 E-mail address: nosaka@math.titech.ac.jp 1 (3)" 2312.10404v1,"Node-downloadable frequency transfer system based on a mode-locked laser with over 100 km of fiber Ziyi Jin, 1 Ziyang Chen, 2, ∗ Kai Wu, 1 Dongrui Yu, 2 Guohua Wu, 1 Song Yu, 1 Bin Luo, 1 and Hong Guo 2, † 1 State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China 2 State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China (Dated: December 19, 2023) To meet the requirements of time-frequency networks and enable frequency downloadability for nodes along the link, we demonstrated the extraction of stable frequency signals at nodes using a mode-locked laser under the condition of 100 km laboratory fiber. The node consists of a simple structure that utilizes widely used optoelectronic devices and enables plug-and-play applications. In addition, the node can recover frequency signals with multiple frequencies, which are useful for scenarios that require different frequencies. Here, we experimentally demonstrated a short-term frequency instability of 2.83×10 −13 @1 s and a long-term frequency instability of 1.18×10 −15 @10,000 s at the node, which is similar to that at the remote site of the frequency transfer system. At the same time, frequency signals with different frequencies also achieved stable extraction with the same performance at the node. Our results can support the distributed application under large-scale timefrequency networks. INTRODUCTION With the rapid development of atomic clocks, a large variety of applications require precise time-frequency standards such as geodesy, fundamental physics, and other areas[1–9]. The construction of a high-precision multi-user time-frequency transfer network is an important issue. In recent years, optical time-frequency transfer technology has developed rapidly[10–28]. Timefrequency transfer based on modulated-laser technology has been tested at a distance of 3,000 km[10, 13]. Through optical frequency transfer technology, the synchronization ability of high-precision optical clock networks can be realized[14–18]. It is worth mentioning that the time-frequency transfer system based on optical frequency comb (OFC) has also reached a new stage that opens a new pathway for time and frequency transfer[19– 24, 28, 29]. As an excellent transmission medium for optical waves, fiber has the advantages of high bandwidth, low attenuation, and anti-interference. Fiber-based time and frequency transfer has been widely demonstrated to be one of the mature technologies for long-distance time and frequency transfer[10–15, 18, 19, 25–27]. Fiber-based time-frequency transfer technology has the potential to facilitate the establishment of time-frequency transfer networks efficiently. In the past few decades, various multi-node time-frequency network schemes have been proposed in addition to various point-to-point technical systems[30–42]. Grosche et al. proposed a method that can obtain a frequency at any node in the optical fiber link of the time-frequency transfer system[30]. This ∗ E-mail: chenziyang@pku.edu.cn † E-mail: hongguo@pku.edu.cn method can form a bus topology time-frequency transfer network. Gao et al.[31] and Krehlik et al.[32] also proposed similar methods. Sliwczynski et al. improved the above method so that not only nodes but also side branches can be added to the main chain to form a tree topology network[33]. Schediwy et al. also proposed a multi-address transmission scheme that can form a star topology type network[34]. Besides the scheme above, numerous analogous works have been accomplished and have achieved favorable outcomes[35–42]. Practical technical support and research foundation for the construction of large-scale time-frequency networks are provided by these technologies. However, in order to achieve efficient node downloadable technology, there are usually two considerations at the node. First is the complexity of the node system, and second is using different frequency signals at the node. Although the above scheme has many advantages in accuracy and scalability, the node system’s complexity and the reference signal frequency limitation can be further optimized. In this paper, in order to simultaneously obtain different frequency signals at the node and simplify the node structure, we propose and experimentally verify a plugand-play node-downloadable frequency transfer scheme based on mode-locked-laser (MLL) technology that allows recovering frequency signals at nodes. To achieve this goal, the light source used in this scheme is an MLL source that is locked to the clock signal through multicollaborative feedback control locking technology to resist rapid and drastic environmental changes. A highprecision direct digital synthesizer (DDS) compensates for the phase drift introduced during transmission. The node fully utilizes the multi-harmonic characteristics of the MLL by using common experimental devices such as filters and mixers, which can download different fre-" 2312.10405v1,"SHS Web of Conferences 179, 04008 (2023) ICHESS 2023 https://doi.org/10.1051/shsconf/202317904008 The Fallacy of Borda Count Method - Why it is Useless with Group Intelligence and Shouldn’t be Used with Big Data including Banking Customer Services Hao Wang* CEO & Founder, Ratidar Technologies LLC, Beijing, China Abstract. Borda Count Method is an important theory in the field of voting theory. The basic idea and implementation methodology behind the approach is simple and straight forward. Borda Count Method has been used in sports award evaluations and many other scenarios, and therefore is an important aspect of our society. An often ignored ground truth is that online cultural rating platforms such as Douban.com and Goodreads.com often adopt integer rating values for large scale public audience, and therefore leading to Poisson/Pareto behavior. In this paper, we rely on the theory developed by Wang from 2021 to 2023 to demonstrate that online cultural rating platform rating data often evolve into Poisson/Pareto behavior, and individualistic voting preferences are predictable without any data input, so Borda Count Method (or, Range Voting Method) has intrinsic fallacy and should not be used as a voting theory method. 1. INTRODUCTION Borda Count Method is an important voting theory research subject. The idea of Borda Count Method is to give n votes for the n-star candidate, and evaluate the final score in sum total. For example, online cultural rating platforms adopt range voting methodology for their UGC content, which can be deemed as a variant of the Borda Count Method. This voting methodology leads to the following discovery: On Douban.com and Goodreads.com, scientists [1][2][3][4] discovered that the 5-star cultural products (books / movies / music) usually receive 4 times more raters than 1 star cultural products. This is actually compatible with intuition because the more popular a movie is, the more audience it will enlist. Borda Count Method is reported to be adopted in various customer services evaluation processes as well. For example, in the banking system, some customer service systems ask the customers to rate the banking accountants using 1 to n stars. The Golden Globe Award evaluation procedure also uses Borda Count Method. In 2021, Wang [1] discovered that without using data inputs, we could predict individualistic user preference on online cultural rating platforms by assuming the rating behavior follows Poisson / Pareto behavior. The reason why rating behavior follows Poisson / Pareto is mostly by experimental observation on large-scale social science datasets such as MovieLens [6] and LDOS- CoMoDa [7] datasets. The implications of the series of zeroshot learning methods proposed by Wang [1][2][3][4] are that Borda Count Method as a voting mechanism leads to results * that are predictable without any reference to the actual voting data with a fair level of accuracy. In this paper, we discuss this discovery in details and disclose the deep insight we’ve found as a consequence. We suggest policy makers to eliminate the Borda Count Method / Range Voting Method as a voting mechanism from any voting evaluation process. 2. RELATED WORK Borda Count Method is an important voting theory topic. The method was proposed in 1770 by French scientist and has bee circulating in the next centuries, although it is believed the first adoption of the method is much earlier. An often neglected technical area by social scientists is recommender sytem. Recommender system have experienced an outburst of innovation and invention, including shallow models [8][9][10] and deep neural networks [11][12][13]. Another issue has arised that attracts the attention from the research circle is fairness [14][15]. In 2023, Wang analyzed the evolution behavior of online rating platform data [16] and discovered that the rating behavior follows non-homogeneous Poisson process. Prior to that, ZeroMat [1], DotMat [2], PoissonMat [3], Pareto Pairwise Ranking [4], among a series of algorithms were proposed to generate dataagnostic results for recommendation and personalization tasks. Corresponding author: haow85@live.com © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/)." 2312.10411v1,"Received XX Month, XXXX; revised XX Month, XXXX; accepted XX Month, XXXX; Date of publication XX Month, XXXX; date of current version XX Month, XXXX. Digital Object Identifier 10.1109/OJIM.2022.1234567 Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data Youssra Cheriguene 1,3 , Wael Jaafar 2 , Senior Member, IEEE. Halim Yanikomeroglu 3 , Fellow, IEEE. and Chaker Abdelaziz Kerrache 1 1 Laboratoire d’Informatique et de Mathématiques, Université Amar Telidji de Laghouat, Laghouat, Algeria, Department of Software and Information Technology Engineering, École de Technologie Supérieure, Montreal, QC, Canada 3 Non-Terrestrial Network (NTN) lab, Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada 2 CORRESPONDING AUTHOR: Youssra Cheriguene (e-mail: y.cheriguene@lagh-univ.dz). ABSTRACT Federated Learning (FL) is a decentralized machine learning (ML) technique that allows a number of participants to train an ML model collaboratively without having to share their private local datasets with others. When participants are unmanned aerial vehicles (UAVs), UAV-enabled FL would experience heterogeneity due to the majorly skewed (non-independent and identically distributed -IID) collected data. In addition, UAVs may demonstrate unintentional misbehavior in which the latter may fail to send updates to the FL server due, for instance, to UAVs’ disconnectivity from the FL system caused by high mobility, unavailability, or battery depletion. Such challenges may significantly affect the convergence of the FL model. A recent way to tackle these challenges is client selection, based on customized criteria that consider UAV computing power and energy consumption. However, most existing client selection schemes neglected the participants’ reliability. Indeed, FL can be targeted by poisoning attacks, in which malicious UAVs upload poisonous local models to the FL server, by either providing targeted false predictions for specifically chosen inputs or by compromising the global model’s accuracy through tampering with the local model. Hence, we propose in this paper a novel client selection scheme that enhances convergence by prioritizing fast UAVs with high-reliability scores, while eliminating malicious UAVs from training. Through experiments, we assess the effectiveness of our scheme in resisting different attack scenarios, in terms of convergence and achieved model accuracy. Finally, we demonstrate the performance superiority of the proposed approach compared to baseline methods. INDEX TERMS Unmanned aerial vehicle, UAV, federated learning, model poisoning, dropouts, stragglers, edge computing. I. Introduction M ACHINE achine Learning (ML)-assisted techniques are garnering an increasing interest in various research disciplines, including unmanned aerial vehicle (UAV)- enabled wireless networks, as a result of the booming traffic data, the rising deployment of UAVs, and reduced costs [1]– [3]. Specifically, UAVs are extensively employed for data collection and offloading [1], [2], which may be complex due to environment and user quality-of-service (QoS) requirements’ unpredictable changes. Thus, the development of intelligent management schemes for related applications, e.g., based on ML, is needed. Conventional ML algorithms are cloud-centric, which makes them inappropriate for stringent QoS and UAV-enabled wireless networks. Indeed, relying on the cloud may expose sensitive information, such as the UAVs’ locations and IDs, to attacks, besides increasing the UAVs’ energy and bandwidth consumption needed for data transmissions. To bypass this risk, federated edge learning (FEEL) has been recently introduced [4], [5], where UAVs distributively train models on their local datasets without exposing their raw data through transmissions. However, UAV-based FEEL faces several challenges, such as statistical heterogeneity and system heterogeneity. Indeed, due to the different locations of UAVs, collected data is significantly skewed, i.e., non-independent and identically distributed (non-IID). Moreover, the differences in UAVs’ storage, computing, and power consumption, affect the latter’s data collection and model training quality. Hence, system hetero- This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME , 1" 2312.10416v1,"Hundred-Femtosecond-Level Concise Optical Time Delay Measurement System Based on Linear Optical Sampling Yufei Zhang, 1 Ziyang Chen, 1, ∗ Dongrui Yu, 1 Jialin Niu, 2 Xing Chen, 2 and Hong Guo 1, ∗ 1 State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China 2 State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China (Dated: December 19, 2023) Fiber-delay measurement is one of the key fundamental technologies in numerous fields. Here we propose and experimentally demonstrate a high-precision and concise optical time delay measurement system based on the technique of linear optical sampling, reaching the precision better than 100 fs under averaging. The use of only two optical frequency combs without locking the carrier-envelope-offset frequency greatly simplifies the structure of the time-delay measurement system. We also experimentally investigate the current limitations on the precision of the system. The timing jitter noises of two sources are mainly non-common mode, and are both restricted to the frequency sources. Our results indicate that the proposed device can measure fiber length fluctuations below 10 µm, paving the way for further analyses of the external disturbances on the fiber link. INTRODUCTION Optical fiber has extremely high sensitivity to external physical disturbances such as temperature, strain, pressure, etc.[1] Therefore, optical fiber sensors have important applications in many fields, specifically, monitoring of aeroplanes, oil and gas industries, railway infrastructure, geologic CO 2 sequestration, and sensing of temperature vibration, structural health of infrastructure etc.[2–6] In optical fiber sensors, how to measure the length of optical fiber with high precision and the length fluctuations caused by external disturbances is a basic and significant problem. In fact, measuring the length of the optical fiber and measuring the propagation delay of the optical pulse in the optical fiber can be transformed into each other. At present, the widely used optical fiber length measurement methods mainly include optical time domain reflectometry (OTDR) and optical frequency domain reflectometry (OFDR).[1] The measurement is taken by coupling the optical pulse at one end of the fiber under test (FUT) and receiving the Rayleigh, Brillouin or Raman scattering signal generated by its propagation, and measuring the optical time delay t corresponding to the two events in the time domain or frequency domain. Measurement v of fiber length yields z = 2 g t, where v g is the group velocity propagating in the fiber. Its measurement accuracy ∆z = v g τ 2 mainly depends on the pulse width τ, which is generally on the order of millimeters to meters.[1] Another solution for measuring the length of optical fiber is realized by using a frequency-shifted asymmetric Sagnac interferometer.[7] The basic idea is that light of different frequencies will produce different phase delays when propagating in the same section of optical fiber, and this phase delay difference containing information about the length of the optical fiber can be measured by an interferometer. When using this method to measure 10 5 ∗ The authors to whom correspondence may be addressed: chenziyang@pku.edu.cn, hongguo@pku.edu.cn. m fiber, the accuracy reaches the highest value 10 −6 , corresponding to an absolute resolution of 0.1 m. Furthermore, researchers achieved ±1 ps accuracy by measuring the peakto-peak value of fiber delay fluctuation.[8] However, although these existing schemes can basically meet the general industrial applications, their devices are still relatively complex and have limited accuracy, which are still insufficient for higher-precision scientific applications such as geodesy,[9–12] navigation[13, 14] and basic sciences.[11, 15, 16] In this paper, we propose a concise optical fiber time delay measurement device, whose basic idea is to magnify the tiny time interval by the method of linear optical sampling (LOS)[17–23] for measurement. Our system uses two mode-locked lasers with a repetition frequency difference ∆ f r , and the pulse train of one laser beats with the pulse train of the other laser after passing through the FUT. Through the LOS process in the time domain and postprocessing methods such as Hilbert filtering and Gaussian fitting, the magnification of the tiny delay in the time domain is realized with the factor f r ∆ +∆ f r f r ≈ 10 5 . In the experiment, we use an adjustable fiber delay line as the FUT. Under the delay step value of 10 ps, the standard error of mean of single-point delay measurements reaches an accuracy of less than 100 fs. That is to say, the new concise device we propose realizes the measurement of the fiber delay with an accuracy of 100 fs, corresponding to the fiber length measurement accuracy of 10 −5 m. This means that the proposed device can measure fiber length fluctuations on the order of 10 µm, and further analyze the impact of external environment changes on the fiber link. We believe that this concise device has the prospect of further integration and miniaturization, and its potential advantages of high measurement accuracy are expected to open a new pathway in the fields of optical fiber sensing and highprecision metrology. In this paper, we first describe the high precision optical time delay measurement, within which the experimental setup and the data processing are introduced. Then we present the main results and discussions. A summary of the paper is given at the end. As for the principles of optical time delay measure-" 2312.10419v1,"1 A Survey on Robotic Manipulation of Deformable Objects: Recent Advances, Open Challenges and New Frontiers Feida Gu, Yanmin Zhou, Zhipeng Wang, Shuo Jiang, Bin He Abstract—Deformable object manipulation (DOM) for robots has a wide range of applications in various fields such as industrial, service and health care sectors. However, compared to manipulation of rigid objects, DOM poses significant challenges for robotic perception, modeling and manipulation, due to the infinite dimensionality of the state space of deformable objects (DOs) and the complexity of their dynamics. The development of computer graphics and machine learning has enabled novel techniques for DOM. These techniques, based on data-driven paradigms, can address some of the challenges that analytical approaches of DOM face. However, some existing reviews do not include all aspects of DOM, and some previous reviews do not summarize data-driven approaches adequately. In this article, we survey more than 150 relevant studies (data-driven approaches mainly) and summarize recent advances, open challenges, and new frontiers for aspects of perception, modeling and manipulation for DOs. Particularly, we summarize initial progress made by Large Language Models (LLMs) in robotic manipulation, and indicates some valuable directions for further research. We believe that integrating data-driven approaches and analytical approaches can provide viable solutions to open challenges of DOM. Impact Statement—The manipulation of deformable objects is very common in industry or daily life. The applications of deformable object manipulation in industry can create enormous economic benefits, and the applications in daily life can improve quality of life, especially for people with disabilities and the elderly. Robotic manipulation tasks such as food handling, assistive dressing or clothing folding require open problems of perception, modeling and manipulation of deformable objects to be solved. Recent advances in machine learning have addressed some of the limitations of traditional approaches. Combining analytical and data-driven approaches holds the potential to bring the manipulation capabilities of robots close to that of humans. This paper systematically reviews various approaches to robotic manipulation of deformable objects, providing a quick reference for researchers and practitioners in different fields. Research supported by the National Natural Science Foundation of China under Grant 61825303, Grant 51975415, Grant 62088101; in part by the Shanghai Municipal Science and Technology Major Project under Grant 2021SHZDZX0100; in part by the Shanghai Municipal Commission of Science and Technology Project under Grant 22ZR1467100.(Corresponding author: Zhipeng Wang.) Feida Gu is with Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai 201804, China, with National Key Laboratory of Autonomous Intelligent Unmanned Systems, Shanghai 201210, China, and also with the Frontiers Science Center for Intelligent Autonomous Systems, Shanghai 200120, China (e-mail: feidagu@tongji.edu.cn). Yanmin Zhou, Zhipeng Wang, Shuo Jiang, Bin He are with the Department of Control Science and Engineering, Tongji University, Shanghai 201804, China, with National Key Laboratory of Autonomous Intelligent Unmanned Systems, Shanghai 201210, China, and also with the Frontiers Science Center for Intelligent Autonomous Systems, Shanghai 200120, China (e-mail: yanmin.zhou@tongji.edu.cn; wangzhipeng@tongji.edu.cn; jiangshuo@tongji.edu.cn; hebin@tongji.edu.cn). Additionally, the paper provides insights into open research areas in the field and points out promising future research such as LLMs for robotic manipulation. Index Terms—Robotic manipulation, deformable objects, machine learning, perception, modeling I. I NTRODUCTION T HE ability to manipulate objects is an essential feature of robots, as the definition of a robot requires it to exert influence on its surroundings. Over the past decades, research on robot manipulation has progressed considerably, aiming to utilize cost-effective robotic arms and end-effectors to directly interact with the world and accomplish their objectives [1]. Object rigidity is a common assumption in robot manipulation [2]. However, this assumption does not hold for all objects and scenarios, as any object can deform under the application of external forces. The rigidity assumption is only valid when the object deformation is negligible for the manipulation task. However, many objects present non-negligible deformations during robotic manipulation tasks. Enabling robots to manipulate DOs opens up a wide range of potential applications in various fields such as industrial manufacturing, medical surgery, food processing and elderly care. These applications have the potential to generate substantial economic benefits. Fig. 1. gives some application examples in various sectors. In manufacturing plants, robots can manipulate DOs to alleviate physical burden on workers [3]–[6]. In the medical field, robots can assist in various surgeries [7]–[10]. The use of robots in the food processing can reduce labor costs [11]–[14]. Robots can assist the elderly and the disabled in their daily living activities [15]–[18]. Despite its importance, DOM has historically been less studied than manipulation of rigid objects since its complexity of perception, modeling and manipulation. When manipulating DOs, the planning strategy of a robotic system (shown in Fig. 2.) should not only focus on the motion of a robot, but also need to consider the DOs being manipulated. However, DOs have infinite dimensionality and complex dynamics, making DOM extremely challenging. Recent developments in computer graphics and machine learning provide useful techniques for DOM. Data-driven methods can address some of the limitations of traditional DOM approaches [19], [20]. The review surveyed by Kadi and Terzic [21] only focuses on manipulation of clothing using data-driven approaches. Some past reviews [22]–[24] focus on modeling DOs without considering perception and manipulation. The previous" 2312.10426v1,"Branch Prediction in Hardcaml for a RISC-V 32im CPU Alex Saveau asaveau@cs.washington.edu Abstract— Accurate branch prediction is a critical part of high performance instruction stream processing. In this paper, I present a hardware implementation of branch prediction for a RV32IM CPU, starting with static decode stage predictions and culminating in the use of BATAGE. In addition, I detail my experience writing the RTL in Hardcaml, a hardware description library for the functional programming language OCaml. troduces new capabilities that are difficult to express in an imperative fashion. A. Paper overview The paper is organized as follows. First, I very briefly introduce the processor, followed by an explanation of each implemented branch prediction technique. Then, I present an evaluation of each technique, followed by future work to further improve the processor. Finally, I describe the key advantages offered by Hardcaml over the course of the processor’s development. I. Introduction II. CPU overview Branch prediction is a crucial part of any high performance processor and continues to rise in importance as instruction windows become larger. In fact, there is a cap on the performance of a processor that does not execute both branch directions simultaneously tied to branch prediction accuracy [1]. Consider a mispredicted branch: it effectively acts as a synchronization barrier, requiring all of its dependencies to be completed before the processor can move forward. By Amdahl’s law, if all of those dependedon instructions were completed instantly, the next batch of instructions following the branch would be blocked on the branch instruction’s flow through the processor’s pipeline, thus limiting performance to the processing time of mispredicted branches (assuming all other bottlenecks have been obviated). Minimizing branch mispredictions is therefore a key method for improving processor performance. While the concept of branch prediction is simple, an implementation that takes advantage of all possible control transfer related optimizations requires a myriad of techniques in different pipeline stages. Superscalar architectures or strict timing requirements further exacerbate the complexity of accurate branch prediction, for example introducing new opportunities such as predicated instruction inference for short branches [2] or requiring pipelined predictions and predictor updates [3]. This paper’s implementation primarily focuses on branch prediction accuracy, but does include enough optimizations to run at 50MHz on an Arty A7-100T FPGA. To write hardware, the industry primarily uses Verilog or VHDL [4]. While the author is not familiar with VHDL, Hardcaml solves a number of problems with Verilog and in- The branch prediction described in this paper was incorporated into a RV32IM processor implemented in Hardcaml. The in-order, scalar CPU consists of 4 pipeline stages—the decode and register load stages are combined due to RISC- V instructions always placing rs1 and rs2 addresses in the same bits of any non-compressed instruction. Both instruction and data memory are stored in SRAM with single-cycle access latency, but no other memories are available and therefore no caches are present. A memory mapped UART port is available for external I/O. Branch prediction verification is performed in the execute stage (thus, instructions in the writeback stage can be considered retired for the purposes of branch prediction) and has a one cycle recovery penalty. III. Branch prediction techniques Different branch prediction techniques must be used depending on the pipeline stage in which the prediction is occuring, whether or not the instruction stream has been encountered before, and the type of control transfer instruction encountered (e.g. a branch vs. a jump). Overall, the goal of a processor’s frontend is to keep the backend full with useful instructions. A. Static branch prediction When an instruction stream has never been encountered before, an informed prediction can be made at the earliest in the decode stage. After decoding an instruction, the processor knows what is about to be executed. For branch prediction purposes in RISC-V, there are three instruction types which can be acted upon: 1" 2312.10434v1,"Inconsistencies in Unstructured Geometric Volume-of-Fluid Methods for Two-Phase Flows with High Density Ratios Jun Liu a , Tobias Tolle b , Davide Zuzio c , Jean-Luc Estivalezes c , Santiago Marquez Damian d , Tomislav Marić a,∗ a Mathematical Modeling and Analysis, Technische Universität Darmstadt, Germany b Bosch Research, Robert Bosch GmbH; research conducted at MMA, Technische Universität Darmstadt c The French Aerospace Lab ONERA, France d Centro de Investigaciones en Mecánica Computacional (CIMEC), UNL/CONICET, Argentina Abstract Geometric flux-based Volume-of-Fluid (VOF) methods [1] are widely considered consistent in handling two-phase flows with high density ratios. However, although the conservation of mass and momentum is consistent for two-phase incompressible single-field Navier-Stokes equations without phase-change [2], discretization may easily introduce small inconsistencies that result in very large errors or catastrophic failure. We apply the consistency conditions derived for the ρLENT unstructured Level Set / Front Tracking method [2] to flux-based geometric VOF methods [1], and implement our discretization into the plicRDF-isoAdvector geometrical VOF method [3]. We find that computing the mass flux by scaling the geometrically computed fluxed phase-specific volume destroys the equivalence between the scaled volume fraction equation and the mass conservation equation, depending on the choice for the temporal and convective term discretization schemes. We propose two solutions. First, based on the analysis of discretization errors, we suggest a consistent combination of the temporal discretization scheme and the interpolation scheme for the momentum convection term. Second, similar to [2], we solve an auxiliary mass conservation equation with a geometrical calculation of the face-centered density. We prove the equivalence between these two approaches mathematically and verify and validate their numerical stability for density ratios of [1,10 6 ] and viscosity ratios of [10 2 ,10 5 ]. Keywords: volume-of-fluid, unstructured, finite volume, high density ratios 1. Introduction Numerical simulation methods still face challenges when dealing with incompressible two-phase flows that involve fluid phases of significantly different densities (high density ratios). We have provided a detailed review of two-phase flow simulation methods that address the challenges in handling high density ratios recently in [2], and here we only list more current literature contributions. ∗ Corresponding author Email addresses: liu@mma.tu-darmstadt.de (Jun Liu), tolle@mma.tu-darmstadt.de (Tobias Tolle), Davide.Zuzio@onera.fr (Davide Zuzio), Jean-Luc.Estivalezes@onera.fr (Jean-Luc Estivalezes), santiagomarquezd@gmail.com (Santiago Marquez Damian), maric@mma.tu-darmstadt.de (Tomislav Marić)" 2312.10435v1,"Uncertainty Quantification in Heterogeneous Treatment Effect Estimation with Gaussian-Process-Based Partially Linear Model Shunsuke Horii 1 , Yoichi Chikahara 2 1 Center for Data Science, Waseda University, Tokyo, Japan NTT Communication Science Laboratories, Kyoto, Japan s.horii@waseda.jp, chikahara.yoichi@gmail.com 2 Abstract Estimating heterogeneous treatment effects across individuals has attracted growing attention as a statistical tool for performing critical decision-making. We propose a Bayesian inference framework that quantifies the uncertainty in treatment effect estimation to support decision-making in a relatively small sample size setting. Our proposed model places Gaussian process priors on the nonparametric components of a semiparametric model called a partially linear model. This model formulation has three advantages. First, we can analytically compute the posterior distribution of a treatment effect without relying on the computationally demanding posterior approximation. Second, we can guarantee that the posterior distribution concentrates around the true one as the sample size goes to infinity. Third, we can incorporate prior knowledge about a treatment effect into the prior distribution, improving the estimation efficiency. Our experimental results show that even in the small sample size setting, our method can accurately estimate the heterogeneous treatment effects and effectively quantify its estimation uncertainty. 1 Introduction Assessing heterogeneous treatment effects across individuals provides a key foundation for making critical decisions. For instance, understanding how greatly medical treatment effects are different across patients is helpful for precision medicine, and evaluating the impact of education programs on learning outcomes is essential for personalized learning. A widely used treatment effect measure is a conditional average treatment effect (CATE), which is an average treatment effect across individuals with identical feature attributes. CATE estimation is challenging when the number of features of an individual is large. Many methods aim to express the complex nonlinearity between treatment effects and features, using a nonparametric regression model, such as tree-based models (Hahn, Murray, and Carvalho 2020; Hill 2011; Wager and Athey 2018) and neural networks (Johansson, Shalit, and Sontag 2016; Shalit, Johansson, and Sontag 2017; Yoon, Jordon, and Van Der Schaar 2018; Wu et al. 2023). However, most of these methods only output a singlepoint estimate and cannot consider the uncertainty in CATE Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. estimation. This drawback is fatal because decision-making under uncertainty is usual in many applications, especially when we can only access a small amount of observational data. An obvious example would be medical treatment planning. For example, in the US, more than half of hospitals have fewer beds than 100 (Wiens, Guttag, and Horvitz 2014), illustrating the difficulty of obtaining large-scale data and the importance of considering the uncertainty. To support decision-making in such critical applications, we propose a Bayesian framework for quantifying the CATE estimation uncertainty. To deal with a small sample size setting, we focus on a semi-parametric model called a partially linear model (Engle et al. 1986), which is linear with respect to the treatment but is nonlinear with respect to features, thanks to the nonparametric components. Our key idea is to place Gaussian process priors on the nonparametric components in a partially linear model. This idea has three advantages. First, we can analytically compute the posterior distribution of CATE. Such analytical computation is much more computationally efficient than the approximate Bayesian inference, which is required with the complex tree-based models (Hahn, Murray, and Carvalho 2020). Second, we can theoretically guarantee the asymptotic consistency of the posterior distribution of CATE under some mild conditions. This theoretical guarantee also makes a striking contrast with the tree-based models, which have no consistency guarantee due to their model complexity. Third, we can incorporate the prior knowledge about the CATE to improve the estimation accuracy. To take prior knowledge example, consider the education program evaluation, where it is known that past academic performance is an important feature called a treatment effect modifier (Hernán and Robins 2020, Chapter 4), which affects the effect of an education program (Yeager et al. 2019). We can utilize this prior knowledge by designing the kernel functions used in the Gaussian process priors. By contrast, integrating such prior knowledge is impossible with the existing Gaussianprocess-based model (Alaa and van der Schaar 2018), which puts the priors not on the CATE but on the outcomes. Furthermore, our method can address not only binary treatment but also continuous-valued treatment (Hirano and Imbens 2004), which widens the scope of applications and is helpful, for instance, in determining the appropriate drug dosage for precision medicine (Bica, Jordon, and van der Schaar 2020)." 2312.10464v1,"Unveiling Empirical Pathologies of Laplace Approximation for Uncertainty Estimation Maksim Zhdanov 1 , Stanislav Dereka 1, 2 , Sergey Kolesnikov 1 1 Tinkoff Moscow Institute of Physics and Technology {m.a.zhdanov,s.dereka,s.s.kolesnikov}@tinkoff.ru 2 Abstract In this paper, we critically evaluate Bayesian methods for uncertainty estimation in deep learning, focusing on the widely applied Laplace approximation and its variants. Our findings reveal that the conventional method of fitting the Hessian matrix negatively impacts out-of-distribution (OOD) detection efficiency. We propose a different point of view, asserting that focusing solely on optimizing prior precision can yield more accurate uncertainty estimates in OOD detection while preserving adequate calibration metrics. Moreover, we demonstrate that this property is not connected to the training stage of a model but rather to its intrinsic properties. Through extensive experimental evaluation, we establish the superiority of our simplified approach over traditional methods in the out-of-distribution domain. Introduction Deep neural networks (DNNs) have emerged as a powerful tool in a myriad of applications, ranging from computer vision (Liu et al. 2022) to natural language processing (Vaswani et al. 2017). Their ability to model complex patterns and make highly accurate predictions has revolutionized several domains. However, a significant issue with DNNs is their tendency to be overconfident in their predictions on out-of-distribution samples (Nguyen, Yosinski, and Clune 2015), often leading to misguided trust in their decisions, especially when they encounter data that deviate from their training set (Hendrycks, Mazeika, and Dietterich 2018). This overconfidence underlines the critical importance of uncertainty estimation and out-of-distribution (OOD) detection in neural networks. Uncertainty estimation involves quantifying the confidence of a neural network in its predictions, providing a measure of reliability. OOD detection, on the other hand, focuses on identifying instances that are significantly different from the training data, which are often the cases where the network’s predictions are less reliable. In addressing these challenges, Bayesian approaches (Jospin et al. 2022) have gained prominence for uncertainty estimation in neural networks. Among the various Bayesian techniques, the simple and computationally effective Laplace approximation (MacKay 1992) has been par- Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. ticularly influential. This approach simplifies the complex Bayesian inference problem by approximating the posterior distribution of the model’s weights with a Gaussian, centered at the point of maximum likelihood. The availability of various types of this approximation makes Bayesian inference computationally feasible for large neural networks. Further developments in this area include modifications to the classic Laplace Approximation, such as the last-layer Laplace approximation (Kristiadi, Hein, and Hennig 2020). This variant focuses on approximating the posterior only for the weights of the final layer of the network, under the assumption that the last layer primarily determines the uncertainty. This assumption allows for a significant reduction in computational complexity while retaining much of the benefit of the full Laplace approximation. Contrastingly, some research challenges the need for complex Bayesian methods in uncertainty estimation. Notably, studies have shown that deep ensembles (DE), a more straightforward non-Bayesian method, can provide uncertainty estimates that are on par or better (Lakshminarayanan, Pritzel, and Blundell 2017). This raises the question of whether simpler methods might suffice in practical applications. Our research contributes to this debate by suggesting that merely optimizing the prior precision for Laplace approximation (Immer, Korzepa, and Bauer 2021), bypassing the need to fit the Hessian matrix as in traditional approaches, can lead to robust and reliable OOD detection. This streamlined approach not only questions the status quo in Bayesian techniques but also aligns with the increasing demand for efficient, deployable AI systems that guarantee trustworthy and safe predictions (Li et al. 2023). The key contributions of our study are as follows: • We uncover an intriguing phenomenon where the Laplace approximation, devoid of Hessian matrix computations, outperforms various established versions of the method. • We conduct empirical evaluations of this characteristic across OOD detection tasks, using datasets like CIFAR- 10, CIFAR-100, ImageNet-200, and a toy binary classification dataset. Moreover, we show that our method preserves calibration metrics. • We demonstrate that the observed phenomenon is unrelated to the learning dynamics of the network, suggest-" 2312.10466v1,"RIGHT: Retrieval-augmented Generation for Mainstream Hashtag Recommendation Run-Ze Fan 1,2[0000−0002−8505−7756] , Yixing Fan 1,2[0000−0003−4317−2702] , Jiangui Chen 1,2[0000−0002−6235−6526] , Jiafeng Guo 1,2⋆[0000−0002−9509−8674] , Ruqing Zhang 1,2[0000−0003−4294−2541] , and Xueqi Cheng 1,2[0000−0002−5201−8195] CAS Key Lab of Network Data Science and Technology, ICT, CAS 2 University of Chinese Academy of Sciences, Beijing, China fanrunze21s@ict.ac.cn {fanyixing, chenjiangui18z, guojiafeng, zhangruqing, cxq}@ict.ac.cn 1 Abstract. Automatic mainstream hashtag recommendation aims to accurately provide users with concise and popular topical hashtags before publication. Generally, mainstream hashtag recommendation faces challenges in the comprehensive difficulty of newly posted tweets in response to new topics, and the accurate identification of mainstream hashtags beyond semantic correctness. However, previous retrieval-based methods based on a fixed predefined mainstream hashtag list excel in producing mainstream hashtags, but fail to understand the constant flow of upto-date information. Conversely, generation-based methods demonstrate a superior ability to comprehend newly posted tweets, but their capacity is constrained to identifying mainstream hashtags without additional features. Inspired by the recent success of the retrieval-augmented technique, in this work, we attempt to adopt this framework to combine the advantages of both approaches. Meantime, with the help of the generator component, we could rethink how to further improve the quality of the retriever component at a low cost. Therefore, we propose RetrIevalaugmented Generative Mainstream HashTag Recommender (RIGHT), which consists of three components: (i) a retriever seeks relevant hashtags from the entire tweet-hashtags set; (ii) a selector enhances mainstream identification by introducing global signals; and (iii) a generator incorporates input tweets and selected hashtags to directly generate the desired hashtags. The experimental results show that our method achieves significant improvements over state-of-the-art baselines. Moreover, RIGHT can be easily integrated into large language models, improving the performance of ChatGPT by more than 10%. Code will be released at: https://github.com/ict-bigdatalab/RIGHT. Keywords: Hashtag recommendation · Retrieval-augmented generation · Social media. ⋆ Corresponding author" 2312.10486v1,"Time-Constrained Continuous Subgraph Matching Using Temporal Information for Filtering and Backtracking Seunghwan Min † , Jihoon Jang † , Kunsoo Park ∗† , Dora Giammarresi ‡ , Giuseppe F. Italiano § , Wook-Shin Han ¶ † § ‡ Seoul National University, South Korea Università Roma “Tor Vergata” ¶ LUISS University, Italy Pohang University of Science and Technology (POSTECH), South Korea † ‡ {shmin,jhjang,kpark}@theory.snu.ac.kr giammarr@mat.uniroma2.it § ¶ gitaliano@luiss.it wshan@dblab.postech.ac.kr Abstract—Real-time analysis of graphs containing temporal information, such as social media streams, Q&A networks, and cyber data sources, plays an important role in various applications. Among them, detecting patterns is one of the fundamental graph analysis problems. In this paper, we study time-constrained continuous subgraph matching, which detects a pattern with a strict partial order on the edge set in realtime whenever a temporal data graph changes over time. We propose a new algorithm based on two novel techniques. First, we introduce a filtering technique called time-constrained matchable edge that uses temporal information for filtering with polynomial space. Second, we develop time-constrained pruning techniques that reduce the search space by pruning some of the parallel edges in backtracking, utilizing temporal information. Extensive experiments on real and synthetic datasets show that our approach outperforms the state-of-the-art algorithm by up to two orders of magnitude in terms of query processing time. Index Terms—time-constrained continuous subgraph matching, temporal order, time-constrained matchable edge, max-min timestamp, time-constrained pruning I. I NTRODUCTION Graphs are structures widely used to represent relationships between objects. For example, communication between users on social media, financial transactions between bank accounts, and computer network traffic can be modeled as graphs. In many cases, relationships between objects in real-world graph datasets contain temporal information about when they occurred. A graph containing temporal information is called a temporal graph. Social media streams [1], [2], Q&A networks [3], and cyber data sources [4], [5] such as computer network traffic and financial transaction networks, are examples of temporal graphs. There has been extensive research on the efficient analysis of temporal graphs such as graph mining [6], [7], graph simulation [8], [9], motif counting [10], [11], subgraph matching [12]–[14], and network clustering [15]. In this paper, we model a temporal data graph as a streaming graph [16] and address continuous subgraph matching on temporal graphs called time-constrained continuous subgraph matching [17]. Given a temporal data graph G and a temporal query graph q, the time-constrained continuous subgraph matching problem ∗ Contact author Fig. 1: DDoS attack pattern in network traffic is to find all matches of q that are isomorphic to q and satisfy the temporal order of q over the streaming graph of G. By considering the temporal order along with the topological structure, one can more clearly represent various real-world scenarios, such as tracking the flow of money in financial transaction networks and monitoring the flow of packets in computer network traffic. Thus, time-constrained continuous subgraph matching is a fundamental problem that can play an important role in applications such as money laundering detection and cyber attack detection [17]. The query depicted in Figure 1 illustrates the essential pattern in DDoS attacks. Each zombie computer (Zombie i ) is infected through one of multiple contamination paths, which is not shown in the query graph. The zombies receive commands from the attacker (t i,1 ), and then they attack the victim (t i,2 ). Thus there is a temporal order t i,1 ≺ t i,2 for each i. Realworld DDoS attacks can be more complex than the query pattern in Figure 1, but they include the query pattern as a subgraph because the query pattern is the core of DDoS attacks. Hence, by detecting and recognizing the query pattern in network traffic data, one can identify real-world DDoS attacks that include the query pattern as a subgraph (note that one can identify the attacker by using this query pattern!). US communications company Verizon has analyzed 100,000 security incidents from the past decade that reveal that 90% of the incidents fall into ten attack patterns [18], which can be described as graph patterns. Many researchers have studied the continuous subgraph matching problem on non-temporal graphs [19]–[23]. It is possible to solve the time-constrained continuous subgraph matching problem with these algorithms. However, these algorithms also find matches that do not satisfy the temporal order, which we don’t need. Therefore, we have to remove" 2312.10495v1,"1 Computing Optimal Joint Chance Constrained Control Policies Niklas Schmid, Marta Fochesato, Sarah H.Q. Li, Tobias Sutter, John Lygeros Abstract— We consider the problem of optimally controlling stochastic, Markovian systems subject to joint chance constraints over a finite-time horizon. For such problems, standard Dynamic Programming is inapplicable due to the time correlation of the joint chance constraints, which calls for non-Markovian, and possibly stochastic, policies. Hence, despite the popularity of this problem, solution approaches capable of providing provably-optimal and easyto-compute policies are still missing. We fill this gap by introducing an augmented binary state to the system dynamics, allowing us to characterize the optimal policies and propose a Dynamic Programming based solution method. Our analysis provides a deep insight into the impact of joint chance constraints on the optimal control policies. Index Terms— Stochastic Optimal Control, Joint Chance Constrained Programming, Dynamic Programming. I. I NTRODUCTION Many real-world control applications come with the requirement for safety certificates, for example in air-traffic control [1], [2], self-driving cars [3], robot path planning [4] or medicine [5]. In the wake of the rapid emergence of ever more complex safety-critical control problems involving stochastic systems, there is a growing need for optimal control tools outputting actions that are provably safe and easy to compute. Safety is commonly defined via a predefined set of safe states, in the sense that any state trajectory leaving the safe set during the control task is considered unsafe. For stochastic systems, safety can only be guaranteed up to some predefined probability. This leads to the definition of so-called joint chance constraints, i.e., constraints that bound the probability to be unsafe with respect to the entire state trajectory over a finite-time horizon. This is in contrast to stage-wise chance constrained formulations, which bound the probability to be unsafe at every individual time step. Such guarantees are especially popular for infinite-horizon problems as typically addressed in Model Predictive Control since the probability of remaining safe at all time-steps over the infinite trajectory is zero under mild assumptions on the system dynamics [6]– [9]. For the finite-time setting, however, as considered in this paper, we argue that it is generally more meaningful to define safety as a guarantee on the entire trajectory. N. Schmid, M. Fochesato, S.H.Q. Li and J. Lygeros are with the Automatic Control Laboratory (IfA), ETH Zürich, 8092 Zürich, Switzerland {nschmid,mfochesato,huilih,jlygeros}@ethz.ch T. Sutter is ence, University with the Department of Konstanz, 78457 of Computer Sci- Konstanz, Germany tobias.sutter@uni-konstanz.de Work supported by the European Research Council under the Horizon 2020 Advanced under Grant 787845 (OCAL). Despite the ubiquity of joint chance constrained problems [4], [6], [10]–[16], their practical deployment is hindered by their intractability due to (i) the difficulty in evaluating multivariate integrals to check the feasibility of a candidate solution [17]; (ii) the non-convex feasible region described by these constraints; and (iii) the time correlation introduced by the constraints. While (i) and (ii) equally affect stage-wise and joint chance constraints, (iii) is specific to joint chance constraints only. In particular, it is this time correlation which breaks the Markovian structure of the problem [6], forcing us to consider the full problem dimension at once. To circumvent this problem, approximations of joint chance constraints have been proposed in the literature. Perhaps the best known is [4], that exploits Boole’s inequality to break the time correlation, leading to an inner approximation of the constraint set. More recently, [10] proposes to augment the state vector with a function space to fit the standard Dynamic Programming (DP) format. However, the resulting formulation is computationally challenging, even for one-dimensional examples, hindering the development of provably-convergent algorithms. Another recent approach relies on approximating the stochastic system dynamics using kernel distribution embeddings, allowing for data-based scenarios [15]. Motivated by portfolio management applications, [18] studies stochastic optimal control problems with a chance constraint only on the final state, circumventing the problem of time correlations among stages. On a broader scale, joint chance constrained problems have also been explored in combination with Model Predictive Control, approximating the problem using Boole’s inequality and similar bounds [12], [13], [19] or sampling [11], [14], [16]. Similar problems have further been addressed in the reinforcement learning community in the form of general constrained Markov Decision Processes [20]–[24]. To the best of the authors knowledge, no tractable solution to joint chance constrained optimal control problems has been proposed that is not reliant on conservative approximations. This paper aims to develop a deeper understanding of safetyconstrained stochastic optimal control problems where safety is enforced via the use of joint chance constraints over the finite-time horizon of the mission. Specifically, our analysis establishes a novel DP recursion leading to a failure-aware policy that achieves an optimal trade-off between performance and safety. We highlight the following key results of this paper. (i) Characterization of the optimal policies. We propose a DP recursion to handle joint chance constraints in stochastic optimal control problems. The recursion is based on a suitable state augmentation that allows us" 2312.10503v1,"A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter Feng Bao ∗ Zezhong Zhang † Guannan Zhang ‡ Abstract This paper tackles the intricate task of jointly estimating state and parameters in data assimilation for stochastic dynamical systems that are affected by noise and observed only partially. While the concept of “optimal filtering” serves as the customary approach to estimate the state of the target dynamical system, traditional methods such as Kalman filters and particle filters encounter significant challenges when dealing with high-dimensional and nonlinear problems. When we also consider the scenario where the model parameters are unknown, the problem transforms into a joint state-parameter estimation endeavor. Presently, the leading-edge technique known as the Augmented Ensemble Kalman Filter (AugEnKF) addresses this issue by treating unknown parameters as additional state variables and employing the Ensemble Kalman Filter to estimate the augmented state-parameter vector. Despite its considerable progress, AugEnKF does exhibit certain limitations in terms of accuracy and stability. To address these challenges, we introduce an innovative approach, referred to as the United Filter. This method amalgamates a remarkably stable and efficient ensemble score filter (EnSF) for state estimation with a precise direct filter dedicated to online parameter estimation. Utilizing the EnSF’s generative capabilities grounded in diffusion models, the United Filter iteratively fine-tunes both state and parameter estimates within a single temporal data assimilation step. Thanks to the robustness of the EnSF, the proposed method offers a promising solution for enhancing our comprehension and modeling of dynamical systems, as demonstrated by results from numerical experiments. keyword: Optimal filtering, state estimation, parameter estimation, diffusion model, ensemble score filter, Bayesian inference 1 Introduction State and parameter estimation present critical challenges in the field of data assimilation. The state estimation problem typically involves a noise-perturbed stochastic dynamical system, where the state may not be directly observable. Instead, partial noisy observations are used to obtain the optimal estimate for the state of the dynamics. The primary mathematical tool for addressing state estimation is known as “optimal filtering”. The goal of the optimal filtering problem is to construct an approximation for the conditional probability density function (PDF) of the target state conditioning on the observational data, referred to as the “filtering density”, and the optimal state estimation is formulated as the corresponding conditional expectation. Important methods for solving the optimal filtering problem include Bayesian filters such as Kalman-type filters [1, 2, 3, 4] ∗ Department of Mathematics, Florida State University, Tallahassee, Florida, † Department of Mathematics, Florida State University, Tallahassee, Florida. (bao@math.fsu.edu). ‡ Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA. This manuscript has been authored by UT-Battelle, LLC, under contract DE-AC05-00OR22725 with the US Department of Energy (DOE). The US government retains and the publisher, by accepting the article for publication, acknowledges that the US government retains a nonexclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for US government purposes. DOE will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan. 1" 2312.10513v1,"Higher-order Riemannian splines and the interpolation problem: an approach of gradient flows Chun-Chi Lin ∗ and Dung The Tran † December 11, 2023 Keywords: higher-order Riemannian spline, geometric k-spline, Riemannian cubic, spline interpolation MSC(2020): primary 35K52, 49J20; secondary 41A15, 35K25 Abstract In this article, we demonstrate that spline interpolation problems on smooth Riemannian manifolds can be resolved by applying the method of gradient flows proposed here. Our approach appears to be novel in addressing such problems and can be extended to the spline interpolation problem on Lie groups, which are commonly implicated in formulations of mechanical optimal control theory. This approach seems innovative in both optimal and geometric control theory. We provide the existence of global solutions in Hölder spaces for the gradient flow, whose asymptotic limits establish the existence of Riemannian splines, thereby offering solutions to spline interpolation problems on smooth Riemannian manifolds. 1 Introduction The significance of data-fitting problems in curved spaces emerged in the late 1980s, spurred by advancements in mechanical and robotics industries. Following groundbreaking work on spherical smoothing splines, there has been a growing recognition of the challenges associated with understanding functions defined on non-Euclidean spaces for accurate interpretation of given data points. This challenge has reverberated across diverse research areas, including image processing, trajectory planning, and data analysis. Over the past few decades, researchers have delved into alternative approaches to extend interpolation and approximation methods to the Riemannian setting. This interdisciplinary exploration spans calculus of variations, optimal control, geophysics, geometric mechanics, robotics, quantum information processing, computer graphics, medical imaging, and data science. The complexity of these problems serves as a catalyst for investigating interpolation challenges in curved spaces. Notably, in contrast to Euclidean spaces, the primary hurdle in generalizing classical fitting or interpolation problems to curved spaces lies in the absence of a straightforward understanding of polynomial curve expressions in such spaces. ∗ Department of Mathematics, National Taiwan Normal University, Taipei, 116 Taiwan, chunlin@math.ntnu.edu.tw † Department of Mathematics, National Taiwan Normal University, Taipei, 116 Taiwan; Current Address: Faculty of Mathematics-Mechanics-Informatics, Vietnam National University, University of Science, Hanoi, Vietnam, tranthedung56@gmail.com 1" 2312.10523v1,": A B ENCHMARK FOR E VALUATING L ANGUAGE M ODEL F IT P ALOMA Ian Magnusson ♠ Akshita Bhagia ♠ Valentin Hofmann ♠ Luca Soldaini ♠ Ananya Harsh Jha ♠ Oyvind Tafjord ♠ Dustin Schwenk ♠ Evan Pete Walsh ♠ Yanai Elazar ♠♢ Kyle Lo ♠ Dirk Groeneveld ♠ Iz Beltagy ♠ Hannaneh Hajishirzi ♠♢ Noah A. Smith ♠♢ Kyle Richardson ♠ Jesse Dodge ♠ ♠ Allen Institute for Artificial Intelligence ♢ Paul G. Allen School of Computer Science & Engineering, University of Washington {ianm,jessed}@allenai.org A BSTRACT Language models (LMs) commonly report perplexity on monolithic data held out from training. Implicitly or explicitly, this data is composed of domains—varying distributions of language. Rather than assuming perplexity on one distribution extrapolates to others, P ERPLEXITY A NALYSIS FOR L ANGUAGE M ODEL A SSESS - MENT (P ALOMA ), 1 measures LM fit to 585 text domains, ranging from nytimes.com to r/depression on Reddit. We invite submissions to our benchmark and organize results by comparability based on compliance with guidelines such as removal of benchmark contamination from pretraining. Submissions can also record parameter and training token count to make comparisons of Pareto efficiency for performance as a function of these measures of cost. We populate our benchmark with results from 6 baselines pretrained on popular corpora. In case studies, we demonstrate analyses that are possible with P ALOMA , such as finding that pretraining without data beyond Common Crawl leads to inconsistent fit to many domains. 1 I NTRODUCTION Progress in AI is often catalyzed by benchmarks that define new ways of measuring progress (Deng et al., 2009, Wang et al., 2018, and Wang et al., 2019, inter alia). Language models (LMs) often report LM fit in the form of perplexity (Jelinek et al., 1977) or its logarithm, cross-entropy loss, on held out data from a model’s training distribution or a small number of traditional test sets (Chelba et al., 2013, and Merity et al., 2016, inter alia). Such measures of LM fit have been shown to improve predictably with increases in scale from more parameters, training data, and compute (Kaplan et al., 2020; Hoffmann et al., 2022). However, increasingly large training data also aggregates increasing numbers of distinct communities (Diaz & Madaio, 2023) with differing distributions of language, i.e., domains, that LMs implicitly learn to model (Aharoni & Goldberg, 2020). Does rising performance lift all data? Or do some domains capture most improvement in LM fit? How do we evaluate decisions, such as how to compose pretraining data, that determine which distributions of language are modeled? We contend that, rather than extrapolating trends from a prescriptive mix of domains, benchmarks ought to measure LM fit to many domains and inspect where fit differs. In this work we introduce P ALOMA , a benchmark to study LM fit on many domains. We measure perplexity on different distributions of language that we surface by sampling from 18 sources, such as C4 (Raffel et al., 2019; Dodge et al., 2021), that have metadata marking 585 textual domains, such as URL domains or academic disciplines. Beyond evaluation data, we aim to enable and enrich fair comparisons for scientific research on language modeling with the following artifacts: guidelines for experiments on LM fit, 6 baseline 1B parameter models pretrained on popular corpora, standardized inference code, and a submission process for coordinating comparable results across the research community. 1 https://paloma.allen.ai/ 1" 2312.10524v1,"Comprehensive Evaluation of ChatGPT Reliability Through Multilingual Inquiries Poorna Chander Reddy Puttaparthi pp5109@g.rit.edu Department of Software Engineering, Rochester Institute of Technology Rochester, NY, USA Soham Sanjay Deo Hakan Gul sd5456@g.rit.edu School of Information, Rochester Institute of Technology Rochester, NY, USA hag4126@g.rit.edu Department of Computer Science, Rochester Institute of Technology Rochester, NY, USA Yiming Tang ∗ Weiyi Shang Zhe Yu yxtvse@rit.edu Department of Software Engineering, Rochester Institute of Technology Rochester, NY, USA wshang@uwaterloo.ca Department of Electrical and Computer Engineering, University of Waterloo Waterloo, ON, Canada zxyvse@rit.edu Department of Software Engineering, Rochester Institute of Technology Rochester, NY, USA ABSTRACT Ethical Consideration: Please be aware that this paper may contain potentially harmful or aggressive content. Such content is solely used for the analysis and testing of ChatGPT and does not imply any intent to promote criminal activities. ChatGPT is currently the most popular large language model (LLM), with over 100 million users, making a significant impact on people’s lives. However, due to the presence of jailbreak vulnerabilities, ChatGPT might have negative effects on people’s lives, potentially even facilitating criminal activities. Testing whether ChatGPT can cause jailbreak is crucial because it can enhance Chat- GPT’s security, reliability, and social responsibility. Inspired by previous research revealing the varied performance of LLMs in different language translations, we suspected that wrapping prompts in multiple languages might lead to ChatGPT jailbreak. To investigate this, we designed a study with a fuzzing testing approach to analyzing ChatGPT’s cross-linguistic proficiency. Our study includes three strategies by automatically posing different formats of malicious questions to ChatGPT: (1) each malicious question involving only one language, (2) multilingual malicious questions, (3) specifying that ChatGPT responds in a language different from the questions. In addition, we also combine our strategies by utilizing prompt injection templates to wrap the three aforementioned types of questions. We examined a total of 7,892 Q&A data points, discovering that multilingual wrapping can indeed lead to Chat- GPT’s jailbreak, with different wrapping strategies having varying ∗ Corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/x.x/x.x effects on jailbreak probability. Prompt injection can amplify the probability of jailbreak caused by multilingual wrapping. This study provides insights for OpenAI developers to enhance ChatGPT’s support for language diversity and inclusion. ACM Reference Format: Poorna Chander Reddy Puttaparthi, Soham Sanjay Deo, Hakan Gul, Yiming Tang, Weiyi Shang, and Zhe Yu. 2023. Comprehensive Evaluation of ChatGPT Reliability Through Multilingual Inquiries. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 12 pages. https: //doi.org/x.x/x.x 1 INTRODUCTION ChatGPT [27] is currently the most popular LLM on the market, which has attracted over 100 million users since its emergence [25], and its user numbers continue to grow rapidly. More and more people are coming to ChatGPT to solve real-world problems as an alternative to traditional search engines, such as Google. According to a survey of 642 professionals [34], 42% expressed a preference for using AI-powered chatbots, while only 24% insisted on utilizing traditional search engines. As ChatGPT gains popularity and becomes increasingly intertwined with our daily lives, it also has the potential to adversely impact people’s lives, such as facilitating criminal activities. This is due to the existence of ChatGPT’s jailbreak vulnerabilities. Jailbreaking refers to the utilization of specific prompts to elicit responses from LLMs that they might not typically generate [24], even including harmful information, such as violent or gory content. Testing whether ChatGPT is susceptible to jailbreaking is crucial for the following reasons: (1) it can improve the mechanism for ChatGPT’s safety check; (2) it can increase ChatGPT’s reliability, ensuring it generates reliable content; and (3) it aligns with ChatGPT’s responsibility to society, as AI should not be exploited by criminals to engage in harmful activities. Extensive research [13,15,30] has explored how LLMs may produce various performances for translations across different languages. This exploration has inspired us to consider leveraging multilingual wrapping of malicious questions to create prompts" 2312.10525v1,"Runtime Architecture and Task Plan Co-Adaptation for Autonomous Robots with Metaplan Jeroen M. Zwanepol ∗ , Gustavo Rezende Silva ∗ and Carlos Hernández Corbato ∗ Abstract— Autonomous robots need to be able to handle uncertainties when deployed in the real world. For the robot to be able to robustly work in such an environment, it needs to be able to adapt both its architecture as well as its task plan. Architecture adaptation and task plan adaptation are mutually dependent, and therefore require the system to apply runtime architecture and task plan co-adaptation. This work presents Metaplan, which makes use of models of the robot and its environment, together with a PDDL planner to apply runtime architecture and task plan co-adaptation. Metaplan is designed to be easily reusable across different domains. Metaplan is shown to successfully perform runtime architecture and task plan co-adaptation with a self-adaptive unmanned underwater vehicle exemplar, and its reusability is demonstrated by applying it to an unmanned ground vehicle. I. I NTRODUCTION While operating, autonomous robots are subject to uncertainties, both from internal system factors (e.g., sensor failures) and external environment factors (e.g., unexpected obstacles). To overcome these uncertainties, robots can be designed as self-adaptive systems [1], enabling them to adapt at runtime their architecture (i.e., deactivating or activating software components and changing their parameters) and their mission execution (i.e., change the task being performed). However, as stated by Cámara et al. [2] the mutual dependencies between architecture and task plan adaptation pose a significant challenge when determining how to apply both adaptations in a coordinated manner. Thus, this paper focuses on designing a solution for runtime architecture and task plan co-adaptation (RATPA). In the context of self-adaptive robotic systems, several works have addressed either task adaptation, architecture adaptation, or both adaptations independently [3], [4], [5], [6], [7], but only few works apply RATPA [2], [8]. Both these works define the co-adaptation problem and propose solutions for it, however, the solutions presented are not general and reusable for different robotic applications. This paper proposes Metaplan, a planning based approach that uses off-the shelf general reasoners and knowledge about the robot’s architecture and mission to drive runtime architecture and task plan co-adaptation. Metaplan combines Metacontrol [3], a knowledge-based framework for architecture self-adaptation, with a Planning Domain Definition Language (PDDL)-based planner [9] used for simultaneous ∗ Delft University of Technology, Delft, The Nether- j.m.zwanepol@student.tudelft.nl; {g.rezendesilva, c.h.corbato}@tudelft.nl; lands This work was supported by the European Union’s Horizon 2020 Framework Programme through the MSCA network REMARO (Grant Agreement No 956200). architecture and task planning, ensuring the selection of a suitable configuration for each task. This results in a general and modular solution that is only dependent on: (1) a PDDL formulation of the robot’s task planning problem, and (2) an architectural model of the robot conforming to Metacontrol’s metamodel. This explicit dependency on models makes Metaplan reusable across different applications. Metaplan is implemented as a ROS 2-based system leveraging MROS [10], [11] and PlanSys2 [12], [13], a ROS implementation of Metacontrol and a package for handling plan generation and execution in ROS 2 respectively. It was evaluated with two different types of robots, an Unmanned Underwater Vehicle (UUV) [14], and an Unmanned Ground Vehicle (UGV) [2]. The experiments showed that Metaplan is able to perform RATPA in robotic systems, and that it is general and reusable across different applications with minimal overhead. In summary, the contributions of this paper are: • A reusable approach for runtime architecture and task plan co-adaptation in robotic systems with minimal overhead; • Experimental results demonstrating runtime architecture and task plan co-adaptation in the SUAVE exemplar; II. R ELATED W ORKS In the context of self-adaptive robotic systems, there are multiple works that have addressed either architecture adaptation or task adaptation [3], [4], [15], independent architecture and task adaptation [6], [7], or coordinated task and architecture adaptation [2], [8]. Table I presents an overview of the related works. As a solution for architecture adaptation, Hernández et al. [16] proposed Metacontrol, a knowledge-based framework that incorporates systems with the ability to adapt their architecture at runtime. An important aspect of Metacontrol is that it uses knowledge of how the system is designed to reason when and how the system should adapt. This design choice increases Metacontrol’s reusability, since it is only required to modify the knowledge base in order to apply it to different applications. Metacontrol was demonstrated with different robotics applications, such as mobile base navigation and underwater vehicles [3], [16], [17], [18], [19]. Purandare et al. [7] proposed the CICADA framework to enable Unmanned Aerial Vehicles (UAVs) to recover from misconfiguration-related flight instability. This is achieved by adapting the UAVs’ flight controller configuration at runtime to a safe baseline configuration or by adapting the task it is performing. Although CICADA is able to perform both" 2312.10528v1,"Cross-Linguistic Offensive Language Detection: BERT-Based Analysis of Bengali, Assamese, & Bodo Conversational Hateful Content from Social Media Jhuma Kabir Mim 1, ∗ , † , Mourad Oussalah 2, † and Akash Singhal 3, † 1 CVPR , LUT University, Lappeenranta, Finland CMVS, Faculty of ITEE, University of Oulu, Oulu, Finland 3 Dept of Computer Science, University of Helsinki, Helsinki, Finland 2 Abstract In today’s age, social media reigns as the paramount communication platform, providing individuals with the avenue to express their conjectures, intellectual propositions, and reflections. Unfortunately, this freedom often comes with a downside as it facilitates the widespread proliferation of hate speech and offensive content, leaving a deleterious impact on our world. Thus, it becomes essential to discern and eradicate such offensive material from the realm of social media. This article delves into the comprehensive results and key revelations from the HASOC-2023 offensive language identification result. The primary emphasis is placed on the meticulous detection of hate speech within the linguistic domains of Bengali, Assamese, and Bodo, forming the framework for Task 4: Annihilate Hates. In this work, we used BERT models, including XML-Roberta, L3-cube, IndicBERT, BenglaBERT, and BanglaHateBERT. The research outcomes were promising and showed that XML-Roberta-lagre performed better than monolingual models in most cases. Our team ’TeamBD’ achieved rank 3rd for Task 4 - Assamese, & 5th for Bengali. Keywords Hate Speech, BERT Model, Multilingual Offensive language identification, Social Media, HASOC-2023, 1. Introduction Social media platforms such as Facebook, Twitter, and YouTube stand out as a widely embraced and effortless avenue for uninhibited self-expression and online interaction. Regrettably, it also serves as a platform for disseminating harmful and hostile content, including gender discrimination, xenophobia, protests over politics, online harassment, and even extortion [1]. Hate speech [2] involves derogatory comments targeting an individual or a group due to certain attributes like race, color, or ethnicity. Now this profane language is pervasive on social media, it has become a challenge. Researchers and organizations have been working to develop techniques that can recognize hate speech or abusive language and flag it for review by human moderators or for automated elimination. Consequently, numerous social media platforms actively monitor ∗ Corresponding author. † These authors contributed equally. jhuma.mim@student.lut.fi (J. K. Mim); mourad.oussalah@oulu.fi (M. Oussalah); akash.singhal@helsinki.fi (A. Singhal) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)." 2312.10529v1,"Transformers in Unsupervised Structure-from-Motion Hemang Chawla ∗1,2[0000−0002−5999−6901] , Arnav Varma ∗1[0000−0002−5919−0449] , Elahe Arani 1,2[0000−0002−0952−7007] , and Bahram Zonooz 1,2[0000−0003−4124−3394] 1 Advanced Research Lab, NavInfo Europe, Eindhoven, The Netherlands 2 Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands {firstname.lastname}@navinfo.eu, bahram.zonooz@gmail.com https://www.navinfo.eu/expertise/artificial-intelligence/ Abstract. Transformers have revolutionized deep learning based computer vision with improved performance as well as robustness to natural corruptions and adversarial attacks. Transformers are used predominantly for 2D vision tasks, including image classification, semantic segmentation, and object detection. However, robots and advanced driver assistance systems also require 3D scene understanding for decision making by extracting structure-from-motion (SfM). We propose a robust transformer-based monocular SfM method that learns to predict monocular pixel-wise depth, ego vehicle’s translation and rotation, as well as camera’s focal length and principal point, simultaneously. With experiments on KITTI and DDAD datasets, we demonstrate how to adapt different vision transformers and compare them against contemporary CNN-based methods. Our study shows that transformer-based architecture, though lower in run-time efficiency, achieves comparable performance while being more robust against natural corruptions, as well as untargeted and targeted attacks. § Keywords: structure-from-motion, monocular depth estimation, monocular pose estimation, camera calibration, natural corruptions, adversarial attacks 1 Introduction Scene understanding tasks have benefited immensely from advances in deep learning over the years [58]. Several existing methods in computer vision for robotics [33], augmented reality [25], and autonomous driving [43] have been using convolutional neural networks (CNNs) with its properties of spatial locality and translation invariance [31] resulting in excellent performance. With the advent of vision transformers [11, 54], models with the ability to learn from the global context have even outperformed CNNs for some tasks such as object detection [5] and semantic segmentation [59]. Nevertheless, despite performance improvements in curated test sets, safe deployment of models requires further consideration of robustness and generalizability. Different neural network architectures have been shown to have different effects on model performance, robustness, and generalizability on different tasks [9, 21]. CNNs * Equal contribution. § Code: https://github.com/NeurAI-Lab/MT-SfMLearner" 2312.10531v1,"H OW TO T RAIN N EURAL F IELD R EPRESENTATIONS A C OMPREHENSIVE S TUDY AND B ENCHMARK Samuele Papa * University of Amsterdam Miltiadis Kofinas University of Amsterdam Riccardo Valperga University of Amsterdam Phillip Lippe University of Amsterdam David Knigge University of Amsterdam Jan-Jakob Sonke The Netherlands Cancer Institute Efstratios Gavves University of Amsterdam Abstract 1. Introduction Neural fields (NeFs) have recently emerged as a versatile method for modeling signals of various modalities, including images, shapes, and scenes. Subsequently, a number of works have explored the use of NeFs as representations for downstream tasks, e.g. classifying an image based on the parameters of a NeF that has been fit to it. However, the impact of the NeF hyperparameters on their quality as downstream representation is scarcely understood and remains largely unexplored. This is in part caused by the large amount of time required to fit datasets of neural fields. In this work, we propose fit-a-nef 1 , a JAX-based library that leverages parallelization to enable fast optimization of large-scale NeF datasets, resulting in a significant speed-up. With this library, we perform a comprehensive study that investigates the effects of different hyperparameters –including initialization, network architecture, and optimization strategies– on fitting NeFs for downstream tasks. Our study provides valuable insights on how to train NeFs and offers guidance for optimizing their effectiveness in downstream applications. Finally, based on the proposed library and our analysis, we propose Neural Field Arena, a benchmark consisting of neural field variants of popular vision datasets, including MNIST, CIFAR, variants of ImageNet, and ShapeNetv2. Our library and the Neural Field Arena will be open-sourced to introduce standardized benchmarking and promote further research on neural fields. Neural Fields (NeFs) [46] have recently emerged as a versatile method for reconstructing discretely sampled continuous signals, with great success on various modalities from images [42–44], videos [35], 3D scenes and shapes [30, 31, 34, 49], to medical imaging [33, 51], audio [18, 42], and physical systems [23, 39, 48]. As coordinate-based models f θ : x 7→ y, x ∈ R d , y ∈ R c (e.g. d = 2 for images and d = 3 for 3D shapes), their continuous nature allows for modeling signals without the limitations in resolution inherent in discrete representations; their capacity for modeling fine detail is only limited by the expressivity of the underlying NeF architecture. Furthermore, some modalities, such as scenes and shapes, do not have array representations that can be easily adapted to existing deep learning methods. Doubling down on their flexibility, a growing body of literature [3, 14, 16, 32, 52] has further proposed to use NeF parameterizations f θ directly as representations of data. They are used to model images, videos, or shapes not as tensors but as functions on which to run downstream tasks (e.g., classify the function of an image instead of the pixel tensor of an image). In this setting, the parameters θ of a NeF – sometimes along with their computational structure – serve as input for a downstream model. Despite their promise, NeFs lag behind as representations. Prior work has shown that performance on wellknown benchmarks such as MNIST and CIFAR10 is far from state-of-the-art [32, 52]. We argue that two challenges contribute to their lack of performance: a practical one, and a theoretical one. The practical challenge is that a NeF is a neural network fit on a single discretely sampled signal, * Corresponding author. Email: samuele.papa@gmail.com 1 GitHub repository available: https://github.com/samuelepapa/fit-a-nef 1" 2312.10551v1,"P REDICTING R EGIONAL R OAD T RANSPORT E MISSIONS F ROM S ATELLITE I MAGERY Adam Horsler Imperiall College London London adam.horsler19@alumni.imperial.ac.uk Jake Baker Imperial College London London jake.baker18@alumni.imperial.ac.uk Pedro M. Baiz. V. Imperial College London London p.m.baiz@imperial.ac.uk A BSTRACT This paper presents a novel two-part pipeline for monitoring progress towards the UN Sustainable Development Goals (SDG’s) related to Climate Action and Sustainable Cities and Communities. The pipeline consists of two main parts: the first part takes a raw satellite image of a motorway section and produces traffic count predictions for count sites within the image; the second part takes these predicted traffic counts and other variables to produce estimates of Local Authority (LA) motorway Average Annual Daily Traffic (AADT) and Greenhouse Gas (GHG) emissions on a per vehicle type basis. We also provide flexibility to the pipeline by implementing a novel method for estimating emissions when data on AADT per vehicle type or/and live vehicle speeds are not available. Finally, we extend the pipeline to also estimate LA A-Roads and minor roads AADT and GHG emissions. We treat the 2017 year as training and 2018 as the test year. Results show that it is possible to predict AADT and GHG emissions from satellite imagery, with motorway test year R 2 values of 0.92 and 0.78 respectively, and for A-roads’ R 2 values of 0.94 and 0.98. This end-to-end two-part pipeline builds upon and combines previous research in road transportation traffic flows, speed estimation from satellite imagery, and emissions estimation, providing new contributions and insights into these areas. Keywords Machine Learning for Satellite Imagery · Road Transport · Greenhouse Gas Emissions 1 Introduction Satellite imagery has emerged as a promising data source for addressing challenges in quantifying GHG emissions progress, such as regional regulatory differences and limited data availability. It provides an unbiased and non-invasive source of information that can be standardized and compared across regions. This project leverages satellite imagery and public and free datasets with Deep Learning (DL) methods to estimate road vehicle greenhouse gas (GHG) emissions by predicting traffic flows from a single satellite image. Transportation is a significant contributor to GHG emissions, accounting for 14% of all direct and indirect emissions. Road transportation is the largest component of this sector, responsible for 73% of total emissions [1], hence the focus on road transport within this study. This work develops a novel pipeline for transforming a single satellite image into road transport Average Annual Daily Traffic (AADT) and GHG emissions. To that end, the following intermediate steps are required: satellite image pre-processing and metadata extraction, road vehicle object detection and traffic counts prediction. While the scope of this project is limited to the UK, additional work provides a flexible method that can be adapted to different regions, specifically those with limited data availability compared to the UK. For example, we incorporate the" 2312.10577v1,"A fractional block-centered finite difference method for two-sided space-fractional diffusion equations on general nonuniform grids and its fast implementation Meijie Kong a , Hongfei Fu a,b,∗ a School of Mathematical Sciences, Ocean University of China, Qingdao, Shandong 266100, China b Laboratory of Marine Mathematics, Ocean University of China, Qingdao, Shandong 266003, China Abstract In this paper, a two-sided variable-coefficient space-fractional diffusion equation with fractional Neumann boundary condition is considered. To conquer the weak singularity caused by the nonlocal space-fractional differential operators, by introducing an auxiliary fractional flux variable and using piecewise linear interpolations, a fractional block-centered finite difference (BCFD) method on general nonuniform grids is proposed. However, like other numerical methods, the proposed method still produces linear algebraic systems with unstructured dense coefficient matrices under the general nonuniform grids. Consequently, traditional direct solvers such as Gaussian elimination method shall require O(M 2 ) memory and O(M 3 ) computational work per time level, where M is the number of spatial unknowns in the numerical discretization. To address this issue, we combine the well-known sum-of-exponentials (SOE) approximation technique with the fractional BCFD method to propose a fast version fractional BCFD algorithm. Based upon the Krylov subspace iterative methods, fast matrix-vector multiplications of the resulting coefficient matrices with any vector are developed, in which they can be implemented in only O(MN exp ) operations per iteration, where N exp ≪ M is the number of exponentials in the SOE approximation. Moreover, the coefficient matrices do not necessarily need to be generated explicitly, while they can be stored in O(MN exp ) memory by only storing some coefficient vectors. Numerical experiments are provided to demonstrate the efficiency and accuracy of the method. Keywords: Space-fractional diffusion equations, Fractional block-centered finite difference method, Fast matrix-vector multiplication, Nonuniform grids. 1. Introduction Fractional partial differential equations provide a very adequate and competitive tool to model challenging phenomena involving anomalous diffusion or long-range memory and spatial interactions. For example, the space-fractional diffusion equations (SFDEs) can be used to describe the anomalous diffusion occurred in many transport processes [3, 4, 25, 34]. Extensive research has been conducted in the development of numerical methods for various fractional differential ∗ Corresponding author. Email address: fhf@ouc.edu.cn (Hongfei Fu) Preprint submitted to Elsevier December 19, 2023" 2312.10595v1,"Spin control with triplet and doublet excitons in organic semiconductors Qinying Gu, a ‡ Sebastian Gorgon, a ‡ Alexander S. Romanov, b Feng Li, c Richard H. Friend a, * and Emrys Evans d, * a Department of Physics, University of Cambridge, Cambridge, CB2 1EW, U.K. b School of Chemistry, University of Manchester, Manchester, M13 9PL, UK. c State Key Laboratory of Supramolecular Structure and Materials, College of Chemistry, Jilin University, Qianjin Avenue 2699, Changchun, 130012, P. R. China d Department of Chemistry, Swansea University, Singleton Park, Swansea SA2 8PP, UK ‡ These authors contributed equally *Correspondence should be addressed to: rhf10@cam.ac.uk (RHF), emrys.evans@swansea.ac.uk (EWE). Abstract Spin triplet exciton formation sets limits on technologies using organic semiconductors that are confined to singlet-triplet photophysics. In contrast, excitations in the spin doublet manifold in organic radical semiconductors can show efficient luminescence. Here we explore the dynamics of the spin allowed process of intermolecular energy transfer from triplet to doublet excitons. We employ a carbene-metal-amide (CMA-CF 3 ) as a model triplet donor host, since following photoexcitation it undergoes extremely fast intersystem crossing to set up a population of triplet excitons within 4 ps. This enables a foundational study for tracking energy transfer from triplets to a model radical semiconductor, TTM-3PCz. Over 90% of all radical luminescence originates from the triplet channel in this system under photoexcitation. We find that intermolecular triplet-to-doublet energy transfer can occur directly and rapidly, with 12% of triplet excitons transferring already on sub-ns timescales. This enhanced triplet harvesting mechanism is utilised in efficient near-infrared organic light-emitting diodes, which can be extended to other opto-electronic and -spintronic technologies by radical-based spin control in molecular semiconductors. 1" 2312.10616v1,"DistilVPR: Cross-Modal Knowledge Distillation for Visual Place Recognition Sijie Wang 1 * , Rui She 1 * , Qiyu Kang 1† , Xingchao Jian 1 , Kai Zhao 1 , Yang Song 2 , Wee Peng Tay 1 1 Nanyang Technological University 2 C3.AI {wang1679, rui.she, qiyu.kang, xingchao001}@ntu.edu.sg, yang.song@c3.ai 3D feature Abstract The utilization of multi-modal sensor data in visual place recognition (VPR) has demonstrated enhanced performance compared to single-modal counterparts. Nonetheless, integrating additional sensors comes with elevated costs and may not be feasible for systems that demand lightweight operation, thereby impacting the practical deployment of VPR. To address this issue, we resort to knowledge distillation, which empowers single-modal students to learn from cross-modal teachers without introducing additional sensors during inference. Despite the notable advancements achieved by current distillation approaches, the exploration of feature relationships remains an under-explored area. In order to tackle the challenge of cross-modal distillation in VPR, we present DistilVPR, a novel distillation pipeline for VPR. We propose leveraging feature relationships from multiple agents, including self-agents and cross-agents for teacher and student neural networks. Furthermore, we integrate various manifolds, characterized by different space curvatures for exploring feature relationships. This approach enhances the diversity of feature relationships, including Euclidean, spherical, and hyperbolic relationship modules, thereby enhancing the overall representational capacity. The experiments demonstrate that our proposed pipeline achieves state-of-the-art performance compared to other distillation baselines. We also conduct necessary ablation studies to show design effectiveness. The code is released at: https://github.com/sijieaaa/DistilVPR 1 Introduction Visual place recognition (VPR) serves as a foundational task in localization, aiming at identifying locations by comparing visual sensor data, such as camera images and LiDAR point clouds, to stored references in a database. This task finds application in diverse domains, including autonomous driving (Chen et al. 2023), precise positioning (Sarlin et al. 2019), and augmented reality (Sarlin et al. 2022). Traditional VPR solutions rely on handcrafted features like Vector of Locally Aggregated Descriptor (VLAD) (Jé- gou et al. 2011) and Bag of Words (BoW) (Gálvez-López and Tardos 2012). These methods often fall short in challenging conditions including changing lighting, view distortions, and environmental perturbations due to their dependence on manual design. * These authors contributed equally. † Corresponding author: Qiyu Kang. 3D student 3D place recognition distil and / or teacher feature teacher distil 2D student 2D feature during student training 2D place recognition during student inference Figure 1: The pipeline of cross-modal KD to transfer knowledge from the cross-modal teacher to single-modal students. The rise of deep learning has inspired data-driven VPR approaches that can tackle these challenges. NetVLAD (Arandjelovic et al. 2016) skillfully combines deep convolutional networks (CNNs) and traditional VLAD to enhance the robustness and efficacy of image scene feature extraction. This innovation paved the way for subsequent learning-based strategies. Addressing camera sensitivity to illumination, PointNetVLAD (Uy and Lee 2018) suggests utilizing point clouds from LiDARs which, unlike cameras, actively project laser beams to perceive surroundings, thus rendering them more resistant to lighting variations. Moreover, integrating data from multiple sensors can yield a more resilient and high-performing VPR model. In this vein, MinkLoc++ (Komorowski, Wysoczańska, and Trzcinski 2021) leverages both images and point clouds as inputs to achieve efficient multimodal feature extraction, showcasing superiority over singlemodal alternatives. While integrating various sensors can elevate model performance, it also incurs additional expenses. Moreover, lightweight mobile systems might not support heavy sensors, such as LiDARs, making multi-modal sensors impractical. Although using multiple sensors during inference is not favored, we can harness this cross-modal knowledge during" 2312.10638v1,"HyperPIE: Hyperparameter Information Extraction from Scientific Publications Tarek Saier 1 , Mayumi Ohta 2 , Takuto Asakura 3 , and Michael Färber 1 1 Karlsruhe Institute of Technology, Karlsruhe, Germany {tarek.saier,michael.faerber}@kit.edu 2 Fraunhofer Institute for Systems and Innovation Research, Karlsruhe, Germany mayumi.ohta@isi.fraunhofer.de 3 The University of Tokyo, Tokyo, Japan takuto@is.s.u-tokyo.ac.jp Abstract. Automatic extraction of information from publications is key to making scientific knowledge machine-readable at a large scale. The extracted information can, for example, facilitate academic search, decision making, and knowledge graph construction. An important type of information not covered by existing approaches is hyperparameters. In this paper, we formalize and tackle hyperparameter information extraction (HyperPIE) as an entity recognition and relation extraction task. We create a labeled data set covering publications from a variety of computer science disciplines. Using this data set, we train and evaluate BERT- based fine-tuned models as well as five large language models: GPT-3.5, GALACTICA, Falcon, Vicuna, and WizardLM. For fine-tuned models, we develop a relation extraction approach that achieves an improvement of 29% F 1 over a state-of-the-art baseline. For large language models, we develop an approach leveraging YAML output for structured data extraction, which achieves an average improvement of 5.5% F 1 in entity recognition over using JSON. With our best performing model we extract hyperparameter information from a large number of unannotated papers, and analyze patterns across disciplines. All our data and source code is publicly available at https://github.com/IllDepence/hyperpie. Keywords: Information Extraction, Scientific Text, Hyperparameter 1 Introduction Models capable of extracting fine-grained information from publications can make scientific knowledge machine-readable at a large scale. Aggregated, such information can fuel platforms like Papers with Code 4 and the Open Research Knowledge Graph [26,3], and thereby facilitate academic search, recommendation, and reproducibility. Accordingly, a variety of approaches for information extraction (IE) from scientific text have been proposed [19,13,12,16,11]. 4 See https://paperswithcode.com/." 2312.10642v1,"E PISODIC R ETURN D ECOMPOSITION BY D IFFERENCE OF I MPLICITLY A SSIGNED S UB -T RAJECTORY R EWARD Haoxin Lin 1,2,3 , Hongqiu Wu 1,2 , Jiaji Zhang 1,2 , Yihao Sun 1,2 , Junyin Ye 1,2,3 , Yang Yu 1,2,3,4∗ 1 National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China 2 School of Artificial Intelligence, Nanjing University, Nanjing, China 3 Polixir Technologies, Nanjing, China 4 Peng Cheng Laboratory, Shenzhen, 518055, China {linhx, wuhq, zhangjj, sunyh, yejy}@lamda.nju.edu.cn, yuy@nju.edu.cn A BSTRACT Real-world decision-making problems are usually accompanied by delayed rewards, which affects the sample efficiency of Reinforcement Learning, especially in the extremely delayed case where the only feedback is the episodic reward obtained at the end of an episode. Episodic return decomposition is a promising way to deal with the episodic-reward setting. Several corresponding algorithms have shown remarkable effectiveness of the learned step-wise proxy rewards from return decomposition. However, these existing methods lack either attribution or representation capacity, leading to inefficient decomposition in the case of long-term episodes. In this paper, we propose a novel episodic return decomposition method called Diaster (Difference of implicitly assigned sub-trajectory reward). Diaster decomposes any episodic reward into credits of two divided subtrajectories at any cut point, and the step-wise proxy rewards come from differences in expectation. We theoretically and empirically verify that the decomposed proxy reward function can guide the policy to be nearly optimal. Experimental results show that our method outperforms previous stateof-the-art methods in terms of both sample efficiency and performance. The code is available at https://github.com/HxLyn3/Diaster. Introduction Reinforcement Learning (RL) has made empirical successes in several simulated domains and attracted close attention in recent years. Sparse and delayed reward, usually facing a range of real-world problems such as industrial control [1], molecular design [2], and recommendation systems [3], is one of the critical challenges hindering the application of RL in reality. The trouble with the delayed reward function is that it affects RL’s sample efficiency when using it to estimate the value function. Specifically, delayed rewards introduce numerous noneffective updates and fitting capacity loss [4] into Temporal-Difference (TD) Learning and result in a high variance in Monte-Carlo (MC) Learning [5]. The problem is more severe in the highly delayed case that the feedback appears only at the end of the episode. It is essential to design a proxy Markovian reward function as the substitute for the original delayed one since current standard RL algorithms prefer instant feedback at each environmental step. The apparent solution is designing the required proxy reward function by handcraft, but it depends on domain knowledge and is not general for all tasks. Reward shaping [6, 7, 8], one kind of automatical reward design method, is widely observed that it can accelerate RL. However, the reshaped rewards are coupled with the original rewards and are ineffective in environments where only an episodic reward is fed back. Recent work [5, 9, 10, 11] proposes to decompose the episodic reward into a string of step-wise rewards through the trajectory, which seems promising to deal with the long-term delay. Previous return decomposition methods can be sorted into two classes, as shown in Figure 1(a) and 1(b). One pays attention to precisely predicting the long-term episodic return, thinking little of reward redistribution. The representative work is RUDDER [5], which utilizes an LSTM [12] network to make a return prediction and assigns rewards to each ∗ Corresponding Author" 2312.10648v1,"Faithful Model Explanations through Energy-Constrained Conformal Counterfactuals * Patrick Altmeyer 1 , Mojtaba Farmanbar 2 , Arie van Deursen 1 , Cynthia C. S. Liem 1 1 Delft University of Technology, Faculty of Electrical Engineering, Mathematics and Computer Science 2 ING Bank p.altmeyer@tudelft.nl Abstract Counterfactual explanations offer an intuitive and straightforward way to explain black-box models and offer algorithmic recourse to individuals. To address the need for plausible explanations, existing work has primarily relied on surrogate models to learn how the input data is distributed. This effectively reallocates the task of learning realistic explanations for the data from the model itself to the surrogate. Consequently, the generated explanations may seem plausible to humans but need not necessarily describe the behaviour of the black-box model faithfully. We formalise this notion of faithfulness through the introduction of a tailored evaluation metric and propose a novel algorithmic framework for generating Energy-Constrained Conformal Counterfactuals that are only as plausible as the model permits. Through extensive empirical studies, we demonstrate that ECCCo reconciles the need for faithfulness and plausibility. In particular, we show that for models with gradient access, it is possible to achieve state-of-the-art performance without the need for surrogate models. To do so, our framework relies solely on properties defining the black-box model itself by leveraging recent advances in energy-based modelling and conformal prediction. To our knowledge, this is the first venture in this direction for generating faithful counterfactual explanations. Thus, we anticipate that ECCCo can serve as a baseline for future research. We believe that our work opens avenues for researchers and practitioners seeking tools to better distinguish trustworthy from unreliable models. 1 Introduction Counterfactual explanations provide a powerful, flexible and intuitive way to not only explain black-box models but also offer the possibility of algorithmic recourse to affected individuals. Instead of opening the black box, counterfactual explanations work under the premise of strategically perturbing model inputs to understand model behaviour (Wachter, Mittelstadt, and Russell 2017). Intuitively speaking, we generate explanations in this context by asking what-if questions of the following nature: ‘Our credit risk model currently predicts that this individual is not credit-worthy. What if they reduced their monthly expenditures by 10%?’ * This is a pre-print. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. This is typically implemented by defining a target outcome y + ∈ Y for some individual x ∈ X = R D described by D attributes, for which the model M θ : X 7→ Y initially predicts a different outcome: M θ (x) ̸ = y + . Counterfactuals are then searched by minimizing a loss function that compares the predicted model output to the target outcome: yloss(M θ (x), y + ). Since counterfactual explanations work directly with the black-box model, valid counterfactuals always have full local fidelity by construction where fidelity is defined as the degree to which explanations approximate the predictions of a black-box model (Molnar 2022). In situations where full fidelity is a requirement, counterfactual explanations offer a more appropriate solution to Explainable Artificial Intelligence (XAI) than other popular approaches like LIME (Ribeiro, Singh, and Guestrin 2016) and SHAP (Lundberg and Lee 2017), which involve local surrogate models. But even full fidelity is not a sufficient condition for ensuring that an explanation faithfully describes the behaviour of a model. That is because multiple distinct explanations can lead to the same model prediction, especially when dealing with heavily parameterized models like deep neural networks, which are underspecified by the data (Wilson 2020). In the context of counterfactuals, the idea that no two explanations are the same arises almost naturally. A key focus in the literature has therefore been to identify those explanations that are most appropriate based on a myriad of desiderata such as closeness (Wachter, Mittelstadt, and Russell 2017), sparsity (Schut et al. 2021), actionability (Ustun, Spangher, and Liu 2019) and plausibility (Joshi et al. 2019). In this work, we draw closer attention to modelling faithfulness rather than fidelity as a desideratum for counterfactuals. We define faithfulness as the degree to which counterfactuals are consistent with what the model has learned about the data. Our key contributions are as follows: first, we show that fidelity is an insufficient evaluation metric for counterfactuals (Section 3) and propose a definition of faithfulness that gives rise to more suitable metrics (Section 4). Next, we introduce a ECCCo: a novel algorithmic approach aimed at generating energy-constrained conformal counterfactuals that faithfully explain model behaviour in Section 5. Finally, we provide extensive empirical evidence demonstrating that ECCCo faithfully explains model behaviour and attains plausibility only when appropriate (Section 6). To our knowledge, this is the first venture in this direc-" 2312.10652v1,"Explorers at #SMM4H 2023: Enhancing BERT for Health Applications through Knowledge and Model Fusion 1 Xutong Yue 1,† , Xilai Wang 2,† , Yuxin He 1 , Zhenkun Zhou 1 School of Statistics, Capital University of Economics and Business, Beijing, China 2 School of EECS, University of Ottawa, Ottawa, Canada † These authors contributed equally. yuexutong@gmail.com, xwang736@uottawa.ca, {heyuxin, zhenkun}@cueb.edu.cn Abstract An increasing number of individuals are willing to post states and opinions in social media, which has become a valuable data resource for studying human health. Furthermore, social media has been a crucial research point for healthcare now. This paper outlines the methods in our participation in the #SMM4H 2023 Shared Tasks, including data preprocessing, continual pre-training and fine-tuned optimization strategies. Especially for the Named Entity Recognition (NER) task, we utilize the model architecture named W2NER[1] that effectively enhances the model generalization ability. Our method achieved first place in the Task 3. 1 1 Introduction The Social Media Mining for Health Applications (SMM4H) Shared Tasks aim to address natural language processing (NLP) challenges of using social media data for health informatics, including informal, colloquial expressions, misspellings, noise, data sparsity, ambiguity, and multilingual posts [2] . We participated in three tasks in SMM4H 2023 (i.e. Task 1, Task 3, Task 4). Task 1 and Task 4 focus on COVID-19 diagnosis in self-reported English tweets and self-reported social anxiety disorder diagnosis posted in Reddit. Task 3 concentrates on detecting and extracting COVID-19 symptoms in Latin American Spanish tweets description. The dataset of Task 1 contain texts from Twitter that self-report the COVID-19 diagnosis (labeled as ‘1’) or not (labeled as ‘0’). The size of the training set, validation set, and test set are 7600, 400, 10000. Task 4 contains 8117 posts from users aged 12 to 25. Positive cases (labeled as ‘1’) represent self-reported or probable social anxiety disorder diagnoses, while negative cases (labeled as ‘0’) include users without a diagnosis or with uncertain diagnostic status. The sizes of the training set, validation set, and those of test set are 6090, 680, 1347. Task 3 focuses on the detection and extraction of COVID-19 symptoms in tweets written specifically in Latin American Spanish, includes both personal self-reports and third-party mentions of symptoms. There are 6021 of the training data, 1979 for validation, and 2150 for testing. In the paper, we present methodologies for addressing three tasks. For the classification tasks, we adopt three pretrained language models (PLMs) as our backbones: RoBERTa-base [3] , vinai-bertweet [4] , and CPM-RoBERTa. For NER task, we select bert-base-spanish-wwm-cased-xnli [5] , BETO [6] , and BETO NER [7] . We also propose tricks to mitigate the challenges existing in dataset, including category imbalance, domain disparities, and text noise. Our approach achieves state-of-the-art results in Task 3 and surpasses the median performance in Task 1. 2 Methods Methods used for task 1 and 4 consist of three main components: continual pre-processing, continual pre-training, and model fine-tuning. In Task 3, based on methods for Task 1 and 4, we use additiaonally the W2NER model architecture. Pre-processing In the provided dataset, it contains a large number of emojis and usernames, which lacks valid textual semantic information. To enhance the model’s focus on textual semantics, we preprocess the data by replacing emojis with corresponding emotion description, and usernames with ‘@user’. Hashtags contains some information sometimes, we preprocess ‘#hashtag’ by separating ‘#’ and the text follows. 1 This paper has been peer-reviewed and accepted for presentation at the #SMM4H 2023 Workshop." 2312.10665v1,"Preprint S ILKIE : P REFERENCE D ISTILLATION FOR L ARGE V ISUAL L ANGUAGE M ODELS Lei Li 1† Zhihui Xie 1† Mukai Li 1 Shunian Chen 2 Peiyi Wang 3 Liang Chen 3 Yazheng Yang 1 Benyou Wang 2 Lingpeng Kong 1 1 The University of Hong Kong 2 The Chinese University of Hong Kong (Shenzhen) 3 Peking University {nlp.lilei, zhxieml, kaikiaia3, wangpeiyi9979}@gmail.com shunian.chen@link.cuhk.edu.cn leo.liang.chen@outlook.com wangbenyou@cuhk.edu.cn lpk@cs.hku.hk A BSTRACT This paper explores preference distillation for large vision language models (LVLMs), improving their ability to generate helpful and faithful responses anchoring the visual context. We first build a vision-language feedback (VLFeedback) dataset utilizing AI annotation. Specifically, responses are generated by models sampled from 12 LVLMs, conditioned on multi-modal instructions sourced from various datasets. We adopt GPT-4V to assess the generated outputs regarding helpfulness, visual faithfulness, and ethical considerations. Furthermore, the preference supervision is distilled into Qwen-VL-Chat through the direct preference optimization (DPO) method. The resulting model Silkie, achieves 6.9% and 9.5% relative improvement on the MME benchmark regarding the perception and cognition capabilities, respectively. Silkie also demonstrates reduced hallucination by setting a new state-of-the-art score of 3.02 on the MMHal-Bench benchmark. Further analysis shows that DPO with our VLFeedback dataset mainly boosts the fine-grained perception and complex cognition abilities of LVLMs, leading to more comprehensive improvements compared to human-annotated preference datasets. Project page: https://vlf-silkie.github.io. 1 I NTRODUCTION In recent years, there has been a rapid evolution in the development of large vision language models (LVLMs), epitomized by the remarkable achievements of the GPT-4V model (OpenAI, 2023a). The integration of language and visual components through modality alignment (Alayrac et al., 2022; Awadalla et al., 2023), coupled with supervised fine-tuning on instruction tuning datasets (Liu et al., 2023c; Li et al., 2023c; Zhu et al., 2023), has endowed LVLMs with promising perceptual and cognitive abilities (Yang et al., 2023). This augmentation enables them to engage in nuanced reasoning over images and deliver responses according to user queries. Despite these advancements, open-sourced LVLMs still exhibit misalignment issues that pose a potential risk of generating misleading content without anchoring to the provided visual context (Li et al., 2023d; Sun et al., 2023), or biased responses against minority groups (OpenAI, 2023a). Consequently, addressing and rectifying the misalignment behavior of LVLMs is crucial to enhance their reliability and mitigate the risk of generating biased outputs. In this paper, inspired by the success of reinforcement learning from AI feedback (RLAIF) in improving LLMs alignment with AI preference (Tunstall et al., 2023; Lee et al., 2023; Cui et al., 2023), we enhance LVLMs by distilling the preference annotation from a powerful LVLM, i.e., GPT- 4V (OpenAI, 2023a). We first construct a high-quality instruction set by collecting from various multimodal instruction tuning sources, including general conversation and reasoning instructions from LLaVA (Liu et al., 2023c) and SVIT (Zhao et al., 2023a), academic task instructions from M3IT (Li et al., 2023c), special datasets such as medical image understanding from PMC-VQA (Zhang et al., † Equal Contribution. 1" 2312.10671v1,"Open3DIS: Open-vocabulary 3D Instance Segmentation with 2D Mask Guidance Phuc Nguyen 1∗ Tuan Duc Ngo 1,4∗ Chuang Gan 2,4 Evangelos Kalogerakis 4 Anh Tran 1 Cuong Pham 1,3 Khoi Nguyen 1 1 VinAI Research 2 MIT-IBM Watson AI Lab 3 Posts & Telecommunications Inst. of Tech. {v.phucnda, v.anhtt152, v.khoindm}@vinai.io ganchuang@csail.mit.edu 4 UMass Amherst {tdngo, kalo}@cs.umass.edu cuongpv@ptit.edu.vn https://open3dis.github.io/ 3D point cloud RGB images Existing approaches a. OpenMask3D 3D point cloud Class-agnostic 3D Segmenter Mask-wise Feature Extraction 3D instance masks Back project to 3D space 3D instance masks 3D instance masks RGB-D images b. OVIR-3D 3D point cloud Find a tissue box in this room! RGB-D images Existing approaches Open-vocab 2D Segmenter Open3DIS Open3DIS 3D point cloud Class-agnostic 3D Segmenter Pointwise Feature Extraction RGB-D images Open-vocab 2D Segmenter 2D-guide-3D Instance Proposal Module Found 1 instance Not found Figure 1. Left: While leading open-vocabulary 3D instance segmentation methods like OpenMask3D [45] and OVIR-3D [33] often struggle with small or ambiguous instances, particularly those from uncommon classes, Open3DIS excels in segmenting such cases. It outperforms existing methods by about ∼1.5x in average precision on ScanNet200 [41]. Right: Open3DIS aggregates proposals from both point cloud-based instance segmenters and 2D image-based networks. Our method incorporates novel components (red and yellow boxes) that perform aggregation and mapping of 2D masks to the point cloud across multiple frames, as well as 3D-aware feature extraction for effectively comparing object proposals to text queries. Abstract cloud regions as high-quality object proposals addressing the above limitations. These are then combined with 3D class-agnostic instance proposals to include a wide range of objects in the real world. To validate our approach, we conducted experiments on three prominent datasets, including ScanNet200, S3DIS, and Replica, demonstrating significant performance gains in segmenting objects with diverse categories over the state-of-the-art approaches. We introduce Open3DIS, a novel solution designed to tackle the problem of Open-Vocabulary Instance Segmentation within 3D scenes. Objects within 3D environments exhibit diverse shapes, scales, and colors, making precise instance-level identification a challenging task. Recent advancements in Open-Vocabulary scene understanding have made significant strides in this area by employing classagnostic 3D instance proposal networks for object localization and learning queryable features for each 3D mask. While these methods produce high-quality instance proposals, they struggle with identifying small-scale and geometrically ambiguous objects. The key idea of our method is a new module that aggregates 2D instance masks across frames and maps them to geometrically coherent point 1. Introduction This paper addresses the challenging problem of openvocabulary 3D point cloud instance segmentation (OV- 3DIS). Given a 3D scene represented by a point cloud, we seek to obtain a set of binary instance masks of any classes ∗ : Equal contribution 1" 2312.10676v1,"Fuzz Driver Synthesis for Rust Generic APIs Yehong Zhang Jun Wu Hui Xu ∗ School of Computer Science, Fudan University China yehongzhang23@m.fudan.edu.cn School of Computer Science, Fudan University China junwu@fudan.edu.cn School of Computer Science, Fudan University China xuh@fudan.edu.cn ABSTRACT Fuzzing is a popular bug detection technique achieved by testing software executables with random inputs. This technique can also be extended to libraries by constructing executables that call library APIs, known as fuzz drivers. Automated fuzz driver synthesis has been an important research topic in recent years since it can facilitate the library fuzzing process. Nevertheless, existing approaches generally ignore generic APIs or simply treat them as normal APIs. As a result, they cannot generate effective fuzz drivers for generic APIs. This paper studies the automated fuzz driver synthesis problem for Rust libraries with generic APIs. The problem is essential because Rust emphasizes security, and generic APIs are widely employed in Rust crates. Each generic API can have numerous monomorphic versions as long as the type constraints are satisfied. The critical challenge to this problem lies in prioritizing these monomorphic versions and providing valid inputs for them. To address the problem, we extend existing API-dependency graphs to support generic APIs. By solving such dependencies and type constraints, we can generate a collection of candidate monomorphic APIs. Further, we apply a similarity-based filter to prune redundant versions, particularly if multiple monomorphic APIs adopt the identical trait implementation. Experimental results with 29 popular open-source libraries show that our approach can achieve promising generic API coverage with a low rate of invalid fuzz drivers. Besides, we find 23 bugs previously unknown in these libraries, with 18 bugs related to generic APIs. CCS CONCEPTS • Software and its engineering → Software defect analysis; Automated static analysis; • Security and privacy → Software security engineering. KEYWORDS Fuzzing, Program Synthesis, Rust ∗ Corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ISSTA 2024, 16-20 September, 2024, Vienna, Austria © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Reference Format: Yehong Zhang, Jun Wu, and Hui Xu. 2023. Fuzz Driver Synthesis for Rust Generic APIs. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024). ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Fuzzing is an automated technique for bug detection [12]. It tests a target executable program with random input and mutates the input according to the feedback information, such as code coverage. The technique can also be applied to library code by constructing executables that call the APIs of the library, known as fuzz drivers or fuzz targets. Due to its effectiveness and practicability, fuzzing has been widely employed by both industries [7, 20] and open-source communities [13, 22]. In this paper, we investigate library fuzzing for Rust crates, with a specific focus on addressing the automated fuzz driver synthesis problem for generic APIs. The problem is important because Rust is a system programming language that places a strong emphasis on security and robustness. Bugs within Rust libraries have the potential to impact all downstream code. Generic APIs are widely employed in Rust libraries, offering developers a viable means to avoid repetitively implementing the same API for different types. A generic API generally has one or multiple parameters of generic types e.g., T, which will be monomorphized to concrete types upon invocation. However, existing work on fuzz driver synthesis (e.g., RULF [10]) often neglects generic APIs or treats them merely as non-generic APIs. As a result, it either falls short in generating valid fuzz drivers for generic APIs or fails to produce diversified monomorphic versions for the same generic API. A prevailing approach to automated fuzz driver synthesis involves traversing API-dependency graphs [10]. However, when attempting to apply the method to generic APIs, two significant challenges emerge. Firstly, the type system of Rust is very powerful if not Turing-complete [11], leading to intricate dependencies for generic APIs and the difficulty of synthesizing valid API calls. In particular, one generic API may involve several type parameters (e.g., T, U, G), and each type parameter could be employed by several generic arguments (e.g., a:T, b:Vec) of the function. To choose a concrete type (e.g., i32) for the generic type T, we should ensure that all these required concrete types (e.g., a:i32, b:Vec) can be produced by other APIs. Besides, these generic parameters should satisfy trait bounds, which may either bound the type parameters or generic parameters. Secondly, there could be numerous or even an infinite number of monomorphic APIs for a generic API. Fuzzing all these variations is impractical due to the time-intensive nature of the process. Note that it may take several hours or days to fuzz one monomorphic API. Therefore, we need" 2312.10684v1,"State Estimation for Linear Systems with Quadratic Outputs Soulaimane Berkane, Senior Member, IEEE, Dionysis Theodosis, Tarek Hamel, Fellow, IEEE Dimos V. Dimarogonas, Fellow, IEEE Abstract— This letter deals with the problem of state estimation for a class of systems involving linear dynamics with multiple quadratic output measurements. We propose a systematic approach to immerse the original system into a linear time-varying (LTV) system of a higher dimension. The methodology extends the original system by incorporating a minimum number of auxiliary states, ensuring that the resulting extended system exhibits both linear dynamics and linear output. Consequently, any Kalman-type observer can showcase global state estimation, provided the system is uniformly observable. Index Terms— Estimation; Observers for nonlinear systems; Kalman filtering; Time-varying systems. I. I NTRODUCTION A. Motivation TATE estimation is a central problem in control theory, with widespread applications in various engineering fields. It consists of designing a software-implemented dynamical system, known as state observer, that allows the determination of the system’s internal state from measurements of its inputs and outputs. Several approaches have been proposed to address this problem; please refer to [4], [6], [16], [28], and related references therein. In this paper, we consider systems with linear dynamics and quadratic output measurements, i.e., systems of the form S ẋ =Ax + Bu, (1a) 1 ⊤ (1b) y h = x C h x + d ⊤ h x, h = 1, . . . , q, 2 where x ∈ R n is the state, u ∈ R p is the input, and y 1 , · · · , y q ∈ R are scalar outputs. The system matrices A ∈ R n×n , B ∈ R n×p , C h ∈ R n×n , and d h ∈ R n×1 are constant and, without any loss of generality, the matrices C h are assumed to be symmetric. Note that system (1) belongs to a specific class of nonlinear systems, and its observability properties are affected by the input u. In particular, for the S. Berkane is with the Département d’informatique et d’ingénierie, Université du Québec en Outaouis, Gatineau, Québec, Canada (email: soulaimane.berkane@uqo.ca). S. Berkane is also with the Department of Electrical Engineering, Lakehead University, Ontario, Canada. D. Theodosis is with the Dynamic Systems and Simulation Laboratory, Technical University of Crete, Greece (e-mail: dtheodosis@dssl.tuc.gr). D. V. Dimarogonas is with the Division of Decision and Control Systems, School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Sweden (e-mail: dimos@kth.se). T. Hamel is with I3S-CNRS, University Côte d’Azur and Institut universitaire de France, France (e-mail: thamel@i3s.unice.fr). * This research work is supported in part by NSERC-DG RGPIN- 2020-04759, Fonds de recherche du Québec (FRQ), the Swedish Research Council (VR), and the Knut och Alice Wallenberg foundation (KAW). trivial system ẋ = 0, y = x 2 , distinguishing between the initial conditions x 0 and −x 0 becomes impossible solely based on the provided output measurements. Systems exhibiting linear dynamics and quadratic outputs are prevalent in diverse control and estimation scenarios. Control of systems with quadratic outputs has been dealt with in [24] where the authors’ partial motivation stemmed from mechanical systems, in which one wishes to regulate specific energies, e.g., [29], [8]. Range measurements, often used in robot localization problems, can be written as quadratic outputs. Range-based state estimation techniques have been proposed, e.g., in [1], [3], [12], [20], [18], mainly dealing with single and double integrator systems. In [14], if quadratic functions approximate known terrain maps, terrainaided navigation can be achieved by designing an observer for the vehicle’s dynamics (single- or double-integrator systems) under quadratic output measurements. B. Literature Review For the design of an observer, one needs an appropriate notion of observability, namely, the ability to deduce the initial state vector by using the input and corresponding output information across a given time period. Typically, when studying the observability of a nonlinear system, it is commonly viewed as a local problem. The local weak observability of such a system can be determined using the standard observability rank condition [19, Theorem 3.1]. However, this condition alone is insufficient for designing an observer, as it heavily relies on the system’s input. In such cases, the design process is limited to specific classes of inputs, namely regular or persistently exciting inputs. More information on these input classes can be found in [6], [7], [9], [16], and related sources. To design observers for nonlinear systems, a well-known technique is the immersion approach, where the nonlinear system is transformed into a state-affine system with a higher dimension. This methodology has a long history of development. In [15], a necessary and sufficient condition for immersion based on the system’s observation space was presented. Another approach, as discussed in [2] and [21], utilized the solutions of a partial differential equation for the immersion process. Additionally, in [5], an immersion-based technique was introduced for a broad range of nonlinear systems (that are rank-observable), employing a high-gain design strategy. For systems with quadratic outputs, such as the one represented in (1), approaches outlined in [6], [11], [16], [17] demonstrate the feasibility of transforming the system into a canonical form by leveraging a local change of coordinates for suitable inputs. It’s important to note, however, that these" 2312.10705v1,"Enhancing Numeric-SAM for Learning with Few Observations Argaman Mordoch 1 , Shahaf S. Shperberg 1 , Roni Stern 1 , Brendan Juba 2 1 Ben Gurion University in Be’er Sheva, Israel 2 Washington University in St. Louis, USA mordocha@post.bgu.ac.il, shperbsh@bgu.ac.il, roni.stern@gmail.com, bjuba@wustl.edu Abstract A significant challenge in applying planning technology to real-world problems lies in obtaining a planning model that accurately represents the problem’s dynamics. Numeric Safe Action Models Learning (N-SAM) is a recently proposed algorithm that addresses this challenge. It is an algorithm designed to learn the preconditions and effects of actions from observations in domains that may involve both discrete and continuous state variables. N-SAM has several attractive properties. It runs in polynomial time and is guaranteed to output an action model that is safe, in the sense that plans generated by it are applicable and will achieve their intended goals. To preserve this safety guarantee, N-SAM must observe a substantial number of examples for each action before it is included in the learned action model. We address this limitation of N-SAM and propose N-SAM ∗ , an enhanced version of N-SAM that always returns an action model where every observed action is applicable at least in some state, even if it was only observed once. N-SAM ∗ does so without compromising the safety of the returned action model. We prove that N-SAM ∗ is optimal in terms of sample complexity compared to any other algorithm that guarantees safety. An empirical study on a set of benchmark domains shows that the action models returned by N-SAM ∗ enable solving significantly more problems compared to the action models returned by N-SAM. 1 Introduction Automated domain-independent planning is a long-term goal of Artificial Intelligence (AI) research, intended to be a robust approach for sequential decision-making, equipped to address a wide spectrum of problems. While the domain-independent planning algorithms (planners) can be applied directly to different domains, they rely on having a domain model, written in some description language such as the Planning Domain Description Language (PDDL) (?) or its later extnsions (Fox and Long 2003; ?). A domain model in domain-independent planning includes the agent’s action model, i.e., which actions the agent can perform, the preconditions to apply them, and their effect on the environment. Manually formulating real-world problems within this framework is notoriously challenging. Consequently, there has been a substantial effort in developing algorithms to automatically learn PDDL domains in general and action models in particular, from Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. observations (Cresswell and Gregory 2011; Aineto, Celorrio, and Onaindia 2019; Yang, Wu, and Jiang 2007; Juba, Le, and Stern 2021, inter alia). Using learned action models for planning, however, is risky since the learned model is arguably less dependable than a human-made one. To address this concern, algorithms from the Safe Action Model (SAM) Learning family (Stern and Juba 2017; Juba, Le, and Stern 2021; Juba and Stern 2022; Argaman Mordoch 2023) learn safe action models, i.e., the return action models that, under certain conditions, are guaranteed to only allow plans that are applicable in the real environment. N-SAM, a recent addition to this line of research, is the first algorithm for learning safe action models in planning environments that can include continuous and discrete state variables. It runs in polynomial time and supports learning actions’ preconditions and effects that can be articulated as sets of polynomial inequalities and equations of some degree k. To preserve safety, N-SAM does not include an observed action in the action model it returns before it has observed it multiple times in a sufficiently diverse set of states. Specifically, N-SAM learns the preconditions for an action a by constructing an n-dimensional convex hull, where n is a k-degree polynomial of the number of state variables. Consequently, N-SAM must observe action a being applied in at least n + 1 affinely independent states before it includes a in the returned action model. In other words, if N-SAM lacks this initial set of observations, it deems the action inapplicable in every state. This limits the applicability of N-SAM, especially in large domains with many relevant state variables. In this work, we propose N-SAM ∗ , an enhanced version of N-SAM that overcomes this limitation. N-SAM ∗ includes every observed action in the action model it returns, even if it is only observed once, without compromising N-SAM’s safety requirement. This is achieved by computing for every action a the subspace D a spanned by the states in which a was observed, using a slightly modified version of the well-known Gram-Schmidt process. Then, we project all observations to D a , and learn the preconditions and effects of a on this possibly lower-dimensional subspace. The key observation is that an action can be safely applicable in a state s if: 1) s is linearly dependent in the observation states, i.e., it lies on D a ; and 2) s is in the (possibly lower dimension)" 2312.10706v1,"Margin-closed regime-switching multivariate time series models Lin Zhang 1∗ 1 Harry Joe 1 Natalia Nolde 1 Department of Statistics, University of British Columbia, Vancouver, BC Canada V6T 1Z4 Abstract A regime-switching multivariate time series model which is closed under margins is built. The model imposes a restriction on all lower-dimensional sub-processes to follow a regime-switching process sharing the same latent regime sequence and having the same Markov order as the original process. The marginclosed regime-switching model is constructed by considering the multivariate margin-closed Gaussian VAR(k) dependence as a copula within each regime, and builds dependence between observations in different regimes by requiring the first observation in the new regime to depend on the last observation in the previous regime. The property of closure under margins allows inference on the latent regimes based on lower-dimensional selected sub-processes and estimation of univariate parameters from univariate sub-processes, and enables the use of multi-stage estimation procedure for the model. The parsimonious dependence structure of the model also avoids a large number of parameters under the regime-switching setting. The proposed model is applied to a macroeconomic data set to infer the latent business cycle and compared with the relevant benchmark. Keywords: Closure under margins, Regime-switching models, Latent regime inference, Multivariate time series, Gaussian copulas 1 Introduction In this paper we consider the setting in which data are in the form of a multivariate discrete-time time series with observations on d variables. The time series is non-stationary due to latent states, and the state of each regime remains constant over prolonged periods of time. One example for such a setting is the series of multiple macroeconomic indicators whose behavior is influenced by the business cycle. The latent states in this case correspond to economic expansion and recession. To model this type of time series data and infer the underlying latent regime sequence, we propose a regime-switching model that aims to balance flexibility, interpretability and parsimony in view of high computational costs associated with model fitting. In particular, we allow for flexible modeling of the marginal univariate distributions within each regime. A simple serial dependence construction is suggested for transitions between regimes. Within each regime, the dependence structure of the Gaussian vector autoregressive (VAR) time series model is imposed. But an important contribution to the existing literature includes the restriction of the entire process to be closed under margins. In the context of a stationary VAR model, closure under margins is considered in Zhang et al. (2023). This restriction for the regime-switching ∗ Corresponding author. Email address: lin.zhang@stat.ubc.ca 1" 2312.10715v1,"Finite element analysis of the nearly incompressible linear elasticity eigenvalue problem with variable coefficients Arbaz Khan · Felipe Lepe · David Mora · Jesus Vellojin Received: date / Revised version: date Updated: December 19, 2023 Abstract In this paper we present a mathematical and numerical analysis of an eigenvalue problem associated to the elasticity-Stokes equations stated in two and three dimensions. Both problems are related through the Herrmann pressure. Employing the Babuška–Brezzi theory, it is proved that the resulting continuous and discrete variational formulations are well-posed. In particular, the finite element method is based on general inf-sup stables pairs for the Stokes system, such that, Taylor– Hood finite elements. By using a general approximation theory for compact operators, we obtain optimal order error estimates for the eigenfunctions and a double order for the eigenvalues. Under mild assumptions, we have that these estimates hold with constants independent of the Lamé coefficient λ. In addition, we carry out the reliability and efficiency analysis of a residual-based a posteriori error estimator for the spectral problem. We report a series of numerical tests in order to assess the performance of the method and its behavior when the nearly incompressible case of elasticity is considered. Keywords elasticity eigenvalue problem · Stokes eigenvalue problem · finite elements · a priori error estimates · a posteriori error bounds Mathematics Subject Classification (2000) 65N30 · 65N12 · 76D07 · 65N15 1 Introduction The accurate solution of eigenvalue problems coming from continuum mechanics is crucial because the stability of systems relying on fluids or structures, or their coupling, hinges on understanding vibration modes associated with spectral problems. Notable monographs currently addressing this subject are cited here for reference [7]. One important aspect that is still under investigation is understanding the eigenvalue properties in parameter limits between Stokes and elasticity equations. It is well-established that in elasticity F. Lepe · D. Mora · J. Vellojin GIMNAP, Departamento de Matemática, Facultad de Ciencias, Universidad del Bı́o-Bı́o, Casilla 5-C, Concepción, Chile. E-mail: {flepe,dmora,jvellojin}@ubiobio.cl D. Mora CI 2 MA, Universidad de Concepción, Casilla 160-C, Concepción, Chile. A. Khan Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667, India. E-mail: arbaz@ma.iitr.ac.in" 2312.10728v1,"Accepted for publication in Transactions on Machine Learning Research Benchmarks for Physical Reasoning AI Andrew Melnik ∗ andrew.melnik.papers@gmail.com Center for Cognitive Interaction Technology, University of Bielefeld, Germany Robin Schiewer ∗ robin.schiewer@ini.rub.de Institute for Neural Computation, Department of Computer Science Ruhr University Bochum, Germany Moritz Lange ∗ moritz.lange@ini.rub.de Institute for Neural Computation, Department of Computer Science Ruhr University Bochum, Germany Andrei Muresanu andrei.muresanu@uwaterloo.ca University of Waterloo, Canada Vector Institute, Canada Mozhgan Saeidi mozhgans@stanford.edu Department of Computer Science, University of Toronto, Canada Vector Institute, Canada Department of Computer Science, Stanford University, USA Animesh Garg animesh.garg@gatech.edu University of Toronto, Canada Vector Institute, Canada Georgia Institute of Technology, USA Helge Ritter helge@techfak.uni-bielefeld.de Center for Cognitive Interaction Technology, University of Bielefeld, Germany Reviewed on OpenReview: https: // openreview. net/ forum? id= cHroS8VIyN Awesome list: https: // github. com/ ndrwmlnk/ Awesome-Benchmarks-for-Physical-Reasoning-AI Abstract Physical reasoning is a crucial aspect in the development of general AI systems, given that human learning starts with interacting with the physical world before progressing to more complex concepts. Although researchers have studied and assessed the physical reasoning of AI approaches through various specific benchmarks, there is no comprehensive approach to evaluating and measuring progress. Therefore, we aim to offer an overview of existing benchmarks and their solution approaches and propose a unified perspective for measuring the physical reasoning capacity of AI systems. We select benchmarks that are designed to test algorithmic performance in physical reasoning tasks. While each of the selected benchmarks poses a unique challenge, their ensemble provides a comprehensive proving ground for an AI generalist agent with a measurable skill level for various physical reasoning concepts. This gives an advantage to such an ensemble of benchmarks over other holistic benchmarks that aim to simulate the real world by intertwining its complexity and many concepts. We group the presented set of physical reasoning benchmarks into subcategories so that more narrow generalist AI agents can be tested first on these groups. ∗ Shared first authorship 1" 2312.10742v1,"Exploring Sound vs Vibration for Robust Fault Detection on Rotating Machinery 1 Exploring Sound vs Vibration for Robust Fault Detection on Rotating Machinery Serkan Kiranyaz, Ozer Can Devecioglu, Amir Alhams, Sadok Sassi, Turker Ince, Onur Avci, and Moncef Gabbouj Abstract— Robust and real-time detection of faults on rotating machinery has become an ultimate objective for predictive maintenance in various industries. Studies have indicated that around half of all motor failures are attributed to bearing faults alone. Vibration-based Deep Learning (DL) methodologies have become the de facto standard for bearing fault detection as they can produce state-of-the-art detection performances under certain conditions. Despite such particular focus on the vibration signal, the utilization of sound, on the other hand, has been neglected whilst only a few studies have been proposed during the last two decades, all of which were based on a conventional ML approach. One major reason is the lack of a benchmark dataset providing a large volume of both vibration and sound data over several working conditions for different machines and sensor locations. In this study, we address this need by presenting the new benchmark Qatar University Dual-Machine Bearing Fault Benchmark dataset (QU-DMBF), which encapsulates sound and vibration data from two different motors operating under 1080 working conditions overall. Then we draw the focus on the major limitations and drawbacks of vibration-based fault detection due to numerous installation and operational conditions. Finally, we propose the first DL approach for sound-based fault detection and perform comparative evaluations between the sound and vibration over the QU-DMBF dataset. A wide range of experimental results shows that the sound-based fault detection method is significantly more robust than its vibration-based counterpart, as it is entirely independent of the sensor location, cost-effective (requiring no sensor and sensor maintenance), and can achieve the same level of the best detection performance by its vibration-based counterpart. With this study, the QU-DMBF dataset, the optimized source codes in PyTorch, and comparative evaluations are now publicly shared. Index Terms—Operational Neural Networks; Bearing Fault Detection; Machine Health Monitoring. I. INTRODUCTION Accurate and instantaneous fault detection, especially for rotating machinery, is crucial for motor health monitoring and is required for several industries, such as mass production lines, S. Kiranyaz, is with the Electrical Engineering Department, Qatar University, Doha, Qatar (e-mail: mkiranyaz@qu.edu.qa). A. Alhams, and S. Sassi are with the Mechanical Engineering Department, Qatar University, Doha, Qatar (e-mail: aa1702913@qu.edu.qa; sadok.sassi@qu.edu.qa) O. Devecioglu and M. Gabbouj are with the Department of Computing Sciences, Tampere University, Tampere, Finland (e-mail: ozer.devecioglu@tuni.fi, moncef.gabbouj@tuni.fi,). manufacturing, aerospace, and energy. The most important components of rotating machinery are its bearings as they tend to fail in time which will eventually cause unexpected downtime, high maintenance costs, and even catastrophic accidents if not detected and prevented in advance. Numerous methodologies have focused on the vibration signal to detect and identify the bearing faults. They can be classified as: model-based methods [1]-[4], traditional signalprocessing approaches, [5]-[11], conventional machine learning (ML) and recent deep learning (DL) methods, [12]- [27]. Especially during the last decade, DL-based methods based on the vibration signal have increased tremendously. This is an expected outcome since the vibration signal can easily reveal the track changes over the mechanical behavior of a bearing, and thus, it has become a de facto standard in this domain. However, acquiring a reliable and high-quality vibration signal, first of all, requires good-quality sensors which further demands periodic maintenance. This may not only induce significant costs but also pose certain risks of malfunctioning over time. A fundamental problem is that the vibration signal is highly sensitive to the sensor location on the machinery. Take, for example, sample vibration signals acquired from the two machines of the QU-DMBF dataset [27] as shown in Figure 1. Despite some of the sensors being in a close vicinity, the signals from them are entirely different from one another, e.g., see the signals of sensors #2 and #5 from Machine A and sensors #6 and #3 as well as #2, #5, and #4 from Machine B. Therefore, any slight mispositioning of the sensor may result in poor detection performance by the DL method. Moreover, installing such wired sensorial equipment to nearby locations of rotating bearings will lead to certain challenges and operational drawbacks. Finally, vibration signals can easily get corrupted by several background noises such as ambient vibrations, electrical interference of the motor, and sensor variations. Most aforementioned studies ignored such variations and evaluated their proposed method assuming only one or few working condition(s) over the early benchmark datasets with limited vibration data, and a fixed sensor location. In particular, assuming the existence of sufficient fault data for T. Ince, is with the Electrical and Electronics Engineering Department, Izmir University of Economics, Izmir, Turkey (email:turker.ince@ieu.edu.tr). O. Avci is with the Department of Civil, Construction and Environmental Engineering, Iowa State University, Ames, IA, USA (email: onur.avci@mail.wvu.edu )" 2312.10747v1,"CEIR: C ONCEPT - BASED E XPLAINABLE I MAGE R EPRESENTATION L EARNING A P REPRINT Yan Cui ∗ Graduate School of Informatics Kyoto University yancui@kuicr.kyoto-u.ac.jp Shuhong Liu ∗ Graduate School of Information Science and Technology The University of Tokyo s-liu@isi.imi.i.u-tokyo.ac.jp Liuzhuozheng Li ∗ Graduate School of Frontier Sciences The University of Tokyo liuzhuozhengli@g.ecc.u-tokyo.ac.jp Zhiyuan Yuan ISTBI Fuda University zhiyuan@fudan.edu.cn A BSTRACT In modern machine learning, the trend of harnessing self-supervised learning to derive high-quality representations without label dependency has garnered significant attention. However, the absence of label information, coupled with the inherently high-dimensional nature improves the difficulty for the interpretation of learned representations. Consequently, indirect evaluations become the popular metric for evaluating the quality of these features, leading to a biased validation of the learned representation’s rationale. To address these challenges, we introduce a novel approach termed Concept-based Explainable Image Representation (CEIR). Initially, using the Conceptbased Model (CBM) incorporated with pretrained CLIP and concepts generated by GPT-4, we project input images into a concept vector space. Subsequently, a Variational Autoencoder (VAE) learns the latent representation from these projected concepts, which serves as the final image representation. Due to the representation’s capability to encapsulate high-level, semantically relevant concepts, the model allows for attributions to a human-comprehensible concept space. This not only enhances interpretability but also preserves the robustness essential for downstream tasks. For instance, our method exhibits state-of-the-art unsupervised clustering performance on benchmarks such as CIFAR10, CIFAR100, and STL10. Furthermore, capitalizing on the universality of human conceptual understanding, CEIR can seamlessly extract the related concept from open-world images without fine-tuning. This offers a fresh approach to automatic label generation and label manipulation. Github: https://github.com/ShuhongLL/CEIR Keywords Concept Bottleneck Model · Unsupervised Learning · Image Clustering 1 Introduction As self-supervised and unsupervised representation learning becomes more and more popular in real-world applications, the necessity for interpretable representations has attracted the attention of the research community recently Yang et al. [2022]Crabbé and van der Schaar [2022]. Firstly, such interpretability aids users in understanding and navigating the feature space. Additionally, it enables the assessment of the quality and rationale behind the learned representations from a semantic standpoint. Secondly, this introduces alternative metrics for evaluating representation quality, deviating from the traditionally favored linear-probing evaluation protocol. The conventional linear probing method relies on ∗ Equal contribution" 2312.10766v1,"A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection Xiaoyu Zhang Cen Zhang Tianlin Li Xi’an Jiaotong University Xi’an, China zxy0927@stu.xjtu.edu.cn Nanyang Technological University Singapore cen001@e.ntu.edu.sg Nanyang Technological University Singapore tianlin001@e.ntu.edu.sg Yihao Huang Xiaojun Jia Xiaofei Xie Nanyang Technological University Singapore huangyihao22@gmail.com Nanyang Technological University Singapore jiaxiaojunqaq@gmail.com Singapore Management University Singapore xiaofei.xfxie@gmail.com Yang Liu Chao Shen Nanyang Technological University Singapore yangliu@ntu.edu.sg Xi’an Jiaotong University Xi’an, China chaoshen@xjtu.edu.cn ABSTRACT Large Language Models (LLMs) and Multi-Modal LLMs (MLLMs) have become pervasive and play a crucial role in numerous applications, powering everything from simple chatbots to complex decision-making systems. As their influence grows, so does the importance of their security; yet, modern LLMs are known to be vulnerable to jailbreaking attacks. These attacks can allow malicious users to exploit the models, making the case for effective jailbreak detection mechanisms an essential aspect of maintaining the integrity and trustworthiness of LLM-based applications. Although there are existing works dedicated to detecting jailbreak attacks, they have shown certain limitations. Notably, many current strategies are post-query based, which require specific target domain knowledge and only identify security breaches after they have occurred. Others, which are pre-query based, mainly focus on text-level attacks and fail to meet the increasingly complex multimodal security requirements placed upon contemporary LLMs. This gap underscores the need for a more comprehensive approach to safeguarding these influential systems. In this work, we propose JailGuard, the first mutation-based jailbreaking detection framework which supports both image and text modalities. Our key observation is that attack queries inherently possess less robustness compared to benign queries. Specifically, to confuse the model, attack queries are usually crafted with well-designed templates or complicate perturbations, leading to a fact that a slight disturbance in input may result in a drastic change in the response. This lack of robustness can be utilized in attack detection by first mutating the incoming input into variant queries and then checking the divergence of the responses of the variants. Based on this intuition, we designed and implemented a detection framework comprising 19 different mutators and a divergencebased detection formula. To fully understand the effectiveness of our framework, we built the first multi-modal LLM jailbreaking attack dataset, which has 304 items of data, covering ten types of known jailbreaking attacks on image and text modalities. The evaluation suggests that JailGuard achieves the best detection accuracy of 89.38%/85.42% on image and text inputs, outperforming state-of-the-art defense methods by 15.28%. KEYWORDS Jailbreaking Detection, LLM Security, Large Language Model 1 INTRODUCTION Large Language Models (LLMs) have become commonplace in our technological interactions, from chatbots to complex decisionmaking engines [3, 13]. They can perform tasks like understanding sentences, answering questions, and creating text that looks like it was written by a human. This has made them extremely helpful and valuable in many different areas. The advent of Multi-Modal Large Language Models (MLLMs) has expanded these functionalities even further by incorporating visual understanding, allowing them to interpret and generate imagery alongside text, enhancing user experience with rich, multi-faceted interactions [4, 56]. Despite their utility, the ubiquity of LLMs and MLLMs raises substantial security concerns. One key challenge is protecting against jailbreaking attacks, in which malicious attackers can manipulate models into violating rules or leaking confidential data [12, 16, 58]. Such vulnerabilities can have far-reaching consequences, undermining the models’ reliability, exposing sensitive information, enabling the spread of misinformation, and damaging the overall trust in AI- driven applications. Addressing these security gaps is critical, particularly for MLLMs, whose visual capabilities could be weaponized to create deceptive or harmful multimedia content. Conclusively, there is an urgent need for strong protective measures that can prevent and respond to these jailbreaking attacks. There are several LLM defense researches, which can be divided into two categories: pre-query and post-query defenses. Post-query defenses are typically reactive, triggered after the model has already generated its outputs. These methods necessitate the construction of rules and detectors, such as those used in the Azure content detector [2], to discern and intercept inappropriate or sensitive content produced by the LLM. While post-query methods are effective, they require extensive domain knowledge and are only triggered after" 2312.10768v1,"Temporal origin of nestedness in interaction networks Phillip P. A. Staniczenko, 1,∗ Debabrata Panja 2,3 City University of New York (CUNY), Brooklyn College, 2900 Bedford Avenue, Brooklyn, NY 11210, USA 2 Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands 3 Centre for Complex Systems Studies, Utrecht University, Minnaertgebouw, Leuvenlaan 4, 3584 CE Utrecht, The Netherlands ∗ To whom correspondence should be addressed; E-mail: pstaniczenko@brooklyn.cuny.edu 1 Abstract Nestedness is a common property of communication, finance, trade, and ecological networks. In networks with high levels of nestedness, the link positions of low-degree nodes (those with few links) form nested subsets of the link positions of high-degree nodes (those with many links), leading to matrix representations with characteristic upper-triangular or staircase patterns. Recent theoretical work has connected nestedness to the functionality of complex systems and has suggested it is a structural by-product of the skewed degree distributions often seen in empirical data. However, mechanisms for generating nestedness remain poorly understood, limiting the connections that can be made between system processes and observed network structures. Here, we show that a simple probabilistic model based on phenology — the timing of co-presences among interaction partners — can produce nested structures and correctly predict around two-thirds of interactions in two fish market networks and around one-third of interactions in 22 plant-pollinator networks. Notably, the links most readily explained by frequent actor co-presences appear to form a backbone of nested interactions, with the remaining interactions attributable to opportunistic interactions or preferences for particular interaction partners that are not routinely available. Significance statement: Networks describe the relationships among actors in complex systems. In nested networks, actors involved in few interactions are connected to actors involved in many interactions, with those highly-connected actors also interacting with other highly-connected actors. This pattern is seen in a variety of empirical systems and influences the response to external perturbations, but little is known about the processes that give rise to nestedness. We show that phenology, the day-to-day timing of interaction partner availability, is a general mechanism that generates nested structures. We present a simple probabilistic model which accounts for actor overlap through time but assumes actors have no preference for specific interaction partners, thereby providing an instructive baseline for investigating higher-level selection processes in interaction networks. 1" 2312.10796v1,"Two sample test for covariance matrices in ultra-high dimension Xiucai Ding ∗ , Yichen Hu † , and Zhenggang Wang ‡ Department of Statistics, UC Davis Abstract In this paper, we propose a new test for testing the equality of two population covariance matrices in the ultra-high dimensional setting that the dimension is much larger than the sizes of both of the two samples. Our proposed methodology relies on a data splitting procedure and a comparison of a set of well selected eigenvalues of the sample covariance matrices on the split data sets. Compared to the existing methods, our methodology is adaptive in the sense that (i). it does not require specific assumption (e.g., comparable or balancing, etc.) on the sizes of two samples; (ii). it does not need quantitative or structural assumptions of the population covariance matrices; (iii). it does not need the parametric distributions or the detailed knowledge of the moments of the two populations. Theoretically, we establish the asymptotic distributions of the statistics used in our method and conduct the power analysis. We justify that our method is powerful under very weak alternatives. We conduct extensive numerical simulations and show that our method significantly outperforms the existing ones both in terms of size and power. Analysis of two real data sets is also carried out to demonstrate the usefulness and superior performance of our proposed methodology. An R package UHDtst is developed for easy implementation of our proposed methodology. Keywords: Two sample test, Covariance matrices, Ultra-high dimension, Random matrix theory 1 Introduction Testing the equality of two population covariance matrices is of fundamental importance in statistical analysis. For two samples X := {x i ∈ R p , 1 ≤ i ≤ n 1 } and Y := {y j ∈ R p , 1 ≤ j ≤ n 2 } ∗ Email: xcading@ucdavis.edu. XCD is an assistant professor at UC Davis. The work is partially supported by NSF DMS-2113489 and UC Davis Office of Research via a grant from COVID-19 Research Accelerator Funding Track. † Email: ethhu@ucdavis.edu. YCH is a PhD student at UC Davis under the supervision of XCD. ‡ Email: zggwang@ucdavis.edu. ZGW is a postdoc at UC Davis under the support of XCD (via NSF DMS-2113489 and UC Davis Office of Research via a grant from COVID-19 Research Accelerator Funding Track). 1" 2312.10807v1,"1 Language-conditioned Learning for Robotic Manipulation: A Survey † Corresponding author: Zhenshan Bing zhenshan.bing@tum.de ction I Intera dA die bo Em ∗ Equally contribution. an gu g u n d in ag e eL ive rat o b a Coll tic s n La ob o Ex ca ecu tion re ap pli cati ons ur Nat gu tio n Gro age P rocessing Home Au tom atio n Ac In the ever-evolving landscape of robotics and artificial intelligence, a profound transformation is underway—one that promises to bridge the gap between machines and humanity, enabling seamless interaction between humans and robots. At the heart of this transformation lies the concept of language-conditioned robot manipulation. This groundbreaking paradigm shift heralds a future where robots are no longer confined to the factory floor or research laboratories but are seamlessly integrated into our daily lives, becoming indispensable companions and collaborators. To achieve this ultimate goal of robotics, integrating robot manipulation and natural language commands has gained more research attention recently. This emerging field represents a convergence of natural language processing, computer vision, and robotics, enabling robots to understand the surrounding environment and interpret human language commands, instructions, and queries, and subsequently translate this linguistic input into precise physical actions based on current scenarios within the real world. Language-conditioned learning achieves remarkable success in robotic arm manipulation [1] [2] [3] [4] [5] [6], game playing [7] [8], navigation tasks [9] [10], humanrobot interaction[11],[12], [13], and autonomous driving [14] [15]. In the near future, advancements in language-conditioned ics I. I NTRODUCTION puter Vision Com ot Rob Index Terms—Language-conditioned learning, robotic manipulation, imitation learning, reinforcement learning ware Service R obo text-a t Con derstandi n U e n ng Sce h alt He Abstract—Language-conditioned robotic manipulation represents a cutting-edge area of research, enabling seamless communication and cooperation between humans and robotic agents. This field focuses on teaching robotic systems to comprehend and execute instructions conveyed in natural language. To achieve this, the development of robust language understanding models capable of extracting actionable insights from textual input is essential. In this comprehensive survey, we systematically explore recent advancements in language-conditioned approaches within the context of robotic manipulation. We analyze these approaches based on their learning paradigms, which encompass reinforcement learning, imitation learning, and the integration of foundational models, such as large language models and vision-language models. Furthermore, we conduct an in-depth comparative analysis, considering aspects like semantic information extraction, environment & evaluation, auxiliary tasks, and task representation. Finally, we outline potential future research directions in the realm of language-conditioned learning for robotic manipulation, with the topic of generalization capabilities and safety issues. Policy Learning Hongkuan Zhou ∗ , Xiangtong Yao ∗ , Yuan Meng ∗ , Siming Sun, Zhenshan Bing † , Kai Huang, Alois Knoll R Fig. 1: Language-conditioned robot manipulation sits at the cross- roads of computer vision, natural language processing, and robotics. Common tasks like scene understanding, language grounding, policy learning, and action execution are widely studied in this realm. The potential for language-conditioned robot manipulation is bright, particularly in use cases such as home automation, healthcare, collaborative robots, and service robotics, where significant benefits are anticipated from its development. robot manipulation will greatly benefit fields like collaborative robotics, healthcare, and home automation. Figure 1 demonstrates a summary of common tasks and use cases for language-conditioned robot manipulations. However, this field also presents significant challenges: 1) How to extract the semantic meaning of natural language? 2) How to enable the robot to understand the surrounding environment by utilizing its built-in sensors? 3) How to ground natural language to those perceived entities in the environment and precise mechanical actions? In order to address these three problems, many approaches modularize the robot with three parts, namely the language module, the perception module, and the control module, as illustrated in Figure 2. To extract the semantic meaning of natural language, some early research works leverage formal specification languages such as temporal logic [16] [17], which support formal" 2312.10809v1,"Deep-Dispatch: A Deep Reinforcement Learning-Based Vehicle Dispatch Algorithm for Advanced Air Mobility Elaheh Sabziyan Varnousfaderani ∗ , Syed A. M. Shihab † , and Esrat F. Dulia ‡ Kent State University, Kent, OH, USA 44242 Near future air taxi operations with electric vertical take-off and landing (eVTOL) aircraft will be constrained by the need for frequent recharging of eVTOLs, limited takeoff and landing pads in vertiports, and subject to time-varying demand and electricity prices, making the eVTOL dispatch problem unique and particularly challenging to solve. Previously, we have developed optimization models to address this problem. Such optimization models however suffer from prohibitively high computational run times when the scale of the problem increases, making them less practical for real world implementation. To overcome this issue, we have developed two deep reinforcement learning-based eVTOL dispatch algorithms, namely single-agent and multi-agent deep Q-learning eVTOL dispatch algorithms, where the objective is to maximize operating profit. An eVTOL-based passenger transportation simulation environment was built to assess the performance of our algorithms across 36 numerical cases with varying number of eVTOLs, vertiports, and demand. The results indicate that the multi-agent eVTOL dispatch algorithm can closely approximate the optimal dispatch policy with significantly less computational expenses compared to the benchmark optimization model. The multi-agent algorithm was found to outperform the single-agent counterpart with respect to both profits generated and training time. Nomenclature 𝑁 = number of eVTOLs in the AAM air taxi operator’s fleet 𝑀 = number of vertiports in the AAM air taxi operator’s network 𝑛 = number of time steps in the dispatch horizon or episode 𝑖 = index for eVTOLs: 𝑖 ∈ 1, ..., 𝑁 𝑗, 𝑘 = index for vertiports: 𝑗, 𝑘 ∈ 1, ..., 𝑀 𝑡 = time step: 𝑡 ∈ {1, ..., 𝑛} ∗ Graduate Research Assistant, College of Aeronautics and Engineering, esabziya@kent.edu † Assistant Professor, College of Aeronautics and Engineering, AIAA Member, sshihab@kent.edu ‡ Graduate Research Assistant, College of Aeronautics and Engineering, edulia@kent.edu" 2312.10817v1,"Ocean Data Quality Assessment through Outlier Detection-enhanced Active Learning Na Li ∗ , Yiyang Qi †∗ , Ruyue Xin ∗ , Zhiming Zhao ∗‡ ∗ Multiscale Networked System, Informatics Institute, University of Amsterdam, Netherlands † Computer Science Department, Vrije Universiteit Amsterdam, Amsterdam, Netherlands ‡ LifeWatch ERIC Virtual Lab and Innovation Center (VLIC), Amsterdam, Netherlands n.li@uva.nl, y.qi@student.vu.nl, r.xin@uva.nl, z.zhao@uva.nl Abstract—Ocean and climate research benefits from global ocean observation initiatives such as Argo, GLOSS, and EMSO. The Argo network, dedicated to ocean profiling, generates a vast volume of observatory data. However, data quality issues from sensor malfunctions and transmission errors necessitate stringent quality assessment. Existing methods, including machine learning, fall short due to limited labeled data and imbalanced datasets. To address these challenges, we propose an Outlier Detection-Enhanced Active Learning (ODEAL) framework for ocean data quality assessment, employing Active Learning (AL) to reduce human experts’ workload in the quality assessment workflow and leveraging outlier detection algorithms for effective model initialization. We also conduct extensive experiments on five large-scale realistic Argo datasets to gain insights into our proposed method, including the effectiveness of AL query strategies and the initial set construction approach. The results suggest that our framework enhances quality assessment efficiency by up to 465.5% with the uncertainty-based query strategy compared to random sampling and minimizes overall annotation costs by up to 76.9% using the initial set built with outlier detectors. Index Terms—ocean data quality control, Argo, machine learning, active learning, initial set construction I. I NTRODUCTION To support ocean and climate research, several international ocean observation programs and projects, such as Array for Real-time Geostrophic Oceanography (Argo) [1], Global Sea Level Observing System (GLOSS) [2], European Multidisciplinary Seafloor Observatory (EMSO) [3], have been launched for observations and measurements at different sea depths [4]. The Argo observation network, dedicated to profiling the global ocean, comprises thousands of profilers that produce enormous observatory data over time. However, the data records usually suffer from quality problems caused by sensor damage, equipment malfunction, and data transmission errors, which may potentially lead to inaccurate scientific conclusions. Thus, it is of great significance to conduct data Quality Control (QC) before it can be used for any downstream applications [5]. Due to the strict requirements on the data credibility, the QC process is mainly done by domain experts or involves a high degree of human engagement, and hence is extremely laborious and time-consuming [6]. Existing studies have proposed automated and semiautomated data quality assessment approaches to assist QC experts. Traditional methods apply a sequence of rule-based statistical tests on the data instances [6]–[8]. These methods rely on pre-defined quality criteria and are subject to specific observation types. As a result, it can only perform basic examination for the validity of data and still depends on manual inspection for accurate outputs. An emerging research direction is to exploit Machine Learning (ML) methods for ocean data quality assessment [9]–[12]. One branch of studies utilizes anomaly detection techniques [13] to identify erroneous measurements from the dataset [9], [10]. Another line of research employs deep neural networks to classify samples into different quality categories [11]. Nonetheless, two main challenges remain in automated QC research. The first challenge is the lack of labeled data for training ML models. Despite the existence of historically labeled data, it is not trivial to transfer knowledge from one dataset to another due to domain shift or concept drift issues. Targeting this challenge, we propose utilizing AL methods [14] to reduce the number of labeled instances required for optimizing ML models. AL query strategies can select the most informative data instances for labeling and thus improve model performances in a data-efficient manner. In the context of data quality assessment, AL can select the most tricky samples that require manual examination and automate the quality assessment for the rest of the samples. The second challenge is the cold-start problem in AL methods posed by severe data imbalance w.r.t. quality labels, with erroneous measurements occupying less than 1% of the datasets. In a typical AL scenario, an initial set is required to initialize the classifiers, and the iterative query process follows to refine the classifiers [14]. However, a small initial set built from a severely imbalanced dataset likely contains zero erroneous instances, on which classifiers are unable to learn meaningful representations for the erroneous instances and consequentially mislead the query process. This is referred to as the cold-start problem. To address this issue, we propose to leverage the outlier detectors for initial set construction, which can increase the probability for initial sets to include erroneous samples and improve their effectiveness in initializing classifiers. In this paper, we present an Outlier Detection-Enhanced Active Learning (ODEAL) framework for ocean data quality assessment, which applies AL to reduce the workload of QC experts in a semi-automated data quality assessment workflow and employs outlier detection algorithms to initialize the" 2312.10829v1,"MSUHEP-23-033 Systematic Improvement of x-dependent Unpolarized Nucleon Generalized Parton Distribution in Lattice-QCD Calculation Jack Holligan 1, ∗ and Huey-Wen Lin 1, † 1 Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 We present a first study of the effects of renormalization-group resummation (RGR) and leadingrenormalon resummation (LRR) on the systematic errors of the unpolarized isovector nucleon generalized parton distribution in the framework of large-momentum effective theory (LaMET). This work is done using lattice gauge ensembles generated by the MILC collaboration, consisting of 2+1+1 flavors of highly improved staggered quarks with a physical pion mass at lattice spacing a ≈ 0.09 fm and a box width L ≈ 5.76 fm. We present results for the nucleon H and E GPDs with average boost momentum P z ≈ 2 GeV at momentum transfers Q 2 = [0, 0.97] GeV 2 at skewness ξ = 0 as well as Q 2 ∈ 0.23 GeV 2 at ξ = 0.1, renormalized in the MS scheme at scale µ = 2.0 GeV, with two- and one-loop matching, respectively. We demonstrate that the simultaneous application of RGR and LRR significantly reduces the systematic errors in renormalized matrix elements and distributions for both the zero and nonzero skewness GPDs, and that it is necessary to include both RGR and LRR at higher orders in the matching and renormalization processes. PACS numbers: 12.38.-t, 11.15.Ha, 12.38.Gc I. INTRODUCTION An open question in the theory of quantum chromodynamics (QCD) is how the fundamental degrees of freedom, quarks and gluons, comprise the more massive hadrons. The quarks and gluons (known collectively as partons) contribute to a hadron’s mass and spin but cannot be studied in isolation due to confinement. Thus, knowledge of the internal structure of a hadron is of great value. Great effort has been focused on the study of parton distribution functions (PDFs), which describe the distribution of a hadron’s longitudinal momentum among its constituents, and a great deal has been learned about hadronic structure from these studies (see Ref. [1] for a review from Snowmass 2021). However, the PDF only paints a one-dimensional picture of the hadron, since it is dependent solely on longitudinal momentum. Generalized parton distributions (GPDs) contain more information about the hadron, including spin structure, form factors and how the longitudinal momentum of the parton depends on the distance from the center of the hadron. The unpolarized GPD is comprised of two functions commonly denoted H and E, defined in terms of matrix elements on the lightcone as dz − ixp + z − D ′′  z  +  z z   z  ′ E e p ψ − γ L − , ψ p 4π 2 2 2 2   iσ +ν Q ν 1 u(p ′ ) , = + H(x, Q 2 , ξ)u(p ′′ )γ + u(p ′ ) + E(x, Q 2 , ξ)u(p ′′ ) 2p 2m F (x, Q 2 , ξ) = Z where L(−z/2, z/2) is a link along the lightcone, Q µ = ′′+ ′+ (p ′′ − p ′ ) µ is the momentum transfer, and ξ = p p ′′+ −p +p ′+ is the skewness. In the limit Q 2 → 0 and ξ → 0, the H GPD reduces to the PDF. The E GPD is inaccessible in this limit, since it is multiplied by the momentum transfer vector. GPDs can be probed experimentally by processes such as deeply-virtual Compton scattering (DVCS) [2, 3] or deeply-virtual meson production (DVMP) [4], and their study will be an important experimental program at the future Electron-Ion Collider (EIC) [5–9]. Lattice QCD involves converting the QCD path integral from continuous Minkowski spacetime to discrete Euclidean spacetime, making field-theory calculations amenable to supercomputers. It can provide early in- (1) sight into GPD functions complementary to experimental programs. The computation of the Bjorken-x dependence of parton distributions can be studied in the framework of lattice QCD using one of several recent methods: the “hadronic-tensor approach” [10–15], the Comptonamplitude approach (or “OPE without OPE”) [16–28], the “current-current correlator” method [23, 29–35], or large-momentum effective theory (LaMET) [36–38], which is our focus in this paper. The method of LaMET begins with the study of spatially separated, equal time, matrix elements of boosted hadrons computed directly on the lattice:  z   z z   z  h B (z, Q 2 , ξ) = ⟨p ′′ |ψ − ΓW − , ψ |p ′ ⟩ (2) 2 2 2 2" 2312.10832v1,"Theory of zero-bias photocurrent in topological insulators S. A. Jafari 1, ∗ 1 Peter Grünberg Institute 2, Forschungszentrum Jülich, 52425 Jülich, Germany (Dated: December 19, 2023) Motivated by observations of zero-biased photocurrent on the surface of topological insulators, we show that the in-plane effective magnetic field B̃ implements a moving frame transformation on the topological insulators’ helical surface states. As a result, photo-excited electrons on the surface undergo a Galilean boost proportional to the effective in-plane magnetic field B̃. The boost velocity is transversely proportional to B̃. This explains why the experimentally observed photocurrent depends linearly on B̃. Our theory while consistent with the observation that at leading order the effect does not depend on the polarization of the incident radiation, at next leading order in B̃ predicts a polarization dependence in both parallel and transverse directions to the polarization. We also predict two induced Fermi surface effects that can serve as further confirmation of our moving frame theory. Our geometric picture qualifies the surface Dirac cone of magnetic topological insulators as an accessible platfrom for the synthesis and experimental investigation of various geometric phenomena such as gravitomagnetic effect. Introduction: Surface states of topological insulators (TIs) [1] feature a helical Dirac cone [2] where the twodimensional Pauli matrices representing the associated Clifford algebra are realized by the actual spin of the electrons. This simple fact means that external magnetic influence can be employed to manipulate them in interesting ways. Ideally their Hamiltonian is given by v(p x σ y − p y σ x ). Breaking the time-reversal (TR) invariance by a magnetic field perpendicular to the surface gives rise to a mσ z term that opens up a gap, whereas an in plane magnetic field being a combination of σ x and σ y terms only shifts the location of the Dirac node, but does not open up a gap. The in-plane fields give rise to fascinating effects such as planar Hall effect [3, 4]. It has been experimentally found that in presence of in-plane magnetic field, a zero-bias photo-current flows in the sample whose direction is transverse to the in-plane magnetic field, and its magnitude is proportional to the amount of the in-plane magnetic field [5]. A similar photo-current is observed at the zero external magnetic field [6]. This effect is a basis for the application of TIs in infrared optoelectronics [7]. The fact that σ matrices in the surface Dirac cone of TIs are actual spins, allows to use magnetic fields or magnetization to influence the Dirac cones. Can the Dirac cones manipulated in other interesting ways? In this paper by providing a theory for the observed zero-bias in TIs, we show that surface Dirac cones in TIs are promising platform to manipulate Dirac cones in ways that resembles the the way gravitational sources influences the null geodesics (cones) [8]. The above simple theory of helical Dirac cones ignores an important fact: The bulk band edge states have two completely different characters with with opposite parities [2], such as s and p character. As such, the particle-hole (PH) asymmetry is a genuine property of the helical Dirac cones as is evident from photemission data both in bulk [1, 9] thin films of TIs [10, 11] and must be incorporated into theoretical considerations [12]. The PH symmetry is represented by the fact that Pauli matrices σ x,y that construct the helical Dirac states ∗ akbar.jafari@rwth-aachen.de anti-commute with σ z . The simplest way to break PH symmetry is to add a term proportional to the σ 0 (unit 2 × 2). A constant term proportional to σ 0 is ruled out as it redefines the energy axis. A linear term in ~p can be of the form ζ ~ (0) .~ p σ 0 with the provision that since it is odd in p ~ , the other Dirac cone on the other surface must have the same form with opposite ζ ~ (0) value. There can also be a term even in p ~ that can be combined to give, H 0 = v(p x σ y − p y σ x ) + p 2 σ 0 + τ z ζ ~ (0) p ~ .σ 0 2m ∗ (1) where τ z = ±1 correspond to top and bottom surface and the PH asymmetry is represented by m −1 ∗ . The PH symmetric situation corresponds to m −1 → 0. Quadratic PH breaking ∗ term also appears in a microscopic derivation of the TI surface states [13] as well as in TI thin films [14]. Note that we are ignoring the trigonal warping terms [15, 16] that are not relevant to the basic phenomenon addressed in this work. The purpose of this letter is two-fold: (1) To construct a theory the zero bias photo-current in magnetic [5] and nonmagnetic TIs [6] that relies on PH asymmetry and timereversal (TR) symmetry for the observed zero-bias photocurrent response with additional higher order predictions. (2) To reveal a moving frame picture of Galilean boost inherent in the Hamiltonian (1). The latter establishes an intriguing paradigm of synthesizing a large class of emergent spacetime structures via engineering of the spin-orbit coupled Dirac cones by external magnetic influence. In-plane magnetic field as knob to tune tilting of Dirac ~ to Eq. (1). This cone: Let us couple external magnetic field B magnetic field in Ref. [5] is denoted by B y . As can be seen in Fig. 3a,b of Ref. [5], even at temperatures above the Curie temperature T c = 85K of the Cr atoms, the photo-current ~ For T > T c , the magnetizacontinues to be linear in B. tion m ~ of the Cr atoms is zero and the entire photo-current ~ field. This indicates that both is caused by the external B ~ and exchange couthe Direct Zeeman coupling to external B pling to magnetization m ~ are important in the response of the Dirac cone. Therefore we introduce an effective magnetic ~ + m ~ field B̃ = B ~ where the magnetization m ~ = m(T, ~ B)" 2312.10843v1,"HIGH-FIDELITY FACE SWAPPING WITH STYLE BLENDING Xinyu Yang Hongbo Bo x.yang28@lancaster.ac.uk ABSTRACT Face swapping has gained significant traction, driven by the plethora of human face synthesis facilitated by deep learning methods. However, previous face swapping methods that used generative adversarial networks (GANs) as backbones have faced challenges such as inconsistency in blending, distortions, artifacts, and issues with training stability. To address these limitations, we propose an innovative end-to-end framework for high-fidelity face swapping. First, we introduce a StyleGAN-based facial attributes encoder that extracts essential features from faces and inverts them into a latent style code, encapsulating indispensable facial attributes for successful face swapping. Second, we introduce an attention-based style blending module to effectively transfer Face IDs from source to target. To ensure accurate and quality transferring, a series of constraint measures including contrastive face ID learning, facial landmark alignment, and dual swap consistency is implemented. Finally, the blended style code is translated back to the image space via the style decoder, which is of high training stability and generative capability. Extensive experiments on the CelebA-HQ dataset highlight the superior visual quality of generated images from our face-swapping methodology (as shown in Fig. 1) when compared to other state-of-the-art methods, and the effectiveness of each proposed module. Source code and weights will be publicly available. Index Terms— AI Generated Content, Face Synthesis, Generative Adversarial Network 1. INTRODUCTION Face swapping is an emerging yet controversial topic in face synthesis. It holds significant potential for positive applications in entertainment, film and television production, human-computer interaction, and privacy protection etc.. This task involves transferring the identity of a source face image to the target image while retaining the illumination, head posture, facial expression, background, and other attribute information of the target image. It poses a significant challenge because there is no available ground truth for the swapped image, and objective evaluation metrics are scarce as most assessments rely on subjective perception. While early face swapping methods required numerous images of the source identities and the target identities for model training [1, 2], the trained models were specifically tailored to these identities, limiting transferability to unseen identities. Leveraging the powerful generative capacity of GAN, recent face-swapping methods have achieved high transferability on unseen identities, generating images effectively blending source and target identities along with facial attribute information [3, 4, 5, 6]. However, these methods struggle to balance between the identity similarity and the retention of target’s low-level details, such as illumination and background, leading to frequent artifacts and low-fidelity generated contents. The development of image generation methods [7, 8, 9, 10] has greatly advanced the face synthesis task. Most notably, StyleGAN Source Target Result Source Target Result Fig. 1. Face Swap Visualisation. Replace the face in the target image with the face from the source. Our results are displayed on the right. [7] introduces the concept of style code, which enhances the controllability of the synthesis process and enables the generation of high-resolution photorealistic faces. The style code in the potential latent space W is projected from a random vector in the initial latent space Z. It has been observed that the projected style code is abundant with relevant facial attributes, playing a crucial role in facilitating the generation of visually compelling facial images. Inspired by this controllable face synthesis technique, we introduce a novel faceswapping pipeline that can leverage the style code for synthesizing faces in the source image. Our approach prioritizes generating highquality faces while also balancing identity similarity as well as the background details in the target image. Our approach consists of three key components: facial attributes encoder, style blending module, and style decoder. Our facial attributes encoder first extract both source and target face features that encapsulate the facial attributes and identity information, and then mapping them to a latent space at multiple levels of scales (feature pyramids). The target embeddings are reused as the decoder’s input, which is crucial for retaining the low-level details of the original targets in the generated images. Secondly, the source embeddings and the target embeddings are blended using a style blending module (SBM) that utilizes multi-head cross attention (MHCA). We propose contrastive face ID learning, facial landmark alignment, and dual swap consistency to guide MHCA to pay attention only to the face attributes from the target embeddings and only the facial identities from source embeddings. Finally, with the pre-trained style decoder, the blended embeddings in the latent space are decoded into images by leveraging the low-level features that are directly fed to the decoder. This can help ensure that the generated content retains as much low-level detail as possible. 2. FACE SWAPPING WITH STYLE BLENDING In this section, we introduce an end-to-end framework for highfidelity face swapping. Our framework follows the traditional GAN methods which consists of a generator G and a discriminator V. In our generator, the facial attributes encoder E encodes both the target input image I t and the source input image I s which randomly sampled from dataset into the style latent space W, denote as W t" 2312.10847v1,"Two-mode squeezing and SU(1,1) interferometry with trapped ions J. Metzner 1 , A. Quinn 1 , S. Brudney 1 , I.D. Moore 1 , ∗ S.C. Burd 2 , D.J. Wineland 1 , and D.T.C. Allcock 1† 1 Department of Physics, University of Oregon, Eugene, OR, USA and 2 Department of Physics, Stanford University, Stanford, CA, USA (Dated: December 19, 2023) We experimentally implement circuits of one and two mode operations on two motional modes of a single trapped ion. This is achieved by implementing the required displacement, squeezing, two-mode squeezing, and beamsplitter operations using oscillating electric potentials applied to the trap electrodes. The resulting electric fields drive the modes resonantly or parametrically without the need for optical forces. As a demonstration, we implement SU(2) and SU(1,1) interferometers with phase sensitivities near the Cramér-Rao bound. We report a maximum sensitivity of a SU(2) interferometer within 0.67(5) dB of the standard quantum limit (SQL) as well as a single and twomode SU(1,1) sensitivity of 5.9(2) dB and 4.5(2) dB below the SQL respectively. Quantum-mechanical harmonic oscillators, described by infinite dimensional, non-commuting observables, are currently being utilized for quantum sensing [1, 2] and studies of continuous variable quantum computing (CVQC) [3]. The quantum-mechanical harmonic oscillator is realized in trapped-ions, nano-mechanical systems [4] and has an analog with microwave photons in superconducting circuits [5] and optical photons in photonic systems [6]. Recent work, using motional states of trapped-ions has shown the ability to detect small displacements [7, 8] and encode logical qubits [9, 10]. The use of two-mode squeezed states could provide a quantum advantage [11](larger quantum signal to noise ratio with the same number of resources) for sensing and significant work has been done to generate these states in other platforms [12–14]. Two-mode squeezed states have already proven useful for quantum sensing using SU(1,1) interferometers [15–18] in photonics, but can be difficult to generate efficiently and suffer from photon loss. In the following, we demonstrate different classes of interferometers using the motional modes of a single trapped atomic ion. With a demonstration of these interferometers, we show the ability to concatenate several operations on the oscillator states of two modes in a phase coherent manner. Performing these operations with digitally programmable frequency sources for relative phase control simplifies significant calibration challenges when developing more complicated circuits. Trapped ions are well suited for such demonstrations due to the harmonic nature of the trap and the potential to achieve relatively long mechanical oscillator coherence times [19]. Reconstructing the motional states of these oscillators is achieved by coupling them to the ion’s internal states via motional sideband transitions and measuring the internal state populations [20]. In the limit of a small number of motional quanta these transitions can approximate a phonon counting type measurement. This enables a homodyne type detection scheme which is used to quantify the sensitivity we achieve with the different classes of interferometers demonstrated below. Yurke et al. [21] proposed schemes to reach the Heisenberg limit [22] using different classes of interferometers. Here, we work within the framework of the Cramér-Rao bound [23, 24] which sets the ultimate limit for the resolution of a sensing scheme. This bound is described by a parameter variance, instead of the Heisenberg limit which is set by the number of resources used, i.e. photon or phonon number [24], making it more suitable to the limits of the experiments reported here. The required interactions for the interferometers (described below) are colloquially called displacing, beam splitting, single-mode squeezing, and two-mode squeezing. For trapped ions, these interactions can be implemented with laser beams [25] or in a laser-free method using additional potentials applied to the trap electrodes [26, 27]. Performance of these interferometers can, in practice, be limited only by the motional heating of the ion resulting from fluctuating patch potentials on the trap electrodes [28, 29]. Here, we demonstrate an SU(2) interferometer (Mach-Zender), which has previously been demonstrated in [25, 30, 31], (coherent input states are used here in contrast to these works), as well as singlemode and two-mode SU(1,1) 1 interferometers. Each of the interferometers described here is sensitive to different phase shifts, which are single-mode phase ϕ a (singlemode SU(1,1)), difference phase ϕ a − ϕ b (SU(2)), or sum phase ϕ a + ϕ b (two-mode SU(1,1)), where the a, b labels refer to different modes. We show performance close to the Cramér-Rao bounds for these interferometers. To demonstrate these different interferometers we use a single trapped 40 Ca + ion as the mechanical oscillator. The ion is confined in a macroscopic, room-temperature, linear Paul trap with an ion-electrode spacing of ≃ 0.75 mm. Experiments are performed using the two ‘radial’ modes of the ion (normal to the trap axis) with frequencies ω a ≈ 2π × 1.80 MHz and ω b ≈ 2π × 1.83 MHz, ∗ Present address: IonQ Inc, 4505 Campus Dr, College Park, Maryland 20740, USA † E-mail: dallcock@uoregon.edu 1 The Lie-group labelling is used to refer to the groups that contain the operators that generate these states." 2312.10848v1,"Springer Nature 2023 L A TEX template Global relaxation-based LP–Newton method for multiple hyperparameter selection in support vector classification with feature selection ∗ Qingna Li 1 , Yaru Qian 1 and Alain Zemkoho 2 1 School of Mathematics and Statistics, Beijing Key Laboratory on MCAACI, and Key Laboratory of Mathematical Theory and Computation in Information Security, Beijing Institute of Technology, Beijing, 100081, PR China. 2 School of Mathematical Sciences, University of Southampton, Southampton, SO17 1BJ, UK. Abstract Support vector classification (SVC) is an effective tool for classification tasks in machine learning. Its performance relies on the selection of appropriate hyperparameters. In this paper, our focus is on identifying the optimal value for the regularization hyperparameter C, as well as determining the bounds on the features in a SVC problem. This implies that the number of hyperparameters in our SVC can potentially be very large. It is very well-known in machine learning that this could lead to the so-called curse of dimensionality. To address this challenge of multiple hyperparameter selection, the problem is formulated as a bilevel optimization problem, which is then transformed into a mathematical program with equilibrium constraints (MPEC). Our first contribution involves proving the fulfillment of a Mangasarian–Fromovitz constraint qualification tailored to the latter reformulation of the problem. Furthermore, we introduce a novel linear programming (LP)-Newton-based global relaxation method (GRLPN) for solving this problem and provide corresponding convergence results. Typically, in global relaxation methods for MPECs, the algorithm for the corresponding subproblem is treated as a blackbox. Possibly for the first time in the literature, the subproblem is specifically studied in detail. Numerical experiments substantiate the superiority of GRLPN over grid search and the global relaxation solved by the well-known nonlinear programming solver SNOPT. 1 Introduction Support vector classification (SVC) is a widely used type of machine learning algorithms that is particularly effective for classification tasks. Classification tasks arise in a wide range of areas, including in economics, finance, and engineering, just to name a few. In engineering more specifically, applications of SVC have been discovered in chemical engineering [1–5], civil engineering [6–10], mechanics [11–15], and so on. In civil engineering, for example, SVC can be applied for the prediction of traffic flow and congestion in a road network [6], seismic hazard assessment [7], soil quality classification [8], pavement condition evaluation [9], as well as land use classification [10]. Interested readers are referred to the survey [16] for more applications of SVC in engineering and other fields. In SVC, the process of selecting the best hyperparameters is a crucial topic, and has been extensively studied by numerous researchers from both theoretical and practical perspectives [17–23]. However, focus has mostly been on grid search and gradient descent–based methods [17, 19, 20]. Recently, bilevel optimization–based techniques to compute optimal hyperparameters have also been gaining some traction, given that they offer numerous advantages as is discussed in [23], for example. However, solving bilevel programs numerically can be extremely challenging due to their inherent hierarchical structure. It is known that even when all the functions involved are linear, the computational complexity is already NP-hard [24]. ∗ The first draft of the paper was complted while YQ was a visiting postgraduate student at the School of Mathematical Sciences at the University of Southampton, UK. Authors’ email addresses: Qingna Li (qnl@bit.edu.cn), Yaru Qian (y.qian@soton.ac.uk), and Alain Zemkoho (a.b.zemkoho@soton.ac.uk) 1" 2312.10864v1,"On-Device Recommender Systems: A Tutorial on The New-Generation Recommendation Paradigm Hongzhi Yin Tong Chen The University of Queensland Brisbane, QLD, Australia h.yin1@uq.edu.au The University of Queensland Brisbane, QLD, Australia tong.chen@uq.edu.au Liang Qu Bin Cui The University of Queensland Brisbane, QLD, Australia liang.qu@uq.edu.au Peking University Beijing, China bin.cui@pku.edu.cn ABSTRACT 1 TOPIC AND RELEVANCE Given the sheer volume of contemporary e-commerce applications, recommender systems (RSs) have gained significant attention in both academia and industry. However, traditional cloud-based RSs face inevitable challenges, such as resource-intensive computation, reliance on network access, and privacy breaches. In response, a new paradigm called on-device recommender systems (ODRSs) has emerged recently in various industries like Taobao, Google, and Kuaishou. ODRSs unleash the computational capacity of user devices with lightweight recommendation models tailored for resourceconstrained environments, enabling real-time inference with users’ local data. This tutorial aims to systematically introduce methodologies of ODRSs, including (1) an overview of existing research on ODRSs; (2) a comprehensive taxonomy of ODRSs, where the core technical content to be covered span across three major ODRS research directions, including on-device deployment and inference, on-device training, and privacy/security of ODRSs; (3) limitations and future directions of ODRSs. This tutorial expects to lay the foundation and spark new insights for follow-up research and applications concerning this new recommendation paradigm. As an indispensable means for web users to counteract information overload, recommender systems (RSs) that can automatically match user interests with relevant items (e.g., products, services, information) have seen a substantial amount of research interest over the last decade. In the digital industry, prosperous enterpriselevel applications are projected to drive the global RS market to an unprecedented value of USD $54 billion by 2030 1 . Traditional RSs are subsumed under a fully cloud-based paradigm, where the cloud server trains the RS model with all the user data it hosts and pushes recommendation results to users’ personal devices upon request. Though this paradigm enjoys benefits from the “infinite” computing power to support sophisticated RS models, some increasingly harsh obstacles are arising in the meantime, including the high resource and energy consumption [20], reliance on network access for timeliness [13], and threat to user privacy [15], which challenge the sustainability and trustworthiness of cloud-based RSs. To this end, recent years have witnessed the development of a new yet fast-evolving recommendation paradigm – on-device recommender systems (ODRSs). Compared with cloud-based RSs, the most significant difference of ODRSs is that users’ devices become a key part of the computation on top of their original role of displaying generated recommendations. Typical ODRSs are optimized towards three objectives: (1) on-device deployment and inference that aims to derive a resource-efficient model with minimum accuracy degradation; (2) on-device training and updating that enables the lightweight model to stay up-to-date; and (3) privacy and security mechanisms that respectively keep users and on-device models from malicious attacks. As a result, the heavy cloud-based RS models could be replaced by their lightweight ondevice counterparts, such that the inference can be efficiently performed on resource-constrained user devices with locally stored user data [2]. In the industry, ODRSs have seen an emerging list of applications, including Taobao’s mobile service [4], Google’s TensorFlow Lite Recommendation API 2 , real-time short video recommendation on Kuaishou [3], and the built-in recommendation engine in the Brave Web Browser 3 . CCS CONCEPTS • Information systems → Recommender systems. KEYWORDS On-device Learning, Recommender Systems, Federated Learning, Privacy and Security ACM Reference Format: Hongzhi Yin, Tong Chen, Liang Qu, and Bin Cui. 2024. On-Device Recommender Systems: A Tutorial on The New-Generation Recommendation Paradigm. In Proceedings of The Web Conference 2024. ACM, New York, NY, USA, 4 pages. https://doi.org/TBD Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. The Web Conference 2024, May 13–17, 2024, Singapore © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/TBD 1 https://straitsresearch.com/report/recommendation/ 2 https://www.tensorflow.org/lite/examples/recommendation/overview 3 https://brave.com/federated-learning/" 2312.10866v1,"LESS THAN EQUABLE TRIANGLES ON THE EISENSTEIN LATTICE CHRISTIAN AEBI AND GRANT CAIRNS 1. Introduction In this paper, we are interested in triangles that are perimeter-dominant, i.e., their perimeter exceeds their area. Recall that a Heron triangle is a triangle with integer sides and integer area. By Dolan’s Theorem [1], the classification of perimeter-dominant Heronian triangles contains three exceptional examples and four infinite families determined by certain Pell, or Pell-like, equations. √ We will obtain an analogous result for triangles with side lengths in 3N and √ area in 4 3 N. As we will consider in Section 3 of this paper, such triangles can be considered to be the equivalent of Heron triangles on the Eisenstein lattice. 2. The Main Theorem √ Theorem. Perimeter-dominant triangles with side lengths in 3N and area in √ √ 3 4 N consist of the equilateral triangle of side length 3 3 and three infinite families of triangles with side lengths: √ √ √ 3, where 1 = 4x 2 − 3y 2 for some x, y ∈ N. (a) x √ 3, x √ 3, √ 2 2 3, 2 3, where x, y ∈ N. (b) x 3, x √ √ 1 = √ x − 3y for some (c) (3x + 1) 3, (3x − 1) 3, 3 3, where 1 = 4x 2 − 15y 2 for some x, y ∈ N. √ √ √ Proof. Let a √ perimeter-dominant triangle T have side lengths a 3, b 3, c 3 and area ∆ := n 4 3 , where a, b, c, n ∈ N. Heron’s formula [2, Chap. 6.7] for the area gives q √ √ √ ∆ = s(s − a 3)(s − b 3)(s − c 3), √ where s = 3(a+b+c) is the semi-perimeter. Thus, as T is perimeter-dominant, 2 √ √ 3 p n 3 (a + b + c)(−a + b + c)(a − b + c)(a + b − c) < 3(a + b + c), = 4 4 so (1) n 2 = 3(a + b + c)(−a + b + c)(a − b + c)(a + b − c) < 16(a + b + c) 2 . Let p = a + b + c, u = −a + b + c, v = a − b + c, w = a + b − c. Note that the integers p, u, v, w are all positive and have the same parity. (However, unlike the Heron case, they may be even or odd). Without loss of generality, suppose u ≤ v ≤ w. Note that u + v + w = p, so by (1), 3uvw < 16(u + v + w) and hence 1 1 3 1 + + > . (2) uv vw wu 16 1" 2312.10881v1,"Dirac walks on regular trees Nicolas Delporte 1 , Saswato Sen 1 , and Reiko Toriumi 1 1 Okinawa Institute of Science and Technology Graduate University, 1919-1, Tancha, Onna, Kunigami District, Okinawa 904-0495, Japan. Emails: nicolas.delporte@oist.jp, saswato.sen@oist.jp, reiko.toriumi@oist.jp Abstract The study of matter fields on an ensemble of random geometries is a difficult problem still in need of new methods and ideas. We will follow a point of view inspired by probability theory techniques that relies on an expansion of the two point function as a sum over random walks. An analogous expansion for Fermions on non-Euclidean geometries is still lacking. Casiday et al. [Laplace and Dirac operators on graphs, Linear and Multilinear Algebra (2022) 1] proposed a classical “Dirac walk” diffusing on vertices and edges of an oriented graph with a square root of the graph Laplacian. In contrast to the simple random walk, each step of the walk is given a sign depending on the orientation of the edge it goes through. In a toy model, we propose here to study the Green functions, spectrum and the spectral dimension of such “Dirac walks” on the Bethe lattice, a d-regular tree. The recursive structure of the graph makes the problem exactly solvable. Notably, we find that the spectrum develops a gap and that the spectral dimension of the Dirac walk matches that of the simple random walk (d s = 1 for d = 2 and d s = 3 for d ≥ 3). Contents 1 Introduction 2 2 Quantum field theory on graphs 2.1 Free scalars on graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Free Fermions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.1 Free Fermions in Euclidean spaces . . . . . . . . . . . . . . . . . . . . . . 2.2.2 Free Fermions on graphs and the Dirac walk . . . . . . . . . . . . . . . . 4 4 6 6 6 3 Walks on the Bethe lattice 3.1 Review of the simple random walk . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 Simple random walk on the line . . . . . . . . . . . . . . . . . . . . . . . . 3.1.2 Simple random walk on the d ≥ 3 Bethe lattice . . . . . . . . . . . . . . . 3.2 Dirac walk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Dirac walk on the line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.2 Dirac walk on the d ≥ 3 Bethe lattice . . . . . . . . . . . . . . . . . . . . 9 9 9 12 15 15 18 1" 2312.10885v1,"A novel diffusion recommendation algorithm based on multi-scale cnn and residual lstm Yong Niu a , Xing Xing a,∗ , Zhichun Jia b , Ruidi Liu c and Mindong Xin a a Bohai University, Jinzhou, 121013, Liaoning, China b Bohai University, Jinzhou, 121013, Liaoning, China c Northeast Normal University, Changchun, 130024, Jilin, China ARTICLE INFO ABSTRACT Keywords: Sequence recommendation Diffusion model Multi-scale Residual lstm Sequential recommendation aims to infer user preferences from historical interaction sequences and predict the next item that users may be interested in the future. The current mainstream design approach is to represent items as fixed vectors, capturing the underlying relationships between items and user preferences based on the order of interactions. However, relying on a single fixed-item embedding may weaken the modeling capability of the system, and the global dynamics and local saliency exhibited by user preferences need to be distinguished. To address these issues, this paper proposes a novel diffusion recommendation algorithm based on multi-scale cnn and residual lstm (AREAL). We introduce diffusion models into the recommend system, representing items as probability distributions instead of fixed vectors. This approach enables adaptive reflection of multiple aspects of the items and generates item distributions in a denoising manner. We use multi-scale cnn and residual lstm methods to extract the local and global dependency features of user history interactions, and use attention mechanism to distinguish weights as the guide features of reverse diffusion recovery. The effectiveness of the proposed method is validated through experiments conducted on two real-world datasets. Specifically, AREAL obtains improvements over the best baselines by 2.63% and 4.25% in terms of HR@20 and 5.05% and 3.94% in terms of NDCG@20 on all datasets. 1. Introduction Sequential recommendation aims to model the behavior of users based on their historical interaction behavior. Unlike traditional recommendation tasks that model user preferences in a static way, sequential recommendation can capture the evolution and dynamic preferences of users. Firstly, given the inherent variability in user preferences, recommendation system must be agile and accurate in identifying users’ short-term preferences, as users are easily distracted by emerging trends and hot topics. On the contrary, users’ long-term preferences provide valuable perspectives to collect and summarize their stable and persistent interests, thus effectively assisting users’ shortterm interest biases. In addition, the diversity, novelty, and uncertainty of recommendations are all aspects that recommendation systems exhibit. Modeling the feature distribution of existing items from multiple perspectives can better restore users’ true preferences, especially in situations where user item interaction data is scarce. The initial research route (Vaswani et al., 2017)(Zhang et al., 2023) focused on modeling users’ long-term and short-term preferences, while using the most recently interacted items as a representation of short-term preferences. However, due to bias issues in recommendation systems, especially the impact of local invariance, the local order of using the last part of the item sequence is not important, making it difficult to fully reflect the short-term interests of users who only use the last item. As shown in Figure 1. In addition, some studies only integrate long-term/shortterm preferences through aggregation or concatenation (Chen and Wong, 2019)(He et al., 2020), which cannot obtain personalized weights of long-term/short-term preferences related to each user’s different items. The use of recurrent neural networks to summarize behavior sequences is a practical and effective strategy (Fang et al., 2020)(Sun et al., 2019), but due to the difficulty in establishing long-term dependency models, they also have short-term limitations in capturing user dynamic interests. With the rapid development of generative models in the field of recommendation systems, scholars have attempted to introduce interest modeling and attention mechanisms that take into account user preferences (Li et al., 2019)(Wang niuyong@bhu.edu.cn (Y. Niu); xingxing@bhu.edu.cn (X. Xing); jiazhichun@bhu.edu.cn (Z. Jia); liurd427@nenu.edu.cn (R. Liu); xinmindong@bhu.edu.cn (M. Xin) ORCID (s): CV Radhakrishnan et al.: Preprint submitted to Elsevier Page 1 of 14" 2312.10905v1,"S ATELLITE C APTIONING : L ARGE L ANGUAGE M ODELS TO A UGMENT L ABELING Grant Rosario 1 and David Noever 2 1 PeopleTec, 4901-D Corporate Drive, Huntsville, AL, USA, 35805 2 grant.rosario@peopletec.com david.noever@peopletec.com A BSTRACT With the growing capabilities of modern object detection networks and datasets to train them, it has gotten more straightforward and, importantly, less laborious to get up and running with a model that is quite adept at detecting any number of various objects. However, while image datasets for object detection have grown and continue to proliferate (the current most extensive public set, ImageNet, contains over 14m images with over 14m instances), the same cannot be said for textual caption datasets. While they have certainly been growing in recent years, caption datasets present a much more difficult challenge due to language differences, grammar, and the time it takes for humans to generate them. Current datasets have certainly provided many instances to work with, but it becomes problematic when a captioner may have a more limited vocabulary, one may not be adequately fluent in the language, or there are simple grammatical mistakes. These difficulties are increased when the images get more specific, such as remote sensing images. This paper aims to address this issue of potential information and communication shortcomings in caption datasets. To provide a more precise analysis, we specify our domain of images to be remote sensing images in the RSICD dataset and experiment with the captions provided here. Our findings indicate that ChatGPT grammar correction is a simple and effective way to increase the performance accuracy of caption models by making data captions more diverse and grammatically correct. K EYWORDS ChatGPT, captions, datasets, grammar, remote sensing 1. I NTRODUCTION Image captioning is becoming a prevalent multimodal AI task, aided by the rise of image translation, object detection, semantic segmentation, etc. [1, 2, 3]. In addition, recent research in Natural Language Processing (NLP) has provided new methods and models for annotating images with captions [4]. Accurately captioning a photo could allow one to build a large dataset of remote-sensing geographical pictures and a model to retrieve specific contextual scenes based on a text description [5]. However, some of the most used and state-of-the-art (SOTA) general image caption datasets today are based on manual annotations prone to numerous errors [6, 7, 8]. These errors can be obvious, such as incorrect grammar or spelling, or more subtle, such as overusing a keyword or descriptor. In addition, as an image becomes more abstract or less specific, such as remote sensing images, the image can become more challenging to describe in a short-form caption. While recent research has proposed solutions such as correcting, pruning, or augmenting the caption vocabulary [9], modern large language models (LLMs) provide a straightforward and efficient way of correcting errors in captions." 2312.10912v1,"Discovery of an Unconventional Quantum Echo by Interference of Higgs Coherence C. Huang 1,2 , M. Mootz 2 , L. Luo 2 , D. Cheng 2 , J. M. Park 2 , R. H. J. Kim 2 , Y. Qiang 1,2 , V. L. Quito 2 , Yongxin Yao 2 , P. P. Orth 1,2 , I. E. Perakis 3 and J. Wang 1,2† 1 Department of Physics and Astronomy, Iowa State University, Ames, IA 50011 USA 2 Ames National Laboratory, Ames, IA 50011 USA 3 Department of Physics, University of Alabama at Birmingham, Birmingham, AL 35294-1170, USA † To whom correspondence should be addressed; jgwang@iastate.edu, jgwang@ameslab.gov Nonlinearities in quantum systems are fundamentally characterized by the interplay of phase coherences, their interference, and state transition ampli- tudes. Yet the question of how quantum coherence and interference manifest in transient, massive Higgs excitations, prevalent within both the quantum vacuum and superconductors, remains elusive. One hallmark example is pho- ton echo, enabled by the generation, preservation, and retrieval of phase coher- ences amid multiple excitations. Here we reveal an unconventional quantum echo arising from the Higgs coherence in superconductors, and identify dis- tinctive signatures attributed to Higgs anharmonicity. A terahertz pulse-pair modulation of the superconducting gap generates a “time grating” of coherent Higgs population, which scatters echo signals distinct from conventional spin- and photon-echoes in atoms and semiconductors. These manifestations ap- pear as Higgs echo spectral peaks occurring at frequencies forbidden by equi- librium particle-hole symmetry, an “asymmetric” delay in the echo formation 1" 2312.10917v1,"Semi-Supervised Clustering via Structural Entropy with Different Constraints Guangjie Zeng ∗ Hao Peng ∗ Angsheng Li ∗ Chunyang Liu ‡ Abstract Semi-supervised clustering techniques have emerged as valuable tools for leveraging prior information in the form of constraints to improve the quality of clustering outcomes. Despite the proliferation of such methods, the ability to seamlessly integrate various types of constraints remains limited. While structural entropy has proven to be a powerful clustering approach with wide-ranging applications, it has lacked a variant capable of accommodating these constraints. In this work, we present Semi-supervised clustering via Structural Entropy (SSE), a novel method that can incorporate different types of constraints from diverse sources to perform both partitioning and hierarchical clustering. Specifically, we formulate a uniform view for the commonly used pairwise and label constraints for both types of clustering. Then, we design objectives that incorporate these constraints into structural entropy and develop tailored algorithms for their optimization. We evaluate SSE on nine clustering datasets and compare it with eleven semi-supervised partitioning and hierarchical clustering methods. Experimental results demonstrate the superiority of SSE on clustering accuracy with different types of constraints. Additionally, the functionality of SSE for biological data analysis is demonstrated by cell clustering experiments conducted on four single-cell RNA- seq datasets. Keywords: Semi-Supervised Clustering, Structural Entropy, Biological Data Analysis. 1 Introduction Clustering is a key technique in machine learning that aims to group instances according to their similarity [8]. Yet, unsupervised clustering alone often fails to provide the desired level of accuracy and may not meet the diverse requirements of various users. In contrast, semisupervised clustering harnesses the power of prior information in the form of constraints, significantly boosting clustering accuracy and aligning more effectively with user preferences [18]. ∗ SKLSDE, Beihang University. {zengguangjie, penghao, angsheng, yangrunze}@buaa.edu.cn † Salesforce AI Research. zhiweiliu@salesforce.com ‡ Didi Chuxing. liuchunyang@didiglobal.com § Lehigh University. lih319@lehigh.edu Zhiwei Liu † Runze Yang ∗ Lifang He § Numerous semi-supervised clustering methods based on different classical unsupervised clustering methods have been proposed in recent years. The challenges of semi-supervised clustering are 1) to design an objective function integrating constraints into clustering methods and 2) to effectively and efficiently optimize the objective. The most widely-used way to utilize the prior information is to add a regularization on the original clustering objective [12, 18]. Alternatively, some methods propagate this information to augment the dataset itself [14, 16]. The provided prior information can manifest in various constraint forms, such as pairwise constraints [24], and label constraints [17], and triplet constraints [31]. Many existing semi-supervised clustering methods are tailored to handle a single type of constraint. Yet, it is common for prior information to come in diverse forms from multiple sources. The lack of ability to deal with different types of constraints limits the generalization ability of these methods. Concerning the integration of different types of constraints into the semi-supervised clustering methods, earlier methods [7, 26] discuss them case by case with different algorithms. However, these methods lack a unified view of constraints and are unable to deal with mixed types of constraints. Bai et al. resolved this issue via a unified formulation of pairwise constraints and label constraints [1] and proposed the SC-MPI algorithm to optimize them simultaneously. However, SC-MPI, which is designed for partitioning clustering, cannot perform hierarchical clustering and thus has limited generalization ability. Hierarchical clustering does not require specifying the number of clusters in advance, and it produces a dendrogram that shows the nested structure of the data. This is useful for many applications, such as finding cell subtypes in biological data analysis [5]. To address aforementioned issues, we propose a more general Semi-supervised clustering method via Structural Entropy with different constraints, namely SSE, for both partitioning clustering and hierarchical clustering. First, we construct a data graph G and a relation graph G ′ sharing the same set of vertices to represent the information of input data and prior infor- Copyright © 2024 by SIAM Unauthorized reproduction of this article is prohibited" 2312.10919v1,"1 IoT Ground Sensing Systems for Early Wildfire Detection: Technologies, Challenges and Opportunities Chiu Chun Chan ID , Member, IEEE, Sheeraz A. Alvi ID , Member, IEEE, Xiangyun Zhou ID , Fellow, IEEE, Salman Durrani ID , Senior Member, IEEE, Nicholas Wilson ID , Marta Yebra ID Abstract—The threat posed by wildfires or bushfires has become a severe global issue due to the increase in human activities in forested areas and the impact of climate change. Consequently, there is a surge in the development of automatic wildfire detection methods. Approaches based on long-distance imagery from satellites or watchtowers encounter limitations, such as restricted visibility, which results in delayed response times. To address and overcome these challenges, research interest has grown in the implementation of ground-based Internet of Things (IoT) sensing systems for early wildfire detection. However, research on energy consumption, detection latency, and detection accuracy of IoT sensing systems, as well as the performance of various anomaly detection algorithms when evaluated using these metrics, is lacking. Therefore, in this article, we present an overview of current IoT ground sensing systems for early wildfire detection. Camera and environmental sensing technologies suitable for early wildfire detection are discussed, as well as vision-based detection algorithms and detection algorithms for environmental sensing. Challenges related to the development and implementation of IoT ground sensing systems for early wildfire detection and the future research directions important for creating a robust detection system to combat the growing threat of wildfires worldwide are discussed. Index Terms—IoT, sensing, wildfire, bushfire, forest fire, early fire detection. I. I NTRODUCTION W ILDFIRE, also widely known as bushfire in Australia and forest fire in Europe, present a significant risk to people, the environment and assets. In recent decades, the surface air temperature in Australia has risen by 2 ◦ C due to climate change, leading to more days with high fire risk [1]. As fire weather worsens, fire occurrence increases [2], [3] and the window of opportunity for successful containment and suppression after ignition narrows [4], [5]. Hence, rapid detection of new ignition will become an increasingly important strategy for fire managers as the climate warms. This research was funded by the Bushfire Research Centre of Excellence, which was co-sponsored by the Australian National University and Optus. The Australian Capital Territory Emergency Services Agency and the Australian Capital Territory Parks and Conservation Service provided support for the collection and organisation of ignition data. We thank Sam Beaver and Jyotirao Wankhede for organising and assisting with the experimental burns. We also thank Dr. Andrew Sullivan and the CSIRO Bushfire Behaviour and Risks team for their help in initiating the testing of the sensing modules in the Pyrotron Lab. (Corresponding author: Chiu Chun Chan) Chiu Chun Chan, Sheeraz A. Alvi, Xiangyun Zhou, Salman Durrani and Marta Yebra are with the School of Engineering, The Australian National University, Canberra, ACT 2601, Australia (e-mail: {chiuchun.chan; sheeraz.alvi; xiangyun.zhou; salman.durrani}@anu.edu.au). Nicholas Wilson and Marta Yebra are with Fenner School of Environment and Society, The Australian National University, Canberra, ACT 2601, Australia (e-mail:{nicholas.wilson; marta.yebra}@anu.edu.au). All authors are with the Bushfire Research Centre of Excellence, The Australian National University, Canberra, ACT 2601, Australia. ©2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists,or reuse of any copyrighted component of this work in other works. A. Impact of Wildfire Across the Globe In Australia, this recently reached a catastrophic climax in the 2019-2020 “Black Summer” fires across multiple states where 24 million hectares of land were burnt, causing 33 deaths and approximately 450 more injured by smoke inhalation [6]. The 2019-2020 fires burnt an unprecedented area of land [7] and were likely worsened by climate change [8]. The toll on wildlife was immense. The World Wide Fund for Nature records “143 million mammals, 2.46 billion reptiles, 180 million birds and 51 million frogs” had been harmed, killed, or displaced [9] as a result of the Black Summer. For the already fragile ecosystem of animals in Australia, this is a major hit, as many animals, including koalas, wombats and wallabies, are listed as endangered or vulnerable [10]. Worldwide, wildfires are getting worse, with the European Forest Fire Information System estimating that 837,000 hectares of land have been burnt in countries of the European Union alone in 2022, which is the second worst year for wildfires in its history [11]. The United States also experienced record-setting fires in 2020, with more than 50,000 fires burning nearly 3.64 million hectares of land [12]. Although the number of reported wildfires remains stable in the last 30 years, the area burnt in a year caused by wildfires has increased by 1.62 million hectares compared to the area burnt in the 1990s in the United States [13]. The Brazilian National Institute of Space Research has revealed 3.36 million hectares of land burnt in Brazil annually since 2003 [14]. Notably, in January 2017, the Mediterranean region of Chile experienced hundreds of fires burning more than 500,000 hectares, approximately 14 times the average annual area burnt in the region in the last 40 years [15]. In addition to these observed increases in fire activity, predicted warming and drying of the climate across much of the world are likely to increase fire activity and result in long term declines in forest carbon storage, further warming the climate [16]. In light of the increasing threat posed by wildfires, the imperative to develop precise and reliable detection technologies has taken precedence. B. Technologies for Early Wildfire Detection The ability to detect wildfires in their early stages allows effective and efficient fire suppression [17]. Specifically, early detection of initial fire stages, such as smouldering and ground fire, enables the timely deployment of fire suppression tactics" 2312.10922v1,"IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING 1 NTrack: A Multiple-Object Tracker and Dataset for Infield Cotton Boll Counting Md Ahmed Al Muzaddid and William J. Beksi , Member, IEEE M ULTIMEDIA M ATERIAL Abstract—In agriculture, automating the accurate tracking of fruits, vegetables, and fiber is a very tough problem. The issue becomes extremely challenging in dynamic field environments. Yet, this information is critical for making day-to-day agricultural decisions, assisting breeding programs, and much more. To tackle this dilemma, we introduce NTrack, a novel multiple object tracking framework based on the linear relationship between the locations of neighboring tracks. NTrack computes dense optical flow and utilizes particle filtering to guide each tracker. Correspondences between detections and tracks are found through data association via direct observations and indirect cues, which are then combined to obtain an updated observation. Our modular multiple object tracking system is independent of the underlying detection method, thus allowing for the interchangeable use of any off-the-shelf object detector. We show the efficacy of our approach on the task of tracking and counting infield cotton bolls. Experimental results show that our system exceeds contemporary tracking and cotton boll-based counting methods by a large margin. Furthermore, we publicly release the first annotated cotton boll video dataset to the research community. Note to Practitioners—This work is motivated by the need to provide highly-accurate estimates of the total number of cotton bolls across an entire farm. We provide a multiple object tracking framework for automating the counting process using a dynamic motion model that can reidentify severely occluded objects. This information is immensely beneficial to agronomists and breeders. For example, it can allow them to accelerate the selection of genotypes and identify cotton cultivars that exhibit tolerance to adverse environmental conditions (e.g., drought, poor soil quality, etc.) via yield prediction. Since the performance of our tracker is tied to the accuracy of the object detector, the ability to swap detectors is important for enhancing the usability of the system. Our dataset structure was modeled after similar multiple object tracking datasets for the purpose of increasing adoption among practitioners. To implement our system, it is assumed that the image/video capture device is of high resolution and data is acquired under ideal lighting conditions. The framework can be run on any commercial-off-the-shelf platform (e.g., ground-based robots, unmanned aerial vehicles, etc.), with sufficient computing and memory resources, using a vision-based sensor. Index Terms—Agricultural automation, computer vision for automation, visual tracking. Manuscript received 20 September 2023; accepted 30 November 2023. This article was recommended for publication by Associate Editor K. Zhu and Editor G. Fortino upon evaluation of the reviewers’ comments. (Corresponding author: William J. Beksi). The authors are with the Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX 76019, USA. (e-mail: mdahmedal.muzaddid@mavs.uta.edu, william.beksi@uta.edu). Color versions of one or more figures in this article are available at https://doi.org/10.1109/TASE.2023.3342791. Digital Object Identifier 10.1109/TASE.2023.3342791 The source code, dataset, and documentation associated with this project can be found at https://robotic-visionlab.github.io/ntrack. I. I NTRODUCTION OTTON (Gossypium hirsutum L.) is a vital source of natural fiber. It accounts for nearly 25% of total world textile fiber use [1]. Not only is cotton one of the most important textile fibers in the world, but it has also become a substantial source of food and feed for humans and livestock by providing cottonseed oil and hulls [2]. Improving the production of cotton is essential to fulfilling the fiber, food, and feed requirements of the Earth’s increasing population [3]. In addition, cotton is a high-valued crop that requires a significant number of inputs such as preparing seed beds, planting, reducing competition from insects and weeds, applying harvest aids, and harvesting. Therefore, among stakeholders, the high return value and cost of cotton production provides incentives for embracing technologies to improve profitability by reducing expenses and boosting yields [4]. C A. Significance of Counting Cotton Bolls Infield cotton boll counting is key to predicting fiber yield as well as providing a better understanding of the physiological and genetic mechanisms of the crop’s growth and development. Repeated counting can contribute to the calculation of the growth rate in the flowering and boll maturity stages, and allow for selecting genotypes that more effectively utilize their energy to form cotton products. The standard approach to obtain yield information is by manual field sampling, which is tedious, labor intensive, and expensive. Constrained by these limitations, sampling is done over a few separate crops and the measurements are extrapolated over an entire farm. However, inherent human bias and sparsity in the measurements can result in inaccurate yield estimation. Improving yield is a primary objective in cotton management projects. Physiological factors and environmental variables all have an effect on flower and boll retention. Understanding these processes is crucial not only to enhancing cotton yield, but also to advancing the study of plant phenotyping, i.e., the process of measuring and analyzing observable plant characteristics. B. Object Detection and Tracking in Agriculture The last few decades have seen remarkable advances in vision-based object tracking. This research has mainly been ©2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works." 2312.10925v1,"Delving Deeper Into Astromorphic Transformers Md Zesun Ahmed Mia, 1 Malyaban Bal, 1 Abhronil Sengupta 1 1 The Pennsylvania State University zesun.ahmed@psu.edu, mjb7906@psu.edu, sengupta@psu.edu Abstract Preliminary attempts at incorporating the critical role of astrocytes - cells that constitute more than 50% of human brain cells - in brain-inspired neuromorphic computing remain in infancy. This paper seeks to delve deeper into various key aspects of neuron-synapse-astrocyte interactions to mimic self-attention mechanisms in Transformers. The crosslayer perspective explored in this work involves bio-plausible modeling of Hebbian and pre-synaptic plasticities in neuronastrocyte networks, incorporating effects of non-linearities and feedback along with algorithmic formulations to map the neuron-astrocyte computations to self-attention mechanism and evaluating the impact of incorporating bio-realistic effects from the machine learning application side. Our analysis on sentiment and image classification tasks on the IMDB and CIFAR10 datasets underscores the importance of constructing Astromorphic Transformers from both accuracy and learning speed improvement perspectives. Introduction Astrocytes, a type of glial cell, play a critical role in brain function encompassing various processes such as homeostasis, metabolism, and synaptic regulation (Perez-Catalan, Doe, and Ackerman 2021). Astrocytes detect and regulate synaptic activity in the tripartite synapse through interactions with pre and postsynaptic neurons. Investigating their impact on neural computation is currently an active research field in neuroscience and underscores the critical need to move beyond the neuro-synaptic perspective of current Artificial Intelligence (AI) systems. Recent experimental findings on neuron-astrocyte interactions and modulation have led to significant progress in computational neuroscience, enabling the development of models that incorporate neuron-astrocyte interactions within neural networks (Manninen, Aćimović, and Linne 2023; Wakida et al. 2020). Astrocytes have been found to modulate bursting in neural circuitry through the release of gliotransmitters, which have an impact on neuronal excitability and synaptic plasticity (Durkee et al. 2021; Lenk et al. 2020). Astrocytes possess the ability to encode information through calcium signaling and regulate information processing, thereby actively engaging in neural computation at the tripartite synapse level. Additionally, astrocytes possess inherent capacity as memory components (Tsybina et al. 2022; Gordleeva et al. 2022) and plasticity regulators that are capable of facilitating local sequential learning (Gibbs, Hutchinson, and Hertz 2008; Alberini et al. 2018). Preliminary attempts at incorporating the critical role of astrocytes in brain-inspired neuromorphic computing has started in earnest. Neuromorphic systems (Sengupta et al. 2019) are bio-plausible AI models that attempt to emulate neuronal and synaptic operations with a higher degree of bio-fidelity to tap into the huge energy efficiency of the brain. Such systems are temporal and event-driven where computation occurs through transmission of sparse spiking events between neurons - thereby offering the potential of orders of magnitude power efficiency when implemented on neuromorphic platforms (Davies et al. 2021). However, astromorphic computing encapsulating features of astrocytic regulation in neuromorphic systems still remain in infancy with works primarily targeting integration of astrocyte functionality with Spike-Timing-Dependent-Plasticity (STDP) mechanisms (Liu et al. 2018; Rastogi et al. 2021a; Han, Islam, and Sengupta 2022; Liu et al. 2017) - an unsupervised learning framework that remains limited to shallow networks and simple tasks (Diehl and Cook 2015). Other attempts also suffer from the pressing issue of scalability to complex tasks (Han, Pan, and Liu 2023). This work is based on a recent study (Kozachkov, Kastanenka, and Krotov 2023) that has shown promise at emulating the self-attention mechanism in transformers (Vaswani et al. 2017) using a simple two layered network involving neuron-astrocyte interactions. The ability to design Astromorphic Transformers is therefore highly relevant in the current era of Large Language Models (LLMs), such as BERT (Devlin et al. 2018) and GPT (Radford et al. 2018) - paving the pathway for designing explainable transformers from a neuroscience perspective as well as addressing scaling challenges for utilizing the computational role of astrocytes in neuromorphic computing. However, as we illustrate in this work, prior work has neglected various key aspects of bi-directional astrocytic signalling, feedback and nonlinear temporal behavior - all of which are key to address the fundamental mapping of self-attention mechanism to astrocyte-neuron interactions along with providing insights on whether such intrinsic non-linear dynamics and plasticity modulation enable better learning capabilities from the application side. The distinguishing feature of this work" 2312.10934v1,"APIDocBooster: An Extract-Then-Abstract Framework Leveraging Large Language Models for Augmenting API Documentation CHENGRAN YANG and JIAKUN LIU, Singapore Management University, Singapore BOWEN XU, North Carolina State University, USA CHRISTOPH TREUDE, University of Melbourne, Australia YUNBO LYU and JUNDA HE, Singapore Management University, Singapore MING LI, Nanjing University, China DAVID LO, Singapore Management University, Singapore API documentation is often the most trusted resource for programming. Many approaches have been proposed to augment API documentation by summarizing complementary information from external resources such as Stack Overflow. Existing extractive-based summarization approaches excel in producing faithful summaries that accurately represent the source content without input length restrictions. Nevertheless, they suffer from inherent readability limitations. On the other hand, our empirical study on the abstractive-based summarization method, i.e., GPT-4, reveals that GPT-4 can generate coherent and concise summaries but presents limitations in terms of informativeness and faithfulness. We introduce APIDocBooster, an extract-then-abstract framework that seamlessly fuses the advantages of both extractive (i.e., enabling faithful summaries without length limitation) and abstractive summarization (i.e., producing coherent and concise summaries). APIDocBooster consists of two stages: (1) Context-aware Sentence Section Classification (CSSC) and (2) UPdate SUMmarization (UPSUM). CSSC classifies API-relevant information collected from multiple sources into API documentation sections. UPSUM first generates extractive summaries distinct from original API documentation and then generates abstractive summaries guided by extractive summaries through in-context learning. To enable automatic evaluation of APIDocBooster, we construct the first dataset for API documentation augmentation. Our automatic evaluation results reveal that each stage in APIDocBooster outperforms its baselines by a large margin. Our human evaluation also demonstrates the superiority of APIDocBooster over GPT-4 and shows that it improves the informativeness, relevance and faithfulness by 13.89%, 15.15%, and 30.56%, respectively. CCS Concepts: • Software and its engineering → Documentation. Additional Key Words and Phrases: Summarization, Question Retrieval 1 INTRODUCTION The application programming interface (API) is one of the most vital components of modern application development. Software developers typically rely on API reference documentation (API documentation in short) to learn APIs [45, 46, 58]. API documentation is a set of documents indexed by the API name, where each document provides information about a specific API [33]. According to the 2023 Stack Overflow Developer Survey [37], technical documentation is the most trusted resource for programming. However, creating and maintaining high-quality and readable API documentation still requires significant effort [12]. Existing API documents are often incomplete and not always equally readable [13, 33, 41, 44, 49]. A recent survey of professional developers shows that 60% of the participants Authors’ addresses: Chengran Yang, cryang@smu.edu.sg; Jiakun Liu, jkliu@smu.edu.sg, Singapore Management University, Singapore; Bowen Xu, bxu22@ncsu.edu, North Carolina State University, USA; Christoph Treude, christoph.treude@ unimelb.edu.au, University of Melbourne, Australia; Yunbo Lyu, yunbolyu@smu.edu.sg; Junda He, jundahe@smu.edu.sg, Singapore Management University, Singapore; Ming Li, lim@lamda.nju.edu.cn, Nanjing University, China; David Lo, davidlo@smu.edu.sg, Singapore Management University, Singapore." 2312.10958v1,"Large-sample properties of multiple imputation estimators for parameters of logistic regression with covariates missing at random separately or simultaneously Phuoc-Loc Tran 1 , Shen-Ming Lee 2 , Truong-Nhat Le 3 , and Chin-Shang Li 4 1 Department of Mathematics, College of Natural Science, Can Tho University, Vietnam Email: tploc@ctu.edu.vn 2 Department of Statistics, Feng Chia University, Taiwan, ROC. Email: smlee@mail.fcu.edu.tw 3 Faculty of Mathematics and Statistics, Ton Duc Thang University, Vietnam Email: letruongnhat@tdtu.edu.vn 4 Division of Supportive Care in Cancer, Department of Surgery, University of Rochester Medical Center, Rochester, NY, USA. Email: csli2003@gmail.com Abstract We consider logistic regression including two sets of discrete or categorical covariates that are missing at random (MAR) separately or simultaneously. We examine the asymptotic properties of two multiple imputation (MI) estimators, given in the study of Lee et al. (2023), for the parameters of the logistic regression model with both sets of discrete or categorical covariates that are MAR separately or simultaneously. The proposed estimated asymptotic variances of the two MI estimators address a limitation observed with Rubin’s type estimated variances, which lead to underestimate the variances of the two MI estimators (Rubin, 1987). Simulation results demonstrate that our two proposed MI methods outperform the completecase, semiparametric inverse probability weighting, random forest MI using chained equations, and stochastic approximation of expectation-maximization methods. To illustrate the methodology’s practical application, we provide a real data example from a survey conducted in the Feng Chia night market in Taichung City, Taiwan. Keywords: Inverse probability weighting; Logistic regression; Missing at random; Multiple imputation 1 Introduction Missing data processing is one of the rapidly developing research areas of Applied Statistics and Data Science, drawing the attention of researchers worldwide. Three primary types of missing mechanisms exist: missing completely at random (MCAR), missing at random (MAR), and missing not at random (MNAR). MAR, which implies that missingness is solely related to variables with complete data and unrelated to variables with missing data, has been extensively studied due to its complexity when compared to 1" 2312.10968v1,"PARs: Predicate-based Association Rules for Efficient and Accurate Model-Agnostic Anomaly Explanation Cheng Feng Siemens Technology China cheng.feng@siemens.com Abstract While new and effective methods for anomaly detection are frequently introduced, many studies prioritize the detection task without considering the need for explainability. Yet, in real-world applications, anomaly explanation, which aims to provide explanation of why specific data instances are identified as anomalies, is an equally important task. In this work, we present a novel approach for efficient and accurate model-agnostic anomaly explanation for tabular data using Predicate-based Association Rules (PARs). PARs can provide intuitive explanations not only about which features of the anomaly instance are abnormal, but also the reasons behind their abnormality. Our user study indicates that the anomaly explanation form of PARs is better comprehended and preferred by regular users of anomaly detection systems as compared to existing model-agnostic explanation options. Furthermore, we conduct extensive experiments on various benchmark datasets, demonstrating that PARs compare favorably to state-of-the-art model-agnostic methods in terms of computing efficiency and explanation accuracy on anomaly explanation tasks. The code for PARs tool is available at https://github.com/NSIBF/PARs-EXAD. Introduction Anomaly detection, which aims to identify data instances that do not conform to the expected behavior, is a classic machine learning task with numerous applications in various domains including fraud detection, intrusion detection, predictive maintenance, etc. Over the past decades, numerous methods have been proposed to tackle this challenging problem. Examples include one-class classificationbased (Manevitz and Yousef 2001; Ruff et al. 2018), nearest neighbor-based (Breunig et al. 2000), clustering-based (Jiang and An 2008), isolation-based (Liu, Ting, and Zhou 2012; Hariri, Kind, and Brunner 2019), density-based (Liu, Tan, and Zhou 2022; Feng and Tian 2021) and deep anomaly detection models based on autoencoders (Zhou and Paffenroth 2017; Zong et al. 2018), generative adversarial networks (Zenati et al. 2018; Han, Chen, and Liu 2021), to name a few. However, comparing to the vast body of literature on the detection task, anomaly explanation techniques have received relatively little attention so far (Ruff et al. 2021). In fact, providing accurate explanations of why specific data instances are detected as anomalies is equally critical for many real-world applications. For instance, when an anomaly is reported by a fault detection application for a critical device in a factory, human operators need straightforward clues regarding the reported anomaly, and then can decide what next steps - such as fault diagnosis, predictive maintenance and system shutdown – should be taken. The required clues include which feature(s) is abnormal, why that feature(s) is abnormal. Furthermore, since model selection has a significant impact on the performance of anomaly detection tasks for tabular data (Han et al. 2022), providing model-agnostic anomaly explanation is considered more helpful than model-specific approaches that are only applicable to specific detection models. To fill this gap, we propose a novel approach for efficient and accurate model-agnostic anomaly explanation for tabular data. Specifically, we leverage association rule mining (Agrawal, Imieliński, and Swami 1993) to learn Predicatebased Association Rules (PARs) which capture normal behaviors exhibited by training data. During inference, we efficiently find the precise PARs for explaining anomalies identified by arbitrary anomaly detection models. PARs provide intuitive explanations not only about which features of the anomaly instance are abnormal, but also why those features are abnormal. Our user study shows that the anomaly explanation form of PARs is better understood and favoured by regular anomaly detection system users compared with existing model-agnostic anomaly explanation options. In our experiments, we demonstrate that it is significantly more efficient to find PARs than anchors (Ribeiro, Singh, and Guestrin 2018), another rule-based explanation, for identified anomaly instances. Moreover, PARs are also far more accurate than anchors for anomaly explanation, meaning that they have considerably higher precision and recall when applied as anomaly detection rules on unseen data other than the anomaly instance on which they were originally derived for explanation. Additionally, we show that PARs can also achieve higher accuracy on abnormal feature identification compared with many state-of-the-art model-agnostic explanation methods including LIME (Ribeiro, Singh, and Guestrin 2016), SHAP (Lundberg and Lee 2017), COIN (Liu, Shin, and Hu 2018) and ATON (Xu et al. 2021). We summarize the main contributions of this paper as follows: • We introduce PARs, a novel and informative explanation form for anomalies, and the form of PARs is more appealing to regular anomaly detection system users ac-" 2312.10975v1,"Inducing Point Operator Transformer: A Flexible and Scalable Architecture for Solving PDEs Seungjun Lee, Taeil Oh Alsemy, South Korea seungjun.lee@alsemy.com, taeil.oh@alsemy.com Abstract Solving partial differential equations (PDEs) by learning the solution operators has emerged as an attractive alternative to traditional numerical methods. However, implementing such architectures presents two main challenges: flexibility in handling irregular and arbitrary input and output formats and scalability to large discretizations. Most existing architectures are limited by their desired structure or infeasible to scale large inputs and outputs. To address these issues, we introduce an attention-based model called an inducing-point operator transformer 1 (IPOT). Inspired by inducing points methods, IPOT is designed to handle any input function and output query while capturing global interactions in a computationally efficient way. By detaching the inputs/outputs discretizations from the processor with a smaller latent bottleneck, IPOT offers flexibility in processing arbitrary discretizations and scales linearly with the size of inputs/outputs. Our experimental results demonstrate that IPOT achieves strong performances with manageable computational complexity on an extensive range of PDE benchmarks and real-world weather forecasting scenarios, compared to state-of-the-art methods. Introduction Partial differential equations (PDEs) are widely used for mathematically modeling physical phenomena by representing pairwise interactions between infinitesimal segments. Once formulated, PDEs allow us to analyze and predict the physical system, making them essential tools in various scientific fields (Strauss 2007). However, formulating accurate PDEs can be a daunting task without domain expertise where there remain numerous unknown processes for many complex systems. Moreover, traditional numerical methods for solving PDEs can require significant computational costs and may sometimes be intractable. In recent years, data-driven approaches have emerged as an alternative to the conventional procedures for solving PDEs, since they provide much faster predictions and only require observational data. In particular, operator learning, learning mapping between infinite-dimensional function spaces, generalizes well to unseen system inputs with their own flexibility in a discretization-invariant way (Lu et al. 2021, 2022; Kovachki et al. 2021; Li et al. 2020a,b, 2021b). Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 Our code is available at https://github.com/7tl7qns7ch/IPOT. Observational data in solving PDEs often comes in much more diverse measurement formats, making it challenging to handle. These formats may include sparse and irregular measurements, different input and output domains, and complex geometries due to environmental conditions (Belbute- Peres, Economon, and Kolter 2020; Lienen and Günnemann 2022; Li et al. 2022; Tran et al. 2023). In addition, adaptive remeshing schemes are often deployed when different regions require different resolutions (Brenner, Scott, and Scott 2008; Huang and Russell 2010). However, most existing operator learners have their own restrictions. For instance, some require fixed discretization for the input function (Lu, Jin, and Karniadakis 2019; Lu et al. 2021), assume that input and output discretizations are the same (Lu et al. 2022; Li et al. 2020b, 2021b; Brandstetter, Worrall, and Welling 2022), assume local connectivity (Li et al. 2020a,b), or have uniform regular grids (Li et al. 2021b; Gupta, Xiao, and Bogdan 2021; Cao 2021). They can be limited when the observations have discrepancies between their own settings and given measurements. In order to be flexible to handle a variety of discretization schemes, the model should impose minimal assumptions on locality or data structure. Our approach aims to address the challenges of handling arbitrary input and output formats by developing a meshagnostic architecture that treats observations as individual elements without problem-specific modifications. As flexible in processing data (Jaegle et al. 2021) and efficient in modeling long-range dependencies (Tsai et al. 2019), Transformer (Vaswani et al. 2017) can be an appropriate starting point for our approach. A core building block of the Transformers, the attention mechanism corresponds to and even outperforms the kernel integral operation of the existing operator learners due to its nature of capturing long-range interactions (Cao 2021; Liu, Xu, and Zhang 2022; Guo, Cao, and Chen 2023). However, their quadratic growth in computational complexity with input size can make it impractical for real-world applications, high-fidelity modeling, or long-term forecasting without imposing problem-specific locality. To address the issue, we took inspiration from inducingpoint methods which aim to reduce the effective number of input data points for computational efficiency (Quiñonero- Candela and Rasmussen 2005; Snelson and Ghahramani 2005; Titsias 2009; Li et al. 2020b), and from the extension of the methods to Transformer by cross-attention with a" 2312.10981v1,"Latin hypercubes realizing integer partitions Diane Donovan a , Tara Kemp a,∗ , James Lefevre a a School of Mathematics and Physics, ARC Centre of Excellence, Plant Success in Nature and Agriculture, The University of Queensland, Brisbane, 4072, Australia Abstract For an integer partition h 1 + · · · + h n = N , a 2-realization of this partition is a latin square of order N with disjoint subsquares of orders h 1 , . . . , h n . The existence of 2-realizations is a partially solved problem posed by Fuchs. In this paper, we extend Fuchs’ problem to m-ary quasigroups, or, equivalently, latin hypercubes. We construct latin cubes for some partitions with at most two distinct parts and highlight how the new problem is related to the original. Keywords: latin square, permutation cube, realization 1. Introduction L. Fuchs asked the following question [7]: If n is any positive integer and n = n 1 + n 2 + · · · + n k any fixed partition of n, is it possible to find a quasigroup (Q, ◦) of order n which contains subquasigroups on the sets Q 1 , Q 2 , . . . , Q k of orders n 1 , n 2 , . . . , n k respectively, whose set theoretical union is Q? The problem of finding such a quasigroup is equivalent to finding a latin square of order n with disjoint subsquares of orders n 1 , n 2 , . . . , n k (these subsquares must be row, column and symbol disjoint). It is easy to find partitions for which such a quasigroup does not exist, however the problem of existence is far from complete. Much work has been done by considering latin squares, which are equivalent structures to quasigroups, and such a latin square is known as a realization or partitioned incomplete latin square (PILS). For partitions with at most four parts, existence has been completely determined. Many cases have been studied for partitions with 5 or 6 parts, however the problem is not yet solved. For any partition, existence has been determined when the parts are of at most two distinct sizes. The same problem can be posed for m-ary quasigroups, which are equivalent to m-dimensional latin hypercubes. In this paper, we investigate this problem by first considering latin cubes and also by examining the relationships between latin hypercubes of different dimenions. Definition 1.1. A latin square of order N is an N × N array, L, on a set of N symbols such that each symbol occurs exactly once in each row and column. An entry of L is defined by its row and column position as L(i, j). An m × m sub-array of L that is itself a latin square of order m is a subsquare of L. Subsquares are disjoint if they share no row, column or symbol of L. For any positive integer a, we define [a] to be the set of integers {1, 2, . . . , a}. Given another integer b, b + [a] is the set {b + 1, b + 2, . . . , b + a}. We will assume that all latin squares of order N use the symbols of [N ]. Ex. 1.2. The array in Figure 1 is a latin square of order 5, and the highlighted cells indicate a subquare of order 2 and three subsquares of order 1. ∗ Corresponding author Email addresses: dmd@maths.uq.edu.au (Diane Donovan), t.kemp@uq.net.au (Tara Kemp), j.lefevre@uq.edu.au (James Lefevre) 1" 2312.10989v1,"Distributed Localization in Dynamic Networks via Complex Laplacian Xu Fang a , Lihua Xie a, ⋆ , Xiaolei Li a a School of Electrical and Electronic Engineering, Nanyang Technological University, 639798, Singapore Abstract Different from most existing distributed localization approaches in static networks where the agents in a network are static, this paper addresses the distributed localization problem in dynamic networks where the positions of the agents are timevarying. Firstly, complex constraints for the positions of the agents are constructed based on local relative position (distance and local bearing) measurements. Secondly, both algebraic condition and graph condition of network localizability in dynamic networks are given. Thirdly, a distributed localization protocol is proposed such that all the agents can cooperatively find their positions by solving the complex constraints in dynamic networks. Fourthly, the proposed method is extended to address the problem of integrated distributed localization and formation control. It is worth mentioning that the proposed algorithm can also be applied in the case that only distance and sign of direction measurements are available, where the sign of direction measurement is a kind of one bit local relative measurement and has less information than local bearing. Key words: Distributed localization, 2-D dynamic network, local coordinate frame, multi-agent system, formation control. 1 Introduction Scientist around the world are recognizing the benefits of autonomous agents (unmanned ground vehicles and unmanned aerial vehicles) in both civilian and military applications such as cooperative transportation, geographical data collection, and cooperative search and rescue [19, 24, 36]. Enabling such applications requires a reliable localization system for the agents to achieve selflocalization. Network localization aims to estimate the positions of all agents given the positions of part of the agents and inter-agent relative measurements [18, 1, 3]. The centralized network localization requires a central unit to process the information of all agents, where the positions of all agents are calculated in a centralized way [13, 29, 33]. But in a large network, it is impractical to use a central unit to calculate the positions of all agents [11, 27]. ⋆ This work was supported by Nanyang Technological Uni- versity under the Wallenberg-NTU Presidential Postdoctoral Fellowship and Projects of Major International (Regional) Joint Research Program under NSFC Grant no. 61720106011 and 62103352. (Corresponding author: Lihua Xie.) Email addresses: fa0001xu@e.ntu.edu.sg (Xu Fang), elhxie@ntu.edu.sg (Lihua Xie), xiaolei@ysu.edu.cn (Xiaolei Li). Preprint submitted to Automatica Hence, each agent in a large network should have the ability to achieve self-localization in a distributed manner by performing local computations based on available relative measurements with its neighbors. According to different types of inter-agent relative measurements, most of the existing approaches to distributed network localization can be divided into three categories: (1) distance measurement based [10, 8, 17]; (2) bearing measurement based [30, 4, 37]; (3) angle measurement based [16, 22]. The existing distributed localization approaches [10, 30, 4, 37, 8, 17, 16, 22] mainly focus on static networks, i.e., the agents in a network are static. The problem becomes challenging when it comes to distributed localization in dynamic networks, where the positions of the agents are timevarying such that the network localizability is difficult to be guaranteed. For instance, each agent in static networks requires three non-colinear neighbors to achieve self-localization in 2-D distance-based distributed localization [10, 8, 17]. But in dynamic networks, it is difficult to guarantee the positions of its three neighbors to be non-colinear at any time instant. Similar issues can also be found in 2-D bearing-based or angle-based distributed localization [30, 4, 37, 16, 22], where each agent and its two neighbors must be non-colinear or requires three non-colinear neighbors. 19 December 2023" 2312.11008v1,"1 Global-Local MAV Detection under Challenging Conditions based on Appearance and Motion Hanqing Guo, Ye Zheng, Yin Zhang, Zhi Gao, Shiyu Zhao Abstract—Visual detection of micro aerial vehicles (MAVs) has received increasing research attention in recent years due to its importance in many applications. However, the existing approaches based on either appearance or motion features of MAVs still face challenges when the background is complex, the MAV target is small, or the computation resource is limited. In this paper, we propose a global-local MAV detector that can fuse both motion and appearance features for MAV detection under challenging conditions. This detector first searches MAV targets using a global detector and then switches to a local detector which works in an adaptive search region to enhance accuracy and efficiency. Additionally, a detector switcher is applied to coordinate the global and local detectors. A new dataset is created to train and verify the effectiveness of the proposed detector. This dataset contains more challenging scenarios that can occur in practice. Extensive experiments on three challenging datasets show that the proposed detector outperforms the state-of-the-art ones in terms of detection accuracy and computational efficiency. In particular, this detector can run with near real-time frame rate on NVIDIA Jetson NX Xavier, which demonstrates the usefulness of our approach for real-world applications. The dataset is available at https://github.com/WestlakeIntelligentRobotics/GLAD. In addition, A video summarizing this work is available at https://youtu.be/Tv473mAzHbU. (a) Complex background. Index Terms—Global-local, Appearance and motion features, MAV detection, Air-to-air. I. I NTRODUCTION Vision-based MAV detection has attracted increasing attention in recent years due to its application in many tasks such as vision-based swarming [1]–[3], aerial see-and-avoid [4], [5], and malicious MAV detection [6]–[8]. Different from the existing works [9]–[11] that consider the ground-to-air scenario, this work focuses on the air-to-air scenario where a camera carried by a flying MAV is used to detect another flying target MAV. The air-to-air scenario is more challenging than the ground-to-air scenario because the camera itself is moving and the target MAV is often engulfed by complex background scenes such as buildings, trees, and other manmade things when the camera looks down from the top (Fig. 1(a)). Moreover, the target MAV may be extremely small in the image when seen from a distance (Fig. 1(b)). In addition, the detection algorithm must be sufficiently efficient in order to be implemented onboard with limited computational resources. H. Guo is with the College of Computer Science and Technology at Zhejiang University and the School of Engineering at Westlake University, Hangzhou, China. (e-mail: guohanqing@westlake.edu.cn) Y. Zheng, Y. Zhang, and S. Zhao are with the School of Engineering at Westlake University, Hangzhou, China. (e-mail: zhengye@westlake.edu.cn; zhangyin@westlake.edu.cn; zhaoshiyu@westlake.edu.cn) Z. Gao is with the School of Remote Sensing and Information Engineering, Wuhan University, Wuhan, China. (e-mail: gaozhinus@gmail.com) (Corresponding author: Shiyu Zhao.) (b) Small MAV (8x8 pixels). Fig. 1. Examples of challenging conditions for MAV detection. Our approach can work effectively in very challenging conditions such as complex backgrounds and small-sized MAVs. Red box indicates ground-truth. Yellow box indicates the predicted bounding box by the local detector of our approach. (Top right images are better view with 500% zoom-in) In recent years, many appearance-based methods that rely on deep learning techniques have been proposed for visionbased MAV detection. For example, some state-of-the-art object detection networks such as YOLO series, R-CNN series, SSD, DETR [12]–[14] have been applied to MAV detection. These methods usually work effectively in relatively simple scenarios where the target MAV is distinct from the background and its size is relatively large in the image. However, appearance features are not stable in more complex scenarios. For example, as shown in Fig. 1(a), the background scene is extremely complex when the camera looks down from the top. The target MAV can easily get engulfed in complex background scenes such as trees or buildings. Moreover, when the target MAV flies far away from the camera, its image may only occupy a tiny portion of the image. For example, as shown in Fig. 1(b), an MAV seen from nearly 100 m only occupies 8×8 pixels in an image of 1920×1080 pixels." 2312.11011v1,"VinaLLaMA: LLaMA-based Vietnamese Foundation Model Quan Nguyen ∗ , Huy Pham and † Dung Dao ‡ December 19, 2023 Abstract In this technical report, we present VinaLLaMA, an open-weight, state-of-the-art (SOTA) Large Language Model for the Vietnamese language, built upon LLaMA-2 with an additional 800 billion trained tokens. VinaLLaMA not only demonstrates fluency in Vietnamese but also exhibits a profound understanding of Vietnamese culture, making it a truly indigenous model. VinaLLaMA-7B-chat, trained on 1 million high-quality synthetic samples, achieves SOTA results on key benchmarks, including VLSP, VMLU, and Vicuna Benchmark Vietnamese, marking a significant advancement in the Vietnamese AI landscape and offering a versatile resource for various applications. 1 Introduction The surge in Large Language Models (LLMs) such as ChatGPT and GPT-4 has significantly advanced the field of artificial intelligence (AI), particularly in language processing. In 2023, Vietnam’s AI sector witnessed a notable development with the introduction of several Vietnamese-centric LLMs, including BLOOMZ’s Vietcuna, URA-LLaMA, PhoGPT, and dama-2. Amidst this progression, we introduce VinaLLaMA, a foundational LLM designed specifically for the Vietnamese language. VinaL- LaMA, built on top of LLaMA-2, represents a vital stride towards linguistic inclusivity in AI, adeptly addressing the syntactic and semantic intricacies of Vietnamese. Embracing the spirit of collaboration and open innovation, we are pleased to announce VinaLLaMA, an open-weight Foundation Language Model and its chat variant. These models are now accessible on HuggingFace, ensuring compatibility with all ’transformers’ framework-supported libraries. This endeavor not only contributes to the global AI research landscape but also provides a specialized tool for exploring and enhancing Vietnamese language processing, encouraging a wider engagement and application in AI-driven NLP research. 2 Related Work 2.1 Large Language Models The development of large language models (LLMs) began with the Transformer [VSP + 17], the foundational architecture that enabled the pre-training of BERT [CMCC23] and GPT [RNSS] using largescale unsupervised data. This advancement led to the emergence of popular foundation models such as RoBERTa [LOG + 19], T5 [RSR + 20], and BART [LLG + 20]. Subsequently, GPT-3 [BMR + 20] demonstrated capabilities in few-shot and zero-shot learning through prompt engineering and in-context learning. This was followed by significant advancements with ChatGPT (OpenAI, 2022) and GPT-4 (OpenAI, 2023), which have made substantial contributions not only in language modeling but also in the broader field of artificial intelligence. These models exhibit a diverse range of skills and produce high-quality outputs, leading to the rise of newer LLMs such as Llama [RSR + 20], Llama-2 [TMS + 23], Bloom [WSF + 22], Falcon [AAA + 23], Qwen [BBC + 23], and Mistral [JSM + 23]. ∗ Virtual Interactive, qnguyen3@vilm.org † Virtual Interactive, huypn@vilm.org ‡ Virtual Interactive, dungdm@vilm.org 1" 2312.11025v1,"Multi-Goal Optimal Route Planning Using the Cell Mapping Technique Athanasios Karagounis School of Science Department of Digital Industry Technologies GR34400, Psachna, Greece akaragun@gs.uoa.gr Abstract—This manuscript explores the complexities of multiobjective path planning, aiming to optimize routes against a backdrop of conflicting performance criteria. The study integrates the cell mapping approach as its foundational concept. A two-pronged search strategy is introduced; initially, the cell mapping technique is utilized to develop a comprehensive database, encompassing all cells within the specified area. This database records the performance metrics for the most efficient routes from each cell to the designated target. The second phase involves analyzing this database to pinpoint the extent and count of all Pareto optimal routes from a selected starting cell to the target. This analysis contributes to solving the overarching multiobjective optimization challenge inherent in path planning. To validate this approach, case studies are included, and the results are benchmarked against the well-established multi-objective A* (MOA*) method. The study discovers that while the cell mapping method achieves similar outcomes to the MOA* method for routes originating from a single point, it demonstrates superior computational benefits, particularly when the starting and ending points are in separate, non-overlapping areas. Index Terms—multi-objective, path planning, cell mapping, robotics I. I NTRODUCTION Path planning is a crucial aspect of research in mobile robotics. This challenge is typically defined as the process of identifying feasible and safe routes from an initial point to a target location within a workspace. Concurrently, the identified paths must adhere to certain optimal criteria, such as minimal distance, reduced travel duration, and least energy consumption. Path planning must take into account two key elements: 1) the nature of the environment, which could be either static or dynamic, and 2) the robot’s understanding of its surroundings. When a robot possesses complete environmental knowledge, the task is classified as global path planning. Conversely, when the robot’s understanding of its surroundings is limited, the task falls under local path planning. This study introduces an effective approach to address the global multiobjective optimal path planning issue in static settings. Numerous studies have been conducted to devise strategies for solving the global path planning problem [1]. These include various approaches like the roadmap method, the gridbased A* algorithm, hierarchical cell decomposition techniques, graph algorithms, and the artificial potential field method. In an effort to enhance the efficiency of these traditional methodologies, probabilistic algorithms have been introduced. Notable among these are the probabilistic roadmap method and the rapidly-exploring random trees. For a comprehensive understanding of both classical and probabilistic approaches, one can refer to specific studies. It’s important to note that the majority of the existing path planning methods are primarily focused on addressing single-objective optimization challenges. In practical scenarios, optimal path finding seldom involves a single objective. Real-world applications necessitate addressing multiple, and often conflicting, objectives at once. To address the multi-objective nature of path planning, several heuristic methods have been proposed [2]. The multi-objective extension of the A* algorithm, or MOA*, is discussed in certain studies [3]. The Firefly algorithm has also been examined. Other popular methodologies include Genetic Algorithms (GA) [4] and Particle Swarm Optimization (PSO) [5], which have been extensively explored. Additional methods that have garnered significant attention include neural networks, memetic algorithms, simulated annealing (SA) [6], tabu search (TS), and cellular automata. Moreover, hybrid path planning algorithms have been developed, such as the integration of particle swarm optimization with the probabilistic roadmap method. The cell-to-cell mapping technique, initially proposed by Hsu [7] for the comprehensive analysis of nonlinear dynamic systems, has recently shown promising results in uncovering global Pareto fronts with detailed structures for low and moderate dimensional multi-objective optimization problems (MOPs). The objective of our research is to investigate the capability of the cell mapping method in efficiently identifying all Pareto optimal paths within the context of multi-objective optimal path planning. This study delves into the application of the cell mapping method to resolve multi-objective optimization problem (MOP) path planning challenges in static environments. It elaborates on the development of a cell space-based search algorithm, designed to pinpoint Pareto optimal paths from all cells to the goal cell. Additionally, the paper discusses the creation of a database system and a subsequent post-processing algorithm. These tools are instrumental in determining the coverage area of all Pareto optimal paths originating from a" 2312.11042v1,"VECOM: Variation-Resilient Encoding and Offset Compensation Schemes for Reliable ReRAM-Based DNN Accelerator Je-Woo Jang ∗ , Thai-Hoang Nguyen † and Joon-Sung Yang ∗‡ ∗ School of Electrical and Electronic Engineering and ‡ Dept. of Semiconductor Systems Engineering, Yonsei University, Seoul, South Korea † Dept. of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, South Korea jeus63@yonsei.ac.kr, th.nguyen@g.skku.edu, js.yang@yonsei.ac.kr Abstract—Resistive Random-Access Memory (ReRAM)-based Processing In-Memory (PIM) Accelerator has emerged as a promising computing architecture for memory-intensive applications, such as Deep Neural Networks (DNNs). However, due to its immaturity, ReRAM devices often suffer from various reliability issues, which hinder the practicality of the PIM architecture and lead to a severe degradation in DNN accuracy. Among various reliability issues, device variation and offset current from High Resistance State (HRS) cell have been considered as major problems in a ReRAM-based PIM architecture. Due to these problems, the throughput of the ReRAM-based PIM is reduced as fewer wordlines are activated. In this paper, we propose VECOM, a novel approach that includes a variation-resilient encoding technique and an offset compensation scheme for a robust ReRAM-based PIM architecture. The first technique (i.e., VECOM encoding) is built based on the analysis of the weight pattern distribution of DNN models, along with the insight into the ReRAM’s variation property. The second technique, VECOM offset compensation, tolerates offset current in PIM by mapping the conductance of each Multi-level Cell (MLC) level added with a specific offset conductance. Experimental results in various DNN models and datasets show that the proposed techniques can increase the throughput of the PIM architecture by up to 9.1 times while saving 50% of energy consumption without any software overhead. Additionally, VECOM is also found to endure low R-ratio ReRAM cell (up to 7) with a negligible accuracy drop. Index Terms—Deep learning hardware, Processing-In Memory, ReRAM, Variation-Tolerance, Neural Networks I. I NTRODUCTION Processing-In Memory (PIM) architecture, utilizing Resistive Random Access Memory (ReRAM), offers a promising solution to address the limitations of conventional von Neumann architecture [1]–[3]. The core idea of a ReRAM-based PIM architecture is to realize ReRAM devices as both storage devices and matrix-multiply-accumulate operation (i.e., MAC) elements. By aligning the cells in a crossbar-like structure, the MAC operations can be computed in situ with O(1) time complexity, making such architecture highly efficient for Deep Neural Network’s (DNN) computations. Despite being a potential candidate, ReRAM-based PIM architecture is hampered by various reliability issues due to its immature manufacturing process, such as the issue of conductance variation [4] and non-ideal current [5]. Such issues can impede the performance of the ReRAM-based PIM, undermine the DNN accuracy and pose numerous challenges for the deployment of high reliability-constrained DNN applications. One of the primary concerns in ReRAM-based systems is conductance variation, where the actual analog conductance value written to a ReRAM cell deviates from the desired data. This issue is particularly notable in the PIM architecture where errors can be accumulated along the bitlines of the crossbar array, leading to incorrect output current. To diminish the effect of accumulated variation errors, existing ReRAM- based PIM architectures often limit the maximum number of activated wordlines (MAW) [5]. However, reducing the MAW also curtails the potential for parallelism in a PIM architecture, consequently limiting throughput. In an attempt to address ReRAM’s variation, several works have proposed solutions for ReRAM-based PIM accelerators [4]–[8]. Notably, softwarebased techniques [4], [6], [7] have aimed to lessen the impact of ReRAM’s variation by retraining or fine-tuning the DNNs to adapt to the non-ideal distribution of ReRAM resistance. However, these methods can be cost-prohibitive due to the required re-training processes, which is problematic when the DNN is further scaled or when DNN is already deployed to edge devices. Alternatively, other approaches introduce redundant hardware to compensate for variation [5], [9], but these techniques often result in significant hardware overhead, making them unsuitable for resource-constrained devices. In addition to the variation, the offset current generated when an input voltage is applied to High Resistance State (HRS) cells can pose a significant challenge in parallelizing MAC operations of ReRAM-based accelerators. In an ideal scenario, the output current of HRS cells should be zero during MAC operations. However, non-ideal ReRAM devices exhibit offset current leakage from HRS cells when an input voltage is applied. This issue becomes more pronounced when utilizing low R-ratio ReRAM cells, which have a low ratio of resistance values between the on and off states. Several works have been proposed to ensure reliable operations with a low R- ratio ReRAM device [5], [9]–[12]. Among them, [9] proposes a distance-racing readout scheme to mitigate the adverse effect from the offset current by measuring the distance of accumulated current on a bitline from two reference sensing currents. However, the number of reference currents is proportional to the number of activated wordlines. Hence, the MAC operation in a typical crossbar size of 128x128 [1] is not feasible due to the high area and power overhead of the peripheral circuit. The work in [5] subtracts the offset current by adding an extra" 2312.11062v1,"Entity or Relation Embeddings? An Analysis of Encoding Strategies for Relation Extraction Frank Mtumbuka and Steven Schockaert Cardiff University, UK {MtumbukaF,SchockaertS1}@cardiff.ac.uk Abstract Relation extraction is essentially a text classification problem, which can be tackled by fine-tuning a pre-trained language model (LM). However, a key challenge arises from the fact that relation extraction cannot straightforwardly be reduced to sequence or token classification. Existing approaches therefore solve the problem in an indirect way: they fine-tune an LM to learn embeddings of the head and tail entities, and then predict the relationship from these entity embeddings. Our hypothesis in this paper is that relation extraction models can be improved by capturing relationships in a more direct way. In particular, we experiment with appending a prompt with a [MASK] token, whose contextualised representation is treated as a relation embedding. While, on its own, this strategy significantly underperforms the aforementioned approach, we find that the resulting relation embeddings are highly complementary to what is captured by embeddings of the head and tail entity. By jointly considering both types of representations, we end up with a simple model that outperforms the state-of-the-art across several relation extraction benchmarks. 1 Introduction Relation extraction consists in identifying the relationships between entities that are expressed in text. It is a fundamental Natural Language Processing task (NLP), which enables the learning of symbolic representations such as knowledge graphs. While Large Language Models (LLM) are highly effective in interpreting natural language inputs, the state-of-the-art in relation extraction is still based on fine-tuned language models of the BERT family (Devlin et al., 2019). Moreover, relation extraction is often applied to large document collections, such as corpora of news stories, scientific articles or social media, which means that relying on LLMs is often not feasible in practice, due to their high cost. In high-level terms, the standard approach is to fine-tune a BERT-based language model to learn a relation embedding, i.e. a vector representation of the relationship that is expressed between two entities in a given sentence, and to train a classifier to predict a discrete relation label from this embedding. To obtain these relation embeddings, we cannot simply train a sentence embedding model, since a single sentence may express several relationships. Moreover, we cannot easily identify which tokens in the sentence express the relationship, which makes learning relation embeddings fundamentally different from learning embeddings of text spans. In their seminal work, Baldini Soares et al. (2019) proposed to encapsulate the head and tail entity with special tokens. Consider the following example, where we are interested in extracting the relationship between Paris and France: The Olympics will take place in [E1] Paris [/E1], the capital of [E2] France [/E2]. The corresponding relation embedding is obtained by concatenating the final-layer embedding of the special tokens [E1] and [E2]. This strategy was found to outperform other alternatives by Baldini Soares et al. (2019), and has remained the most popular approach for learning relation embeddings (although Zhou and Chen (2022), among others, have used type-specific special tokens, which encode the semantic type of the entities). The success of this strategy is somewhat surprising: [E1] and [E2] are intuitively designed to represent the head and tail entities, rather than their relationship. In practice, however, knowing the semantic types of the entities often allows us to “guess” the relationship between them, especially if the types are fine-grained. For instance, knowing that the head entity is a capital city and the tail entity is a country, we may reasonably assume that the relationship being expressed is capital of. Nonetheless, we can expect that approaches based on entity" 2312.11069v1,"P ATTERNS OF C LOSENESS AND A BSTRACTNESS IN C OLEXIFICATIONS : T HE C ASE OF I NDIGNEOUS L ANGUAGES IN THE A MERICAS A P REPRINT Yiyi Chen ∗ Department of Computer Science Aalborg University Copenhagen, Denmark yiyic@cs.aau.dk Johannes Bjerva Department of Computer Science Aalborg University Copenhagen, Denmark jbjerva@cs.aau.dk December 19, 2023 Colexification refers to linguistic phenomena where multiple concepts (meanings) are expressed by the same lexical form, such as polysemy or homophony. Semantic typology studies this type of cross-lingual semantic categorization [Evans et al., 2010]. The term “colexification"" was first formalized in semantic typology by François [2008] to create semantic maps. Colexifications have been found to be pervasive across languages and cultures. The investigation of cross-lingual colexifications has provided insights across different fields, such as psycholinguistics [Jackson et al., 2019], cognitive science [Gibson et al., 2019] and linguistic typology [Schapper and Koptjevskaja-Tamm, 2022], but remain relatively unexplored in NLP (see, e.g., Harvill et al. [2022], Chen et al. [2023]). The Database of Cross-Linguistic Colexifications (CLICS 3 ) [Rzymski et al., 2020] was created to include 4,228 colexification patterns across 3,156 languages, to facilitate research in colexifications. Certain colexifications are more prevalent than others, for example, MOON and MONTH colexify in more than 300 languages while CAT and DOG only colexify across 4 languages in CLICS 32 . Previous works have attempted to shed light on the patterns of colexifications, e.g., why certain concepts or meanings colexify more frequently than others, and what patterns colexifications reveal. Studies suggest that related concepts are more likely to colexify [Karjus et al., 2021, Xu et al., 2020]. Xu et al. [2020] argues that concepts requiring less cognitive effort to relate are more likely to colexify across languages, by investigating 246 languages and 1310 meanings using the Intercontinental Dictionary Series [Borin et al., 2013]. The Goldilocks principle suggests that both relatedness and accurate information transfer play roles in colexifications using CLICS 3 [Brochhagen and Boleda, 2022]. For example, strongly related concepts LEFT and RIGHT are expected to be less likely to colexify because they are hard to distinguish in context. The problem of concreteness/abstractness of concepts is interdisciplinary, studied from a cognitive standpoint in linguistics, psychology, psycholinguistics, neurophysiology, etc [Solovyev, 2021]. Concrete concepts are those that are perceived by the senses, such as CAT and MOUNTAIN , while abstract concepts are not perceived by the senses, such as RELATIONSHIP and UNDERSTANDING . Brysbaert et al. [2014] curates concreteness ratings for 37,058 English words and 2,896 two-word expressions from over 4,000 participants, which has provided insights across various linguistic disciplines. The concreteness ratings scales from 1 (abstract) to 5 (concrete). Previous studies show that abstract concepts are often understood by reference to more concrete concepts [Lakoff and Johnson, 2008], and words that first arise with concrete meanings often later gain an abstract one [Xu et al., 2017]. Xu et al. [2020] leans on these findings to show that concepts more dissimilar in concreteness and affective valence are more likely to colexify. However, using CLICS 3 , Di Natale et al. [2021] find that colexification patterns capture similar affective meanings, i.e., the concepts that are closer in affectiveness are more likely to colexify. Moreover, studies show that abstract words are often combined with abstract ones, and vice versa for concrete words [Frassinelli et al., 2017, Naumann et al., 2018]. ∗ This work is supported by the Carlsberg Foundation under a Semper Ardens: Accelerate career grant held by JB, entitled “Multilingual Modelling for Resource-Poor Languages”, grant code CF21- 0454. This work is accepted to SIGMORPHON 2023. 2 https://clics.clld.org/graphs/subgraph_1313" 2312.11087v1,"Letter 1 Few-cycle optical vortices for strong field physics M ATTHIEU G UER 1 , M ARTIN L UTTMANN 1 , J EAN -F RANÇOIS H ERGOTT 1 , F ABIEN L EPETIT 1 , O LIVIER T CHERBAKOFF 1 , T HIERRY R UCHON 1 , AND R OMAIN G ÉNEAUX 1,2* 1 Université Paris-Saclay, CEA, LIDYL, 91191 Gif-sur-Yvette, France 2 CY Cergy Paris Université, CEA, LIDYL, 91191 Gif-sur-Yvette, France * romain.geneaux@cea.fr Compiled December 19, 2023 We report on the generation of optical vortices with fewcycle pulse durations, 500µJ per pulse, at a repetition rate of 1 kHz. To do so, a 25 fs laser beam at 800 nm is shaped with a helical phase and coupled into a hollow core fiber filled with argon gas, in which it undergoes self phase modulation. 5.5 fs long pulses are measured at the output of the fiber using a dispersion-scan setup. To retrieve the spectrally resolved spatial profile and orbital angular momentum (OAM) content of the pulse, we introduce a method based on spatially-resolved Fourier transform spectroscopy. We find that the input OAM is transferred to all frequency components of the post-compressed pulse. The combination of these two information shows that we obtain few-cycle, high intensity vortex beams with a well-defined OAM and sufficient energy to drive strong field processes. http://dx.doi.org/10.1364/ao.XX.XXXXXX 1. INTRODUCTION Since 1992 and the work of Allen et al. [1], it was recognized that orbital angular momentum (OAM) can be imparted to light beams, with ever more pratical implementations [2]. Contrary to the spin angular momentum (SAM), which is related to the local polarization state of the field, a non-zero OAM value is typically associated to an helical wavefront [3]. As such they were early refered to as ""optical vortices"" [4]. Prototypical examples of modes with OAM are the Laguerre-Gaussian and Bessel-Gaussian modes [3], which carry a well-defined OAM: all individual photons in such a mode carry the same quantum of OAM [5]. This value is given by an azimutal index ℓ , which corresponds to the number of 2π phase cycles along a circle centered on the beam axis. The phase singularity in the center of these beams imposes a doughnut-shaped transverse intensity. The discovery of vortex beams was followed by numerous applications [6, 7], such as particle manipulation with optical tweezers [8], stimulated-emission depletion (STED) microscopy [9] and optical communications [10–12]. Vortex beams have also been drawing a keen interest in the field of ultrafast light-matter interaction. When brought to femtosecond duration and with sufficient high peak power (above 10 14 W/cm 2 ), they can be used to drive nonlinear optical effects in which the OAM of light becomes a novel quantity to be exchanged in the process. A notable example is the demonstration of extreme ultra-violet (XUV) vortex beams, obtained by high-harmonic generation (HHG) of an infrared vortex driver [13–15]. Such schemes allow the production of attosecond pulse trains carrying OAM, as well as new forms of structured light [16–18]. However, optical vortices have yet to be applied in one peculiar field of light-matter interaction: the few-cycle strong field regime, where the duration of light pulses is of the order of magnitude of the optical cycle. The method of post-compression to reach this regime with regular beams is becoming increasingly standard. In a nonlinear medium, the ""long"" pulse undergoes self-phase modulation (SPM) [19, 20], which broadens its spectra and thus reduces its Fourier-transform limited duration. To guarantee spatially homogeneous broadening and well-controlled SPM, this process can be realized inside gas-filled hollow-core fibers (HCF) [21–23], multi-pass cells [24–26], or multiple bulk elements [27, 28]. Such short pulses, when used to drive the HHG process, allow the generation of XUV frequency supercontinua and isolated attosecond pulses [23, 29]. In themselves, few-cycle optical vortices (FCOV) are intriguing objects. For instance, there exists a relationship between the value of OAM that a pulse carries and the minimum duration it can have [30]. Furthermore, using them in nonlinear optics could bring a new field of applications. Such beams with defined OAM, extremely broadband and continuous spectra would make formidable tools to probe recently discovered helical dichroisms, for instance in magnetic structures [31, 32] or in chiral disordered media [33]. The generation of intense single-cycle vortex beams is technically challenging. Monochromatic vortex beams are typically obtained by converting a Gaussian beam using elements such as spiral phase plates (SPP) [34, 35], or spatial light modulators [36]. These elements imprint an azimutally varying phase on the beam, which corresponds to a well-defined OAM at one specific frequency. With single material plates, it was shown in Ref. [37], in the low energy regime, that although the central singularity of ultrashort vortex beams is conserved, its OAM content is highly inhomogeneous. Indeed the curling phase imparted ranged from 1.7π to 2.5π respectively for 631 nm and 952 nm spectral components. It significantly altered the homogeneity of the dounut shaped resulting beam, and would be further amplified in a strongly non linear regime [17]. Other types of devices [38] suffer the same kind of limitations in the" 2312.11089v1,"Existence of global entropy solution for Eulerian droplet models and two-phase flow model with non-constant air velocity ABHROJYOTI SEN 1 AND ANUPAM SEN 2 Abstract. This article addresses the question concerning the existence of global entropy solution for generalized Eulerian droplet models with air velocity depending on both space and time variables. When f (u) = u, κ(t) = const. and u a (x, t) = const. in (1.1), the study of the Riemann problem has been carried out by Keita and Bourgault [42] & Zhang et al. [38]. We show the global existence of the entropy solution to (1.1) for any strictly increasing function f (·) and u a (x, t) depending only on time with mild regularity assumptions on the initial data via shadow wave tracking approach. This represents a significant improvement over the findings of Yang [26]. Next, by using the generalized variational principle, we prove the existence of an explicit entropy solution to (1.1) with f (u) = u, for all time t > 0 and initial mass v 0 > 0, where u a (x, t) depends on both space and time variables, and also has an algebraic decay in the time variable. This improves the results of many authors such as Ha et al. [40], Cheng and Yang [27] & Ding and Wang [50] in various ways. Furthermore, by employing the shadow wave tracking procedure, we discuss the existence of global entropy solution to the generalized two-phase flow model with time-dependent air velocity that extends the recent results of Shen and Sun [9]. Contents 1. Introduction and main results 1.1. Overview 1.2. Main results 1.3. Plan of the paper 2. Riemann problem and interactions 2.1. Riemann problem to the system (1.9) 2.2. Riemann problem to the system (1.12) 3. Entropy inequality 4. Global existence of entropy solution 4.1. The wave tracking algorithm 4.2. Proof of Theorem 1.1 4.3. Proof of Theorem 1.2 5. Some examples 5.1. System of nonlinear geometric optics 5.2. A model with f (u) = u k , k odd. 5.3. Pressureless hydrodynamic model 6. Eulerian droplet model involving space-time dependent source 6.1. Derivation of the formula (6.6) 6.2. Verification of weak formulation, entropy criterion, and initial condition 2 2 4 7 7 8 13 15 17 17 18 24 25 26 26 26 26 27 29 1 Department of Mathematics, Indian Institute of Science Education and Research, Dr. Homi Bhabha Road, Pune 411008, India. Email: abhrojyoti.sen@acads.iiserpune.ac.in. 2 Centre for Applicable Mathematics, Tata Institute of Fundamental Research, Post Bag No 6503, Sharadanagar, Bangalore - 560065, India. Email: anupam21@tifrbng.res.in 2020 Mathematics Subject Classification. Primary: 35L65, 35L67, 76N15, 35Q35. Key words and phrases. Eulerian droplet model, pressureless gas dynamics system, two-phase flow model, shadow wave tracking, non-constant air velocity, entropy solution, generalized variational principle. 1" 2312.11094v1,"A Survey of Side-Channel Attacks in Context of Cache - Taxonomies, Analysis and Mitigation Ankit Pulkit, Smita Naval, Vijay Laxmi Dept. of Computer Science and Engineering Malaviya National Institute of Technology Jaipur India 2020rcp9585@mnit.ac.in, smita.cse@mnit.ac.in,vlaxmi@mnit.ac.in Abstract—Nowadays, side-channel attacks have become prominent attack surfaces in cyberspace. Attackers use the side information generated by the system while performing a task. Among the various side-channel attacks, cache side-channel attacks are leading as there has been an enormous growth in cache memory size in last decade, especially Last Level Cache (LLC). The adversary infers the information from the observable behavior of shared cache memory. This paper covers the detailed study of cache side-channel attacks and compares different microarchitectures in the context of side-channel attacks. Our main contributions are: (1) We have summarized the fundamentals and essentials of side-channel attacks and various attack surfaces. We also discussed different exploitation techniques, highlighting their capabilities and limitations. (2) We discussed cache side-channel attacks and analyzed the existing literature on cache side-channel attacks on various parameters like microarchitectures, crosscore exploitation, methodology, target, etc. (3) We discussed the detailed analysis of the existing mitigation strategies to prevent cache side-channel attacks. The analysis includes hardware- and software-based countermeasures, examining their strengths and weaknesses. We also discussed the challenges and trade-offs associated with mitigation strategies. This survey is supposed to provide a deeper understanding of the threats posed by these attacks to the research community with valuable insights into effective defense mechanisms. Index Terms—side-channel attacks, cache side-channel, microarchitectural attacks, mitigation strategies of cache side-channel attacks I. I NTRODUCTION The world jumped into the Digital Revolution or the Third Industrial Revolution in the late 20 th century [20, 125]. In the pre-digital era, paper files (or mechanical and analog electronic technologies) dominated, with digital-era computers predominated to store and process information. Because of this revolution, overall information is present in cyberspace for now. This revolution triggered intended or unintended disclosure of information and unauthorized access events [1, 99, 113]. Though computer security policies were there to protect the confidentiality of the data, most of the policies emphasized role-based access control, access control matrix, and the chain of trust [78]. Initially, it was enough to provide security to the confidential data, but it could not defend against side-channel attacks because adversaries did not gather the information by exploiting direct access. The increasing adoption of shared cache architectures in modern processors, driven by the demand for performance optimization, has inadvertently introduced side and covert channels that attackers can exploit. Shared caches store frequently accessed data closer to the processor cores, accelerating data retrieval and reducing memory latency [107]. However, while enhancing system performance, this architectural optimization also creates a potential vulnerability that malicious entities can exploit [14, 70, 130, 145]. Nowadays, the computer architecture community has significantly tried to adapt the methodologies to protect against side-channel attacks. Researchers also worked extensively on side-channel attacks and their mitigation methodologies in the last decade. In side-channel attacks, the attacker process uses the some shared resource to track the victim process. The attacker receives data from that shared resource, such as timing information (like the time an operation takes to complete), etc. The attacker uses this observed data, as a result of which he converts it into information. As the demand for computer systems is increasing, scientists are paying more attention to using shared resources to utilize the available resources fully. Furthermore, this caused a higher risk of side-channel attacks. Paul C. Kocher [72, 73] introduced timing channels in 1996; he demonstrated how timing measurements of a system performing a cryptographic function could be used to find the secret key of various cryptosystems like Diffie-Hellman, DSS, RSA, and other systems. His work includes the techniques used in timing attacks, statistical analysis, and deriving the correlation between execution time and secret key to deduce the secret key. Later, researchers started thinking in various directions with the concept that a measured quantity can lead to information leakage, and this is how various side-channels [5, 17, 41, 45, 47, 48, 67, 89, 108, 111, 115, 120, 133, 134, 148, 150] were introduced. Initially, researchers focused only on compromising cryptographic algorithms and devices. However, as the topic reached the boom, people started working on side-channel attacks with a scope that crossed the cryptographic-level border. Now many researchers are working on exploiting areas other than the cryptography level. These [2, 59, 85] side-channel attacks are non-cryptographic attacks. To comprehensively address cache side channel attacks, it is essential to understand the broader context of vulnerability, cache memory and side channel attacks. We discussed vulnerabilities with the reference of the CVE database of the MITRE corporation. Side channel attacks provide a range of" 2312.11111v1,"The Good, The Bad, and Why: Unveiling Emotions in Generative AI * Cheng Li 1,2 , Jindong Wang 1† , Yixuan Zhang 3 , Kaijie Zhu 1 , Xinyi Wang 4 , Wenxin Hou 1 , Jianxun Lian 1 , Fang Luo 4 , Qiang Yang 5 , Xing Xie 1 1 Microsoft Research 2 Institute of Software, CAS 3 William&Mary 4 Beijing Normal University 5 Hong Kong University of Science and Technology Abstract Emotion significantly impacts our daily behaviors and interactions. While recent generative AI models, such as large language models, have shown impressive performance in various tasks, it remains unclear whether they truly comprehend emotions. This paper aims to address this gap by incorporating psychological theories to gain a holistic understanding of emotions in generative AI models. Specifically, we propose three approaches: 1) EmotionPrompt 24 to enhance AI model performance, 2) EmotionAttack to impair AI model performance, and 3) EmotionDecode to explain the effects of emotional stimuli, both benign and malignant. Through extensive experiments involving language and multi-modal models on semantic understanding, logical reasoning, and generation tasks, we demonstrate that both textual and visual EmotionPrompt can boost the performance of AI models while EmotionAttack can hinder it. Additionally, EmotionDecode reveals that AI models can comprehend emotional stimuli akin to the mechanism of dopamine in the human brain. Our work heralds a novel avenue for exploring psychology to enhance our understanding of generative AI models. 1 Introduction Emotion is a multifaceted psychological and physiological phenomenon that encompasses subjective feelings, physiological responses, and behavioral expressions 23 . Emotions manifest through a confluence of reflexes, perception, cognition, and behavior, all of which are subject to modulation by a range of internal and external determinants 41;40 . For instance, in decisionmaking, emotions emerge as powerful, ubiquitous, and consistent influencers that can swing from beneficial to detrimental 22 . Studies further underscore the importance of emotions in steering attention 34 , academia 38 , and competitive sports 21 . The recently emerging large language and multi-modal models have shown remarkable performance in a wide spectrum of tasks, such as semantic understanding, logical reasoning, * This paper is an extension of our previous EmotionPrompt 24 . We extended it to the visual domain and proposed EmotionAttack and EmotionDecode, two new approaches for attacking AI models and understanding how emotion works, respectively. † Corresponding author: Jindong Wang. Email: jindong.wang@microsoft.com. Address: No.5 Danling Street, Haidian District, Beijing, China, 100080. 1" 2312.11116v1,"Implementation of the IIIF Presentation API 3.0 based on Software Support Use Case of an Incremental IIIF Deployment within a Citizen Science Project Julien Antoine Raemy 1[0000−0002−4711−5759] and Adrian Demleitner 1[0000−0001−9918−7300] Digital Humanities Lab, University of Basel, Spalenberg 65, Basel, Switzerland julien.raemy@unibas.ch, adrian.demleitner@unibas.ch https://dhlab.philhist.unibas.ch/ Abstract. As part of the Participatory Knowledge Practices in Analogue and Digital Image Archives (PIA) research project, we have been implementing Linked Open Usable Data (LOUD) standards including the International Image Interoperability Framework (IIIF) specifications to disseminate digital objects, their related metadata and streamline our processes. We have taken an incremental approach to IIIF deployment, first by installing the Simple Image Presentation Interface (SIPI), a IIIF Image API 3.0 server, followed by conceiving a workflow based on cookbook recipes created and vetted by the IIIF community for the generation of resources compatible with the IIIF Presentation API 3.0, one of the key components of our architecture. This workflow resulted in a monitoring exercise of this community-driven effort, principally to align the requirements of PIA and the IIIF Presentation API support of software clients. Keywords: Citizen Science · Cultural Heritage · International Image Interoperability Framework · Linked Open Usable Data · Participatory Knowledge Practices in Analogue and Digital Image Archives · Swiss Society for Folklore Studies. Preprint This is the preprint version of a conference paper that was accepted at EuroMed2022, the International Conference on Digital Heritage, that took place in Limassol, Cyprus between the 7th November and the 11th November 2022. The conference proceedings are due to be published by Springer Nature Publisher in the Lecture Notes in Computer Science (LNCS) series. 1 Introduction Citizen Science projects and initiatives in the Humanities (sometimes referred to as Citizen Humanities [5]) have become increasingly popular over the last fifteen years thanks to digital transformation [13], whether via platforms for" 2312.11117v1,"Does the van der Waals force play a part in evaporation? E. S. Benilov ∗ Department of Mathematics and Statistics, University of Limerick, Limerick V94 T9PX, Ireland It is argued that the van der Waals force exerted by the liquid and vapor/air on the molecules escaping from one phase into the other affects strongly the characteristics of evaporation. This is shown using two distinct descriptions of the van der Waals force: the Vlasov and diffuse-interface models, each of which is applied to two distinct settings: a liquid evaporating into its vapor and that evaporating into air (in all cases, the vapor-to-liquid density ratio is small). For the former setting, the results are consistent with the Hertz–Knudsen Law (HKL), but the evaporation/condensation probability is very small (in the classical HKL, it is supposed to be order one). For the latter setting, the dependence of the evaporation rate on the difference between the saturated vapor pressure and its actual value is shown to be nonlinear (whereas the classical HKL predicts a linear dependence). The difference between the two settings indicates that the van der Waals force exerted by the air affects strongly evaporation (contrary to the general belief that the ambient gas is unimportant). I. INTRODUCTION Evaporation is fundamental to numerous natural and industrial processes, and the Hertz–Knudsen Law (HKL) is the primary tool for modeling it. In its original formulation [1, 2], the HKL was based on an assumption that the flux of molecules escaping from a liquid into vapor does not depend on the vapor pressure – hence, this flux can be calculated as if the vapor were saturated. Calculating also the flux in the opposite direction (which does depend on the actual vapor pressure), one can show that the net evaporative flux is r  RT  (v.sat) ρ − ρ (v) , E = (1) 2π where ρ (v.sat) is the saturated vapor density, ρ (v) is the actual density, R is the specific gas constant, and T the temperature (assumed, for simplicity, to be the same in the liquid and vapor). Expression (1) does not involve a single adjustable parameter and, thus, is unlikely to be accurate for all liquids under all conditions. To make it more adjustable, one can assume that some of the escaping molecules bounce back, as do those travelling in the opposite direction. It can be argued [3] that a molecule’s probability of evaporation equals that of condensation, resulting in the following modification of expression (1): r  RT  (v.sat) E = θ ρ − ρ (v) , (2) 2π where the evaporation/condensation probability θ (called also “mass adjustment coefficient”) depends on T . The amended version of the Hertz–Knudsen Law (HKL) still disagrees with some of the available experiments, and those disagree with each other: for, say, water, the measured values of θ vary between 0.01 and 1 for the same ∗ Email address: Eugene.Benilov@ul.ie; Homepage:https://eugene.benilov.com/ temperature [4, 5]. There are also several theoretical models (e.g., [6–8]), but the discord in the experimental results makes it difficult to choose the most accurate theory. The present paper is motivated by an observation that none of the existing models of evaporation accounts for the van der Waals (vdW) force. Yet it is clearly important: it holds the liquid/vapor interface together (by balancing the pressure gradient due to the density variation) – hence, should affect the molecules travelling through the interface. It can also be argued that the vdW force makes evaporation of a liquid into its vapor different from evaporation into air. To understand why, note that the vdW force exerted by the bulk of the liquid pulls the escaping molecules back and, thus, impedes evaporation – while the vapor and air pull them forward and, thus, encourage evaporation. Since under normal conditions the vapor and air densities differ by orders of magnitude, the former exerts a much stronger vdW force than the latter. As a result, evaporation into air should occur much faster than that into vapor – and this is one of the two main conclusions of the present work. The other one is that the dependence of the evapora-  tive flux E on the density difference ρ (v.sat) − ρ (v) for evaporation into air is nonlinear,  whereas the HKL (2) predicts that E ∼ ρ (v.sat) − ρ (v) . The two formulae can be reconciled only if the evaporation/condensation probability θ in (2) depends on ρ (v) . Such a dependence could explain the above-mentioned discord in the measurements of θ for the same liquid at the same temperature. The present paper employs two different descriptions of the vdW force: the Vlasov model and diffuse-interface model. The former has been used to study liquid films [9], but not evaporation; the latter has been applied to evaporation [10–12] but its connection to the HKL has not been properly explored. In the present work, the two models of the vdW force will be used in conjunction with the isothermal Navier– Stokes equations. This simple framework is sufficient for demonstrating the importance of long-range intermolec-" 2312.11123v1,"IMPROVED LONG-FORM SPEECH RECOGNITION BY JOINTLY MODELING THE PRIMARY AND NON-PRIMARY SPEAKERS Guru Prakash Arumugam, Shuo-yiin Chang, Tara N. Sainath Rohit Prabhavalkar, Quan Wang, Shaan Bijwadia Google LLC, Mountain View, CA, U.S.A. {guruprakash, shuoyiin, tsainath}@google.com ABSTRACT ASR models often suffer from a long-form deletion problem where the model predicts sequential blanks instead of words when transcribing a lengthy audio (in the order of minutes or hours). From the perspective of a user or downstream system consuming the ASR results, this behavior can be perceived as the model “being stuck”, and potentially make the product hard to use. One of the culprits for long-form deletion is training-test data mismatch, which can happen even when the model is trained on diverse and large-scale data collected from multiple application domains. In this work, we introduce a novel technique to simultaneously model different groups of speakers in the audio along with the standard transcript tokens. Speakers are grouped as primary and nonprimary, which connects the application domains and significantly alleviates the long-form deletion problem. This improved model neither needs any additional training data nor incurs additional training or inference cost. Index Terms— speech recognition, end-to-end-models, long-form deletion, multi-domain 1. INTRODUCTION End-to-end automatic speech recognition (ASR) systems [1, 2, 3] are capable of handling different scenarios (e.g. a few seconds to hours in length, clean audio vs noisy audio with background speech or music) and different downstream applications such as voice assistants (Google, Siri, Alexa, etc.) and captioning YouTube videos. These systems are trained with data from different sources and noise conditions for robust performance [4, 5]. One problem for such models is long-form deletion — sometimes the model introduces high deletion errors when the input audio is long. In such cases, the user may perceive the system as being stuck (no words are emitted intermittently), which can significantly hurt the user retention rate of the end product. Alternatively, if the transcript from ASR is consumed by downstream systems for semantic understanding, the missing words can induce cascading errors. 979-8-3503-0689-7/23/$31.00 ©2023 IEEE There have been many efforts in the literature to understand the cause of long-form deletions and attempt to improve general long-form quality. Some studies indicate that training-test data mismatch (due to acoustics, noise, audio length differences) is one cause [6, 7, 8]. The long-form deletion problems could be introduced in both models with recurrent structure (e.g. LSTM-based ASR [6, 7]) and nonrecurrent structure (e.g. conformer based ASR [8]). [9, 10, 11] attempts to use previous context as additional input to the model to improve long-form performance. [12] indicates that model architectures with global attention do not scale well to long-form audio and propose smaller attention windows for better scalability. But they do not explicitly target the longform deletion problem directly. Although improved model architectures can potentially alleviate the problem, we still sometimes see that the problem exists. This paper looks at an alternative approach to fix it. In this work, we demonstrate that even a model without global attention and trained with vast amount of diverse data can have significant long-form deletion problem. We create a targeted testset and metric that shows the long-form deletion clearly and analyze when the model exhibits the problem. We identify that a model trained on data from different applications can exhibit the long-form deletion problem for some domains more prominently than others. Different application domains expect different types of speakers to be transcribed. For example, for a voice assistant (e.g. Google, Siri), ASR is expected to only transcribe the target user talking to the device (i.e. the primary speaker) and ignore other speakers. However, when captioning a YouTube video, ASR is expected to transcribe all speakers. These expectations are reflected in the ground truth annotations of both training and test data. If data from these domains are directly mixed together without special handling, the conflicting expectations from different domains will cause confusions during the model training when non-primary speakers are present — to transcribe or not to transcribe, that is the question. These conflicting training goals ultimately limit the model from learning cross-domain capabilities, thus leading to long-form deletion errors. To address the above mentioned problem, we simultane-" 2312.11127v1,"TO APPEAR IN IEEE JOURNAL ON SELECTED TOPICS IN COMMUNICATIONS, SECOND QUARTER 2024 1 User-centric Flexible Resource Management Framework for LEO Satellites with Fully Regenerative Payload Sovit Bhandari, Student Member, IEEE, Thang X. Vu, Senior Member, IEEE, and Symeon Chatzinotas, Fellow, IEEE Abstract—The regenerative capabilities of next-generation satellite systems offer a novel approach to design low earth orbit (LEO) satellite communication systems, enabling full flexibility in bandwidth and spot beam management, power control, and onboard data processing. These advancements allow the implementation of intelligent spatial multiplexing techniques, addressing the ever-increasing demand for future broadband data traffic. Existing satellite resource management solutions, however, do not fully exploit these capabilities. To address this issue, a novel framework called flexible resource management algorithm for LEO satellites (FLARE-LEO) is proposed to jointly design bandwidth, power, and spot beam coverage optimized for the geographic distribution of users. It incorporates multispot beam multicasting, spatial multiplexing, caching, and handover (HO). In particular, the spot beam coverage is optimized by using the unsupervised K-means algorithm applied to the realistic geographical user demands, followed by a proposed successive convex approximation (SCA)-based iterative algorithm for optimizing the radio resources. Furthermore, we propose two joint transmission architectures during the HO period, which jointly estimate the downlink channel state information (CSI) using deep learning and optimize the transmit power of the LEOs involved in the HO process to improve the overall system throughput. Simulations demonstrate superior performance in terms of delivery time reduction of the proposed algorithm over the existing solutions. Index Terms—LEO satellite, beamforming, regenerative payload, caching, precoding, multicasting, optimization, handover, deep learning. I. I NTRODUCTION In the context of satellite constellations, the LEO constellation is considered suitable for broadband services due to its small round-trip delay compared to other satellite constellations. Thanks to advanced payload technology, the LEO satellites are now seen as key enablers for the beyond 5G (B5G) and sixth-generation (6G) communications systems, as they can intelligently deliver low-cost, higher-throughput broadband services to underserved areas [2], [3]. The authors are with the Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, L-1855 Luxembourg, Luxembourg. E-mail: {sovit.bhandari, thang.vu, symeon.chatzinotas}@uni.lu. This work is supported by the Luxembourg National Research Fund (FNR), grant reference FNR/IPBG19/14016225/INSTRUCT and FNR/C22/IS/17220888/RUTINE. For the purpose of open access, the author has applied a Creative Commons Attribution 4.0 International (CC BY 4.0) license to any Author Accepted Manuscript version arising from this submission. Parts of this work were presented in the IEEE International Conference on Communications Workshops [1] The success of LEO satellites to B5G/6G relies on the operating and payload architecture. Traditionally, two main configurations have been prevalent: the wide beam and the multiple spot beam configurations. The wide-beam configuration is characterized by wide coverage and is mainly used for broadcasting applications, while the multiple-spot beams are specifically designed for broadband services [4]. These configurations excel at providing dedicated services but lack the flexibility to effectively handle dynamic and complex situations such as targeted users’ mobility and time-varying demand. This lack of flexibility is favored in traditional satellite architectures due to the high cost and delays associated with the payload changes [5]. However, recent advancements in payload technologies, such as digital transparent payload (DTP) and active onboard antennas, enable efficient and reconfigurable hybrid broadcast/broadband modes [6]. Current DTP, however, has limited capabilities such as flexible channelization and rudimentary power control/sharing among carriers [7]. Thus, to address the shortcomings of the DTP, satellite companies are shifting their focus to incorporating advanced regenerative (fully digital) payload technology, which integrates a regenerative processor, electronically steered phased-array antennas, and optional memory units [8]. This transition allows for the optimization of various functionalities, including beamforming, spot beam coverage patterns, signal quality, bandwidth, and power as per the traffic demand [9],[10]. To minimize overall latency and further enhance the quality of service (QoS), the regenerative payload’s optional memory unit can be used for caching in LEO satellites. This approach is favored over the terrestrial networks because data cached in terrestrial networks must traverse multiple hops, which causes frequent handovers (HO) at the gateways (GWs) unless the requesting user equipment (UEs) are adjacent to edge nodes [11]. Moreover, the regenerative payload of the satellite constellation allows for the flexibility of on-demand multicasting services, potentially enabling the simultaneous delivery of cached content to different communities of users spread across different geographic areas [4], [12]. The successful launch of the OneWeb’s LEO satellite, JoeySat, in May 2023, funded by the European Space Agency and UK Space Agency, showcases the incorporation of the flexible software-defined regenerative processor along with multi-spot beam electronically steered phase array antennas. This implementation fulfills the demand-based beam tailoring and steering capability [13]. However, a complete package of" 2312.11132v1,"Factor Risk Budgeting and Beyond Adil Rengim CETINGOZ ∗ Olivier GUÉANT † Abstract Portfolio optimization methods have evolved significantly since Markowitz introduced the mean-variance framework in 1952. While the theoretical appeal of this approach is undeniable, its practical implementation poses important challenges, primarily revolving around the intricate task of estimating expected returns. As a result, practitioners and scholars have explored alternative methods that prioritize risk management and diversification. One such approach is Risk Budgeting, where portfolio risk is allocated among assets according to predefined risk budgets. The effectiveness of Risk Budgeting in achieving true diversification can, however, be questioned, given that asset returns are often influenced by a small number of risk factors. From this perspective, one question arises: is it possible to allocate risk at the factor level using the Risk Budgeting approach? This paper introduces a comprehensive framework to address this question by introducing risk measures directly associated with risk factor exposures and demonstrating the desirable mathematical properties of these risk measures, making them suitable for optimization. We also propose a framework to find the portfolio that effectively balances the risk contributions from both assets and factors. Leveraging standard stochastic algorithms, our framework enables the use of a wide range of risk measures. Keywords: factor models, factor investing, portfolio optimization, risk budgeting, risk measures, stochastic algorithms ∗ Université Paris 1 Panthéon-Sorbonne, Centre d’Economie de la Sorbonne, 106 Boulevard de l’Hôpital, 75642 Paris Cedex 13, France, adil-rengim.cetingoz@etu.univ-paris1.fr † Université Paris 1 Panthéon-Sorbonne, Centre d’Economie de la Sorbonne, 106 Boulevard de l’Hôpital, 75642 Paris Cedex 13, France, olivier.gueant@univ-paris1.fr 1" 2312.11189v1,"Draft version December 19, 2023 Typeset using L A TEX default style in AASTeX631 Energy-Dependent Analyses of the Gamma-Ray Emission from HESS J1857+026 with Fermi-LAT Xiaolei Guo, 1 Xi Liu, 1 and Yuliang Xin 1 1 School of Physical Science and Technology, Southwest Jiaotong University, Chengdu 610031, People’s Republic of China; xlguo@swjtu.edu.cn ABSTRACT We report the discovery of energy-dependent morphology for the GeV gamma-ray emission from HESS J1857+026 with more than 13 years of Fermi Large Area Telescope (LAT) data. The GeV gamma-ray emission from this region is composed of two extended components. The hard component with an index of 1.74 ± 0.07 in the energy range of 0.5-500 GeV is spatially coincident with HESS J1857+026, and its 68% containment radius varies from ∼ 0.44 ◦ below 40 GeV to ∼ 0.30 ◦ above 140 GeV. The hard GeV gamma-ray spectrum and the energy-dependent morphology of HESS J1857+026 make it favor a PWN origin, which is associated with the energetic pulsar, PSR J1856+0245. The soft component with an index of 2.70 ± 0.16 and another extended gamma-ray source detected in this region, 4FGL J1857.9+0313e with an index of 2.55 ± 0.07, are spatially coincidence with two molecular clumps in the northeast and southwest of HESS J1857+026, which favors the hadronic process, and the protons could be accelerated by the hypothetical SNR associated with PSR J1856+0245. Keywords: gamma rays: general - gamma rays: ISM - ISM: individual objects (HESS J1857+026) - radiation mechanisms: non-thermal 1. INTRODUCTION More than two hundred of very-high-energy (VHE; > 100 GeV) gamma-ray sources have been detected with the operations of ground-based Cherenkov telescopes, such as H.E.S.S. (Aharonian et al. 2004), MAGIC (Aleksić et al. 2016), HAWC (Abeysekara et al. 2013) and LHAASO (Cao et al. 2023). The gamma-ray emission could be produced by the hadronic interactions in which π 0 decays into two gamma-ray photons subsequently, via the inverse Compton (IC) scattering process or through non-thermal bremsstrahlung radiation from high energy electrons. Most of the VHE gamma-ray sources have been identified to be pulsar wind nebulae (PWNe), supernova remnants (SNRs), X-ray binaries, TeV halos and so on. However, some TeV gamma-ray sources are still unidentified, and the multi-wavelength studies of these sources are crucial for revealing their nature and probing the origin of cosmic rays. HESS J1857+026 was first discovered as a VHE gamma-ray source with an extension of (0.11±0.08) ◦ ×(0.08±0.03) ◦ (Aharonian et al. 2008). In H. E. S. S. Collaboration et al. (2018), the morphology of HESS J1857+026 was described by a two dimensional (2D) Gaussian component with an approximate size of 0.26 ◦ ± 0.06 ◦ . Hessels et al. (2008) discovered an energetic pulsar, PSR J1856+0245, in the direction of HESS J1857+026, which makes HESS J1857+026 to be a potential PWN candidate. The period and spin-down luminosity of PSR J1856+0245 are P = 81 ms and Ė = 4.6 × 10 36 erg s −1 , respectively, with the characteristic age of τ c = 21 kyr. The distance of PSR J1856+0245 was first estimated to be ∼ 9 kpc, derived by the dispersion measure (DM) with electron density model of Cordes & Lazio (2002). And, an updated distance of ∼ 6.3 kpc is given by ATNF Pulsar Catalog 1 according to the electron density model of Yao et al. (2017). MAGIC carried out follow-up observations and presented energy-dependent morphology of this region (MAGIC Collaboration et al. 2014). In the energy range of 300 GeV-1 TeV, the morphology observed by MAGIC is compatible with H.E.S.S. observation. However, two separate gamma-ray sources, named MAGIC J1857.2+0263 (hereafter MAG1) and MAGIC J1857.6+0297 (hereafter MAG2), were detected with the data above 1 TeV. MAG1 is an extended source with the intrinsic extension of (0.17 ± 0.03 stat ± 0.02 sys ) ◦ × (0.06 ± 0.03 stat ± 0.02 sys ) ◦ , while MAG2 is compatible with 1 https://www.atnf.csiro.au/research/pulsar/psrcat/" 2312.11195v1,"CROSS-AGE CONTRASTIVE LEARNING FOR AGE-INVARIANT FACE RECOGNITION Haoyi Wang 1,2 * Victor Sanchez 1 Chang-Tsun Li 3 1 Department of Computer Science, The University of Warwick, Coventry, UK School of Engineering, Computing and Mathematics, University of Plymouth, Plymouth, UK 3 School of Information Technology, Deakin University, Waurn Ponds, Australia {h.wang.16, vsanchez}@warwick.ac.uk, changtsun.li@deakin.edu.au 2 Age 1 ABSTRACT Cross-age facial images are typically challenging and expensive to collect, making noise-free age-oriented datasets relatively small compared to widely-used large-scale facial datasets. Additionally, in real scenarios, images of the same subject at different ages are usually hard or even impossible to obtain. Both of these factors lead to a lack of supervised data, which limits the versatility of supervised methods for age-invariant face recognition, a critical task in applications such as security and biometrics. To address this issue, we propose a novel semi-supervised learning approach named Cross-Age Contrastive Learning (CACon). Thanks to the identity-preserving power of recent face synthesis models, CACon introduces a new contrastive learning method that leverages an additional synthesized sample from the input image. We also propose a new loss function in association with CACon to perform contrastive learning on a triplet of samples. We demonstrate that our method not only achieves state-of-the-art performance in homogeneous-dataset experiments on several age-invariant face recognition benchmarks but also outperforms other methods by a large margin in cross-dataset experiments. Index Terms— Age-invariant face recognition, biometrics, contrastive learning, semi-supervised learning 1. INTRODUCTION Age-invariant face recognition (AIFR) aims to recognize the identity of subjects regardless of their age. Different from conventional face recognition, AIFR needs to consider the *Work done while studied at the University of Warwick Copyright 2024 IEEE. Published in ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), scheduled for 14-19 April 2024 in Seoul, Korea. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE. Contact: Manager, Copyrights and Permissions / IEEE Service Center / 445 Hoes Lane / P.O. Box 1331 / Piscataway, NJ 08855-1331, USA. Telephone: + Intl. 908-562-3966. ID Age 2 ID (a) (b) Fig. 1. Data augmentation strategy used in (a) conventional contrastive learning, where two augmented samples are used to learn the shared features representing the identity within the input image and (b) CACon, where an additional sample is generated by a face synthesis model and used to learn the common identity features across different ages. intra-class variance caused by age information. A robust solution for AIFR can be used in various biometrics and forensics applications, such as tracking a person-of-interest, including missing children, people with dementia, or suspects over a span of several years [1]. Most existing AIFR methods attempt to solve the problem under supervised settings. For example, [2, 3] aim to learn and extract age-invariant features directly from input images, while generative models [4, 5] synthesize samples that match the target age before feature extraction. However, cross-age facial images of the same subject are extremely difficult to collect. As a result, existing noise-free age-oriented face datasets are small in size, with limited samples per subject [6], which could degrade the performance of supervised approaches. To address this, [7] tries to tackle the problem in an unsupervised manner by implementing an customized auto-encoder. However, this method requires image pairs of the same subject as the input and may not be efficient when the number of images per subject is limited. Furthermore, in real scenarios, images of the same subject at different ages are often hard or even impossible to obtain, limiting the versatility of this and other supervised approaches. In this paper, we propose a method called Cross-Age" 2312.11198v1,"Signed Graph Neural Ordinary Differential Equation for Modeling Continuous-time Dynamics Lanlan Chen 1 , Kai Wu 2 * , Jian Lou 3 , Jing Liu 1 1 Guangzhou Institute of Technology, Xidian University 2 School of Artificial Intelligence, Xidian University 3 Zhejiang University 21181214030@stu.xidian.edu.cn, kwu@xidian.edu.cn, jian.lou@hoiying.net, neouma@163.com Abstract Modeling continuous-time dynamics constitutes a foundational challenge, and uncovering inter-component correlations within complex systems holds promise for enhancing the efficacy of dynamic modeling. The prevailing approach of integrating graph neural networks with ordinary differential equations has demonstrated promising performance. However, they disregard the crucial signed information intrinsic to graphs, impeding their capacity to accurately capture real-world phenomena and leading to subpar outcomes. In response, we introduce a novel approach: a signed graph neural ordinary differential equation, adeptly addressing the limitations of miscapturing signed information. Our proposed solution boasts both flexibility and efficiency. To substantiate its effectiveness, we seamlessly integrate our devised strategies into three preeminent graph-based dynamic modeling frameworks: graph neural ordinary differential equations, graph neural controlled differential equations, and graph recurrent neural networks. Rigorous assessments encompass three intricate dynamic scenarios from physics and biology, as well as scrutiny across four authentic real-world traffic datasets. Remarkably outperforming the trio of baselines, empirical results underscore the substantial performance enhancements facilitated by our proposed approach.Our code can be found at https://github.com/beautyonce/SGODE. Introduction Complex systems prevalent in the real world, such as gene regulation (Marbach et al. 2012), social networks (Wasserman, Faust et al. 1994), climate models (Hwang et al. 2021), and traffic systems (Zhao et al. 2019), often find representation as complex networks governed by nonlinear dynamics (Lieberman, Hauert, and Nowak 2005). In contrast to deterministic and easily obtainable graphs (Wu et al. 2020a; Feng et al. 2023), the graph structures of these complex networks are challenging to explicitly articulate. Despite the extensive exploration of nonlinear dynamical systems, a significant number of complex networks continue to evade a clear understanding of their underlying dynamics. In recent years, a noteworthy trend has emerged, involving the fusion of ordinary differential equations (ODEs) with * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. neural networks to acquire insights into continuous-time dynamics (Chen et al. 2018; Rubanova, Chen, and Duvenaud 2019; Kidger et al. 2020; Jhin et al. 2021a; Hwang et al. 2021; Huang, Sun, and Wang 2021; Fang et al. 2021; Choi et al. 2022; Jhin et al. 2022).These hybrids, encompassing both ODEs and graph neural networks (GNNs), have demonstrated promising performance across a variety of tasks. This includes climate modeling (Hwang et al. 2021; Jhin et al. 2021a), traffic flow prediction (Poli et al. 2019; Fang et al. 2021; Choi et al. 2022), node classification (Zang and Wang 2020; Xhonneux, Qu, and Tang 2020), and dynamic interactions (Huang, Sun, and Wang 2021). However, it remains pertinent to note that a substantial portion of complex networks retains enigmatic dynamics yet to be fully unraveled. The majority of existing methodologies predominantly focus on either inferring or utilizing unsigned graphs, wherein only the presence or absence of dependencies between nodes is taken into account, while the type of edges are disregarded. As shown in Table 1, the current GNN-ODE methods are unable to capture and use signed information of dynamics, thus rendering this problem challenging. It is noteworthy that within unsigned graphs, nodes face challenges in shifting towards the opposing trend (rise or decline) when they and their neighboring nodes align in a similar variation trend (decline or rise). This constraint inherently restricts the capacity to represent dynamic processes effectively. A remedy for this limitation is the introduction of signed connections, which can markedly enhance the scenario. Intriguingly, signed graphs find applicability across a multitude of complex systems (Shi, Altafini, and Baras 2019). Notable instances include predation and prey relationships within ecosystems, activation and repression dynamics in gene regulation networks (Karlebach and Shamir 2008), as well as cooperation and antagonism dynamics observed within social and economic networks (Derr, Ma, and Tang 2018). To offer a concrete illustration, we examine the context of a three-way intersection within traffic systems, thereby illustrating the presence of signed graphs (refer to Appendix). In the context of an unknown underlying graph, one approach involves inferring the graph structure, which is inherently tied to the realm of graph structure learning. However, current graph structure learning methods fall short in handling signed information. To address this challenge, various strategies have been explored. One approach entails captur-" 2312.11201v1,"1 A Refining Underlying Information Framework for Speech Enhancement Rui Cao, Tianrui Wang, Meng Ge, Longbiao Wang, Member, IEEE, and Jianwu Dang, Member, IEEE Abstract—The advent of deep neural networks (DNN) has significantly improved the performance of monaural speech enhancement (SE). Most of them attempt to implicitly capture the structural features of speech through distribution approximation. However, existing methods are susceptible to the issues of degraded speech and residual noise. This letter is grounded in the Information Bottleneck as an anchor to rethink the SE. By defining the incremental convergence of mutual information between speech characteristics, we elucidate that the acoustic characteristic of speech is crucial in alleviating the above issues, for its explicit introduction contributes to further approximating the optimal information-theoretic upper bound of the optimization. Referring to the chain rule of entropy, we also propose a framework to reconstruct the information composition of the optimization objective, aiming to integrate and refine this underlying characteristic without loss of generality. The visualization reflects consistency with analysis using information theory. Experimental results show that with only 1.18 M additional parameters, the refined CRN has yielded substantial progress over a number of advanced methods. The source code is available at https://github.com/caoruitju/RUI SE. Index Terms—Monaural speech enhancement, information theory, deep learning. I. I NTRODUCTION M ONAURAL speech enhancement (SE) aims to recover the target speech from the noisy mixture, with the goal of improving the intelligibility and quality. Traditional SE methods typically depend on mathematical derivations based on assumptions about the statistical properties of speech and noise, such as spectral subtraction [1], Wiener filtering [2] and subspace-method [3]. With the rapid advancement of data-driven deep neural networks (DNN) in the past few years, DNN-based methods have significantly promoted the performance of SE [4]. Current methods can be broadly categorized into two streams, namely time domain [5]–[7] and time-frequency (T-F) domain. Time-domain methods directly estimate target waveform, but the abstract structure of Rui Cao and Tianrui Wang are with the Tianjin Key Laboratory of Cognitive Computing and Application, College of Intelligence and Computing, Tianjin University, Tianjin 300354, China (e-mail: caorui 2022@tju.edu.cn; wangtianrui@tju.edu.cn). Meng Ge is with the Saw Swee Hock School of Public Health, National University of Singapore, Singapore 117549 (e-mail: gemeng@nus.edu.sg). Longbiao Wang is with the Tianjin Key Laboratory of Cognitive Computing and Application, College of Intelligence and Computing, Tianjin University, Tianjin 300354, China, and also with Huiyan Technology (Tianjin) Company, Ltd., Tianjin 300384, China (e-mail: longbiao wang@tju.edu.cn). Jianwu Dang is with the Tianjin Key Laboratory of Cognitive Computing and Application, College of Intelligence and Computing, Tianjin University, Tianjin 300354, China, and also with the Pengcheng Laboratory, Shenzhen 518000, China (e-mail: jdang@jaist.ac.jp). waveform makes them uninterpretable [8] and challenging to improve with the help of speech characteristics. T-F domain methods that utilize the Short-Time Fourier Transform (STFT), fully displaying the diverse structural features of speech, remain more prevalent. Previous approaches [9], [10] only optimize the magnitude spectrum, greatly limiting the recovery of clean speech. To alleviate this, some approaches [11]–[13] recover the complex spectrum to optimize both magnitude and phase implicitly [14]. Starting solely from spectral characteristic, several decoupling-style approaches [15]–[18] further decompose the complex spectrum recovery problem into the magnitude-only estimation and complexvalued sparse term. While the function approximation in the spectral neighborhood space attempts to capture the sparse features of spectrum to some extent, the fundamental acoustic characteristics of speech are not sufficiently leveraged, including articulatory principles, acoustic structural features, and auditory perceptual features [19]–[24]. Taking the acoustic characteristics of speech as another starting point, some recent knowledge-based studies [25]–[28] have been proposed to reduce redundant parametric modeling with better hearing quality by incorporating the profound articulatory knowledge. However, the fixed network architectures are not conducive to a thorough analysis of the underlying reasons for their effective performance. A universally applicable theoretical explanation and framework would be more advantageous for integrating the intrinsic characteristics of speech signals. In this letter, drawing inspiration from the Information Bottleneck principle [29] and its similarity to SE, we rethink the optimization of DNN-based SE. On this basis, we elucidate the prevalent issues of over-suppressing speech and undersuppressing noise in existing methods [30], [31]. We hold that the recovery of clean speech should comprehensively consider the characteristics inherent in speech signals, which can be manifested as the incremental convergence of mutual information in the optimization objective. Compared to merely concerning spectral characteristic, the acoustic characteristic of speech, serving as speech-specific feature boundary, should also be explicitly introduced to alleviate the aforementioned issues. Such a perspective can facilitate understanding and provide guidance for algorithmic design in SE. Furthermore, with reference to the chain rule of entropy, we propose a Refining Underlying Information Framework (RUI) to integrate this underlying characteristic in a general way. The proposed multiple refinement iterations with a dual-path residual mechanism in RUI systematically refine the acoustic structural features of spectrum estimation approaches." 2312.11218v1,"Springer Nature 2021 L A TEX template Decoupled Knowledge with Ensemble Learning for Online Distillation Baitan Shao 1 and Ying Chen 1*† 1* Key Laboratory of Advanced Process Control for Light Industry Ministry of Education, Jiangnan University, Lihu Avenue, Wuxi, 214122, Jiangsu, China. *Corresponding author(s). E-mail(s): chenying@jiangnan.edu.cn; Contributing authors: shaoeric@foxmail.com; † These authors contributed equally to this work. Abstract Offline knowledge distillation is a two-stage pipeline that requires expensive resources to train a teacher network and then distill the knowledge to a student network for deployment. Online knowledge distillation, on the other hand, is a one-stage strategy that alleviates the requirement with mutual learning and collaborative learning. Recent peer collaborative learning (PCL) integrates online ensembling, collaboration of base networks (student) and temporal mean teacher (teacher) to construct effective knowledge. However, the model collapses occasionally in PCL due to high homogenization between the student and the teacher. In this paper, the cause of the high homogenization is analyzed and the solution is presented. A decoupled knowledge for online knowledge distillation is generated by an independent teacher, separate from the student. Such design can increase the diversity between the networks and reduce the possibility of model collapse. To obtain early decoupled knowledge, an initialization scheme for the teacher is devised, and a 2D geometrybased analysis experiment is conducted under ideal conditions to showcase the effectiveness of this scheme. Moreover, to improve the teacher’s supervisory resilience, a decaying ensemble scheme is devised. It assembles the knowledge of the teacher to which a dynamic weight which is large at the begining of the training and gradually decreases with the training process, is assigned. The assembled knowledge serves as a strong teacher during the early training and the decreased-weight-assembled knowledge can eliminate the distribution deviation under the potentially overfitted teacher’s supervision. A Monte Carlo-based simulation is conducted to evaluate the convergence. Extensive experiments on CIFAR-10, CIFAR-100 and TinyImageNet show the superiority of our method. Ablation studies and further analysis demonstrate the effectiveness. The code is available at https: //github.com/shaoeric/Decoupled-Knowledge-with-Ensemble-Learning-for-Online-Distillation. Keywords: Online knowledge distillation, Knowledge distillation, Decoupled knowledge, Ensemble learning 1 Introduction Over the past few years, deep learning has gradually come to dominate the field of computer vision. Mainstream tasks in computer vision, like 1 image classification [18] and object detection [31], have also been surprisingly successful with the help of deep learning techniques. Cumbersome networks tend to get better feature extraction" 2312.11226v1,"Docket No. FDA-2023-N-4853 (2023), 1, 1–19 ARTICLE TYPE CDRH Seeks public comment: Digital Health Technologies for Detecting Prediabetes and Undiagnosed Type 2 Diabetes. Manuel Cossio MMed, MEng, MNeur * Universitat de Barcelona | HE-Xperts Consulting LLC, Miami, 33131 , Florida, USA *Corresponding author. Email: manuel.cossio@ub.edu 1. Introduction The prevalence of type 2 diabetes is on the rise worldwide, with an estimated 463 million adults living with the condition in 2020. Prediabetes, a precursor to type 2 diabetes, affects an even larger population, with an estimated 537 million individuals globally 1 . Early detection and intervention are crucial in preventing the progression from prediabetes to type 2 diabetes and reducing the associated complications. Digital health technologies (DHTs), including those enabled by artificial intelligence/machine learning (AI/ML) algorithms, have emerged as promising tools for managing diabetes and its precursors (ellahham2020artificial). DHTs can provide continuous monitoring, personalized feedback, and interventions to individuals at risk or living with diabetes. This can help improve glucose control, reduce the risk of complications, and enhance overall well-being. The U.S. Food and Drug Administration (FDA) is seeking public comment (Docket No. FDA- 2023-N-4853) on the current and potential use of DHTs for detecting prediabetes and undiagnosed type 2 diabetes 2 . Addressing these questions is essential to understand the current landscape of DHTs, identify areas for further development, and ensure the safe and effective use of these technologies in the prevention and management of diabetes. Specifically, the FDA is interested in gathering information on: • The types of DHTs currently used for prediabetes prevention, detection, treatment, or reversal. This section will explore the various types of DHTs that are currently being utilized for prediabetes management, including wearable devices, mobile apps, and AI/ML-powered analytics platforms. • The methods employed by DHTs to capture and assess various signals related to diabetes risk factors. The methods used by DHTs to capture and analyze various signals associated with diabetes risk factors, such as blood glucose, physical activity, sleep patterns, and weight, will be examined in detail. • The subpopulations that may benefit most from remote screening and diagnostic tools. This section will identify specific subpopulations that may derive the most benefit from remote screening and diagnostic DHTs, considering factors such as access to healthcare, socioeconomic status, and cultural preferences. • The high-prevalence and high-impact risk factors that can be detected by DHTs. The focus will be on identifying the high-prevalence and high-impact risk factors for prediabetes and undiagnosed type 2 diabetes that can be effectively detected and monitored through DHTs. 1. International Diabetes Federation (IDF), (2021). 2. https://www.fda.gov/medical-devices/digital-health-center-excellence/cdrh-seeks-public-comment-digital-healthtechnologies-detecting-prediabetes-and-undiagnosed-type-2" 2312.11237v1,"GRAPH COMPLEXES FROM THE GEOMETRIC VIEWPOINT MARKO BERGHOFF Abstract. We introduce the associative, commutative and Lie graph com- plexes, and moduli spaces of metric graphs, then discuss how the commutative and Lie graph complexes can be interpreted as cellular chain complexes asso- ciated to certain (pairs of) subspaces of the latter, both for “even” and “odd” orientations. We explain why this does not work for the associative complex and how to adjust the space of graphs to deal with this case. Along the way we highlight how algebraic properties on one side translate into geometric statements on the other. 1. Introduction 1.1. Overview. In [Kon93, Kon94] Kontsevich introduced three types of chain complexes generated by finite graphs, with a differential defined by collapsing edges. He showed how the homology of these complexes relates to various invari- ants in low-dimensional topology and geometric group theory. Despite the simple combinatorial definition of these graph complexes, computing and understanding their homology is a challenging open problem. By now there exist many accounts on the topic, approaching it from quite different angles, many of which are very algebraic in nature. Although they lead to powerful methods, these algebraic approaches are often hard to digest, or even visualise. This is especially true for absolute beginners 1 . Some ideas on how to view and study graph complexes from a more geometric point of view are already contained in Kontsevich’s orginal works. This line of thought has been continued in many papers, most prominently in [CV03] which is entirely devoted to untangle and clarify many of the arguments and constructions in [Kon93, Kon94]. For the geometrically flavoured part Conant and Vogtmann use Outer space [CV86], a moduli space of marked graphs, 2 as a model to “realise” the associative, commutative and Lie graph complexes. Institut für Mathematik, Humboldt-Universität zu Berlin, Germany E-mail address: berghoffmj@gmail.com. 1 “Fuchs’ mich in die Materie, da es Möglichkeiten unbegrenzt gibt”, Samy Deluxe in [Beg98]. 2 A marking of a graph G of rank g is an identification of π (G) with F 1 g generators, up to homotopy; see remark 4.3. 1 g the free group on" 2312.11245v1,"WiSegRT: Dataset for Site-Specific Indoor Radio Propagation Modeling with 3D Segmentation and Differentiable Ray-Tracing (Invited Paper) Lihao Zhang ∗ , Haijian Sun ∗ , Jin Sun † , and Rose Qingyang Hu ‡ ∗ School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA † School of Computing, University of Georgia, Athens, GA, USA ‡ Department of Electrical and Computer Engineering, Utah State University, Logan, UT, USA Emails: {lihao.zhang, hsun, jinsun}@uga.edu, rose.hu@usu.edu Abstract—The accurate modeling of indoor radio propagation is crucial for localization, monitoring, and device coordination, yet remains a formidable challenge, due to the complex nature of indoor environments where radio can propagate along hundreds of paths. These paths are resulted from the room layout, furniture, appliances and even small objects like a glass cup, and also are influenced by the object material and surface roughness. Advanced machine learning (ML) techniques have the potential to take such non-linear and hard-to-model factors into consideration, but extensive and fine-grained datasets are urgently required. This paper presents WiSegRT 1 , an opensource dataset for indoor radio propagation modeling. Generated by a differentiable ray tracer within the segmented 3-dimensional (3D) indoor environments, WiSegRT provides site-specific channel impulse responses for each grid point relative to the given transmitter location. We expect WiSegRT to support a widerange of applications, such as ML-based channel prediction, accurate indoor localization, radio-based object detection, wireless digital twin, etc. Index Terms—Radio Propagation, Semantic Segmentation, Deep Learning Channel Modeling, Indoor Radio Dataset, Digital Twin. I. I NTRODUCTION The pursuit of advancements in wireless communication systems has led to the exploration of innovative technologies such as integrated sensing and communication (ISAC) [1], reconfigurable intelligent surfaces (RIS) [2], and massive multiple-input multiple-output (mMIMO) systems [3]. These technologies are not only expected to enhance communication data rates but also to perform additional tasks like sensing and localization. The key to their success lies in the availability of accurate and comprehensive wireless channel information. However, obtaining this information poses a significant challenge in the field of radio propagation modeling. In general, radio propagation models are categorized into two types: probabilistic and deterministic models. Probabilistic models are grounded in empirical formulas and utilize statistical data to calibrate parameters for specific environments. These models, primarily based on the distance between the 1 https://github.com/SunLab-UGA/WiSegRT transmitter (Tx) and receiver (Rx), are excellent at rapid signal strength estimation. However, they often fall short of accuracy and providing detailed channel characteristics such as the channel impulse response (CIR), angle of arrival (AoA), and angle of departure (AoD). Deterministic models, in contrast, consider the exact environment features. Some deterministic models are simplistic like the free space or the two-ray ground reflection model. Others employ computational electromagnetic (CEM) [4] that utilize Maxwell’s equations with appropriate boundary conditions, which is suitable for small-scale and near-field analysis. For radio propagation in large-scale environments and the transmitter’s far-field, ray concept from geometrical optics [5] is often employed. In a homogeneous medium, usually air, rays travel in straight lines, carrying energy and obeying the laws of reflection, refraction, and diffraction upon interacting with objects. This ray concept is the basis for implementing the well-known ray tracing method for both graphic rendering and radio simulation. However, both CEM methods and approximated ray tracing are computationally intensive and time-consuming, which limits their feasibility for real-time applications that also require high-quality results. To address the issue of high computational load associated with CEM and ray tracing, the advancements in machine learning (ML) have led to the development of ML-based radio propagation models that offer remarkable capabilities and fast computation speed [6]–[12]. The effectiveness of neural network depends significantly on both the quantity and quality of the data. Although there are many radio propagation datasets for outdoor or indoor, such as [13], [14], the majority merely employ 2D layouts or primitive 3D faces as the environment input and coarse channel characterizations, like the received signal strength indicator (RSSI). This setting may be adequate for outdoor scenarios, but often underperform in capturing the complexity of indoor environments which can be found in later section. In this paper, we introduce Wireless Segmented Ray Tracing (WiSegRT), a precise indoor radio dataset designed for various ML tasks in channel modeling. The main features and" 2312.11255v1,"1 State-action control barrier functions: Imposing safety on learning-based control with low online computational costs Kanghui He, Shengling Shi, Member, IEEE, Ton van den Boom, and Bart De Schutter, Fellow, IEEE Abstract Learning-based control with safety guarantees usually requires real-time safety certification and modifications of possibly unsafe learning-based policies. The control barrier function (CBF) method uses a safety filter containing a constrained optimization problem to produce safe policies. However, finding a valid CBF for a general nonlinear system requires a complex function parameterization, which in general, makes the policy optimization problem difficult to solve in real time. For nonlinear systems with nonlinear state constraints, this paper proposes the novel concept of state-action CBFs, which not only characterize the safety at each state but also evaluate the control inputs taken at each state. State-action CBFs, in contrast to CBFs, enable a flexible parameterization, resulting in a safety filter that involves a convex quadratic optimization problem. This, in turn, significantly alleviates the online computational burden. To synthesize state-action CBFs, we propose a learning-based approach exploiting Hamilton- Jacobi reachability. The effect of learning errors on the effectiveness of state-action CBFs is addressed by constraint tightening and introducing a new concept called contractive CBFs. These contributions ensure formal safety guarantees for learned CBFs and control policies, enhancing the applicability of learning-based control in real-time scenarios. Simulation results on an inverted pendulum with elastic walls validate the proposed CBFs in terms of constraint satisfaction and CPU time. Index Terms Constrained control, control barrier functions, machine learning, nonlinear control. This paper is part of a project that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 101018826 - CLariNet). All authors are with Delft Center for Systems and Control, Delft University of Technology, Delft, The Netherlands (e-mail: k.he@tudelft.nl; s.shi-3@tudelft.nl; a.j.j.vandenBoom@tudelft.nl; b.deschutter@tudelft.nl). December 19, 2023 DRAFT" 2312.11274v1,"Improving Student Learning with Hybrid Human-AI Tutoring: A Three-Study Quasi-Experimental Investigation Danielle R. Thomas Jionghao Lin Erin Gatz drthomas@cmu.edu Carnegie Mellon University Pittsburgh, USA jionghao@cmu.edu Carnegie Mellon University Pittsburgh, USA egatz@andrew.cmu.edu Carnegie Mellon University Pittsburgh, USA Ashish Gurung Shivang Gupta Kole Norberg agurung@andrew.cmu.edu Carnegie Mellon University Pittsburgh, USA shivang@cmu.edu Carnegie Mellon University Pittsburgh, USA Iknorberg1@carnegielearning.com Carnegie Learning, Inc. Pittsburgh, USA Stephen E. Fancsali Vincent Aleven Lee Branstetter sfancsali@carnegielearning.com Carnegie Learning, Inc. Pittsburgh, USA aleven@cs.cmu.edu Carnegie Mellon University Pittsburgh, USA branstet@andrew.cmu.edu Carnegie Mellon University Pittsburgh, USA Emma Brunskill Kenneth R. Koedinger ebrun@cs.stanford.edu Stanford University Stanford, USA koedinger@cmu.edu Carnegie Mellon University Pittsburgh, USA ABSTRACT CCS CONCEPTS Artificial intelligence (AI) applications to support human tutoring have potential to significantly improve learning outcomes, but engagement issues persist, especially among students from lowincome backgrounds. We introduce an AI-assisted tutoring model that combines human and AI tutoring and hypothesize this synergy will have positive impacts on learning processes. To investigate this hypothesis, we conduct a three-study quasi-experiment across three urban and low-income middle schools: 1) 125 students in a Pennsylvania school; 2) 385 students (50% Latinx) in a California school, and 3) 75 students (100% Black) in a Pennsylvania charter school, all implementing analogous tutoring models. We compare learning analytics of students engaged in human-AI tutoring compared to students using math software only. We find human-AI tutoring has positive effects, particularly in student’s proficiency and usage, with evidence suggesting lower achieving students may benefit more compared to higher achieving students. We illustrate the use of quasi-experimental methods adapted to the particulars of different schools and data-availability contexts so as to achieve the rapid data-driven iteration needed to guide an inspired creation into effective innovation. Future work focuses on improving the tutor dashboard and optimizing tutor-student ratios, while maintaining annual costs per student of approximately $700 annually. • Human-centered computing → Human computer interaction (HCI); • Applied computing → Education. This work is licensed under a Creative Commons Attribution International 4.0 License. LAK ’24, March 18–22, 2024, Kyoto, Japan © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1618-8/24/03. https://doi.org/10.1145/3636555.3636896 KEYWORDS Tutoring, Human-AI tutoring, AI-assisted tutoring, Design-based research ACM Reference Format: Danielle R. Thomas, Jionghao Lin, Erin Gatz, Ashish Gurung, Shivang Gupta, Kole Norberg, Stephen E. Fancsali, Vincent Aleven, Lee Branstetter, Emma Brunskill, and Kenneth R. Koedinger. 2024. Improving Student Learning with Hybrid Human-AI Tutoring: A Three-Study Quasi-Experimental Investigation . In The 14th Learning Analytics and Knowledge Conference (LAK ’24), March 18–22, 2024, Kyoto, Japan. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3636555.3636896 1 INTRODUCTION The main obstacle to improving math performance among middle school students lies in ensuring fair and equal access to effective learning opportunities [7, 20]. While economically disadvantaged and historically underserved students have the potential to excel when given the same resources as their peers (c.f., [18]), they often face learning gaps due to limited access [7]. Individualized instruction via tutoring can have consistent and significant positive impacts on student achievement and learning [12, 20], particularly when deployed among middle and high school grades in math and during the school day, as opposed to after school [25] and when delivered by trained tutors attending to students’ socio-motivational needs and relationship building [6, 19]. However, low-income students lack access to in-school tutoring programs and well-trained" 2312.11276v1,"Compositional Generalization for Multi-label Text Classification: A Data-Augmentation Approach Yuyang Chai 1, * , Zhuang Li 2, * , Jiahui Liu 1 , Lei Chen 1 , Fei Li 1 , Donghong Ji 1 , Chong Teng 1,† 1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University 2 Faculty of Information Technology, Monash University {yychai, liujiahui, chhenl, lifei csnlp, dhji, tengchong}@whu.edu.cn, zhuang.li1@monash.edu Abstract Despite significant advancements in multi-label text classification, the ability of existing models to generalize to novel and seldom-encountered complex concepts, which are compositions of elementary ones, remains underexplored. This research addresses this gap. By creating unique data splits across three benchmarks, we assess the compositional generalization ability of existing multi-label text classification models. Our results show that these models often fail to generalize to compositional concepts encountered infrequently during training, leading to inferior performance on tests with these new combinations. To address this, we introduce a data augmentation method that leverages two innovative text generation models designed to enhance the classification models’ capacity for compositional generalization. Our experiments show that this data augmentation approach significantly improves the compositional generalization capabilities of classification models on our benchmarks, with both generation models surpassing other text generation baselines 1 . Introduction Multi-label text classification (MLTC) involves identifying the labels associated with the input text. This task has broad applications in natural language processing (NLP), including sentiment analysis in tweets (Mohammad et al. 2018), subject identification in interdisciplinary academic articles (Yang et al. 2018), and movie genre classification based on movie reviews (Maiya 2019). Although there has been significant progress in improving classifier performance across various MLTC benchmarks, whether existing MLTC models can generalize compositionally has received limited attention in prior MLTC studies. Compositional generalization (CG) is a fundamental ability inherent to human intelligence, enabling the recognition of novel and infrequently occurring high-level concepts that are compositions of more atomic elements (Chomsky 2014). For example, once a person learns to understand the emotions of joy and sadness in simple phrases like ‘I am sad’ and ‘I rejoice’, respectively, he can effortlessly recognize a * These authors contributed equally. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 Codes available at https://github.com/yychai74/LD-VAE Train set: 1. 2. 1. 2. joy, love I feel so blessed to work with the family that I nanny for ❤️ nothing but love & appreciation, makes me smile. Happy Birthday shorty. Stay fine stay breezy stay wavy @daviistuart 😘 … anger, sadness the bee sting still suck i feel sick @BigBrother USA she is just jealous and a cry baby! #bitter #gladsheisgone #crybaby … Generator Synthetic data: 1. Classifier Classifier 2. Test set: 1. 2. joy, sadness Just to make you laugh @SnoopKellogg's death, no thank you. Just a terrible decision at the end of the day @jessicajean what a sad day for the Irish in Ireland. I'd be so grateful #glad … joy, sadness sometimes im sad then remember Margaret Thatcher is dead and then i rejoice Beginning the process to see if working is an option. #mentalhealth #complexptsd … Figure 1: Illustration of the CG challenge in MLTC and an overview of our proposed data augmentation solution. complex emotion in a tweet such as ‘sometimes I am sad, then remember Margaret is dead, and then I rejoice’. This tweet conveys a nuanced composite of two emotions occurring simultaneously. In contrast to humans, our initial research indicates that current MLTC models struggle to identify these nuanced compositions if they infrequently occur in the training set. The T5-based (Raffel et al. 2020) MLTC model (Chai et al. 2022), for example, only achieved less than 2% accuracy on the SemEval test set (Mohammad et al. 2018) for previously unseen emotional compositions, despite ample training data for each elementary emotion. Conversely, when the training data contains abundant emotional compositions as those found in the test set, its accuracy exceeded 28%. This discrepancy underscores the urgent need for MLTC models capable of generalizing to novel compositions, making them more effective in a world that continuously presents new composite knowledge. This study offers the first in-depth exploration of the CG challenges that impact MLTC. We utilize three MLTC benchmarks that tackle three tasks: emotion classification, subject identification of abstracts, and genre classification of movie reviews. Traditional MLTC benchmarks typically employ random splits, where all the compositions of individual labels are prevalent across both training and test sets. This methodology hinders a rigorous evaluation of the models’ capacity to generalize compositionally. Inspired by the inherent human ability to recognize unfamiliar composite" 2312.11279v1,"IEEE EMBEDDED SYSTEMS LETTERS 1 FPGAs (Can Get Some) SATisfaction H. Govindasamy ∗ , B. Esfandiari ∗ , P. Garcia † ∗ { hari, babak } @sce.carleton.ca, Dpt. Systems Computer Engineering, Carleton University, Canada † paulo.g@chula.ac.th, International School of Engineering, Chulalongkorn University, Thailand Abstract—We present a hardware-accelerated SAT solver suitable for processor/Field Programmable Gate Arrays (FPGA) hybrid platforms, which have become the norm in the embedded domain. Our solution addresses a known bottleneck in SAT solving acceleration: unlike prior state-of-the-art solutions that have addressed the same bottleneck by limiting the amount of exploited parallelism, our solver takes advantage of fine-grained parallelization opportunities by hot-swapping FPGA clause assignments at runtime. It is also the first modern completely open-source SAT accelerator, and formula size is limited only by the amount of available external memory, not by on-chip FPGA memory. Evaluation is performed on a Xilinx Zynq platform: experiments support that hardware acceleration results in shorter execution time across varying formula sizes, subject to formula partitioning strategy. We outperform prior state-of-the-art by 1.7x and 1.1x, respectively, for 2 representative benchmarks, and boast up to 6x performance increase over software-only implementation. Index Terms—FPGA, SAT, acceleration, embedded, boolean, satisfiability I. I NTRODUCTION FFICIENT computation of Boolean Satisfiability problem (SAT) is extremely important across several engineering domains, as SAT can encode all NP-complete problems [1], [2]. In the power/performance constrained embedded E world, SAT solvers were not feasible [3] until the recent advent of sufficiently powerful Field Programmable Gate Arrays (FPGA) offering acceleration opportunities [4]. The state of the art on SAT solver acceleration is comprised of either incomplete solvers [5] or complete solvers with only coarse-grained parallelization [6], [7]: we point interested readers to a comprehensive survey of hardware SAT solvers [8]. Our work directly extends (and is compared with) works by Davis et al [9] and Thong et al [6], both hardwareaccelerations of Boolean Constraint Propagation (BCP), a subcomponent of the Davis-Putnam-Logemann-Loveland (DPLL) SAT solver algorithm. Figure 1 summarizes Davis et al, Thong et al and our approach. Davis et al’s [9] approach groups clauses (see Section II-A below) across parallel accelerators, such that no two clauses on the same accelerator share variables. Using a two stage process, the variable assignment’s corresponding clause is first retrieved (we point readers to [9] for an indepth explanation of their look-up technique), and the resulting implication (constraints on variable values in function of prior clauses) is then calculated. Thong et al [6] identify that clause look-up in Davis et al’s [9] work is slower than direct access; thus, they evaluate a clause encoding scheme that links clauses with shared variables on BRAM. The result is a sequential BCP processor Fig. 1. (a) Formula partitioning. (b) Formula stored directly on FPGA; single clause retrieved for processing per partition. (c) Formula stored directly on FPGA; partitions connected in partial order. Clauses processed sequentially. (d) Formula stored in external memory (”software” view) and partitions hot-swapped as required. Clauses are mapped directly to clause engines. 0000–0000/00$00.00 © 2021 IEEE" 2312.11281v1,"Human mobility is well described by closed-form gravity-like models learned automatically from data Oriol Cabanas-Tirapu a , Lluı́s Danús a , Esteban Moro b,c,d , Marta Sales-Pardo a,* , and Roger Guimerà a,e,* a Department of Chemical Engineering, Universitat Rovira i Virgili, 43007 Tarragona, Catalonia Institute for Data, Systems, and Society, Massachusetts Institute of Technology, Cambridge, MA 02139 c Department of Mathematics and GISC, Universidad Carlos III de Madrid, 28911 Leganés, Spain d Network Science Institute, Northeastern University, Boston, MA 02115, United States e ICREA, 08007 Barcelona, Catalonia * Corresponding authors: Marta Sales-Pardo (E-mail: marta.sales@urv.cat); Roger Guimerà (E-mail: roger.guimera@urv.cat) b ABSTRACT Modeling of human mobility is critical to address questions in urban planning and transportation, as well as global challenges in sustainability, public health, and economic development. However, our understanding and ability to model mobility flows within and between urban areas are still incomplete. At one end of the modeling spectrum we have simple so-called gravity models, which are easy to interpret and provide modestly accurate predictions of mobility flows. At the other end, we have complex machine learning and deep learning models, with tens of features and thousands of parameters, which predict mobility more accurately than gravity models at the cost of not being interpretable and not providing insight on human behavior. Here, we show that simple machine-learned, closed-form models of mobility are able to predict mobility flows more accurately, overall, than either gravity or complex machine and deep learning models. At the same time, these models are simple and gravity-like, and can be interpreted in terms similar to standard gravity models. Furthermore, these models work for different datasets and at different scales, suggesting that they may capture the fundamental universal features of human mobility. Introduction Accurate models of population mobility within and between municipalities are critical to address questions in urban planning and transportation engineering. Additionally, since municipalities are the main ground on which societies and cultures develop today, such mobility models are also instrumental in addressing global challenges in sustainability, public health, and economic development. Two main factors have driven recent interest in modeling human mobility patterns 1–5 . First, accurate models of human mobility could help identify transportation needs 6 , allocate services and amenities (shopping, health, parks) more efficiently 7 , or even understand and eventually alleviate problems like segregation 8 , or epidemic spreading 9 . But, at the same time, models of human mobility can help identify the main behavioral components driving people to make large displacements to, for example, buy a new product, find a new house, or use physical activity spaces. Better behavioral models can help us implement more efficient policies to change people’s behavior, rather than urban environments, in favor of more sustainable attitudes. Despite these considerations, our understanding of the mobility flows within and between urban areas is still incomplete. One of the earliest and most fruitful attempts to model mobility flows between municipalities is the so-called gravity model 1 . This model assumes that mobility flows depend solely on the attractiveness or opportunities of the municipalities of origin and destination (for which population is typically used as a proxy) and the geographical distance between them, in a fashion that is mathematically similar to Newton’s law of gravitation. In its different incarnations and refined versions 4, 11, 12 , the gravity model provides a simple phenomenological description of a very complex phenomenon. Because of this, while gravity models are not without their limitations, they are very often used in urban design, transportation, or even commercial applications. Recently, deep learning algorithms have been proposed, extending the ideas underlying gravity models; they incorporate many other features besides the populations of the origin and destination municipalities and their distance 10 . Although those sophisticated machine learning tools are more accurate at predicting flows between urban areas, they lack the explanatory power, analytical tractability, adaptability to different contexts, and connection to human decision-making of simple gravity models. Given the reasonable success of simple gravity models in explaining flows in urban areas, here we investigate the fundamental question of whether we really need non-interpretable models that are much more complex than the gravity law to delve deeper into the essence of urban mobility. Unlike other behavioral models, gravity mobility models are phenomenological. Because of the lack of precise theoretical underpinnings, their predictive ability depends on the exact functional 1" 2312.11296v1,"From Generalized Laughter to Personalized Chuckles: Unleashing the Power of Data Fusion in Subjective Humor Detection Julita Bielaniewicz and Przemysław Kazienko Department of Artificial Intelligence, Wrocław University of Science and Technology, Poland {julita.bielaniewicz, kazienko}@pwr.edu.pl Abstract—The vast area of subjectivity in Natural Language Processing (NLP) poses a challenge to the solutions typically used in generalized tasks. As exploration in the scope of generalized NLP is much more advanced, it implies the tremendous gap that is still to be addressed amongst all feasible tasks where an opinion, taste, or feelings are inherent, thus creating a need for a solution, where a data fusion could take place. We have chosen the task of funniness, as it heavily relies on the sense of humor, which is fundamentally subjective. Our experiments across five personalized and four generalized datasets involving several personalized deep neural architectures have shown that the task of humor detection greatly benefits from the inclusion of personalized data in the training process. We tested five scenarios of training data fusion that focused on either generalized (majority voting) or personalized approaches to humor detection. The best results were obtained for the setup, in which all available personalized datasets were joined to train the personalized reasoning model. It boosted the prediction performance by up to approximately 35% of the macro F1 score. Such a significant gain was observed for all five personalized test sets. At the same time, the impact of the model’s architecture was much less than the personalization itself. It seems that concatenating personalized datasets, even with the cost of normalizing the range of annotations across all datasets, if combined with the personalized models, results in an enormous increase in the performance of humor detection. Index Terms—natural language processing, personalization, transfer learning, humor detection, data fusion who end up omitted from the majority. Regardless, following this path, we could create subgroups in the said groups that will sort users more accurately, yet still have a generalization approach. Furthermore, this would lead to more and more subgroups that will set the gold standard of a single group anew, still bearing the generalization, until we focus on each person separately. This final product sets a standard for the sense of humor per person, which is, in essence, humor personalization. In this way, we eliminate the possibility that anyone with an unusual sense of humor would be ignored. Given the prospect concealed within personalization [4]–[7], there was a need for scenarios where there was the possibility of checking different combinations of subjectivity and its impact on the model performance. We intended to implement data fusion that could improve the overall performance of personalized reasoning by showing which combination of subjectivity to generalization ratio was optimal. Our research resulted in discovering the major gain for the models trained on a fully subjective fused dataset, as well as noticing that it effectively increases the quality of personalized deep learning architectures. This achievement is especially exciting, as it opens the door to the possibilities that lie within the data fusion domain. I. I NTRODUCTION In this work, our aim is to answer the following research questions: Recent years have shown that the subjective field of natural language processing is gradually receiving more attention, yet still comparatively less than the predominant generalization approach. This is especially apparent when focusing on a single personalization task, such as emotion detection, hate speech, or funniness. Although this implicitly signals the difference in the amount of research, the possibilities that lie in personalized data utilization even in a single subjective task are very promising [1], [2]. An indirect issue that tends to be ignored is the nature of groups and subgroups that can be distinguished according to general characteristics in the sense of humor of individuals. Those groups could be sorted according to age, gender, political views, occupation, and many other characteristics [3]. Undoubtedly, this will allow for a more accurate image of the sense of humor per group, but will still remain overall generalized. What is crucial is that in each group we would still observe unique individuals 1) Does providing knowledge from other datasets help the model better understand the task of humor detection? (see Sec. VII-A) 2) Does the fusion of data about individual users sense of humor from various datasets affect the reasoning quality for other personalized datasets in personalized and majority voting-based scenarios? (see Sec. VII-A) 3) Does the addition of generalized datasets improve the quality of humor prediction for personalized datasets in a majority voting scenario? (see Sec. VII-B) 4) Does the knowledge transfer between personalized datasets affect the model performance in a similar way as the knowledge transfer between the datasets with majority voting? (see Sec. VII-B) 5) Does the gain received from data fusion depend on the language or the domain of the datasets? (see Sec. VII-B) 6) Does the use of personalized data fusion techniques" 2312.11299v1,"Uncertainty-based Fairness Measures Selim Kuzucu, 1 * , Jiaee Cheong, 2,3 * , Hatice Gunes 2 , Sinan Kalkan 1 Abstract Unfair predictions of machine learning (ML) models impede their broad acceptance in real-world settings. Tackling this arduous challenge first necessitates defining what it means for an ML model to be fair. This has been addressed by the ML community with various measures of fairness that depend on the prediction outcomes of the ML models, either at the group level or the individual level. These fairness measures are limited in that they utilize point predictions, neglecting their variances, or uncertainties, making them susceptible to noise, missingness and shifts in data. In this paper, we first show that an ML model may appear to be fair with existing point-based fairness measures but biased against a demographic group in terms of prediction uncertainties. Then, we introduce new fairness measures based on different types of uncertainties, namely, aleatoric uncertainty and epistemic uncertainty. We demonstrate on many datasets that (i) our uncertainty-based measures are complementary to existing measures of fairness, and (ii) they provide more insights about the underlying issues leading to bias. The code, the data and the trained models are provided in the supplementary material. 1 Introduction An impedance on the wide-spread use of machine learning (ML) approaches is the bias present in their predictions against certain demographic groups. The severity and extent of this matter have been considerably investigated for different applications, such as gender recognition (Buolamwini and Gebru 2018), emotion or expression recognition (Domnich and Anbarjafari 2021; Xu et al. 2020; Chen and Joo 2021), mental health prediction (Cheong et al. 2023), etc. It has been identified in the literature that fairness is a multi-faceted concept, which has led to different notions and definitions of fairness (Garg, Villasenor, and Foggo 2020; Verma and Rubin 2018a; Castelnovo et al. 2022; Dwork et al. 2012; Mehrabi et al. 2021). For example, a model can be considered fair at a group level (called group fairness) if its predictions are the same for the different demographic groups (a.k.a., Statistical Parity – Dwork et al. (2012); Mehrabi et al. (2021); Garg, Villasenor, and Foggo (2020); Verma and Rubin (2018a)) or if its false negative * These authors contributed equally. Copyright © 2023, All rights reserved. 𝑃 "" 𝑃 ! 𝑃 # Prediction Probs. 1 Department of Computer Engineering, Middle East Technical University, Turkey. Department of Computer Science and Technology, University of Cambridge, United Kingdom. 3 The Alan Turing Institute, United Kingdom. {selim.kuzucu, skalkan}@metu.edu.tr, {jiaee.cheong, hatice.gunes}@cl.cam.ac.uk Prediction Probs. 2 𝑃 $ 𝑦 "" 𝑦 ! 𝑦 # 𝑦 $ classes (a) Point Predictions Groups or Individuals ML Model ML Model 𝒰 "" 𝒰 ! 𝒰 𝒰 $ Unc. over models Unc. over labels 𝑦 "" 𝑦 ! 𝑦 # 𝑦 $ classes (c) Prediction Uncertainties {𝑃 ""% , 𝑃 !% … } Point Predictions 𝒰 # Fair? {𝑃 """" , 𝑃 !"" … } (b) Fairness with Point Predictions Groups or Individuals ML Model {𝒰 ""% , 𝒰 !% … } ML Model {𝒰 """" , 𝒰 "" ! … } Uncertainty Predictions Fair? (d) Fairness with Uncertainty Pred. Figure 1: Existing fairness measures utilize point predictions for quantifying fairness, which ignores the uncertainty (variance) of the predictions (a-b). We fill this gap by using uncertainty instead for measuring fairness (c-d). rates are the same (a.k.a., Equal Opportunity – Hardt, Price, and Srebro (2016)). Alternatively, a model can be evaluated for fairness at the level of individuals (called individual fairness) by comparing an individual’s predictions to similar individuals (Dwork et al. 2012) or to a counterfactual version of the individual (called counterfactual fairness – Kusner et al. (2017); Cheong, Kalkan, and Gunes (2022)). Despite advances in fairness quantification measures using point predictions (Fig. 1(a,b)) and bias mitigation methods, the utility of such measures or methods are often limited when exposed to real-world data. This is because (P1) first, they often do not account for real-world problems such as missing data (Goel et al. 2021), biased labelling (Jiang and Nachum 2020) and domain or distribution shifts (Chen et al. 2022). (P2) Second, they are susceptible to fairness gerrymandering. For instance, depending on how a group is defined, a key challenge with existing statistical-parity pointbased fairness measures is that it is implausible to ensure they hold for every subgroup of the population. Any classifier can be deemed unfair to the subgroup of individuals defined ex-post as the set of samples it misclassified (Kearns et al. 2018). (P3) Third, recent work have demonstrated how traditional bias mitigation methods do not necessarily lead to fairer outcomes as measured using traditional parity-based measures nor do they shed light on the source of bias. For instance, larger or more balanced datasets did not mitigate embedded disparities in real-world tabular datasets (Ding" 2312.11326v1,"Topic Shifts as a Proxy for Assessing Politicization in Social Media Marcelo Sartori Locatelli, Pedro Calais, Matheus Prado Miranda * ,João Pedro Junho * , Tomas Lacerda Muniz, Wagner Meira Jr., Virgilio Almeida Universidade Federal de Minas Gerais 6627 Av. Pres. Antônio Carlos Belo Horizonte, Minas Gerais 31270-901 Brazil {locatellimarcelo, pcalais, matheus.prado, joaopedro.junho, tomas.muniz, meira, virgilio}@dcc.ufmg.br Abstract Politicization is a social phenomenon studied by political science characterized by the extent to which ideas and facts are given a political tone. A range of topics, such as climate change, religion and vaccines has been subject to increasing politicization in the media and social media platforms. In this work, we propose a computational method for assessing politicization in online conversations based on topic shifts, i.e., the degree to which people switch topics in online conversations. The intuition is that topic shifts from a non-political topic to politics are a direct measure of politicization – making something political, and that the more people switch conversations to politics, the more they perceive politics as playing a vital role in their daily lives. A fundamental challenge that must be addressed when one studies politicization in social media is that, a priori, any topic may be politicized. Hence, any keyword-based method or even machine learning approaches that rely on topic labels to classify topics are expensive to run and potentially ineffective. Instead, we learn from a seed of political keywords and use Positive-Unlabeled (PU) Learning to detect political comments in reaction to non-political news articles posted on Twitter, YouTube, and TikTok during the 2022 Brazilian presidential elections. Our findings indicate that all platforms show evidence of politicization as discussion around topics adjacent to politics such as economy, crime and drugs tend to shift to politics. Even the least politicized topics had the rate in which their topics shift to politics increased in the lead up to the elections and after other political events in Brazil – an evidence of politicization. Introduction Nowadays, any person may publicly share their views on a given subject with a far larger reach than they would have otherwise (Boynton and Richardson Jr 2016), social media platforms have enabled a plethora of studies in the social sciences and, more specifically, in the political sciences (Lazer et al. 2009; Edelman et al. 2020). While threats to the validity of studies based on social media data are still a concern (Howison, Crowston, and Wiggins 2011), access to large amounts of digital behavioral data has allowed political scientists to pair with their computer science peers to * These authors contributed equally. Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. study the role of social media in government behavior (Graham, Avery, and Park 2015), voter engagement (Grover et al. 2019), news coverage and its bias (Baum and Groeling 2008; Oschatz, Stier, and Maier 2022) and even election forecasts (Tumasjan et al. 2011). More specifically, two widely recognized political processes received special attention with respect to how they shape (and are shaped) by social media, namely, polarization and politicization. While polarization refers to the process by which two or more political groups selectively chooses to consume opinions they already agree with and adopt increasingly extreme and antagonistic viewpoints (Layton et al. 2021), politicization, the focus of our work, is the act of marking or naming something as political (Wiesner 2021). Topics recently subject to increasing politicization include climate change (Pepermans and Maeseele 2016), COVID- 19 (Hart, Chinn, and Soroka 2020), religion (Zembylas, Loukaidis, and Antoniou 2019), and culture and science in general (Wright 1998; Bolsen and Druckman 2015). By adding an ideological charge to a non-political issue, politicization may lead to manipulation, increased hostility and a lack of trust to the public debate. Next we present a concrete example of politicization in a news article published by Folha de São Paulo newspaper in Twitter during the Brazilian 2022 presidential elections: Post: “Latin America: Evangelical gays defy churches and get married after pro-LGBTQIA+ referendum in Cuba.” 1 Comment: “Recently, @folha’s headlines have seemed to be made specifically to be used by Bolsonaro’s supporters and fuel disinformation.” 1 Note that the original post touches on an (apolitical) religious and LGBTQIA+ topic that was quickly labeled as politically motivated – in particular, meant to be politically exploited by supporters of Brazilian 2022 presidential candidate Jair Bolsonaro. In this work, we devise a computational method that directly models two key aspects that characterize politicization: 1. The transition from a non-political to a political topic. On unfiltered social media datasets comprising conver- 1 Posts have been translated from Portuguese to English. The comment was paraphrased to protect the identity of the user." 2312.11329v1,"1–13 Convergence guarantees for adaptive model predictive control with kinky inference Riccardo Zuliani RZULIANI @ ETHZ . CH Raffaele Soloperto SOLOPERR @ ETHZ . CH John Lygeros JLYGEROS @ ETHZ . CH All the authors are with the Automatic Control Laboratory, ETH Zürich Abstract We analyze the convergence properties of a robust adaptive model predictive control algorithm used to control an unknown nonlinear system. We show that by employing a standard quadratic stabilizing cost function, and by recursively updating the nominal model through kinky inference, the resulting controller ensures convergence of the true system to the origin, despite the presence of model uncertainty. We illustrate our theoretical findings through a numerical simulation. Keywords: Adaptive model predictive control, adaptive control, kinky inference. 1. Introduction Motivation During the last few decades, model predictive control (MPC) has attracted large attention because of its efficiency in handling nonlinear systems subject to hard state and input constraints, while minimizing a user-defined cost function, Rawlings et al. (2017). An MPC scheme employs a nominal model of the system dynamics to predict future trajectories over a given prediction horizon. However, in several applications, obtaining an accurate model can be expensive in terms of money and resources, Darby and Nikolaou (2012). Model inaccuracies, combined with the presence of disturbances affecting the system, might lead to a deterioration of performance, constraint violation, or even instability, Forbes et al. (2015). To address this issue, research has focused on adaptive MPC schemes where the identification of the model is performed online together with the computation of the input. Since excitation is not explicitly enforced, such approaches are often referred to as passive-learning controllers, Mesbah (2018). One of the main drawbacks of passive-learning approaches is that newly generated data might not be informative (for example, when the system reaches a steady state), and therefore an improvement in the model estimate is not guaranteed. This issue is addressed in active-learning approaches where a form of excitation is explicitly induced, often by incorporating a learning cost into the MPC cost function, Tanaskovic et al. (2019), Soloperto et al. (2019a). Even though excitation is beneficial for model adaption, it can be counterproductive in terms of stability. Motivated by this, we analyze the stability properties of an adaptive MPC scheme. © R. Zuliani, R. Soloperto & J. Lygeros." 2312.11352v1,"1 Safety verification of Neural-Network-based controllers: a set invariance approach Louis Jouret, Adnane Saoud and Sorin Olaru Abstract—This paper presents a novel approach to ensure the safety of continuous-time linear dynamical systems controlled by a neural network (NN) based state-feedback. Our method capitalizes on the use of continuous piece-wise affine (PWA) activation functions (e.g. ReLU) which render the NN a PWA continuous function. By computing the affine regions of the latter and applying Nagumo’s theorem, a subset of boundary points can effectively verify the invariance of a potentially non-convex set. Consequently, an algorithm that partitions the state space in affine regions is proposed. The scalability of our approach is thoroughly analyzed, and extensive tests are conducted to validate its effectiveness. I. I NTRODUCTION Machine learning, particularly NNs, has had a transformative impact on various scientific fields, including control systems. Two main approaches have emerged: the first involves approximating a complex control law such as Model Predictive Control (MPC) using a NN [1], making the controller more memory efficient and enabling faster computations. The second approach entails synthesizing a NN controller through reinforcement learning, which has gained popularity due to its capability to learn intricate control strategies from data generated by the system [2]. However, when applying a NN to safety-critical systems [3], there is often skepticism and valid concerns regarding their black box nature and the inherent difficulty in interpreting their behavior. In control systems, safety refers to the property of a system remaining in a set of safe states for all future time instances. NNs, characterized by their numerous neurons and nonlinear activation functions, present computational challenges in explicitly representing the inputoutput relationship. This complexity hampers the ability to interpret the actions taken by a NN-controller and verify its safe operation. Extensive research has been conducted to address this issue using different approaches. One approach involves estimating the reachable set of the NN-controlled system [4, 5, 6]. However, existing reachability-based approaches are limited to discrete-time systems and finite time safety, while in the present work we are dealing with continuous-time systems and infinite-time safety properties. Another approach focuses on finding a barrier certificate [7, 8] for the closed-loop system. The main challenge lies in computing the barrier certificate. This work is supported by the ANR PIA funding: ANR-20-IDEES-0002. Louis Jouret is with Swiss Federal School of Technology in Lausanne- EPFL, Switzerland, louis.jouret@epfl.ch Adnane Saoud is with the College of Computing, University Mohammed VI Polytechnic, Benguerir, Morocco adnane.saoud@um6p.ma Sorin Olaru is with CentraleSupelec, University Paris-Saclay, Gif-sur- Yvette, France, sorin.olaru@centralesupelec.fr Digital Object Identifier (DOI): 10.1109/LCSYS.2023.3342088 Recent advancements involve training a separate NN that acts as barrier certificates to the closed-loop system [7, 8]. This approach leverages the universal approximation capabilities of the NN, enabling them to estimate a barrier certificate if one exists. Nevertheless, a notable limitation of this method is its lack of completeness. In other words, if the process fails to identify a barrier certificate, it remains uncertain whether the failure stems from an inability to discover the correct certificate or the absence of a valid certificate altogether. This paper presents a novel approach to ensure safety of linear dynamical systems controlled by a NN. The method revolves around Nagumo’s condition, which states that a set is invariant if the vector field at every point on the boundary points back inside the set [9]. By utilizing continuous PWA activation functions within the NN, like ReLU , the output of the latter can be explicitly expressed as a continuous composite PWA function. Nagumo’s condition is then used for the invariance of linear systems controlled by PWA controllers within a polytopic set. Consequently, the verification of a small subset of boundary points is sufficient to prove the set’s invariance. Although the number of regions within which the PWA controller is affine increases non-polynomially with the number of neurons [10], the advantage of the present approach relies on the fact that the calculations are limited to the regions connected to the set’s boundaries. To this end, an algorithm that leverages the automatic differentiation [11] offered by modern deep-learning libraries like PyTorch [12] is described and analysed. Section II-A introduces the class of systems and NN considered in the paper. In Section III, the condition to guarantee the safety of the considered system is presented. Section IV proposes an algorithmic procedure to apply the presented method. Finally, Section V focuses on the scalability of the proposed approach. Notation: R and R + 0 are the set of reals and of non-negative reals, respectively. Given a set O ⊂ R n , its border set is denoted ∂O. For a matrix M , we denote M i,j the element in the i th row and j th column and M i,∗ the i th row vector. The matrix diag(v) designates a diagonal matrix having the scalars v i ∈ R on its diagonal. For v, w ∈ R n , we write v ≼ w the element-wise inequality of two vectors such that v i ≤ w i , ∀i. To represent the multiplication of multiple matrices, denoted ↶ n Q as M 1 , M 2 , . . . , M n , we introduce the notation k=1 M k . In this notation, the left arrow signifies that the matrices are multiplied from right to left, starting with M n and ending with M 1 , resulting in the final matrix product. Considering a NN with L hidden layers and N neurons per hidden layer, we denote n in , n out and n in × N (L) × n out the network’s input dimension, output dimension and architecture respectively. ©2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works." 2312.11356v1,"The full version of this paper appeared in proceedings of ECAI 2023 The Problem of Coherence in Natural Language Explanations of Recommendations Jakub Raczyński a , Mateusz Lango a,b; * and Jerzy Stefanowski a a Poznan University of Technology, Faculty of Computing and Telecommunications, Poznan, Poland b Charles University, Faculty of Mathematics and Physics, Prague, Czech Republic ORCiD ID: Mateusz Lango https://orcid.org/0000-0003-2881-5642, Jerzy Stefanowski https://orcid.org/0000-0002-4949-8271 Abstract. Providing natural language explanations for recommendations is particularly useful from the perspective of a non-expert user. Although several methods for providing such explanations have recently been proposed, we argue that an important aspect of explanation quality has been overlooked in their experimental evaluation. Specifically, the coherence between generated text and predicted rating, which is a necessary condition for an explanation to be useful, is not properly captured by currently used evaluation measures. In this paper, we highlight the issue of explanation and prediction coherence by 1) presenting results from a manual verification of explanations generated by one of the state-of-the-art approaches 2) proposing a method of automatic coherence evaluation 3) introducing a new transformer-based method that aims to produce more coherent explanations than the state-of-the-art approaches 4) performing an experimental evaluation which demonstrates that this method significantly improves the explanation coherence without affecting the other aspects of recommendation performance. 1 Introduction With the recent development of artificial intelligence comes a growing awareness of the risks involved and the need for greater control over such systems. In particular, the inability to explain the predictions of complex machine learning systems (usually treated as black boxes) is detrimental because it complicates debugging, hinders bias identification, prevents users from gaining trust in AI, etc. [19]. The interest in explainable AI also includes recommendation systems, since providing good explanations for the recommendations can increase their effectiveness and improve the satisfaction of users by allowing them to better understand the system’s predictions [27]. Among the various approaches to this task, generating explanations in natural language is of particular interest, as such explanations are easier for the user to understand, require little or no prior user training, and can be potentially used to support a dialogue with the user. Modern approaches for this kind of explainable recommendation increasingly use deep neural models, as they produce richer and more fluent textual explanations than the earlier methods based on predefined sentence templates [27]. Many works [9, 8, 10] evaluate ∗ Corresponding Author. Email: mlango@cs.put.poznan.pl. new explainable recommendation methods in a rather comprehensive way, taking into account more than a dozen of performance aspects such as recommendation quality, text fluency, and personalization of the explanation provided to a given user. Nevertheless, these studies rely exclusively on automatic evaluation metrics such as BLEU [17] or ROUGE [13] and do not include evaluation by human users. This motivated us to carry out a preliminary study 1 in which we manually analysed a small random sample of explanations provided by one of the recently proposed state-of-the-art approaches, PE- TER+ [9]. As to be expected, some flaws were observed in terms of text fluency such as repetition of the same words, unnatural sentence endings, or generations of sentences that lacked the context to be understood. However, the most frequently observed critical problem was the inconsistency between the recommender’s prediction and the text of the generated explanation (see Fig. 1). For instance, the text the characterizations are very good surprisingly was sometimes provided as an explanation for the lowest rating. In fact, for some datasets such inconsistent explanations occurred even for 40% of analyzed instances (see Sec. 5.3). Note that some of the aforementioned problems regarding text quality can be tackled by using more advanced natural language generation (NLG) methods (e.g. other decoding algorithms [21]), but the critical issue of lack of coherence between textual explanation and prediction is inherent to the problem of prediction explainability and can not be solved with standard NLG methods. Therefore, despite the use of a wide range of performance measures in related studies, this critical factor concerning the quality of the generated explanations has not yet been sufficiently explored. The issue is further illustrated by the example presented in Fig. 2, where two explanations are provided for the same, low assessment of the alignment between a movie and user’s preferences. The first textual explanation describes the film in glowing terms and actually suggests watching it, which is inconsistent with the predicted low rating and possibly causes user confusion. The second explanation is coherent with the predicted rating and expresses a negative assessment of the movie. It is worth noting that the otherwise perfect textual explanations which do not match the predicted outcome are not only entirely incorrect but also undermine the trust of the user in using 1 See the online appendix for details: https://www.cs.put.poznan.pl/mlango/ publications/ecai23.pdf" 2312.11384v1,"DiffTune-MPC: Closed-Loop Learning for Model Predictive Control Ran Tao † , Sheng Cheng † , Xiaofeng Wang, Shenlong Wang, Naira Hovakimyan 2. Difference between the cost function for MPC and loss function for MPC’s performance: The cost function in MPC reflects the predictive cost in an open-loop fashion: at each sample time, an MPC is solved for a sequence of control actions into a future horizon, where all – except for the first control actions – are open-loop and not applied for controlling the system. On the contrary, the loss function is for evaluating the performance of the MPC as a function of the closed-loop states (and control actions). In practice, the relationship between the cost function parameters and the performance judged by the loss function is complex and nonlinear. Furthermore, the loss function can be defined over a long horizon specified by an arbitrary task, whereas the cost in MPC is defined over a shorter horizon to enable real-time solutions. To address the challenges in the manual tuning of MPC’s cost function, we propose to learn the cost function’s parameters for a given task using DiffTune [1], an auto-tuning method for closed-loop control systems. DiffTune formulates the auto-tuning problem as a parameter optimization problem that can handle different horizons in the loss function (for performance) and cost function (for control). It has been previously demonstrated on explicitly differentiable controllers whose Jacobian can be conveniently obtained by autodifferentiation. In this work, we extend DiffTune to implicitly differentiable MPC controllers. The analytical gradients of the MPC policy are obtained by the implicit differentiation proposed in [2], which is based on the implicit function theorem and Karush–Kuhn–Tucker (KKT) conditions. We first show how to differentiate a linear MPC problem (with quadratic cost, linear dynamics, and linear inequality constraints) by solving an auxiliary linear MPC. Then, we extend it to a nonlinear MPC and show how to differentiate it utilizing the auxiliary MPC. We validate our approach in simulations, where we show the efficacy of DiffTune for MPC subject to both linear and nonlinear dynamical systems and compare our closed-loop learning to an existing open-loop learning scheme. We summarize our contributions as follows: 1. We propose a novel closed-loop learning scheme for MPC controllers, where the horizon for performance evaluation of an arbitrary task (using a loss function) is typically longer than MPC’s planning horizon (capped for real-time solution). Our formulation allows for a flexible learning scheme where the two horizons can differ. This is a significant improvement compared to the existing open-loop MPC learning schemes [2], [3], where the horizon of the loss function must be shorter than or equal to the MPC’s horizon due to the open-loop design. Abstract— Model predictive control (MPC) has been applied to many platforms in robotics and autonomous systems for its capability to predict a system’s future behavior while incorporating constraints that a system may have. To enhance the performance of a system with an MPC controller, one can manually tune the MPC’s cost function. However, it can be challenging due to the possibly high dimension of the parameter space as well as the potential difference between the open-loop cost function in MPC and the overall closed-loop performance metric function. This paper presents DiffTune-MPC, a novel learning method, to learn the cost function of an MPC in a closed-loop manner. The proposed framework is compatible with the scenario where the time interval for performance evaluation and MPC’s planning horizon have different lengths. We show the auxiliary problem whose solution admits the analytical gradients of MPC and discuss its variations in different MPC settings. Simulation results demonstrate the capability of DiffTune-MPC and illustrate the influence of constraints (from actuation limits) on learning. I. I NTRODUCTION With the advancement of computational power in embedded systems and the development of general-purpose solvers (e.g., acados, ACADO, CasADi), Model Predictive Control (MPC) is being applied to more and more platforms in robotics and autonomous systems. Effective implementation of MPC requires a well-designed cost function, a dynamical model with appropriate fidelity, realistic constraints accounting for the physical limits of the system, and sufficient computation power for real-time solutions of the MPC. When an MPC is applied for different tasks, one may need to design the cost function for each task to suit its individual characteristics (e.g., trajectory tracking tasks for hover or aggressive maneuvers for quadrotors). A common approach is to tune the parameters in a cost function with a given structure, e.g., with weight matrices Q and R following the convention in a linear quadratic regulator (LQR). The challenges in manually tuning the Q and R matrices come from the following two aspects: 1. Dimension: In the simplest case where Q and R are reduced to diagonal matrices, the parameter space’s dimension equals the sum of the state’s and control’s dimensions, making manual tuning a challenging task, especially when the state is high-dimensional (≥ 12 for 3D rigid-body dynamics). *This work is supported by NASA cooperative agreement (80NSSC22M0070), NASA ULI (80NSSC22M0070), AFOSR (FA9550- 21-1-0411), NSF-AoF Robust Intelligence (2133656), and NSF SLES (2331878, 2331879). † These authors contributed equally to this work. R. Tao, S. Cheng, S. Wang, and N. Hovakimyan are with the University of Illinois Urbana-Champaign, USA. ( email: {rant3, chengs, shenlong, nhovakim}@illinois.edu ) X. Wang is with the University of South Carolina, USA. ( email: wangxi@cec.sc.edu ) 1" 2312.11387v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Data-Driven Continuous-Time Framework for Frequency-Constrained Unit Commitment Mohammad Rajabdorri, Enrique Lobato, Lukas Sigrist, Fellow, IEEE, and Jamshid Aghaei, Senior Member, IEEE Abstract—The conventional approach to solving the unit commitment problem involves discrete intervals at an hourly scale, particularly when integrating frequency dynamics to formulate a frequency-constrained unit commitment. To overcome this limitation, a novel continuous-time frequency-constrained unit commitment framework is proposed in this paper. In this approach, Bernstein polynomials represent continuous variables in the unit commitment problem and enable the calculation of frequency response-related metrics such as the rate of change of frequency, quasi-steady-state frequency, and frequency nadir. Notably, startup and shut-down trajectories are meticulously considered, transforming the formulation into a fully continuoustime model and simplifying constraints related to variable continuity. To address the complexities associated with integrating the obtained non-linear frequency nadir constraint into a mixedinteger linear problem, an alternative data-driven frequency nadir constraint is proposed, which accurately constrains frequency nadir deviations throughout the time interval. To validate the proposed model, it is applied to the real-life network of the Spanish Island of La Palma. The results demonstrate the effectiveness of the proposed formulation, indicating that the model is solved timely while mitigating the impact of intra-hour real-time power fluctuations on system frequency. Index Terms—Frequency-constrained unit commitment, continuous-time formulation, data-driven frequency nadir. CFCUC CUC FCUC ISO MILP RES RoCoF SD SU UC A CRONYMS Continuous-time Frequency Constrained Unit Commitment Continuous-time Unit Commitment Frequency Constrained Unit Commitment Independent System Operator Mixed Integer Linear Programming Renewable Energy Sources Rate of Change of Frequency Shut-Down Start-Up Unit Commitment N OMENCLATURE Bernstein Polynomials: β b,n (τ ) Bernstein basis function τ time variable b index of the Bernstein coefficient [∈ {0, . . . , n−1}] f (τ ) a function of τ Mohammad Rajabdorri, Enrique Lobato, and Lukas Sigrist are with the Instituto de Investigación Tecnológica (IIT), Escuela Técnica Superior de Ingenierı́a (ICAI), Universidad Pontificia Comillas de Madrid, 28015 Madrid, Spain (e-mail: mrajabdorri@comillas.edu). Jamshid Aghaei is with the School of Engineering and Technology, Central Queensland University (CQU), Rockhampton 4701, QLD, Australia (e-mail: j.aghaei@cqu.edu.au). n degree of Bernstein polynomial ′ f B n (τ ) differential of Bernstein polynomial B n f (τ ) bernstein polynomial of order n for function f C b f bth Bernstein coeffiecient to represent f CUC: I set of all generators D Demand P i maximum power output of generator i [MW] R i maximum ramp-up of generator i [MW/h] P i minimum power output of generator i [MW] R i maximum ramp-down of generator i [MW/h] DT minimum down-time of generators [hours] gc(.) generation costs [ke] i index of generators p ′ differential of power [MW/s] p power generation variable [MW] r online reserve power variable [MW] s alias index for time intervals sg solar generation variable [MW] suc(.) start-up costs [ke] T set of all time intervals t index of time intervals u i commitment variable [∈ {0, 1} UT minimum up-time of generators [hours] v i start-up variable [∈ {0, 1} w i shut-down variable [∈ {0, 1} wg wind generation variable [MW] MILP CUC: β vector of Bernstein basis functions D vector of load coefficients P vector of power coefficients P curt vector of curtailment coefficients P RES vector of RES coefficients SD i T shut-down time duration of unit i [h] SU i T tart-up time duration of unit i [h] C b,t,i bth Benstein coefficient at time t of unit i CFCUC: α coefficients in the linear model R vector of reserve coefficients ss ∆f crit critical steady-state frequency [Hz] ′ ∆f crit critical RoCoF [Hz/s] ℓ index of the lost unit D load damping factor [%/Hz] f nadir frequncy nadir [Hz] f 0 nominal frequency [Hz] H ℓ available weighted inertia after outage of ℓ [MW.s] T g delivery time of the units [s]" 2312.11399v1,"News Signals: An NLP Library for Text and Time Series Chris Hokamp* and Demian Gholipour Ghalandari* and Parsa Ghaffari Quantexa @quantexa.com Abstract We present an open-source Python library for building and using datasets where inputs are clusters of textual data, and outputs are sequences of real values representing one or more time series signals. The news-signals library supports diverse data science and NLP problem settings related to the prediction of time series behaviour using textual data feeds. For example, in the news domain, inputs are document clusters corresponding to daily news articles about a particular entity, and targets are explicitly associated real-valued time series: the volume of news about a particular person or company, or the number of pageviews of specific Wikimedia pages. Despite many industry and research use cases for this class of problem settings, to the best of our knowledge, News Signals is the only open-source library designed specifically to facilitate data science and research settings with natural language inputs and time series targets. In addition to the core codebase for building and interacting with datasets, we also conduct a suite of experiments using several popular Machine Learning libraries, which are used to establish baselines for time series anomaly prediction using textual inputs. 1 Figure 1: News Signals Datasets: clusters of documents, bucketed by time period, are associated with time series signals. ML models can be trained to predict time series signals using the textual data. Arno et al., 2022; Li et al., 2014; Bing et al., 2014; Kim et al., 2016; Wang and Luo, 2021), inter alia, the NLP research community has generally not focused on tasks with textual inputs and time series outputs. This is confirmed by the lack of any popular NLP tasks related to time series in resulttracking projects such as nlp-progress 1 and paperswith-code 2 . We believe there is potential for novel, impactful research into tasks beyond market signal forecasting, in which textual inputs and real-valued output signals are explicitly organized along a time dimension with fixed-length ""ticks"". Two reasons for the lack of attention to such tasks to date may be: Introduction The natural ordering of many types of data along a time dimension is a consequence of the known physics of our universe. Real-world applications of machine learning often involve data with implicit or explicit temporal ordering. Examples include weather forecasting, market prediction, self-driving cars, and language modeling. A large body of work on time series forecasting studies models which consume and predict real-valued target signals that are explicitly ordered in time; however, aside from some existing work mainly related to market signal prediction using social media (Chen et al., 2021, 2022; * equal contribution 1. researchers do not have access to canonical NLP datasets for time series forecasting. 2. data scientists are missing a high level software library for NLP datasets with time series. Examples of tasks where natural language input can be used to predict a time series signal include: • weather or pandemic forecasting using social media posts from a recent time period, • market signal prediction using newsfeeds or bespoke textual data feeds, 1 2 https://nlpprogress.com/ https://paperswithcode.com/" 2312.11407v1,"Astronomy & Astrophysics manuscript no. draft_vh_paperI December 19, 2023 ©ESO 2023 Precise Fourier parameters of Cepheid Radial Velocity Curves ⋆ V. Hocdé 1 , P. Moskalik 1 , N. A. Gorynya 2, 3 , R. Smolec 1 , R. Singh Rathour 1 , and O. Ziółkowska 1 1 Nicolaus Copernicus Astronomical Centre, Polish Academy of Sciences, Bartycka 18, 00-716 Warszawa, Poland email : vhocde@camk.edu.pl 2 Sternberg Astronomical Institute, Moscow State University, 119234, Moscow, Russia 3 Institute of Astronomy, Russian Academy of Sciences, 119017, Moscow, Russia Received ... ; accepted ... ABSTRACT Context. Radial velocity (RV) curves of Classical Cepheids are indispensable in studying resonances between their pulsation modes. They allow precise determination of the resonant periods, which in turn helps to constrain fundamental parameters of these stars. The RV curves of Cepheids are also needed to identify their pulsation modes, which is essential for accurate calibration of the Cepheid period-luminosity (PL) relation. Finally, RV curves are necessary for the distance determination with the parallax-of-pulsation method. Aims. The primary goal of this paper is to derive precise Fourier parameters of the radial velocity (RV) curves for fundamental and first-overtone Galactic Cepheids. The secondary objectives are then to analyze progression of the Fourier parameters up to the 7th harmonic as well as to propose identification of the pulsation modes of the stars. Methods. For each star, we carefully selected RV measurements available in the literature which yield the highest precision of Fourier parameters according to the procedure that follows. We performed a Fourier decomposition of the RV curves using unweighted leastsquare method. We corrected for zero-point differences between data sets. We subtracted RV modulations caused by binary motion and have removed other residual trends. Uncertainty of Fourier parameters are derived using the covariance matrix. Finally, we have displayed and analyzed qualitatively the progressions found for low- and for high-order Fourier parameters. We applied a standard identification of their pulsation mode based on their Fourier phase difference ϕ 21 . Results. We more than doubled the number of Cepheids with published Fourier parameters of their RV curves, determined together with their uncertainties. Our sample includes 178 fundamental-mode and 33 first overtone pulsators, as well as 7 additional Cepheids whose pulsation mode is uncertain or undetermined according to our criteria. For the fundamental-mode Cepheids, the precision of the obtained low-order Fourier phases is about 7 times better and of the low-order Fourier amplitude ratios about 25% better as compared to precision achieved in previously published Fourier parameter surveys. The precision of the first-overtone Fourier parameters is improved by about 50%. With highly accurate RV Fourier phases ϕ 21 , we are able to firmly identify V495 Cyg as a new first-overtone Cepheid. We confirm first-overtone nature of several other stars, tentatively identified as such with the shape of their lightcurves. We also show that α UMi should be definitely classified as a first-overtone pulsator. In 3 objects (VY Per, AQ Pup and QZ Nor) we found significant γ-velocity variations that we attribute to spectroscopic binarity after careful analysis RV measurements of these stars. Finally, the analysis of the fundamental mode Fourier parameters up to 7th order reveals very tight progression of Fourier phases for all pulsation periods. They are also tightly correlated with each other. For P < 10 day we find a very well defined upper limit for the Fourier amplitude A 1 . Conclusions. We have provided new precise Fourier parameters of Cepheid velocity curves, determined from RV measurements available in the literature together with unpublished data. The pulsation period coverage and the precision obtained, in particular for Fourier phase ϕ 21 , will be useful for studying the dynamics of Cepheid pulsations with the help of hydrodynamical models. Further radial velocity measurements from modern high-resolution spectroscopic instruments will be important to improve these results. Key words. Techniques : Observational– Radial velocities - stars: variables: Cepheids 1. Introduction The shape of the radial velocity (RV) curve of Cepheids provides information on their stellar structure and dynamic. In the case of fundamental Cepheid light curves, Ludendorff (1919); Hertzsprung (1926) noticed that their shape varies systematically with the pulsation period. A secondary bump superimposed on the light curve appears first on its descending branch at a period of about P ≃ 6 day. With increasing period, it moves toward maximum light, reaches the top at P ≃ 10 day and then moves down the ascending branch at periods P > 10 day. This systematic behavior is called the Hertzsprung progression or bump ⋆ Full Tables A, C.1, C.2, C.3, C.4 and C.5 are only available at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsarc.u-strasbg.fr/viz-bin/cat/J/A+A/ progression, and was later verified among Cepheids in the Magellanic Clouds and Andromeda Galaxy (Parenago & Kukarkin 1936; Shapley & McKibben 1940; Payne-Gaposchkin 1947). Similar bump progression is observed for the RV curves (Joy 1937; Ledoux & Walraven 1958; Simon & Teays 1983; Kovács et al. 1990; Gorynya 1998; Moskalik et al. 2000). The bump progression was first assumed to be caused by a pressure wave which propagates inward and reflects on the stellar core, then travels back to reach the surface and produces the observed bump (also known as the echo model, Whitney 1956; Christy 1968, 1975). Following hydrodynamical models of Stobie (1969), Simon & Schmidt (1976) conjectured that the bump progression is due to the P 2 /P 0 = 0.5 resonance between the fundamental and the second overtone pulsation modes characterized by a pulsation period of P 0 and P 2 respectively. Subsequently, Article number, page 1 of 36" 2312.11413v1,"DeRDaVa: Deletion-Robust Data Valuation for Machine Learning Xiao Tian 1,2 , Rachael Hwee Ling Sim 1 , Jue Fan 1,2 , Bryan Kian Hsiang Low 1 1 Department of Computer Science, National University of Singapore 2 Department of Mathematics, National University of Singapore {xiao.tian, rachael.sim, jue.fan}@u.nus.edu, lowkh@comp.nus.edu.sg Abstract Data valuation is concerned with determining a fair valuation of data from data sources to compensate them or to identify training examples that are the most or least useful for predictions. With the rising interest in personal data ownership and data protection regulations, model owners will likely have to fulfil more data deletion requests. This raises issues that have not been addressed by existing works: Are the data valuation scores still fair with deletions? Must the scores be expensively recomputed? The answer is no. To avoid recomputations, we propose using our data valuation framework DeRDaVa upfront for valuing each data source’s contribution to preserving robust model performance after anticipated data deletions. DeRDaVa can be efficiently approximated and will assign higher values to data that are more useful or less likely to be deleted. We further generalize DeRDaVa to Risk-DeRDaVa to cater to risk-averse/seeking model owners who are concerned with the worst/best-cases model utility. We also empirically demonstrate the practicality of our solutions. 1 Introduction Data is essential to building machine learning (ML) models with high predictive performance and model utility. Model owners source for data directly from their customers or from collaborators in collaborative machine learning (Nguyen et al. 2022a). For example, a credit card company can train an accurate ML model to predict the probability of default based on consumers’ income and payment history data (Tsai and Chen 2010). As another example, a healthcare firm can train an ML model to predict the progression of diabetes based on patients’ health data (TCFOD 2019). As the quality of data contributed by multiple data sources may vary widely, several works (Fan et al. 2022; Tay et al. 2022; Xu et al. 2021) have recognized the importance of data valuation to help model owners compensate data sources fairly, or identify data that are most or least useful for predictions. Data valuation studies how much data is worth and proposes how rewards associated with the ML model can be fairly allocated to each data source (Sim, Xu, and Low 2022). Several existing data valuation techniques (Ghorbani and Zou 2019; Jia et al. 2019; Yang et al. 2019) have adopted Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Comparison of Data Shapley vs. the deletionrobustified DeRDaVa and Risk-DeRDaVa scores with Shapley prior for a game with 2 interchangeable sources. ⋆ and ■ stay with probability 1 and .7 respectively. ⋆ and ■ have equal Data Shapley score but ⋆ has higher DeRDaVa and Risk-averse DeRDaVa scores. This is because Data Shapley (Eq. (1)) considers only the initial support set {⋆, ■} while DeRDaVa (Eq. (8)) and Risk-averse DeRDaVa (Eq. (10)) also consider the worst-case support set {⋆}. Further explanation is included in App. A.1. the use of semivalues from cooperative game theory. Recent works (Sim et al. 2020; Tay et al. 2022; Zhang, Wu, and Pan 2021) have also developed various reward allocation schemes based on semivalues. The core intuition behind semivalues is that a data source should be fairly valued relative to other data sources (i.e., based on the averaged model utility improvement it contributes to each sub-coalition of other data sources). Moreover, these works have justified the use of semivalues by fairness axioms such as Interchangeability — assigning the same valuation score to two data sources d i and d j with the same model utility improvement to every sub-coalition (e.g., ⋆ and ■ in Fig. 1). Data deletion refers to the deletion of data and their impact from trained ML models. Due to the recent introduction of data protection legislation, such as General Data Protection Regulation (GDPR) in the European Union and California Consumer Privacy Act (CCPA) in the United States, data deletions are expected to occur more frequently. These laws legally assert that data are properties of their owners and data" 2312.11442v1,"Explore 3D Dance Generation via Reward Model from Automatically-Ranked Demonstrations Zilin Wang 1 * , Haolin Zhuang 1 * , Lu Li 1 * , Yinmin Zhang 2 , Junjie Zhong 3 , Jun Chen 1 , Yu Yang 1 , Boshi Tang 1 , Zhiyong Wu 1† 1 Shenzhen International Graduate School, Tsinghua University 2 University of Sydney, 3 Waseda University {wangzl21, zhuanghl21, lilu21}@mails.tsinghua.edu.cn, yinmin.zhang@sydney.edu.au, junjiezhong@ruri.waseda.jp {y-chen21, yy20, tbs22}@mails.tsinghua.edu.cn, zywu@sz.tsinghua.edu.cn Abstract This paper presents an Exploratory 3D Dance generation framework, E3D2, designed to address the exploration capability deficiency in existing music-conditioned 3D dance generation models. Current models often generate monotonous and simplistic dance sequences that misalign with human preferences because they lack exploration capabilities. The E3D2 framework involves a reward model trained from automatically-ranked dance demonstrations, which then guides the reinforcement learning process. This approach encourages the agent to explore and generate high quality and diverse dance movement sequences. The soundness of the reward model is both theoretically and experimentally validated. Empirical experiments demonstrate the effectiveness of E3D2 on the AIST++ dataset. Project Page: https://sites.google.com/view/e3d2. Introduction Music-conditioned 3D dance generation is an emerging field that combines the art of dance and the science of machine learning, fostering a novel and creative fusion. By utilizing music as a guiding condition, dance generative models create dance poses synchronized with the melody and rhythm of the music. Several studies (Huang et al. 2021, 2022; Li et al. 2021; Siyao et al. 2022) utilize generative networks to autoregressively generate dance sequences in supervised learning, with music as the condition and human dance poses as the supervisory signal. These approaches are capable of producing complete dance movements, as significant advancements in the field of dance generation. Nevertheless, we observe that supervised learning approaches often exhibit the following three shortcomings: (1) Weak generalization for unseen music, which affects diversity and quality, (2) Fragility of auto-regressive models, which are prone to severe compounding rollout errors, particularly when data is scarce, leading to the potential collapse of the dance sequence, and (3) Misalignment between generated dances and human preferences, which stems from * These authors contributed equally. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. the excessive focus on mimicking human movements without considering human preferences (e.g., movement difficulty and aesthetic appeal). Inspired by the learning process of human dancers, novice dancers not only require the mechanical imitation of movements from dance experts but also continuous practice and exploration to develop their skills. Furthermore, receiving feedback from experts plays a crucial role in reinforcing their movements, ultimately helping them become proficient dancers. In this work, we argue that the aforementioned three issues arise from the lack of exploration capacity in current dance generation models. We expect trained dance agents to explore various movements within the dance space while receiving accurate signals indicating which movements are desirable, thereby increasing the probability of generating such movements. Based on this assumption, we propose the Exploratory 3D Dance generation framework, E3D2, to address the issue of exploration. To achieve this, we model the music-conditioned dance generation task as a Markov Decision Process (MDP) and employ Reinforcement Learning (RL) to endow the dance agent with the ability to explore. For the reward signal, we utilize Inverse Reinforcement Learning (IRL) to train a Reward Model (RM) from automatically ranked dance demonstrations, which guides the exploration and exploitation of the dance agent. As shown in Figure 2, we firstly use Behavior Cloning (Michie, Bain, and Hayes-Miches 1990) to train an initial dance generation policy, allowing the agent to learn basic dance movements. Then, we inject increasing levels of noise into multiple cloned initial dance generation policies to acquire multiple policies with decreasing performance, generating different quality dance demonstrations. Next, we train a reward model with these automatically ranked dance demonstrations. Finally, under the guidance of the learned reward model, we encourage the dance agent to explore using reinforcement learning, ultimately obtaining the optimal dance generation policy. Our design enables the dance policy to address the above issues through exploration: (1) To tackle the limited diversity of generated dances, reinforcement learning encourages the dance agent to efficiently explore a broader range of state-action pairs, where new movements emerge naturally, either by combining the sub-actions from various human" 2312.11462v1,"Cascade Speculative Drafting for Even Faster LLM Inference Ziyi Chen 1 Xiaocong Yang 1 Jiacheng Lin 1 Chenkai Sun 1 Jie Huang 1 Kevin Chen-Chuan Chang 1 Acceptance rate of draft tokens on GSM8k dataset 0.8 Speculative decoding enhances the efficiency of large language models (LLMs) by leveraging a draft model to draft for a larger target model to review. However, drafting in speculative decoding involves slow autoregressive generation and generating tokens of different importance with the same time allocation. These two inefficiencies lead to its suboptimal performance. To address this issue, we introduce Cascade Speculative Drafting (CS. Drafting), a novel approach that employs two types of cascades. The Vertical Cascade eliminates autoregressive generation from neural models. The Horizontal Cascade constitutes efficient time allocation in drafting with its optimality supported by our theoretical analysis. Combining both cascades, our CS. Drafting algorithm has achieved up to 72 percent additional speedup over speculative decoding in our experiments while keeping the same output distribution. FLAN-T5-small FLAN-T5-base FLAN-T5-large 0.7 0.6 Acceptance rate Abstract 0.5 0.4 0.3 0.2 0.1 0 5 10 15 Token position 20 25 30 Figure 1. In a single step of speculative decoding, the figure shows the probability of acceptance of draft tokens by their positions on GSM8K datasets, evaluated on FLAN-T5- SMALL , BASE and LARGE models. The draft model generates 30 tokens at each step. 1. Introduction one token at each run. The challenge is especially great during applications such as chatbots or virtual assistants due to the long generation of hundreds or even thousands of tokens. An emerging solution, known as speculative decoding (Leviathan et al., 2023; Chen et al., 2023), shows potential to mitigate this issue. In speculative decoding, a draft model (which is smaller and faster) generates k tokens in each step(with k being a hyperparameter), and these tokens are then reviewed by a target model (which is larger and slower) in parallel. The target model will accept any tokens aligned with its output and further generate one token; the process happens all in a single run while maintaining the output distribution identical to the autoregressive one by the target model itself. As a larger number of expected accepted tokens per run indicates fewer target model runs, the efficiency of speculative decoding can be attributed to two factors: the expected number of tokens accepted by the target model per run, and the autoregressive efficiency of the draft model. The advent of Large Language Models (LLMs) like GPT-4 (OpenAI, 2023) has marked a significant milestone in the field of natural language processing (NLP). These models have not only excelled in various NLP tasks but also found widespread application in user-interactive settings such as chatbots and virtual assistants. This application involves an extremely high number of users of up to hundreds of millions daily. To service in real-time at this scale, a low latency system is not only cost-saving but also crucial for keeping the service running. In addition, the sheer scale of the service making even a slight improvement over the latency of LLMs can contribute greatly to the community. Consequently, optimizing LLM latency has become a crucial and impactful research focus. Unfortunately, LLMs currently suffer from high latency especially for long-form generation as LLM can only generate 1 Department of Computer Science, University of Illinois, Urbana Champaign. Correspondence to: Kevin Chen-Chuan Chang . Herein lies a trade-off: employing a larger draft model or generating more draft tokens per target run will improve the expected number of accepted tokens. However, either Work in progress. 1" 2312.11463v1,"Appearance-based Refinement for Object-Centric Motion Segmentation Junyu Xie 1 Weidi Xie 1,2 1 Visual Geometry Group, University of Oxford Andrew Zisserman 1 2 CMIC, Shanghai Jiao Tong University {jyx,weidi,az}@robots.ox.ac.uk Abstract Stage I Flow-based Proposals Flow The goal of this paper is to discover, segment, and track independently moving objects in complex visual scenes. Previous approaches have explored the use of optical flow for motion segmentation, leading to imperfect predictions due to partial motion, background distraction, and object articulations and interactions. To address this issue, we introduce an appearance-based refinement method that leverages temporal consistency in video streams to correct inaccurate flow-based proposals. Our approach involves a simple selection mechanism that identifies accurate flow-predicted masks as exemplars, and an object-centric architecture that refines problematic masks based on exemplar information. The model is pre-trained on synthetic data and then adapted to real-world videos in a self-supervised manner, eliminating the need for human annotations. Its performance is evaluated on multiple video segmentation benchmarks, including DAVIS, YouTubeVOS, SegTrackv2, and FBMS-59. We achieve competitive performance on single-object segmentation, while significantly outperforming existing models on the more challenging problem of multi-object segmentation. Finally, we investigate the benefits of using our model as a prompt for a per-frame Segment Anything Model. OCLR-flow model Flow-pred. masks ... ... Stage II Appearance-based Refinement RGB Mask selector Mask corrector ... Exemplar mask(s) ... Refined masks ... Figure 1. Overview of our multi-object motion segmentation method. The method starts with proposing object masks based on optical flow inputs (i.e., flow-based proposals), followed by an appearance-based refinement of flow-predicted masks. The latter stage relies on a selection-correction procedure, where high-quality exemplar masks are selected to guide the refinement of other masks. in some frames (and so no discontinuities), and objects can be articulated, can interact with other objects, and be partly or entirely occluded. Additionally, the background can have distractor motions, which can lead to ambiguous groupings and segmentations. Second, unlike the appearance stream where there is a consistency of texture and colour over the video, video constancy is not guaranteed in flow fields. This makes it challenging to establish long-term correlations and build object permanence, which can be crucial in tracking objects over time. To address the limitations of flow-only object discovery, we draw inspiration from the two-stream hypothesis in neuroscience [24, 60, 70], which suggests that the human visual cortex processes high temporal frequency motion information in the dorsal stream, and slower temporal frequency appearance information in the ventral stream. This two-stream (motion & appearance) approach has been successfully applied to tasks such as action recognition [22, 23, 53, 74] and video object segmentation [20, 48, 59, 97, 98, 100, 103]. In 1. Introduction Given a video of a complex visual scene, we consider the task of discovering, segmenting and tracking the independently moving objects. Recent approaches for this task have built on two key advantages of optical flow inputs [42, 92, 94, 96]. First, segmentation masks can be directly obtained from discontinuities in the flow field; Second, optical flow eliminates the domain gap between synthetic and real videos, making it possible to train models on synthetic sequences and apply them directly to real sequences without incurring a significant Sim2Real penalty. While optical flow has these advantages, there are also some drawbacks to relying solely on flow. First, multi-object motion patterns in real-world videos are complex – they can include objects that have no motion relative to the camera 1" 2312.11495v1,"Collective excitation of bosonic quantum Hall state Moumita Indra ∗ & Sandip Mondal Department of Electrical Engineering, Indian Institute of Technology Bombay, Mumbai 400076, India Abstract The recent developments in the theory of rapidly rotating Bose atoms have been reviewed in this article. Rotation leads to the development of quantized-vortices, that cluster into a vortex array, exactly to how superfluid helium behaves. Theoret- ically, a number of strongly correlated phases are projected to exist in this domain, which might be thought of as bosonic counterparts of fractional quantum Hall effect (FQHE). It is now possible for bosons associating with a short-range interaction to exhibit a FQHE, because the system of neutral bosons in a fast rotating atomic trap is analogous to charged bosons placed in a fictitious magnetic field. The neutral collective spin-conserving and spin-flip excitation for the rotating ultra-cold dilute Bose atoms in the FQHE domain are being discussed. We have introduced a realis- tic interaction between the Bose particles together with long-range interaction and presented a short review article about various fractional quantum Hall states and their spin conserving and spin reversed collective modes. Keywords: Bose–Einstein condensation (BEC); quantized vortices in rotating BEC; Bosonic fractional quantum Hall states; Collective excitations. Orcid ID: 0000-0002-7900-7947 All the correspondence should be addressed to the e-mail: M. Indra (moumitaindra@ee.iitb.ac.in / moumita.indra93@gmail.com) ∗ 1" 2312.11502v1,"L ABRADOR : E XPLORING THE LIMITS OF MASKED LANGUAGE MODELING FOR LABORATORY DATA David R. Bellamy ∗,1,2,3 Bhawesh Kumar 2 Cindy Wang 4 Andrew Beam 1,2 1 2 Harvard Epidemiology Department Harvard Biostatistics Department 3 4 Flagship Labs 97, Inc. Harvard Statistics Department A BSTRACT In this work we introduce L ABRADOR , a pre-trained Transformer model for laboratory data. L ABRADOR and BERT were pre-trained on a corpus of 100 million lab test results from electronic health records (EHRs) and evaluated on various downstream outcome prediction tasks. Both models demonstrate mastery of the pre-training task but neither consistently outperform XGBoost on downstream supervised tasks. Our ablation studies reveal that transfer learning shows limited effectiveness for BERT and achieves marginal success with L ABRADOR . We explore the reasons for the failure of transfer learning and suggest that the data generating process underlying each patient cannot be characterized sufficiently using labs alone, among other factors. We encourage future work to focus on joint modeling of multiple EHR data categories and to include tree-based baselines in their evaluations. 1 I NTRODUCTION In recent years, self-supervised pre-training of masked language models (MLMs) (see Appendix A for background) has demonstrated remarkable success across a wide range of machine learning problems and has led to significant downstream improvements across diverse tasks in natural language processing (Liu et al., 2019; Devlin et al., 2019; Raffel et al., 2020). There is considerable excitement surrounding the potential of large pre-trained MLMs to achieve similar success in medical applications. For instance, existing applications of MLMs in medicine have already yielded promising results in tasks related to medical text understanding (Lee et al., 2020; Alsentzer et al., 2019; Huang et al., 2019; Yang et al., 2019; Beltagy et al., 2019). Despite the success of self-supervised models in certain areas of biomedicine (Palepu & Beam, 2022; Beam et al., 2023; Singhal et al., 2023; Moor et al., 2023; Tiu et al., 2022; Ingraham et al., 2022; Watson et al., 2023; Shay et al., 2023), there has been no previous work on pre-trained models for laboratory measurements. Laboratory data is abundant, routinely collected, less biased compared to other types of data in electronic health records (EHRs) like billing codes (Beam et al., 2021), and directly measure a patient’s physiological state, offering a valuable opportunity for creating a medical foundation model. However, there is a large body of evidence showing that deep learning is consistently outperformed on so-called “tabular” data prediction tasks by traditional machine learning techniques like random forests, XGBoost, and even simple regression models (Bellamy et al., 2020; Finlayson et al., 2023; Sharma, 2013). The reasons for this are only partially understood, but previous work (Grinsztajn et al., 2022) has suggested that this phenomenon may be caused by a rotational invariance in deep learning models that is harmful for tabular data. More broadly, the success of deep learning is thought to be largely due to inductive biases that can be leveraged for images, text, and graphs. These inductive biases are absent or only weakly present in tabular data. Conversely, tree-based methods are scale invariant and robust to uninformative features. In this work, we introduce L ABRADOR , a novel continuous Transformer architecture, which models permutation-invariant data consisting of (integer, float) tuples (Figure 1). We pre-trained ∗ Contact: bellamyrd@gmail.com Code: https://github.com/DavidBellamy/labrador 1" 2312.11503v1,"1 Speech and Text-Based Emotion Recognizer Varun Sharma National University of Singapore sharmavarun.s@u.nus.edu Abstract— Affective computing is a field of study that focuses on developing systems and technologies that can understand, interpret, and respond to human emotions. Speech Emotion Recognition (SER), in particular, has got a lot of attention from researchers in the recent past. However, in many cases, the publicly available datasets, used for training and evaluation, are scarce and imbalanced across the emotion labels. In this work, we focused on building a balanced corpus from these publicly available datasets by combining these datasets as well as employing various speech data augmentation techniques. Furthermore, we experimented with different architectures for speech emotion recognition. Our best system, a multi-modal speech, and text-based model, provides a performance of UA(Unweighed Accuracy) + WA (Weighed Accuracy) of 157.57 compared to the baseline algorithm performance of 119.66 BERT [13] models developed by Facebook. Both of these models have been pre-trained on large amounts of audio data which enables them to achieve impressive performance on speech processing tasks. Index Terms—Speech emotion recognition, deep neural networks, convolutional neural networks, HuBERT, Spectrogram, Speech Transcription, CNN. Another obstacle has been the ""availability of large, highquality datasets"" for speech emotion recognition (SER). While there are several publicly available SER datasets, they tend to be smaller in size and less diverse than image datasets. This can make it more challenging to train and evaluate SER models, as there may be less data available to learn from. I. INTRODUCTION A lthough there have been significant advancements in the field of artificial intelligence, natural interaction between humans and machines remains a challenge, partly due to the machine’s inability to comprehend our emotional states. When people speak, the sounds they produce convey not only the intended linguistic message but also a wealth of additional information about themselves and their emotional states. Affective computing, a sub-field of Human-Computer Interaction (HCI) systems, aims to facilitate natural interaction with machines by direct voice interaction instead of using traditional devices as input. Speech-based Emotion Recognition (SER) is a relatively new field that has emerged in the past few decades. The earliest research in this area can be traced back to the 1990s when scientists began to explore the possibility of using computers to recognize emotions in speech. Early efforts focused on identifying basic emotions such as happiness, sadness, anger, and fear, using simple acoustic features such as pitch and intensity. Over time, researchers developed more sophisticated techniques for extracting emotional information from speech signals, incorporating advanced machine learning algorithms and drawing on knowledge from fields such as psychology and linguistics. There have been significant advances in SER technology in recent years, thanks to the development of deep learning algorithms. Deep learning algorithms can learn complex patterns in data, and they are very effective for SER. Prominent among these have been wav2vec 2.0 [3] and Hu- In the past, the SER domain has been plagued by 2 significant challenges. First has been ""how to model emotional representations from speech signals"". Traditional methods focus on the efficient extraction of hand-crafted features such as intensity, pitch, formants, zero crossing rate, and Mel Frequency Cepstrum Coefficients (MFCCs) to name a few. Although researchers have done a tremendous amount of work in this field, there are still issues of speech feature choice and the correct application of feature engineering that remain to be solved in the domain of SER [16]. This paper tries to address both of these challenges. The contributions of this paper are chiefly (1) the analysis of various machine learning and deep learning architectures for emotion classification. (2) combining different publicly available datasets on SER to form a larger corpus. (3) applying speech augmentation techniques to balance and expand the corpus. (4) using transfer learning to finetune the Hubert model on this corpus. (5) evaluating the impact of jointly training audio embeddings from Hubert with the text embeddings obtained from Whisper 1 and BERT models and finally (6) using UA+WA as a metric for optimizing and evaluating the system. The rest of the paper is structured as follows. In Section 2, we review the related work on SER. In Section 3, we describe in detail, the datasets, methods, and evaluation methods that we used. In Section 4, we present the results of our experiments and compare them against each other. In this section, we also present benchmark test results on RAVDESS dataset. In Section 5, we discuss the deployment and web application-based inference and in Section 6, we conclude the paper and suggest future directions. II. RELATED WORK The ability to understand and generate emotions in speech has been a key area of research for many decades. Their importance has increased even more in recent times, due to the widespread use of virtual assistants (such as Siri, Alexa, or Google Home) 1 https://openai.com/blog/whisper/ 1234-56789 © 2023 IEEE" 2312.11509v1,"Toward A Reinforcement-Learning-Based System for Adjusting Medication to Minimize Speech Disfluency Pavlos Constas 4 , Vikram Rawal 1 , Matthew Honorio Oliveira 1 , Andreas Constas 1 , Aditya Khan 1 , Kaison Cheung 1 , Najma Sultani 1 , Carrie Chen 3 , Micol Altomare 1 , Michael Akzam 1 , Jiacheng Chen 1 , Vhea He 1 , Lauren Altomare 1 , Heraa Murqi 1 , Asad Khan 1 , Nimit Amikumar Bhanshali 1 , Youssef Rachad 1 , Michael Guerzhoy 12 1 University of Toronto Li Ka Shing Knowledge Institute, St. Michael’s Hospital 3 Appleby College 4 London Central Secondary School pconstasm@gmail.com, vikram.rawal@mail.utoronto.ca, matthewhonorio.oliveira@mail.utoronto.ca, andreas.constas@mail.utoronto.ca, aditya.khan@mail.utoronto.ca, siukai.cheung@mail.utoronto.ca, najma.sultani@mail.utoronto.ca, carrie.chen71@gmail.com, micol.altomare@mail.utoronto.ca, michael.akzam@mail.utoronto.ca, Jiachengjason.chen@mail.utoronto.ca, vhea.he@mail.utoronto.ca, lauren.altomare@mail.utoronto.ca, heraa.muqri@mail.utoronto.ca, asadk.khan@mail.utoronto.ca, nimit.bhanshali@mail.utoronto.ca, youssef.rachad@mail.utoronto.ca, guerzhoy@cs.toronto.edu 2 Abstract We propose a Reinforcement-Learning-based system that would automatically prescribe a hypothetical patient medications that may help the patient with their mental-healthrelated speech disfluency, and adjust the medication and the dosages in response to data from the patient. We demonstrate the components of the system: a module that detects and evaluates speech disfluency on a large dataset we built, and a Reinforcement Learning algorithm that automatically finds good combinations of medications. To support the two modules, we collect data on the effect of psychiatric medications for speech disfluency from the literature, and build a plausible patient simulation system. We demonstrate that the Reinforcement Learning system is, under some circumstances, able to converge to a good medication regime. We collect and label a dataset of people with possible speech disfluency and demonstrate our methods using that dataset. Our work is a proof of concept: we show that there is promise in the idea of using automatic data collection to address disfluency. Introduction Speech disfluency is a common medical issue. It can be caused by, among other factors, conditions such as depression, anxiety, and insomnia (see Section Medications Literature Review). Speech disfluency includes stuttering as well as issues like pauses that are too long, repetitions, “false starts,” and “repairs” of previous utterances (Shriberg, Bates, and Stolcke 1997). In this paper, we propose a hypothetical Reinforcement Learning system for helping physicians adjust the medications for people with speech disfluency. In the paper, we focus on a proof-of-concept system. Of course, regulatory and clinical issues would need to be addressed before actually implementing such a system. However, we show that such a system can in principle be implemented, and automatic disfluency detection can work well enough to support such a system. On a high level, the system works as follows: the person with a speech disfluency interacts with a system that measures their speech fluency; the system tries to assign different medications in different doses to the person, to minimize their speech disfluency. Using Reinforcement Learning (RL), the system trades off exploring to find the best medication combination for the person and exploring effective medication combinations that have been found. We demonstrate two components of the system: a subsystem for detecting how disfluent the person’s speech is, and a subsystem to minimize the speech disfluency by finding a combination of medications that works using RL. We train our disfluency detection system to predict the labels we assigned to clips in the dataset we collected, and then we demonstrate the effectiveness of the disfluency detection subsystem on a dataset we collect. To demonstrate the feasibility of the RL subsystem, we attempt to construct a plausible dataset we measure the effectiveness of our speech disfluency detection subsystem, as well as search the literature for the plausible timespans and onset times for the effects of medications. We then run a patient simulation with plausible inputs and demonstrate that our RL subsystem can find strategies to minimize the speech disfluencies of our plausibly-simulated patients. To be able to evaluate our subsystems, we collect a dataset of public videos of people with possible disfluencies and label the dataset using a scalable strategy that allows us to obtain precise and standardized ratings by having each video be rated by multiple raters. The rest of the paper is organized as follows: we explain our data collection and labelling process. We then describe our disfluency rating process, and report results on that subsystem. We then describe our patient simulation process and report results of the RL system’s performance on the simulated patients. For the patient simulation to be plausible, we connect the patient simulation to how accurately speech can" 2312.11517v1,"Unlocking Musculoskeletal Disorder Risk Factors: NLP-Based Classification and Mode-Based Ranking Md Abrar Jahin a,∗ , Subrata Talapatra a a Department of Industrial Engineering and Management, Khulna University of Engineering and Technology (KUET), Khulna 9203, Bangladesh Abstract This research delves into the intricate landscape of Musculoskeletal Disorder (MSD) risk factors, employing a novel fusion of Natural Language Processing (NLP) techniques and mode-based ranking methodologies. The primary objective is to advance the comprehension of MSD risk factors, their classification, and their relative severity, facilitating more targeted preventive and management interventions. The study utilizes eight diverse models, integrating pre-trained transformers, cosine similarity, and various distance metrics to classify risk factors into personal, biomechanical, workplace, psychological, and organizational classes. Key findings reveal that the BERT model with cosine similarity attains an overall accuracy of 28%, while the sentence transformer, coupled with Euclidean, Bray-Curtis, and Minkowski distances, achieves a flawless accuracy score of 100%. In tandem with the classification efforts, the research employs a mode-based ranking approach on survey data to discern the severity hierarchy of MSD risk factors. Intriguingly, the rankings align precisely with the previous literature, reaffirming the consistency and reliability of the approach. “Working posture” emerges as the most severe risk factor, emphasizing the critical role of proper posture in preventing MSDs. The collective perceptions of survey participants underscore the significance of factors like “Job insecurity,” “Effort reward imbalance,” and “Poor employee facility” in contributing to MSD risks. The convergence of rankings provides actionable insights for organizations aiming to reduce the prevalence of MSDs. The study concludes with implications for targeted interventions, recommendations for improving workplace conditions, and avenues for future research. This holistic approach, integrating NLP and mode-based ranking, contributes to a nuanced understanding of MSD risk factors, paving the way for more effective strategies in occupational health. Keywords: Musculoskeletal Disorder, Risk Factor, Natural Language Processing, Occupational Health and Safety, Ergonomics 1. Introduction In the domains of occupational health, safety, and ergonomics, the untapped potential of Natural Language Processing (NLP) represents an exciting frontier. Despite the profound challenges posed by Musculoskeletal Disorders (MSDs) and their substantial impact on individuals and organizations, the application of NLP remains largely unexplored in this field. This research endeavors to break new ground by pioneering the use of NLP to categorize risk factors related to MSDs, ushering in a new era in the quest for more effective prevention and management strategies. ∗ Corresponding author. Email addresses: abrar.jahin.2652@gmail.com (Md Abrar Jahin ), subrata@iem.kuet.ac.bd (Subrata Talapatra) Preprint submitted to Decision Analytics Journal The human musculoskeletal system, encompassing muscles, tendons, nerves, bones, and joints, serves as a marvel of biology, facilitating movement and functionality (Leite et al., 2021; Canetti et al., 2020; Ghasemi et al., 2020; Bispo et al., 2022). It allows individuals to partake in a diverse range of physical activities, yet it is susceptible to the strains and stresses of everyday life. Activities such as heavy lifting, repetitive motions, exposure to vibrations, and assuming awkward postures can lead to wear and tear, resulting in discomfort and injuries (Yang et al., 2020; Mondal and Ghosh, 2022). This gradual wear and tear culminate in a spectrum of conditions known as MSDs, spanning a wide array of issues, from muscle strains and tendonitis to nerverelated conditions, joint disorders (e.g., gout, rheumatoid arthritis, osteoarthritis), bone problems (e.g., fractures, osteoporosis), spinal disk complications (e.g., de- December 20, 2023" 2312.11537v1,"FastSR-NeRF: Improving NeRF Efficiency on Consumer Devices with A Simple Super-Resolution Pipeline Chien-Yu Lin * University of Washington Seattle, WA, USA Qichen Fu, Thomas Merth, Karren Yang, Anurag Ranjan Apple, Inc. Cupertino, CA, USA cyulin@cs.washington.edu {qfu22,tmerth,karren yang,anuragr}@apple.com Figure 1. Super-resolution (SR) can be used to improve neural rendering efficiency under a limited training budget. Comparison of TensoRF, FastSR-NeRF (ours), and MobileNeRF [13] on a consumer-grade MacBook Air M2 laptop. FastSR-NeRF employs a straightforward SR pipeline (TensoRF+SR), which can enhance rendering times and compress the model size while incurring relatively low training overhead. While state-of-the-art mobile models such as MobileNeRF can render very quickly, they cannot be trained on consumer devices under a meaningful time budget. Abstract Super-resolution (SR) techniques have recently been proposed to upscale the outputs of neural radiance fields (NeRF) and generate high-quality images with enhanced inference speeds. However, existing NeRF+SR methods increase training overhead by using extra input features, loss functions, and/or expensive training procedures such as knowledge distillation. In this paper, we aim to leverage SR for efficiency gains without costly training or architectural changes. Specifically, we build a simple NeRF+SR pipeline that directly combines existing modules, and we propose a lightweight augmentation technique, random patch sampling, for training. Compared to existing NeRF+SR methods, our pipeline mitigates the SR computing overhead and can be trained up to 23× faster, making it feasible to run on * Work done while interning at Apple. consumer devices such as the Apple MacBook. Experiments show our pipeline can upscale NeRF outputs by 2-4× while maintaining high quality, increasing inference speeds by up to 18× on an NVIDIA V100 GPU and 12.8× on an M1 Pro chip. We conclude that SR can be a simple but effective technique for improving the efficiency of NeRF models for consumer devices. 1. Introduction Neural Radiance Field (NeRF) models [31] have become integral to many computer vision and computer graphics tasks, such as novel view synthesis [8, 29, 31], surface reconstruction [39, 45], camera pose estimation [41, 46] and 3D image generation [11, 28, 33]. Since the original NeRF model cannot render images efficiently, a large body of research [12, 17, 29, 32, 34, 37, 43] has been dedicated to address the rendering efficiency. Many of these" 2312.11541v1,"CLIPSyntel: CLIP and LLM Synergy for Multimodal Question Summarization in Healthcare Akash Ghosh 1 * , Arkadeep Acharya 1 * , Raghav Jain 1 , Sriparna Saha 1 , Aman Chadha 2,3† , Setu Sinha 4 1 Indian Institute of Technology Patna, 2 Stanford University, 3 Amazon AI, 4 Indira Gandhi Institute of Medical Sciences {akash 2321cs19, arkadeep 2101ai41, sriparna}@iitp.ac.in, raghavjain106@gmail.com, hi@aman.ai, drsinhasetu@gmail.com Abstract In the era of modern healthcare, swiftly generating medical question summaries is crucial for informed and timely patient care. Despite the increasing complexity and volume of medical data, existing studies have focused solely on textbased summarization, neglecting the integration of visual information. Recognizing the untapped potential of combining textual queries with visual representations of medical conditions, we introduce the Multimodal Medical Question Summarization (MMQS) Dataset. This dataset, a major contribution of our work, pairs medical queries with visual aids, facilitating a richer and more nuanced understanding of patient needs. We also propose a framework, utilizing the power of Contrastive Language Image Pretraining(CLIP) and Large Language Models(LLMs), consisting of four modules that identify medical disorders, generate relevant context, filter medical concepts, and craft visually aware summaries. Our comprehensive framework harnesses the power of CLIP, a multimodal foundation model, and various general-purpose LLMs, comprising four main modules: the medical disorder identification module, the relevant context generation module, the context filtration module for distilling relevant medical concepts and knowledge, and finally, a general-purpose LLM to generate visually aware medical question summaries. Leveraging our MMQS dataset, we showcase how visual cues from images enhance the generation of medically nuanced summaries. This multimodal approach not only enhances the decision-making process in healthcare but also fosters a more nuanced understanding of patient queries, laying the groundwork for future research in personalized and responsive medical care. Disclaimer: The article features graphic medical imagery, a result of the subject’s inherent requirements. Introduction In the midst of the global COVID-19 pandemic, healthcare systems have been inundated with an unprecedented volume of inquiries, concerns, and uncertainties. Individuals worldwide are posing health-related inquiries on online platforms, seeking clarity and guidance on symptoms, pre- * These authors contributed equally. † Work does not relate to position at Amazon. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. vention, treatments, and vaccinations. These questions often employ everyday language and encompass both pertinent and extraneous details that may not directly pertain to the sought-after solutions. The complexity and urgency of the situation, coupled with a considerable imbalance in the doctor-to-patient ratio across many countries, have made the ability to swiftly and comprehensively comprehend a patient’s query paramount (Abacha and Demner-Fushman 2019; Yadav et al. 2021). In this context, medical question summarization has emerged as a vital tool to distill information from consumer health questions, ensuring the provision of accurate and timely responses. However, existing works have overlooked the untapped potential of integrating visual data, particularly images, with textual information. The motivations for focusing on visual aids within medical question summarization (MQS) are manifold. A significant portion of the population lacks familiarity with medical terms needed to accurately describe various symptoms, and some symptoms are inherently challenging to articulate through text alone. Patients may also be confused between closely related symptoms, such as distinguishing between skin dryness and skin rash. The combination of text and images in medical question summarization can offer enhanced accuracy and efficiency, providing a richer context that textual analysis alone may miss. This approach recognizes the complex nature of patient queries, where photographs of symptoms, medical reports, or other visual aids could provide crucial insights. By focusing on the integration of images, researchers and healthcare providers can respond to the evolving challenges of modern healthcare communication. Large Language Models (LLMs) (Kojima et al. 2023) and Vision Language Models (VLMs) (Zhang et al. 2023) have exhibited remarkable capacities in generating humanlike text and multimedia content. This prowess has driven their deployment across the medical domain, predominantly for domain-specific tasks such as chest radiograph summarization (Thawkar et al. 2023) and COVID-19 CT report generation (Liu et al. 2021). Yet, their application in multimodal medical question summarization remains uncharted territory. Leveraging zero-shot and few-shot learning capabilities of these models (Dong et al. 2022) offers a compelling advantage, especially for tasks like multimodal medical question summarization, characterized by inherent" 2312.11553v1,"SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter Ying-Ying Chang, Wei-Yao Wang, Wen-Chih Peng National Yang Ming Chiao Tung University, Hsinchu, Taiwan cindy88409.cs10@nycu.edu.tw, sf1638.cs05@nctu.edu.tw, wcpeng@cs.nycu.edu.tw Abstract In the dynamic and rapidly evolving world of social media, detecting anomalous users has become a crucial task to address malicious activities such as misinformation and cyberbullying. As the increasing number of anomalous users improves the ability to mimic normal users and evade detection, existing methods only focusing on bot detection are ineffective in terms of capturing subtle distinctions between users. To address these challenges, we proposed SeGA, preferenceaware self-contrastive learning for anomalous user detection, which leverages heterogeneous entities and their relations in the Twittersphere to detect anomalous users with different malicious strategies. SeGA utilizes the knowledge of large language models to summarize user preferences via posts. In addition, integrating user preferences with prompts as pseudo-labels for preference-aware self-contrastive learning enables the model to learn multifaceted aspects for describing the behaviors of users. Extensive experiments on the proposed TwBNT benchmark demonstrate that SeGA significantly outperforms the state-of-the-art methods (+3.5% ∼ 27.6%) and empirically validate the effectiveness of the model design and pre-training strategies. Our code and data are publicly available at https://github.com/ying0409/SeGA. 1 Introduction The exploration of anomalous user detection has broad applicability across various domains. Whether it involves developing strategies for network security (Bilot et al. 2023), financial transactions (Chai et al. 2022), or social media analytics (Agarwal et al. 2022; Wang and Peng 2022), these scenarios can be effectively framed as anomalous user detection systems characterized by intricate relations between users. Twitter serves as one of the most widely-used social media platforms; however, the widespread features in recent years have also led to the rapid growth of anomalous users. For instance, abnormal users often initiate campaigns to pursue malicious goals, which violates the principles of healthy online discussions on social media platforms (Alieva, Moffitt, and Carley 2022). One of the most common types of anomalous users is bots, identified at 9% to 15% of active users (Varol et al. 2017). In late 2017, the US Congress disclosed a list of 2.7k Twitter accounts that were identified as Russian trolls (Zannettou et al. 2019), which is an emerging type of Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: An example of anomalous user behavior in social media, where the edges connecting entities represent diverse relationships. anomalous user. As the variety of anomalous user types increases, and their potential negative impact on social media becomes more pronounced, it is crucial to emphasize the significance of advancing anomaly detection methods capable of identifying not only bots but also trolls. Previous works primarily focused on identifying bots and achieved effectiveness by leveraging the topology with graph neural networks (GNNs) (Kipf and Welling 2017; Velickovic et al. 2018) and heterogeneous information networks (HINs) (Feng et al. 2021c, 2022a). However, as the diversity of anomalous users and the evolutionary strategies for malicious activities continue to expand, such as spreading fake news through lists 1 , existing methods lack the ability to effectively distinguish various types of anomalous users like both bots and trolls. The main difference in detecting trolls and bots is that the former is controlled by humans, resulting in similar behavior to normal users compared with the latter. Figure 1 illustrates an example of anomalous user behavior with other entities on social media, where anomaly users are able to not only interact with other users, but also own lists and add other anomalous users as members to carry out malicious activities such as spreading fake news. For example, a bot might create a list and add trolls as members. If a 1 A list is a curated selection of Twitter accounts for organizing." 2312.11554v1,"Deciphering Compatibility Relationships with Textual Descriptions via Extraction and Explanation Yu Wang, Zexue He, Zhankui He, Hao Xu, Julian McAuley University of California, San Diego {yuw164, zehe, zhh004, hax019, jmcauley}@ucsd.edu Abstract Understanding and accurately explaining compatibility relationships between fashion items is a challenging problem in the burgeoning domain of AI-driven outfit recommendations. Present models, while making strides in this area, still occasionally fall short, offering explanations that can be elementary and repetitive. This work aims to address these shortcomings by introducing the Pair Fashion Explanation (PFE) dataset, a unique resource that has been curated to illuminate these compatibility relationships. Furthermore, we propose an innovative two-stage pipeline model that leverages this dataset. This fine-tuning allows the model to generate explanations that convey the compatibility relationships between items. Our experiments showcase the model’s potential in crafting descriptions that are knowledgeable, aligned with ground-truth matching correlations, and that produce understandable and informative descriptions, as assessed by both automatic metrics and human evaluation. Our code and data are released at https://github.com/wangyuustc/PairFashionExplanation. 1 Introduction Fashion and technology now intersect through outfit recommendation platforms, which provide a vast array of apparel and accessory options. These platforms are prevalent, such as Amazon Fashion 1 and Chictopia 2 . An essential component of these recommendation systems is explanation capabilities, which guide user decisions and enable system diagnosis. Additionally, as outfit recommendation becomes popular, the need for explanatory functionality extends beyond single items, emphasizing the importance of illustrating compatibility relationships between pairs of items. This presents the central challenge that our research seeks to address: Given a pair of fashion items, how can we effectively uncover and articulate their intrinsic compatibility relationships? In order to ensure these explanations are comprehensible to a broad spectrum of users, we prioritize generating explanations as coherent and naturally-phrased sentences. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 https://www.amazon.com/amazon-fashion/b?ie=UTF8& node=7141123011 2 http://www.chictopia.com/ Figure 1: Our task is generating natural language descriptions to explain compatibility relationships between items. Existing literature offers a multitude of models for outfit recommendations, which are designed to generate highly compatible outfit combinations (Lu et al. 2021a; Chen et al. 2019). However, these models often overlook the essential component of providing explanations for their predictions. Certain efforts have been made to incorporate explanatory features within prediction models (Wang, Wang, and Su 2022; Papadopoulos et al. 2022), but these attempts frequently result in rudimentary and repetitive explanations, failing to accurately encapsulate the complex compatibility relationships between diverse pairs of clothing items (Lin et al. 2019; Kaicheng, Xingxing, and Wong 2021). This indicates an unresolved challenge in the field: the generation of nuanced and informative explanations that accurately reflect true compatibility relationships. Recent advancements in large language models like Chat- GPT and GPT4 (OpenAI 2023) have shown considerable potential across various tasks (Bang et al. 2023). However, their ability to generate expert-aligned explanations for clothing matching remains dubious, with a tendency to produce plausible yet inauthentic explanations that diverge from the true compatibility relationships. To address this challenge, we present a novel solution combining a newly curated dataset and a two-stage pipeline model. Our PFE dataset comprises 6,407 sentences. Each sentence in the dataset serves as a distinct compatibility explanation for a pair of items, providing relevant entities and features. It offers insights into the explanations of clothing" 2312.11556v1,"StarVector: Generating Scalable Vector Graphics Code from Images Juan A. Rodriguez 1,2,4 Shubham Agarwal 1, 2 Issam H. Laradji 1, 5 Pau Rodriguez 6* David Vazquez 1 Christopher Pal 1,2,3 Marco Pedersoli 4 1 ServiceNow Research 2 Mila - Quebec AI Institute 3 Canada CIFAR AI Chair 4 ÉTS, Montréal, Canada 5 UBC, Vancouver, Canada 6 Apple MLR, Barcelona, Spain * External collaboration juan.rodriguez@mila.quebec Figure 1. Image-to-SVG generation task: Given an input image, generate the corresponding SVG code. On the left, we show test examples of complex SVGs from SVG-Emoji and SVG-Stack datasets. StarVector encodes images and processes them in a multimodal language modeling fashion, to generate executable SVG code that resembles the input image. We show real generated code and rasterized images produced by our StarVector model, showing impressive capabilities at generating appealing SVG designs and using complex syntax. Abstract datasets including SVG-Stack, a large-scale dataset of realworld SVG examples, and use it to pre-train StarVector as a large foundation model for SVGs. Our results demonstrate significant enhancements in visual quality and complexity handling over current methods, marking a notable advancement in SVG generation technology. Code and models: https://github.com/joanrod/star-vector Scalable Vector Graphics (SVGs) have become integral in modern image rendering applications due to their infinite scalability in resolution, versatile usability, and editing capabilities. SVGs are particularly popular in the fields of web development and graphic design. Existing approaches for SVG modeling using deep learning often struggle with generating complex SVGs and are restricted to simpler ones that require extensive processing and simplification. This paper introduces StarVector, a multimodal SVG generation model that effectively integrates Code Generation Large Language Models (CodeLLMs) and vision models. Our approach utilizes a CLIP image encoder to extract visual representations from pixel-based images, which are then transformed into visual tokens via an adapter module. These visual tokens are pre-pended to the SVG token embeddings, and the sequence is modeled by the StarCoder model using next-token prediction, effectively learning to align the visual and code tokens. This enables StarVector to generate unrestricted SVGs that accurately represent pixel images. To evaluate StarVector’s performance, we present SVG-Bench, a comprehensive benchmark for evaluating SVG methods across multiple datasets and relevant metrics. Within this benchmark, we introduce novel 1. Introduction Vector Graphics represent an archetypal form of image representation, where visual compositions are constituted by primitive shapes such as vector paths, curves, or polygons, parametrized by mathematical equations [41]. This contrasts starkly with raster graphics, where images are represented as pixels on a grid. The primary advantage of vector graphics lies in their ability to maintain high precision and consistent visual quality across various resolutions, as they can be scaled arbitrarily without any loss of detail [34, 47]. In the realm of modern image rendering, Scalable Vector Graphics (SVGs) [54] have become a standard for encapsulating vector graphics in a code-based format. SVGs are the preferred choice for many artistic use cases like icon creation or typography. This format has gained prominence in applications demanding fast, efficient, and high-quality im- 1" 2312.11582v1,"Technical Report Under review Dec 2023 Shapley-PC: Constraint-based Causal Structure Learning with Shapley Values Fabrizio Russo 1 and Francesca Toni 1 1 Imperial College London {fabrizio,ft}@imperial.ac.uk constraint-based, score-based and FCM-based methods (for details see Section 2). In this paper, we provide a novel constraint-based method. Constraint-based methods use conditional independence tests and graphical rules based on d-separation [Pearl, 2009] to recover as much of the causal structure as possible, under different assumptions [Colombo and Maathuis, 2014]. Under the assumption of causal sufficiency, i.e. that no latent common causes are missing from the data, the Peter Clark (PC)-algorithm [Spirtes et al., 2000] recovers a graph encoding as much of the discoverable relations as possible (see Section 3). Depending on the assumptions, the output of constraint-based methods may be sound and complete [Spirtes et al., 2000] and asymptotically consistent [Kalisch and Bühlman, 2007; Harris and Drton, 2013]. However, with a finite sample, errors can emerge from the multiple conditional independence tests performed. In this paper we propose a novel method addressing the finite sample performance of PC, by analysing the results of conditional independence tests using an established game-theoretical concept, Shapley values [Shapley, 1953]. Generally, Shapley values are a quantification of the contribution of an entity to an output created by a group of entities. They have been used in settings ranging from economics [Ichiishi, 1983] to machine learning [Lundberg and Lee, 2017; Frye et al., 2020; Heskes et al., 2020] because of their properties, but, to the best of our knowledge, they have not been used for CSL. Overall, our contributions in this paper are: Abstract Causal Structure Learning (CSL), amounting to extracting causal relations among the variables in a dataset, is widely perceived as an important step towards robust and transparent models. Constraint-based CSL leverages conditional independence tests to perform causal discovery. We propose Shapley-PC, a novel method to improve constraint-based CSL algorithms by using Shapley values over the possible conditioning sets to decide which variables are responsible for the observed conditional (in)dependences. We prove soundness and asymptotic consistency and demonstrate that it can outperform state-of-theart constraint-based, search-based and functional causal model-based methods, according to standard metrics in CSL. 1 Introduction Causal Structure Learning (CSL), also referred to as Causal Discovery, is the process of extracting the causal relationships among variables in data, and represent them as graphs. Learning (causal) graphs is important because of their causal interpretation. It corresponds to collecting and validating, with data, the assumptions necessary to perform causal inference, e.g. with causal graphical models [Peters et al., 2017] or Functional Causal Models (FCM) [Spirtes et al., 2000; Pearl, 2009], for the estimation of causal effects, such as the impact of an action or treatment on an outcome. Causal effects are ideally discovered through interventions or randomised control trials, but these can be expensive, time consuming or unethical, e.g. establishing if smoking causes cancer. Hence the need to use observational, as opposed to interventional, data to study causes and effects [Peters et al., 2017; Schölkopf et al., 2021]. CSL has been studied extensively in various settings and a number of methods have been proposed to address the challenge (see e.g. [Glymour et al., 2019; Vowels et al., 2022; Zanga et al., 2022] for overviews). The literature is broadly divided into three classes of methods: • We propose a novel decision rule that can be applied to constraint-based CSL algorithms to guide the search for v-structures. We implement our method within the PC-stable algorithm [Colombo and Maathuis, 2014], obtaining the Shapley-PC algorithm and prove that the soundness and consistency of the original PC-algorithm are preserved with infinite data (Section 4). • We provide an extensive evaluation of Shapley-PC compared to several constraint-based, score-based and FCM-based baselines. Our experiments provide empirical evidence about the value-added of our decision rule, consistently outperforming PC- 1" 2312.11594v1,"Shortcut-to-Adiabatic Controlled-Phase Gate in Rydberg atoms Luis S. Yagüe Bosch, 1 Tim Ehret, 1, ∗ Francesco Petiziol, 2 Ennio Arimondo, 3, 4 and Sandro Wimberger 5, 6, † 2 1 Institute of Theoretical Physics, Heidelberg University, Philosophenweg 12, 69120 Heidelberg, Germany Technische Universität Berlin, Institut für Theoretische Physik, Hardenbergstrasse 36, Berlin 10623, Germany 3 Dipartimento di Fisica, Università di Pisa, Largo Pontecorvo 3, 56127 Pisa, Italy 4 Istituto Nazionale di Ottica, Consiglio Nazionale delle Ricerche, Universitá di Pisa, Largo Pontecorvo 3, 56127 Pisa, Italy 5 Dipartimento di Scienze Matematiche, Fisiche e Informatiche, Università di Parma, Parco Area delle Scienze 7/A, 43124 Parma, Italy 6 INFN, Sezione di Milano Bicocca, Gruppo Collegato di Parma, Parco Area delle Scienze 7/A, 43124 Parma, Italy A shortcut-to-adiabatic protocol for the realization of a fast and high-fidelity controlled-phase gate in Rydberg atoms is developed. The adiabatic state transfer, driven in the high-blockade limit, is sped up by compensating nonadiabatic transitions via oscillating fields that mimic a counterdiabatic Hamiltonian. High fidelities are obtained in wide parameter regions. The implementation of the bare effective counterdiabatic field, without original adiabatic pulses, enables to bypass gate errors produced by the accumulation of blockade-dependent dynamical phases, making the protocol efficient also at low blockade values. As an application toward quantum algorithms, how the fidelity of the gate impacts the efficiency of a minimal quantum-error correction circuit is analyzed. I. INTRODUCTION Rydberg atoms [1] have been established as a platform for many applications in quantum physics over the last 30 years, going from old beam experiments [2–5] to much better controlled cold-atom setups in which single Rydberg atoms are hold in position with optical tweezers [6–9]. We are interested in the use of cold Rydberg atoms for quantum information protocols [6, 10–12], in view of their ability to implement single well-controlled quantum gates with high fidelity [6, 7, 13–19]. In particular, adiabatic protocols seem to be promising for large-scale computations because of their intrinsic robustness [20–22]. In contrast to sudden or quasi-resonant protocols no precise resonance tuning and pulse timing is required [6, 7, 10–19, 23]. A specific adiabatic protocol for realizing a controlled-phase (CZ) gate has recently been proposed by Saffman et al. [24]. An advantage of this adiabatic gate is that it prevents large transient occupation of the Rydberg states, such that the protocol is less exposed to spontaneous emission from such states—a primary source of fidelity loss in this platform. This interacting Rydberg gate works differently from a recent realization of a CZ gate with superconducting qubits based on a different form of interaction [25]. In this work, we explore the possibility to overcome the typical slowness of adiabatic quantum computation protocols by accelerating the CZ gate of [24] via shortcuts to adiabaticity [26, 27] (STA). The idea of a shortcut is to find a modified Hamiltonian that realizes the same population transfer with high fidelity but in a nonadiabatic, faster way, and it has been successfully applied ∗ now at: Faculty of Physics, Vienna University, Boltzmanngasse 5, 1090 Wien, Austria † sandromarcel.wimberger@unipr.it to control in few-level systems in multiple experimental platforms, see, e.g., [28–32]. In particular, we derive and analyse a control protocol in which nonadiabatic transitions are counteracted via additional oscillating components in the control fields that mimic a counterdiabatic (CD) Hamiltonian [31, 33, 34]. While STA techniques typically address individual state-to-state transfers, we here rather engineer the full propagator by targeting the realization of a complete gate. This more challenging task, which has been traditionally carried out using optimal control [35–39], was recently also addressed with STA methods [40–47]. The focus of the CD protocols is usually on noninteracting systems, because as a common feature the required CD corrections are hard to be implemented experimentally, with a few exceptions of integrable manybody systems [26, 27, 48–50]. This is true, in principle, also for protocols with Rydberg atoms interacting in their excited states, but we demonstrate that an approximate Hamiltonian not requiring many-body controls nevertheless leads to good final fidelities for a broad range of protocol times and system parameters. II. ADIABATIC CZ GATE While the CD approach may be applied to any adiabatic protocol, we focus our attention on the configuration depicted in Fig. 1 representing an adiabatic Rydberg driving scheme slightly modified with respect to [24]. The two atoms, having hyperfine levels |0⟩ and |1⟩ of the electronic ground state, are symmetrically driven with lasers of Rabi frequency Ω(t) targeting the transition from |1⟩ to a Rydberg state |r⟩, with detuning ∆(t), and they experience a Rydberg-Rydberg interaction of strength V . The time-dependent Hamiltonian, in the frame rotating" 2312.11615v1,"Universal structure of measurement-induced information in many-body ground states Zihan Cheng, 1 Rui Wen, 2 Sarang Gopalakrishnan, 3 Romain Vasseur, 4 and Andrew C. Potter 2 2 1 Department of Physics, University of Texas at Austin, Austin, TX 78712, USA Department of Physics and Astronomy, and Stewart Blusson Quantum Matter Institute, University of British Columbia, Vancouver, BC, Canada V6T 1Z1 3 Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ 08544, USA 4 Department of Physics, University of Massachusetts, Amherst, MA 01003, USA Unlike unitary dynamics, measurements of a subsystem can induce long-range entanglement via quantum teleportation. The amount of measurement-induced entanglement or mutual information depends jointly on the measurement basis and the entanglement structure of the state (before measurement), and has operational significance for whether the state is a resource for measurementbased quantum computing, as well as for the computational complexity of simulating the state using quantum or classical computers. In this work, we examine entropic measures of measurementinduced entanglement (MIE) and information (MII) for the ground-states of quantum many-body systems in one- and two- spatial dimensions. From numerical and analytic analysis of a variety of models encompassing critical points, quantum Hall states, string-net topological orders, and Fermi liquids, we identify universal features of the long-distance structure of MIE and MII that depend only on the underlying phase or critical universality class of the state. We argue that, whereas in 1d the leading contributions to long-range MIE and MII are universal, in 2d, the existence of a teleportation transition for finite-depth circuits implies that trivial 2d states can exhibit long-range MIE, and the universal features lie in sub-leading corrections. We introduce modified MIE measures that directly extract these universal contributions. As a corollary, we show that the leading contributions to strange-correlators, used to numerically identify topological phases, are in fact non-universal in two or more dimensions, and explain how our modified constructions enable one to isolate universal components. We discuss the implications of these results for classical- and quantum- computational simulation of quantum materials. I. Introduction Entanglement is a fundamentally quantum phenomenon, that serves as the resource for quantum computation, and offers a powerful lens through which to classify ground-state and dynamical phases and critical phenomena in quantum many-body systems. The universal structure of entanglement in quantum manybody ground-states offers a quantum information theoretic fingerprint of various quantum orders and critical phenomena. Since local Hamiltonian or quantum circuit dynamics can generate and propagate entanglement only at a finite speed, the long distance structure of entanglement is stable under such dynamics and is therefore useful for characterizing and classifying quantum phases [1, 2]. By contrast, quantum measurement, an inherently stochastic and non-unitary operation, can instantly generate non-local entanglement – as famously illustrated by quantum teleportation. This capability allows short-depth circuits with measurements to generate certain types of long-range entangled states [3–10]. Furthermore, pre-existing entanglement in many-body states can also serve as a computational resource [11–16], and there is a close connection between the universal phase structure of the pre-measured state and its computational power [17, 18]. In this work, we investigate the connections between the phase of a various quantum many-body ground-states in 1d and 2d, and the amount of measurement-induced long-range entanglement between distant regions, quantified by two related quantities: measurement-induced entanglement [19] (MIE) and measurement-induced information (MII), which we define below. The paper is organized as follows. We begin by reviewing and discussing the operational significance of MIE and MII and related quantities for various classical and quantum computational tasks. We then conduct a numerical and analytic investigation of the universal features of MIE and MII in a variety of 1d and 2d phases of matter and critical points through a mixture of numerical and analytic methods. We focus on states that have an efficient classical description through exactly solvable models, including free-fermion descriptions and stabilizer states. Despite their computational simplicity, this class of states encompasses a wide range of long-range entangled states including quantum critical points, topologically ordered states, and Fermi liquids, and provides a rich set of examples. In 1d, we show that the leading long-range contribution to MIE and MII have universal scale-invariant behavior at both conformal and non-conformal (stronglydisordered) quantum critical points. By contrast, in 2d (or higher-d), we argue that the leading contribution to MIE is generally non-universal, due to the existence of long-range measurement-induced teleportation properties of short-depth 2d circuits, and discuss implications for other closely-related quantities such as strange correlators [20]. Despite this, we find that the sub-leading corrections to MIE and MII do exhibit universal features" 2312.11617v1,"Moiré Fractional Chern Insulators III: Hartree-Fock Phase Diagram, Magic Angle Regime for Chern Insulator States, the Role of the Moiré Potential and Goldstone Gaps in Rhombohedral Graphene Superlattices Yves H. Kwan, 1 Jiabin Yu, 2 Jonah Herzog-Arbeitman, 2 Dmitri K. Efetov, 3, 4 Nicolas Regnault, 2, 5 and B. Andrei Bernevig 2, 6, 7, ∗ 1 Princeton Center for Theoretical Science, Princeton University, Princeton, NJ 08544 2 Department of Physics, Princeton University, Princeton, New Jersey 08544, USA 3 Faculty of Physics, Ludwig-Maximilians-University Munich, Munich 80799, Germany 4 Munich Center for Quantum Science and Technology (MCQST), Ludwig-Maximilians-University Munich, Munich 80799, Germany 5 Laboratoire de Physique de l’Ecole normale supérieure, ENS, Université PSL, CNRS, Sorbonne Université, Université Paris-Diderot, Sorbonne Paris Cité, 75005 Paris, France 6 Donostia International Physics Center, P. Manuel de Lardizabal 4, 20018 Donostia-San Sebastian, Spain 7 IKERBASQUE, Basque Foundation for Science, Bilbao, Spain We investigate in detail the ν = +1 displacement-field-tuned interacting phase diagram of L = 3, 4, 5, 6, 7 layer rhombohedral graphene aligned to hBN (RLG/hBN). Our calculations account for the 3D nature of the Coulomb interaction, the inequivalent stacking orientations ξ = 0, 1, the effects of the filled valence bands, and the choice of ‘interaction scheme’ for specifying the many-body Hamiltonian. We show that the latter has a dramatic impact on the Hartree-Fock phase boundaries and the properties of the phases, including for pentalayers (R5G/hBN) with large displacement field D where recent experiments observed a Chern insulator at ν = +1 and fractional Chern insulators for ν < 1. In this large D regime, the low-energy conduction bands are polarized away from the aligned hBN layer, and are hence well-described by the folded bands of moiréless rhombohedral graphene at the non-interacting level. Despite this, the filled valence bands develop moiré-periodic charge density variations which can generate an effective moiré potential, thereby explicitly breaking the approximate continuous translation symmetry in the conduction bands, and leading to contrasting electronic topology in the ground state for the two stacking arrangements. Within time-dependent Hartree-Fock theory, we further characterize the strength of the moiré pinning potential in the Chern insulator phase by computing the low-energy q = 0 collective mode spectrum, where we identify competing gapped pseudophonon and valley magnon excitations. Our results emphasize the importance of careful examination of both the single-particle and interaction model for a proper understanding of the correlated phases in RLG/hBN. I. INTRODUCTION After more than a decade since their initial theoretical proposals [1–3], fractional Chern insulators (FCIs) have been recently observed in twisted bilayer MoTe 2 (tMoTe 2 ) [4–7] and rhombohedral pentalayer graphene twisted on hexagonal boron nitride [8], following related observations of fractional quantum Hall like states at nonzero external magnetic fields [9, 10]. The experimental realizations of FCIs have attracted a large amount of theoretical attention [11–27]. In both tMoTe 2 and pentalayers, the |ν| = 1/3, 4/3 FCI state is so far absent, whereas the straightforward diagonalization of projected Hamiltonians into a single Chern band is expected to produce (and indeed found to give) a robust 1/3 state. In tMoTe 2 this was explained [11, 18] due to the weak/nonexistent spin gaps at those fillings. In pentalayers however, the presence of many single-particle dispersive bands almost degenerate with the flat band poses more immediate initial questions, related to the ∗ bernevig@princeton.edu appearance of the ν = 1 Chern insulator. The phase diagram of L-layer rhombohedral graphene twisted on hBN (RLG/hBN), the regions of nontrivial Chern number and the gapless states, the role of the moiré interaction and of the 3D Coulomb interaction, the stability of the Chern phase, and the collective modes of the system are all outstanding questions that are yet to be fully addressed. In Ref. [28], we have performed ab initio calculations on the relaxation and the single-particle band structure of RLG/hBN, and provided a model that includes the effects of relaxation, trigonal distortion, moiré potential, and internal and external electric polarizations/fields. We have then developed a continuum model [28] where the parameters were directly fitted to ab initio calculations which include relaxation. This is a generalized version of the models introduced in Refs. [29–32]. In this work, we perform Hartree-Fock (HF) and timedependent Hartree-Fock (TDHF) calculations at integer filling ν = +1 of RLG/hBN based on the model in Ref. [28] for L = 3 − 7 layers. Crucially, we consider two different ‘interaction schemes’ — the charge neutrality (CN) scheme and the average scheme. These choices differ in the way that the filled valence bands influence the" 2312.11651v1,"B RIDGING L OGIC AND L EARNING : A N EURAL -S YMBOLIC A PPROACH FOR E NHANCED R EASONING IN N EURAL M ODELS (ASPER) Fadi Al Machot ∗ , Faculty of Science and Technology (REALTEK) Norwegian University of Life Sciences NMBU 1430 Ås, Norway A BSTRACT Neural-symbolic learning, an intersection of neural networks and symbolic reasoning, aims to blend neural networks’ learning capabilities with symbolic AI’s interpretability and reasoning. This paper introduces an approach designed to improve the performance of neural models in learning reasoning tasks. It achieves this by integrating Answer Set Programming (ASP) solvers and domain-specific expertise, which is an approach that diverges from traditional complex neural-symbolic models. In this paper, a shallow artificial neural network (ANN) is specifically trained to solve Sudoku puzzles with minimal training data. The model has a unique loss function that integrates losses calculated using the ASP solver outputs, effectively enhancing its training efficiency. Most notably, the model shows a significant improvement in solving Sudoku puzzles using only 12 puzzles for training and testing without hyperparameter tuning. This advancement indicates that the model’s enhanced reasoning capabilities have practical applications, extending well beyond Sudoku puzzles to potentially include a variety of other domains. The code can be found on GitHub: https://github.com/Fadi2200/ASPEN. 1 Introduction Neural-symbolic learning aims to combine the adaptive learning abilities of neural networks with symbolic AI’s clarity and logical capabilities. Thus, research efforts have focused on creating hybrid models that combine Neural Networks with Symbolic Learning, e.g., language translation [2], neural logic machine [9], and logic synthesis from Input-Output examples [5]. This integration represents a step towards addressing some limitations in training neural models, such as the need for large annotated datasets, difficulty handling complex reasoning tasks, and the lack of interpretability in model decisions [18]. While neural-symbolic AI is promising, it faces significant challenges in lacking a generalizable framework that can be easily adapted across different problem spaces. This limitation restricts the broader application of these models and requires extensive customization for new domains [3]. Addressing these limitations, this work introduces an approach called ASPER that effectively integrates answer set programming (ASP) solvers and domain-specific expertise into neural models. This paper diverges from traditional neural-symbolic models by focusing on straightforward, effective methods incorporating logical reasoning and expert knowledge. The strength of the approach lies in its simplicity and adaptability. The proposed approach does not require extensive datasets. Instead, it leverages the logic in the problem domain to guide the learning process. This aspect is crucial in fields where training data is limited or expensive to collect. Additionally, the approach enhances the interpretability of the model’s decisions. By incorporating rule-based logic into the training process, the model’s decisions can be traced back to these underlying rules, providing clearer explanations. ∗ Corresponding author: Fadi Al Machot (e-mail: fadi.al.machot@nmbu.no)" 2312.11652v1,"Wee partons in QCD and gravity: double copy and universality Himanshu Raj 1,∗ and Raju Venugopalan 2,1,∗∗ 1 Center for Frontiers in Nuclear Science, Department of Physics and Astronomy, Stony Brook University, NY 11794, USA 2 Physics Department, Brookhaven National Laboratory, Upton, NY 11973, USA Abstract. We discuss a quantitative ""double copy"" between radiation from shockwave collisions in Einstein gravity and in QCD. The correspondence extends to 2 → N amplitudes in Regge asymptotics. The classicalization and unitarization of these amplitudes at maximal occupancy, corresponding to black hole and Color Glass Condensate (CGC) states respectively, are described by the emergent Goldstone dynamics of wee partons. We outline some consequences of the universal dynamics on both sides of the correspondence. A quantitative color-kinematics duality between amplitudes in perturbative QCD (pQCD) and amplitudes in Einstein gravity was discovered by Bern, Carrasco and Johansson (BCJ) [1]. Though not as widely known, a double copy relation between gravitational amplitudes and QCD amplitudes in high energy Regge asymptotics of both theories was derived previousy by Lipatov [2], showing that the effective gravitational vertex for the 2 → 3 scattering amplitude is (for exchanged t-channel transverse momenta q 1,2 whose four-momenta satisfy q 1 + q 2 = k, with k the four-momentum of the radiated graviton) Γ µν (q 1 , q 2 ) = 1 µ ν (C C − N µ N ν ) , 2 (1) with C µ the QCD Lipatov vertex and N µ the QED soft photon bremsstrahlung vertex. They are key elements of 2-D effective theories describing the Regge asymptotics of 2 → N amplitudes in both QCD and gravity [3]. Explicit expressions for the vertices are given in [11]. The QCD Lipatov vertex is obtained from solutions of Yang-Mills (YM) equations [4] in the Color Glass Condensate effective field theory (CGC EFT) [5], where hadron-hadron collisions are replaced by collisions of gluon shockwaves. The radiation field is given by g 3 A µ,a (k) = − 2 k Z d 2 q 2 ρ̃ A (q 1 ) ρ̃ B (q 2 ) b c abc µ T T i f C (q 1 , q 2 ) . q 22 (2π) 2 q 21 (2) Here ρ̃ A , ρ̃ B are Fourier transforms of the number density of the colliding classical color charges. Further, we employ a ""dilute-dilute"" approximation where typical momentum transfers are much larger than the respective saturation scales (to be discussed shortly). ∗ e-mail: himanshu.raj@stonybrook.edu ∗∗ e-mail: rajuv@bnl.gov" 2312.11658v1,"Traces of Memorisation in Large Language Models for Code Ali Al-Kaswan Maliheh Izadi Arie van Deursen a.al-kaswan@tudelft.nl Delft University of Technology Delft, The Netherlands m.izadi@tudelft.nl Delft University of Technology Delft, The Netherlands arie.vandeursen@tudelft.nl Delft University of Technology Delft, The Netherlands ABSTRACT 1 Large language models have gained significant popularity because of their ability to generate human-like text and potential applications in various fields, such as Software Engineering. Large language models for code are commonly trained on large unsanitised corpora of source code scraped from the internet. The content of these datasets is memorised and can be extracted by attackers with data extraction attacks. In this work, we explore memorisation in large language models for code and compare the rate of memorisation with large language models trained on natural language. We adopt an existing benchmark for natural language and construct a benchmark for code by identifying samples that are vulnerable to attack. We run both benchmarks against a variety of models, and perform a data extraction attack. We find that large language models for code are vulnerable to data extraction attacks, like their natural language counterparts. From the training data that was identified to be potentially extractable we were able to extract 47% from a CodeGen-Mono-16B code completion model. We also observe that models memorise more, as their parameter count grows, and that their pre-training data are also vulnerable to attack. We also find that data carriers are memorised at a higher rate than regular code or documentation and that different model architectures memorise different samples. Data leakage has severe outcomes, so we urge the research community to further investigate the extent of this phenomenon using a wider range of models and extraction techniques in order to build safeguards to mitigate this issue. In recent years, Large Language Models (LLMs) have garnered considerable interest in the realm of Natural Language Processing (NLP) owing to their exceptional accuracy in performing a broad spectrum of NLP tasks [36]. These models, trained on extensive amounts of data, exhibit increased accuracy and emergent abilities as their parameter count grows from millions to billions [52]. LLMs designed for coding are also trained on vast amounts of data and can effectively learn the structure and syntax of programming languages. As a result, they are highly adept at tasks like generating [21], summarising [1], and completing code [30]. Large language models also exhibit emergent capabilities [50]. These abilities cannot be predicted by extrapolating scaling laws and only emerge at a certain critical model size threshold [50]. This makes it appealing to train ever-larger models, as capabilities such as chain-of-thought prompting [51] and instruction tuning [42] only become feasible in models with more than 100B parameters [50]. Many have noted that large language models trained on natural language are capable of memorising extensive amounts of training data [2, 5, 9, 11, 12, 15, 19, 23, 29, 32, 37, 46, 48]. The issue of memorisation in source code is distinct from that of natural language. Source code is governed by different licences that reflect different values than natural language [16, 23]. Hence, in addition to privacy considerations, the memorisation of source code can have legal ramifications. The open-source code used in LLM training for code is frequently licenced under nonpermissive copy-left licences, such as GPL or the CC-BY-SA licence employed by StackOverflow [2]. 1 Reusing code covered by these licences without making the source code available under the same licence is considered a violation of copyright law. In some jurisdictions, this leaves users of tools such as CoPilot at legal risk [2, 16, 23]. Licences are unavoidably linked to the source code, as they enforce the developers’ commitment to sharing, transparency, and openness [2, 16]. Sharing code without proper licences is also ethically questionable [2, 23, 46]. Memorised data can also include private information [10, 13, 28]. These privacy concerns extend to code, which can contain credentials, API keys, emails, and other sensitive information as well [2, 4]. Memorisation could therefore put the private information contained in the training data at risk. Recently, attacks which leverage memorisation have successfully extracted (or reconstructed) training data from LLMs [3, 5, 13, 29]. The US National Institute of Standards and Technology (NIST) considers data reconstruction attacks to be the most concerning type of privacy attack against machine learning models [41]. OWASP CCS CONCEPTS • Security and privacy; • Software and its engineering; • Computing methodologies → Machine learning; KEYWORDS Large Language Models, Privacy, Memorisation, Data Leakage ACM Reference Format: Ali Al-Kaswan, Maliheh Izadi, and Arie van Deursen. 2023. Traces of Memorisation in Large Language Models for Code . In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION 1 StackOverflow Licence: https://stackoverflow.com/help/licensing" 2312.11667v1,"LLNL-JRNL-854902-DRAFT Preprint 20 December 2023 Compiled using MNRAS L A TEX style file v3.0 Spatially resolved microlensing timescale distributions across the Galactic bulge with the VVV survey Zofia Kaczmarek 1,2★ , Peter McGill 3 , N. Wyn Evans 1 , Leigh C. Smith 1 , Nathan Golovich 3 , Eamonn Kerins 4 , David Specht 4 , William A. Dawson 3 1 Institute of Astronomy, University of Cambridge, Madingley Rd, Cambridge CB3 0HA, UK 2 Zentrum für Astronomie der Universität Heidelberg, Astronomisches Rechen-Institut, Mönchhofstr. 12-14, 69120 Heidelberg, Germany 3 Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 94550, USA 4 Jodrell Bank Centre for Astrophysics, Department of Physics and Astronomy, University of Manchester, Oxford Road, Manchester M13 9PL, UK Accepted XXX. Received YYY; in original form ZZZ ABSTRACT We analyze 1602 microlensing events found in the VISTA Variables in the Via Lactea (VVV) near-infrared (NIR) survey data. We obtain spatially-resolved, efficiency-corrected timescale distributions across the Galactic bulge (|ℓ| < 10 ◦ , |𝑏| < 5 ◦ ), using a Bayesian hierarchical model. Spatially-resolved peaks and means of the timescale distributions, along with their marginal distributions in strips of longitude and latitude, are in agreement at a 1𝜎 level with predictions based on the Besançon model of the Galaxy. We find that the event timescales in the central bulge fields (|ℓ| < 5 ◦ ) are on average shorter than the non-central (|ℓ| > 5 ◦ ) fields, with the average peak of the lognormal timescale distribution at 23.6 ± 1.9 days for the central fields and 29.0 ± 3.0 days for the non-central fields. Our ability to probe the structure of the Bulge with this sample of NIR microlensing events is limited by the VVV survey’s sparse cadence and relatively small number of detected microlensing events compared to dedicated optical surveys. Looking forward to future surveys, we investigate the capability of the Roman telescope to detect spatially-resolved asymmetries in the timescale distributions. We propose two pairs of Roman fields, centred on (ℓ = ±9, 5 ◦ , 𝑏 = −0.125 ◦ ) and (ℓ = −5 ◦ , 𝑏 = ±1.375 ◦ ) as good targets to measure the asymmetry in longitude and latitude, respectively. Key words: gravitational lensing: micro – Galaxy: bulge – Galaxy: structure 1 INTRODUCTION Griest et al. (1991) and Paczynski (1991) first proposed monitoring the Milky Way bulge for microlensing events, partly as a reliability check on the results towards the Magellanic Clouds (Alard et al. 1995; Evans 2003). The early measurements of the photometric microlensing optical depth (or the probability that a microlensing event occurs) towards the bulge turned out to be higher than expected (Udalski et al. 1994; Alcock et al. 1995). Exploiting this high rate, modern microlensing surveys of the Milky Way bulge provide the largest source of microlensing events. They detect about 2000 photometric events per year (Udalski et al. 2015; Kim et al. 2016), which have proved useful for a range of different astrophysical applications (Gould 2001; Mao 2012). Most notably, short timescale deviations, caused by planets around the lens, have been detected for > 100 1 events to date (e.g., Bond et al. 2004; Udalski et al. 2005; Beaulieu et al. 2006). These events have provided a probe of low-mass planets (down to Earth-mass) at intermediate separations from their hosts (≈ 1 au) which are typically off-limits to other planet detection techniques (Tsapras 2018). For the majority of photometric events found via the monitoring ★ E-mail: zk277@cantab.ac.uk 1 https://exoplanetarchive.ipac.caltech.edu/docs/counts_ detail.html © 2023 The Authors channel, and in the absence of any higher-order effects, the only parameter that can be extracted containing physical information is the Einstein timescale (Paczynski 1986), √︄ 𝜃 E 1 4𝐺 𝑀 L 𝐷 L (𝐷 S − 𝐷 L ) 𝑡 E = = . (1) 𝜇 rel 𝑣 rel 𝐷 S 𝑐 2 This is the time taken for the source to traverse the angular Einstein radius 𝜃 E . Here, 𝜇 rel , and 𝑣 rel are the lens-source relative proper motion and velocity, while 𝐷 L , 𝐷 S and 𝑀 L are the lens distance, source distance and lens mass, respectively. While 𝑡 E contains information about the lens-mass and lens-source relative distance and velocities, it is completely degenerate. This means that for a single event, 𝑡 E contains limited information about the lens. However, measurements of 𝑡 E for large samples of events can tell us about the characteristics of the population of lenses causing them and hence probe the structure of the Galaxy (e.g., Kiraga & Paczynski 1994; Evans & Belokurov 2002; Han & Gould 2003; Kerins et al. 2009; Perkins et al. 2023). While current monitoring surveys of the Galactic bulge like OGLE-IV (Udalski et al. 2015) and KMTNet (Kim et al. 2016) have yielded thousands of photometric microlensing events, they are restricted to optical wavelengths. This constrains them to high galactic latitudes (|𝑏| > 2 ◦ ) around the bulge in windows where extinction from interstellar dust is low. Of course, this does not mean there are no microlensing events in the inner bulge regions. In fact, event rates in the innermost regions of the bulge are expected to be high (e.g.," 2312.11674v1,"In Vivo GABA Detection by Single Pulse Editing with One Shot Li An, Sungtak Hong, Maria Ferraris Araneta, Tara Turon, Christopher S. Johnson, and Jun Shen Molecular Imaging Branch, National Institute of Mental Health, National Institutes of Health, Bethesda, MD Corresponding author: Li An Building 10, Room 3D46 10 Center Drive, MSC 1216 Bethesda, MD 20892-1216 Phone: (301) 594-6868 Email: li.an@nih.gov" 2312.11678v1,"X Misinformation as a harm: structured approaches for fact-checking prioritization CONNIE MOON SEHAT, Hacks/Hackers, USA RYAN LI, Stanford University, USA PEIPEI NIE, University of Washington, USA TARUNIMA PRABHAKAR, Tattle Civic Technologies, India AMY X. ZHANG, University of Washington, USA In this work, we examined how fact-checkers prioritize which claims to inspect for further investigation and publishing, and what tools may assist them in their efforts. Specifically, through a series of interviews with 23 professional fact-checkers from around the world, we validated that harm assessment is a central component of how fact-checkers triage their work. First, we clarify what aspects of misinformation they considered to create urgency or importance. These often revolved around the potential for the claim to harm others. We also clarify the processes behind collective fact-checking decisions and gather suggestions for tools that could help with these processes. In addition, to address the needs articulated by these fact-checkers and others, we present a five-dimension framework of questions to help fact-checkers negotiate the priority of claims. Our FABLE Framework of Misinformation Harms incorporates five dimensions of magnitude—(social) Fragmentation, Actionability, Believability, Likelihood of spread, and Exploitativeness—that can help determine the potential urgency of a specific message or post when considering misinformation as harm. This effort was further validated by additional interviews with expert fact-checkers. The result is a questionnaire, a practical and conceptual tool to support fact-checkers and other content moderators as they make strategic decisions to prioritize their efforts. CCS Concepts: • Human-centered computing → Collaborative filtering. Additional Key Words and Phrases: fact-checking, harm, misinformation, taxonomy, decision-making, virality ACM Reference Format: Connie Moon Sehat, Ryan Li, Peipei Nie, Tarunima Prabhakar, and Amy X. Zhang. 2024. Misinformation as a harm: structured approaches for fact-checking prioritization. Proc. ACM Hum.-Comput. Interact. N, CSCWN, Article X ( 2024), 47 pages. https://doi.org/XXXXXXX.XXXXXX 1 INTRODUCTION Online misinformation is a major challenge for societies today. Beliefs in false claims about science, such as vaccine misinformation, can lead people to engage in harmful behavior that risks their own health. Such misinformed beliefs can also defeat public health measures that rely on collective compliance to protect society’s most vulnerable [10, 30, 38, 42]. Similarly, a belief in inaccurate or misleading narratives about topics such as vote-rigging or other supposed election interference can lower the public’s trust in democratic institutions, and in turn affect the level of participation in Authors’ addresses: Connie Moon Sehat, Hacks/Hackers, USA; Ryan Li, Stanford University, USA; Peipei Nie, University of Washington, USA; Tarunima Prabhakar, Tattle Civic Technologies, India; Amy X. Zhang, University of Washington, USA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. 2573-0142/2024/00-ARTX $15.00 https://doi.org/XXXXXXX.XXXXXX Proc. ACM Hum.-Comput. Interact., Vol. N, No. CSCWN, Article X. Publication date: 2024." 2312.11691v1,"SUSY QED with Lorentz-asymmetric fermionic matter and a glance at the electron’s EDM João Paulo S. Melo a ∗ , Wagno Cesar e Silva b † and José A. Helayël-Neto a ‡ a) Centro Brasileiro de Pesquisas Fı́sicas, Rua Dr. Xavier Sigaud 150, Urca, 22290-180, Rio de Janeiro, Brazil b) Departamento de Fı́sica, ICE, Universidade Federal de Juiz de Fora, Juiz de Fora, 36036-900, Minas Gerais, Brazil Abstract This contribution sets out to pursue the investigation of a supersymmetric electrodynamics model with Lorentz-symmetry violation (LSV) manifested by a space-time unbalance in the propagation of the fermionic charged matter. Despite violation of Lorentz symmetry, the supersymmetry algebra is kept untouched. We then adopt a superspace approach to build up an N = 1-supersymmetric Abelian gauge theory in presence of a Lorentz-violating background supermultiplet that accommodates the space-time asymmetry parameter of the charged matter. We describe, in this scenario, how the particular Lorentz-symmetry breaking, brought about by the fermionic matter, affects its (matter) scalar partners and the photon/photino that minimally couple to charged matter. From the (modified) Dirac, Klein-Gordon and Maxwell field equations, we work out the corresponding dispersion relations to inspect and discuss the physical effects of the LSV Majorana fermion condensates that naturally emerge from the background supermultiplet. Finally, we target efforts to investigate the Gordon decomposition of the charged lepton electromagnetic current. This is carried out by iterating the (fermion and scalar) matter field equations, which points to an effective contribution to the electron’s electric dipole moment (EDM). This result allows us to attain an estimate of the pseudo-vector condensate of the (LSV) Majorana background fermion. Keywords: Lorentz-symmetry violation, Supersymmetric QED, modified dispersion relations, electron’s EDM. ∗ E-mail address: joaopaulo 15@hotmail.com E-mail address: wagnorion@gmail.com ‡ E-mail address: helayel@cbpf.br †" 2312.11695v1,"Calculation of electron-impact and photo-ionization cross sections of methane using analytical Gaussian integrals Abdallah Ammar, 1, 2 Arnaud Leclerc, 1, ∗ and Lorenzo Ugo Ancarani 1 1 Université de Lorraine, CNRS, Laboratoire de Physique et Chimie Théoriques, F-57000 Metz, France 2 Present postal address: Université de Toulouse, CNRS, Laboratoire de Chimie et Physique Quantiques, 31062 Toulouse, France. The ionization by photon or electron impact of the inner (2a 1 ) and outer (1t 2 ) valence orbitals of the CH 4 molecule is investigated theoretically. In spite of a number of approximations, including a monocentric approach and a rather simple distorting molecular potential, the calculated cross sections are overall similar to those of other theoretical methods, and in reasonable agreement with experimental data. The originality of the present approach stands in the way we evaluate the transition matrix elements. The key ingredient of the calculation scheme is that the continuum radial wave function of the ejected electron is represented by a finite sum of complex Gaussian type orbitals. This numerically expensive optimization task is then largely compensated by rather simple and rapid analytical calculations of the necessary integrals, and thus all ionization observables, including cross section angular distributions. The proposed and implemented Gaussian approach is proved to be numerically very reliable in all considered kinematical situations with ejected electrons up to 2.7 a.u.. The analytical formulation of the scheme is provided here for bound molecular states described by monocentric Slater type orbitals; however, Gaussian type orbitals may be equally be employed. In combination with complex Gaussian functions for the continuum states, an all Gaussian approach with multicentric bound states can be envisaged. I. INTRODUCTION Atomic and molecular collision processes remain an active research area, both for their fundamental interest and for numerous applications for which data are needed. Experimental measurements of observables provide challenges to theoreticians who attempt to solve quantum mechanical many-body problems by necessarily making some approximations. Among the many existing processes, the photon or electron impact ionization of polyatomic molecules is a difficult one to describe theoretically (see, e.g., [1–3]). Indeed, on top of the multielectron target structure, the multicentric nature of the problem makes well-established atomic scattering tools inadequate and inappropriate. This is true already for small molecules such as water or methane, and is worse with molecules lacking simple symmetries and/or of increasing size. For atomic ionization processes, experimental advances allow nowadays for measurements of angular distributions of multiply differential cross sections, thus providing stringent tests to theoretical models. Theoretical developments have also made huge progress. For example, they allow today for an essentially exact numerical calculation of the pure three-body problem in the continuum (see, e.g., [4]), as with calculations of differential cross sections for the single ionization of hydrogen by electron impact (see, e.g., [5–7]) or for the double photoionization of helium (see, e.g., [8–11]). Over the last decades, and going beyond the three-body case, the ionization of other atoms by photons or electrons has been studied ∗ arnaud.leclerc@univ-lorraine.fr through a variety of nonperturbative and perturbative methods; each of them present advantages but also limitations, necessarily entail some approximations to the many-body problem, and have different degrees of success. Many methods exist also in the case of molecular targets. From a theoretical point of view, one critical issue when dealing with ionization processes in molecules is to describe accurately continuum states on extended spatial domains, that is to say the wave function of an electron ejected from a complex, anisotropic, multicentric system. Obviously, as molecular targets of increasing size are considered, the radial domain in which the interactions play a role is larger, and the evaluation of transition matrix elements may also present some challenges since integrals of oscillatory functions need to be evaluated. Compared to the bound part of the spectrum for which very accurate quantum chemistry tools are available, one may state that the continuum part of molecular spectra is relatively not so well mastered, except possibly for diatomic molecules. As a result, and because of the many-body aspects of the system, calculated ionization observables are generally only in fair agreement with available experimental data. There is clearly room for improvement especially when the focus is on the angular distributions of differential cross sections which provide the most detailed information on the physical process. The spherical symmetry of atomic targets allow for standard partial wave techniques to be implemented within scattering theory. Such tools have to be adapted or modified in the case of molecules. For bound states the multicentric aspects are essentially mastered, in particular with the use of real Gaussian Type Orbitals (rGTOs) centered on different nuclei (see, e.g., [12]); the calculation of one- and two-electron integrals is greatly facilitated by a number of mathematical properties, including" 2312.11707v1,"Unified framework for diffusion generative models in SO(3): applications in computer vision and astrophysics Yesukhei Jagvaral 1,2 , Francois Lanusse 3 , Rachel Mandelbaum 1,2 1 2 McWilliams Center for Cosmology, Department of Physics, Carnegie Mellon University, Pittsburgh, PA 15213 USA NSF AI Planning Institute for Data-Driven Discovery in Physics, Carnegie Mellon University, Pittsburgh, PA 15213 USA 3 AIM, CEA, CNRS, Universite Paris-Saclay, Universite Paris Cite, 91191 Gif-sur-Yvette, France yjagvara@andrew.cmu.edu Abstract Diffusion-based generative models represent the current stateof-the-art for image generation. However, standard diffusion models are based on Euclidean geometry and do not translate directly to manifold-valued data. In this work, we develop extensions of both score-based generative models (SGMs) and Denoising Diffusion Probabilistic Models (DDPMs) to the Lie group of 3D rotations, SO(3). SO(3) is of particular interest in many disciplines such as robotics, biochemistry and astronomy/cosmology science. Contrary to more general Riemannian manifolds, SO(3) admits a tractable solution to heat diffusion, and allows us to implement efficient training of diffusion models. We apply both SO(3) DDPMs and SGMs to synthetic densities on SO(3) and demonstrate state-of-the-art results. Additionally, we demonstrate the practicality of our model on pose estimation tasks and in predicting correlated galaxy orientations for astrophysics/cosmology. 1 Introduction Deep generative models (DGM) are trained to learn the underlying data distribution and then generate new samples that match the empirical data. There are several classes of deep generative models, including Generative Adversarial Networks (Goodfellow et al. 2014), Variational Auto Encoders (Kingma and Welling 2013) and Normalizing Flows (Rezende and Mohamed 2015). Recently, a new class of DGMs based on Diffusion, such as Denoising Diffusion Probabilistic Models (DDPM) (Ho, Jain, and Abbeel 2020) and Score Matching with Langevin Dynamics (SMLD) , a subset of general score-based generative models (SGMs), (Song and Ermon 2019), have achieved state-of-the-art quality in generating images, molecules, audio and graphs 1 (Song et al. 2021). Unlike GANs, training diffusion models is usually very stable and straightforward, they do not suffer as much from mode collapse issues, and they can generate images of similar quality. In parallel with the success of these diffusion models, (Song et al. 2021) demonstrated that both SGMs and DDPMs can mathematically be understood as variants of the same process. In both cases, the data distribution is progressively perturbed by a noise diffusion process defined Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 For a comprehensive list of articles on score-based generative modeling, see https://scorebasedgenerativemodeling.github.io/ by a specific Stochastic Differential Equation (SDE), which can then be time-reversed to generate realistic data samples from initial noise samples. While the success of diffusion models has mainly been driven by data with Euclidean geometry (e.g., images), there is great interest in extending these methods to manifoldvalued data, which are ubiquitous in many scientific disciplines. Examples include high-energy physics (Brehmer and Cranmer 2020; Craven et al. 2022), astrophysics (Hemmati et al. 2019), geoscience (Gaddes, Hooper, and Bagnardi 2019), and biochemistry (Zelesko et al. 2020). Very recently, pioneering work has started to develop generic frameworks for defining SGMs on arbitrary compact Riemannian manifolds (De Bortoli et al. 2022), and non-compact Riemannian manifolds (Huang et al. 2022). In this work, instead of considering generic Riemannian manifolds, we are specifically concerned with the Special Orthogonal group in 3 dimensions, SO(3), which corresponds to the Lie group of 3D rotations. Modeling 3D orientations is of particularly high interest in many fields including for instance in robotics (estimating the pose of an object, Hoque et al. 2021); and in biochemistry (finding the conformation angle of molecules that minimizes the binding energy, Mansimov et al. 2019). Contrary to more generic Riemannian manifolds, SO(3) benefits from specific properties, including a tractable heat kernel and efficient geometric ODE/SDE solvers, that will allow us to define very efficient diffusion models specifically for this manifold. The contributions of our paper are summarized as follows: • We reformulate Euclidean diffusion models on the SO(3) manifold, and demonstrate how the tractable heat kernel solution on SO(3) can be used to recover simple and efficient algorithms on this manifold. • We provide concrete implementations of both Score- Based Generative Model and Denoising Diffusion Probabilistic Models specialized for SO(3). • We reach a new state-of-the-art in sample quality on synthetic SO(3) distributions with our proposed SO(3) Score- Based Generative Model. • We demonstrate the practicality and the expressive utility of our model in computer vision and astrophysics." 2312.11712v1,"A Simple and Practical Method for Reducing the Disparate Impact of Differential Privacy Lucas Rosenblatt 1 , Julia Stoyanovich 1 , Christopher Musco 1 1 New York University {lucas.rosenblatt, stoyanovich, cmusco}@nyu.edu Abstract Differentially private (DP) mechanisms have been deployed in a variety of high-impact social settings (perhaps most notably by the U.S. Census). Since all DP mechanisms involve adding noise to results of statistical queries, they are expected to impact our ability to accurately analyze and learn from data, in effect trading off privacy with utility. Alarmingly, the impact of DP on utility can vary significantly among different sub-populations. A simple way to reduce this disparity is with stratification. First compute an independent private estimate for each group in the data set (which may be the intersection of several protected classes), then, to compute estimates of global statistics, appropriately recombine these group estimates. Our main observation is that naive stratification often yields high-accuracy estimates of population-level statistics, without the need for additional privacy budget. We support this observation theoretically and empirically. Our theoretical results center on the private mean estimation problem, while our empirical results center on extensive experiments on private data synthesis to demonstrate the effectiveness of stratification on a variety of private mechanisms. Overall, we argue that this straightforward approach provides a strong baseline against which future work on reducing utility disparities of DP mechanisms should be compared. Introduction Two moral and legal imperatives, data privacy and algorithmic equity, have received significant recent research attention. For ensuring data privacy, differential privacy (DP) has emerged as a gold standard technique (Dwork, Roth et al. 2014). 1 Academics and practitioners alike use DP algorithms to solve problems with sensitive data; notably, big tech companies like Google, Microsoft and Apple rely on differential privacy for protecting customer data (Erlingsson, Pihur, and Korolova 2014; Ding, Kulkarni, and Yekhanin 2017; Cormode et al. 2018). One recent high-profile use of DP was in the 2020 United States Census, which includes statistical disclosures with data for millions of Americans (Bureau 2021; Christ, Radway, and Bellovin 2022; Groshen and Goroff 2022; Hawes 2020). Additionally, a wide variety of popular algorithms have DP versions, from fundamental Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.main.org). All rights reserved. 1 We will use “DP” to mean “differential privacy” or “differentially private,” depending on the context. statistical methods (Dwork, Roth et al. 2014), to machine learning (Ji, Lipton, and Elkan 2014) and even deep learning (Abadi et al. 2016) techniques. However, DP can be in tension with algorithmic equity, where, unlike for privacy, there is no “gold standard” definition, and where potential harms are murky and plentiful (Corbett-Davies and Goel 2018; Mitchell et al. 2021). The 2020 Census, for example, was criticized over concerns that DP techniques would have adverse impacts on estimating demographic proportions (Ruggles et al. 2019) and on redistricting (Kenny et al. 2021). In fact, much attention has been paid lately to disparities in performance of DP mechanisms in a variety of settings, and to potential harms resulting from such disparities (Fioretto et al. 2022). Many of these works demonstrate disparities in performance for different demographic groups within the data (Bagdasaryan, Poursaeed, and Shmatikov 2019; Ganev, Oprisanu, and De Cristofaro 2022). In-line with recent literature, we broadly refer to such disparities as the disparate impact of DP. As a concrete example, consider the problem of DP data synthesis. Suppose we have a data set X that can be split into k disjoint groups G 1 ∪ . . . ∪ G k = X, each of which might contain individuals in the intersection of several protected classes. A concern could be that a private data synthesis method run on X does not faithfully represent the data distribution for some of these groups, which can lead to technical bias (Friedman and Nissenbaum 1996) — in the sense of disparities in accuracy, appropriately measured — when machine learning (ML) models or statistics are fit to the synthetic data (Ganev, Oprisanu, and De Cristofaro 2022). Contributions With the above example in mind, our paper analyzes a baseline approach to address the disparate impact of DP mechanisms: stratification. We note that general stratification-based methods are fundamental in statistics and may already be used by practitioners in privatizing data; however, we do not know of any work that formally employs stratification to address the disparate impact of DP. In particular, we could simply run a DP mechanism separately on G 1 , . . . , G k and report the results. If we have access to publicly available estimates of the size of each group, we could then take a weighted combination of the results to get a statistical estimate, or to generate DP synthetic data, for the global population. For example, we might fit data synthe-" 2312.11731v1,"December 2023 The force-force correlator at the hard thermal scale of hot QCD Jacopo Ghiglieri a,∗ , Philipp Schicho b,† , Niels Schlusser c,‡ , Eamonn Weitz a,§ a SUBATECH, Université de Nantes, IMT Atlantique, IN2P3/CNRS, 4 rue Alfred Kastler, La Chantrerie BP 20722, 44307 Nantes, France b Institute for Theoretical Physics, Goethe Universität Frankfurt, 60438 Frankfurt, Germany c Biozentrum, University of Basel, Spitalstrasse 41, 4056 Basel, Switzerland Abstract High-energy particles traversing the Quark-Gluon plasma experience modified (massive) dispersion, although their vacuum mass is negligible compared to the kinetic energy. Due to poor convergence of the perturbative series in the regime of soft loop momenta, a more precise determination of this effective mass is needed. This paper continues our investigation on the factorisation between strongly-coupled infrared classical and perturbative ultraviolet behavior. The former has been studied non-perturbatively within EQCD by determining a non-local operator on the lattice. By computing the temperature-scale contribution to the same operator in 4D QCD at next-to-leading order (NLO), we remove the ultraviolet divergence of the EQCD calculation with an opposite infrared divergence from the hard thermal scale. The result is a consistent, regulator-independent determination of the classical contribution where the emergence of new divergences signals sensitivities to new regions of phase space. We address the numerical impact of the classical and NLO thermal corrections on the convergence of the factorised approach and on the partial applicability of our results to calculations of transport coefficients. ∗ jacopo.ghiglieri@subatech.in2p3.fr schicho@itp.uni-frankfurt.de ‡ niels.schlusser@unibas.ch § eamonn.weitz@subatech.in2p3.fr †" 2312.11735v1,"Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions David D. Nguyen 1,2,3 , David Liebowitz 1,4 , Surya Nepal 2,3 Salil S. Kanhere 1,3 1 UNSW Sydney CSIRO Data61 3 Cybersecurity CRC 4 Penten david.nguyen@data61.csiro.au, david.liebowitz@penten.com, surya.nepal@data61.csiro.au, salil.kanhere@unsw.edu.au 2 Abstract In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios. Current deep learning techniques to address multiple-output problems are based on two main methodologies: (1) mixture density networks, which suffer from poor stability at high dimensions, or (2) multiple choice learning (MCL), an approach that uses M single-output functions, each only producing a point estimate hypothesis. This paper presents a Mixture of Multiple-Output functions (MoM) approach using a novel variant of dropout, Multiple Hypothesis Dropout. Unlike traditional MCL-based approaches, each multiple-output function not only estimates the mean but also the variance for its hypothesis. This is achieved through a novel stochastic winner-take-all loss which allows each multiple-output function to estimate variance through the spread of its subnetwork predictions. Experiments on supervised learning problems illustrate that our approach outperforms existing solutions for reconstructing multimodal output distributions. Additional studies on unsupervised learning problems show that estimating the parameters of latent posterior distributions within a discrete autoencoder significantly improves codebook efficiency, sample quality, precision and recall. 1 Introduction Multiple-output prediction is the task of generating a variety of real-valued outputs given the same input, a powerful tool in scenarios that require a comprehensive understanding of multiple potential possibilities. This approach has demonstrated an extensive ability to capture diversity, creativity and uncertainty across many domains including generative modelling (Graves 2013; Ha and Eck 2017; Nguyen, Nepal, and Kanhere 2021), computer vision (Guzman-Rivera et al. 2014; Firman et al. 2018), pedestrian trajectory prediction (Makansi et al. 2019), spectral analysis (Bishop 1994), robotic movement (Zhou, Gao, and Asfour 2020) and reinforcement learning (Ha and Schmidhuber 2018). Multiple-output prediction is a generalization of traditional single-output prediction. In the supervised learning Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. context, a single-output function is given a dataset of inputoutput pairs {(x n , y n ) | n ∈ {1, . . . , N }, x n ∈ X , y n ∈ Y} (Guzman-Rivera, Batra, and Kohli 2012). The objective of the single-output function f ω : X 7→ Y is to learn a mapping from a single input in input-space to single output in output-space using a set of parameters ω. It seeks to minimizes a loss function L : Y × Y 7→ R + that computes the distance between its predictions ŷ n and targets ŷ n . A multiple-output function F : X 7→ Y M can learn a mapping from input space to an M -tuple of outputs Ŷ n = {ŷ n 1 , . . . , ŷ n M |ŷ n M ∈ Y}. Multiple-output functions based on neural networks (NNs) can be categorized into two main types: those that produce multiple point estimates and those that produce multi-modal distributions. An effective class of algorithms that fall into the first group is based on multiple-choice learning (MCL) (Guzman-Rivera, Batra, and Kohli 2012; Guzman-Rivera et al. 2014; Lee et al. 2016, 2017; Firman et al. 2018). This class of algorithms construct an ensemble of M single-output functions that each produce single point estimates and are trained using a winner-take-all (WTA) loss function. MCL techniques are well-known for being stable and have been demonstrated on high-dimensional datasets such as images (Guzman-Rivera et al. 2014; Firman et al. 2018). However, a common criticism of MCL algorithms is that it requires the practitioner to arbitrarily choose the hyper-parameter M , which also assumes an equal number of predictors and targets for any given input. These models are also challenging to scale as increasing the number of single-output functions in the ensemble can be expensive from a computational and parameterization perspective. The second approach to multiple-output prediction represents different modes of y n with the same input value x n as separate distributions. This is advantageous over pointestimate approaches because it provides an estimation of uncertainty through the covariance. Mixture density networks (MDN) (Bishop 1994) use the outputs of a neural network (NN) to predict the parameters of a mixture of Gaussians. A part of the outputs is used to predict mixture coefficients, while the remainder is used to parameterize each individual mixture component. MDNs at higher dimensions, however, are difficult to optimize with stochastic gradient descent due to numerical instability and mode collapse and require special initialization schemes (Rupprecht et al. 2017; Cui et al." 2312.11736v1,"Equilibrium Contact Angles and Dewetting in Capillaries Leonid Pekker a) , FujiFilm Dimatix, Inc. Lebanon, New Hampshire 03766, USA David Pekker, University of Pittsburgh, Pittsburgh, Pennsylvania, USA James Myrick, FujiFilm Dimatix, Inc. Lebanon, New Hampshire 03766, USA a) Author to whom correspondence should be addressed: leonid.pekker@fujifilm.com Abstract In this work, we extend the model of contact angles that we have previously developed for sessile drops on a wetted surface to the case of a meniscus in a capillary. The underlying physics of our model describe the intermolecular forces between the fluid and the surface of the capillary that result in the formation of a thin, non-removable fluid layer that coats the capillary wall. We describe the shape of the meniscus using a Young-Laplace equation and an incompressible, two-phase, CFD calculation, both modified to take into account intermolecular forces using the disjoining pressure model. We find that our numerical solutions of the Young-Laplace equation and equilibrium meniscus shapes obtained by CFD agree well with each other. Furthermore, for capillaries that are sufficiently larger than the thickness of the non-removable film, our numerical solutions agree well with the effective contact angle model that we previously developed for sessile drops. Finally, we observe that it is possible to tune the disjoining pressure model parameters so that the intermolecular forces between the liquid and solid molecules becomes so strong compared to the surface tension that our formula for effective contact angle gives an imaginary solution. We analyze this situation using CFD and find that it corresponds to dewetting, where the bulk liquid detaches from the walls of the capillary leaving behind the non-removable thin liquid film. 1" 2312.11745v1,"A novel multi-stage multi-scenario multi-objective optimisation framework for adaptive robust decision-making under deep uncertainty Babooshka Shavazipour ∗1,2 and Theodor J.Stewart 2 1 University of Jyvaskyla, Faculty of Information Technology, P.O. Box 35 (Agora), FI-40014 University of Jyvaskyla, Finland 2 Department of Statistical Sciences, University of Cape Town, Rondebosch, Cape Town, South Africa Abstract Many real-world decision-making problems involve multiple decision-making stages and various objectives. Besides, most of the decisions need to be made before having complete knowledge about all aspects of the problem leaves some sort of uncertainty. Deep uncertainty happens when the degree of uncertainty is so high that the probability distributions are not confidently knowable. In this situation, using wrong probability distributions lead to failure. Scenarios, instead, should be used to evaluate the consequences of any decisions in different plausible futures and find a robust solution. In this study, we proposed a novel multi-stage multi-scenario multiobjective optimisation framework for adaptive robust decision-making under deep uncertainty. Two approaches, named multi-stage multi-scenario multi-objective and two-stage moving horizon, have been proposed and compared. Finally, the proposed approaches are applied in a case study of sequential portfolio selection under deep uncertainty and the robustness of their solutions is discussed. Keywords: Multi-objective optimisation, Multi-criteria decision-making, Scenario planning, Goal programming, Deep uncertainty, Dynamic robustness. 1 Introduction Sustainable decision-making requires simultaneous consideration of multiple conflicting objectives, e.g., economics versus environmental and social objectives. Typically, there is no single optimal solution satisfying all the conflicting objectives at the same time. Instead, there are several compromises called Pareto optimal with different trade-offs. Therefore, the decision-maker must find the most balanced Pareto optimal solution based on their preferences. Because the Pareto optimal solutions are unknown a priori, additional support is needed to generate those solutions (e.g., utilising mathematical models) and help the decision-maker in trade-off analyses and decision-making. Multi-objective optimisation methods have been designed to provide this kind of support to decision-makers (see, e.g., Hwang & Masud (1979), Steuer & E (1986), Miettinen (1999) and references therein). They ∗ Corresponding author Email addresses: babooshka.b.shavazipour@jyu.fi, b.shavazipour@gmail.com (Babooshka Shavazipour) 1" 2312.11747v1,"Robust Stochastic Graph Generator for Counterfactual Explanations Mario Alfonso Prado-Romero * 1 , Bardh Prenkaj * 2 , Giovanni Stilo 3 1 Gran Sasso Science Institute 2 Sapienza University of Rome 3 University of L’Aquila marioalfonso.prado@gssi.it, prenkaj@di.uniroma1.it, giovanni.stilo@univaq.it https://github.com/MarioTheOne/GRETEL Abstract Counterfactual Explanation (CE) techniques have garnered attention as a means to provide insights to the users engaging with AI systems. While extensively researched in domains such as medical imaging and autonomous vehicles, Graph Counterfactual Explanation (GCE) methods have been comparatively under-explored. GCEs generate a new graph similar to the original one, with a different outcome grounded on the underlying predictive model. Among these GCE techniques, those rooted in generative mechanisms have received relatively limited investigation despite demonstrating impressive accomplishments in other domains, such as artistic styles and natural language modelling. The preference for generative explainers stems from their capacity to generate counterfactual instances during inference, leveraging autonomously acquired perturbations of the input graph. Motivated by the rationales above, our study introduces RSGG-CE, a novel Robust Stochastic Graph Generator for Counterfactual Explanations able to produce counterfactual examples from the learned latent space considering a partially ordered generation sequence. Furthermore, we undertake quantitative and qualitative analyses to compare RSGG- CE’s performance against SoA generative explainers, highlighting its increased ability to engendering plausible counterfactual candidates. 1 Introduction Explainability is crucial in sensitive domains to enable users and service providers to make informed and reliable decisions (Guidotti et al. 2018). However, deep neural networks, commonly used for generating predictions, often suffer from a lack of interpretability, widely referred to as the black-box problem (Petch, Di, and Nelson 2021), hindering their wide adoption in domains such as healthcare and finance. On the other end of the spectrum of explainability, we find inherently interpretable white-box prediction models (Loyola-González 2019), which are preferred for decisionmaking purposes (Verenich et al. 2019). Alas, black-box models demonstrate superior performance and generalisation capabilities when dealing with high-dimensional data (Aragona et al. 2021; Ding et al. 2019; Feng, Tang, and Liu 2019; Huang et al. 2020; Madeddu, Stilo, and Velardi 2020; * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Prenkaj et al. 2021, 2020, 2023a; Verma, Mandal, and Gupta 2022; Wang, Yu, and Miao 2017). Recently, deep learning (relying on GNNs (Scarselli et al. 2008)) has been beneficial in solving graph-based prediction tasks, such as community detection (Wu et al. 2022), link prediction (Wei et al. 2022), and session-based recommendations (Wu et al. 2019; Xu, Xi, and Wang 2021). Despite their remarkable performance, GNNs are black boxes, making them unsuitable for high-impact and high-risk scenarios. The literature has proposed several post-hoc explainability methods to understand what is happening under the hood of the prediction models. Specifically, counterfactual explainability is useful to understand how modifications in the input lead to different outcomes. Similarly, a recent field in Graph Counterfactual Explainability (GCE) has emerged (Prado-Romero et al. 2023). We provide the reader with an example that helps clarify a counterfactual example in graphs. Suppose we have a social network where a specific user U posts an illicit advertisement, thus violating the Terms of Service (ToS). A counterfactual explanation of U ’s account suspension would be if the user had refrained from writing the post about selling illegal goods, her account would not have been banned. Generally, GCE methods can be search, heuristic, and learning-based approaches (Prado-Romero et al. 2023). Search-based approaches find counterfactual examples within the data distribution. Heuristic-based approaches perturb the original graph G into G ′ such that, for a certain prediction model Φ, namely oracle, Φ(G) 6 = Φ(G ′ ) without accessing the dataset G. In other words, G ′ can be outside the data distribution of G ′ . Heuristic-based approaches suffer the need to define the perturbation heuristic (e.g., rules), which might come after careful examination of the data and involve domain expertise to express how the input graph should be perturbed faithfully. For instance, producing valid counterfactuals for molecules requires knowledge about atom valences and chemical bonds. Contrarily, learning-based approaches learn the generative “heuristic” based on the data. This kind of explainer is trained on samples and thus can be used to produce counterfactual instances at inference time. In this work, we propose RSGG-CE, a Robust Stochastic Graph Generator for Counterfactual Explanations, to produce counterfactual examples from the learned latent space considering a partially ordered generation sequence. RSGG-" 2312.11748v1,"U LTRASOUND I MAGE E NHANCEMENT USING C YCLE GAN AND P ERCEPTUAL L OSS Shreeram Athreya 1 , Ashwath Radhachandran 2 , Vedrana Ivezić 3 , Vivek Sant 4 , Corey W. Arnold 1,2,3,5,6 , and William Speier * 2,3,5 1 Department of Electrical and Computer Engineering, UCLA 2 Department of Bioengineering, UCLA 3 Medical Informatics, UCLA 4 Department of Surgery, UT Southwestern Medical Center 5 Department of Radiological Sciences, UCLA 6 Department of Pathology, UCLA Email: speier@ucla.edu A BSTRACT Purpose: The objective of this work is to introduce an advanced framework designed to enhance ultrasound images, especially those captured by portable hand-held devices, which often produce lower quality images due to hardware constraints. Additionally, this framework is uniquely capable of effectively handling non-registered input ultrasound image pairs, addressing a common challenge in medical imaging. Materials and Methods: In this retrospective study, we utilized an enhanced generative adversarial network (CycleGAN) model for ultrasound image enhancement across five organ systems. Perceptual loss, derived from deep features of pretrained neural networks, is applied to ensure the human-perceptual quality of the enhanced images. These images are compared with paired images acquired from high resolution devices to demonstrate the model’s ability to generate realistic high-quality images across organ systems. Results: Preliminary validation of the framework reveals promising performance metrics. The model generates images that result in a Structural Similarity Index (SSI) score of 0.722, Locally Normalized Cross-Correlation (LNCC) score of 0.902 and 28.802 for the Peak Signal-to-Noise Ratio (PSNR) metric. Conclusion: This work presents a significant advancement in medical imaging through the development of a CycleGAN model enhanced with Perceptual Loss (PL), effectively bridging the quality gap between ultrasound images from varied devices. By training on paired images, the model not only improves image quality but also ensures the preservation of vital anatomic structural content. This approach may improve equity in access to healthcare by enhancing portable device capabilities, although further validation and optimizations are necessary for broader clinical application. 1 Introduction Ultrasound imaging holds a pivotal role in the field of medical diagnostics, offering non-invasive, highly accurate point of care assessments that have been increasingly adopted by healthcare professionals. Historically, the technology has been limited to large, expensive devices typically found in specialized medical settings. However, there has been a transformative shift towards the development and adoption of compact, hand-held ultrasound devices. These smaller devices promise to democratize access to medical imaging by making it more affordable and widely available. Yet, the miniaturization and cost-effectiveness often come at the expense of image quality, a trade-off primarily attributable to hardware constraints [1]. Machine learning algorithms have been explored to enhance low-quality images without hardware improvements. For instance, generative adversarial networks (GANs) have been used to create high-quality reconstructions of ultrasound images and videos, offering a cost-efficient avenue for the enhancement of portable ultrasound devices [2, 3, 4]. The CycleGAN framework has" 2312.11753v1,"1 Poker Hand History File Format Specification Juho Kim Faculty of Applied Science and Engineering University of Toronto, Toronto, Ontario, Canada juho.kim@mail.utoronto.ca Abstract—This paper introduces the Poker Hand History (PHH) file format, designed to standardize the recording of poker hands across different game variants. Despite poker’s widespread popularity in the mainstream culture as a mind sport and its prominence in the field of artificial intelligence (AI) research as a benchmark for imperfect information AI agents, it lacks a consistent format that humans can use to document poker hands across different variants that can also easily be parsed by machines. To address this gap in the literature, we propose the PHH format which provides a concise human-readable machinefriendly representation of hand history that comprehensively captures various details of the hand, ranging from initial game parameters and actions to contextual parameters including but not limited to the venue, players, and time control information. In the supplementary, we provide over 10,000 hands covering 11 different variants in the PHH format. Building on our previous work on PokerKit, a premier poker hand simulation tool, we demonstrate the usages of our open-source Python implementation of the PHH parser. The source code of the parser is available on GitHub: https://github.com/uoftcprg/pokerkit Index Terms—Board games, Card games, Games of chance, Game design, Multi-agent systems, Poker, Rule based systems, Scripting, Strategy games I. I NTRODUCTION OKER is a popular card game with a stochastic nature and imperfect information aspect that has not only captured the mainstream attention as a leading mind sport but also served as a benchmark of artificial intelligence (AI) research, namely in the development of imperfect information AI agents. Pioneering breakthroughs in imperfect information gamesolving algorithms have often been accompanied by their applications in state-of-the-art poker AI agents as seen in the example of Rhode Island hold ’em [1], fixed-limit Texas hold ’em [2], heads-up no-limit Texas hold ’em [3], [4], and 6- max no-limit Texas hold ’em [5]. Successive state-of-the-art algorithms were shown to solve games of progressively larger game tree sizes. While impressive, the applications of these algorithms were mostly limited to the Texas hold ’em variant. There exists countless variants of poker that introduce different rules and actions not present in Texas hold ’em [6], [7] that can serve as new challenges in the development of imperfect information AI agents. For instance, Omaha variants involve four hole cards per player instead of simply two, which increases the range of possible holdings of opponents, further increasing the game tree size. Another popular variant, lowball draw, introduces shifting hidden information depending on the discards and draws unlike Texas hold ’em where the players’ hole cards remain unchanged throughout the hand. P The lack of exploration in the aforementioned areas of computer poker can partly be explained by the lack of reliable open-source multivariant poker tooling. Our recent work on PokerKit [8] aimed to provide a robust implementation of poker simulation and hand evaluation suite to address this absence and has since established itself as a popular tool in computational poker. However, our previous efforts in the digitalization of poker were only partially complete, as we provided no means to record poker hands for persistent storage and subsequent analysis. This is partly due to the fact that there does not exist a standardized format for recording poker games that is not only human-friendly but also easily parsable by computer software akin to the portable game notation (PGN) for chess [9] or smart game format (SGF) for go [10]. This paper proposes a novel open Poker Hand History (PHH) file format designed to provide a consistent method to annotate poker hands across different variants in addition to capturing other details of the game including but not limited to the venue, players, and time control information that can aid in domains such as poker AI agent development, historical analysis, and data referencing. In the next section, we provide some motivational examples that showcase the versatility of the PHH notation. This is followed by an exploration of the related works in the literature that introduce alternatives to our proposal with which we later run benchmarks for comparison purposes. Then, we provide the detailed specification of the PHH format, listing the required and optional fields used to comprehensively describe poker hands in addition to various recommendations in file formatting, style guides, and parser implementation. Finally, for demonstrative purposes, we provide sample usages of our open-source Python PHH reader and writer which uses PokerKit as the simulation backend. In the supplementary, over 10,000 sample poker hands, covering 11 different poker variants and composed of small selections of historical or notable hands, all 83 televised hands in the 2023 WSOP Event #43: $50,000 Poker Players Championship (PPC) — Day 5 [11], and the hands played by Pluribus in Brown and Sandholm [5], are provided in the PHH file format. II. M OTIVATIONAL E XAMPLES Figures 1 and 2 show two historical poker hands digitalized into the PHH format. The former involves the first televised million-dollar pot between Tom Dwan and Phil Ivey in the" 2312.11754v1,"A Bayesian Spatial Model to Correct Under-Reporting in Urban Crowdsourcing Gabriel Agostini, Emma Pierson†, Nikhil Garg† Cornell Tech, New York, United States gsagostini@infosci.cornell.edu, emma.pierson@cornell.edu, ngarg@cornell.edu Abstract Decision-makers often observe the occurrence of events through a reporting process. City governments, for example, rely on resident reports to find and then resolve urban infrastructural problems such as fallen street trees, flooded basements, or rat infestations. Without additional assumptions, there is no way to distinguish events that occur but are not reported from events that truly did not occur–a fundamental problem in settings with positive-unlabeled data. Because disparities in reporting rates correlate with resident demographics, addressing incidents only on the basis of reports leads to systematic neglect in neighborhoods that are less likely to report events. We show how to overcome this challenge by leveraging the fact that events are spatially correlated. Our framework uses a Bayesian spatial latent variable model to infer event occurrence probabilities and applies it to storminduced flooding reports in New York City, further pooling results across multiple storms. We show that a model accounting for under-reporting and spatial correlation predicts future reports more accurately than other models, and further induces a more equitable set of inspections: its allocations better reflect the population and provide equitable service to non-white, less traditionally educated, and lower-income residents. This finding reflects heterogeneous reporting behavior learned by the model: reporting rates are higher in Census tracts with higher populations, proportions of white residents, and proportions of owner-occupied households. Our work lays the groundwork for more equitable proactive government services, even with disparate reporting behavior. 1 Introduction Urban crowdsourcing is key to identifying and resolving problems such as fallen street trees and flooded basements, in both emergency and daily contexts. For example, New York City’s 311 system received over 3 million service requests in 2021 (NYC Open Data 2023). However, reporting is heterogeneous – different neighborhoods, even when facing similar problems, report problems at different rates (Liu, Bhandaram, and Garg 2023; Kontokosta, Hong, and Korsberg 2017; Minkoff 2016; O’Brien et al. 2017), and under-reporting often correlates with socioeconomic factors * †Co-senior author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. such as race, ethnicity, and income. If agencies primarily address incidents that are reported, then under-reporting leads to downstream disparities. This mistargeting of resources, especially when it results in inequity, is a substantial concern and is a stated priority research area for the Federal Emergency Management Agency (FEMA) in the United States (Federal Emergency Management Agency 2023). While previous work has quantified the magnitude of reporting disparities, they do not estimate the probability that an event truly occurred at each location, which is essential for resource allocation. A challenge in estimation is that, without further assumptions, unreported incidents cannot be distinguished from incidents which did not occur. This is analogous to positive-unlabeled (PU) machine learning (Liu et al. 2003; Shanmugam and Pierson 2021), where datapoints are either labeled positive or unlabeled, and the latter group consists of both true positives and negatives. PU learning problems are unsolvable without further assumptions on the data generating process (Bekker and Davis 2020). How do we make progress? Our insight is that many urban phenomena are spatially correlated, and we can use this correlation to distinguish under-reporting from true lack of event occurrence. For example, in our empirical application, we use reporting data for flooding after a storm. If an area does not report flooding but all of its spatial neighbors do, that area is likely to have experienced flooding (but not reported it); conversely, if no neighbors report flooding, that area is not likely to have experienced flooding. Spatial correlation departs from the standard PU learning setup, where the data points are assumed to be independent. To encode spatial correlations, we build on top of a spatial Bayesian model developed in the ecology literature (Spezia, Friel, and Gimona 2018). The model uses a latent indicator variable at each location to encode whether an event truly occurs there; latent variables at adjacent locations are spatially correlated according to an Ising model (Onsager 1944). If an event does occur, the probability it generates an (observed) report varies as a function of location demographics. In semi-synthetic simulations, we show that the model infers where events have truly occurred more accurately than baseline models. For example, the model significantly outperforms a Gaussian Process (GP) in terms of AUC with an improvement of 0.14. Using this model, we develop a novel framework to iden-" 2312.11761v1,"MineObserver 2.0: A Deep Learning & In-Game Framework for Assessing Natural Language Descriptions of Minecraft Imagery Jay Mahajan, Samuel Hum, Jack Henhapl, Diya Yunus, Matthew Gadbury, Emi Brown, Jeff Ginger, H. Chad Lane University of Illinois - Urbana Champaign { jaym2, hum3, jackah2, dyunus2, gadbury2, ecbrown2, ginger, hclane}@illinois.edu Abstract MineObserver 2.0 is an AI framework that uses Computer Vision and Natural Language Processing for assessing the accuracy of learner-generated descriptions of Minecraft images that include some scientifically relevant content. The system automatically assesses the accuracy of participant observations, written in natural language, made during science learning activities that take place in Minecraft. We demonstrate our system working in real-time and describe a teacher support dashboard to showcase observations, both of which advance our previous work. We present the results of a study showing that MineObserver 2.0 improves over its predecessor both in perceived accuracy of the system’s generated descriptions as well as in usefulness of the system’s feedback. In future work we intend improve system-generated descriptions, give teachers more control and upgrade the system to perform continuous learning to more effectively and rapidly respond to novel observations made by learners. Introduction There are few challenges more important to educators and parents than helping children come to a better understanding of the world. Central to this goal is to promote their abilities to articulate what they see and observe about the natural world and to explore those observations through the lens of science (Arias and Davis 2016). In previous work we presented a prototype AI system called MineObserver (Mahajan et al. 2022) that sought to assess learner observations in the popular game Minecraft. In this paper, we report on several significant updates to that system (MineObserver 2.0) that improve it along several critical aspects. In the context of video game research, MineObserver 2.0 is a framework that uses machine learning image captioning and a Minecraft plugin that assists users in Minecraft environments designed to promote science learning. The system seeks to both assess learner observations of these worlds and deliver feedback intended to improve their ability to make accurate and productive observations primarily in the context of Astronomy learning. Background Minecraft Minecraft is an exceptionally popular game. Since its release in 2009, the user base has exploded with over 140M players and 241M logins per month and consistently ranks in the top 5 most popular games for children. 1 It spans many platforms and its players have a range of interests, ages and experience. It is referred to as a ”sandbox” game because it can be used in several different modes and contexts and often participants come up with their own challenges and meanings when playing alone or with others. The Java Edition of the game has an enormous community following and is very modifiable, which makes it an ideal candidate to create more complex teaching and learning simulations like the one exhibited in this paper. Minecraft as a Learning Environment As an extremely modifiable game, Minecraft can be used as a learning environment. Several studies (Lane and Yi 2017; Bos et al. 2014; Lim 2020; de Andrade, Poplin, and Sousa de Sena 2020) have used Minecraft to teach a variety of topics including (but not limited to) basic mathematics, civic engagement, and even music. Nearly each study found that Minecraft’s flexibility allowed the students to be more creative and have more freedom than a traditional classroom setting. A key component of learning environments is the ability to collaborate with other learners. This is easily achieved since Minecraft can be played with multiple users which can encourages collaboration including collecting difficult achievements, building large structures, and even exploring worlds that are treacherous together. Each of these tasks can be done alone, but would require a great deal of time and effort on one single player. Moreover, modifying the game via a Java plugin, programmers can create new tools or achievements that require multiple users in order to achieve a rich collaborative experience. Minecraft for Science Learning The research shared in this paper is part of the NSF-funded project WHIMC (What-If Hypothetical Implementations in Minecraft). WHIMC investigates the use of Minecraft as an educational tool for science learning, with an emphasis on Astronomy content that engages children and promotes interest in STEM (Lane et al. 2022). WHIMC is implemented 1 https://news.xbox.com/en-us/wpcontent/uploads/sites/2/2021/04/Minecraft-Franchise-Fact- Sheet April-2021.pdf" 2312.11764v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article Floating active carpets drive transport and aggregation in aquatic ecosystems G. Aguayo 1 , A. J. T. M. Mathijssen 2 , and H. N. Ulloa 3 , R. Soto 1 and F. Guzmán-Lastra 4 † 1 Departamento de Fı́sica, Facultad de Ciencias Fı́sicas y Matemáticas, Universidad de Chile, Beauchef 850, Santiago Chile 2 Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, USA 3 Department of Earth and Environmental Science, University of Pennsylvania, Philadelphia, USA 4 Departamento de Fı́sica, Facultad de Ciencias, Universidad de Chile, Las Palmeras 3425, Santiago Chile. (Received xx; revised xx; accepted xx) Communities of swimming microorganisms often thrive near liquid-air interfaces. We study how such ‘active carpets’ shape their aquatic environment by driving biogenic transport in the water column beneath the active carpet. The collective flows that these organisms generate lead to diffusive upward fluxes of nutrients from deeper water layers, and downward fluxes of oxygen and carbon. Combining analytical theory and simulations, we examine the key transport metrics including the single and pair diffusivity, the first passage time for particle pair encounters, and the rate of particle aggregation. Our findings reveal that the hydrodynamic fluctuations driven by active carpets have a region of influence that reaches orders of magnitude further in distance than the size of the organisms. These nonequilibrium fluctuations lead to a strongly enhanced diffusion of particles, which is anisotropic and space-dependent. The fluctuations also facilitate encounters of particle pairs, which we quantify by analyzing their velocity pair correlation functions as a function of distance between the particles. We found that the size of the particles plays a crucial role in their encounter rates, with larger particles situated near the active carpet being more favourable for aggregation. Overall, this research has broadened our comprehension of aquatic systems out of equilibrium, particularly how biologically driven fluctuations contribute to the transport of fundamental elements in biogeochemical cycles. Key words: active carpets, biogenic transport, diffusion and particle aggregation. 1. Introduction Swimming microorganisms that accumulate into thin and dense floating films at fluid interfaces are widespread in aquatic environments (Zhan et al. 2014; † Email address for correspondence: fguzman@uchile.cl" 2312.11767v1,"Least-cost diets to teach optimization and consumer behavior, with applications to health equity, poverty measurement and international development This version revised 18 Dec 2023, for resubmission to the Journal of Economic Education Jessica K. Wallingford 1 and William A. Masters 2* 1. PhD candidate, Friedman School of Nutrition Science and Policy, Tufts University 2. Professor, Friedman School of Nutrition Science and Policy & Dept. of Economics, Tufts Univ. * Contact author: william.masters@tufts.edu Abstract: The least-cost diet problem introduces students to optimization and linear programming, using the health consequences of food choice. We provide a graphical example, Excel workbook and Word template using actual data on item prices, food composition and nutrient requirements for a brief exercise in which students guess at and then solve for nutrient adequacy at lowest cost, before comparing modeled diets to actual consumption which has varying degrees of nutrient adequacy. The graphical example is a “three sisters” diet of corn, beans and squash, and the full multidimensional model is compared to current food consumption in Ethiopia. This updated Stigler diet shows how cost minimization relates to utility maximization, and links to ongoing research and policy debates about the affordability of healthy diets worldwide. Keywords: Excel; least cost diet; linear optimization; nutrient adequacy JEL codes: A2, I12, Q18 Online materials: The Excel workbook to implement the exercise described in this paper is available at https://sites.tufts.edu/foodecon/least-cost-diet-exercise-for-nutrient-adequacy. Acknowledgments: This work was developed for instructional purposes at Tufts University. Jess Wallingford reports financial support from a Friedman Nutrition and Citizenship Fellowship from Tufts University, and a Social Sciences and Humanities Research Council (SSHRC) Doctoral Fellowship from the Government of Canada. We are grateful to the hundreds of students at Tufts University who completed this exercise and contributed to its development, and the dozens of students and former teaching assistants who gave detailed feedback, especially Leah Costlow, Amelia Finaret, Dierdre Schiff, and Lucy Toyama. Developing this classroom exercise brought insights that underpin the Food Prices for Nutrition project described in the paper, and we are grateful to the many project collaborators for making these ideas come to life for global food security monitoring at the FAO, the World Bank, and other agencies around the world. We also thank the JEE editors and three anonymous referees whose suggestions greatly improved this paper." 2312.11775v1,"Towards SAMBA: Segment Anything Model for Brain Tumor Segmentation in Sub-Sharan African Populations Mohannad Barakat 1,2* , Noha Magdy 1,2* , Jjuuko George William 3 , Ethel Phiri 4 , Raymond Confidence 5,6 , Dong Zhang 7 and Udunna C Anazodo 5,6, 7,8,9,10 1 Department of Engineering and Applied Sciences, Nile University, Giza, Egypt Department of Computer Science, Friedrich-Alexander-Universität, Erlangen, Germany 3 Makerere University, Kampala, Uganda 4 Malawi University of Science and Technology, Malawi 5 Medical Artificial Intelligence Laboratory (MAI Lab), Lagos, Nigeria 6 Lawson Health Research Institute, London, Ontario, Canada. 7 Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada 8 Montreal Neurological Institute, McGill University, Montréal, Canada. 9 Department of Medicine, University of Cape Town, South Africa 10 Department of Clinical & Radiation Oncology, University of Cape Town, South Africa 2 mohannad.barakat@fau.de Abstract. Gliomas, the most prevalent primary brain tumors, require precise segmentation for diagnosis and treatment planning. However, this task poses significant challenges, particularly in the African population, were limited access to high-quality imaging data hampers algorithm performance. In this study, we propose an innovative approach combining the Segment Anything Model (SAM) and a voting network for multi-modal glioma segmentation. By fine-tuning SAM with bounding box-guided prompts (SAMBA), we adapt the model to the complexities of African datasets. Our ensemble strategy, utilizing multiple modalities and views, produces a robust consensus segmentation, addressing the intra-tumoral heterogeneity. Although the low quality of scans presents difficulties, our methodology has the potential to profoundly impact clinical practice in resource-limited settings such as Africa, improving treatment decisions and advancing neuro-oncology research. Furthermore, successful application to other brain tumor types and lesions in the future holds promise for a broader transformation in neurological imaging, improving healthcare outcomes across all settings. This study was conducted on the Brain Tumor Segmentation (BraTS) Challenge Africa (BraTS-Africa) dataset, which provides a valuable resource for addressing challenges specific to resource-limited settings, particularly the African population and facilitating the development of effective and more generalizable segmentation algorithms. To illustrate our approach's potential, our experiments on the BraTS-Africa dataset yielded compelling results, with SAM attaining a Dice coefficient of 86.6 for binary segmentation and 60.4 for multi-class segmentation. These outcomes serve as a testament to the promise and effectiveness of our proposed framework. Keywords: SAM, BraTS, voting network, prompt encoder, Glioma, MRI, Africa * Equal contribution" 2312.11779v1,"Are you talking to [‘xem’] or [‘x’, ‘em’]? On Tokenization and Addressing Misgendering in LLMs with Pronoun Tokenization Parity Anaelia Ovalle ∗‡ Ninareh Mehrabi † Palash Goyal † Jwala Dhamala †‡ Kai-Wei Chang ‡† Richard Zemel † Aram Galstyan † Yuval Pinter † Rahul Gupta † ‡ University of California, Los Angeles † Amazon Alexa Abstract A large body of NLP research has documented the ways gender biases manifest and amplify within large language models (LLMs), though this research has predominantly operated within a gender binary-centric context. A growing body of work has identified the harmful limitations of this gender-exclusive framing; many LLMs cannot correctly and consistently refer to persons outside the gender binary, especially if they use neopronouns. While data scarcity has been identified as a possible culprit, the precise mechanisms through which it influences LLM misgendering remain underexplored. Our work addresses this gap by studying data scarcity’s role in subword tokenization and, consequently, the formation of LLM word representations. We uncover how the Byte-Pair Encoding (BPE) tokenizer, a backbone for many popular LLMs, contributes to neopronoun misgendering through out-of-vocabulary behavior. We introduce pronoun tokenization parity (PTP), a novel approach to reduce LLM neopronoun misgendering by preserving a token’s functional structure. We evaluate PTP’s efficacy using pronoun consistency-based metrics and a novel syntax-based metric. Through several controlled experiments, finetuning LLMs with PTP improves neopronoun consistency from 14.5% to 58.4%, highlighting the significant role tokenization plays in LLM pronoun consistency. 1 Introduction Gender bias in natural language processing (NLP) has been widely studied in the context of binary gender, however mitigating harmful biases for underrepresented gender minorities remains an active area of research Sun et al. [2019], Stanczak and Augenstein [2021]. As demonstrated in prior research Dev et al. [2021], Ovalle et al. [2023], Hossain et al. [2023], large language models (LLMs) struggle with correctly addressing individuals using non-binary pronouns, especially when they are neopronouns (e.g., xe, ey) 2 . In addition to their respective findings, these works necessarily highlight the connection between LLM misgendering and data scarcity; neopronouns are often severely underrepresented in a pretraining text corpus, thus impacting the LLMs ability to learn how ∗ 2 Corresponding Author, anaelia@cs.ucla.edu https://nonbinary.wiki/wiki/English_neutral_pronouns 37th Neural Information Processing Systems Queer in AI Workshop (NeurIPS Queer in AI 2023)." 2312.11801v1,"Fast, Scalable, Warm-Start Semidefinite Programming with Spectral Bundling and Sketching Rico Angell ∗ Andrew McCallum ∗ Abstract While semidefinite programming (SDP) has traditionally been limited to moderate-sized problems, recent algorithms augmented with matrix sketching techniques have enabled solving larger SDPs. However, these methods achieve scalability at the cost of an increase in the number of necessary iterations, resulting in slower convergence as the problem size grows. Furthermore, they require iteration-dependent parameter schedules that prohibit effective utilization of warm-start initializations important in practical applications with incrementally-arriving data or mixed-integer programming. We present SpecBM, a provably correct, fast and scalable algorithm for solving massive SDPs that can leverage a warm-start initialization to further accelerate convergence. Our proposed algorithm is a spectral bundle method for solving general SDPs containing both equality and inequality constraints. Moveover, when augmented with an optional matrix sketching technique, our algorithm achieves the dramatically improved scalability of previous work while sustaining convergence speed. We empirically demonstrate the effectiveness of our method, both with and without warm-starting, across multiple applications with large instances. For example, on a problem with 600 million decision variables, SpecBM achieved a solution of standard accuracy in less than 7 minutes, where the previous state-ofthe-art scalable SDP solver requires more than 16 hours. Our method solves an SDP with more than 10 13 decision variables on a single machine with 16 cores and no more than 128GB RAM; the previous state-of-the-art method had not achieved an accurate solution after 72 hours on the same instance. We make our implementation in pure JAX publicly available 1 . 1 Introduction Semidefinite programming (SDP) is a convex optimization paradigm capable of modeling or approximating many practical problems in combinatorial optimization [3], neural network verification [26, 71], robotics [73], optimal experiment design [92], VLSI [91], and systems and control theory [15]. Despite their widespread applicability, practitioners often dismiss the use of SDPs under the assumption that optimization is intractable at real-world scale. This assumption is grounded in the prohibitively high computational complexity of standard SDP solvers (e.g. interior point methods [5, 90]). The main challenge when solving SDPs with standard constrained optimization approaches is the high cost of projection onto the feasible region. Projecting a symmetric matrix onto the semidefinite cone requires a full eigendecomposition, an operation that scales cubicly with the problem dimension. The high computational cost of this single operation severely limits the applicability of projected gradient and ADMM-based approaches [18, 69]. Interior point methods, the de facto approach for solving small-to-moderate sized SDPs, require even more computational resources. Projection-free and conditional gradient-based methods have been proposed to avoid the computational burden of projecting iterates onto the semidefinite cone [10, 104, 106]. These methods avoid projection onto the feasible region with various techniques including subgradient descent in ∗ Manning College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA. Correspondence to Rico Angell (rangell@cs.umass.edu). 1 https://github.com/rangell/specbm 1" 2312.11813v1,"U RBAN G ENERATIVE I NTELLIGENCE (UGI): A F OUNDATIONAL P LATFORM FOR A GENTS IN E MBODIED C ITY E NVIRONMENT A P REPRINT Fengli Xu ∗ Jun Zhang ∗ Chen Gao ∗ Jie Feng Yong Li Tsinghua University, Beijing, China {fenglixu, chgao96, liyong07}@tsinghua.edu.cn December 20, 2023 A BSTRACT Urban environments, characterized by their complex, multi-layered networks encompassing physical, social, economic, and environmental dimensions, face significant challenges in the face of rapid urbanization. These challenges, ranging from traffic congestion and pollution to social inequality, call for advanced technological interventions. Recent developments in big data, artificial intelligence, urban computing, and digital twins have laid the groundwork for sophisticated city modeling and simulation. However, a gap persists between these technological capabilities and their practical implementation in addressing urban challenges in an systemic-intelligent way. This paper proposes Urban Generative Intelligence (UGI), a novel foundational platform integrating Large Language Models (LLMs) into urban systems to foster a new paradigm of urban intelligence. UGI leverages CityGPT, a foundation model trained on city-specific multi-source data, to create embodied agents for various urban tasks. These agents, operating within a textual urban environment emulated by city simulator and urban knowledge graph, interact through a natural language interface, offering an open platform for diverse intelligent and embodied agent development. This platform not only addresses specific urban issues but also simulates complex urban systems, providing a multidisciplinary approach to understand and manage urban complexity. This work signifies a transformative step in city science and urban intelligence, harnessing the power of LLMs to unravel and address the intricate dynamics of urban systems. The code repository with demonstrations will soon be released here https://github.com/tsinghua-fib-lab/UGI. 1 Introduction Urban are complex systems with dynamic and multi-layered networks encompassing physical elements (buildings, roads, infrastructure), social structures (population distribution, organizations, culture), economic activities (industry, services, commerce), and environmental factors (natural resources, ecosystems, climate change) [10, 15, 17]. This intricate interplay creates uncertainty and dynamism, reflecting the complex interactions between human activities and the urban environment [17]. Each individual, community, and organization within these systems is interconnected, influencing the city’s overall characters and functionality [99]. The primary challenge in urban complex systems is balancing economic growth, social welfare, and environmental sustainability amid rapid urbanization, and it faces critical challenges including traffic congestion, environmental pollution, resource scarcity, and infrastructure strain, all exacerbated by rapid urbanization [184]. Besides, social inequality and housing issues further impact residents’ quality of life. The growing threats of climate change, such as extreme weather and rising sea levels, add to these challenges, highlighting the urgent need for solutions. Addressing these prominent urban issues is essential to ensure sustainable, equitable urban development and maintain the vitality of cities in a rapidly evolving global context [2]. In order to address above problems, the recent technological evolution began with big data, which provided rich and variety urban information [178]. The complexity of this data necessitated the development of artificial intelligence (AI) for effective description, prediction and management [186]. This synergy led to urban computing[184], which applies ∗ The first three authors contribute to this work equally." 2312.11817v1,"Users Approach on Providing Feedback for Smart Home Devices Santhosh Pogaku University of Cincinnati, Pogakush@mail.uc.edu 1. Abstract : Smart home technology is part of our everyday lives, and this technology is fast-evolving compared to other technologies. The user's feedback is gathered in this paper by conducting expert interviews on how collecting the feedback from the smart home devices will be helpful to improve the devices. We are yet to know about the feedback system of the smart home devices and how provided feedback will support increasing the devices' requirements. Today, we present our analysis from our exploratory interview method with the student of a certain group, and we try to study the attitude of providing feedback. The results suggested that the users are ready to give their feedback very actively to better their usage as every user has their own needs to fulfill. 2. Introduction : The current market of smart homes projects a global revenue of 85 Billion USD, and the usage is read to be around 10% worldwide[1]. Smart home technology combines automation interface, monitors, and sensors [2]. Smart home devices will tend to increase the way of life of humanity and the comfort of many people. The looks are deceiving as smart homes aren't taking the user needs, and necessities into accountability [3] as several critical challenges related to innovative home technology are yet to be addressed for smart home development [4]. Smart home technologies are not very often in the way they should be used, even with specific settings. A clear view of the user's usage of the smart home devices is still missing. Specific methods such as interviewing certain people will not help as innovative home technology evolves [5]. User feedback plays a vital role in getting the desired outcome and helps understand the user needs and what they want to use the smart home devices in the desired way to fill the usage gap [4]. After exploring the internet, user feedback hasn't been explored in smart home technology to date. We can think of essential features of smart home devices as UI, Networking, and Interface that make us re-visits or re-think the current user feedback approaches. The exploration has not changed the current feedback methods for smart home parameters or requirements. We can take an example of the users who are using the smart home technology and genuinely how much they are providing feedback to the devices during their daily routines regarding their personal space as it's a sensitive area. Innovative home solutions are interconnected all the time, and the ecosystem has different types of devices, and a few of them are sensors where no human intervention is needed. The smart home products are different than regular products. These products are present in the living space of humankind. Yet, these devices even take care of us, and it brings a brand-new facet to such kind of feedback. Hence, from the industry and researchers' perspective, it is evident that there is a need for research to build excellent feedback tools or models[6]. The long-term research goal would be to build group-based feedback solutions" 2312.11851v1,"1 Distributed Semi-global Output Feedback Formation Maneuver Control of High-order Multi-agent Systems Xu Fang, Lihua Xie, Fellow, IEEE Abstract—This paper addresses the formation maneuver control problem of leader-follower multi-agent systems with highorder integrator dynamics. A distributed output feedback formation maneuver controller is proposed to achieve desired maneuvers so that the scale, orientation, translation, and shape of formation can be manipulated continuously, where the followers do not need to know or estimate the time-varying maneuver parameters only known to the leaders. Compared with existing relative-measurement-based formation maneuver control, the advantages of the proposed method are that it is output (relative output) feedback based and shows how to realize different types of formation shape. In addition, it can be applied to nongeneric and non-convex nominal configurations and the leaders are allowed to be maneuvered. It is worth noting that the proposed method can also be extended to general linear multiagent systems under some additional conditions. The theoretical results are demonstrated by a simulation example. Index Terms—Distributed control, output feedback formation maneuver control, high-order integrator dynamics I. I NTRODUCTION M ULTI-AGENT formation control is applicable to the field of engineering such as load transportation, cooperative localization, and area exploration [1]–[3]. The formation shape control steers mobile agents to a desired time-invariant formation [4], [5]. Different from formation shape control, the formation maneuver control aims to maneuver the entire group of agents to change the scale, orientation, translation, and shape of formation continuously. To tackle the formation maneuver control problem, mobile agents are usually divided into leader group and follower group. The leaders determine the time-varying maneuver parameters such as scale, orientation, translation, and shape of formation, while the followers try to form the desired formation. To form a target time-varying formation, the existing methods are divided into two categories: (i) Each agent can access the maneuver parameters; (ii) Only the leaders have access to the maneuver parameters. When each agent can access the maneuver parameters, the formation maneuver control becomes a consensus tracking or containment control problem [6]–[8], where agents collaboratively keep a timevarying formation. For example, in the containment-control- This work was supported by ST Engineering-NTU Corporate Lab under its NRF Corporate Lab @ University Scheme (Singapore) and Projects of Major International (Regional) Joint Research Program under NSFC (China) Grant no. 61720106011. (Corresponding author: Lihua Xie.) X. Fang and L. Xie are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore. (E-mail: fa0001xu@e.ntu.edu.sg; elhxie@ntu.edu.sg). based time-varying formation [8], all agents know the timevarying maneuver parameters. In some application scenarios, only the leaders have access to the time-varying maneuver parameters. For this case, estimator can be designed for each follower to obtain the formation maneuver parameters [9], [10]. However, the performance of the controllers will be influenced by the estimation errors, and the estimators consume computing and communication resources. To reduce consumption of computing and communication resources, the second approach is to explore the invariance of inter-agent constraints, such as distances and relative bearings, of the desired formation. The distance-based formation maneuver control can realize the rotational and translational maneuvers [11]. Similarly, the scaling and translational maneuvers can be achieved by bearing-based methods [12]. To change the scale, orientation, and translation of formation without the need of designing the estimators for the followers to estimate the time-varying maneuver parameters only known to the leaders, some estimator-free-based methods are proposed recently, e.g, barycentric coordinate [13], [14], stress matrix [15]–[26], and complex Laplacian [27], [28]. However, there are some limitations in the existing estimator-free-based methods [13]–[28]. First, the complex-Laplacian-based methods are only applicable to 2-D space [27], [28]. Second, the works in [13]–[16], [18], [21]–[28] can only be applied in low-order or Euler–Lagrange multi-agent systems. Third, the approaches in [13]–[27] require a convex or generic nominal configuration, i.e., the nominal followers are in a convex hull formed by the nominal leaders, or any three nominal agents are not on the same line and any four nominal agents are not on the same plane. For instance, the affine localizability of a nominal formation is guaranteed if the nominal configuration of formation is generic [15]–[26]. Although it is conjectured in [15] that the affine localizability of a nominal formation may also be guaranteed by non-generic configurations, no theoretical proof is given. Fourth, the existing results [13]– [28] require the relative motion states rather than the measured (relative) outputs to achieve their control objectives. Fifth, there is no controller for the leaders in [13], [19]–[21], [24]– [26], which limits the maneuverability of formation, and the tracking errors of the formation maneuver control in [19] can only converge to a bounded compact set if the positions of the leaders are time-varying. ”High-order integrator dynamics” in this article refer to the mth order integrator dynamics, where m can be any positive integer. The work in [29] is only applicable to low-order" 2312.11868v1,"Dynamic Loco-manipulation on HECTOR: Humanoid for Enhanced ConTrol and Open-source Research Junheng Li 1 , Junchao Ma 1 , Omar Kolt 1 , Manas Shah 1 , and Quan Nguyen 1 Abstract Despite their remarkable advancement in locomotion and manipulation, humanoid robots remain challenged by a lack of synchronized loco-manipulation control, hindering their full dynamic potential. In this work, we introduce a versatile and effective approach to controlling and generalizing dynamic locomotion and loco-manipulation on humanoid robots via a Force-and-moment-based Model Predictive Control (MPC). Specifically, we proposed a simplified rigid body dynamics (SRBD) model to take into account both humanoid and object dynamics for humanoid loco-manipulation. This linear dynamics model allows us to directly solve for ground reaction forces and moments via an MPC problem to achieve highly dynamic real-time control. Our proposed framework is highly versatile and generalizable. We introduce HECTOR (Humanoid for Enhanced ConTrol and Open-source Research) platform to demonstrate its effectiveness in hardware experiments. With the proposed framework, HECTOR can maintain exceptional balance during doubleleg stance mode, even when subjected to external force disturbances to the body or foot location. In addition, it can execute 3-D dynamic walking on a variety of uneven terrains, including wet grassy surfaces, slopes, randomly placed wood slats, and stacked wood slats up to 6 cm high with the speed of 0.6 m/s . In addition, we have demonstrated dynamic humanoid loco-manipulation over uneven terrain, carrying 2.5 kg load. HECTOR simulations, along with the proposed control framework, are made available as an open-source project. ( https://github.com/DRCL-USC/ Hector_Simulation ). Keywords Humanoid Robot, Loco-manipulation Control, Model Predictive Control 1 Introduction 1.1 Motivations Studying humanoid locomotion is an endeavor born out of a profound curiosity about understanding one of the most remarkable feats of nature: human movement. However, achieving dynamic locomotion and manipulation like humans in these robots remains a formidable challenge, necessitating revolutionary innovations in mechanical design, sensors, control, and artificial intelligence. A handful of exceptionally crafted humanoid hardware systems are currently available in the market, catering to a diverse range of business applications and research endeavors. These remarkable machines have showcased impressive human-like locomotion and manipulation capabilities, exemplified by feats such as Boston Dynamics Atlas navigating a parkour course and Agility Robotics Digit transferring packages within warehouse settings. While often associated with high costs, these general-purpose robots possess immense future potential in aiding humans in exploration, disaster response missions, warehousing logistics, industrial inspections, and many more domains. These applications all require robust and dynamic control algorithms. In this study, we investigate the implementation of simplified-model-based control techniques on humanoid robots. Our goal is to validate the feasibility and efficiency of reduced-order models in dynamic humanoid locomanipulation control. Prepared using sagej.cls [Version: 2017/01/17 v1.20] Moreover, we introduce a humanoid hardware and software solution, HECTOR project, aiming to advance and expand research in humanoid robotics by providing a robust testbed for both current and future control algorithms. This also includes the exploration of reinforcement learning (RL)-based control, a successful technique implemented in numerous quadrupedal robots for dynamic motions (e.g. Hoeller et al. (2023); Cheng et al. (2023); Bellegarda et al. (2022)) but yet to be widely adopted on humanoid robots. HECTOR humanoid robot hardware will stand apart by being compact in scale, highly power-dense, cost-effective, and designed for easy operation and integration, addressing the accessibility and affordability barriers that currently hinder the advancement of humanoid robotics. 1.2 Bipedal Locomotion Control Dynamic locomotion control has been a significant focal point in researchers’ efforts to unlock the potential for human-like agility in bipedal locomotion. The primary advantage of bipedal motion over other types of locomotion 1 Department of Aerospace and Mechanical Engineering, University of Southern California, USA Corresponding author: Junheng Li, Department of Aerospace and Mechanical Engineering, University of Southern California, CA 90089, USA. Email: junhengl@usc.edu" 2312.11885v1,"Data Descriptor A Large-Scale Dataset of Search Interests Related to Disease X Originating from Different Geographic Regions Nirmalya Thakur 1, *, Shuqi Cui 1 , Kesha A. Patel 2 , Isabella Hall 3 and Yuvraj Nihal Duggal 1 Department of Computer Science, Emory University, Atlanta, GA 30322, USA; nicole.cui@emory.edu (S.C.); yuvraj.nihal.duggal@emory.edu (Y.N.D.) 2 Department of Mathematics, Emory University, Atlanta, GA 30322, USA; kesha.patel@emory.edu 3 Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221, USA; hallib@mail.uc.edu * Correspondence: nirmalya.thakur@emory.edu 1 Citation: Thakur, N.; Cui, S.; Patel, K.A.; Hall, I.; Duggal, Y.N. A Large-Scale Dataset of Search Interests Related to Disease X Abstract: The World Health Organization (WHO) added Disease X to their shortlist of blueprint priority diseases to represent a hypothetical, unknown pathogen that could cause a future epidemic. During different virus outbreaks of the past, such as COVID-19, Influenza, Lyme Disease, and Zika virus, researchers from various disciplines utilized Google Trends to mine multimodal components of web behavior to study, investigate, and analyze the global awareness, preparedness, and response associated with these respective virus outbreaks. As the world prepares for Disease X, a dataset on web behavior related to Disease X would be crucial to contribute towards the timely advancement of research in this field. Furthermore, none of the prior works in this field have focused on the development of a dataset to compile relevant web behavior data, which would help to prepare for Disease X. To address these research challenges, this work presents a dataset of web behavior related to Disease X, which emerged from different geographic regions of the world, between February 2018 and August 2023. Specifically, this dataset presents the search interests related to Disease X from 94 geographic regions. These regions were chosen for data mining as these regions recorded significant search interests related to Disease X during this timeframe. The dataset was developed by collecting data using Google Trends. The relevant search interests for all these regions for each month in this time range are available in this dataset. This paper also discusses the compliance of this dataset with the FAIR principles of scientific data management. Finally, an analysis of this dataset is presented to uphold the applicability, relevance, and usefulness of this dataset for the investigation of different research questions in the interrelated fields of Big Data, Data Mining, Healthcare, Epidemiology, and Data Analysis with a specific focus on Disease X. Originating from Different Geographic Regions. Data 2023, 8, x. Dataset: https://dx.doi.org/10.21227/ht7f-rx42 https://doi.org/10.3390/xxxxx Dataset License: CC BY 4.0 Academic Editor(s): Name Keywords: Disease X; big data; data science; data analysis; dataset development; database; google trends; data mining; healthcare; epidemiology Received: 18 August 2023 Revised: 12 October 2023 Accepted: 23 October 2023 Published: date 1. Introduction Copyright: © 2023 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). In the recent past, several viruses, such as COVID-19 [1], the plague [2], the Spanish flu [3], HIV [4], Ebola [5], and MPox [6], have rampaged unopposed across different countries, infecting and leading to the demise of people, resulting in the destruction of political regimes, affecting various sectors of the global economy, and causing financial and psychosocial burdens, the likes of which the world has not witnessed in centuries [7]. As a response to this, various organizations and policy-making bodies on a global scale have begun investigating approaches to learn from such virus outbreaks, with an aim to not repeat the mistakes of the past during future virus outbreaks. “Disease X” is a placeholder Data 2023, 8, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/data" 2312.11888v1,"1 Angle-Displacement Rigidity Theory with Application to Distributed Network Localization Xu Fang, Xiaolei Li, Lihua Xie, Fellow, IEEE Abstract—This paper investigates the localization problem of a network in 2-D and 3-D spaces given the positions of anchor nodes in a global frame and inter-node relative measurements in local coordinate frames. It is assumed that the local frames of different nodes have different unknown orientations. First, an angle-displacement rigidity theory is developed, which can be used to localize all the free nodes by the known positions of the anchor nodes and local relative measurements (local relative position, distance, local relative bearing, angle, or ratioof-distance measurements). Then, necessary and sufficient conditions for network localizability are given. Finally, a distributed network localization protocol is proposed, which can globally estimate the locations of all the free nodes of a network if the network is infinitesimally angle-displacement rigid. The proposed method unifies local-relative-position-based, distancebased, local-relative-bearing-based, angle-based, and ratio-ofdistance-based distributed network localization approaches. The novelty of this work is that the proposed method can be applied in both generic and non-generic configurations with an unknown global coordinate frame in both 2-D and 3-D spaces. Index Terms—Angle-displacement rigidity theory, unknown local frames, non-generic configuration, local relative measurement, distributed localization, 2-D and 3-D spaces. I. I NTRODUCTION L OCALIZATION is a prerequisite for large range of applications in target searching, obstacle avoidance, and formation control [1], [2]. Network localization studies how to localize a network given the positions of anchor nodes and inter-node relative measurements. Compared with centralized network localization, distributed network localization can reduce the network resource consumption. The existing distributed network localization algorithms, based on different kinds of measurements, can be divided into four categories: relative-position-based [3], [4], distance-based [5], [6], bearing-based [7], [8], and angle-based [9]. There are two fundamental problems in network localization: network localizability and distributed localization protocols. The necessary and sufficient conditions for localizability of a network have been studied by many researchers. For the relative-position-based localization in 2-D space [4], a network is localizable if and only if every free node is 2- reachable from the set of anchor nodes. Similar results have been shown in the distance-based localization [5], where a This work is partially supported by ST Engineering-NTU Corporate Lab under the NRF Corporate Lab @ University Scheme and National Natural Science Foundation of China (NSFC) under Grant 61720106011 and 61903319. (Corresponding author: Lihua Xie.) The authors are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore. (E-mail: fa0001xu@e.ntu.edu.sg; xiaolei@ntu.edu.sg; elhxie@ntu.edu.sg). network expressed by the barycentric coordinate is localizable if and only if every free node has at least three disjoint paths in 2-D space from the set of anchor nodes. The localizability of bearing-based localization depends on the bearing rigidity theory [7]. A bearing-based network is localizable in arbitrary dimensional spaces if and only if every infinitesimal bearing motion involves at least one anchor node. For the angle-based localization, a network is angle localizable in 2-D space if and only if it is angle fixable and anchors are not colinear [9]. It should be noted that different localizability conditions are proposed for different relative measurements. A general condition for 2-D and 3-D network localizability for different local relative measurements is still lacking. If a network is localizable, the corresponding relativeposition-based, distance-based, bearing-based, or angle-based distributed protocols can globally estimate a network. However, there are limitations in the existing distributed protocols. The disadvantage of relative-position-based and bearing-based distributed localization is the requirement of the global coordinate frame. To address this issue, the first way to recover the true configuration is to construct a similar configuration [4], [10], which is only applicable to 2-D space. The second way is to align the orientations of each local frame with the global frame by using local relative bearing measurements [11]–[13], but the orientation alignment errors along the sequence of propagation may be accumulated. The third way is to estimate the orientation of each local frame, but it requires additional relative orientation measurements [8]. Compared with relative-position-based and bearing-based distributed localization, the distance-based and angle-based distributed localization do not need the global coordinate frame. But the distance-based distributed network localization is only applicable to a generic configuration [5], [6], e.g., any three nodes are not on the same line in 2-D space and any four nodes are not on the same plane in 3-D space. For the anglebased network localization [9], [14], [15], to the best of our knowledge, there is no such known result for the localizability and distributed protocols of angle-based networks in 3-D space. The works in [9], [14], [15] are applied to a 2-D anglebased network localization problem. In addition, the unknown free nodes in [9] are localized one by one, i.e., the distributed algorithm works in a step-by-step iterative way. Moreover, for the recently developed ratio-of-distance rigidity theory [16], there is no corresponding network localization method. In this paper, we aim to propose a unified approach which not only can be applied to distributed network localization with local relative measurements (local relative position, distance, local relative bearing, angle and ratio-of-distance measure-" 2312.11895v1,"Communication Analyzing Public Reactions, Perceptions, and Attitudes during the MPox Outbreak: Findings from Topic Modeling of Tweets Nirmalya Thakur *, Yuvraj Nihal Duggal and Zihui Liu Department of Computer Science, Emory University, Atlanta, GA 30322, USA; yuvraj.nihal.duggal@emory.edu (Y.N.D.); chloe.liu2@emory.edu (Z.L.) * Correspondence: nirmalya.thakur@emory.edu Citation: Thakur, N.; Duggal, Y.N.; Liu, Z. Analyzing Public Reactions, Perceptions, and Attitudes during the MPox Outbreak: Findings from Topic Modeling of Tweets. Abstract: In the last decade and a half, the world has experienced outbreaks of a range of viruses such as COVID-19, H1N1, flu, Ebola, Zika virus, Middle East Respiratory Syndrome (MERS), measles, and West Nile virus, just to name a few. During these virus outbreaks, the usage and effectiveness of social media platforms increased significantly, as such platforms served as virtual communities, enabling their users to share and exchange information, news, perspectives, opinions, ideas, and comments related to the outbreaks. Analysis of this Big Data of conversations related to virus outbreaks using concepts of Natural Language Processing such as Topic Modeling has attracted the attention of researchers from different disciplines such as Healthcare, Epidemiology, Data Science, Medicine, and Computer Science. The recent outbreak of the MPox virus has resulted in a tremendous increase in the usage of Twitter. Prior works in this area of research have primarily focused on the sentiment analysis and content analysis of these Tweets, and the few works that have focused on topic modeling have multiple limitations. This paper aims to address this research gap and makes two scientific contributions to this field. First, it presents the results of performing Topic Modeling on 601,432 Tweets about the 2022 Mpox outbreak that were posted on Twitter between 7 May 2022 and 3 March 2023. The results indicate that the conversations on Twitter related to Mpox during this time range may be broadly categorized into four distinct themes—Views and Perspectives about Mpox, Updates on Cases and Investigations about Mpox, Mpox and the LGBTQIA+ Community, and Mpox and COVID-19. Second, the paper presents the findings from the analysis of these Tweets. The results show that the theme that was most popular on Twitter (in terms of the number of Tweets posted) during this time range was Views and Perspectives about Mpox. This was followed by the theme of Mpox and the LGBTQIA+ Community, which was followed by the themes of Mpox and COVID-19 and Updates on Cases and Investigations about Mpox, respectively. Finally, a comparison with related studies in this area of research is also presented to highlight the novelty and significance of this research work. Computers 2023, 12, x. https://doi.org/10.3390/xxxxx Keywords: Mpox; big data; data analysis; data science; twitter; natural language processing Academic Editor(s): Paolo Bellavista Received: 31 August 2023 Revised: 14 September 2023 1. Introduction Accepted: 20 September 2023 Published: date Copyright: © 2023 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). Monkeypox (Mpox), caused by the monkeypox virus, which belongs to the Poxviridae family, Chordopoxvirinae subfamily, and Orthopoxvirus genus [1], is a re-emerging zoonotic disease. In the shape of a brick-like virion ranging from 200 nm to 250 nm in length, the Mpox virus has a large genome of about 200 kilobase pairs encoding approximately 190 proteins. Two clades of Mpox, clade 1 and clade 2, show a 0.5% genomic difference, with clade 1 having a 1–12% case fatality rate and clade 2 having a 0.1% case fatality rate [2,3]. The first case of human Mpox was recorded in a 9-month-old boy in the Democratic Republic of the Congo (DRC) in 1970 [1]. After the first case in 1970, 59 cases were reported in West and Central Africa in the next decade [4], with a 17% mortality rate in children under 10 [5,6]. The World Health Organization (WHO) monitored Mpox cases Computers 2023, 12, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/computers" 2312.11908v1,"Stability of the de-Sitter universe: One-loop nonlocal f (R) gravity Haiyuan Feng, 1, ∗ Yi Liao b , 1, ‡ and Rong-Jia Yang 2, § 1 Department of Physics, Southern University of Science and Technology, Shenzhen 518055, Guangdong, China 2 College of Physical Science and Technology, Hebei University, Baoding 071002, China Abstract With the method of the background field expansion, we investigate the one-loop quantization of the Euclidean nonlocal f (R) model in the de-Sitter universe. We obtain the ghost-free condition (GFC) based on the transformation from the Jordan frame to the Einstein frame and the classical (0) (0) stability condition (CSC) satisfied f RR (0) F RR < R 0 f R −2f (R 0 ) . R 0 F (R 0 ) We present the on-shell and off-shell one-loop effective action and quantum stability condition (QSC) by utilizing the generalized zeta- function. We have established the equivalence between the QSC and the CSC. This implies that the nonlocal f (R) model remains ghost-free and stability conditions in both classical and quantum situation. b Corresponding author Email address: fenghaiyuanphysics@gmail.com ‡ Email address: liaoyitianyi@gmail.com ∗ § Email address: yangrongjia@tsinghua.org.cn 1" 2312.11925v1,"GLL-based Context-Free Path Querying for Neo4j Vadim Abzalov Vlada Pogozhelskaya Saint Petersburg State University St. Petersburg, Russia vadim.i.abzalov@gmail.com National Research University Higher School of Economics St. Petersburg, Russia pogozhelskaya@gmail.com Vladimir Kutuev Semyon Grigorev Saint Petersburg State University St. Petersburg, Russia vladimir.kutuev@gmail.com Saint Petersburg State University St. Petersburg, Russia s.v.grigoriev@spbu.ru ABSTRACT 1 We propose GLL-based context-free path querying algorithm which handles queries in Extended Backus-Naur Form (EBNF) using Recursive State Machines (RSM). Utilization of EBNF allows one to combine traditional regular expressions and mutually recursive patterns in constraints natively. The proposed algorithm solves both the reachability-only and the all-paths problems for the all-pairs and the multiple sources cases. The evaluation on realworld graphs demonstrates that utilization of RSMs increases performance of query evaluation. Being implemented as a stored procedure for Neo4j, our solution demonstrates better performance than a similar solution for RedisGraph. Performance of our solution of regular path queries is comparable with performance of native Neo4j solution, and in some cases our solution requires significantly less memory. Context-free path querying (CFPQ) allows one to use context-free grammars to specify constraints on paths in edge-labeled graphs. Context-free constraints are more expressive than the regular ones (RPQ) and can be used for graph analysis in such areas as bioinformatics (hierarchy analysis [39], similarity queries [31]), data provenance analysis [18], static code analysis [22, 40]. Although a lot of algorithms for CFPQ were proposed, poor performance on real-world graphs and bad integration with real-world graph databases and graph analysis systems still are problems which hinder the adoption of CFPQ. The problem with the performance of CFPQ algorithms in realworld scenarios was pointed out by Jochem Kuijpers [12] as a result of an attempt to extend Neo4j graph database with CFPQ. Several algorithms, based on such techniques as LR parsing algorithm [26], dynamic programming [10], LL parsing algorithm [14], linear algebra [4], were implemented using Neo4j as a graph storage and evaluated. None of them was performant enough to be used in real-world applications. Since Jochem Kuijpers pointed out the performance problem, it was shown that linear algebra based CFPQ algorithms, which operate over the adjacency matrix of the input graph and utilize parallel algorithms for linear algebraic operations, demonstrate good performance [33]. Moreover, the matrix-based CFPQ algorithm is a base for the first full-stack support of CFPQ by extending RedisGraph graph database [33]. However, adjacency matrix is not the only possible format for graph representation, and data format conversion may take a lot of time, thus it is not applicable in some cases. As a result, the development of a performant CFPQ algorithm for graph representations not based on matrices and its integration with real-world graph databases is still an open problem. Moreover, while the all pairs context-free constrained reachability is widely discussed in the community, such practical cases as the all-paths queries and the multiple sources queries are not studied enough. Additionally, almost the all existing solutions provide algorithms for reachability-only problem. Recently, Jelle Helligs in [11] and Rustam Azimov in [3] proposed algorithms which allow one to extract paths satisfied specified context-free constraints. The ability to extract paths of interest is important for some applications where the user wants to know not only the fact that one vertex is reachable from another, but also to get a detailed explanation why this vertex CCS CONCEPTS • Information systems → Graph-based database models; Query languages for non-relational engines; • Theory of computation → Grammars and context-free languages; • Mathematics of computing → Paths and connectivity problems. KEYWORDS Graph database, context-free path querying, CFPQ, reachability problem, all-paths problem, generalized LL, GLL ACM Reference Format: Vadim Abzalov, Vlada Pogozhelskaya, Vladimir Kutuev, and Semyon Grigorev. 2018. GLL-based Context-Free Path Querying for Neo4j. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY . ACM, New York, NY, USA, 14 pages. https://doi.org/10.1145/1122445. 1122456 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Woodstock ’18, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/10.1145/1122445.1122456 INTRODUCTION" 2312.11947v1,"Emotion Rendering for Conversational Speech Synthesis with Heterogeneous Graph-Based Context Modeling Rui Liu 1 * , Yifan Hu 1 , Yi Ren 2 , Xiang Yin 2 , Haizhou Li 3,4 1 3 Inner Mongolian University, China 2 ByteDance Shenzhen Research Institute of Big Data, School of Data Science, The Chinese University of Hong Kong, Shenzhen, China 4 National University of Singapore, Singapore liurui imu@163.com, hyfwalker@163.com, ren.yi@bytedance.com, yinxiang.stephen@bytedance.com, haizhouli@cuhk.edu.cn Dialogue History (Multi-Modal) Abstract Conversational Speech Synthesis (CSS) aims to accurately express an utterance with the appropriate prosody and emotional inflection within a conversational setting. While recognising the significance of CSS task, the prior studies have not thoroughly investigated the emotional expressiveness problems due to the scarcity of emotional conversational datasets and the difficulty of stateful emotion modeling. In this paper, we propose a novel emotional CSS model, termed ECSS, that includes two main components: 1) to enhance emotion understanding, we introduce a heterogeneous graph-based emotional context modeling mechanism, which takes the multisource dialogue history as input to model the dialogue context and learn the emotion cues from the context; 2) to achieve emotion rendering, we employ a contrastive learning-based emotion renderer module to infer the accurate emotion style for the target utterance. To address the issue of data scarcity, we meticulously create emotional labels in terms of category and intensity, and annotate additional emotional information on the existing conversational dataset (DailyTalk). Both objective and subjective evaluations suggest that our model outperforms the baseline models in understanding and rendering emotions. These evaluations also underscore the importance of comprehensive emotional annotations. Code and audio samples can be found at: https://github.com/walkerhyf/ECSS. : Is this your trophy? Intensity: medium 😁 😐 Intensity: weak : Yeah, I won it in a competition last month. 😜 Intensity: medium : I don't believe it ! Intensity: strong 😁 : It's true! It's a singing competition! Current Utterance (Text only) : You're really great. 🤩 Intensity: strong (a) The current utterance performs ""surprise"" emotion with ""strong"" intensity Dialogue History (Multi-Modal) : Is this your trophy? Intensity: medium 😁 😡 Intensity: medium : Yeah, I won it in a competition last month. : I don't believe it ! Intensity: strong 😡 😡 Intensity: strong : It's true! It's a singing competition ! Current Utterance (Text only) : You're really great ! 🙄 Intensity: medium (b) The current utterance performs ""disgust"" emotion with ""medium"" intensity Introduction Conversational speech synthesis (CSS) aims to express a target utterance with the proper linguistic and affective prosody in a conversational context (Guo et al. 2020). With the development of human-machine conversations, CSS has become an integral part of intelligent interactive systems (Tulshan and Dhage 2019; Zhou et al. 2020; Seaborn et al. 2021; McTear 2022) and plays an important role in areas such as virtual assistants and voice agents, etc. Unlike the speech synthesis technology for single utterance that just predict the speaking style according to its linguistic content (Wang et al. 2017; Li et al. 2019; Ren et al. 2021; Kim, Kong, and Son 2021; Liu et al. 2021a,b,c, 2022a) or attempt to transfer the style information from an additional reference speech (Wang et al. 2018; Li et al. 2022c; * Corrposending Author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Graphical depiction of spoken conversation, where different emotion cues in the dialogue history perform a direct impact on the emotion expression for the current utterance. Huang et al. 2022), CSS methods usually infer the speaking style of the target utterance according to the dialogue interaction history between two interlocutors. Traditional CSS works attempt to acquire the speaking style information from various aspects, such as inter and intra-speaker (Li et al. 2022a), and multi-modal context (Li et al. 2022a,b; Xue et al. 2023) dependencies modeling, etc. For example, Guo et al. (2020) construct a coarse-grained context encoder at the sentence level and use the recurrent neural network (RNN) for dialogue history encoding. Li et al. (2022a) model inter-speaker and intra-speaker dependencies in a conversation by a dialog graph convolutional neural (GCN) network and summarize the output of the graph neural network using the attention mechanism. In more recent stud-" 2312.11949v1,"CreativeConnect: Supporting Reference Recombination for Graphic Design Ideation with Generative AI DaEun Choi Sumin Hong Jeongeon Park ∗ daeun.choi@kaist.ac.kr KAIST Daejeon, Republic of Korea 17101992@seoultech.ac.kr Seoul National University of Science and Technology Seoul, Republic of Korea jeongeonpark1@gmail.com DGIST Daegu, Republic of Korea John Joon Young Chung † Juho Kim jchung@midjourney.com Midjourney San Francisco, CA, USA juhokim@kaist.ac.kr KAIST Daejeon, Republic of Korea Figure 1: Three main features of CreativeConnect supports for enhancing reference recombination. (Left) Extraction of 4 different types of keywords from the reference image. (Center) Mood board showing the reference image with the user-selected keywords and keyword recommendations. (Right) Merging selected keywords to generate diverse recombination options and showing them as sketches and descriptions. ABSTRACT Graphic designers often get inspiration through the recombination of references. Our formative study (N=6) reveals that graphic designers focus on conceptual keywords during this process, and want support for discovering the keywords, expanding them, and exploring diverse recombination options of them, while still having room for their creativity. We propose CreativeConnect, a system ∗ Work done while at KAIST. † Work done before joining Midjourney. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. arXiv, December, 2023, © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX with generative AI pipelines that helps users discover useful elements from the reference image using keywords, recommends relevant keywords, generates diverse recombination options with user-selected keywords, and shows recombinations as sketches with text descriptions. Our user study (N=16) showed that Creative- Connect helped users discover keywords from the reference and generate multiple ideas based on them, ultimately helping users produce more design ideas and higher self-reported creativity, compared to the baseline system without generative pipelines. While CreativeConnect was effective in ideation, we discussed how CreativeConnect can be extended to support other types of tasks in creativity support. CCS CONCEPTS • Human-centered computing → Interactive systems and tools." 2312.11969v1,"GroupMixNorm Layer for Learning Fair Models Anubha Pandey [0000−0002−4695−0947] , Aditi Rai [0009−0009−9298−7861] , Maneet Singh, Deepak Bhatt [0000−0003−3694−1315] , and Tanmoy Bhowmik AI Garage, Mastercard, India {anubha.pandey, aditi.rai, maneet.singh, deepak.bhatt}@mastercard.com, tantanmoy@gmail.com Abstract. Recent research has identified discriminatory behavior of automated prediction algorithms towards groups identified on specific protected attributes (e.g., gender, ethnicity, age group, etc.). When deployed in real-world scenarios, such techniques may demonstrate biased predictions resulting in unfair outcomes. Recent literature has witnessed algorithms for mitigating such biased behavior mostly by adding convex surrogates of fairness metrics such as demographic parity or equalized odds in the loss function, which are often not easy to estimate. This research proposes a novel in-processing based GroupMixNorm layer for mitigating bias from deep learning models. The GroupMixNorm layer probabilistically mixes group-level feature statistics of samples across different groups based on the protected attribute. The proposed method improves upon several fairness metrics with minimal impact on overall accuracy. Analysis on benchmark tabular and image datasets demonstrates the efficacy of the proposed method in achieving state-of-the-art performance. Further, the experimental analysis also suggests the robustness of the GroupMixNorm layer against new protected attributes during inference and its utility in eliminating bias from a pre-trained network. Keywords: Deep Learning · Ethics and fairness · Bias Mitigation 1 Introduction Most AI algorithms process large quantities of data to identify patterns useful for accurate predictions. Such pipelines are mostly automated in nature without any human intervention, along with large data processing, high efficiency, and high accuracy. Despite the benefits of automated processing, current AI systems are marred with the challenge of biased predictions resulting in unfavourable outcomes. One of the most infamous examples of such behavior is that of an AI- based recruitment tool 1 , which disfavoured applications from women because it was trained on resumes from the mostly male workforce. In order to rectify such biases and support advancement in society, we need models that generate fair results without any discrimination towards certain individuals or groups. To this effect, this research proposes a novel GroupMixNorm layer for learning an unbiased model for ensuring fair outcomes across different groups. 1 https://tinyurl.com/5apv7xeu" 2312.11973v1,"PREPRINT, DEC. 2023 1 Continual Learning: Forget-free Winning Subnetworks for Video Representations Haeyong Kang, Jaehong Yoon, Sung Ju Hwang, and Chang D. Yoo ∗ Abstract—Inspired by the Regularized Lottery Ticket Hypothesis (RLTH), which highlights the presence of competitive subnetworks within dense networks for continual learning tasks, we introduce Winning Subnetworks (WSN). This approach utilizes reused weights in dense networks to enhance learning in Task Incremental Learning (TIL) scenarios. To mitigate overfitting in Few-Shot Class Incremental Learning (FSCIL), we have developed WSN variants referred to as the Soft subnetwork (SoftNet). Furthermore, addressing WSN’s limitation of sparse reused weights in Video Incremental Learning (VIL), we propose the Fourier Subneural Operator (FSO). The FSO, operating in Fourier space, adaptively and compactly encodes videos, discovering reusable subnetworks with diverse bandwidths. We have applied FSO’s Fourier representations to various continual learning contexts, including VIL, TIL, and FSCIL. Our extensive experiments across these scenarios demonstrate FSO’s remarkable efficacy in continual learning, significantly enhancing task performance at various convolutional representational levels: it boosts performance in the higher layers for TIL and FSCIL and the lower layers for VIL. Index Terms—Continual Learning (CL), Task Incremental Learning (TIL), Video Incremental Learning (VIL), Few-shot Class Incremental Learning (FSCIL), Regularized Lottery Ticket Hypothesis (RLTH), Wining SubNetworks (WSN), Soft-Subnetwork (SoftNet), Fourier Subneural Operator (FSO) ✦ 1 I NTRODUCTION C ONTINUAL Learning (CL), also known as Lifelong Learning [82], [66], [96], [24], is a learning paradigm where a series of tasks are learned sequentially. The principle objective of continual learning is to replicate human cognition, characterized by the ability to learn new concepts or skills incrementally throughout one’s lifespan. An optimal continual learning system could facilitate a positive forward and backward transfer, leveraging the knowledge gained from previous tasks to solve new ones while also updating its understanding of previous tasks with the new knowledge. However, building successful continual learning systems is challenging due to the occurrence of catastrophic forgetting or catastrophic interference [55], a phenomenon where the performance of the model on previous tasks significantly deteriorates when it learns new tasks. This can make it challenging to retain the knowledge acquired from previous tasks, ultimately leading to a decline in overall performance. To tackle the catastrophic forgetting problem in continual learning, numerous approaches have been proposed, which can be broadly classified as follows: (1) Regularization-based methods [37], [4], [31], [83], [59] aim to keep the learned information of past tasks during continual training aided by sophisticatedly designed regularization terms, (2) Rehearsalbased methods [64], [65], [5], [6], [67], [68] utilize a set of real or synthesized data from the previous tasks and revisit them, and (3) Architecture-based methods [52], [70], [44], [89], [33], [34] propose to minimize the inter-task interference via newly designed architectural components. Despite the remarkable success of recent works on rehearsal- and architecture-based continual learning, most Email: haeyong.kang@kaist.ac.kr ∗ Corresponding Author. current methods request external memory as new tasks arrive, making the model difficult to scale to larger and more complex tasks. Rehearsal-based CL requires additional storage to store the replay buffer or generative models, and architecture-based methods leverage additional model capacity to account for new tasks. These trends lead to an essential question: how can we build a memory-efficient CL model that does not exceed the backbone network’s capacity or even requires a much smaller capacity? Several studies have shown that deep neural networks are overparameterized [18], [23], [43] and thus removing redundant/unnecessary weights can achieve on-par or even better performance than the original dense network. More recently, Lottery Ticket Hypothesis (LTH) [20] demonstrates the existence of sparse subnetworks, named winning tickets, that preserve the performance of a dense network. However, searching for optimal winning tickets during continual learning with iterative pruning methods requires repetitive pruning and retraining for each arriving task, which could be more practical. To tackle the issues of external replay buffer, capacity, and over-fitting, we suggest a novel CL method, which finds the high-performing Winning SubNetwork referred to as WSN [33] given tasks without the need for retraining and rewinding, as shown in Figure 1 (d). Also, we set previous pruning-based CL approaches [52], [89] (see Figure 1 (a)) to baselines of architectures, which obtain task-specific subnetworks given a pre-trained backbone network. Our WSN incrementally learns model weights and task-adaptive binary masks (the subnetworks) within the neural network. To allow the forward transfer when a model learns on a new task, we reuse the learned subnetwork weights for the previous tasks, however selectively, as opposed to using all the weights [53] (see Figure 1 (b)), that may lead to" 2312.11991v1,"Outcomes truncated by death in RCTs: a simulation study on the survivor average causal effect December 20, 2023 Stefanie von Felten 1,∗ , Chiara Vanetta 1,2 , Christoph M. Rüegger 3 , Sven Wellmann 4 & Leonhard Held 1 1 Department of Biostatistics at Epidemiology, Biostatistics and Prevention Institute, University of Zurich, Hirschen- graben 84, CH-8001 Zurich, Switzerland 2 Biostatistics and Research Decision Sciences, MSD, The Circle 66, CH-8058 Zurich, Switzerland 3 Newborn Research, Department of Neonatology, University Hospital Zurich, University of Zurich, Frauenklinikstrasse 10, CH-8091 Zürich, Switzerland 4 Department of Neonatology, University Children’s Hospital Regensburg, Hospital St Hedwig of the Order of St John, University of Regensburg, Steinmetzstraße 1-3, D-93049 Regensburg, Germany ∗ Corresponding author: e-mail: stefanie.vonfelten@uzh.ch, Phone: +41-44-634-46-44 Abstract Continuous outcome measurements truncated by death present a challenge for the estimation of unbiased treatment effects in randomized controlled trials (RCTs). One way to deal with such situations is to estimate the survivor average causal effect (SACE), but this requires making non-testable assumptions. Motivated by an ongoing RCT in very preterm infants with intraventricular hemorrhage, we performed a simulation study to compare a SACE estimator with complete case analysis (CCA, benchmark for a biased analysis) and an analysis after multiple imputation of missing outcomes. We set up 9 scenarios combining positive, negative and no treatment effect on the outcome (cognitive development) and on survival at 2 years of age. Treatment effect estimates from all methods were compared in terms of bias, mean squared error and coverage with regard to two estimands: the treatment effect on the outcome used in the simulation and the SACE, which was derived by simulation of both potential outcomes per patient. Despite targeting different estimands (principal stratum estimand, hypothetical estimand), the SACE-estimator and multiple imputation gave similar estimates of the treatment effect and efficiently reduced the bias compared to CCA. Also, both methods were relatively robust to 1" 2312.11993v1,"Correlation function for the a 0 (980) R. Molina, 1, ∗ Zhi-Wei Liu, 2 Li-Sheng Geng, 2, 3, 4, 5, † and E. Oset 1, ‡ 1 Departamento de Fı́sica Teórica and IFIC, Centro Mixto Universidad de Valencia-CSIC, Parc Cientı́fic UV, C/ Catedrático José Beltrán, 2, 46980 Paterna, Spain 2 School of Physics, Beihang University, Beijing 102206, China 3 Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beihang University, Beijing 102206, China 4 Peng Huanwu Collaborative Center for Research and Education, Beihang University, Beijing 100191, China 5 Southern Center for Nuclear-Science Theory (SCNT), Institute of Modern Physics, Chinese Academy of Sciences, Huizhou 516000, China We have conducted a model independent analysis of the K + K̄ 0 pair correlation function obtained from ultra high energy pp collisions, with the aim of extracting the information encoded in it related to the K K̄ interaction and the coupled channel π + η. With the present large errors at small relative K + K̄ 0 momenta, we find that the information obtained about the scattering matrix suffers from large uncertainties. Even then, we are able to show that the data imply the existence of the a 0 resonance, a 0 (980), showing as a strong cusp close to the K K̄ threshold. We also mention that the measurement of the π + η correlation function will be essential in order to constrain more the information on K K̄ dynamics that can be obtained from correlation functions. PACS numbers: I. INTRODUCTION Femtoscopic correlation functions are emerging as a powerful tool to learn about hadron interactions. In pp or pA collisions at very high energy, pairs of particles are measured and their production probability is divided by the equivalent probability of uncorrelated events, evaluated through the mixed event method [1–6]. There is already much experimental work on this field [7–19] and theoretical work goes parallel [20–35], showing that significant information about the interaction of the measured pairs is obtained from correlation functions. While most theoretical works compare models with the results of the correlation functions, it has only been recently that model independent methods have been proposed to extract the information encoded in these correlation functions [36–39], such as to conclude the possible existence of bound states, and determine scattering parameters like the scattering length and effective range of the involved channels in the interactions. In the present work we take advantage of the existing measurements of the correlation function for K s 0 K ± production [40, 41] and extract from there properties about the K 0 K − , K̄ 0 K + interaction, among them, the existence of a resonance very close to the K K̄ threshold, the a 0 (980). Uncertainties in observables obtained from the correlation function are evaluated through the resampling method, determining the precision demanded on the experimental data in order to get more precise values of these observables. There is already some theoretical work on this correla- ∗ Electronic address: Raquel.Molina@ific.uv.es † Electronic address: lisheng.geng@buaa.edu.cn ‡ Electronic address: Eulogio.Oset@ific.uv.es tion function using data from P b − P b collisions [42] and applying the Lednicky-Lyuboshitz approximation [43, 44] where a good reproduction of the data was obtained by using different conventions for the correlation function, that did not allow the authors to be very conclusive on the information that can be obtained from these data. Here we employ instead an improved theoretical approach based on the original Koonin-Pratt formula [45, 46], modified to include the range of the interaction [32] and take the data from pp collisions of the more recent paper [41] II. A. FORMALISM Brief summary of the chiral unitary approach In the chiral unitary approach [47–50], one uses the K K̄ and πη coupled channels and the scattering matrix given by, T = [1 − V G] −1 V , (1) with V given by [51], √ 3 8 1 (3s − m 2 K − m 2 π − m 2 η ) , 12f 2 3 3 V K 0 K̄ 0 ,π 0 η = −V K + K − ,π 0 η , V K + K − ,π 0 η = − V π 0 η,π 0 η = − m 2 π , 3f 2 s , 2f 2 s V K + K − ,K 0 K̄ 0 = − 2 , 4f s V K 0 K̄ 0 ,K 0 K̄ 0 = − 2 . 2f V K + K − ,K + K − = − (2)" 2312.11996v1,"T OWARD R ESPONSIBLE AI U SE : C ONSIDERATIONS FOR S USTAINABILITY I MPACT A SSESSMENT A P REPRINT Eva Thelisson ∗ AI Transparency Institute Switzerland eva@aitransparencyinstitute.com Grzegorz Mika Telecom SudParis Institute Polytechnique de Paris France grzegorz.mika@ip-paris.fr Kirtan Padh Helmholtz Munich, Helmholz AI MCML, ELLIS, TU Munich Germany kirtan.padh@tum.de Quentin Schneiter AI Transparency Institute Switzerland Himanshu Verma TU Delft Netherlands H.Verma@tudelft.nl December 20, 2023 A BSTRACT As AI/ML models, including Large Language Models, continue to scale with massive datasets, so does their consumption of undeniably limited natural resources, and impact on society. In this collaboration between AI, Sustainability, HCI and legal researchers, we aim to enable a transition to sustainable AI development by enabling stakeholders across the AI value chain to assess and quantitfy the environmental and societal impact of AI. We present the ESG Digital and Green Index (DGI), which offers a dashboard for assessing a company’s performance in achieving sustainability targets. This includes monitoring the efficiency and sustainable use of limited natural resources related to AI technologies (water, electricity, etc). It also addresses the societal and governance challenges related to AI. The DGI creates incentives for companies to align their pathway with the Sustainable Development Goals (SDGs). The value, challenges and limitations of our methodology and findings are discussed in the paper. Keywords Sustainability · Green AI · ESG Digital and Green · Environmental Impact · Societal Impact · Governance 1 Introduction Algorithmic systems are becoming pervasive in daily life, significantly influencing decision-making [36] and service delivery across the public [25] and private sectors[1, 3, 34, 8, 46]. Large Language Models (LLMs), such as ChatGPT[19], exemplify this trend, but their deployment raises substantial environmental [17] and ethical [4] concerns. These systems demand hefty computational power, consequently escalating energy consumption and greenhouse gas emissions[23]. Moreover, their responsible and ethical development is crucial to avoid perpetuating biases or disseminating misinformation[9, 45, 6]. As machines take on more responsibility, they must be designed to be more ethically responsible [44] and socially and robustly beneficial [17]. In response to these challenges, regulatory structures are emerging globally. For instance, the sector-specific governance framework developed by the EU Commission (EU AI Act), UNESCO with its Recommendation on the Ethics of AI [40] and the OECD via specific Principles on AI. The EU has also implemented sustainability reporting standards under Directive 2013/34/EU (amended by Directive 2022/2464), obliging businesses to disclose information pertaining to ∗ Corresponding author" 2312.12004v1,"Stripping triangle loops: Discussion of D s + → ρ + η → π + π 0 η in a 0 (980) production M. Bayar, 1, ∗ R. Molina, 2, † E. Oset, 2, ‡ Ming-Zhu Liu, 3 and Li-Sheng Geng 4, 5, 6, 7, § 1 Department of Physics, Kocaeli Univeristy, 41380, Izmit, Turkey Departamento de Fı́sica Teórica and IFIC, Centro Mixto Universidad de Valencia-CSIC, Parc Cientı́fic UV, C/ Catedrático José Beltrán, 2, 46980 Paterna, Spain 3 School of Nuclear Science and Technology, Lanzhou University, Lanzhou 730000, China 4 School of Physics, Beihang University, Beijing 102206, China 5 Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beihang University, Beijing 102206, China 6 Peng Huanwu Collaborative Center for Research and Education, Beihang University, Beijing 100191, China 7 Southern Center for Nuclear-Science Theory (SCNT), Institute of Modern Physics, Chinese Academy of Sciences, Huizhou 516000, China 2 We address a general problem in the evaluation of triangle loops stemming from the consideration of the range of the interaction involved in some of the vertices, as well as the energy dependence of the width of some unstable particles in the loop. We find sizeable corrections from both effects. We apply that to a loop relevant to the D s + → π + π 0 η decay, and find reductions of about a factor of 4 in the mass distribution of invariant mass of the πη in the region of the a 0 (980). The method used is based on the explicit analytical evaluation of the q 0 integration in the d 4 q loop integration, using Cauchy’s residues method, which at the same time offers an insight on the convergence of the integrals and the effect of form factors and cutoffs. PACS numbers: I. INTRODUCTION Triangle loops, with three intermediate propagators, are often encountered in the study of hadronic processes. A peculiar type of triangle loops are those that develop a triangle singularity [1, 2] in which the three intermediate particles can be placed simultaneously on shell, are collinear and the process can occur at the classical level (Coleman Norton Theorem [3]). A recent review of this issue is given in [4] and a practical method to see when a diagram develops a triangle singularity is given in [5]. An interesting case of triangle mechanism was discussed in [6] and [7] for the interpretation of the D s + → π + π 0 η reaction measured by the BESIII collaboration [8]. In the experiment of [8] it was claimed that the reaction proceeds via quark annhilation with an abnormally large rate for that decay mode. However, both in [6] and [7] it was shown that the process could be obtained via the triangle mechanism in which the D s + decays to ρ + η, proceeds via external emission and is Cabibbo favored. The ρ + decays further into π + π 0 and π + η or π 0 η produces the a 0 (980) through rescattering of these mesons, which is the origin of the a 0 (980) in the chiral unitary approach [9–12]. Prior to these theoretical works, the mechanism of internal emission was shown to give a perfect reproduction of the experimental data, although the absolute branching ratio could not be evaluated there. One difference between the work of [6] and [7] is the use of the πη → πη amplitude from the chiral unitary ∗ Electronic address: melahat.bayar@kocaeli.edu † Electronic address: Raquel.Molina@ific.uv.es ‡ Electronic address: oset@ific.uv.es § Electronic address: lisheng.geng@buaa.edu.cn approach in [7], which gives rise to the a 0 effective propagator, while an empirical a 0 propagator is used in [6]. In addition, it was also shown in [7] that the triangle mechanism D s + → K ∗ K̄ → Kπ K̄, followed by rescattering of K K̄ to produce the a 0 (980), K K̄ being one of the coupled channels considered in the chiral unitary approach to produce the a 0 (980), is also important in the process and even has larger strength than the triangle loop through ρ + decay. R In both works of [6] and [7], fourfold d 4 q loop integrations were carried out using tools of Feynmann integrals. Our purpose here is to show that when dealing with triangle loops that involve some strong interaction, like πη → πη or K K̄ → πη, the range of the interaction introduces corrections in the loops resulting in sizeable reductions of the loop strength. The implementation of these corrections is easily done if one performs the q 0 integration analytically using Cauchy integration. The procedure also allows to take into account corrections stemming from the energy dependence of the ρ width in the loop (a constant Γ ρ is used in [6] and [7]). The purpose of the work is not to get a new picture for the D s + → π + π 0 η decay, but to show a technical method to evaluate accurately triangle loops involving a strong hadron-hadron interaction in some vertices. Concerning the D s + → π + π 0 η reaction, the reduction that we find in the triangle mechanisms, indicates the relevance of the findings of [13] with the internal emission mechanism, stressing the conclusion of [7]: The triangle loop mechanism from external emission, and the mechanism of [13] with internal emission are both at work in the D s + → ηπ + π 0 and one does not need the quark annihilation mechanism." 2312.12007v1,"n-valued quandles and associated bialgebras Valeriy G. Bardakov ∗1,2,3 , Tatyana A. Kozlovskaya †3 , and Dmitry V. Talalaev ‡4,5 1 Sobolev Institute of Mathematics, Novosibirsk 630090, Russia. 2 Novosibirsk State Agrarian University, Dobrolyubova street, 160, Novosibirsk, 630039, Russia. 3 Regional Scientific and Educational Mathematical Center of Tomsk State University, 36 Lenin Ave., 14, 634050, Tomsk, Russia. 4 Lomonosov Moscow State University, 119991, Moscow, Russia. 5 Demidov Yaroslavl State University, 150003, Sovetskaya Str. 14 December 20, 2023 Abstract The principal aim of this article is to introduce and study n-valued quandles and n-corack bialgebras. We elaborate the basic methods of this theory, reproduce the coset construction known in the theory of n-valued groups. We also consider a construction of n-valued quandles using n-multi-quandles. In contrast to the case of n-valued groups this construction turns out to be quite rich in algebraic and topological applications. An important part of the work is the study of the properties of n-corack bialgebras those role is analogous to the group bialgebra. Keywords: Multi-set, multivalued group, multi-group, rack, quandle, n-valued quandle, bi-algebra, rack bi-algebra. Mathematics Subject Classification 2010: Primary 20N20; Secondary Secondary 16S34, 05E30 ∗ bardakov@math.nsc.ru t.kozlovskaya@math.tsu.ru ‡ dtalalaev@yandex.ru † 1" 2312.12044v1,"XLand-MiniGrid: Scalable Meta-Reinforcement Learning Environments in JAX Alexander Nikulin ∗ Tinkoff Vladislav Kurenkov Tinkoff Viacheslav Sinii Tinkoff Ilya Zisman Tinkoff Artem Agarkov Tinkoff Sergey Kolesnikov Tinkoff Abstract We present XLand-MiniGrid, a suite of tools and grid-world environments for meta-reinforcement learning research inspired by the diversity and depth of XLand and the simplicity and minimalism of MiniGrid. XLand-Minigrid is written in JAX, designed to be highly scalable, and can potentially run on GPU or TPU accelerators, democratizing large-scale experimentation with limited resources. To demonstrate the generality of our library, we have implemented some well-known single-task environments as well as new meta-learning environments capable of generating 10 8 distinct tasks. We have empirically shown that the proposed environments can scale up to 2 13 parallel instances on the GPU, reaching tens of millions of steps per second. Figure 1: A visualization of how the production rules in XLand-MiniGrid work, exemplified by a few steps in the environment. On the first steps the agent picks up the blue pyramid, then places it next to the purple square. The NEAR production rule is then triggered, which transforms both objects into a new red circle. See Section 2.1 for a detailed description. 1 Introduction Reinforcement learning is known to be extremely sample inefficient and prone to overfitting, sometimes failing to generalize to even subtle variations in environmental dynamics or goals [Rajeswaran et al., 2017, Zhang et al., 2018, Henderson et al., 2018]. One way to address these shortcomings can be a meta-RL approach, where adaptive agents are pre-trained on diverse task distributions to significantly increase the sampling efficiency on new problems [Wang et al., 2016, Duan et al., 2016]. With sufficient scaling and task diversity, this can lead to astonishing results, reducing the adaptation time on new problems to the human level and beyond [Team et al., 2021, 2023]. At the same time, meta-RL introduces a trade-off, significantly increasing the pre-training requirements at the expense of faster adaptation during inference, as the agent should experience thousands ∗ Correspondence to: Intrinsically Motivated Open-ended Learning Workshop at 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.12057v1,"Monitoring Auditable Claims in the Cloud Lev Sorokin, Ulrich Schoepp fortiss GmbH, Munich, Germany {sorokin,schoepp}@fortiss.org Abstract. When deploying mission-critical systems in the cloud, where deviations may have severe consequences, the assurance of critical decisions becomes essential. Typical cloud systems are operated by third parties and are built on complex software stacks consisting of e.g., Kubernetes, Istio, or Kafka, which due to their size are difficult to be verified. Nevertheless, one needs to make sure that mission-critical choices are made correctly. We propose a flexible runtime monitoring approach that is independent of the implementation of the observed system that allows to monitor safety and data-related properties. Our approach is based on combining distributed Datalog-based programs with tamper-proof storage based on Trillian to verify the premises of safety-critical actions. The approach can be seen as a generalization of the Certificate Transparency project. We apply our approach to an industrial use case that uses a cloud infrastructure for orchestrating unmanned air vehicles. 1 Introduction Cloud systems are used in various domains, e.g., in healthcare, entertainment, in the financial or the automotive sector. Following the HashiCorp cloud report 1 over 94% of all enterprises world-wide use cloud services. Deployment of systems in the cloud promises cost savings, scalability – by automatic provisioning of resources depending on the request load – and high availability. While cloud technologies have many advantages, using them for missioncritical applications presents many challenges. We need to address several risks, such as hardware, software faults or attacks that can have an impact on the integrity of processed information or the availability of a service. However, cloud software stacks based on components like Kubernetes or Kafka are complex 2 and are updated frequently, which makes assurance tasks difficult. If it is not feasible to verify the implementation, then one approach to guaranteeing the safety of critical decisions is to track the events and actions of the implementation in an independent runtime monitoring layer and to verify the safety of decisions using the collected data. Runtime monitoring is already standard in cloud systems in the form of Security Information and Event Management (SIEM) [15,4]. One continuously aggregates log data from all cloud system components and correlates and analyses 1 2 https://www.hashicorp.com/state-of-the-cloud https://www.influxdata.com/blog/will-kubernetes-collapse-under-the-weight-of-its-complexity/" 2312.12091v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Model-Heterogeneous Federated Learning for Internet of Things: Enabling Technologies and Future Directions Boyu Fan, Siyang Jiang, Xiang Su, Member, IEEE and Pan Hui, Fellow, IEEE Abstract—Internet of Things (IoT) interconnects a massive amount of devices, generating heterogeneous data with diverse characteristics. IoT data emerges as a vital asset for dataintensive IoT applications, such as healthcare, smart city and predictive maintenance, harnessing the vast volume of heterogeneous data to its maximum advantage. These applications leverage different Artificial Intelligence (AI) algorithms to discover new insights. While machine learning effectively uncovers implicit patterns through model training, centralizing IoT data for training poses significant privacy and security concerns. Federated Learning (FL) offers an promising solution, allowing IoT devices to conduct local learning without sharing raw data with third parties. Model-heterogeneous FL empowers clients to train models with varying complexities based on their hardware capabilities, aligning with heterogeneity of devices in real-world IoT environments. In this article, we review the state-of-the-art model-heterogeneous FL methods and provide insights into their merits and limitations. Moreover, we showcase their applicability to IoT and identify the open problems and future directions. To the best of our knowledge, this is the first article that focuses on the topic of model-heterogeneous FL for IoT. Index Terms—Federated learning, Internet of things, deep learning I. I NTRODUCTION VER the past decade, significant advancements in Artificial Intelligence (AI) have led to widespread integration into various Internet of Things (IoT) applications. AI has empowered various IoT domains, ranging from smart city and environmental monitoring to manufacturing and healthcare. Machine learning (ML) plays a crucial role, enabling the development of robust models by allowing algorithms to learn patterns from data. Traditionally, data is collected from various IoT sources and stored in centralized servers, thereby supporting data analysis and model development for researchers and scientists. These powerful servers offer ample computational resources, facilitating efficient and reliable model development. However, with the rising privacy concerns, it is evident that centralized data collection poses inherent risks O Boyu Fan is with the Department of Computer Science, University of Helsinki, Helsinki 00100, Finland. E-mail: boyu.fan@helsinki.fi Siyang Jiang is with the School of Mathematics and Statistics, Huizhou University, and also with the Department of Information Engineering, The Chinese University of Hong Kong. E-mail: syjiang@hzu.edu.cn Xiang Su is with the Department of Computer Science, Norwegian University of Science and Technology, Gjøvik, Norway. E-mail: xiang.su@ntnu.no Pan Hui is with the Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, and also with the Department of Computer Science, University of Helsinki, Helsinki 00100, Finland. E-mail: panhui@cse.ust.hk Manuscript received December 7, 2023 to individual privacy. To address these concerns, a series of regulatory laws and policies, such as the General Data Protection Regulation (GDPR), are enacted by governments to regulate the collection and handling of data, which motivates researchers to explore alternative ML paradigms that adhere to these privacy guidelines. Federated Learning (FL) emerges as a promising solution for training models in a privacy-preserving manner for IoT applications. FL obviates the need for centralized data collection by local storage of data. Each client trains the model with its local data and contributes to the global model by sharing only model parameters or gradients with the central server. With this privacy-preserving feature, FL is widely used across diverse domains, such as health, banking, and transportation. It is imperative to highlight the growing adoption of FL within the context of the Internet of Things (IoT), where billions of sensors and edge devices are continuously generating vast amounts of data on a daily basis. Characteristics of FL in the IoT context underscore its adaptability and effectiveness in handling the unique data challenges in IoT ecosystems. One limitation of FL is that the server can only perform aggregation once it has received updates from all participating clients. Training a neural network is computationally expensive, given a huge number of model parameters and the necessity for multiple iteration rounds. Consequently, if some clients fail to complete the local training within the expected times due to the limited computational resources, both the server and other clients must wait for them, leading to low learning efficiency and resource utilization inefficiency. However, the real-world IoT environments naturally include diverse devices, contributing to a high level of resource heterogeneity. Moreover, the dynamic operating environments, e.g., network traffic fluctuations and temperature variations, also have the potential to affect the training times. Therefore, traditional model-homogeneous FL approaches like FedAvg [1] cannot be effectively utilized in such IoT scenarios. To this end, model-heterogeneous FL has been investigated to solve the aforementioned challenge, alleviating the requirement imposed by traditional FL where all clients are expected to share a universal global model. Instead, it enables clients to train different types of models based on their respective capabilities, which offers two significant advantages, i.e., mitigating the straggler issues [2] and decreasing of resource wastage. For instance, consider a scenario where a Raspberry Pi can efficiently train a two-layer convolutional neural network (CNN), while a ResNet18 model would pose" 2312.12093v1,"New A-numerical radius equalities and inequalities for certain operator matrices and applications Soumitra Daptari b , Fuad Kittaneh a,∗ , Satyajit Sahoo b a b Department of Mathematics, The University of Jordan, Amman, Jordan School of Mathematical Sciences, National Institute of Science Education and Research Bhubaneswar, India Abstract The main goal of this article is to establish several new A-numerical radius equalities and inequalities for n × n cross-diagonal, left circulant, skew left circulant operator matrices, where A is the n × n diagonal operator matrix whose diagonal entries are positive bounded operator A. Also, we introduce two new matrices called left imaginary circulant operator matrix and left imaginary skew circulant operator matrix and present their A-numerical radii. Certain A-numerical radii of general n × n operator matrices are obtained. Some special cases of our results lead to the results of earlier works in the literature, which shows that our results are more general. Applications of our results are established through some interesting examples. We also provide a concluding section by posing a problem for future research. Keywords: A-numerical radius; positive operator; semi-inner product; inequality; left circulant operator matrix; skew left circulant operator matrix. Mathematics subject classification (2010): 47A12, 47A30, 47A63, 15A60 1. Introduction and Preliminaries Let H be a complex Hilbert space with inner product ⟨⋅, ⋅⟩ and the corresponding norm ∥ ⋅ ∥. n Let B(H) be the C ∗ -algebra of all bounded linear operators on H. We let H = ⊕ H be the i=1 direct sum of n copies of H. If T ij , 1 ≤ i, j ≤ n are operators in B(H), then operator matrix Corresponding author Email addresses: daptarisoumitra@gmail.com (Soumitra Daptari), fkitt@ju.edu.jo (Fuad Kittaneh), ssahoo@niser.ac.in, satyajitsahoo2010@gmail.com (Satyajit Sahoo) ∗ Preprint submitted to ....................... December 20, 2023" 2312.12112v1,"C URATED LLM: S YNERGY OF LLM S AND D ATA C URATION FOR TABULAR AUGMENTATION IN ULTRA LOW - DATA REGIMES P REPRINT Nabeel Seedat * University of Cambridge ns741@cam.ac.uk Nicolas Huynh ∗ University of Cambridge nvth2@cam.ac.uk Boris van Breugel University of Cambridge bv292@cam.ac.uk Mihaela van der Schaar University of Cambridge mv472@cam.ac.uk A BSTRACT Machine Learning (ML) in low-data settings remains an underappreciated yet crucial problem. This challenge is pronounced in low-to-middle income countries where access to large datasets is often limited or even absent. Hence, data augmentation methods to increase the sample size of datasets needed for ML are key to unlocking the transformative potential of ML in data-deprived regions and domains. Unfortunately, the limited training set constrains traditional tabular synthetic data generators in their ability to generate a large and diverse augmented dataset needed for ML tasks. To address this technical challenge, we introduce CLLM, which leverages the prior knowledge of Large Language Models (LLMs) for data augmentation in the low-data regime. While diverse, not all the data generated by LLMs will help increase utility for a downstream task, as for any generative model. Consequently, we introduce a principled curation process, leveraging learning dynamics, coupled with confidence and uncertainty metrics, to obtain a high-quality dataset. Empirically, on multiple real-world datasets, we demonstrate the superior performance of LLMs in the low-data regime compared to conventional generators. We further show our curation mechanism improves the downstream performance for all generators, including LLMs. Additionally, we provide insights and understanding into the LLM generation and curation mechanism, shedding light on the features that enable them to output high-quality augmented datasets. CLLM paves the way for wider usage of ML in data scarce domains and regions, by allying the strengths of LLMs with a robust data-centric approach. 1 Introduction No data, No Machine Learning. Machine learning (ML) has transformed numerous industries, but its wider adoption is hindered by a pervasive roadblock: insufficient data. Specifically, the use of ML algorithms presumes the availability and access to large datasets for training, be it in the form of labeled or unlabeled data. Unfortunately, real-world domains are often data scarce: (i) in healthcare and finance, collecting annotations can be expensive or practically impossible; (ii) in developing and low-to-middle income countries (LMICs), digital infrastructure (such as electronic healthcare records (EHRs)) can be limited or nonexistent [Ade-Ibijola and Okonkwo, 2023, Asiedu et al., 2023, Owoyemi et al., 2020, Mollura et al., 2020, Alami et al., 2020, Ciecierski-Holmes et al., 2022] and (iii) within large datasets, there can be (ethnic) minorities that are underrepresented. This lack of data has serious consequences: to sideline these settings to the peripheries of ML advancements and prevent the development of accurate models. How can we build a reliable ML model in this low-data regime, where we have so few samples? Solving this problem is a major opportunity that would unlock the potential of ML across society, domains, and regions. ∗ denotes equal contribution" 2312.12128v1,"On the asymptotic safety in the Litim-Sannino model at four loops A.V. Bednyakov 1, ∗ and A.I. Mukhaeva 1, † 1 Joint Institute for Nuclear Research, Joliot-Curie, 6, Dubna 141980, Russia We consider a four-dimensional SU (N c ) gauge theory coupled to N f species of color fermions and N f 2 colorless scalars. The quantum field theory possesses a weakly interacting ultraviolet fixed point that we determine from beta functions computed up to four-loop order in the gauge coupling, and up to three-loop order in the Yukawa and quartic scalar couplings. The fixed point has one relevant direction giving rise to asymptotic safety. We compute fixed-point values of dimensionless couplings together with the corresponding scaling exponents up to the first three non-trivial orders in Veneziano parameter ϵ, both for infinite and finite number of colors N c . We also consider anomalous dimensions for fields, scalar mass squared, and a class of dimension-3 operators. Contrary to previous studies, we take into account possible mixing of the latter and compute eigenvalues of the corresponding matrix. Further, we investigate the size of the conformal window in the Veneziano limit and its dependence on N c . I. INTRODUCTION The study of asymptotic behavior of the dimensionless couplings in Quantum Field Theory (QFT) provides important information both for the Standard Model (SM) and Beyond the Standard Model (BSM) scenarios. One of these behaviors is known as asymptotic freedom [1, 2], which is a defining feature of Quantum Chromodynamics. This behavior entails a decrease in the value of a coupling with the energy scale. Thus, in the deep ultraviolet (UV), this coupling tends to approach the Gaussian non-interactive fixed point (FP). Asymptotic safety (AS) is an extension of the concept of asymptotic freedom, as outlined in the work of S. Weinberg [3]. In AS, the coupling in the deep UV also reach a fixed point, but unlike in asymptotic freedom, the fixed-point value is not zero, which means that the theory remains interactive. Such theories are referred to as asymptotically safe. The concept of asymptotic safety was initially introduced by S. Weinberg in the late 1970s as a means of achieving non-perturbative renormalizability for the four-dimensional theory of gravity [3]. However, in recent years, AS has been widely applied in the context of gauge theories to address issues with U (1) gauge couplings (Landau pole) by stabilizing them at an interactive fixed point at a certain scale. But from the phenomenological point of view, properties of such UV interactive fixed points can be transmitted down to the low-energy regime and lead us to some phenomenological predictions [4–23]. AS has been found in simple [24], semi-simple [25], and supersymmetric gauge theories coupled to matter [26]. An example of a UV-complete particle theory with a weakly interacting fixed point is a model of N f fermions coupled to SU (N c ) gauge fields and elementary scalars through gauge and Yukawa interactions. In the large-N Veneziano limit, the fixed point can be systematically studied in perturbation theory using a small control parameter ϵ, allowing for the extraction of specific details of theory. Previous studies [4, 24, 27, 28] have identified critical couplings and universal exponents up to second order in ϵ, including finite N corrections. In this paper, we confirm the study [29] of the UV critical theory and provide the fixed-point couplings and conformal data up to third order in ϵ (both for infinite and finite-N c scenarios) by considering four-loop gauge, three-loop Yukawa, and quartic β functions. We also determine three-loop anomalous dimensions for dimension-3 operators and discuss peculiarities in their computations as compared to [29]. The paper is organised as follows. Sec.II provides the main information about the considered model and operators. In Sec.III, we give the details of computation the renormalization-group (RG) functions. In Sec.IV, we demonstrate our results for fixed points, anomalous dimensions and scaling exponents for finite N c . The bounds on the conformal window are given in Sec.V. We conclude in Sec.VI. The full expressions for beta functions and various anomalous dimensions can be found in App.A 1, A 2, and A 3. App.B contains additional information related to calculation techniques. ∗ † bednya@jinr.ru mukhaeva@theor.jinr.ru" 2312.12143v1,"Integrating Human Vision Perception in Vision Transformers for classifying waste items Akshat Kishore Shrivastava The Shri Ram School, Aravali Gurgaon, India, 122002 akshat1509@icloud.com Tapan Kumar Gandhi Department of Electrical Engineering IIT-Delhi Delhi, India, 110016 tgandhi@ee.iitd.ac.in December 20, 2023 Abstract In this paper, we propose an novel methodology aimed at simulating the learning phenomenon of nystagmus through the application of differential blurring on datasets. Nystagmus is a biological phenomenon that influences human vision throughout life, notably by diminishing head shake from infancy to adulthood. Leveraging this concept, we address the issue of waste classification, a pressing global concern. The proposed framework comprises two modules, with the second module closely resembling the original Vision Transformer, a state-of-the-art model model in classification tasks. The primary motivation behind our approach is to enhance the model’s precision and adaptability, mirroring the real-world conditions that the human visual system undergoes. This novel methodology surpasses the standard Vision Transformer model in waste classification tasks, exhibiting an improvement with a margin of 2%. This improvement underscores the potential of our methodology in improving model precision by drawing inspiration from human vision perception. Further research in the proposed methodology could yield greater performance results, and can extrapolated to other global tasks. Keywords waste classification · artificial intelligence · vision transformers · human vision" 2312.12147v1,"LoKit (revisited): A Toolkit for Building Distributed Collaborative Applications Uwe M. Borghoff Institute for Software Technology University of the Bundeswehr Munich, Neubiberg, Germany uwe.borghoff@unibw.de Abstract. LoKit is a toolkit based on the coordination language LO. It allows to build distributed collaborative applications by providing a set of generic tools. This paper briefly introduces the concept of the toolkit, presents a subset of the LoKit tools, and finally demonstrates its power by discussing a sample application built with the toolkit. Keywords: LO · fault-tolerant communication · coordination · toolkit. 1 Introduction This paper 1 presents the basic design decisions and first results for a toolkit residing on top of the coordination language LO. The underlying language. LO is a rule-based coordination language designed for managing multiple software agents in open systems. LO can be applied for implementing systems whose behavior is generated by the interaction of autonomous, heterogeneous components. In general, with LO you can flexibly customize and efficiently execute complex multi-agent coordination schemata. It is important to understand in which sense LO – and therefore the tools provided – is a coordination language, versus a programming language in the traditional sense. This essentially means that LO is just concerned about the coordination and communication of events among agents, while traditional “procedural” activities (data-structure manipulation, arithmetics etc.) are delegated to the 1 This paper is a reprint of an unpublished report on the occasion of the (fictitious) 30th anniversary of the Xerox Research Centre Europe, now Naver Labs, Grenoble, France (https://europe.naverlabs.com/). LoKit was the basis for the development of the Constraint-Based Knowledge Brokers [7,8,10], a new type of search engine architecture at the time, which was able to search heterogeneous and multilingual databases in the same way [17,18,20] and establish cross-relationships between them via so-called Signed Feature Constraints [9,16,19]. This basic technology was marketed by Xerox from around 1999 under the name Ask Once and acquired by Documentum in 2004." 2312.12151v1,"SoftCTM: Cell detection by soft instance segmentation and consideration of cell-tissue interaction Lydia A. Schoenpflug and Viktor H. Koelzer 1, ∗ [0009−0009−6703−9368] 1[0000−0001−9206−4885] 1 Department of Pathology and Molecular Pathology, University Hospital and University of Zürich, Schmelzbergstrasse 12, 8091 Zürich, Switzerland *Corresponding author, lydia.schoenpflug@usz.ch Abstract. Detecting and classifying cells in histopathology H&E stained whole-slide images is a core task in computational pathology, as it provides valuable insight into the tumor microenvironment. In this work we investigate the impact of ground truth formats on the models performance. Additionally, cell-tissue interactions are considered by providing tissue segmentation predictions as input to the cell detection model. We find that a “soft”, probability-map instance segmentation ground truth leads to best model performance. Combined with cell-tissue interaction and test-time augmentation our Soft Cell-Tissue-Model (Soft- CTM) achieves 0.7172 mean F1-Score on the Overlapped Cell On Tissue (OCELOT) test set, achieving the third best overall score in the OCELOT 2023 Challenge. The source code for our approach is made publicly available at https://github.com/lely475/ocelot23algo. Keywords: histopathology image analysis · cell detection · deep learning · tumor microenvironment. 1 Introduction Cell detection and classification is a sub-task of Computational Pathology, which can be achieved through deep learning as shown in [14,5,10,8,15,2]. Jeongun Ryu and colleagues demonstrate in [11] that cell detection can benefit from considering cell-tissue relationships. They furthermore introduce the OCELOT dataset, which consists of 667 pairs of high resolution patches for cell detection in combination with lower resolution tissue patches, showing additional tissue context around the cell patch. The OCELOT 2023: Cell Detection from Cell- Tissue Interaction Challenge [9] motivates the development of cell detection algorithms that take the surrounding tissue context into account, based on the OCELOT dataset. In this paper, we present an approach to the OCELOT 2023 Challenge. First, we investigate the impact of different ground truth formats on the model performance. Second, we utilize the tissue segmentation annotation, by training a second model for tissue segmentation and providing its predictions" 2312.12174v1,"IEEE SIGNAL PROCESSING LETTERS, VOL. X, NO. X, MONTH 2023 1 Low-Consumption Partial Transcoding by HEVC Mohsen Abdoli, Félix Henry, and Gordon Clare Abstract—A transcoding scheme for the High Efficiency Video Coding (HEVC) is proposed that allows any partial frame modification to be followed by a partial re-compression of only the modified areas, while guaranteeing identical reconstruction of non-modified areas. To this end, first, syntax elements of all Coding Units (CU) in the frame are parsed and decoded according to their scan order. Then CUs that are collocated with a replaced area are re-encoded with new content to generate a partial set of new syntax elements. In order to avoid spatial propagation of the decoding mismatch due to the new content, CUs on the border of the replaced area are losslessly coded such that reconstruction of immediately neighboring CUs in the scan order are protected from the modification. The proposed method has been implemented on top of the HEVC test Model (HM) in All-Intra (AI) coding configuration and experiments show that, depending on the test parameters, it can offer both a bitrate saving (up to 4% in terms of BD-BR) and a transcoding acceleration (up to 83%) compared to a full transcoding scheme. Index Terms—HEVC, Transcoding, Lossless coding I. I NTRODUCTION I N various video communication systems, it is common for a single source content to undergo multiple encoding processes before reaching the end-user’s display. This operation is commonly referred to as “transcoding” and can take place at various stages within the video delivery chain, depending on the purpose. Typically, transcoding is applied to an already encoded video stream to address capacity limitations of either the underlying network (e.g., bandwidth) or the receiving device (e.g., resolution) [1]. A specific use case of transcoding, targetted in this paper, is where the coded bitstream is transcoded to replace a relatively small area of video frames in relation to the overall video resolution. Some examples of such use cases include: 1) Logo replacement/removal/enhancement, 2) Replacement of hardcoded closed captions (e.g., language change), 3) Personalized advertisement insertion and 4) Insertion of a sign language interpreter. In all these scenarios, the initial source content is encoded once at the sender’s side and is modified slightly at later stages of the delivery chain. The most straightforward approach to addressing the aforementioned scenarios is to perform a full decode-modifyencode operation. In this process, the compressed video from the source is decoded and decompressed to obtain the raw decoded pixel representation. Subsequently, the specific area to be replaced is identified, and the new content is inserted in its place. Finally, the modified signal is re-encoded to generate a new compressed video stream that incorporates the desired modifications. M. Abdoli, F. Henry and G. Clare are with IRT b<>com, Cesson-Sévigné, France. F. Henry and G. Clare are also with Orange Innovation, Cesson- Sévigné, France. (e-mail: firstname.lastname@b-com.com). There are two primary drawbacks associated with any solution that involves re-encoding a significant portion of the frames. Firstly, re-encoding a large area of frames requires significant computational resources and time, which can be inefficient in terms of both energy consumption and the cost of video delivery ecosystem deployment. Secondly, repeated re-encoding of frames can result in quality degradation. Each encoding process introduces compression artifacts and information loss, which can accumulate and adversely affect the overall visual quality of the video. This degradation is particularly noticeable when the replacement area is relatively small compared to the entire frame, as the re-encoding process affects a larger portion of the original content. Another solution that is sometimes employed to tackle certain aspects of the aforementioned problem is to define independently coded areas within the video signal, specifically covering the replaceable area [2]. In this approach, when a replacement is required, transcoding is only applied to the target areas of the coded bitstream, avoiding the need for a full decode-modify-encode operation. Motion-Constrained Tiles Set (MCTS) in H.265/HEVC [3]–[5] and sub-Pictures in H.266/VVC [6]–[8] are techniques that can be utilized to address the problem. Both methods allow encoding with constrained motion vectors, enabling independent decoding and transmission of specific pieces (tiles or sub-pictures). By defining borders to encompass the replacement area within a single piece while constraining others, the issue can be somehow resolved. Although MCTS and sub-pictures can be beneficial for certain use cases, such as 360 ◦ video coding [9], they may not be the most suitable solutions for addressing the content replacement problem described in this paper, when dealing with relatively small replacement areas. One drawback arises when using small pieces (i.e. tiles or sup-pictures), as it increases the overall number of pieces, potentially causing issues related to parallelism capacity and latency. On the other hand, employing large pieces with a small portion dedicated to replacement content still results in significant portions of the image being subject to the re-encoding drawbacks mentioned earlier. This paper proposes a method that selectively re-encodes only the replacement area of each frame while leaving other parts unchanged. It offers two advantages: improved compression efficiency by avoiding redundant compression outside the replacement area, and faster transcoding by focusing on the time-consuming RDO only for the replacement area. This paper is structured as follows. In Section II, the proposed method is described. Section III presents the testing conditions and the results obtained from the experiments. Finally, in Section IV, the paper concludes with discussions on the limitations of the proposed method and potential directions for future research." 2312.12175v1,"Fast Forward-Backward splitting for monotone inclusions with a convergence rate of the tangent residual of op1{kq Radu Ioan Boţ ∗ Dang-Khoa Nguyen †‡ Chunxiang Zong § December 20, 2023 Abstract We address the problem of finding the zeros of the sum of a maximally monotone operator and a cocoercive operator. Our approach introduces a modification to the forward-backward method by integrating an inertial/momentum term alongside a correction term. We demonstrate that the sequence of iterations thus generated converges weakly towards a solution for the monotone inclusion problem. Furthermore, our analysis reveals an outstanding attribute of our algorithm: it displays rates of convergence of the order op1{kq for the discrete velocity and the tangent residual approaching zero. These rates for tangent residuals can be extended to fixed-point residuals frequently discussed in the existing literature. Specifically, when applied to minimize a nonsmooth convex function subject to linear constraints, our method evolves into a primal-dual full splitting algorithm. Notably, alongside the convergence of iterates, this algorithm possesses a remarkable characteristic of nonergodic/last iterate op1{kq convergence rates for both the function value and the feasibility measure. Our algorithm showcases the most advanced convergence and convergence rate outcomes among primal-dual full splitting algorithms when minimizing nonsmooth convex functions with linear constraints. Key Words. monotone inclusion, forward-backward algorithm, Nesterov’s momentum, Lyapunov analysis, convergence rates, convergence of the iterates, convex optimization subject to linear constraints, primal-dual algorithm AMS subject classification. 49M29, 65K05, 68Q25, 90C25, 65B99 1 Introduction and related works 1.1 Forward-Backward splitting A multitude of problems in optimization, variational inequalities, partial differential equations, mechanics, economics, game theory, and signal and image processing can be streamlined by solving a monotone inclusion. Monotone inclusions seeking to determine a zero of the sum of two maximally monotone operators are efficiently solved using the splitting paradigm. This approach involves evaluating the two operators separately from each other [10, 40]. Depending on the nature of the operators, different splitting approaches have been considered. These include Douglas-Rachford splitting [28, 20], Forward-Backward splitting [28, 38], Tseng’s Forward-Backward-Forward splitting [45], and Forward- Reflected-Backward splitting [31]. ∗ Faculty of Mathematics, University of Vienna, Oskar-Morgenstern-Platz 1, 1090 Vienna, Austria, e-mail: radu.bot@ univie.ac.at. Research partially supported by Austrian Science Fund (FWF), project W 1260 and P 29809-N32. † Faculty of Mathematics, University of Vienna, Oskar-Morgenstern-Platz 1, 1090 Vienna, Austria, e-mail: dang-khoa. nguyen@univie.ac.at. Research partially supported by Austrian Science Fund (FWF), project P 29809-N32. ‡ Faculty of Mathematics and Computer Science, University of Science, Vietnam National University, Ho Chi Minh City 700000, Vietnam. § School of Mathematics and Statistics, Lanzhou University, Lanzhou 730000, People’s Republic of China, e-mail: zongchx19@lzu.edu.cn. Research partially supported by the China Scholarship Council (202206180023) and conducted during a research visit at the University of Vienna in 2023. 1" 2312.12191v1,"CUDC: A Curiosity-Driven Unsupervised Data Collection Method with Adaptive Temporal Distances for Offline Reinforcement Learning Chenyu Sun 1,2,3 , Hangwei Qian 4 , Chunyan Miao 1,2,3 1 Alibaba-NTU Singapore Joint Research Institute, Nanyang Technological University (NTU), Singapore 2 School of Computer Science and Engineering, NTU, Singapore 3 Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly (LILY), NTU, Singapore 4 Centre for Frontier AI Research (CFAR), Agency for Science, Technology and Research (A*STAR), Singapore chenyu002@e.ntu.edu.sg, qian hangwei@cfar.a-star.edu.sg, ascymiao@ntu.edu.sg Abstract Offline reinforcement learning (RL) aims to learn an effective policy from a pre-collected dataset. Most existing works are to develop sophisticated learning algorithms, with less emphasis on improving the data collection process. Moreover, it is even challenging to extend the single-task setting and collect a task-agnostic dataset that allows an agent to perform multiple downstream tasks. In this paper, we propose a Curiosity-driven Unsupervised Data Collection (CUDC) method to expand feature space using adaptive temporal distances for task-agnostic data collection in multi-task offline RL. To achieve this, CUDC estimates the probability of the kstep future states being reachable from the current states, and adapts how many steps into the future that the dynamics model should predict. With this adaptive reachability mechanism in place, the feature representation can be diversified, and the agent can navigate itself to collect higher-quality data with curiosity. Empirically, CUDC surpasses existing unsupervised methods in efficiency and learning performance in various downstream offline RL tasks of the DeepMind control suite. 1 Introduction Deep reinforcement learning has achieved remarkable breakthroughs in various fields, such as games, robotics, and navigation in virtual environments (Kiran et al. 2021; Singh, Kumar, and Singh 2022; Sun, Qian, and Miao 2022a). However, real-time interaction with the environment under online RL settings may not always be feasible due to cost, safety, or ethical concerns (Kiran et al. 2021; Singh, Kumar, and Singh 2022). As a result, offline RL has gained popularity in recent years to cope with limited interactions, where agents learn a policy exclusively from a previously-collected dataset. The popular offline RL benchmarks such as D4RL (Fu et al. 2020) and RL Unplugged (Gulcehre et al. 2020) combine data from supervised online RL training runs with expert demonstrations, exploratory agents, and hand-coded controllers. However, collecting expert data can be time-consuming and expensive, and it may not always be available. In such cases, unsupervised methods, such as those described by ExORL (Yarats et al. 2022), can be used to collect data as a distinct contribution for offline RL (Prudencio, Maximo, and Colombini 2022). These methods aim to explore the environment Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. and learn from the intrinsic rewards generated by the agent, without the need for supervision, to collect diverse data. Despite the popularity of offline RL, existing works have mainly focused on model-centric practices, continually developing new algorithms (Kumar et al. 2020, 2022). These algorithms are typically evaluated on the same task for which the dataset was collected, and the learned policy can be pessimistic in out-of-distribution states and actions, leading to poor generalization in unseen downstream tasks. Recently, data-centric approaches have become emerging, emphasizing the importance of training data quality over algorithmic advances (Motamedi, Sakharnykh, and Kaldewey 2021; Patel et al. 2022). To improve training data quality, researchers have explored selecting the most critical samples or re-weighting (Wu et al. 2021) all samples in the offline RL algorithms. However, these methods are restricted to a single training data distribution and cannot be applied to multi-task settings with distribution shifts. To address this challenge, we propose to improve the data collection process directly through feature space expansion, where the distributions naturally span during diverse exploration. This approach is applicable to the multi-task setting, enabling us to obtain more diverse and high-quality data for offline RL. Upon analyzing the current challenges faced in offline RL, the benchmark ExORL (Yarats et al. 2022) has shown that unsupervised RL methods are more effective than supervised methods in collecting datasets that allow the vanilla off-policy RL algorithm to learn and acquire different skills as an offline RL agent. However, upon further examination of existing methods, we discovered that they rely on a fixed temporal distance k between current and future states during data collection. This practice is sub-optimal and restricts the diversity of the learned feature representation, as illustrated in Figure 1 (left). To address this limitation, we propose to adapt the temporal distance as a simple yet effective way to enhance the feature representation, as it has a direct connection with the feature space. To facilitate adaptation, exploiting reachability to more distant future states is desired. Reachability-based methods in RL aim to learn safe and efficient policies by considering reachable states under the current policy or value function (Savinov et al. 2019; Péré et al. 2018; Ivanovic et al. 2019; Yu et al. 2022), but these approaches are not directly applicable. For example, Savinov et al. (2019) only considers binary" 2312.12206v1,"Identification of Causal Structure in the Presence of Missing Data with Additive Noise Model 1 1,3 1 1,2 * Jie Qiao , Zhengming Chen , Jianhua Yu , Ruichu Cai 4 , Zhifeng Hao 1 School of Computer Science, Guangdong University of Technology, Guangzhou 510006, China 2 Peng Cheng Laboratory, Shenzhen 518066, China 3 Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE 4 College of Science, Shantou University, Shantou 515063, China {qiaojie.chn, chenzhengming1103, philoso521, cairuichu}@gmail.com, haozhifeng@stu.edu.cn Abstract Missing data are an unavoidable complication frequently encountered in many causal discovery tasks. When a missing process depends on the missing values themselves (known as self-masking missingness), the recovery of the joint distribution becomes unattainable, and detecting the presence of such self-masking missingness remains a perplexing challenge. Consequently, due to the inability to reconstruct the original distribution and to discern the underlying missingness mechanism, simply applying existing causal discovery methods would lead to wrong conclusions. In this work, we found that the recent advances additive noise model has the potential for learning causal structure under the existence of the self-masking missingness. With this observation, we aim to investigate the identification problem of learning causal structure from missing data under an additive noise model with different missingness mechanisms, where the ‘no self-masking missingness’ assumption can be eliminated appropriately. Specifically, we first elegantly extend the scope of identifiability of causal skeleton to the case with weak self-masking missingness (i.e., no other variable could be the cause of self-masking indicators except itself). We further provide the sufficient and necessary identification conditions of the causal direction under additive noise model and show that the causal structure can be identified up to an IN-equivalent pattern. We finally propose a practical algorithm based on the above theoretical results on learning the causal skeleton and causal direction. Extensive experiments on synthetic and real data demonstrate the efficiency and effectiveness of the proposed algorithms. Introduction Missing data are ubiquitous in many fields and causal discovery from missing observational data is challenging due to possible complex missingness mechanisms—causal structure among the causal variables and its missingness indicators. ""indicator’ is variables that specify whether a value was missing for an observation. With different structures of the missingness mechanisms, following Rubin (1976), the missingness types can be categorized as Missing Completely At Random (MCAR), Missing At Random (MAR), and Missing Not At Random (MNAR). * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. When data are MCAR, the causal variables, and their missingness indicators are independent such that the missingness mechanism is ignorable, and one can perform the listwise deletion that simply drops the samples with missing value (Strobl, Visweswaran, and Spirtes 2018). However, for MNAR, the missingness mechanism is not ignorable, and the simple deletion would introduce bias resulting in incorrect inference (Rubin 2004; Mohan, Pearl, and Tian 2013; Tu et al. 2019). Much effort has been made in studying the recoverability of the MNAR data to correct the spurious correlations from deleted-wised distribution using reweighting by incorporating prior information of the causal graph and missingness mechanisms (Bhattacharya et al. 2020; Mohan and Pearl 2021; Nabi, Bhattacharya, and Shpitser 2020). However, when a missing process depends on the missing values themselves (known as self-masking belonging to MNAR), it suffers from a serious identifiability issue such that the origin distribution is not recoverable (Nabi, Bhattacharya, and Shpitser 2020). Existing works, therefore, mainly focus on causal discovery with no self-masking missingness mechanisms. On one hand, (Gao et al. 2022) addresses the M(C)AR cases using the identifiable additive noise models (ANMs) (Hoyer et al. 2008; Shimizu et al. 2006; Peters and Bühlmann 2014) with a general EM-based framework to perform causal discovery in the presence of missing data. On the other hand, to learn causal structure in MNAR, some constraints of the missingness mechanisms must be made. With the no self-masking assumption, Gain and Shpitser (2018) proposes to extend the constraint-based PC algorithm (Spirtes et al. 2000) by correcting the bias of each conditional independence (CI) test bought by the missing value. While, instead of correcting CI test, Tu et al. (2019) proposes a more efficient post-correction strategy to correct the spurious edges produced by the original PC algorithm. However, due to the limited recoverability, it is still unclear how to identify causal structure in the presence of the selfmasking missingness mechanism, which is believed to be the most commonly encountered in practice (Osborne 2013), e.g., smokers do not answer any questions about their smoking behavior in insurance applications, and people with very high or low income do not disclose their income (Mohan 2018). In this work, we found that the recent advances additive noise model has the potential for learning causal structure" 2312.12214v1,"Scattering map for the Vlasov-Maxwell system around source-free electromagnetic fields Léo Bigorgne ∗ Abstract We construct an isometric modified scattering operator, mapping any sufficiently regular past scattering state, with a small distribution function, to the future one corresponding to forward evolution by the Vlasov-Maxwell system. The main part of this work is devoted to the construction of a modified wave operator, which relates the future asymptotic dynamics of the solutions to their initial data. Then, by applying our previous results on modified scattering [8], we are able to construct a small data scattering map for the Vlasov- Maxwell system. Our analysis relies in particular on the study of the asymptotic Maxwell equations. Its solution captures not only the large time behavior of the electromagnetic field of the plasma near future timelike infinity as well as future null infinity, but also the one of its weighted derivatives. The wave operator provides as well a class of global solutions to the Vlasov-Maxwell system which are large in L px,v ˆ L 2 x but initially dispersed. Contents 1 Introduction 1.1 Local and global well-posedness for the Vlasov-Maxwell system . . . . . . . . . . . . . . . . . 1.2 Asymptotic stability of vacuum for the Vlasov-Maxwell system . . . . . . . . . . . . . . . . . 1.3 Modified scattering for the small data solutions to the Vlasov-Maxwell system . . . . . . . . . 1.4 Analogous results for the Vlasov-Poisson system . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 General notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 The Vlasov-Maxwell system in geometric form . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Charged electromagnetic field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.8 Constraint equations satisfied by the scattering states . . . . . . . . . . . . . . . . . . . . . . 1.9 Future and past scattering states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.10 Statement of the main results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.11 Related open problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.12 Structure of the paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3 3 4 6 6 7 8 8 9 9 11 11 2 Preliminaries 2.1 Commutation vector fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Weights capturing the good behavior of distribution functions for t „ |x| and |x| ě t . . . . . 2.3 Linear Vlasov fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 The Vlasov equation in variables adapted to modified scattering . . . . . . . . . . . . . . . . 2.5 Key elements of the proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 12 14 15 19 20 3 Energy and decay estimates 3.1 Ingoing and outgoing light cones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Energy inequality for Vlasov fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Energy inequalities for electromagnetic fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4 Pointwise decay estimates for electromagnetic fields . . . . . . . . . . . . . . . . . . . . . . . . 3.5 Control of the initial data for the Maxwell equations . . . . . . . . . . . . . . . . . . . . . . . 3.6 Study of the pure charge part of the electromagnetic field . . . . . . . . . . . . . . . . . . . . 23 23 24 25 28 30 31 ∗ Univ Rennes, CNRS, IRMAR - UMR 6625, F-35000 Rennes, France. E-mail address: leo.bigorgne@univ-rennes.fr 1" 2312.12241v1,"GeomVerse A Systematic Evaluation of Large Models for Geometric Reasoning Mehran Kazemi 1 , Hamidreza Alvari 1 , Ankit Anand 2 , Jialin Wu 1 , Xi Chen 1 , Radu Soricut 1 1 Google Research, 2 Google DeepMind {mehrankazemi, hamidrz, anandank, jialinwu, chillxichen, rsoricut}@google.com Abstract Large language models have shown impressive results for multi-hop mathematical reasoning when the input question is only textual. Many mathematical reasoning problems, however, contain both text and image. With the everincreasing adoption of vision language models (VLMs), understanding their reasoning abilities for such problems is crucial. In this paper, we evaluate the reasoning capabilities of VLMs along various axes through the lens of geometry problems. We procedurally create a synthetic dataset of geometry questions with controllable difficulty levels along multiple axes, thus enabling a systematic evaluation. The empirical results obtained using our benchmark for stateof-the-art VLMs indicate that these models are not as capable in subjects like geometry (and, by generalization, other topics requiring similar reasoning) as suggested by previous benchmarks. This is made especially clear by the construction of our benchmark at various depth levels, since solving higher-depth problems requires long chains of reasoning rather than additional memorized knowledge. We release the dataset for further research in this area 1 . 1 Figure 1: Sample GeomVerseproblem. Question: If the ABEF shape is a rectangle where a semi-circle has been removed from one side of it, the perimeter of the ABEF shape is 34 [...] compute the degree of the DAB angle. Assume π = 3.14. Round computations to 2 decimal places. Solution: The diameter of the semicircle in the ABEF shape is equal to the side of the rectangle with length 7 so the shape has two sides with equal but unknown lengths, one side with length 7, and one semi-circle arc with diameter 7. So the perimeter is 2 ∗ U nknownSide + 7 + 7π 2 [...] the length of the AB side is 16.01 = 8. [...] the final answer is 28.69. 2 Introduction Multi-hop reasoning is a fundamental element in intelligence: it allows us to combine multiple pieces of information to answer questions or solve problems. While formal reasoning such as automated theorem proving (Robinson, 1965; Kovács and Voronkov, 2013; Schulz, 2002) has been a key focus in the AI literature, recent years have witnessed a great amount of progress in multi-hop reasoning with natural language thanks to the advances in pre-trained large language models (LLMs) (Wei et al., 2022; Nye et al., 2022; Kazemi et al., 2023b; Saparov et al., 2023; Yao et al., 2023; Pan et al., 2023). Among various types of multi-hop reasoning, mathematical reasoning has turned into a key 1 Available at https://storage.googleapis. com/gresearch/GeomVerseV0/GeomVerse.zip focus domain for AI researchers (Lu et al., 2022; Lewkowycz et al., 2022) with many recent works targeting to solve open problems in mathematics (Fawzi et al., 2022; Davies et al., 2021). It is an appealing domain for AI research due to various reasons: it is a primitive skill that is essential for many tasks, it has an open-ended nature, and due to various challenges such as limited data it still remains a challenge for LLMs and modern AI systems. Recently, the International Math Olympiad (IMO) grand challenge (Selsam et al., 2020) was announced where the goal is to build an AI system that can win a gold medal in IMO, one of the most prestigious competitions. Not only research, with advancements in LLMs, many new applications and products are leveraging AI research for educa-" 2312.12244v1,"Received XX Month, XXXX; revised XX Month, XXXX; accepted XX Month, XXXX; Date of publication XX Month, XXXX; date of current version XX Month, XXXX. Digital Object Identifier 10.1109/OJCOMS.2022.1234567 Protecting Massive MIMO-Radar Coexistence: Precoding Design and Power Control Mohamed Elfiatoure ∗ , Mohammadali Mohammadi ∗ , Senior Member, IEEE, Hien Quoc Ngo ∗ , Senior Member, IEEE, Peter J. Smith † , Fellow, IEEE, Michail Matthaiou ∗ , Fellow, IEEE 2 1 Centre for Wireless Innovation (CWI), Queen’s University Belfast, U.K. School of Mathematics and Statistics, Victoria University of Wellington, Wellington 6012, New Zealand CORRESPONDING AUTHOR: Mohamed Elfiatoure (e-mail: melfiatoure01@qub.ac.uk). This work is a contribution by Project REASON, a UK Government funded project under the Future Open Networks Research Challenge (FONRC) sponsored by the Department of Science Innovation and Technology (DSIT). The work of M. Mohamamdi and M. Matthaiou was supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 101001331).The work of H. Q. Ngo was supported by the U.K. Research and Innovation Future Leaders Fellowships under Grant MR/X010635/1. ABSTRACT This paper studies the coexistence between a downlink multiuser massive multi-input-multioutput (MIMO) communication system and MIMO radar. The performance of the massive MIMO system with maximum ratio (MR), zero-forcing (ZF), and protective ZF (PZF) precoding designs is characterized in terms of spectral efficiency (SE) and by taking the channel estimation errors and power control into account. The idea of PZF precoding relies on the projection of the information-bearing signal onto the null space of the radar channel to protect the radar against communication signals. We further derive closedform expressions for the detection probability of the radar system for the considered precoding designs. By leveraging the closed-form expressions for the SE and detection probability, we formulate a power control problem at the radar and base station (BS) to maximize the detection probability while satisfying the per-user SE requirements. This optimization problem can be efficiently tackled via the bisection method by solving a linear feasibility problem. Our analysis and simulations show that the PZF design has the highest detection probability performance among all designs, with intermediate SE performance compared to the other two designs. Moreover, by optimally selecting the power control coefficients at the BS and radar, the detection probability improves significantly. INDEX TERMS Beamforming, detection probability, massive multiple-input multiple-output (MIMO), power allocation, spectral efficiency. I. INTRODUCTION Spectrum sharing between the radar and cellular communication systems, termed as communication/radar co-existing systems, has been envisioned as an enabling solution to address the explosive growth of wireless traffic demands and shortage of licensed spectra [1]–[4]. Nevertheless, the inherent challenge of spectrum sharing, i.e., inter-system interference that compromises the performance of both systems, calls for an efficient cross interference management and spectrum assignment. To facilitate co-existence with overlaid communication systems, a variety of techniques, such as opportunistic spectrum sharing between cellular and rotating radar [5], interference mitigation [1], [6], precoding or spatial separation [1], [7], and waveform design for radar [1], [8], [9] have been proposed in the literature. The widespread deployment of the massive multiple-input, multiple-output (MIMO) technology in cellular networks on one hand [10], [11], and the potential of MIMO radars on the other hand [12], has paved the way to the co-existence of MIMO structures. MIMO technology offers waveform diversity and higher detection capability for the radars, while at the same time, massive MIMO technology delivers This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME , 1" 2312.12246v1,"MDD-UNet: Domain Adaptation for Medical Image Segmentation with Theoretical Guarantees, a Proof of Concept Asbjørn Munk ∗1,2 , Ao Ma 3 , and Mads Nielsen 1,2 1 Pioneer Centre for AI University of Copenhagen 3 Southwestern University of Finance and Economics 2 Abstract The current state-of-the art techniques for image segmentation are often based on U-Net architectures, a U-shaped encoder-decoder networks with skip connections. Despite the powerful performance, the architecture often does not perform well when used on data which has different characteristics than the data it was trained on. Many techniques for improving performance in the presence of domain shift have been developed, however typically only have loose connections to the theory of domain adaption. In this work, we propose an unsupervised domain adaptation framework for U-Nets with theoretical guarantees based on the Margin Disparity Discrepancy [1] called the MDD-UNet. We evaluate the proposed technique on the task of hippocampus segmentation, and find that the MDD-UNet is able to learn features which are domain-invariant with no knowledge about the labels in the target domain. The MDD-UNet improves performance over the standard U-Net on 11 out of 12 combinations of datasets. This work serves as a proof of concept by demonstrating an improvement on the U-Net in it’s standard form without modern enhancements, which opens up a new avenue of studying domain adaptation for models with very large hypothesis spaces from both methodological and practical perspectives. Code is available at https://github.com/asbjrnmunk/mdd-unet. 1 Introduction In medical image analysis data distributions vary considerably across equipment, patient groups, and scanning protocols [2]. Since labeling medical images typically involves labor-intensive participation of specialists, available labeled data is often limited. This is a key challenge in medical image segmentation [3], since models typically fail at generalizing to data which is different from the specific setup of the training data, while manually labeling data from each new test domain is infeasible [4]. One solution to tackles this problem is unsupervised domain adaptation (UDA) [7]. In UDA the goal is to transfer knowledge learned from the source ∗ Corresponding Author: asmu@di.ku.dk Figure 1. Margin Disparity. The calculation of (ρ) disp D,ψ (f ′ , f ), a measure of disparity between two classifiers, f and f ′ . This measure importantly works for any classifier, enabling us to apply this directly to medical segmentation. The loss L denotes the margin loss up to some maximal margin ρ > 0. The final disparity is the average disparity over all pixels in the input. domain to a similar, yet distinct, target domain, while only assuming labels from the source domain. While important technical advances have been developed in UDA, methodologies are generally not theoretically well-founded. At the same time, remarkable theoretical advances have been achieved in domain adaptation. In particular, the seminal work by Ben-David et al. [8] introduced the H∆H- divergence as a measurement of discrepancy between two distributions. This allowed rigorous learning bounds to be derived and showed, that to obtain good performance on the target domain, there is an intrinsic trade-off between performance on the source domain and the empirical H∆H-divergence. Practical methods for domain adaptation seek to exploit this trade-off, for instance DANN [6] employ an adversarial architecture, inspired by GAN [9], in which networks play a minimax game seeking to learn a representation of the input where the source and target domains are indistinguishable, while performing well on the source domain. However, the theoretical foundation of DANN is limited to binary classifiers, meaning that for problems such as segmentation, the methodology lacks theoretical guarantees, since the hypothesis spaces of the max-player and min-player are distinctly dissimilar. Zhang et al. [1] remedy this by proposing a new distribution discrepancy measurement called Margin Disparity Discrepancy (MDD), allowing the deriva- Proceedings of the 5th Northern Lights Deep Learning Conference (NLDL), PMLR 233, 2024. L M 2024 Asbjørn Munk, Ao Ma, & Mads Nielsen. This is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/)." 2312.12255v1,"TaskFlex Solver for Multi-Agent Pursuit via Automatic Curriculum Learning Jiayu Chen 1 , Guosheng Li 1 , Chao Yu 1 B , Xinyi Yang 1 , Botian Xu ∗ , Huazhong Yang 1 , Yu Wang 1 B Abstract— This paper addresses the problem of multi-agent pursuit, where slow pursuers cooperate to capture fast evaders in a confined environment with obstacles. Existing heuristic algorithms often lack expressive coordination strategies and are highly sensitive to task conditions, requiring extensive hyperparameter tuning. In contrast, reinforcement learning (RL) has been applied to this problem and is capable of obtaining cooperative pursuit strategies. However, RL-based methods face challenges in training for complex scenarios due to the vast amount of training data and limited adaptability to varying task conditions, such as different scene sizes, varying numbers and speeds of obstacles, and flexible speed ratios of the evader to the pursuer. In this work, we combine RL and curriculum learning to introduce a flexible solver for multiagent pursuit problems, named TaskFlex Solver (TFS), which is capable of solving multi-agent pursuit problems with diverse and dynamically changing task conditions in both 2-dimensional and 3-dimensional scenarios. TFS utilizes a curriculum learning method that constructs task distributions based on training progress, enhancing training efficiency and final performance. Our algorithm consists of two main components: the Task Evaluator, which evaluates task success rates and selects tasks of moderate difficulty to maintain a curriculum archive, and the Task Sampler, which constructs training distributions by sampling tasks from the curriculum archive to maximize policy improvement. Experiments show that TFS produces much stronger performance than baselines and achieves close to 100% capture rates in both 2-dimensional and 3-dimensional multi-agent pursuit problems with diverse and dynamically changing scenes. The project website is at https://sites.google.com/view/tfs-2023. I. INTRODUCTION Pursuit-evasion is the problem of multiple slow pursuers cooperating to capture one or more fast evaders in a confined environment with obstacles. In mobile robotics, pursuit-evasion tasks are used to study motion planning problems that arise in adversarial settings, such as missile interception [1], aircraft control [2], criminal pursuit as well as search and rescue [3]. The main challenge of this problem is how multiple pursuers can cooperate to capture evaders efficiently. Heuristic algorithms have been widely used for multi-agent pursuit problems [4], [5], [6]. Heuristic approaches require no training and can be directly applied to different scenarios. However, these methods often cannot express complex strategies that involve close coordination. The performance is severely affected by task conditions, such as the scene size, the number and the speed of obstacles, as well as the speed ratio B Corresponding Authors. {yuchao,yu-wang}@tsinghua.edu.cn of Electronic Engineering, Tsinghua University, Beijing, 100084, China. jiayu-ch19@mails.tsinghua.edu.cn ∗ Work done as an intern in Tsinghua University This research was supported by National Natural Science Foundation of China (No.62325405, U19B2019, M-0248), Tsinghua University Initiative Scientific Research Program, Tsinghua-Meituan Joint Institute for Digital Life, Beijing National Research Center for Information Science, Technology (BNRist) and Beijing Innovation Center for Future Chips. 1 Department of the evader to the pursuer. Heuristic methods also require much hyperparameter tuning for each test scenario. By contrast, reinforcement learning (RL) has been a promising solution for a wide range of decision-making problems [7], [8], including multi-agent cooperative pursuit problems [9], [10], [11], [12]. Deep reinforcement learning is possible to obtain cooperative pursuit strategies, some of which are difficult to hard-code via explicit rules. However, training effective RL policies in complex scenarios can be particularly challenging. This includes twofold: (1) learning a cooperative policy over multiple agents in a large scene with multiple obstacles, especially in a 3-dimensional scenario, consumes millions or even billions of training samples due to an exponentially large action space and observation space. (2) RL policies often suffer from narrow applicability to different scenarios compared with classical heuristic approaches. A significant challenge is to design an RL policy that can successfully address diverse task conditions. An approximate optimal RL policy for scenarios with different task conditions often requires an enormous amount of training time. Hence, most RL-based pursuit methods focus on the 2-dimensional cases and only consider fixed task conditions [9], [13], [14]. One way to accelerate RL training is curriculum learning – training agents in tasks from easy to hard. In our work, we combine deep reinforcement learning and the idea of curriculum learning to propose a TaskFlex Solver (TFS) for multi-agent pursuit that can solve the pursuit-evasion problem with different task conditions in both 2-dimensional and 3-dimensional environments. In TFS, we design a curriculum learning algorithm that automatically constructs task distributions based on the training progress, accelerating training and obtaining better final performance. Our approach consists of two components, a Task Evaluator and a Task Sampler. The Task Evaluator is a difficulty partitioning mechanism that evaluates all tasks in a given task pool and selects tasks of moderate difficulty to construct a curriculum learning archive. The Task Sampler constructs the training distribution that maximizes the improvement of the current policy by both sampling from the curriculum learning archive and the task pool. We compare TFS with existing works in two testbeds, i.e., 2-dimensional pursuit-evasion in the multi-agent particle-world environment (MPE) [15] and 3-dimensional pursuit-evasion in the NVIDIA Isaac Sim-based Omnidrones environment (Omni) [16]. We designed three different scenarios, the Challenging with extremely hard and fixed task conditions, the Dynamic with dynamically changing task conditions, and the Diverse with different task conditions in the two testbeds. Our method outperforms all baselines with a clear margin and achieves close to 100% capture rates in three scenarios in" 2312.12266v1,"A String Theory for Two Dimensional Yang-Mills Theory I Ofer Aharony 1,2∗ , Suman Kundu 1† , and Tal Sheaffer 1‡ 1 Department of Particle Physics and Astrophysics, Weizmann Institute of Science, Rehovot, Israel. 2 School of Natural Sciences, Institute for Advanced Study, Princeton, NJ 08540, USA. Abstract Two dimensional gauge theories with charged matter fields are useful toy models for studying gauge theory dynamics, and in particular for studying the duality of large N gauge theories to perturbative string theories. A useful starting point for such studies is the pure Yang-Mills theory, which is exactly solvable. Its 1/N expansion was interpreted as a string theory by Gross and Taylor 30 years ago, but they did not provide a worldsheet action for this string theory, and such an action is useful for coupling it to matter fields. The chiral sector of the Yang-Mills theory can be written as a sum over holomorphic maps and has useful worldsheet descriptions, but the full theory includes more general extremal-area maps; a formal worldsheet action including all these maps in a “topological rigid string theory” was written by Hořava many years ago, but various subtleties arise when trying to use it for computations. In this paper we suggest a Polyakov-like generalization of Hořava’s worldsheet action which is welldefined, and we show how it reproduces the free limit of the Yang-Mills theory, both by formal arguments and by explicitly computing its partition function in several cases. In the future we plan to generalize this string theory to the finite-coupling gauge theory, and to analyze it with boundaries, corresponding either to Wilson loops or to dynamical matter fields in the fundamental representation. ∗ ofer.aharony@weizmann.ac.il † suman.kundu@weizmann.ac.il ‡ sheaffertal@gmail.com 1" 2312.12273v1,"VQA4CIR: Boosting Composed Image Retrieval with Visual Question Answering Chun-Mei Feng 1 Yang Bai 1 * Tao Luo 1 Zhen Li 2 Salman Khan 3,4 Wangmeng Zuo 5 Xinxing Xu 1 Rick Siow Mong Goh 1 Yong Liu 1 1 IHPC, A*STAR, Singapore; 2 CUHK, Shenzhen, China; 3 MBZUAI, UAE; 4 ANU, Australia; 5 HIT, Harbin, China fengcm.ai@gmail.com; baiyangolf@gmail.com https://github.com/chunmeifeng/VQA4CIR Abstract Albeit progress has been made in Composed Image Retrieval (CIR), we empirically find that a certain percentage of failure retrieval results are not consistent with their relative captions. To address this issue, this work provides a Visual Question Answering (VQA) perspective to boost the performance of CIR. The resulting VQA4CIR is a postprocessing approach and can be directly plugged into existing CIR methods. Given the top-C retrieved images by a CIR method, VQA4CIR aims to decrease the adverse effect of the failure retrieval results being inconsistent with the relative caption. To find the retrieved images inconsistent with the relative caption, we resort to the ""QA generation → VQA"" self-verification pipeline. For QA generation, we suggest fine-tuning LLM (e.g., LLaMA) to generate several pairs of questions and answers from each relative caption. We then fine-tune LVLM (e.g., LLaVA) to obtain the VQA model. By feeding the retrieved image and question to the VQA model, one can find the images inconsistent with relative caption when the answer by VQA is inconsistent with the answer in the QA pair. Consequently, the CIR performance can be boosted by modifying the ranks of inconsistently retrieved images. Experimental results show that our proposed method outperforms state-of-the-art CIR methods on the CIRR and Fashion-IQ datasets. Is a larger dog with pointier ears layer in the grass with its tongue out. tongue out tongue out tongue out tongue out pointier ears pointier ears pointier ears pointier ears layer in grass layer in grass layer in grass layer in grass (a) Examples of failed retrieval that can be identified by simply comparing the relative caption with candidate images CIRR Fashion-IQ (b) CLIP4CIR [6] CIRR Fashion-IQ (c) SPRC [5] Percentage of failures can be rescued by an ideal VQA model Other failures Figure 1. Failure cases analysis. (a) Examples of failure retrieval results of SPRC [2] on CIRR dataset, which one can see that they can be identified by comparing with relative caption, (b) and (c) are the statistical analysis of the percentage of failures from CLIP4CIR [4] and SPRC [2] on the CIRR and Fashion-IQ datasets, where one can see that a certain percentage of failure cases can be ascribed to the inconsistency between retrieved images and relative captions. for applications like e-commerce and digital search [15]. In the recent few years, considerable progress has been made in CIR. For example, many late fusion methods [1, 9, 13, 35, 49] have been developed to integrate the information from reference image and relative caption. Pseudoword embedding [5, 16] is shown to convert reference image into description embedding for combining with the relative caption to retrieve the target image. Taking both reference images and relative captions into account, sentence-level prompts have also been proposed to enhance CIR [2]. However, for most existing CIR methods, we empirically find that a certain percentage of retrieval results are not consistent with their relative captions. For example, in Fig. 1 (a), given the relative caption “Is a larger dog with pointier ears laying in the grass with its tongue out”, the rank-1 image retrieved by SPRC [2] does not satisfy the attributes lying in the grass, and tongue out. In Fig. 1 (b) and (c), we summarize the percentage of 1. Introduction Composite Image Retrieval (CIR) [5, 35, 49] is a challenging retrieval task, where a reference image together with a relative caption are combined to retrieve the desired target image. Benefiting from its dual-modal query nature, CIR can offer a nuanced depiction of the desired image, allowing for interactive refinements by tweaking the reference image and description. Such capabilities make CIR especially suited * Corresponding author. 1" 2312.12288v1,"New Qutrit Codes from Pure and Bordered Multidimensional Circulant Construction ⋆ Padmapani Seneviratne a,∗ , Hannah Cuff b , Alexandra Koletsos c , Kerry Seekamp d , Adrian Thananopavarn e a Department of Mathematics, Texas A&M University-Commerce, 2600 South Neal Street, Commerce, TX 75428. b Department of Mathematics, Trinity College, 300 Summit Street Hartford, CT 06106. c Department of Mathematics, Columbia University, 2990 Broadway New York, NY 10027. d Department of Mathematical Sciences, Smith College, 10 Elm Street Northampton, MA 01063. e Department of Mathematics, Princeton University, Fine Hall, Washington Road Princeton, NJ 08544-1000. Abstract We use multidimensional circulant approach to construct new qutrit stabilizer Jℓ, 0, dK codes with parameters (ℓ, d) ∈ {(51, 16), (52, 16), (54, 17), (55, 17), (57, 17)} through symplectic selfdual additive codes over F 9 . In addition to these five new codes, we use bordered construction to derive two more qutrit codes with parameters (ℓ, d) ∈ {(53, 16), (56, 17)} that improve upon previously best known parameters. Keywords: Additive Codes, Qutrit Codes, Circulant Graphs, Multidimensional Circulant Graphs, Bordered Construction 1. Introduction In this work we study qutrit stabilizer codes from multidimensional circulant (MDC) graphs, and bordered MDC graphs. MDC graphs are a generalization of the well known circulant graphs to multiple coordinates and was first introduced by Leighton in [5]. Recently, in [8], Seneviratne et al., used MDC graphs to obtain new zero dimensional qubit stabilizer codes that improved previously best known parameters. Additive self-dual codes over F 9 have gotten much less attention compared to their counterparts over F 4 . Let F 9 = {0, 1, ω , . . . , ω 7 }, where ω 2 = ω + 1 and ω 4 = −1. An additive code C ol length n over F 9 is a F 3 -linear subgroup of F n 9 . The weight of a vector v ∈ F n 9 is the number of nonzero entries of v. The least nonzero weight of all codewords in C is called the minimum distance of C. If C is an additive code of length n over F 9 with minimum distance d and size 3 k , then C is denoted by (n, 3 k , d) 9 . The conjugation of an element x ∈ F 9 is given by x = x 3 . The Hermitian trace inner product of two vectors x, y ∈ F n 9 is defined by hx, yi = ω 2 (x · y − x · y). The dual ⋆ This material is based upon work supported by the National Science Foundation under Grant DMS-2243991. ∗ Corresponding author. Email addresses: Padmapani.Seneviratne@tamuc.edu (Padmapani Seneviratne), hannah.cuff@trincoll.edu (Hannah Cuff), ak4749@columbia.edu (Alexandra Koletsos), kseekamp@smith.edu (Kerry Seekamp), adrianpt@princeton.edu (Adrian Thananopavarn) Preprint submitted to Elsevier December 20, 2023" 2312.12298v1,"Waveform Design for OFDM-based ISAC Systems Under Resource Occupancy Constraint Silvia Mura ∗ , Dario Tagliaferri ∗ , Marouan Mizmizi ∗ , Umberto Spagnolini ∗ , and Athina Petropulu † ∗ Politecnico di Milano, Milan, Italy † Rutgers University., Piscataway, USA E-mail (corresponding): silvia.mura@polimi.it Abstract—Integrated Sensing and Communication (ISAC) is one of the key pillars envisioned for 6G wireless systems. ISAC systems combine communication and sensing functionalities over a single waveform, with full resource sharing. In particular, waveform design for legacy Orthogonal Frequency Division Multiplexing (OFDM) systems consists of a suitable time-frequency resource allocation policy balancing between communication and sensing performance. Over time and/or frequency, having unused resources leads to an ambiguity function with high sidelobes that significantly affect the performance of ISAC for OFDM waveforms. This paper proposes an OFDM-based ISAC waveform design that takes into account communication and resource occupancy constraints. The proposed method minimizes the Cramér-Rao Bound (CRB) on delay and Doppler estimation for two closely spaced targets. Moreover, the paper addresses the under-sampling issue by interpolating the estimated sensing channel based on matrix completion via Schatten p-norm approximation. Numerical results show that the proposed waveform outperforms the state-of-the-art methods. Index Terms—ISAC, waveform design, 6G, resource occupancy, matrix completion I. I NTRODUCTION In the pursuit of advancing wireless communication technologies, the integration of sensing capabilities has emerged as a paradigm shift, offering unprecedented opportunities for the development of intelligent and context-aware communication systems [1]. The cohesive integration of communication and sensing, recognized as Integrated Sensing and Communication (ISAC), significantly influences the architecture of forthcoming 6G networks, holding the potential to enhance performance, energy efficiency, and multiple novel applications [2]. The development of a unified ISAC waveform for both data transfer and sensing has been identified as a substantial research challenge in recent years [3]. Adapting legacy Orthogonal Frequency Division Multiplexing (OFDM) for this purpose aims to provide a simple yet effective ISAC implementation. The work in [4] proposes partitioning OFDM subcarriers for radar and communication, introducing a tradeoff in the distinct allocation of subcarriers. However, introducing radar-dedicated subcarriers for sensing purposes requires an energy expenditure that can be avoided with a suitable optimized resource allocation for communication and sensing. Conversely, [5] introduces an OFDM waveform optimizing bandwidth for communication and sensing, enabling antennas to transmit across multiple subcarriers categorized into shared and private groups. Existing studies employ various metrics to formulate the ISAC resource allocation problem in OFDM-based systems. The paper in [6] introduces an OFDM chirp waveform that incorporates embedded phase-modulated communication information tailored for delay-Doppler radar systems. The authors of [7], instead, present an optimal allocation of power within the frequency-time (FT) resources, incorporating the ambiguity function as a constraint in the Cramér-Rao bound (CRB) minimization on delay and Doppler estimation of one target. The study includes a trade-off analysis between sensing performance and communication capabilities through CRB and capacity optimization, specifically applicable to scenarios involving full bandwidth occupancy and a single target. The previously mentioned works do not address the performance of the ISAC waveform in scenarios where the available FT resources are not fully utilized (i.e., resource occupancy factor < 100%). It is crucial to emphasize that, in practice, FT resources rarely reach their full utilization (only during moments of extreme congestion). Herein, we introduce a maximum resource occupancy factor to reflect operational reality, providing a more accurate perspective on the performance of the ISAC signal in the everyday usage scenarios of wireless networks (e.g., refer to the 3GPP standard [8]). Lower occupancy factors lead to high sidelobes in the ambiguity function. This negatively impacts the sensing performance, especially when detecting two or more close targets [7]. The work [10] proposes a waveform design method based on minimizing delay and Doppler CRBs by filling empty subcarriers with sensing samples at the cost of increased energy consumption. Differently, the authors of [9] introduce a linear interpolation across OFDM symbols to enhance target detection by addressing unused subcarriers. However, this approach fails when the allocated FT resources are highly sparse. Contribution: This paper introduces a novel waveform design within OFDM-based ISAC systems, considering the constrained utilization of FT resources. The primary objective is to minimize the CRB associated with delay and Doppler estimation for two coupled targets. The method operates under constraints imposed by spectral efficiency and the resource occupancy factor. To address the resulting high sidelobes, a matrix completion-based interpolation technique is proposed for the estimated sensing channel in the FT domain. Comparative analysis against the conventional approach, employing" 2312.12309v1,"TeamCAD - A Multimodal Interface for Remote Computer Aided Design DEMIRCAN TAS ∗ and DIMITRIOS CHATZINIKOLIS ∗ , Massachusetts Institute of Technology, USA Remote collaboration is a common reality of spatial design processes, but tools for computer aided design were made for single users. Via TeamCAD, we introduce a user experience where online remote collaboration experience is more like working on a table. Using speech and gesture recognition based on state of the art machine learning through webcam and microphone input, TeamCAD plugs into existing software through API’s, keybindings, and mouse input. We share results from user studies conducted on graduate students from . Our user tests were run on Blender animation software, making simultaneous use of both modalities for given tasks. We mitigated challenges in terms of robustness and latency in readily available voice recognition models. Our prototype has proven to be an intuitive interface, providing a suitable denominator for collaborators with or without previous experience in three-dimensional modeling applications. CCS Concepts: • Human-centered computing → Collaborative and social computing design and evaluation methods. Additional Key Words and Phrases: Multi-modal, Collaboration, Participatory Design, Usability Study ACM Reference Format: Demircan Tas and Dimitrios Chatzinikolis. 2023. TeamCAD - A Multimodal Interface for Remote Computer Aided Design. 1, 1 (December 2023), 10 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION During the COVID-19 pandemic, online conferences became the predominant method of conducting collaborative work for architectural design. Capable tools exist for verbal communication, but they are limited in capacity for tasks related to visual design activity [4]. Screen sharing and annotations mitigate this problem, but there are 2 important reductions that hinder design creativity; firstly, there is a dimensionality reduction, in the sense that 3d geometries are reduced to 2d images on the screens of the users, and secondly there is a reduction in modalities, in the sense that in screen sharing, the perception is mostly visual, and in rare cases auditory. Designers, and humans in general, know more than they can tell, show, draw, model, etc. Therefore a thoughtful combination of modalities and practices is required to transfer knowledge, or communicate a design [7][1]. Design teams with varying levels of experience collaborate for early stage design exploration using sketches and physical models which have a natural equalizing tendency, enabling creative team work[3]. This special form of collaboration is one of the key factors that add to the design process its creative aspect [5]. Unlike expert software running on a personal computer, everyone can actively participate in sketches and physical models without prior experience or training, resulting in a ""distributed"" way of designing[6]. Given multi-modal interaction, we argue that a similar experience will be achieved in online, remote working scenarios. ∗ Both authors contributed equally to this research. Authors’ address: Demircan Tas, tasd@mit.edu; Dimitrios Chatzinikolis, dchatzin@mit.edu, Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, Massachusetts, USA, 02139. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2312.12321v1,"B YPASSING THE S AFETY T RAINING OF O PEN -S OURCE LLM S WITH P RIMING A TTACKS Jason Vega ∗ 1 , Isha Chaudhary ∗1 , Changming Xu ∗1 , Gagandeep Singh 1,2 University of Illinois Urbana-Champaign, USA 2 VMware Research, USA {javega3, isha4, cx23, ggnds}@illinois.edu 1 A BSTRACT Content warning: This paper contains examples of harmful language. With the recent surge in popularity of LLMs has come an ever-increasing need for LLM safety training. In this paper, we investigate the fragility of SOTA opensource LLMs under simple, optimization-free attacks we refer to as priming attacks, which are easy to execute and effectively bypass alignment from safety training. Our proposed attack improves the Attack Success Rate on Harmful Behaviors, as measured by Llama Guard, by up to 3.3× compared to baselines. 1 1 I NTRODUCTION Autoregressive Large Language Models (LLMs) have emerged as powerful conversational agents widely used in user-facing applications. To ensure that LLMs cannot be used for nefarious purposes, they are extensively safety-trained for human alignment using techniques such as RLHF (Christiano et al., 2023). Despite such efforts, it is still possible to circumvent the alignment to obtain harmful outputs (Carlini et al., 2023). For instance, Zou et al. (2023) generated prompts to attack popular open-source aligned LLMs such as Llama-2 (Touvron et al., 2023a) and Vicuna (Chiang et al., 2023) to either output harmful target strings or comply with harmful behavior requests. Qi et al. (2023) showed that safety alignment can be effectively removed by fine-tuning with a few carefully selected examples. However, such approaches can be quite computationally expensive to perform (Jain et al., 2023), and may be dramatically more expensive than necessary in the open-source setting. One of the key assumptions in Zou et al. (2023) is that the attacker is restricted to a certain format for the input to the model, such as the following for Vicuna: USER: ASSISTANT: In particular, the prompt scaffolding is assumed to be fixed, and no text can be added after any trailing scaffolding (e.g. to prime the chatbot with a specific start to its response). Although this is a reasonable assumption for transferring to closed-source models, it is an unnecessary one when extracting harmful behavior content from open-source models. Since some organizations have recently taken firm stances in promoting open-source LLM research (Meta, 2023), we argue that allowing unrestricted inputs should be considered an increasingly practical assumption. This work. We investigate a threat model for circumventing the alignment of open-source LLMs that permits successful low-resource attacks. This threat model only assumes that the attacker has API query access such that they can obtain probabilities for the next token conditioned on any input. Since safety-training data typically follows a specific structure containing full model responses (Bai et al., 2022), performing model inference on inputs primed with a partial response can exploit the autoregressive nature of LLMs to fulfill harmful requests. We refer to attacks that exploit this as priming attacks. Although prior work has demonstrated preliminary success with priming attacks (Yin et al., 2023; Zhang et al., 2023), we focus on the setting where the decoding process is unchanged and investigate slightly more prompt-dependent initial responses. ∗ 1 Equal contribution Source code and data are available at https://github.com/uiuc-focal-lab/llm-priming-attacks. 1" 2312.12345v1,"IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2023 1 On the Effectiveness of Retrieval, Alignment, and Replay in Manipulation Norman Di Palo 1 and Edward Johns 1 I. I NTRODUCTION I Fig. 1: An overview of the framework we study, showing the retrieval, alignment, and replay phases. Together, these enable one-shot imitation learning without prior object knowledge, as well as generalisation to novel objects and novel classes. Abstract—Imitation learning with visual observations is notoriously inefficient when addressed with end-to-end behavioural cloning methods. In this paper, we explore an alternative paradigm which decomposes reasoning into three phases. First, a retrieval phase, which informs the robot what it can do with an object. Second, an alignment phase, which informs the robot where to interact with the object. And third, a replay phase, which informs the robot how to interact with the object. Through a series of real-world experiments on everyday tasks, such as grasping, pouring, and inserting objects, we show that this decomposition brings unprecedented learning efficiency, and effective inter- and intra-class generalisation. Videos are available at https://www.robot-learning.uk/retrieval-alignment-replay. Index Terms—Deep Learning in Grasping and Manipulation, Imitation Learning, Learning from Demonstration Manuscript received: August 21, 2023; Revised November 9, 2023; Accepted December 8, 2023 . This paper was recommended for publication by Editor Aleksandra Faust upon evaluation of the Associate Editor and Reviewers’ comments. This work was supported by the Royal Academy of Engineering under the Research Fellowship Scheme. 1 Norman Di Palo and Edward Johns are with the Robot Learning Lab at Imperial College London n.di-palo20@imperial.ac.uk Digital Object Identifier (DOI): see top of this page. N this paper, we study the problem of teaching a robot how to interact with a set of training objects, and then generalising these learned behaviours to novel objects and novel classes of objects. Today’s dominant paradigm in recent literature is to address this with end-to-end behavioural cloning [4]. However, to generalise everyday manipulation skills to many different objects, such techniques require a very large number of human demonstrations, which is slow and expensive. But as an alternative to monolithic, end-to-end control, we can decompose reasoning into three distinct, specialist modes of reasoning. Firstly, what can a robot do with an object? Secondly, where should a robot interact with an object? And thirdly, how should a robot interact with an object? Our hypothesis is that this decomposition might be more optimal than expecting a single control policy to be able to reason simultaneously about all three modes. To achieve these three modes of reasoning, we propose a new framework based on three principles: retrieval, alignment, and replay. When provided with an object during testing, these are then used as follows. First, to determine what can be done with the object, the most visually similar training object to the observed object is retrieved from a memory buffer of the training objects. Second, to determine where the robot should interact with the object, a goal image representing the retrieved training object is used in a goal-conditioned alignment policy, to align the end-effector appropriately with the object. Third, to determine how the robot should interact with object, the robot replays the demonstration velocities for that training object. As such, our hypothesis is that, in the absence of an explicit demonstration for a novel test object, interacting in the same way as with the most visually similar training object, might be sufficient to interact with the test object. And through a series of real-world experiments, we demonstrate this to be true for a range of everyday tasks such as grasping, pouring, and inserting. Furthermore, we study whether our proposed decomposition into individual modes of reasoning, is optimal compared to methods which do decomposition but not retrieval (e.g. [10]), to methods which do retrieval but not decomposition (e.g. [12]), and to methods which do neither decomposition nor retrieval (e.g. behavioural cloning [4]). Our conclusion, and the key takeaway message, is clear: decomposing into retrieval, alignment, and replay leads to an order of magnitude better learning efficiency compared to all these other alternative paradigms. Furthermore, our framework only requires a wrist-mounted camera, without the need" 2312.12383v1,"V ISUAL AI AND L INGUISTIC I NTELLIGENCE T HROUGH S TEERABILITY AND C OMPOSABILITY David Noever 1 and Samantha Elizabeth Miller Noever 2 PeopleTec, 4901-D Corporate Drive, Huntsville, AL, USA, 35805 1 2 david.noever @peopletec.com sam.igorugor@gmail.com A BSTRACT This study explores the capabilities of multimodal large language models (LLMs) in handling challenging multistep tasks that integrate language and vision, focusing on model steerability, composability, and the application of long-term memory and context understanding. The problem addressed is the LLM's ability (Nov 2023 GPT-4 Vision Preview) to manage tasks that require synthesizing visual and textual information, especially where stepwise instructions and sequential logic are paramount. The research presents a series of 14 creatively and constructively diverse tasks, ranging from AI Lego Designing to AI Satellite Image Analysis, designed to test the limits of current LLMs in contexts that previously proved difficult without extensive memory and contextual understanding. Key findings from evaluating 800 guided dialogs include notable disparities in task completion difficulty. For instance, 'Image to Ingredient AI Bartender' (Low difficulty) contrasted sharply with 'AI Game Self-Player' (High difficulty), highlighting the LLM's varying proficiency in processing complex visual data and generating coherent instructions. Tasks such as 'AI Genetic Programmer' and 'AI Negotiator' showed high completion difficulty, emphasizing challenges in maintaining context over multiple steps. The results underscore the importance of developing LLMs that combine long-term memory and contextual awareness to mimic human-like thought processes in complex problem-solving scenarios. K EYWORDS Large language models, creativity, steerability, composability, dataset 1. I NTRODUCTION The creative maker spaces have become vibrant hubs of 21 st -century innovation, merging the traditional tactile experience with digital fabrication and design. However, integrating new artificial intelligence (AI) tools and, in particular, the current generation of multimodal large language models (LLMs) [1-17] into these environments has the potential to enhance human creativity and innovation [18-32]. In recent years, the intersection of AI and multimodal (MM) learning has spawned a generation of models that integrate and interpret information across various forms of data, including text, images, and speech. In short, AI models now combine both vision and language understanding [1]. These models promise new approaches for human-computer interaction, complex problem-solving, and decision-making processes. Along with competitors like Google Bard, Open AI's GPT-4 Vision development lays a critical foundation, enhanced language understanding and vision models that generate and analyze imagery [1]. Table 1 summarizes the current Open AI challenge list of multimodal LLM shortcomings [1] yet to be mastered by current models." 2312.12385v1,"Input Compression with Positional Consistency for Efficient Training and Inference of Transformer Neural Networks Amrit Nagarajan School of ECE Purdue University Anand Raghunathan School of ECE Purdue University nagaraj9@purdue.edu raghunathan@purdue.edu Abstract create high-performance models across a wide range of input modalities [4–6, 16]. This is achieved by simply adding a suitable encoding layer which converts the input into a set of embedding vectors, and adds a positional embedding to each vector, thereby outputting a sequence that can be processed by the Transformer (Fig. 1). These advantages however come at a cost: Transformers are orders-ofmagnitude larger, and hence, more compute-intensive during both training and inference compared to their predecessors such as Convolutional Neural Networks (CNNs). The number of embedding vectors generated from an input (Fig. 1) is the primary factor that determines the computational effort expended by the Transformer. In particular, the computational complexity of self-attention scales quadratically, while all other operations performed by the Transformer scale linearly with number of embedding vectors. We find that the number of embedding vectors generated from an input is directly proportional to the size of the input for all modalities (Fig. 2). For instance, the number of embedding vectors generated from a given text sequence is directly proportional to the number of words in the sequence. On the other hand, the resolution of an image determines the number of embedding vectors generated from it. Similarly, the number of embedding vectors generated from a video depends on the number of frames and the resolution of each frame. Finally, the number of embedding vectors generated from an audio input depends on the number of time steps and the number of frequency banks used to represent the signal at each time step. In addition to the computational challenges of training Transformers, finding sufficient amounts of data for training them can also be challenging. Transformers are highly susceptible to overfitting for small datasets, as evidenced by the consistent increase in generalization performance with increasing training dataset size [12]. We present Input Compression with Positional Consistency (ICPC), a new augmentation method that simultaneously addresses the efficiency and overfitting challenges of training Transformers. ICPC creates augmented views of Transformers have rapidly increased in popularity in recent years, achieving state-of-the-art performance in processing text, images, audio and video. However, Transformers present large computational requirements for both training and inference, and are prone to overfitting during training. To address these challenges, we present Input Compression with Positional Consistency (ICPC), a new data augmentation method that, unlike prior augmentation techniques, simultaneously improves both generalization and training efficiency. ICPC applies varying levels of compression to each training sample in each epoch. This leads to smaller input sequences being processed by the Transformer, and hence faster training, while also alleviating overfitting by presenting each input with different compression levels. We introduce a consistency-aware position selection method in ICPC that enables accurate processing of compressed inputs without any changes to the underlying Transformer architecture. We detail compression-based augmentation methods for four different modalities – insignificant word pruning for text, resolution modulation for images, spatio-temporal resolution modulation for videos, and spectogram size modulation for audio. ICPC also enables efficient variable-effort inference, where samples are first inferred at high compression levels, and progressively re-evaluated with lower compression for more challenging inputs. On 9 diverse tasks spanning 4 different modalities, ICPC improves accuracy by up to 1%, while also accelerating training and inference by up to 2.9× and 2.6×, respectively. Code is available at https://github.com/ amrnag/ICPC. 1. Introduction Transformers have recently emerged as the state-of-the-art neural network architecture for machine learning tasks involving text, images, video and audio. Remarkably, identical or near-identical Transformer backbones can be used to 1" 2312.12414v1,"Translating Natural Language Queries to SQL Using the T5 Model Albert Wong Lien Pham Young Lee Shek Chan Mathematics and Statistics Mathematics and Statistics Mathematics and Statistics Mathematics and Statistics Langara College Langara College Okanagan College Langara College Vancouver, Canada Vancouver, Canada Kelowna, Canada Vancouver, Canada 0000-0002-0669-4352 Email: honglien.pham@gmail.com Email: yolee3112@gmail.com 0000-0002-5932-5390 Razel Sadaya Youry Khmelevsky Mathias Clement Florence Wing Yau Cheng Mathematics and Statistics Langara College Vancouver, Canada Email: razelsadaya@gmail.com Computer Science Okanagan College Kelowna, Canada 0000-0002-6837-3490 Computer Science Okanagan College Kelowna, Canada 0000-0001-8206-307X Mathematics and Statistics Langara College Vancouver, Canada Email: fcheng18@mylangara.ca Joe Mahony Michael Ferri Research and Development Harris SmartWorks Ottawa, Canada JMahony@harriscomputer.com Research and Development Harris SmartWorks Ottawa, Canada mferri@harriscomputer.com Abstract—This paper presents the development process of a natural language to SQL model using the T5 model as the basis. The models, developed in August 2022 for an online transaction processing system and a data warehouse, have a 73% and 84% exact match accuracy respectively. These models, in conjunction with other work completed in the research project, were implemented for several companies and used successfully on a daily basis. The approach used in the model development could be implemented in a similar fashion for other database environments and with a more powerful pre-trained language model. Index Terms—Natural Language Processing, Data Query System, Text-to-SQL, Speech-to-SQL, Deep Learning, Machine Learning, T5 Model, Human-Machine-Systems, Energy Systems I. I NTRODUCTION The increasing volume of data collected by utility companies due to the installation of automated metering infrastructure (AMI) [1] has intensified the need and interest in implementing solutions that provide effective data storage and retrieval that are synchronized [2]. While recent advances in data warehousing and other data depository technologies provide ample choices in organizing and storing massive amounts of data, the query and retrieval of these data require the often expensive intervention of a software engineer. The ideal scenario remains that an end user could interact, through We acknowledge the support of the Natural Sciences and Engineering Research Council of Canada (NSERC), Harris SmartWorks Division of Harris Computers, Okanagan College, and Langara College. English or other natural languages, directly with the data depository to produce the desirable data insights. A considerable amount of research has been completed in the last ten years to address the query problem. For the most part, a combination of semantic analysis and some form of neural network is used in the algorithm for the translation (from NL to SQL) problem. A literature review for work completed up to the summer of 2021 can be found in [2], [3]. With the rapid advance in deep learning and natural language processing, these reviews have quickly become obsolete as research in this area has intensified [4]–[6]. This is also applicable to the research study that we will discuss in detail here. The research study presented here is a response to the needs of the utility industry as described above. Working with an industrial partner in the utility service industry, the project is a case study of how an end-to-end natural language data query system could be built quickly using available third-party components and basic hardware. It will become clear that the project needs to build some basic components: a user interface with voice and text input and graphical or tabular output, a high-performance data warehouse that allows for effective storage and speedy response, as well as an NL to SQL model that translates English queries into the corresponding executable SQL statement. The first component is readily available and therefore its development and implementation is a matter of routine engineering. It is the second and third components that are the focus of the research study." 2312.12429v1,"The Endoscapes Dataset for Surgical Scene Segmentation, Object Detection, and Critical View of Safety Assessment: Official Splits and Benchmark Aditya Murali a,†,∗ , Deepak Alapatt a,† , Pietro Mascagni b,d,† , Armine Vardazaryan b , Alain Garcia b , Nariaki Okamoto c , Guido Costamagna d , Didier Mutter b , Jacques Marescaux c , Bernard Dallemagne c , Nicolas Padoy a,b a ICube, University of Strasbourg, CNRS, Strasbourg, France b IHU Strasbourg, Strasbourg, France c Institute for Research against Digestive Cancer (IRCAD), Strasbourg, France d Fondazione Policlinico Universitario A. Gemelli IRCCS, Rome, Italy This technical report provides a detailed overview of Endoscapes, a dataset of laparoscopic cholecystectomy (LC) videos with highly intricate annotations targeted at automated assessment of the Critical View of Safety (CVS). Endoscapes comprises 201 LC videos with frames annotated sparsely but regularly with segmentation masks, bounding boxes, and CVS assessment by three different clinical experts. Altogether, there are 11090 frames annotated with CVS and 1933 frames annotated with tool and anatomy bounding boxes from the 201 videos, as well as an additional 422 frames from 50 of the 201 videos annotated with tool and anatomy segmentation masks. In this report, we provide detailed dataset statistics (size, class distribution, dataset splits, etc.) and a comprehensive performance benchmark for instance segmentation, object detection, and CVS prediction. The dataset and model checkpoints are publically available at https://github.com/CAMMA-public/Endoscapes. CVS C1: 0 C2: 0 C3: 0 CVS C1: 1 C2: 0 C3: 0 CVS C1: 0 C2: 0 C3: 1 CVS C1: 1 C2: 1 C3: 0 CVS C1: 1 C2: 0 C3: 1 CVS C1: 1 C2: 1 C3: 1 Fig. 1: A series of example images from Endoscapes2023, illustrating the various types of annotations and representing a range of CVS achievement states. 1. Introduction Automatic assessment of the critical view of safety (CVS) is an important problem in surgical data science that has been gaining interest in recent years [12, 4, 6, 8, 3, 11, 7]. Unlike many surgical data science tasks that have been studied thus far (e.g. phase recognition, tool detection/segmentation), CVS assessment is particularly challenging because it relies on accurate and precise identification of fine-grained anatomical structures and concepts. To enable research into this task, ∗ Corresponding author: murali@unistra.fr † These authors contributed equally and share co-first authorship. we present Endoscapes, a dataset of laparoscopic cholecystectomy videos with annotations specifically targeted at tackling automated CVS assessment: namely, frame-level CVS annotations as well as segmentation/bounding boxes of critical anatomical structures/regions relevant for CVS assessment (such as the hepatocystic triangle, cystic artery/duct, and cystic plate). In this report, we begin by describing the development of this dataset, which represents the culmination of several works [6, 1, 8]. Then, we provide a detailed enumeration of" 2312.12437v1,"Weakly Supervised Open-Vocabulary Object Detection Jianghang Lin 1 , Yunhang Shen 2 , Bingquan Wang 1 , Shaohui Lin 3 , Ke Li 2 , Liujuan Cao 1 * 1 Key Laboratory of Multimedia Trusted Perception and Efficient Computing, Ministry of Education of China Xiamen University, China. 2 Tencent Youtu Lab, China. 3 School of Computer Science and Technology East China Normal University, Shanghai, China. {hunterjlin007, wangbingquan}@stu.xmu.edu.cn, {shenyunhang01, shaohuilin007, tristanli.sh}@gmail.com, caoliujuan@xmu.edu.cn, Abstract Despite weakly supervised object detection (WSOD) being a promising step toward evading strong instance-level annotations, its capability is confined to closed-set categories within a single training dataset. In this paper, we propose a novel weakly supervised open-vocabulary object detection framework, namely WSOVOD 1 , to extend traditional WSOD to detect novel concepts and utilize diverse datasets with only image-level annotations. To achieve this, we explore three vital strategies, including dataset-level feature adaptation, image-level salient object localization, and region-level vision-language alignment. First, we perform data-aware feature extraction to produce an input-conditional coefficient, which is leveraged into dataset attribute prototypes to identify dataset bias and help achieve cross-dataset generalization. Second, a customized location-oriented weakly supervised region proposal network is proposed to utilize high-level semantic layouts from the category-agnostic segment anything model to distinguish object boundaries. Lastly, we introduce a proposal-concept synchronized multiple-instance network, i.e., object mining and refinement with visual-semantic alignment, to discover objects matched to the text embeddings of concepts. Extensive experiments on Pascal VOC and MS COCO demonstrate that the proposed WSOVOD achieves new state-of-the-art compared with previous WSOD methods in both close-set object localization and detection tasks. Meanwhile, WSOVOD enables cross-dataset and open-vocabulary learning to achieve on-par or even better performance than well-established fully-supervised openvocabulary object detection (FSOVOD). (a) Paradigm comparisons. (b) Qualitative comparisons. Introduction Figure 1: Vanilla WSOD is confined to detecting known categories from the training set, e.g., Person, and Horse. The proposed WSOVOD is generalized to unseen categories, e.g., Flag, and Fence. WSOVOD outperforms the previous state-of-the-art WSOD methods and achieves on-par or even better performance than FSOVOD. In the past decades, the artificial intelligence community has witnessed great progress in object detection. In particular, large amount of human-annotated datasets significantly promotes the prosperity and progress of fully-supervised object detection (FSOD), such as Faster RCNN (Ren et al. 2015), YOLO (Redmon et al. 2016; Redmon and Farhadi 2017), Detr (Carion et al. 2020) and their variants (Zhu et al. 2021; Zheng et al. 2021; Sun et al. 2021). Nevertheless, the laborious and lavish collection of instance-level annotations has severely barricaded the applicability of FSOD in practical application with large-scale categories. By excavating image-level category supervision that indicates the presence or absence of an object, weakly supervised object detection (WSOD) has attracted much attention recently since image-level annotations are widely available in easilycollected classification-like datasets. * Corresponding Author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 Source code are available at: https://github.com/HunterJ- Lin/WSOVOD Unfortunately, a de facto limitation of the existing WSOD methods (Tang et al. 2017, 2018; Kim et al. 2020) stems from their detectors only concentrating on few categories concepts within individual datasets, such as 20-category" 2312.12446v1,"High-energy electron measurements with thin Si detectors Gokul Das H a , R. Dubey a,∗ , K.Czerski a , M.Kaczmarski a , A.Kowalska b , N.Targosz-Sleczka a , M.Valat a a b Institute of Physics, University of Szczecin, 70-451 Szczecin, Poland Institute of Mathematics, Physics and Chemistry, Maritime University of Szczecin Abstract A technique for measuring high-energy electrons using Si detectors of various thicknesses that are much smaller than the range of the examined electrons is presented. The advantages of the method are discussed on the basis of electron-positron pair creation recently studied in deuteron-deuteron fusion reactions at very low energies. Careful Geant 4 Monte Carlo simulations enabled the identification of the main spectral contributions of emitted electrons and positrons resulting from the energy loss mechanisms and scattering processes within the target, detector and their holders. Significant changes in the intensity of the detected electrons, depending on the detector thickness and the thicknesses of absorption foils placed in the front of the detector could be observed. The corresponding correction factors have been calculated and can be used for different applications in basic and applied research. Keywords: high-energy electrons, thin Si detectors, corrections due to scattering processes PACS: 1. Introduction The energy deposition of electrons in matter differs strongly from that known for heavier charged particles. Due to their low mass, the ionisation process of atoms by electron-electron scattering can occur at large scattering ∗ Corresponding author Email address: rakesh.dubey@usz.edu.pl (R. Dubey) Preprint submitted to Elsevier December 21, 2023" 2312.12461v1,"Bird Movement Prediction Using Long Short-Term Memory Networks to Prevent Bird Strikes with Low Altitude Aircraft Elaheh Sabziyan Varnousfaderani ∗ and Syed A. M. Shihab † The number of collisions between aircraft and birds in the airspace has been increasing at an alarming rate over the past decade due to increasing bird population, air traffic and usage of quieter aircraft. Bird strikes with aircraft are anticipated to further increase dramatically in the near future when emerging Advanced Air Mobility aircraft start operating in the low altitude airspace where probability of bird strikes is the highest. Not only do such bird strikes can result in human and bird fatalities, but they also cost the aviation industry millions of dollars in damages to aircraft annually. To better understand the causes and effects of bird strikes, research to date has mainly focused on analyzing factors which increase the probability of bird strikes, identifying high risk birds in different locations, predicting the future number of bird strike incidents, and estimating cost of bird strike damages. However, research on bird movement prediction for use in flight planning algorithms to minimize the probability of bird strikes is very limited. To address this gap in research, we implement four different types of Long Short-Term Memory (LSTM) models, a type of recurrent neural network capable of learning order dependence in sequence prediction problems, to predict bird movement latitudes and longitudes. A publicly available data set on movement of pigeons, one of the top ten high risk birds with respect to bird strikes in aviation, is utilized to train the models and evaluate their performances. Using the bird flight track predictions, aircraft departures from Cleveland Hopkins airport are simulated to be delayed by varying amounts to avoid potential bird strikes with aircraft during takeoff. Results demonstrate that the LSTM models can predict bird movement with high accuracy, achieving a Mean Absolute Error of less than 100 meters, outperforming linear and nonlinear regression models. Our findings indicate that incorporating bird movement prediction into flight planning can be highly beneficial. Specifically, by implementing a modest delay in aircraft departures based on predicted bird movements, the occurrence of bird strikes during takeoff can be prevented. I. Introduction A. Bird Strike Challenge ollisions between birds and aircraft have been occurring since the beginning of aviation. Such collisions, which can happen either during the take-off or landing roll or the cruise flight of the aircraft, are referred to as bird strikes [1]. Bird strikes threaten the safety of flight operations, putting the lives of both passengers onboard the aircraft and birds at risk, and causes financial loss to the aviation industry in the form of millions of dollars in damages to aircraft annually. Bird strikes have been the cause of many nonfatal and fatal accidents in aviation. The first reported nonfatal bird strike, as recorded by Orville Wright in his diary, occurred in 1905 when his aircraft, Wright Flyer III, hit a bird as he flew over a cornfield near Dayton, Ohio, USA [2]. On April 3, 1912, the first bird strike which caused human fatality occurred when Calbraith Rodgers’s aircraft struck a gull while flying along the coast of southern California [3]. In recent years, three different accidents further demonstrated the catastrophic nature of bird strikes in aviation. On January 15, 2009, US Airways Flight 1549 (Airbus 320) carrying 155 passengers aboard struck a flock of geese in the aircraft’s engine shortly after take-off from New York City on its way to Charlotte in North Carolina, losing all engine power. Unable to reach any nearby airports for an emergency landing due to their low altitude, the pilots were forced to glide the plane to a ditching in the Hudson River off Midtown Manhattan [4]. Three years later, on September 28, 2012, 16 passengers and three crew members were killed when a Dornier 228 crashed after striking a black kite (Milvus migrans) on take-off from Kathmandu, Nepal [5]. More recently, Ural Airlines Flight 178 (an Airbus A321) carrying C ∗ Graduate Research Assistant, College of Aeronautics and Engineering, esabziya@kent.edu † Assistant Professor, College of Aeronautics and Engineering, AIAA Member, sshihab@kent.edu 1" 2312.12464v1,"Towards Better Serialization of Tabular Data for Few-shot Classification Sukriti Jaitly Tanay Shah Ashish Shugani Razik Singh Grewal Carnegie Mellon University {sjaitly,tashah,ashugani,rgrewal}@andrew.cmu.edu Abstract We present a study on the integration of Large Language Models (LLMs) in tabular data classification, emphasizing an efficient framework. Building upon existing work done in TabLLM (Hegselmann et al., 2023), we introduce three novel serialization techniques, including the standout LaTeX serialization method. This method significantly boosts the performance of LLMs in processing domain-specific datasets, Our method stands out for its memory efficiency and ability to fully utilize complex data structures. Through extensive experimentation, including various serialization approaches like feature combination and importance, we demonstrate our work’s superiority in accuracy and efficiency over traditional models. 1 Introduction Advancements in deep learning have significantly impacted fields like natural language processing and computer vision, but tabular data hasn’t seen a parallel rise (Borisov et al., 2022). This disparity stems from tabular data’s unique characteristics, such as mixed data types and fewer columns. Large language models (LLMs) like GPT-3 (Brown et al., 2020), with their extensive pretraining, have shown prowess in tasks ranging from few-shot text classification to tabular data cleaning. Recognizing this potential, TabLLM was introduced as a bridge between LLMs and tabular data classification, leveraging serialized naturallanguage representations of tabular rows for classification. Initial evaluations highlighted TabLLM’s competitive edge over other models, including traditional ones like gradient-boosted trees (Hegselmann et al., 2023). Recognizing the potential of LLMs in tabular data classification, the TabLLM framework was introduced. This framework leverages serialized natural-language representations of tabular rows for classification, and has shown a competitive edge over traditional models like gradient-boosted trees (Hegselmann et al., 2023). Building upon the success of TabLLM, our study introduces a novel framework, which enhances the performance of LLMs in tabular data classification through advanced serialization methods. Our approach significantly diverges from previous models by utilizing LaTeX serialization, which improves memory efficiency and the model’s ability to process complex data structures. Our project delves into various serialization approaches, including feature combination and importance, to demonstrate the superiority of our techniques in terms of accuracy and efficiency. We also explore the integration of key tabular features into the LLM framework, enhancing its interpretability and effectiveness in classification tasks. This study presents a comprehensive examination of using novel serialisation techniques in tabular data classification, highlighting its potential to transform data processing across various industry areas. 2 Related Work TabLLM: TabLLM is a novel framework for fewshot classification of tabular data using large language models (LLMs). This approach focuses on converting tabular data into natural language representations, then employing LLMs, particularly the T0 model and GPT-3, for classification tasks. This method addresses challenges in obtaining sufficient labeled data for traditional supervised learning, especially in fields like healthcare. It explores different methods for serializing tabular data into natural language inputs for language models, focusing on improving zero and few-shot classification performance. Nine serialization formats are studied, ranging from simple list templates to more complex methods like Table-To-Text and GPT-3 based serializations. The paper also examines ablations like listing only values or permuting names/values to understand the impact of column" 2312.12466v1,"Users Approach on Providing Feedback for Smart Home Devices – Phase II Santhosh, Pogaku Student – MSIT School of Information Technology, University of Cincinnati, Pogakush @mail.uc.edu ABSTRACT Smart Home technology has accomplished extraordinary interest in making individuals' lives more straightforward and more relaxing as of late. Technology as of late brought about delivering numerous savvy and refined frameworks which advanced clever living innovation. In this paper, we will be investigating the behavioural intention of user's approach on providing feedback for smart home devices. We will be conducting an online survey for sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to share their feedback on smart home devices actively to improvise the service and quality of the product to fulfill the user needs and make their lives easier. INTRODUCTION The current market of smart homes projects a global revenue of 85 Billion USD, and the usage is read to be around 10% worldwide[1]. Smart home technology combines automation interface, monitors, and sensors [2]. Smart home devices will tend to increase the way of life of humanity and the comfort of many people. The looks are deceiving as smart homes aren't taking the user needs and necessities into accountability [3] as several critical challenges related to innovative home technology are yet to be addressed for smart home development [4]. Smart home technologies are not very often in the way they should be used, even with specific settings. A clear view of the user's usage of the smart home devices is still missing. User feedback plays a vital role in getting the desired outcome and helps understand the user needs and what they want to use the smart home devices in the preferred way to fill the usage gap [4]. The essential features of smart home devices such as UI, Networking, and Interface push users to revisit or re-think the existing feedback approaches. For instance, from the feedback sender point of view, we have no idea to what extent the users who are using the smart home technology are genuinely providing feedback to the devices during their daily routines regarding their personal space as it's a sensitive area. From the feedback receiver's point of view, we have no clue what information the receiver needs from the feedback provided to improve his products. This paper performs a study on the users' behavioural intention on providing feedback on smart home devices. Innovative home solutions are interconnected all the time, and the ecosystem has different types of devices, and a few of them are sensors where no human intervention is needed. Smart home products are other than regular products. These products are present in the living space of humankind. Yet, these devices even take care of us, and it brings a brand-new facet to such kind of feedback. Hence, from the industry and researchers' perspective, it is evident that there is a need for research to build excellent feedback tools or models[5]. The long-term research goal would be to construct group-based feedback solutions for smart devices. At the beginning of the design, the software and the engineering requirements will define the user feedback [6]. The feedback designed is significant and developed based on the existing experiences and would be helpful for future software development [7]. In the past, research has been conducted, and the toll support user feedback has been used, but it has dedicated settings[8] [9]. Many studies have projected that the behaviour of the feedback and software and preferences will vary accordingly, and it causes a mismatch. This research investigates the user approach to providing feedback for smart home devices. The research question is as follows: RQ: Behavioural intention of users to give feedback on smart home devices and contribute to making the devices better and userfriendly? METHODOLOGY In this study, we used quantitative survey methodology by randomly selecting students from the group assigned by Dr. Hazem Said to know the approach towards providing feedback on smart home devices. Using a simple random sampling method, we have selected a sample of the top 4 students representing 25% of the research participants group 2. A survey instrument was used in this quantitative research approach. A structured questionnaire with four measures which is attached in ""Appendix A,"" was designed utilizing the Behavior intention (BI) model [10] to measure the Behavioral Intention of" 2312.12472v1,"A Performance Evaluation of a Quantized Large Language Model on Various Smartphones Tolga Çöplü, Marc Loedi, Arto Bendiken, Mykhailo Makohin, Joshua J. Bouw, Stephen Cobb, Haltia, Inc. {tolga, marc, arto, mykhaylo, joshua, steve}@haltia.ai Abstract This paper explores the feasibility and performance of on-device large language model (LLM) inference on various Apple iPhone models. Amidst the rapid evolution of generative AI, on-device LLMs offer solutions to privacy, security, and connectivity challenges inherent in cloud-based models. Leveraging existing literature on running multi-billion parameter LLMs on resource-limited devices, our study examines the thermal effects and interaction speeds of a high-performing LLM across different smartphone generations. We present real-world performance results, providing insights into on-device inference capabilities. Keywords on-device LLM · smartphone inference · security & privacy · large language model · quantization 1 Introduction Today’s popular generative AI applications, such as ChatGPT and GitHub Copilot, operate on cloud-based systems. The cloud model’s primary value proposition is faster inference by running memory and processing-intensive large language models (LLM) on powerful and scalable cloud servers. Although this approach offers major benefits for certain AI applications, the inevitability of on-device LLMs becomes apparent when considering applications where data ownership, safety, and security are crucial. It is also of great importance for the democratization of the AI domain that users run applications on their own devices. Without a paradigm shift in AI technologies—similar to the transition from mainframes to personal computers, and subsequently to mobile devices—we will be unable to unlock AI’s true potential. Fortunately, remarkable developments in the LLM field are emerging every day. Thanks to the R&D efforts in LLM architecture, LLMs with fewer parameters are now offering faster responses and improved performance compared to older large models. We have indeed reached a stage where LLM quality takes precedence over quantity. The number of models demonstrating performance superior to their larger counterparts is increasing daily [1]. Running LLMs on smartphones or even other edge devices has significant advantages. Most importantly, an ondevice LLM provides privacy and security [2]. Transmitting personal data entered into health applications or private conversations with a personal assistant over the internet is a vulnerability. Disconnection is another important issue that cannot be addressed in cloud-based architecture. It is unacceptable for AI applications, which we will utilize in critical moments of our daily lives, to become even temporarily unusable due to connectivity issues. Also, transmission latency becomes a limiting factor for time-sensitive applications. All things considered, we anticipate different approaches to the generative AI and LLM revolution, including cloud-based, on-device, and hybrid architectures. In this study, we will be focusing on the feasibility of running LLMs on smartphones. We will investigate the question “Can a state-of-the-art LLM with billions of parameters truly operate on a smartphone without any network connectivity?” We will concentrate on the interaction speed of a performant LLM on various iPhones, and we will evaluate on-device inference capabilities by empirical data gathered through our tests. The structure of this paper is as follows: in Section 2, we examine the proposed methods for running state-of-the-art LLMs on devices with limited resources. Section 3 describes our experimental setup and test procedures. Section 4 presents our test results and their interpretations. Section 5 concludes the paper and outlines future directions." 2312.12473v1,"A Study on Social Robot Behavior in Group Conversation Tung Nguyen 1 , Eric Nichols 1 , and Randy Gomez 1 Abstract— Recently, research in human-robot interaction began to consider a robot’s influence at the group level. Despite the recent growth in research investigating the effects of robots within groups of people, our overall understanding of what happens when robots are placed within groups or teams of people is still limited. This paper investigates several key problems for social robots that manage conversations in a group setting, where the number of participants is more than two. In a group setting, the conversation dynamics are a lot more complicated than the conventional one-to-one conversation, thus, there are more challenges need to be solved. I. INTRODUCTION In this paper, we discuss several key issues in terms of interaction management for a social robot that facilitates conversation in a group setting. In contrast to the conventional one-to-one conversation, which is the major research paradigm in human-robot interaction research, a group conversation, usually called multi-party dialog, involves three or more participants. As the number of interlocutors increases, the dynamics of the conversation also increase in terms of complexity, thus, making the facilitation task of the robot in a multi-party dialog very challenging. Despite the increase of recent research studying the effects of robots within groups of people, the overall understanding of what happens when robots participate in a conversation within groups of people and what the robot should do in this situation is still limited. In principle, the handling of a multi-party dialog involves two phases: observation and interaction management. In the observation phase, the robot observes interactions among the other interlocutors to gather visual, acoustic, and verbal information of the current situation. Depending on the goal of the robot, the raw information from sensors are processed to extract the dynamics of the conversation such as who is the speaker, or who is being addressed, engagement level of each participants [1], [2]. In the management phase, the robot performs facilitation behaviors accordingly to the perceived information and its pre-defined goal. Our work in this paper focuses on the phase of interaction management. The goal of a social robot that facilitates multi-party dialog is to maintain the flow of the conversation and make all the participants feel satisfied. Traum [3] discussed several key issues of a dialog system’s interaction management in a group conversation setting, which includes: turn management, channel management, thread/conversation management, initiative management, and attention management. Each of these issues has been investigated in multiple existing studies. [4], [5] proposed meth- ods for handling turn taking in multi-party conversations. Matsuyama et al. [6] proposed a POMDP-based model that tackles the issue of initiative management to control the conversation flow among the participants. In this work, we discuss several important interaction management issues that a social robot needs to manage in a group conversation. The remainder of this paper is organized as follows. In Section II, we start by summarizing studies about facilitation in groups interaction. In Section III, we discuss about key issues for robot to handle interaction management of group conversations effectively. Finally, we summarize and conclude this study in Section IV. II. RELATED WORKS There are various research on specially situated facilitation agents in multiparty conversations. Ishizaki et al. [7] studied about differences in characteristics between dyadic (one-toone) and multiparty conversations, making foundation for the later works. Interestingly, even though there are more research focus on robot behaviors in dyadic conversations, recent surveys show that humans are more likely to interact with a robot as a group [8], [9]. Matsusaka et al. [10] were among the first to propose the utilization of a physical robot to participate in multiparty conversations. Traum [3] provided the first analysis of problems in handling conversation among group of interlocutors. Matsuyama et al. [11] developed a multiparty quiz-game-type facilitation system for elderly. Another study reported the effectiveness of the existence of a robot in quiz-type group in terms of communication activation [12]. Sidner et al. [13] focused on engagement, a key factor to determine level of interaction among participants in conversation, which is defined as “the process by which two (or more) participants establish, maintain and end their perceived connection during interactions they jointly undertake”. Based on this definition, they developed a robot that can maintain high level of engagement with human users using gaze behavior. Using the same definition as in Sidner’s work, Bohus and Horvitz [14], [15] evaluated the effectiveness of multimodality behavior model, which includes gaze, gesture, and speech, for a multiparty conversation facilitating agent. Kumar et al. [16] developed a model that selects appropriate dialogue action for facilitation in a tutoring scenario based on Bales’ Socio-Emotional Interaction Categories for textbased character agents. Recent studies show that robot can be effectively utilized to resolve conflicts among group members. For example, robots have demonstrated success in directly mediating children fighting over the same toy [17]. 1 Honda Research Institute Japan Co., Ltd., 8-1 Honcho, Wakoshi, Japan {e.nichols,tung.nguyen,r.gomez}@jp.honda-ri.com Martelaro et al. [18] study showed that a robot intervening" 2312.12492v1,"CodeLL: A Lifelong Learning Dataset to Support the Co-Evolution of Data and Language Models of Code Martin Weyssow ∗ , Claudio Di Sipio † , Davide Di Ruscio † , Houari Sahraoui ∗ ∗ DIRO, Université de Montréal martin.weyssow@umontreal.ca,sahraouh@iro.umontreal.ca † University of l’Aquila {claudio.disipio,davide.diruscio}@univaq.it ABSTRACT Motivated by recent work on lifelong learning applications for language models (LMs) of code, we introduce CodeLL, a lifelong learning dataset focused on code changes. Our contribution addresses a notable research gap marked by the absence of a long-term temporal dimension in existing code change datasets, limiting their suitability in lifelong learning scenarios. In contrast, our dataset aims to comprehensively capture code changes across the entire release history of open-source software repositories. In this work, we introduce an initial version of CodeLL, comprising 71 machine-learning-based projects mined from Software Heritage. This dataset enables the extraction and in-depth analysis of code changes spanning 2,483 releases at both the method and API levels. CodeLL enables researchers studying the behaviour of LMs in lifelong fine-tuning settings for learning code changes. Additionally, the dataset can help studying data distribution shifts within software repositories and the evolution of API usages over time. ACM Reference Format: Martin Weyssow ∗ , Claudio Di Sipio † , Davide Di Ruscio † , Houari Sahraoui ∗ . 2018. CodeLL: A Lifelong Learning Dataset to Support the Co-Evolution of Data and Language Models of Code. In Proceedings of 21st International Conference on Mining Software Repositories (MSR 2024). ACM, New York, NY, USA, 5 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The abundance of open-source software (OSS) data has played a pivotal role in advancing the field of automated software engineering. Lately, large-scale pre-training datasets, exemplified by The Pile [7] and The Stack [12] have enabled the emergence of large language models (LLMs) tailored for programming languages understanding and generation [3, 19, 23]. From another perspective, datasets and benchmarks such as CodeXGlue [16], CodeSearch- Net [9], XLCoST [28] or CodeNet [21] have been proven to be essential for fine-tuning language models (LMs) of code 1 across diverse code-related tasks. 1 We use “language models” to refer to both “large language models” and “pre-trained language models”. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MSR 2024, April 2024, Lisbon, Portugal © 2018 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX In contrast to most previous research in code intelligence that often views these models as static entities, our stance aligns with prior research [8, 24, 25], conceptualizing LMs of code as dynamic and adaptable. In essence, we contend that viewing models of code as dynamically evolving over time opens up exciting opportunities to study their behaviour in lifelong learning scenarios. This paradigm shift underscores the necessity for mining software repositories and constructing datasets that incorporate concepts related to the long-term evolution of code and repositories. Furthermore, it sheds light on a potential research gap in the current landscape. First, the datasets and benchmarks mentioned previously lack a temporal dimension and are commonly utilized for pre-training or fine-tuning models at a specific point in time. The absence of temporality compromises their ability to capture the inherent dynamic evolution in software development and repositories. Alternatively, code change datasets such as CodeChangeNet [15] and MegaD- iff [17], only encompass code changes over two specific points in time, rendering them unsuitable for pre-training or fine-tuning LMs of code in a lifelong learning setting. Furthermore, while prior research effectively studied LMs of code in lifelong learning settings [8, 25], there remains an absence of datasets incorporating notions of code evolution over time. Consequently, in the context of lifelong learning, where LMs of code evolve as dynamic entities accumulating knowledge over time, the nature of the existing datasets poses significant limitations. To address this gap, we present an initial version of Code Lifelong Learning (CodeLL), a dataset conceived for supporting lifelong coevolution of software repositories and LMs of code. To build CodeLL, we leverage Software Heritage (SWH) [5] platform that stores, collects, and maintains software repositories from multiple sources, including GitHub, PyPi, and GitLab. The main rationale behind this choice is that SWH enables the fingerprinting of large and reproducible datasets through queries and timestamps [14]. Consequently, it renders the extraction of our raw datasets reproducible and facilitates its extension in the future. In the scope of this paper, we collect 71 Python repositories related to machine learning that often use fast-evolving third-party libraries [6], which constitutes an interesting scope of analysis for studying lifelong code changes. For each repository, we extract all its associated releases and Python files, resulting in a total of 2,483 releases and 970,277 files. Next, we design mapping heuristics to map files, methods, and API calls between two consecutive releases to analyze how methods content and API calls evolve over the entire lifespan of the repositories. By conducting a code change analysis of one of the mined repositories (see Section 3), we highlight potential research opportunities spanning from the fine-tuning of LLMs of code for learning lifelong" 2312.12528v1,"GENERATING SERIES FOR TORSION-FREE BUNDLES OVER SINGULAR CURVES: RATIONALITY, DUALITY AND MODULARITY YIFENG HUANG Dept. of Mathematics, University of British Columbia RUOFAN JIANG Dept. of Mathematics, University of Wisconsin–Madison Abstract. We consider two motivic generating functions defined on a variety, and reveal their tight connection. They essentially count torsion-free bundles and zero-dimensional sheaves. On a reduced singular curve, we show that the “Quot zeta function” encoding the motives of Quot schemes of 0-dimension quotients of a rank d torsion-free bundle satisfies rationality and a Serreduality-type functional equation. This is a high-rank generalization of known results on the motivic Hilbert zeta function (the d = 1 case) due to Bejleri, Ranganathan, and Vakil (rationality) and Yun (functional equation). Moreover, a stronger rationality result holds in the relative Grothendieck ring of varieties. Our methods involve a novel sublattice parametrization, a certain generalization of affine Grassmannians, and harmonic analysis over local fields. On a general variety, we prove that the “Cohen–Lenstra zeta function” encoding the motives of stacks of zero-dimensional sheaves can be obtained as a “rank → ∞” limit of the Quot zeta functions. Combining these techniques, we prove explicit results for the planar singularities associated to the (2, n) torus knots/links, namely, y 2 = x n . The resulting formulas involve summations of Hall polynomials over partitions bounded by a box or a vertical strip, which are of independent interest from the perspectives of skew Cauchy identities for Hall–Littlewood polynomials, Rogers–Ramanujan identities, and modular forms. Contents 1. Introduction 2. Reduction to the local case 3. Preliminaries 4. Parametrizing sublattices 5. Geometry of lattices 6. Motivic Cohen–Lenstra zeta function 7. Functional equation 8. The y 2 = x n singularity 9. Combinatorial aspects References 2 7 8 9 13 25 32 37 42 48 E-mail addresses: huangyf@math.ubc.ca, rjiang32@wisc.edu. Date: December 21, 2023. 1" 2312.12535v1,"INTEGRAL MEANS OF SOLUTIONS OF THE ONE-DIMENSIONAL POISSON EQUATION WITH ROBIN BOUNDARY CONDITIONS CHRISTOS PAPADIMITRIOU Abstract. Consider the one-dimentional Poisson equation −u ′′ = f on the interval [−π, π], where f is an non-negative integrable function, with Robin boundary conditions −u ′ (−π) + αu(−π) = u ′ (π) + αu(π) = 0, where α > 0 is a constant. In this paper we prove inequalities for the convex integral means of solutions of this problem, using the polarization of functions and its properties. We find solutions with maximal convex integral means and prove their uniqueness. 1. Introduction Imagine a metal rod or a wire of length 2π that is heated through by an external heat source with distribution f ∈ L 1 [−π, π]. We allow the rod to interact with its environment by submerging its ends in liquid or gas with temperature zero and letting heat to be dissipated via Newton’s law of cooling, i.e. the heat flux at the end-points is proportional to their temperature. The mathematical formulation of this law is achieved by introducing Robin boundary conditions to our setting. Therefore, we are interested in the temperature function u f of the steady-state of the rod, meaning that the temperature of the rod is independent of the time variable. Putting all this into equations, we have that u f has to satisfy the Poisson equation (1.1) −u ′′ = f on [−π, π] with Robin boundary conditions (1.2) −u ′ (−π) + αu(−π) = u ′ (π) + αu(π) = 0, for some constant α > 0 (which might depend on the material of the rod and other parameters). Recently, J. J. Langford and P. McDonald [7], studying this problem, provided an explicit formula for the temperature u f of the solution (see Proposition 2.2). They were also interested in the convex integral means Date: December 2023. 2020 Mathematics Subject Classification. 34B08, 34C10. Key words and phrases. Poisson’s equation, Robin boundary conditions, polarization, symmetrization, comparison theorems. 1" 2312.12554v1,"Rectangle Search: An Anytime Beam Search (Extended Version) Sofia Lemons, 1, 2 Wheeler Ruml, 1 Robert C. Holte, 3 Carlos Linares López, 4 1 University of New Hampshire 2 Earlham College 3 University of Alberta, Alberta Machine Intelligence Institute (Amii) 4 Computer Science and Engineering Department, Universidad Carlos III de Madrid sofia@snlemons.com, ruml@cs.unh.edu, rholte@ualberta.ca, carlos.linares@uc3m.es Abstract Anytime heuristic search algorithms try to find a (potentially suboptimal) solution as quickly as possible and then work to find better and better solutions until an optimal solution is obtained or time is exhausted. The most widely-known anytime search algorithms are based on best-first search. In this paper, we propose a new algorithm, rectangle search, that is instead based on beam search, a variant of breadth-first search. It repeatedly explores alternatives at all depth levels and is thus best-suited to problems featuring deep local minima. Experiments using a variety of popular search benchmarks suggest that rectangle search is competitive with fixed-width beam search and often performs better than the previous best anytime search algorithms. Introduction It is often convenient to have a heuristic search algorithm that can flexibly make use of however much time is available. The search can be terminated whenever desired and returns the best solution found so far. Dean and Boddy (1988) termed these anytime algorithms. Russell and Zilberstein (1991) further differentiated between interruptible algorithms, which quickly find a solution and then find better solutions as time passes, eventually finding an optimal plan if given sufficient time, and contract algorithms, which are informed of the termination time in advance and thus need only find a single solution before that time. Anytime algorithms have been proposed as a useful tool for building intelligent systems (Zilberstein 1996; Zilberstein and Russell 1996). While only a few contract search algorithms have been proposed (Dionne, Thayer, and Ruml 2011), interruptible algorithms have been widely investigated and applied (Likhachev and Ferguson 2009). As we review below, the most well-known interruptible anytime heuristic search algorithms are based on best-first search. Best-first search is attractive as it is the basis for the optimally-efficient optimal search algorithm A* (Hart, Nilsson, and Raphael 1968) and it is relatively well understood. However, because anytime algorithms are intended for use cases in which the solutions found do not need to be proven optimal, and are not even expected to be optimal, it is not Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. obvious that best-first search is the most appropriate choice of algorithmic architecture. In this paper, we propose an interruptible algorithm called rectangle search that is inspired by beam search, which is based on breadth-first search rather than best-first search. Rectangle search is straightforward and simple to implement: the beam incrementally widens and deepens. We study rectangle search’s performance experimentally on seven popular heuristic search benchmarks. We find that, overall, rectangle search outperforms previously-proposed anytime search algorithms. Furthermore, it tends to find solutions of comparable cost at similar times when compared to fixedwidth beam search, with the added benefit of reducing solution cost over time. We investigate when it performs well or poorly, finding that it performs well in problems with large local minima. Overall, rectangle search appears to mark a new state of the art for anytime search, while also serving as a replacement for fixed-width beam search. Background Before presenting rectangle search, we first review relevant prior work in anytime search and beam search. Anytime Search Most previous anytime algorithms are based on weighted A* (Pohl 1973), which is a best-first search using f ′ (n) = g(n) + w × h(n), where g(n) is the cost to reach n from the start, h(n) is the estimated cost-to-go to the goal from n, and w ≥ 1. For example, anytime weighted A* (AWA*) (Hansen and Zhou 2007) runs weighted A* but retains a current incumbent solution and continues searching for better solutions until there are no open nodes with f (n) = g(n) + h(n) < g(incumbent), thus proving that the incumbent is optimal. Anytime Repairing A* (ARA*) (Likhachev, Gordon, and Thrun 2004) is similar, but applies a schedule of decreasing weights ending with w = 1. When a solution is found, it decreases the weight according to the schedule and reorders the open list. It terminates after finding a solution with w = 1 or after exhausting all nodes with f (n) < g(incumbent). Anytime EES (AEES) (Thayer, Benton, and Helmert 2012) requires no weighting parameter and explicitly works to minimize the time between finding new solutions by using distance-to-go estimates d(n). d(n) is an estimate of the" 2312.12565v1,"1 Precise Coil Alignment for Dynamic Wireless Charging of Electric Vehicles with RFID Sensing Haijian Sun ∗ , Xiang Ma † , Rose Qingyang Hu † , Randy Christensen ‡ ∗ School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA † Department of Electrical and Computer Engineering, Utah State University, Logan, UT, USA ‡ Blue Origin LLC, Kent, WA, USA Emails: hsun@uga.edu, xiang.ma@usu.edu, rose.hu@usu.edu, rchristensen@blueorigin.com Abstract Electric vehicle (EV) has emerged as a transformative force for the sustainable and environmentally friendly future. To alleviate range anxiety caused by battery and charging facility, dynamic wireless power transfer (DWPT) is increasingly recognized as a key enabler for widespread EV adoption, yet it faces significant technical challenges, primarily in precise coil alignment. This article begins by reviewing current alignment methodologies and evaluates their advantages and limitations. We observe that achieving the necessary alignment precision is challenging with these existing methods. To address this, we present an innovative RFID-based DWPT coil alignment system, utilizing coherent phase detection and a maximum likelihood estimation algorithm, capable of achieving sub-10 cm accuracy. This system’s efficacy in providing both lateral and vertical misalignment estimates has been verified through laboratory and experimental tests. We also discuss potential challenges in broader system implementation and propose corresponding solutions. This research offers a viable and promising solution for enhancing DWPT efficiency. Index Terms dynamic wireless charging, electric vehicles, coil alignment, RFID wireless sensing, wireless localization. December 21, 2023 DRAFT" 2312.12568v1,"Scaling Opponent Shaping to High Dimensional Games Akbir Khan ∗ Timon Willi ∗ Newton Kwan ∗ University College London akbir.khan.13@ucl.ac.uk University of Oxford timon.willi@eng.ox.ac.uk University College London Andrea Tacchetti Chris Lu Edward Grefenstette Deepmind University of Oxford University College London Tim Rocktäschel Jakob Foerster University College London University of Oxford ABSTRACT In multi-agent settings with mixed incentives, methods developed for zero-sum games have been shown to lead to detrimental outcomes. To address this issue, opponent shaping (OS) methods explicitly learn to influence the learning dynamics of co-players and empirically lead to improved individual and collective outcomes. However, OS methods have only been evaluated in low-dimensional environments due to the challenges associated with estimating higher-order derivatives or scaling model-free meta-learning. Alternative methods that scale to more complex settings either converge to undesirable solutions or rely on unrealistic assumptions about the environment or co-players. In this paper, we successfully scale an OS-based approach to general-sum games with temporallyextended actions and long-time horizons for the first time. After analysing the representations of the meta-state and history used by previous algorithms, we propose a simplified version called Shaper. We show empirically that Shaper leads to improved individual and collective outcomes in a range of challenging settings from literature. We further formalize a technique previously implicit in the literature, and analyse its contribution to opponent shaping. We show empirically that this technique is helpful for the functioning of prior methods in certain environments. Lastly, we show that previous environments, such as the CoinGame, are inadequate for analysing temporally-extended general-sum interactions 1 . KEYWORDS Multi-Agent Reinforcement Learning, Opponent Shaping, General- Sum Games 1 INTRODUCTION From personal assistants and chat-bots to self-driving cars and recommendation systems, the world of software is becoming increasingly multi-agent as these systems are continuously learning and interacting with each other in fully cooperative, fully competitive, and general-sum settings. In this paper we investigate interacting, learning agents in generalsum settings. In such settings, commonly-used RL methods developed for zero-sum games can lead to disastrous outcomes [7]. For example, in real-world scenarios like pollution and international arms races [8, 41], such agents would fail to realise that they’re better off cooperating, even if it means they’re potentially worse ∗ Equal Contribution. 1 Blogpost available at sites.google.com/view/scale-os/ off than their co-players. Poor performance could also lead to being extorted in social-dilemma-like scenarios [30, 33]. While multi-agent learning research has shown great success in strictly competitive [6, 18, 40, 44] and fully cooperative settings [13, 34], this success does not transfer to general-sum settings [12, 28]: In competitive games, agents can learn Nash equilibrium strategies by iteratively best-responding to suitable mixtures of past opponents. Similarly, best-responding to rational co-players leads to the desirable equilibria in cooperative games (assuming joint training). In contrast, many Nash equilibria coincide with globally worst welfare outcomes in general-sum settings, rendering the above learning paradigms ineffective. For example, in the iterated prisoner’s dilemma [IPD, 2, 15], naive best-response dynamics converge to unconditional mutual defection [12] rather than Nash equilibria with higher social welfare. It is important that general-sum learning methods scale to highdimensional settings, such as those with longer-time horizons, larger state spaces and temporally-extended actions, as these environments are more akin to the real world. In matrix games, cooperation and defection are clearly defined atomic actions, whilst in more complex environments such as autonomous driving, cooperation and defection are defined over sequences of actions (e.g. a path towards a cooperative/defective location). Scalable methods [19, 22, 32, 48] that manage to avoid unconditional defection in these settings rely heavily on reward shaping, which blurs the line between the problem setting (“social dilemma”) and the method. As an alternative approach, opponent shaping (OS) methods recognise that the actions of any one agent influence their coplayer’s policy and seek to use this mechanism to their advantage [12, 20, 27, 46]. However, many past OS methods require privileged information to shape their opponents and are myopic since anticipating many steps is intractable. Model-Free Opponent Shaping [M- FOS, 30] and The Good Shepherd [GS, 4] solve the issues above by framing opponent shaping as a meta-learning problem, which our method inherits and builds upon. However, M-FOS presents only preliminary results on the higher-dimensional CoinGame [26] benchmark, and GS none at all. To scale OS agents to higher-dimensional benchmarks, we systematically evaluate the architectural components of the M-FOS and GS algorithms. We identify two forms of memory—history and context. History captures intra-episode information and context inter-episode information. We find empirically that both are necessary to achieve shaping. M-FOS captures both types of memory (though not completely), whereas GS does not. However, we" 2312.12574v1,"Generator Assisted Mixture of Experts For Feature Acquisition in Batch Vedang Asgaonkar, Aditya Jain, Abir De IIT Bombay {vedang, adityajainjhs, abir}@cse.iitb.ac.in Abstract Given a set of observations, feature acquisition is about finding the subset of unobserved features which would enhance accuracy. Such problems have been explored in a sequential setting in prior work. Here, the model receives feedback from every new feature acquired and chooses to explore more features or to predict. However, sequential acquisition is not feasible in some settings where time is of the essence. We consider the problem of feature acquisition in batch, where the subset of features to be queried in batch is chosen based on the currently observed features, and then acquired as a batch, followed by prediction. We solve this problem using several technical innovations. First, we use a feature generator to draw a subset of the synthetic features for some examples, which reduces the cost of oracle queries. Second, to make the feature acquisition problem tractable for the large heterogeneous observed features, we partition the data into buckets, by borrowing tools from locality sensitive hashing and then train a mixture of experts model. Third, we design a tractable lower bound of the original objective. We use a greedy algorithm combined with model training to solve the underlying problem. Experiments with four datasets show that our approach outperforms these methods in terms of trade-off between accuracy and feature acquisition cost. 1 Introduction Supervised learning algorithms often assume access to a complete set of features x ∈ R d to model the underlying classifier Pr(y | x). However, in applications like healthcare, information retrieval, etc., a key goal is feature acquisition (Babu and Vijayan 2016; Geng et al. 2007), where the learner may observe only a subset of features O ⊂ {1, .., d} and the goal is to query for a new subset U from the unobserved set of features: U ⊂ {1, ..., d}\O. For example, when a patient visits a doctor with a new health issue, the doctor can observe only few symptoms. If the symptoms are not informative enough to diagnose a disease with high confidence, the doctor may ask for additional medical tests. 1.1 Prior work and their limitations Driven by these motivations, feature acquisition is widely studied in literature. Earlier works used tools from active learning techniques (Melville et al. 2004; Saar-Tsechansky, Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Melville, and Provost 2009; Huang et al. 2018; Gong et al. 2019; Ma et al. 2018), which optimize measures based on variance, uncertainty or information gain. To improve their performance, a recent line of work explicitly optimizes the prediction accuracy (Shim, Hwang, and Yang 2018; Li and Oliva 2020, 2021; Janisch, Pevnỳ, and Lisỳ 2019, 2020a; Dulac-Arnold et al. 2012; Liyanage, Zois, and Chelmis 2021a,b; Hu et al. 2018; Yu et al. 2016), predominantly using reinforcement learning (RL). The above methods are tailored for sequential feature acquisition. In such scenarios, it is feasible to observe the value of a newly acquired feature immediately after its acquisition, allowing the use of its true value to inform the acquisition of additional features. However, certain situations involve a substantial delay between querying one feature and observing its value. In these cases, it may be more practical to batch-query a subset of features instead of acquiring them one by one in an online fashion. For instance, in healthcare, the analysis of pathological samples can introduce significant delays after collection. Thus, doctors may need to obtain results from multiple tests at once for rapid diagnosis. We provide a detailed survey of related work in Appendix C. 1.2 Our contributions Responding to the above challenge, we propose G EN E X , a novel feature acquisition method to acquire features in batch. Specifically, we make the following contributions. Using feature generator to reduce oracle queries Feature generators are commonly used in feature acquisition tasks to guide feature selection policies (Li and Oliva 2021; Ma et al. 2018). However, these generated features typically are not utilized for final label prediction. In our work, instead of querying all features from an oracle, we draw a feature subset from the generator and directly employ them for classification, reducing the number of oracle queries with only a marginal loss in accuracy. Mixture of experts on heterogeneous feature space The observed features O can vary significantly across instances. This leads to a diverse set of acquired features and, consequently, a range of heterogeneous data domains. Generalizing across such heterogeneity using a single model is challenging. To address this, we partition the dataset into clusters or domains using a random hyperplane-based approximate" 2312.12588v1,"An Empirical study of Unsupervised Neural Machine Translation: analyzing NMT output, model’s behavior and sentences’ contribution Isidora Chara Tourni Boston University isidora@bu.edu Abstract Unsupervised Neural Machine Translation (UNMT) focuses on improving NMT results under the assumption there is no human translated parallel data, yet little work has been done so far in highlighting its advantages compared to supervised methods and analyzing its output in aspects other than translation accuracy. We focus on three very diverse languages, French, Gujarati, and Kazakh, and train bilingual NMT models, to and from English, with various levels of supervision, in high- and low- resource setups, measure quality of the NMT output and compare the generated sequences’ word order and semantic similarity to source and reference sentences. We also use Layer-wise Relevance Propagation to evaluate the source and target sentences’ contribution to the result, expanding the findings of previous works to the UNMT paradigm. 1 Introduction Unsupervised Neural Machine Translation (UNMT) has been widely studied (Wang and Zhao, 2021; Marchisio et al., 2020; Kim et al., 2020; Lample et al., 2017; Artetxe et al., 2019; Su et al., 2019), in an effort to create efficient and trustworthy NMT models of excellent performance not relying on the existence of parallel data. Obtaining high-quality parallel corpora is expensive and time-consuming, especially for less-common language pairs. Unsupervised NMT hence aims to circumvent this limitation. NMT in general significantly aids in preserving indigenous languages by making global information accessible, supports migrants in overcoming language barriers to essential services, and enables the globalization of local news from smaller countries. UNMT particularly has broad applicability, especially in addressing linguistic diversity and information accessibility challenges. Derry Wijaya Boston University wijaya@bu.edu However, there has been little effort on analyzing, apart from the quality of the output, the model behavior during UNMT, and the models’ inner workings and the effects of various setups on hypotheses and generated translations’ quality, monotonicity and semantic similarity, as well as model robustness and consistency. We analyze and compare UNMT approaches for two very diverse languages, French and Gujarati, translating to and from English. We research into the existence of different stages in UNMT, analyze source and target sentence tokens’ contributions to the result (Bach et al., 2015) evaluate the quality and word alignment of generated translations, and Robustness and Consistency of our model to perturbed inputs. Our paper follows up closely on the work of Voita et al. (2020, 2021); Marchisio et al. (2022), and examines the following questions: • Do the distinct stages of transformer-based NMT analyzed in previous works exist in Unsupervised, and joint Supervised & Unsupervised NMT? • How does output quality, word alignment, semantic similarity, as well as source and target sentences’ token contributions to the NMT output behave across the aforementioned stages? • How Robust and Consistent are NMT models throughout training? Our findings confirm the existence of NMT stages regardless of the level of training supervision, and show that Unsupervised methods produce translations more similar to source sentences in terms of word order, yet more semantically distant. UNMT models tend to show higher Robustness and Consistency, and can more" 2312.12617v1,"Enhanced Optical Vector Bottle Beams with Obscured Nodal Surfaces N ICOLAS P EREZ 1 AND D ARYL P REECE 1,* 1 University of California Irvine, Irvine, CA 92697, USA * dpreece@uci.edu Abstract: Optical bottle beams, characterized by their unique three-dimensional dark core, have garnered substantial interest due to their potential applications across multiple domains of science and technology. This paper delves into the current methods used to create these beams and provides a method to obscure their nodal planes through coaxial non-interfering orthogonally polarized beams to generate bottle beams with enhanced uniformity. Experimental and theoretical results show the enhanced vector bottle beam maintains a smaller, more spherically uniform potential well and interesting quasi-particle polarization characteristics. 1. Introduction Optical bottle beams have emerged as a fascinating area of research, offering advantages in fields such as atom optics and quantum computing [1, 2], optical trapping [3] and microscopy [4, 5]. Optical bottle beams are comprised of a dark focus surrounded by an area of light. This counter-intuitive beam shape creates an optical potential well at the centre of the beam, (|𝐸 | → 0). In areas such as optical tweezers, optical bottle beams are primarily used to trap absorbing particles, which are pushed out of typical Gaussian optical traps [3]. The inverted nature of a bottle beam trap leads to reduced energy absorption by the trapped particle. This in combination with other trapping techniques has led to the trapping and cooling of atoms [1]. First introduced by Arlt and Padgett in 1999, the concept of optical bottle beams utilized a combination of Laguerre-Gaussian modes, to create a beam with a dark central spot surrounded by a bright beam of light [6]. In this regime, the radial phase discontinuity combined with the Gouy phase shift leads to destructive interference in the focal region of the beam. This early work laid the foundation for subsequent research in the field, particularly in the realm of optical trapping and atom trapping. Later, McGloin took a different approach to create the second regime by propagating higher-order Laguerre Gaussian beams through an axicon to create higher-order Bessel beams with unique bottle beam profiles [7]. Bottle beams produced in this way can produce both single on-axis; or three-dimensional arrays of intensity minima. Great effort has also been made to improve the bottle beam symmetry and broaden their applications. Shvedov introduced the idea of generating bottle beams with white light vortices, further diversifying the field’s capabilities [8]. Chremmos, by utilizing airy beams to generate larger and more homogeneous bottle beams, began addressing challenges associated with intensity variations in the focal region [9]. Zhang used Moiré techniques to synthesize bottle beams from multiple vortex beams [10]. Alpmann explored the use of a Fourier convolution theorem to generate optical bottle beams with OAM [3]. Porfirev proposed an array of optical bottle beams based on the superposition of Bessel beams [11]. Turpin explored conical refraction in biaxial crystals, allowing for the creation of bottle beams that could be easily opened and closed as needed [12]. More recently, several authors have created optical bottle beams with meta-surfaces [13] and nano-jets [14]. These advancements in shaping bottle beams have greatly enhanced the flexibility of the technology, especially in applications like optical trapping, atom trapping, and super-resolution microscopy, where the properties of bottle beams play a crucial role. Although the utility of these beams is obvious, most laboratory-created bottle beams are" 2312.12619v1,"Hierarchical Vision Transformers for Context-Aware Prostate Cancer Grading in Whole Slide Images Clément Grisi ∗ , Geert Litjens, Jeroen van der Laak Computational Pathology Group, Radboudumc, Netherlands Abstract Vision Transformers (ViTs) have ushered in a new era in computer vision, showcasing unparalleled performance in many challenging tasks. However, their practical deployment in computational pathology has largely been constrained by the sheer size of whole slide images (WSIs), which result in lengthy input sequences. Transformers faced a similar limitation when applied to long documents, and Hierarchical Transformers were introduced to circumvent it. Given the analogous challenge with WSIs and their inherent hierarchical structure, Hierarchical Vision Transformers (H-ViTs) emerge as a promising solution in computational pathology. This work delves into the capabilities of H-ViTs, evaluating their efficiency for prostate cancer grading in WSIs. Our results show that they achieve competitive performance against existing state-of-the-art solutions. 1 Introduction With the advent of whole-slide imaging technology, large numbers of tissue slides are being scanned and archived digitally. Digitization of histological slides has contributed to the growing availability of large datasets, fostering tremendous computer vision research opportunities. Recent progress in deep learning has set new performance standards in various clinical applications, especially with the recent surge of attention-based models (Dosovitskiy et al. [2021]). However, conventional deep learning methods are ill-equipped to handle the enormous sizes of whole-slide images (WSIs), which do not fit into the memory of graph processing units (GPUs). Innovative strategies have emerged to overcome this memory bottleneck. A prevailing approach consists of partitioning these massive images into smaller patches. These patches often serve as the input units, with labels derived from pixel-level annotations. Because the traditional requirement of input-label pairs can be prohibitive – or even impossible as pathologists can only annotate what they know – recent research has explored techniques beyond full supervision, focusing on more flexible training paradigms, such as weakly supervised learning. Multiple Instance Learning (MIL) has recently emerged as a powerful weakly supervised approach in several computational pathology challenges, where it has shown remarkable performance (Hou et al. [2015], Campanella et al. [2019]). Despite showcasing impressive results, most MIL methods neglect the spatial relationships among patches, thereby overlooking valuable contextual information. To address this limitation, recent research focused on developing methods capable of integrating context (Lerousseau et al. [2021], Pinckaers et al. [2021], Shao et al. [2021]). By leveraging the hierarchical structure inherent to WSIs, Hierarchical Vision Transformers (H-ViTs) have proven successful at learning context-aware image representations from whole slide images, achieving state-of-the-art results in cancer subtyping and survival prediction (Chen et al. [2022]). We explore their application in the ∗ Corresponding author: clement.grisi@radboudumc.nl 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.12629v1,"QUANTUM GEOMETRY AND MOCK MODULARITY SERGEI ALEXANDROV Laboratoire Charles Coulomb (L2C), Université de Montpellier, CNRS, F-34095, Montpellier, France SOHEYLA FEYZBAKHSH Department of Mathematics, Imperial College, London SW7 2AZ, United Kingdom ALBRECHT KLEMM Bethe Center for Theoretical Physics and Hausdorff Center for Mathematics, Universität Bonn, D-53115, Germany BORIS PIOLINE Sorbonne Université, CNRS, Laboratoire de Physique Théorique et Hautes Energies, Campus Pierre et Marie Curie, 4 place Jussieu, F-75005, Paris, France Abstract. In previous work, we used new mathematical relations between Gopakumar-Vafa (GV) invariants and rank 0 Donaldson-Thomas (DT) invariants to determine the first few terms in the generating series of Abelian D4-D2-D0 indices for a class of compact one-parameter Calabi-Yau threefolds. This allowed us to obtain striking checks of S-duality, namely the prediction that these series should be vector-valued weakly holomorphic modular forms under SL(2, Z). In this work, we extend this analysis to the case of D4-D2-D0 indices with two units of D4-brane charge, where S-duality instead predicts that the corresponding generating series should be mock modular with a specific shadow. For the degree 10 hypersurface in weighted projective space P 5,2,1,1,1 , and the degree 8 hypersurface in P 4,1,1,1,1 , where GV invariants can be computed to sufficiently high genus, we find that the first few terms indeed match a unique mock modular form with the required properties, which we determine explicitly. Turning the argument around, we obtain new boundary conditions on the holomorphic ambiguity of the topological string amplitude, which in principle allow to determine it completely up to genus 95 and 112, respectively, i.e. almost twice the maximal genus obtainable using gap and ordinary Castelnuovo vanishing conditions. E-mail addresses: sergey.alexandrov@umontpellier.fr, s.feyzbakhsh@imperial.ac.uk, aoklemm@th.physik.uni-bonn.de, pioline@lpthe.jussieu.fr. 1" 2312.12642v1,"LoLa: Low-Latency Realtime Video Conferencing over Multiple Cellular Carriers Sara Ayoubi ∗ Giulio Grassi ∗ Giovanni Pau sara.ayoubi@nokia-bell-labs.com Nokia Bell Labs Paris-Saclay, France Inria Paris, France University of Bologna Bologna, Italy Kyle Jamieson Renata Teixeira Princeton University Princeton, USA renata.teixeira@inria.fr Inria Paris, France ABSTRACT LoLa is a novel multi-path system for video conferencing applications over cellular networks. It provides significant gains over single link solutions when the link quality over different cellular networks fluctuate dramatically and independently over time, or when aggregating the throughput across different cellular links improves the perceived video quality. LoLa achieves this by continuously estimating the quality of available cellular links to decide how to strip video packets across them without inducing delays or packet drops. It is also tightly coupled with state-of-the-art video codec to dynamically adapt video frame size to respond quickly to changing network conditions. Using multiple traces collected over 4 different cellular operators in a large metropolitan city, we demonstrate that LoLa provides significant gains in terms of throughput and delays compared to state-of-the-art real-time video conferencing solution. 1 INTRODUCTION Despite the growing prevalence of cellular networks for internet access, users may still encounter poor network conditions caused by fluctuations in link rates and sudden outages that can last for several seconds [19, 20]. These poor network conditions are particularly detrimental for latency-sensitive applications such as video conferencing programs, which require network delays of less than 100 milliseconds to maintain the naturalness of two-way communication [16, 19]. Previous efforts [6, 19] have attempted to address this problem by adapting the application’s sending rate to closely match the available link rate. However, these approaches fail to prevent lags during link outages and can result in low-quality or frequent videoquality-level switches in the face of rapid link rate changes. Figure 1 illustrates the uplink throughput measured for two different pairs of commercial cellular operators in mobile and stationary conditions. Our collected data confirms previous observations of frequent rapid link rate changes and outages and demonstrates that there is little correlation between these fluctuations across different operators. These observations motivated us to explore the potential benefits of utilizing multiple cellular interfaces simultaneously to offer higher-quality video conferencing sessions. By aggregating throughput across multiple cellular interfaces, it ∗ This research was conducted during their postdoctoral fellowship at Inria Paris Research Center in 2018. Figure 1: Uplink throughput measured on two different cellular operators in a large metropolitan city in indoor and outdoor settings. may be possible to stabilize or even improve the visual quality of a video conferencing session, and by moving packets away from a congested link in a timely fashion, we can improve the end-to-end delay and reduce or prevent video lags. With this in mind, we designed LoLa, the first multipath system for real-time interactive video conferencing applications. LoLa is designed for multipath transmission over multiple cellular carriers and exploits the availability of multiple network interfaces to dynamically strip packets across the available paths, providing the highest interactive video quality while bounding the end-to-end network delays. We conducted a trace-driven experimental evaluation of LoLa using data collected from four different commercial vendors in a large metropolitan city in both indoor and outdoor environments. Our results confirm LoLa’s ability to provide higher video quality and lower latency compared to the state-of-the-art single-trace video conferencing solution. The main contributions of LoLa are: • The first end-to-end multi-path system for real-time video conferencing applications. • An improved trace-driven emulator to enable high-fidelity record and replay of cellular network conditions." 2312.12646v1,"Draft version December 21, 2023 Typeset using L A TEX twocolumn style in AASTeX631 Disentangling Multiple Emitting Components in Molecular Observations with Non-negative Matrix Factorization Damien de Mijolla , 1 Jonathan Holdship , 2, 1 Serena Viti , 2, 1 and Johannes Heyl 1 1 Department of Physics and Astronomy, University College London, Gower Street, London WC1E 6BT 2 Leiden Observatory, Leiden University, PO Box 9513, NL-2300 RA Leiden, The Netherlands ABSTRACT Molecular emission from the galactic and extragalactic interstellar medium (ISM) is often used to determine the physical conditions of the dense gas. However, even from spatially resolved regions, the observed molecules are not necessarily arising from a single component. Disentangling multiple gas components is often a degenerate problem in radiative transfer studies. In this paper we investigate the use of the non-negative matrix factorization (NMF) approach as a means to recover gas components from a set of blended line intensity maps of molecular transitions which may trace different physical conditions. We run a series of experiments on synthetic datasets designed to replicate conditions in two very different environments: galactic pre-stellar cores and the ISM in high redshift galaxies. We find that the NMF algorithm often recovers the multiple components resembling those used in the data-generating process, provided that the different components have similar column densities. When NMF fails to recover all the individual components it does however group together the most similarly emitting ones. We further found that initialisation and regularisation are key factors in the efficiency of the NMF algorithm. Keywords: Molecular gas (1073), Interstellar phases (850), Submillimeter astronomy (1647), Astrostatistics techniques (1886), Astrochemistry (75) 1. INTRODUCTION Understanding the chemical and physical processes regulating the interstellar medium (ISM) is necessary for a thorough understanding of many astronomical processes, such as star formation (van Dishoeck & Blake 1998) and galaxy quenching (Colombo et al. 2020). As molecular lines are the primary means through which the conditions of the interstellar medium can be probed, their interpretation is of vital importance for accomplishing these goals. Radiative-transfer modelling is the framework through which radiation emitted by the ISM can be connected back to the physical conditions of the gas it is emitted from. Through computational radiativetransfer modelling codes, such as RADEX (van der Tak et al. 2007), the strength of molecular transitions can be used to constrain the chemistry, temperature, density Corresponding author: Serena Viti viti@strw.leidenuniv.nl and other astrophysical conditions of the emitting interstellar medium. This, in turn, then enables a better understanding of the local environment in which the ISM is embedded. Unfortunately, the radiative-transfer modelling problem needing solving when analysing molecular lines is typically degenerate. Because of the large number of free parameters in radiative-transfer models and their similar influence on intensities, usually multiple set of input parameters are capable of reproducing any given set of molecular line intensities. In Tunnard & Greve (2016), it was found that radiative transfer modeling was typically incapable of recovering parameters to better than half a dex. Although such degeneracies can be partially addressed through using rigorous statistical methodologies (Tunnard et al. 2015; James et al. 2021) or through incorporating astrochemical knowledge (Viti 2017; de Mijolla et al. 2019), the interpretation of molecular lines still remains difficult. Notably, the analysis of emission arising from blended components is particularly challenging. In sub-mm astronomy, the spatial resolution limits of modern tele-" 2312.12651v1,"Toxic Bias: Perspective API Misreads German as More Toxic Gianluca Nogara ∗ Francesco Pierri ∗ Stefano Cresci gianluca.nogara@supsi.ch University of Applied Sciences and Arts of Southern Switzerland Switzerland Politecnico di Milano Italy IIT-CNR Italy Luca Luceri Petter Törnberg Silvia Giordano USC Information Sciences Institute USA University of Amsterdam Netherlands University of Applied Sciences and Arts of Southern Switzerland Switzerland ABSTRACT Proprietary public APIs play a crucial and growing role as research tools among social scientists. Among such APIs, Google’s machine learning-based Perspective API is extensively utilized for assessing the toxicity of social media messages, providing both an important resource for researchers and automatic content moderation. However, this paper exposes an important bias in Perspective API concerning German language text. Through an in-depth examination of several datasets, we uncover intrinsic language biases within the multilingual model of Perspective API. We find that the toxicity assessment of German content produces significantly higher toxicity levels than other languages. This finding is robust across various translations, topics, and data sources, and has significant consequences for both research and moderation strategies that rely on Perspective API. For instance, we show that, on average, four times more tweets and users would be moderated when using the German language compared to their English translation. Our findings point to broader risks associated with the widespread use of proprietary APIs within the computational social sciences. ACM Reference Format: Gianluca Nogara, Francesco Pierri, Stefano Cresci, Luca Luceri, Petter Törnberg, and Silvia Giordano. 2023. Toxic Bias: Perspective API Misreads German as More Toxic. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION In recent years, abusive interactions have become a fixture of the online experience, with approximately 40% of U.S. adults self-reporting as victims of online abuse [1]. The prevalence of such language on social media has become a major concern for both researchers and the public, often under the label of online ""toxicity"". Currently, the leading approach to detecting toxicity is the Perspective API, ∗ These authors contributed equally to this research. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn offered by the Jigsaw unit of Google [2], and designed to ""help mitigate toxicity and ensure healthy dialogue online"" [3]. The API is widely used both within academic research efforts and for content moderation on news and social media platforms. At the time of this writing, there are over 1,400 documents on Google Scholar mentioning the term ""Perspective API"", and the API is used by major platforms such as Reddit, The New York Times, El Pais, and Faceit [4]. Perspective API’s machine learning model is developed through supervised learning, utilizing a vast dataset of millions of comments gathered from diverse online platforms, including forums like Wikipedia and The New York Times, and encompassing more than 20 languages. Perspective API defines toxic messages as texts that use ""rude, disrespectful, or unreasonable language that is likely to make someone leave a discussion"" [5, 6]. The API provides several different toxicity scores: Severe toxicity, Insult, Profanity, Identity attack, Threat, and Sexually explicit. In a 2019 SemEval Task, Perspective API has been shown to perform better than other transformerbased models on canonical datasets for hate speech detection [7]. More recent work found that its scores differ from human labels [6]. The toxicity score, which ranges between 0 and 1, does not have a meaning in absolute terms, and the traditional approach to identify toxic or hateful users in online social platforms involves defining a threshold on the toxicity score, which is generally in the region of 0.5-0.7 [8, 9], above which content is considered to be toxic. While technologies such as Perspective API promise a safer, more respectful digital environment, their effectiveness is contingent on their accuracy and impartiality across diverse languages and cultural contexts. This paper identifies a systemic bias within Perspective API when dealing with German texts, showing a tendency of the tool to assign higher toxicity scores to German content compared to other languages. By leveraging two large-scale datasets of multilingual Twitter conversations and random Wikipedia summaries, we show that toxicity scores for texts in German are consistently significantly higher than those for any other language, regardless of the content. Our findings suggest a strong negative bias against the German language which might be due to artifacts/biases in the training dataset or the model itself, which is challenging to further investigate given the black-box nature of the tool. Our findings not only question the reliability of a tool employed by several large online platforms – potentially leading to unjust censorship or misrepresentation in online spaces – but also aggravate the growing reliance on proprietary, black-boxed APIs like Perspective within" 2312.12659v1,"Expediting Contrastive Language-Image Pretraining via Self-distilled Encoders Bumsoo Kim * , Jinhyung Kim, Yeonsik Jo, Seung Hwan Kim LG AI Research Abstract Recent advances in vision language pretraining (VLP) have been largely attributed to the large-scale data collected from the web. However, uncurated dataset contains weakly correlated image-text pairs, causing data inefficiency. To address the issue, knowledge distillation have been explored at the expense of extra image and text momentum encoders to generate teaching signals for misaligned image-text pairs. In this paper, our goal is to resolve the misalignment problem with an efficient distillation framework. To this end, we propose ECLIPSE: Expediting Contrastive Language-Image Pretraining with Self-distilled Encoders. ECLIPSE features a distinctive distillation architecture wherein a shared text encoder is utilized between an online image encoder and a momentum image encoder. This strategic design choice enables the distillation to operate within a unified projected space of text embedding, resulting in better performance. Based on the unified text embedding space, ECLIPSE compensates for the additional computational cost of the momentum image encoder by expediting the online image encoder. Through our extensive experiments, we validate that there is a sweet spot between expedition and distillation where the partial view from the expedited online image encoder interacts complementarily with the momentum teacher. As a result, ECLIPSE outperforms its counterparts while achieving substantial acceleration in inference speed. Introduction Transformers (Vaswani et al. 2017) have achieved significant progress across various challenging vision tasks such as image classification (Dosovitskiy et al. 2021; Touvron et al. 2021; Jiang et al. 2021; Graham et al. 2021), object detection (Carion et al. 2020), semantic segmentation (Xie et al. 2021; Liu et al. 2021b; Wang et al. 2021) and visual relationship detection (Kim et al. 2021, 2022). Following this success in vision tasks, recent studies demonstrated that large-scale vision-language pretraining (VLP) (Li et al. 2019; Chen et al. 2020c; Huang et al. 2019; Li et al. 2020, 2021b; Lu et al. 2019; Tan and Bansal 2019; Jia et al. 2021; Radford et al. 2021) with ViTs is scalable to large uncurated datasets and transferable to various downstream tasks. * correspondence to: bumsoo.kim@lgresearch.ai Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Time vs. ImageNet zero-shot performance analysis for Contrastive Language-Image Pretraining with existing ViT accleration framework (EViT). We compare the results between EViT directly applied on CLIP and EViT trained with our proposed meta-architecture, ECLIPSE. Our proposed framework enables even streamlined ViTs with 101% faster throughputs to outperform the full ViT of CLIP. Model performance and inference time are measured with ViT-B/16 backbone. However, the large scale image-text pairs for VLP are usually collected from the web; thus they are often noisy, i.e., having weak correlation between the image and its corresponding text description. To alleviate the image-text misalignment problem, previous works (Li et al. 2021a; Lu et al. 2022) have proposed knowledge distillation framework (Hinton et al. 2015) with a momentum encoder for both image and text. However, adopting two additional momentum encoders and calculating soft alignments for distillation loss inevitably increase the computational cost for training, which hinders training for large-scale VLP. In this work, we propose a efficient formulation for distilling soft image-text alignment matrix without text momentum encoder for contrastive language-image pretraining (Jia et al. 2021; Radford et al. 2021). Inspired from Sim- Siam (Chen and He 2021), we simply replace the text momentum encoder with stop-gradient operation. This design not only eliminates the computational cost for an additional text momentum encoder, but also enables the distillation" 2312.12683v1,"Turning English-centric LLMs Into Polyglots: How Much Multilinguality Is Needed? Tannon Kew 1∗ 1 Florian Schottmann 2,3 Rico Sennrich 1,4 University of Zurich, 2 Textshuttle, 3 ETH Zurich, 4 University of Edinburgh {kew,sennrich}@cl.uzh.ch, schottmann@textshuttle.com Abstract The vast majority of today’s large language models are English-centric, having been pretrained predominantly on English text. Yet, in order to meet user expectations, models need to be able to respond appropriately in multiple languages once deployed in downstream applications. Given limited exposure to other languages during pretraining, crosslingual transfer is important for achieving decent performance in non-English settings. In this work, we investigate just how much multilinguality is required during finetuning to elicit strong cross-lingual generalisation across a range of tasks and target languages. We find that, compared to English-only finetuning, multilingual instruction tuning with as few as three languages significantly improves a model’s cross-lingual transfer abilities on generative tasks that assume input/output language agreement, while being of less importance for highly structured tasks. Our code and data is available at https://github.com/ZurichNLP/ multilingual-instruction-tuning. 1 Introduction Conversational instruction tuning is a popular method for aligning large pretrained language models (LLMs) with user expectations such that they can effectively respond to a user’s input query and follow natural language instructions (Ouyang et al., 2022; Wang et al., 2023; Chiang et al., 2023). An implicit expectation of conversational chatbots is that the language of a model’s response should match that of the user’s input query. For instance, unless otherwise specified, a German-language input should result in a German-language output. However, since the vast majority of pretraining and tuning data used to develop these models is in English, many instruction-tuned LLMs struggle to respond consistently in other languages (Touvron ∗ Work partially conducted during an internship at Textshuttle. Figure 1: Input/output (IO) language agreement for English (en), German (de), Bulgarian (bg) and Icelandic (is) when instruction tuning on monolingual English (Mono) or on multilingual data (Multi-Guanaco). Striped bars indicate that the target language is included in the finetuning data. Error bars show a confidence interval of 95%. et al., 2023b; Chen et al., 2023; Ye et al., 2023; Zhang et al., 2023b). Despite this limited exposure, English-centric LLMs such as Llama 2 can achieve near-perfect input/output (IO) language agreement when tuned with relatively few multilingual conversational instructions. Figure 1 depicts IO language agreement, as measured by OpenLID 1 (Burchell et al., 2023) and compares multilingual tuning on the language-diverse Guanaco dataset (Dettmers et al., 2023; Köpf et al., 2023) with monolingual tuning on an English-only subset of instructions. As can be seen, multilingual tuning elicits strong IO language agreement, well within the bounds of language identification error rates, for non-English languages seen to differing degrees during pretraining and finetuning without degrading performance on English. This observation raises two major ques- 1 https://github.com/laurieburchell/ open-lid-dataset" 2312.12722v1,"Fine-Grained Knowledge Selection and Restoration for Non-Exemplar Class Incremental Learning Jiang-Tian Zhai 1 Xialei Liu 1, * Lu Yu 2 Ming-Ming Cheng 1 1 VCIP, CS, Nankai University 2 Tianjin University of Technology jtzhai30@gmail.com, xialei@nankai.edu.cn, luyu@email.tjut.edu.cn, cmm@nankai.edu.cn Abstract Non-exemplar class incremental learning aims to learn both the new and old tasks without accessing any training data from the past. This strict restriction enlarges the difficulty of alleviating catastrophic forgetting since all techniques can only be applied to current task data. Considering this challenge, we propose a novel framework of fine-grained knowledge selection and restoration. The conventional knowledge distillation-based methods place too strict constraints on the network parameters and features to prevent forgetting, which limits the training of new tasks. To loose this constraint, we proposed a novel fine-grained selective patch-level distillation to adaptively balance plasticity and stability. Some taskagnostic patches can be used to preserve the decision boundary of the old task. While some patches containing the important foreground are favorable for learning the new task. Moreover, we employ a task-agnostic mechanism to generate more realistic prototypes of old tasks with the current task sample for reducing classifier bias for fine-grained knowledge restoration. Extensive experiments on CIFAR100, TinyImageNet and ImageNet-Subset demonstrate the effectiveness of our method. Code is available at https://github.com/scok30/ vit-cil. Introduction Deep neural networks have achieved superior performance in many computer vision tasks. Since the real world is open and dynamic, it is important to be capable of learning new knowledge during the application of these networks. Incremental learning aims at learning new tasks without forgetting previous ones, and it is also a crucial characteristic of deep neural networks applied to real-world scenarios. For example, the system of face recognition may meet some faces with masks in recent years, and it is essential to adapt to these new circumstances as well. However, simply finetuning deep neural networks on the new task will cause severe catastrophic forgetting (Robins 1995) since the network almost completely adjusts its parameters to the new task (Goodfellow et al. 2013; McCloskey and Cohen 1989). To address this problem, many recent works (Castro et al. 2018; Douillard et al. 2020; Hou et al. 2019; Liu, Schiele, * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Stability Knowledge distillation CNN Feature map Stability Ours Plasticity … Vision Transformer Patch embedding Background patches Foreground patches Figure 1: Comparison between conventional knowledge distillation (KD) and our patch-level fine-grained knowledge selection method based on vision Transformer architecture. Conventional KD treats the image as a whole, while patch embeddings enable us to strike a better trade-off between stability and plasticity for different local regions. Moreover, a task-agnostic fine-grained prototype restoration is proposed to better replay the old knowledge. and Sun 2021; Rebuffi et al. 2017; Yan, Xie, and He 2021) are proposed to alleviate the catastrophic forgetting problem. In this paper, we consider a challenging task setting of class incremental learning termed non-exemplar class incremental learning (NECIL)(Gao et al. 2022; Zhu et al. 2021a, 2022), that forbids the model to preserve any old task sample while learning sequential tasks with samples from disjoint classes. Compared with normal settings, non-exemplar class incremental learning considers the data privacy issue and storage burden. To address the issue of catastrophic forgetting in this task, researchers have introduced various approaches aimed at preserving acquired knowledge without the need of past data. Early work like LwF (Li and Hoiem 2017) introduces vanilla knowledge distillation between the old and current model and does not perform well under this challenging setting. Some replay-based methods usually narrow the gap by generating synthetic images. While the effectiveness of incremental learning can be influenced by the quality of the generated images. Recently, DeepInversion (Yin et al. 2020) proposes to invert the trained networks from random noise" 2312.12726v1,"Reducing Shape-Radiance Ambiguity in Radiance Fields with a Closed-Form Color Estimation Method 1 Qihang Fang 1,2,* Yafei Song 3,* Keqiang Li 1,2 Liefeng Bo 3 State Key Laboratory of Multimodal Artificial Intelligence Systems, Institute of Automation, Chinese Academy of Sciences 2 School of Artificial Intelligence, University of Chinese Academy of Sciences 3 Alibaba Group 1,2 {fangqihang2020,likeqiang2020}@ia.ac.cn 3 {huaizhang.syf,liefeng.bo}@alibaba-inc.com Abstract Neural radiance field (NeRF) enables the synthesis of cutting-edge realistic novel view images of a 3D scene. It includes density and color fields to model the shape and radiance of a scene, respectively. Supervised by the photometric loss in an end-to-end training manner, NeRF inherently suffers from the shape-radiance ambiguity problem, i.e., it can perfectly fit training views but does not guarantee decoupling the two fields correctly. To deal with this issue, existing works have incorporated prior knowledge to provide an independent supervision signal for the density field, including total variation loss, sparsity loss, distortion loss, etc. These losses are based on general assumptions about the density field, e.g., it should be smooth, sparse, or compact, which are not adaptive to a specific scene. In this paper, we propose a more adaptive method to reduce the shape-radiance ambiguity. The key is a rendering method that is only based on the density field. Specifically, we first estimate the color field based on the density field and posed images in a closed form. Then NeRF’s rendering process can proceed. We address the problems in estimating the color field, including occlusion and nonuniformly distributed views. Afterward, it is applied to regularize NeRF’s density field. As our regularization is guided by photometric loss, it is more adaptive compared to existing ones. Experimental results show that our method improves the density field of NeRF both qualitatively and quantitatively. Our code is available at https://github.com/qihangGH/Closed-form-color-field. 1 Introduction Neural radiance field (NeRF) [20, 4, 23, 8, 32] is a cutting-edge technique in computer graphics and computer vision that enables the synthesis of realistic novel view images of a 3D scene from a collection of posed 2D images. It represents a 3D scene with a density and a color field, which describe the scene’s shape and radiance, respectively. Despite its impressive novel-view synthesis capability, the NeRF suffers from an inherent shape-radiance ambiguity problem [33]. To be more specific, a family of degradation solutions exist, which can perfectly recover training views but produce incorrect shape. As a consequence, poor novel views would be rendered. The shape-radiance ambiguity exists because a NeRF-based method usually renders an image using the Max volume rendering algorithm [17]. It integrates the density and color fields closely. As shown in Fig. 1(a), a pixel is rendered as the sum of products of density and color values. In general, such a rendering process is supervised by the photometric loss in an end-to-end training manner, where the * Both authors contributed equally to this work. This work has been published in NeurIPS 2023." 2312.12727v1,"Black Content Creators’ Responses and Resistance Strategies on TikTok Gianna Williams Northeastern University, Khoury College of Computer Sciences Boston, MA, USA williams.gia@norhteastern.edu Abstract 1 Social media wields a profound influence on social and economic dynamics worldwide [12]. With Content Creation, people on social media began to forge a livelihood through their online presence through creative labor. This surge in social media Content Creators significantly shaped the trends and cultural landscape of the internet. While many of the social media trends we observe today can be attributed to the creative contributions of Black Content Creators [17], digital platforms routinely marginalize and undermine these creators through algorithmic recommendation systems that produce systemic bias against Black and Brown people [9]. To address this problem, we conducted a content analysis to assess how algorithms specifically illicit harassment, interact, and unfairly target Black Content Creators. Social Media has grown over the past ten years. TikTok dates back to the early 2000s with MySpace to now 2023 with TikTok. Tiktok became popular in 2019 when Chinese ByteDance acquired the popular dance company muscia.ly . During the 2020 pandemic, Tiktok allowed people to quarantine to cope with COVID-19. Content Creators would make videos within various genres, including dance, makeup, cooking, comedy, etc. This app gave users a way to escape realworld tragedies. The term “content creator” rose in influence in 2021. A content creator can be “ someone who creates entertaining or educational material to be expressed through any medium or channel” [5]. With TikTok, content creators are promoted as people who can brand themselves for monetary gain. In 2020, Tiktok created the “Creator Fund”. The creator fund was implemented for eligible users with a large following of 10k or above and 100k views per video. To some followers, this goal is easy, and to others, many have started to gamify their experiences by creating folk theories to develop a large following and gain more interactivity. [11] Content creators are from many different geographic and demographic backgrounds and develop various types of content. As content creation has increased in popularity as a career, many creators rely on the obscure algorithms and regulations of video-sharing social media platforms. These opaque algorithms power these platforms and their followers’ engagement to maintain relevance on the platform. More specifically, marginalized peoples have experienced inequities in the creator economy [7, 20, 23, 25, 26, 29]. These challenges include a heightened risk of experiencing harassment and aggressive content moderation [18, 24] unequal pay [8, 19], and a lack of opportunities to grow their content. These issues are part of a more significant phenomenon of unequal treatment of marginalized groups by technological systems, from algorithm biases making unfair and inaccurate predictions and classification for marginalized groups [2, 11, 13], to racism and bigotry on social media, causing these groups to experience heightened harassment, abuse, and mistreatment. Black content creators must work around these challenges to succeed in the creator economy. Black Content Creators, in particular, have complained about their experiences on the TikTok platform. Researchers are starting to study this phenomenon through interview studies focused on content creators trying to make a living online. To explore how Black CCS Concepts: • Human-centered computing → Empirical studies in collaborative and social computing; • Do Not Use This Code → Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper. Keywords: Do, Not, Us, This, Code, Put, the, Correct, Terms, for, Your, Paper ACM Reference Format: Gianna Williams. 2018. Black Content Creators’ Responses and Resistance Strategies on TikTok . In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 8 pages. https: //doi.org/XXXXXXX.XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-XXXX-X/18/06 https://doi.org/XXXXXXX.XXXXXXX Introduction" 2312.12729v1,"SEGMENT ANYTHING MODEL MEETS IMAGE HARMONIZATION Haoxing Chen 1 , Yaohui Li 2 , Zhangxuan Gu 1 , Zhuoer Xu 1 ,Jun Lan 1 , Huaxiong Li 2 1 Ant Group, 2 Nanjing University hx.chen@hotmail.com ABSTRACT Image harmonization is a crucial technique in image composition that aims to seamlessly match the background by adjusting the foreground of composite images. Current methods adopt either global-level or pixel-level feature matching. Global-level feature matching ignores the proximity prior, treating foreground and background as separate entities. On the other hand, pixel-level feature matching loses contextual information. Therefore, it is necessary to use the information from semantic maps that describe different objects to guide harmonization. In this paper, we propose Semantic-guided Region-aware Instance Normalization (SRIN) that can utilize the semantic segmentation maps output by a pre-trained Segment Anything Model (SAM) to guide the visual consistency learning of foreground and background features. Abundant experiments demonstrate the superiority of our method for image harmonization over state-of-the-art methods. Index Terms— Image harmonization, segment anything, instance normalization 1. INTRODUCTION Composite Image synthesis [1, 2] aims to synthesize foreground objects from one image into another image to produce realistic, visually consistent synthesized images. However, due to differences in lighting, climate, and capture devices, the foreground and background in a synthesized image may have inconsistent appearances. To address this challenge, image harmonization methods [3, 4, 5, 6, 7] ensure the compatibility of foreground objects with the background by adjusting their appearance. While traditional image harmonization methods [3] are mainly based on low-level color and statistical illumination information, the development of deep learning techniques has made deep image harmonization methods mainstream and achieve better results [4, 5, 6, 7]. Existing methods can be roughly categorized into two types: local translation and region matching. The former employs an encoder-decoder framework to learn pixel-to-pixel translation [8, 9]. However, due to the limitation of shallow neural networks in capturing a limited amount of background, the available background reference for harmonizing the foreground is insufficient. The latter region matching methods treat foreground and GT BAIN Ours Fig. 1. In the top figure, we compare parameter size and performance between our method and other state-of-the-art methods. In the bottom figure, our method produces a more photorealistic harmonized result. background as two distinct style regions. They address the harmonization problem as a matching problem by aligning statistical features or using discriminators on these two regions. Although these methods harmonize images with finer pixel-level features, they completely disregard spatial variations within the two regions. In fact, not all pixels in the background contribute to the harmonization of the foreground, and pixel-level matching may result in the loss of contextual information. To solve this problem, we rethink the essential semantic priors in image harmonization, i.e., when we paste an object into a background, the color or lighting should be semanti-" 2312.12732v1,"— Strassen’s Matrix Multiplication Algorithm Is Still Faster PAOLO D’ALBERTO, AMD Recently, reinforcement algorithms discovered new algorithms that really jump-started a wave of excitements and a flourishing of publications. However, there is little on implementations, applications, and, especially, no absolute performance and, we show here they are not here to replace Strassen’s original fast matrix multiplication yet. We present Matrix Flow, this is a simple Python project for the automatic formulation, design, implementation, code generation, and execution of fast matrix multiplication algorithms for CPUs, using BLAS interface GPUs, and in the future other accelerators. We shall not play with module-2 (Z 2 ) algorithms and, for simplicity, we present only square double-precision matrices. By means of factorizing the operand matrices we can express many algorithms and prove them correct. These algorithms are represented by Data Flows and matrix data partitions: a Directed Acyclic Graph. We show that Strassen’s original algorithm is still the top choice even for modern GPUs. We also address error analysis in double precision, because integer computations are correct, always. ACM Reference Format: Paolo D’Alberto. 2023. Strassen’s Matrix Multiplication Algorithm Is Still Faster. J. ACM –, –, Article — (March 2023), 8 pages. 1 INTRODUCTION In the literature, there are quite a few algorithms for fast matrix multiplication already. For example, we used to have a few pages of references showing the rich literature. Now institutions and companies are actually stepping in and providing a complete list. Although the list of algorithms is long, the list of implementations for old and new architectures is limited in absolute terms. Here and always, we are interested in the computation with matrices, not a single elements or scalar arithmetic, and we compare the trade between matrix multiplications for pre and post matrix additions. This is important when we translate fast algorithms into practical implementations. The temporary spaces required is also an interesting aspect of the algorithm performance. The researchers at DeepMind presented a new methodology to find new and faster matrix multiplications [1]. They provide the algorithms in matrix forms and, easily, we can generate, and execute element-wise algorithms. There are new algorithms and the authors show the relative advantage performance with respect to the classic matrix multiplication for GPUs and TPUs (using XLA). Here, we show that Strassen’s algorithm [2] is still king of the hill. We explore a comparison across several algorithms using the standard arithmetic: double precision matrices and no Z 2 modular arithmetic because it is the default in Python. Half, single and double precision, single and double complex, and also integer 8-bit can be deployed when the BLAS interface defines it for an architecture. In this scenario, we can determine a priori the relative advantages of all algorithms (i.e., 7% improvement per recursion). More interesting, we can show that deeper algorithms such as the one recently discovered do not have all the advantages when other constraints are present. Author’s address: Paolo D’Alberto, , AMD, 2100 Logic Dr, San Jose, California, 95124. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. 0004-5411/2023/3-ART— $15.00 https://doi.org/ J. ACM, Vol. –, No. –, Article —. Publication date: March 2023." 2312.12737v1,"FSscore: A Machine Learning-based Synthetic Feasibility Score Leveraging Human Expertise Rebecca M. Neeser 12 Bruno Correia 2 Philippe Schwaller 13 Laboratory of Artificial Chemical Intelligence (LIAC), EPFL, Switzerland 2 Laboratory of Protein Design and Immunoengineering (LPDI), EPFL, Switzerland 3 National Centre of Competence in Research (NCCR) Catalysis, EPFL, Switzerland {rebecca.neeser,bruno.correia,philippe.schwaller}@epfl.ch 1 Abstract Determining whether a molecule can be synthesized is crucial for many aspects of chemistry and drug discovery, allowing prioritization of experimental work and ranking molecules in de novo design tasks. Existing scoring approaches to assess synthetic feasibility struggle to extrapolate to out-of-distribution chemical spaces or fail to discriminate based on minor differences such as chirality that might be obvious to trained chemists. This work aims to address these limitations by introducing the Focused Synthesizability score (FSscore), which learns to rank structures based on binary preferences using a graph attention network. First, a baseline trained on an extensive set of reactant-product pairs is established that subsequently is fine-tuned with expert human feedback on a chemical space of interest. Fine-tuning on focused datasets improves performance on these chemical scopes over the pre-trained model exhibiting moderate performance and generalizability. This enables distinguishing hard- from easy-to-synthesize molecules and improving the synthetic accessibility of generative model outputs. On very complex scopes with limited labels achieving satisfactory gains remains challenging. The FSscore showcases how human expert feedback can be utilized to optimize the assessment of synthetic feasibility for a variety of applications. 1 Introduction The ability to assess the synthetic feasibility of a small molecule is of great importance in many different areas of chemistry, notably in early drug discovery stages. Trained chemists traditionally perform this task through intuition or retrosynthetic analysis, allowing them to decide, which molecules are likely possible to synthesize and prioritize based on synthetic complexity. However, the chemical space that might be accessible is massive, and only a small fraction has been explored. [1, 2] Furthermore, computational approaches such as virtual screening (VS) [3] in drug discovery or the recent surge of generative methods for de novo molecular design [4–14] emphasize the requirement for suitable tools to score synthetic feasibility quickly in an automated fashion. [15, 16]. Currently, available scores work well at discriminating feasible from unfeasible molecules in the data distribution that they were designed for but often fail to generalize. This is especially true for machine learning (ML) based scores that are unable to capture such an abstract concept as synthesizability and fail to perform well on out-of-distribution data, especially when applied in the context of generative models. [15, 17–19] However, exploring new chemical space is of great interest specifically in the context of de novo design or new drug modalities such as synthetic macrocycles or proteolysis targeting chimeras (PROTACs). On the other hand, synthetic feasibility cannot be merely captured by the structure as it also depends on a chemist’s available resources and expertise. [20] Thus, incorporating human preference would greatly improve the practical utility of such a score. [21] Preprint. Under review." 2312.12757v1,"Local momentum balance in electromagnetic gyrokinetic systems Local momentum balance in electromagnetic gyrokinetic systems H. Sugama 1, 2, a) 1) National Institute for Fusion Science, Toki 509-5292, Japan 2) Department of Advanced Energy, University of Tokyo, Kashiwa 277-8561, Japan (Dated: 21 December 2023) The Eulerian variational formulation is presented to obtain governing equations of the electromagnetic turbulent gyrokinetic system. A local momentum balance in the system is derived from the invariance of the Lagrangian of the system under an arbitrary spatial coordinate transformation by extending the previous work [H. Sugama et al., Phys. Plasmas 28, 022312 (2021)]. Polarization and magnetization due to finite gyroradii and electromagnetic microturbulence are correctly described by the gyrokinetic Poisson equation and Ampère’s law which are derived from the variational principle. Also shown is how the momentum balance is influenced by including collisions and external sources. Momentum transport due to collisions and turbulence is represented by a symmetric pressure tensor which originates in a variational derivative of the Lagrangian with respect to the metric tensor. The relations of the axisymmetry and quasi-axisymmetry of the toroidal background magnetic field to a conservation form of the local momentum balance equation are clarified. In addition, an ensemble-averaged total momentum balance equation is shown to take the conservation form even in the background field with no symmetry when a constraint condition representing the macroscopic Ampère’s law is imposed on the background field. Using the WKB representation, the ensemble-averaged pressure tensor due to the microturbulence is expressed in detail and it is verified to reproduce the toroidal momentum transport derived in previous works for axisymmetric systems. The local momentum balance equation and the pressure tensor obtained in this work present a useful reference for elaborate gyrokinetic simulation studies of momentum transport processes. I. INTRODUCTION Gyrokinetics 1–7 is a powerful theoretical framework based on which a large number of analytical and numerical studies on microinstabilities and turbulent processes in magnetized plasmas 8 have been done. The original (or classical) gyrokinetic theory 1–3,9 adopts the WKB approximation (or ballooning representation) 10 and treats the perturbed parts of particle distribution functions and electromagnetic fields with gyroradius-scale perpendicular wavelengths. This type of gyrokinetic theory is widely employed as the basic model for local flux-tube gyrokinetic simulations 11–15 to evaluate turbulent particle and heat fluxes. The other type of (or modern) gyrokinetic theory uses the Lie transformation method 16 to obtain gyrocenter coordinates which obey the Lagrangian and/or Hamiltonian dynamics derived from the variational formulation. 4,5 The modern theory guarantees favorable conservation properties 17–22 of gyrokinetic equations for total distribution functions (including both background and fluctuation parts), which are generally used for long-time global gyrokinetic simulations. 23–30 It is also noted here that classical gyrokinetic equations are shown to be consistently derived from modern ones by properly taking account of different phasespace coordinate systems used in the two type of theories. 31 Over the years, momentum transport processes have been attracting much attention because they determine profiles of plasma flows such as background plasma rotations and E × B zonal flows, which are regarded as important factors for stabilizing or regulating instabilities and improving plasma confinement. 32 Also, there are a lot of activities in designing advanced magnetic configurations such as toroidal systems with quasi-symmetry, 33–36 in which reduction of neoclassical a) Corresponding author: sugama.hideo@nifs.ac.jp transport and increase of plasma flows are expected. In the present paper, local momentum balance equations which describe the momentum transport processes in electromagnetic gyrokinetic turbulence are derived by extending the previous work 37 on the momentum balance in electrostatic turbulence based on the Eulerian variational formulation, 38 which is also called the Euler-Poincaré reduction procedure. 39–44 In conventional studies, momentum balance equations are obtained by taking the first-order velocity-space moment of a kinetic equation or from a variation in an action integral of the Lagrangian under infinitesimal translation or rotation. In the former derivation, it is unclear how the momentum balance in the direction perpendicular to the background magnetic field can be obtained from the gyrokinetic equation in the gyrophase-averaged form. In the latter, Noether’s theorem can be applied to connect the symmetry condition of the system directly with the canonical momentum conservation equation, in which, however, local momentum transport is represented by the asymmetric canonical pressure tensor because of the vector potential included in the canonical momentum. In this work as well as in the previous works, 37,44 the invariance of the Lagrangian under arbitrary infinitesimal transformations of general spatial coordinates is used to derive the local momentum balance equation which contains the symmetric pressure tensor obtained by taking the variational derivatives of the Lagrangian with respect to the 3 × 3 metric tensor components. This is analogous to the derivation of energy-momentum conservation laws from the invariance of an action integral under arbitrary transformations of spatiotemporal coordinates in the theory of general relativity. 45 The relations of the symmetry and quasi-symmetry properties of the background magnetic field to the momentum balance equation are investigated with the help of the symmetric pressure tensor. In addition, the effects of collisions and/or external momentum sources can be easily included in the local momentum balance equation, by which both collisional 46–48" 2312.12771v1,"Variational formulation and monolithic solution of computational homogenization methods. Christian Hesch a∗ , Felix Schmidt a , Stefan Schuß a a Chair of Computational Mechanics, University of Siegen, Germany Abstract In this contribution, we derive a consistent variational formulation for computational homogenization methods and show that traditional FE 2 and IGA 2 approaches are special discretization and solution techniques of this most general framework. This allows us to enhance dramatically the numerical analysis as well as the solution of the arising algebraic system. In particular, we expand the dimension of the continuous system, discretize the higher dimensional problem consistently and apply afterwards a discrete null-space matrix to remove the additional dimensions. A benchmark problem, for which we can obtain an analytical solution, demonstrates the superiority of the chosen approach aiming to reduce the immense computational costs of traditional FE 2 and IGA 2 formulations to a fraction of the original requirements. Finally, we demonstrate a further reduction of the computational costs for the solution of general non-linear problems. Keywords: Variational, multiscale, linearisation, FE 2 , IGA 2 , representative volume element, computational homogenization, null-space. 1 Introduction Complex materials with dedicated morphological features like fibers or additive manufactured microstructures are nowadays used throughout the industry. To obtain a suitable model, continuum mechanical or thermomechanical formulations are often used based on infinitesimal strain measures. Obviously, every possible finite inhomogeneity can be resolved by an infinitesimal model, however, the computational costs of such a large scale approximative solution may economically not affordable or in certain cases technically not possible. Additionally, a material may appear perfectly homogeneous on the considered scale of approximations, whereas the microstructural information has been lost and often we are only interested in the macroscale solution. Therefore, two different approaches are common to include this information. First, the microstructure can be taken into account in a phenomenological way. The resulting constitutive relations can also incorporate size effects, leading to generalized theories for materials, see [14, 1, 2] for a general overview of gradient extended continua. In contrast, microstructural information about morphology and material properties can be accounted for in a more explicit manner by means of homogenization methods, assuming that the scales ∗ Corresponding author. E-mail address: christian.hesch@uni-siegen.de 1" 2312.12776v1,"Computational homogenization of phase-field fracture. Felix Schmidt a , Stefan Schuß a and Christian Hesch a∗ a Chair of Computational Mechanics, University of Siegen, Germany Abstract Abstract. In this contribution we investigate the application of phase-field fracture models on non-linear multiscale computational homogenization schemes. In particular, we introduce different phase-fields on a two-scale problem and develop a thermodynamically consistent model. This allows on the one hand for the prediction of local micro-fracture patterns, which effectively acts as an anisotropic damage model on the macroscale. On the other and, the macro-fracture phase-field model allows to predict complex fracture pattern with regard to local microstructures. Both phase-fields are introduced in a common framework, such that a joint consistent linearization for the Newton-Raphson iteration can be developed. Finally, the limits of both models as well as the applicability are shown in different numerical examples. Keywords: Hallo, Welt. 1 Introduction The prediction of the overall mechanical response of materials with dedicated microstructures including various failure mechanisms require direct numerical simulations. However, fully resolved microstructures may lead to economically or technically unsustainable computational costs. Therefore, it is convenient to apply computational homogenization techniques, assuming that the material may appear perfectly homogeneous on a higher, macroscale and highly heterogeneous at a lower, microscale. To be more specific, we assume that the scale separation is valid, i.e. that the wavelengths of physical fields at the higher scale are very much larger than the dimensions of heterogeneities at the lower scale, see [33]. To take microstructural information about the morphology and material properties into account, various homogenization methods have been introduced, with focus here on computational homogenization like FE 2 and IGA 2 . In the context of first-order homogenization schemes, we refer to [20, 14, 21, 30, 39] for fundamental analytical approaches and to [36, 28, 10, 23] for seminal contributions to two-scale finite-element (FE) simulations. In the context of higher-order and generalized continua, analytical approaches have been explored by [5, 12, 3, 9], whereas a general framework for a numerical two-scale analysis using materials up to the third order has been introduced in Schmidt et al. [34]. ∗ Corresponding author. E-mail address: christian.hesch@uni-siegen.de 1" 2312.12789v1,"SLP-Net:An efficient lightweight network for segmentation of skin lesions Bo Yang a , Hong Peng a , Chenggang Guo a , Xiaohui Luo a,∗ , Jun Wang b , Xianzhong Long c a School of Computer and Software Engineering, Xihua University, Chengdu, 610039, Sichuan, China b School of Electrical Engineering and Electronic Information, Xihua University, Chengdu, 610039, Sichuan, China c School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, 210023, Jiangshu, China Abstract Prompt treatment for melanoma is crucial. To assist physicians in identifying lesion areas precisely in a quick manner, we propose a novel skin lesion segmentation technique namely SLP-Net, an ultra-lightweight segmentation network based on the spiking neural P(SNP) systems type mechanism. Most existing convolutional neural networks achieve high segmentation accuracy while neglecting the high hardware cost. SLP-Net, on the contrary, has a very small number of parameters and a high computation speed. We design a lightweight multi-scale feature extractor without the usual encoder-decoder structure. Rather than a decoder, a feature adaptation module is designed to replace it and implement multi-scale information decoding. Experiments at the ISIC2018 challenge demonstrate that the proposed model has the highest Acc and DSC among the state-of-the-art methods, while experiments on the PH2 dataset also demonstrate a favorable generalization ability. Finally, we compare the computational complexity as well as the computational speed of the models in experiments, where SLP-Net has the highest overall superiority. ⋆ We have submitted this paper to Elsevier in March 2023 and it may be published later on. This work was partially supported by the National Natural Science Foundation of China (No. 62076206 ane No. 62176216), and Research Fund of Sichuan Science and Technology Project(No. 2022ZYD0115), China. ∗ Corresponding author Email address: xhluo_xhu@foxmail.com (Xiaohui Luo) Preprint submitted to Elsevier December 21, 2023" 2312.12801v1,"Airborne Ouzo: Evaporation-induced emulsification and phase separation dynamics of ternary droplets in acoustic levitation Misaki Mitsuno 1 (光野 海祥) and Koji Hasegawa 2,a) (長谷川 浩司) 1 Graduate School of Engineering, Kogakuin University, Tokyo, 163-8677, Japan. 2 Department of Mechanical Engineering, Kogakuin University, Tokyo 163-8677, Japan ABSTRACT We experimentally investigated the evaporation dynamics of acoustically levitated Ouzo droplets (a mixture of ethanol, water, and anise oil). Acoustic levitation has gained significant attention in various fields due to its potential to create a lab-in-a-drop. Although evaporation is a key process in nature and industry, many studies have focused on single and binary components, and ternary droplets in acoustic levitation have rarely been experimentally investigated. In this study, the evaporation-induced spontaneous emulsification (the Ouzo effect) and phase separation process at 40-90 vol% ethanol was visualized. We estimated the concentration change by evaporation of each component in the levitated ternary droplets based on the evaporation model to identify the experimental results. Our experimental results revealed four distinct stages of evaporation in levitated Ouzo droplets: (1) preferential evaporation of the volatile component (ethanol), (2) spontaneous emulsification (myriad micro-oil droplets generation), (3) phase separation forming a core-shell droplet, and (4) water evaporation completion resulting in remaining an oil droplet. Finally, we analyzed the emulsification process by a spacetime diagram. These findings suggest that acoustic levitation is suitable for physicochemical manipulation in mid-air. _____________________________ a) Authors to whom correspondence should be addressed: Electronic mail: kojihasegawa@cc.kogakuin.ac.jp 1" 2312.12806v1,"MedBench: A Large-Scale Chinese Benchmark for Evaluating Medical Large Language Models Yan Cai 1 , Linlin Wang 1,2 * , Ye Wang 1 , Gerard de Melo 3,4 , Ya Zhang 2,5 , Yanfeng Wang 2,5 , Liang He 1 1 East China Normal University Shanghai Artificial Intelligence Laboratory 3 Hasso Plattner Institute 4 University of Potsdam 5 Cooperative Medianet Innovation Center, Shanghai Jiao Tong University {51255901104,yewang}@stu.ecnu.edu.cn, {llwang,lhe}@cs.ecnu.edu.cn, gdm@demelo.org, {ya zhang,wangyanfeng}@sjtu.edu.cn Abstract * Corresponding author. USA Introduction The advent of large language models (LLMs) has demonstrated substantial potential for diverse real-world applications, thanks to their remarkable language understanding capabilities. In the medical domain, a notable number of Chinese medical LLMs have successively emerged, including HuaTuo (Wang et al. 2023), ChatMed (Zhu and Wang 2023), BianQue (Chen et al. 2023), Sunsimiao (Xin Yan 2023), and DoctorGLM (Xiong et al. 2023), to better assist doctors in diverse tasks ranging from clinical diagnosis to disease prevention (Singhal et al. 2023a). This underscores an urgent need for a standardized medical benchmark, capable of offering reliable and authoritative evaluations for such LLMs. Japan The emergence of various medical large language models (LLMs) in the medical domain has highlighted the need for unified evaluation standards, as manual evaluation of LLMs proves to be time-consuming and labor-intensive. To address this issue, we introduce MedBench, a comprehensive benchmark for the Chinese medical domain, comprising 40,041 questions sourced from authentic examination exercises and medical reports of diverse branches of medicine. In particular, this benchmark is composed of four key components: the Chinese Medical Licensing Examination, the Resident Standardization Training Examination, the Doctor In-Charge Qualification Examination, and real-world clinic cases encompassing examinations, diagnoses, and treatments. MedBench replicates the educational progression and clinical practice experiences of doctors in Mainland China, thereby establishing itself as a credible benchmark for assessing the mastery of knowledge and reasoning abilities in medical language learning models. We perform extensive experiments and conduct an in-depth analysis from diverse perspectives, which culminate in the following findings: (1) Chinese medical LLMs underperform on this benchmark, highlighting the need for significant advances in clinical knowledge and diagnostic precision. (2) Several general-domain LLMs surprisingly possess considerable medical knowledge. These findings elucidate both the capabilities and limitations of LLMs within the context of MedBench, with the ultimate goal of aiding the medical research community. Ours 2 CNMLE (Chinese Medical Licensing Exam) Medical School Resident Doctor in-charge Real-world Standardization Medical Qualification Training Exam Diagnosis Exam Residency Doctor in-charge Real-world Case NMPQE (Medical Licensing Exam) Medical School USMLE foundation sciences Medical School Residency USMLE clinical knowledge USMLE generalist medical practice Residency Figure 1: Comparison of procedures in different countries. Assessing the potential and inherent limitations of medical LLMs from diverse perspectives continues to present considerable challenges (Singhal et al. 2023a; Chang et al. 2023). The primary cause of this issue lies in the pronounced discrepancy between the existing benchmarks and the practical realities of medicine, leading to an urgent need for advances in evaluation standards. Widely used medical benchmarks such as MedQA (Jin et al. 2021) and MedMCQA (Pal, Umapathi, and Sankarasubbu 2022) typically encompass publicly available medical question-answering datasets gathered from textbooks, research papers, and board exams. However, in light of recent research employing these open-access datasets for model training (Han et al. 2023), a process potentially resulting in data contamination with regard to the evaluation (Nori et al. 2023), it is increasingly clear that the prevailing benchmarks exhibit considerable limitations. A recent study has made advances by introducing a human evaluation framework along with MultiMedQA (Singhal et al. 2023a), a multi-faceted benchmark that combines existing QA datasets with a novel set of online medical questions. Nonetheless, given the disparities among typologically diverse languages, we are unable to rely on this benchmark for assessing Chinese large language models, in particular considering the unique clinical standards and procedures across different countries illustrated in Figure 1. Hence, several Chinese benchmarks have been proposed, including a medical NLP-task oriented one 1 and others 1 https://github.com/michael-wzhu/PromptCBLUE" 2312.12817v1,"Research on the Development of Blockchain-based Distributed Intelligent Healthcare Industry: A Policy Analysis Perspective 1st Yang Yue Institute of Science Studies and S&T Management Dalian University of Technology Dalian, China ysynemo@mail.edu.dlut.ed.cn Abstract—As a pivotal innovation in digital infrastructure, blockchain ledger technology catalyzes the development of nascent business paradigms and applications globally. Utilizing Rothwell and Zegveld's taxonomy of twelve innovation policy tools, this study offers a nuanced comparison of domestic blockchain policies, dissecting supply, environment, and demand-driven policy dimensions to distill prevailing strategic orientations towards blockchain healthcare adoption. The findings indicate that blockchain technology has seen rapid growth in the healthcare industry. However, a certain misalignment exists between the corporate and policy layers in terms of supply and demand. While companies focus more on technological applications, existing policies are geared towards regulations and governance. Government emphasis lies on legal supervision through environmental policies, aiming to guide the standardization and regulation of blockchain technology. This maintains a balance between encouraging innovation and market and legal regulatory order, thereby providing a reference for the development of the distributed intelligent healthcare industry in our country. Keywords—Blockchain, Blockchain Healthcare, Distributed Intelligent, Healthcare Industry, Policy Analysis, Innovation Networks I. I NTRODUCTION Influenced by the COVID-19 pandemic, future industrial development strategies and planning have once again become the subject of widespread discussion[1]. The global industrial landscape is shifting from hyper-globalism to hyper-nationalism, with particular emphasis on the critical role of healthcare industries in pandemic management and control[2]. The question of how nations, industries, and enterprises can leverage this global industrial inflection point to create competitive advantage and sustain high-value, high-tech economic growth deserves in-depth consideration. Owing to advances in precision medicine, the healthcare sector is experiencing rapid growth. In public health management, user-centric healthcare, and the fight against counterfeit drugs, blockchain technology is revolutionizing the industry. The integration blockchain with advances in healthcare and information technology has become a significant trend, especially in healthcare, medical research, and insurance sectors. The healthcare industry faces numerous challenges, notably its complex management system encompassing multiple 2nd Joseph Z. Shyu Institute of Science Studies and S&T Management Dalian University of Technology Dalian, China joseph@cc.nctu.edu.tw stakeholders: doctors, researchers, practitioners, support staff, administrators, and patients. Patient data categorization and management pose substantial challenges in data storage and exchange, further complicated by varying data structures and workflows across different healthcare domains. This lack of effective exchange of healthcare-related information between these domains constitutes a significant barrier. To address these trust-related issues, current researchers and policymakers are turning to blockchain technology. In domestic policy, blockchain technology is included in the Thirteenth Five- Year Plan. China's healthcare system is well prepared for the development of healthcare blockchain; it has a relatively high level of electronic medical data, with 79% in drug management and 13% in patient visit information. With an average of 42 mobile network users per 100 people, the foundational conditions are strong. Blockchain technology in the healthcare industry is being recognized as the next significant opportunity. It is noteworthy that the core competitive advantage of industrial development stems from the support of national policies and regulations, as well as comprehensive planning of industrial structures and enterprise core resources. During the ""Fourteenth Five-Year"" period, the basic strategy will focus on the ""dual circulation"" model that leverages China's domestic economic cycle while enhancing it through the Belt and Road Initiative. This aims to counter the impacts of a comprehensive decoupling from the United States and various uncertainties in the postpandemic era. The further advancement of new infrastructure technologies, including AI, 5G, blockchain, big data, will promote balanced development in China’s ""Five-in-One"" system (economy, society, politics, culture, and ecology)[3]. President Xi Jinping explicitly pointed out in October 2019 that blockchain should be viewed as a crucial technological breakthrough for autonomous innovation, calling for targeted efforts and increased investment to master key technologies and accelerate both blockchain technology and industrial innovation. His remarks provided a clear direction for the future development of China's intelligent industries, as well as a significant strategic blueprint for the future layout of decentralized smart healthcare[4]. Blockchain technology was mentioned for the first time in the State Council's 2016 National Informatization Plan, being included in the conceptual framework for restructuring shared healthcare models." 2312.12836v1,"Questions of flavor physics and neutrino mass from a flipped hypercharge Duong Van Loi ∗ and Phung Van Dong † Phenikaa Institute for Advanced Study and Faculty of Basic Science, Phenikaa University, Yen Nghia, Ha Dong, Hanoi 100000, Vietnam N. T. Duy ‡ Institute of Physics, Vietnam Academy of Science and Technology, 10 Dao Tan, Ba Dinh, Hanoi 100000, Vietnam Nguyen Huy Thao § Department of Physics, Hanoi Pedagogical University 2, Phuc Yen, Vinh Phuc, Vietnam (Dated: December 21, 2023) The flavor structure of quarks and leptons is not yet fully understood, but it hints a more fundamental theory of non-universal generations. We therefore propose a simple extension of the Standard Model by flipping (i.e., enlarging) the hypercharge U (1) Y to U (1) X ⊗ U (1) N for which both X and N depend on generations of both quark and lepton. By anomaly cancellation, this extension not only explains the existence of just three fermion generations as observed but also requires the presence of a right-handed neutrino per generation, which motivates seesaw neutrino mass generation. Furthermore, in its minimal version with a scalar doublet and two scalar singlets, the model naturally generates the measured fermion-mixing matrices while it successfully accommodates several flavor anomalies observed in the neutral meson mixings, B-meson decays, lepton-flavor-violating decays of charged leptons, as well as satisfying constraints from particle colliders. ∗ loi.duongvan@phenikaa-uni.edu.vn (corresponding author) † dong.phungvan@phenikaa-uni.edu.vn ‡ ntduy@iop.vast.vn § nguyenhuythao@hpu2.edu.vn" 2312.12845v1,"On spectrum and Laplacian spectrum of some variant of Corona of regular signed graph under r-orientation Satyam Guragain ∗1 , Ravi Srivastava †2 , and Bishal Sonar ‡3 1,2,3 Department of Mathematics, National Institute of Technology Sikkim, South Sikkim 737139, India Abstract We introduce reverse orientation (r-orientation) in order to define edge corona product, subdivision vertex and subdivision edge neighbourhood corona of signed graphs. The structural properties along with the characteristic polynomial of adjacency matrix, Laplacian matrices (signed and signless) and normalized Laplacian matrix of these variants of corona product under r-orientation is obtained using the concept of signed coronal. Further we analyze and deduce some propositions regarding spectrum of adjacency matrix and Laplacian matrices for the above variants of corona product of regular signed graph and co-regular signed graph (and signed star). MSC 2020 Classifications: 05C22, 05C50, 05C76 Keywords: r-orientation, Laplacian and Normalized Laplacian matrix, Edge corona, subdivision vertex neighbourhood and subdivision edge neighbourhood corona. 1 Introduction All graphs considered throughout this paper are undirected, simple and finite. Let G = (V, E) be a graph with vertex set V = V (G) = {v 1 , v 2 , · · · , v n } and edge set E = E(G) = {e 1 , e 2 , · · · , e m }. A signed graph Γ = (G, σ) consists of an unsigned graph G = (V, E) and a mapping function σ : E(G) → {+1, −1}. This mapping, referred to as the signature of Γ, assigns either a positive or negative sign to each edge within the graph. The signed degree of a vertex v, denoted as sdeg(v), is determined by subtracting the negative degree d − v from the positive degree d + . The total degree of a vertex v, denoted as d , is obtained by summing v v − d + and d . For a signed graph Γ = (G, σ), the adjacency matrix is represented by the n × n v v matrix denoted as A(Γ), with elements given by a σij = σ(v i v j )a ij , where a ij = 1 if vertices v i and v j are adjacent (v i ∼ v j ), and 0 otherwise. The signed Laplacian matrix and the signless Laplacian matrix of Γ is given by L(Γ) = D(Γ) − A(Γ) and Q(Γ) = D(Γ) + A(Γ) respectively where D(Γ) is the diagonal matrix of the vertex degree of Γ. A signed graph Γ = (G, σ) can be switch to a new signed graph Γ θ = (G, σ θ ) by a switching function θ : V (Γ) → {+, −}. ∗ Email: shatym17@gmail.com Corresponding author, Email: ravi@nitsikkim.ac.in ‡ Email: bsonarnits@gmail.com † 1" 2312.12852v1,"Language Resources for Dutch Large Language Modelling Bram Vanroy KU Leuven Oude Markt 13 Leuven, Belgium bram.vanroy@kuleuven.be Abstract Despite the rapid expansion of types of large language models, there remains a notable gap in models specifically designed for the Dutch language. This gap is not only a shortage in terms of pretrained Dutch models but also in terms of data, and benchmarks and leaderboards. This work provides a small step to improve the situation. First, we introduce two finetuned variants of the Llama 2 13B model. We first fine-tuned Llama 2 using Dutch-specific web-crawled data and subsequently refined this model further on multiple synthetic instruction and chat datasets. These datasets as well as the model weights are made available. In addition, we provide a leaderboard to keep track of the performance of (Dutch) models on a number of generation tasks, and we include results of a number of state-of-the-art models, including our own. Finally we provide a critical conclusion on what we believe is needed to push forward Dutch language models and the whole eco-system around the models. 1 Introduction Generative Large language models (LLMs) have experienced rapid advancements in recent years, particularly thanks to their transformer-based architecture (Vaswani et al., 2017), improvements in computational processing efficiency and hardware capabilities, and the collection and creation of massive datasets. However, these models most often, with a few exceptions, focus on English with minor attention to other languages. While this is understandable due to the international status that English has as well as the availability of English data, a significant gap remains in the development of specialised language models for languages that are not as widely represented. Dutch, being a language spoken by around 24 million people according to the Dutch “Taalunie”, 1 is one such language 1 https://taalunie.org/informatie/24/ feiten-cijfers that remains underrepresented in the realm of language modelling. A broader collection of Dutch LLMs will push forward academic and industrial research on automated language generation while also paving the way for non-expert users to use generative artificial intelligence (AI) tools in their own mother tongue. Importantly, in terms of accessibility and availability, making sure that the models are open-source encourages ethical practices and accountability by allowing for transparent scrutiny of the models’ functionality and behaviour. However, as will become obvious in the remainder of this paper, large language models are an end product that can only be achieved with appropriate datasets. Furthermore, incremental improvements in these models can only be achieved when sufficient evaluation methods can be employed. Against this backdrop, this study introduces a number of language resources to accelerate research. This includes a number of instruction datasets, two finetuned two fine-tuned variants of the Llama 2 (Touvron et al., 2023) 13B model, and a leaderboard. In terms of datasets we publish translated variants of a number of popular instruction datasets: Dolly, Quora, Stack Overflow and Alpaca, which we translated to Dutch with gpt-3.5-turbo. We also release code for the automatic translation of datasets with either local models (that are present on the Hugging Face hub) or with Azure’s OpenAI services. The models that we trained, with limited compute, were inspired by the difficulties that we experienced to chat with Llama 2. We found that the model often would use English words, fall back to English after a few sentences, or just read as a poorly English-to-Dutch translation. The first model is trained on causal language modelling, also known as regular text completion, of webcrawled, Dutch text. The second version builds on the former by fine-tuning further on synthetic (translated) datasets that contain instructions and conversational data. Both models are trained on" 2312.12866v1,"Light-activated Janus microswimmers in a thermotropic liquid crystal Antonio Tavera-Vázquez, 1, a) Andrés Córdoba, 1, a) Sam Rubin, 1 and Juan J. de Pablo 1, 2, b) 1) Pritzker School of Molecular Engineering, University of Chicago, 5640 South Ellis Avenue Chicago, IL 60637, USA 2) Materials Science Division, Argonne National Laboratory, Lemont, IL 60439, USA The self-propulsion of Janus particles in a nematic liquid crystal under an LED source with a 542 nm wavelength is reported. The particles used here are 10 µm silica-made half-coated with titanium. They are suspended at low concentrations in nematic 4-Cyano-4’-pentylbiphenyl (5CB). We observe that the Janus particles move in the direction of their Ti-coated side and perpendicular to the nematic director. Based on this observation, we propose that the larger absorption of light at the metal-coated side of a particle creates a local temperature gradient that drives the motion. The trajectories of the Janus particles in the nematic liquid crystal were tracked at different intensities of the applied light. A model is developed to describe the mean-squared displacement of a Janus particle suspended in a nematic liquid crystal. The model assumes that the Janus particle feels the liquid crystal as a continuum with the anisotropic viscosity of the bulk nematic phase. Moreover the viscoelasticity of the liquid crystal is also taken into account. The swimming force is assumed to be proportional to the local temperature gradient along the particle. The model describes well the experimental data and the fitting parameter related to the magnitude of the swimming force increases by increasing the intensity of the applied light. Previous reports exist of self-thermophoresis of Janus particles in isotropic, purely viscous fluids. Still, we believe this to be the first report of a self-thermophoretic Janus particle swimming in a nematic liquid crystal. Keywords: Liquid crystals | Active matter | Microswimmers | Phase transitions | Light-activation I. INTRODUCTION Swimming microorganisms, which include bacteria, algae, and spermatozoa, are ubiquitous in most biological processes. These biological swimmers continuously convert local energy into propulsive forces, which allows them to move through their surrounding fluid medium much faster than by simple diffusion. Similarly, synthetic colloidal microswimmers are capable of mimicking complex biolocomotion employing simple self-propulsion mechanisms. Artificial self-propelled micro- and nano-engines, or swimmers, have been increasingly attracting the interest of experimental and theoretical researchers. Advances in microscopy techniques have allowed synthetic microswimmers to be studied experimentally 1–4 . Janus particle swimmers made by coating fluorescent polymer beads with hemispheres of platinum have been fully characterized using video microscopy to reveal that they undergo propulsion in hydrogen peroxide fuel away from the catalytic platinum patch 1 . Recently, silica microparticles with a copper catalytic patch were also shown to undergo propulsion in hydrogen peroxide fuel, but towards their catalytic patch 5 . The two examples cited above are cases of artificial microswimmers where swimming is driven by a local self-generated concentration gradient, usually referred to as self-diffusiophoresis. Other works have reported artificial swimmers that utilize the mechanism known as selfthermophoresis. For example silica colloidal particles halfcoated with gold have been observed under laser irradiation 6 . Absorption of a laser at the metal-coated side of the particle creates local temperature gradient, which in turn drives the a) These authors contributed equally to this work b) To whom correspondence should be addressed. Email: depablo@uchicago.edu particle by thermophoresis. Moreover, other recent studies of self-propulsion of half-coated spherical colloids in critical binary mixtures have shown that the coupling of local body forces, induced by laser illumination, and the wetting properties of the colloid can be used to finely tune both the colloid’s swimming speed and its directionality 2 . Microswimmers have also been studied theoretically and through computer simulations 7–17 . For instance, selfpropelled Janus particles that catalyze a chemical reaction inside the fluid have been studied extensively using simulations. It has been shown that the catalytic reaction produces an asymmetric, non-equilibrium distribution of reaction products around the colloid, which generates osmotic or other phoretic forces 12,14–16,18 . From a theoretical perspective, a fundamental challenge when describing active matter is to properly describe the coupling between fuel consumption and the generation of propulsive forces. Recently, a thermodynamically compliant coupling between fuel consumption and motion was proposed for a model of microswimmers driven by self-diffusiophoresis 17 . Predictions from that theory indicate that the time scales at which swimming motion is observed increases exponentially with the swimmers’ length and decreases exponentially with the ratio between the diffusivity of product and reactant. Moreover, reactions in which the product has a larger diffusion coefficient than the reactant produce faster swimming. Although, to a lesser extent, swimming driven by self-thermophoresis has also been studied theoretically. For example, Langevin equations for the self-thermophoretic dynamics of Janus particles partially coated with an absorbing layer that is heated by a radiation field have been proposed 19 . In that work, the surface pressure tensor and heat flux vector were expressed in terms of the slip velocity and surface temperature gradient, constructed to be consistent with microscopic reversibility. Most of the previous experimental and theoretical work" 2312.12876v1,"COVID-19 Diagnosis: ULGFBP-ResNet51 approach on the CT and the Chest X-ray Images Classification Vida Esmaeili 1 , Mahmood Mohassel Feghhi *, 1 , Seyed Omid Shahdi 2 1 Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran 2 Department of Electrical Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran Abstract -- The contagious and pandemic COVID-19 disease is currently considered as the main health concern and posed widespread panic across human-beings. It affects the human respiratory tract and lungs intensely. So that it has imposed significant threats for premature death. Although, its early diagnosis can play a vital role in revival phase, the radiography tests with the manual intervention are a time-consuming process. Time is also limited for such manual inspecting of numerous patients in the hospitals. Thus, the necessity of automatic diagnosis on the chest X-ray or the CT images with a high efficient performance is urgent. Toward this end, we propose a novel method, named as the ULGFBP-ResNet51 to tackle with the COVID-19 diagnosis in the images. In fact, this method includes Uniform Local Binary Pattern (ULBP), Gabor Filter (GF), and ResNet51. According to our results, this method could offer superior performance in comparison with the other methods, and attain maximum accuracy. Keywords-- COVID-19 disease diagnosis, ULGFBP-ResNet51, CT dataset, X-ray dataset, deep learning. I. I NTRODUCTION Since early months of 2020, coronavirus disease (COVID-19), which is considerably contagious has permeated through the globe [1, 2]. It has imposed significant and unprecedented sufferings and threats for premature death [2]. Unequivocally, it is now regarded as the most deadly and dangerous disease that makes severe panic to the crowd [3]. The well-known reason for death of this pandemic is obstacles in oxygen intake due to inflammation lung, filled air sacs with discharge and fluid [3]. Early identification of the COVID can not only reduce death rate sharply, but also most prone to faster recovery phase [1]. For the first time in the December of 2019, the sick persons infected with COVID-19 were identified in Wuhan, China [4]. Often, the patients develop a dry cough, fever, shortness of breath, weariness, sore throat, pains, runny nose, body aches, and diarrhoea symptoms. High fever and dry cough are its core symptoms [3]. Its symptoms are similar to pneumonia and influenza-A that affect the human respiratory tract and lungs [1, 5]. Since the separation of infection between COVID-19 and bacterial pneumonia is not an easy task, the automatic feature extraction from images can help to diagnose the disease [6]. The difference is that lung lesions in COVID-19 patients are higher than pneumonia and influenza diseases [7]. In fact, COVID-19 damages the lungs intensely. The virus causes the demise of most persons who have chronic diseases (for instance, diabetes) [8]. The viability of this virus in the air is expected to be for almost three hours [3]. It can travel through the patient's cough or sneeze droplets from person to person in close contact. It can even contaminate humans with eating food in infected copper, plastic, and stainless steel dishes. It should be mentioned out the COVID‐19 can be live in aforementioned utensils for several hours [3]. Several diagnostic tasks such as viral throat swab testing, blood, and serologic tests are conducted for this disease. Also, Reverse Transcriptase-Polymerase Chain Reaction (RT-PCR) is a yardstick from Nasopharyngeal Swabs (NS) and Or-pharyngeal Swabs (OS) samples. Nevertheless, these recognition measures do not only require manual intervention but also are time-consuming processes [2, 9]. Therefore, using the X-ray or Computed Tomography (CT) data is more preferable [10, 11]. These scanning images conspicuously indicate COVID-19 viral infections with higher confidence. Although, these medical imaging modalities are available and * Corresponding author: mohasselfeghhi@tabrizu.ac.ir Address: 29 Bahman Blvd., University of Tabriz, Tabriz, Iran 5166616471. Tel.: +98-4133393635; fax: +98-4133344272. Email addresses: v.esmaeili@tabrizu.ac.ir (Vida Esmaeili), mohasselfeghhi@tabrizu.ac.ir (Mahmood Mohassel Feghhi), shahdi@qiau.ac.ir (Seyed Omid Shahdi) 1" 2312.12878v1,"R ULE -E XTRACTION M ETHODS F ROM F EEDFORWARD N EURAL N ETWORKS : A S YSTEMATIC L ITERATURE R EVIEW A P REPRINT Sara El Mekkaoui Équipe AMIPS École Mohammadia d’Ingénieurs Rabat, Morocco saraelmekkaoui@research.emi.ac.ma Loubna Benabbou Département Sciences de la Gestion Université du Québec à Rimouski, Lévis Qc, Canada loubna_benabbou@uqar.ca Abdelaziz Berrado Équipe AMIPS École Mohammadia d’Ingénieurs Rabat, Morocco berrado@emi.ac.ma December 21, 2023 A BSTRACT Motivated by the interpretability question in ML models as a crucial element for the successful deployment of AI systems, this paper focuses on rule extraction as a means for neural networks interpretability. Through a systematic literature review, different approaches for extracting rules from feedforward neural networks, an important block in deep learning models, are identified and explored. The findings reveal a range of methods developed for over two decades, mostly suitable for shallow neural networks, with recent developments to meet deep learning models’ challenges. Rules offer a transparent and intuitive means of explaining neural networks, making this study a comprehensive introduction for researchers interested in the field. While the study specifically addresses feedforward networks with supervised learning and crisp rules, future work can extend to other network types, machine learning methods, and fuzzy rule extraction. Keywords XAI · Neural Networks · Interpretability · Deep Learning · Rule-based systems · Black-box models 1 Introduction The growing deployment of Artificial Intelligence (AI) systems in sensitive domains and the emerging regulatory and ethical considerations surrounding AI have fostered the development of Machine Learning (ML) models’ interpretability. This area of research has gained significant attention in recent years [104], especially with the emergence of complex models in real-world applications. Feedforward neural networks play an essential role in Deep Learning (DL), serving as the fundamental building blocks for numerous advanced models. These networks are important because they can process and transform input data through multiple layers of interconnected neurons, enabling the extraction of useful representations. Their hierarchical structure allows for the construction of deep neural networks, which have demonstrated remarkable success in various domains, including computer vision, natural language processing, and speech recognition. While DL models have succeeded in numerous fields, the drive for improved accuracy has led to the development of increasingly complex architectures and techniques. The opacity of their internal mechanisms poses significant challenges in understanding their decisionmaking process, particularly in critical domains such as healthcare, finance, and safety-critical applications. Addressing" 2312.12888v1,"Inferring the dynamics of ionic currents from recursive piecewise data assimilation of approximate neuron models Stephen A. Wells, 1 Joseph D. Taylor, 1 Paul G. Morris, 1, ∗ and Alain Nogaret 1, † 1 Department of Physics, University of Bath, Bath BA2 7AY, United Kingdom We construct neuron models from data by transferring information from an observed time series to the state variables and parameters of Hodgkin-Huxley models. When the learning period completes, the model will predict additional observations and its parameters uniquely characterise the complement of ion channels. However, the assimilation of biological data, as opposed to model data, is complicated by the lack of knowledge of the true neuron equations. Reliance on guessed conductance models is plagued with multi-valued parameter solutions. Here, we report on the distributions of parameters and currents predicted with intentionally erroneous models, over-specified models, and an approximate model fitting hippocampal neuron data. We introduce a recursive piecewise data assimilation (RPDA) algorithm that converges with near-perfect reliability when the model is known. When the model is unknown, we show model error introduces correlations between certain parameters. The ionic currents reconstructed from these parameters are excellent predictors of true currents and carry a higher degree of confidence, > 95.5%, than underlying parameters, > 53%. Unexpressed ionic currents are correctly filtered out even in the presence of mild model error. When the model is unknown, the covariance eigenvalues of parameter estimates are found to be a good gauge of model error. Our results suggest that biological information may be retrieved from data by focussing on current estimates rather than parameters. I. INTRODUCTION Data assimilation is a first-in-class method for building models of nonlinear dynamical systems [1–6]. It estimates parameters by synchronizing the model state variables to time series observations. Once the training period is complete, the optimized models successfully predict complex time series oscillations ranging from chaotic dynamics [7, 8] to biological neuron [9–12] and networks [13]. The estimated parameters hold the further promise of revealing hidden internal properties of biological systems. The challenge, however, is that the state equations of neurons are generally unknown and modelling neurons with empirical models such as the Hodgkin-Huxley model [9, 10, 14–19] introduces model error which biasses parameter estimates away from true values [20–28]. Although much attention has been drawn to multi-valued solutions in biological inference problems [29–32], a systematic study is needed to understand how model error perturbs the distribution of parameters, and how it can be mitigated. Correcting parameter sloppiness is complicated by the additional requirements that models have to meet such as observability [33–36] (the state vector is uniquely constrained at every point of the assimilation window) and identifiability [8, 37–42] (the stimulation protocol elicits enough information from the neuron to constrain all model parameters). These conditions can be difficult to quantify and are not systematically checked [9, 43–47]. As a result, several authors ∗ Present address: Department of Physiology, Development and Neuroscience, University of Cambridge, Cambridge CB2 3DY, United Kingdom † A.R.Nogaret@bath.ac.uk have opted to develop leaner models with fewer parameters [48–50] in an attempt to reduce parameter error, or simply focused on predictions alone [29]. Here, we show that ionic current predictions provide more reliable information on the biology than parameters and we propose that the covariance matrix of parameter estimates constitutes a suitable metric of model error when the biological model is unknown. We introduce Recursive Piecewise Data Assimilation (RPDA) as a novel parameter search algorithm. RPDA biases the state vector towards the true solution by re-injecting membrane voltage data in the state vector at regular intervals across the assimilation window. When the model is known, RPDA obtains the true solution with near perfect reliability and minimal error (< 0.1%), independently of the choice of initial state vectors and stimulation protocols. The uniqueness of solutions in turn establishes that observability and identifiability criteria are fulfilled. We then introduce model error by detuning a gate exponent and study the dispersion of parameters estimated by two variants (ErrM 1, ErrM 2) of the model used to generate the data. Two further model variants adding a supplementary ion channel to the original model (ErrM 3) and to its ErrM 1 variant (ErrM 4) gave the parameter and current dispersions of over-specified models. We find that model error introduces correlations between blocks of parameters defining the same ion channel type. The calculation of ionic currents integrates these correlations with the effect that mean current predictions deviate by less than 8% from their true values compared to over 100% for some parameters. Uncertainty on current estimates is less than 4.5% whereas it is 47% on parameters. Over-specifying conductance models by adding extra ion channels to them is not found to induce significant compensation between parameters. Unexpressed ion channels are correctly filtered out while those present are as-" 2312.12906v1,"Emerge of scaling in project schedules Alexei Vazquez Nodes & Links Ltd, Salisbury House, Station Road, Cambridge, CB1 2LA, UK ∗ To whom correspondence should be addressed; E-mail: alexei@nodeslinks.com Abstract A project schedule contains a network of activities, the activity durations, the early and late finish dates for each activity, and the associated total float or slack times, the difference between the late and early dates. Here I show that the distribution of activity durations and total floats of construction project schedules exhibit a power law scaling. The power law scaling of the activity durations is explained by a historical process of specialization fragmenting old activities into new activities with shorter duration. In contrast, the power law scaling of the total floats distribution across activities is determined by the activity network. I demonstrate that the power law scaling of the activity duration distribution is essential to obtain a good estimate of the project delay distribution, while the actual total float distribution is less relevant. Finally, using extreme value theory and scaling arguments, I provide a mathematical proof for reference class forecasting for the project delay distribution. The project delay cumulative distribution function is G(z) = exp(−(z c /z) 1/s ), where s > 0 and z c > 0 are shape and scale parameters. Furthermore, if activity delays follow a lognormal 1+0.20(1−γ d ) , where distribution, as the empirical data suggests, then s = 1 and z c ∼ N 0.20 d max N is the number of activities, d max the maximum activity duration in units of days and γ d the power law exponent of the activity duration distribution. These results offer new insights about project schedules, reference class forecasting and delay risk analysis. 1 Introduction A project is a set of activities leading to a common goal. The activities are characterized by their durations and dependencies. The duration indicates how long it takes to finish a discrete activity. The dependencies list all activities that must finish before an activity can start. For example, consider a toy project with 3 activities A, B and C, with durations of 10, 2 and 4 days, respectively, and the dependency that B most finish before C can start AAAAAAAAAA start end BB CCCC 1" 2312.12909v1,"Energy-efficient Spiking Neural Network Equalization for IM/DD Systems with Optimized Neural Encoding Alexander von Bank, Eike-Manuel Edelmann, and Laurent Schmalen Communications Engineering Lab, Karlsruhe Institute of Technology, 76187 Karlsruhe, Germany alexander.bank@kit.edu, edelmann@kit.edu 1. Introduction Spiking neural networks (SNNs) enable the implementation of powerful machine-learning algorithms using energy-efficient neuromorphic hardware [1]. SNNs process information by exchanging short pulses (spikes) between their neurons. This leads to a sparse representation of information and low energy consumption since spikes are only exchanged when information is processed [2]. Recent work has shown that SNN-based equalizers are promising candidates for powerful equalizers with low-energy consumption for optical transmissions [1,3–6]. For an intensity modulation / direct detection (IM/DD) link suffering from non-linear impairments and chromatic dispersion (CD), an SNN-based equalizer and demapper, which outperforms linear as well as artificial neural network (ANN)-based equalizers was proposed in [4]. Simulation results of the equalizer proposed in [4] have been reproduced using the PyTorch-based SNN deep learning library Norse [7] and neuromorphic hardware [1]. In [3], the equalizer of [4] is applied to experimental IM/DD data. In [5], we proposed an SNN-based equalizer with decision feedback, which outperforms the approach of [4] for an IM/DD link [6]. The transformation of continuous data into spiking signals is called neural encoding. For instance, for the IM/DD link, the channel output is encoded and forwarded to the SNN. In [2], several neural encoding schemes and their applications are discussed. Three basic encoding schemes are [2]: Rate encoding transforms the information in the spike frequency, i.e., number of spikes per time interval; In temporal encoding, the timing of the spikes contains the information; For population encoding, the information is encoded in the interaction of different neurons. Depending on the task, encoding schemes differ in noise robustness, accuracy, energy consumption, and hardware requirements. Therefore, a crucial task when implementing SNNs is to find an efficient neural encoding. While the work mentioned above [1,3–6] focuses on the design and learning of SNNs, the encoding is designed based on empirical knowledge and not further optimized. In [4], a log-scale encoding is proposed, which encodes the information in the relative timing of multiple spikes. In [5, 6], ternary encoding is introduced, which encodes information by activating a predefined subgroup of input neurons. This work proposes a generic neural encoding based on a learnable matrix, which determines the input pattern fed to the SNN’s input layer. The learnable matrix is furthermore regularized using the ℓ p -over-ℓ q regularization of [8]. Using the SNN-based equalizer and simulated IM/DD link of [4], we compare the proposed encoding with logscale encoding of [4] and ternary encoding of [5,6]. We show that the learned encoding with regularization reduces the number of SNN-generated spikes by up to 50%, resulting in reduced power consumption while enhancing the system’s performance by 0.3 dB. The code is available at https://github.com/kit-cel/OptiSpike. Bit Mapper arg max 2. Spiking Neural Network-based Equalizer h j ki An SNN consists of multiple interconnected state-dependent y[k] d tap ′ z −1 z −1 y k − 2 neurons whose internal states evolve and exhibit temporal dynamics. Synapses connect neurons employing adjustable â[k ′ ] b̂ b [k ′ ] SNN weights. A common neuron model is the leaky integrateand-fire (LIF) model [9]: A neuron’s input is scaled by Fig. 1: Proposed equalizer structure the weight of the connecting synapse. The neuron’s state is charged by integrating the input over time. In parallel, it loses charge over time (leakage). If the neuron is charged sufficiently, such that its neuronal threshold is exceeded, the neuron fires an output spike, which is passed to the connected upstream neurons. In this work, we simulate SNNs using Norse [7], which uses the backpropagation through time algorithm [9] to update the synapses’ weights during training. Figure 1 outlines the structure of the SNN-based equalizer as proposed by [4]. The most recent channel output, y[k], is encoded and fed to Encoding Abstract: We propose an energy-efficient equalizer for IM/DD systems based on spiking neural networks. We optimize a neural spike encoding that boosts the equalizer’s performance while decreasing energy consumption. © 2023 The Author(s) This work has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 101001899). Parts of this work were carried out in the framework of the CELTIC-NEXT project AI-NET-ANTILLAS (C2019/3-3) funded by the German Federal Ministry of Education and Research (BMBF) (grant agreement 16KIS1316)." 2312.12921v1,"JOURNAL OF L A TEX CLASS FILES, VOL. X, NO. X, MON 2023 1 Decoupling Judgment and Decision Making: A Tale of Two Tails Emre Oral, Pierre Dragicevic, Alexandru Telea, and Evanthia Dimara Abstract—Is it true that if citizens understand hurricane probabilities, they will make more rational decisions for evacuation? Finding answers to such questions is not straightforward in the literature because the terms “judgment” and “decision making” are often used interchangeably. This terminology conflation leads to a lack of clarity on whether people make suboptimal decisions because of inaccurate judgments of information conveyed in visualizations or because they use alternative yet currently unknown heuristics. To decouple judgment from decision making, we review relevant concepts from the literature and present two preregistered experiments (N=601) to investigate if the task (judgment vs. decision making), the scenario (sports vs. humanitarian), and the visualization (quantile dotplots, density plots, probability bars) affect accuracy. While experiment 1 was inconclusive, we found evidence for a difference in experiment 2. Contrary to our expectations and previous research, which found decisions less accurate than their direct-equivalent judgments, our results pointed in the opposite direction. Our findings further revealed that decisions were less vulnerable to status-quo bias, suggesting decision makers may disfavor responses associated with inaction. We also found that both scenario and visualization types can influence people’s judgments and decisions. Although effect sizes are not large and results should be interpreted carefully, we conclude that judgments cannot be safely used as proxy tasks for decision making, and discuss implications for visualization research and beyond. Materials and preregistrations are available at https://osf.io/ufzp5/?view only=adc0f78a23804c31bf7fdd9385cb264f. Index Terms—Cognition, Decision Making, Judgment, Psychology, Visualization ✦ 1 I NTRODUCTION Imagine a user browsing a weather app on their phone that shows forecast data. They ask themselves two questions: i) How likely is it that there will be heavy rainfall this afternoon? ii) Should I carry an umbrella on my way to the doctor’s appointment? These questions seem related, so it is fair to assume that our judgment of the forecast probability should directly influence our decision to carry an umbrella. Yet, even if we assume that everyone can correctly derive the probability estimates from the visualization, other factors, such as our bag size, the umbrella weight, or our tolerance to mild rainfall, may influence our decision. More lifethreatening decisions, such as if to evacuate a city based on the forecast of a hurricane strike or wildfire, are more arduous and suffer from cognitive biases [1]. Stressful situations can further introduce time pressure leading to inaccurate assessment of the visualized data [2]. It is rather unclear if visualization users make suboptimal decisions because they perform inaccurate judgments of probabilities, or they use alternative yet currently unknown heuristics. More research is needed to explain why people make seemingly suboptimal decisions. One barrier to answering this question is that researchers tend to use the terms judgment and decision interchangeably. For example, in a visualization study, participants were asked to decide, as Red Cross managers, on issuing blankets to help alpacas survive harsh weather conditions [3]. Although the task was a decision, the interpretation of task accuracy was associated • • • E. Oral was with Utrecht University. E-mail: e.oral@uu.nl P. Dragicevic was with Inria Bordeaux. A. Telea, and E. Dimara were with Utrecht University. Manuscript received January 10, 2023; revised September 29, 2023. with the ability of participants to judge the probability of temperatures falling below 32 ° F. Other experiments, while aiming to focus on studying human decisions, exposed participants to visual judgments, such as finding the maximum average bar length [4] or finding a growth trend [5]. The notions of judgment and decision making are often conflated in a single task which sometimes measures people’s decision performance and other times their ability to judge numerical estimates. More importantly, the initial goal of the study is not always in line with the underlying task, which makes the results hard to interpret. To some extent, this conflated use of judgments and decisions is justifiable – a judgment is a fact-based question that is easier to test than a decision. Yet, recent research gives preliminary evidence that people may need to use different visualizations for judgment and decision tasks. Kale et al. [6] presented participants with four different visualizations (quantile dotplots, density plots, HOPs, intervals), in a fantasy sports game. The task was to judge how probably a participant’s team would score with or without a new player, as well as to decide whether to pay for the new player or not. They found that, while participants elicited the best decisions with densities and intervals, they judged better with quantile dotplots. Although the goal of the paper was not to compare judgments with decisions, the fact that the best visualization for judgment did not necessarily lead to better decisions reveals the need to decouple these two tasks. So, to clarify the confusion of judgment and decision making, it is important to separate judgment and decision tasks and to investigate to what extent they relate to each other. In this paper, we study the interplay between judgment and decision making in the context of data visualization. We first review how judgment and decision making have been conceptualized and studied in both visualization (Sec. 2) and 0000–0000/00$00.00 © 2023 IEEE" 2312.12923v1,"Improving Data Minimization through Decentralized Data Architectures Ilaria Battiston supervised by Peter Boncz Centrum Wiskunde & Informatica, Amsterdam, The Netherlands Abstract In this research project, we investigate an alternative to the standard cloud-centralized data architecture. Specifically, we aim to leave part of the application data under the control of the individual data owners in decentralized personal data stores. Our primary goal is to increase data minimization, i. e., enabling more sensitive personal data to be under the control of its owners while providing a straightforward and efficient framework to design architectures that allow applications to run and data to be analyzed. To serve this purpose, the centralized part of the schema contains aggregating views over this decentralized data. We propose to design a declarative language that extends SQL, for architects to specify different kinds of tables and views at the schema level, along with sensitive columns and their minimum granularity level of their aggregations. Local updates need to be reflected in the centralized views while ensuring privacy throughout intermediate calculations; for this we pursue the integration of distributed materialized view maintenance and multi-party computation (MPC) techniques. We finally aim to implement this system, where the personal data stores could either live in mobile devices or encrypted cloud storage, in order to evaluate its performance properties. Keywords distributed systems, cloud, declarative language, multiparty computation 1. Introduction construction of centralized applications, leveraging relational database systems and their declarative properties. Organizations almost invariably adopt a data architecture This paper is structured as follows: Sections 2 and 3 based on centralization for their IT systems, retaining motivate the need for responsible decentralized architecinformation in analytical stores. Making an organiza- tures, along with open questions to be foreseen based on tion data-driven, i. e. relying more on data science and the proposed system. Section 4 illustrates the research machine learning for decision-making, is a driver for ex- background and previous approaches. Section 5 describes panding data architectures, strengthening the trend of the envisioned architecture, and we conclude and discuss widespread collection of personal data through central- the next steps in Section 6. ized and typically cloud-based systems. Such systems facilitate data processing; however, they present concerns pertaining to security and confidentiality. The organi- 2. Motivation zation is in control of all the user data, causing owners, often private citizens, to lose control over this sensitive Data minimization is the principle of limiting the data data. Full centralisation of detail-level sensitive data in- that an organization collects to the minimum needed creases the exposure of the organization to ransomware for the purpose [1], and is a crucial concept in privacy regulations such as the GDPR. attacks - as well as the needed cloud resources. Still, digital services often do need private information, In the PhD research plan outlined in this paper, we investigate partially decentralized alternatives to the fully so data minimization in itself does not avoid sensitive centralized state of affairs, to give users more control over user data being collected. However, what is necessary their personal data and reduce processing costs and risks for a purely centralized data architecture might not be for organizations running applications. We thus aim for needed in the partially decentralized data architectures a generic infrastructure that pushes the boundaries of for which we aim to develop a generic infrastructure. A possible use case considers fitness tracker applicadata minimization [1], i. e., leaving more data under the tions, whose popularity has raised concerns regarding control of its creators/owners while still allowing easy the privacy of collected personal data. For example, this VLDB 2023 PhD Workshop, co-located with the 49th International can include user profile information, activity statistics, Conference on Very Large Data Bases (VLDB 2023), August 28, 2023, health metrics, and geographical coordinates. We argue Vancouver, Canada that for showing the top-10 runners in a circuit or the $ ilaria@cwi.nl (I. Battiston) distribution of running times, it is not necessary to bring  0009-0007-6180-364X (I. Battiston) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License all detail data to the central application database. Our Attribution 4.0 International (CC BY 4.0). approach allows to decentralize sensitive details - such as CEUR Workshop Proceedings (CEUR-WS.org) CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073" 2312.12924v1,"Android dialogue system for customer service using prompt-based topic control and compliments generation Tamotsu Miyama 1 and Shogo Okada 1 Abstract— This paper describes a dialogue system developed for the Dialogue Robot Competition 2023 that achieves topic control for trip planning by inserting text into prompts using the ChatGPT-API. We built a system that is capable of generating compliments for the user based on recognition of the user’s appearance and creating travel plans by extracting the knowledge about the user’s preference from the history of the user’s utterances. Complements and planning based on preference are the elements required to maintain the quality of customer service. A preliminary round was held at a travel agency’s actual store, where real customers experienced and evaluated the system. This system was evaluated first in the preliminary round and participated in the final round. The results of the preliminary round showed the effectiveness of the proposed system. Fig. 1. dialogue flow II. P ROPOSED S YSTEM A. Controlling topics with ChatGPT prompts I. INTRODUCTION This paper describes the dialogue system we developed for the Dialogue Robot Competition 2023 [1][2]: the advent of generative AI such as ChatGPT has dramatically improved the performance of response generation of dialogue systems [3]. In addition of appropriate dialogue ability, hospitality is required in customer service such as travel agencies, and dialogue systems for customer service are expected to response with hospitality [4]. Furthermore, from the aspect of social implementation of robotic dialogue systems, it is important to conduct demonstration tests in actual fields and extract issues. In this context, it is necessary to construct a dialogue system with various elements of hospitality service, and to evaluate users. There are three key points in the development of the proposed dialogue system. (1) Topic control for trip planning was achieved by using ChatGPT for dialog control and inserting text in the prompts. (2) Customer service requires various elements such as language, facial expressions, listening, and attitude [4], as well as the use of compliments to establish a personal relationship with the customer [5]. Therefore, this system was designed to identify the user’s external characteristics and issue compliments. (3) In order to propose travel plans that match the user’s preferences, we implemented a function to create a travel plan using the user’s past utterances. In the preliminary round, experiments and evaluations were conducted with customers who actually visited the travel agency’s stores. We placed first out of 19 teams entered (12 teams participated) and were selected to participate in the final round. The generative AIs used were GPT-3.5-trubo and GPT4. Since the goal task is to create a travel plan, insert fixed text in the prompt to direct the topic toward that task. B. Dialogue Flow The dialogue flow is shown in Figure 1. Basically, the customer’s requests are elicited by asking questions, and then tourist destinations are determined one by one. The customer’s requirements for the travel plan are then confirmed, and a travel plan that meets the customer’s requirements is then discussed. The system asked the customer questions about their experience visiting Kyoto, enjoyment of the trip, and desired activities, and the system referred the answers to the ChatGPT to determine Sightseeing Spot 1. The system asked the customer questions about what they wanted to eat, their preferred areas, hobbies, etc., and the answers were queried on ChatGPT to determine Sightseeing Spot 2. In determining the sightseeing spots, the existence of data was checked by referring to the Sightseeing Spot API. In addition, the summary description of the sightseeing spot being uttered was created by having ChatGPT summarize the introduction in the sightseeing spot API. In the process of creating a travel plan, we asked the customer about the place of departure and means of transportation and used the answers to create a travel plan to visit the two sightseeing spots via ChatGPT. C. Function to complement a user’s physical appearance A dialogue system designed for customer service requires various elements such as language, facial expressions, ges- 1 1 Japan Advanced Institute of Science and Technology, tamotsu.miyama@jaist.ac.jp , okada-s@jaist.ac.jp" 2312.12926v1,"Minimal vertex model explains how the amnioserosa avoids fluidization during Drosophila dorsal closure Indrajit Tah a,b,1 , Daniel Haertter c,d,1 , Janice M. Crawford e , Daniel P. Kiehart e,2 , Christoph F. Schmidt d,2 , and Andrea J. Liu b,2 Speciality Glass Division, CSIR-Central Glass and Ceramic Research Institute, Kolkata, India; b Department of Physics and Astronomy, University of Pennsylvania, PA, USA; Institute of Pharmacology and Toxicology, University Medical Center and Campus Institute Data Science (CIDAS), University of Göttingen, Germany; d Department of Physics and Soft Matter Center, Duke University, Durham, NC, USA; e Department of Biology, Duke University, Durham, NC, USA a c This manuscript was compiled on December 21, 2023 Dorsal closure is a process that occurs during embryogenesis of Drosophila melanogaster. During dorsal closure, the amnioserosa (AS), a one-cell thick epithelial tissue that fills the dorsal opening, shrinks as the lateral epidermis sheets converge and eventually merge. During this process, the aspect ratio of amnioserosa cells increases markedly. The standard 2-dimensional vertex model, which successfully describes tissue sheet mechanics in multiple contexts, would in this case predict that the tissue should fluidize via cell neighbor changes. Surprisingly, however, the amnioserosa remains an elastic solid with no such events. We here present a minimal extension to the vertex model that explains how the amnioserosa can achieve this unexpected behavior. We show that continuous shrinkage of the preferred cell perimeter and cell perimeter polydispersity lead to the retention of the solid state of the amnioserosa. Our model accurately captures measured cell shape and orientation changes and predicts non-monotonic junction tension that we confirm with laser ablation experiments. Drosophila dorsal closure | morphogenesis | epithelial tissue | am- nioserosa | vertex model | tissue rigidity T he developmental stage of dorsal closure in Drosophila melangaster occurs roughly midway through embryogenesis and provides a model for cell sheet morphogenesis (1–4). The amnioserosa (AS) consists of a single sheet of cells that fills a gap on the dorsal side of the embryo separating two lateral epidermal cell sheets. During closure, the AS shrinks in total area, driven by non-muscle myosin II acting on arrays of actin filaments in both the AS and actomyosin-rich cables in the leading edge of the lateral epidermis (5–8). Ultimately, the AS disappears altogether. The entire closure process is choreographed by a developmental program that mediates changes in AS cell shapes as well as forces on adherens junctions between cells (9, 10). One might naively expect cells in the AS, which are glued to their neighbors by molecules such as E-cadherin, to maintain their neighbors, so that the tissue behaves like a soft, elastic solid even as it is strongly deformed by the forces driving dorsal closure. However, the time scale for making and breaking molecular bonds between cells (ms) is far faster than the time scale for dorsal closure (hours). As a result, cells can potentially slip past each other while maintaining overall tissue cohesion. Such neighbor changes could cause epithelial tissue to behave as a viscous fluid on long time scales rather than an elastic solid, as it does during convergent extension (11). Vertex models (12–21) have provided a useful framework for how tissues can switch between solid and fluid behavior (16, 17), and have had remarkable success in describing experimental www.pnas.org/cgi/doi/10.1073/pnas.XXXXXXXXXX results (11, 22–25). These models make the central assumption that internal forces within a tissue are approximately balanced on time scales intermediate between ms and hours, and have successfully described phenomena such as pattern formation, cell dynamics, and cell movement during tissue development (26). Force balance is captured by minimizing an energy that depends on cell shapes. In the standard vertex model, energy barriers are lower when cells have high aspect ratios, so higher/lower cell aspect ratios correspond to fluid/solid behavior. During dorsal closure, significant changes in AS cell shapes are observed. According to the standard vertex model, the observed high values of mean cell shape aspect ratio should render the tissue fluid (15–17). Nonetheless, there is considerable experimental evidence that the AS remains solid during dorsal closure with no neighbor exchanges (27–29). We have examined individual junction lengths using live embryo imaging in an extensive data set comprising 10s of embryos, each with 100s of cells and, in agreement with the literature, did not find any vanishing junctions, and hence any neighbor exchanges, except when cells left the AS (cell ingression). Vertex models might simply fail to describe tissue mechanics Significance Statement During embryogenesis, cells in tissues can undergo significant shape changes. Many epithelial tissues fluidize, i.e. cells exchange neighbors, when the average cell aspect ratio increases above a threshold value, consistent with the standard vertex model. During dorsal closure in Drosophila melanogaster, however, the amnioserosa tissue remains solid even as the average cell aspect ratio increases well above threshold. We introduce perimeter polydispersity and allow the preferred cell perimeters, usually held fixed in vertex models, to decrease linearly with time as seen experimentally. With these extensions to the standard vertex model, we capture experimental observations quantitatively. Our results demonstrate that vertex models can describe the behavior of the amnioserosa in dorsal closure by allowing normally fixed parameters to vary with time. All authors conceived and designed the research project. IT and DH performed the vertex model simulations and analyzed and visualized the data from model and experiments. JC and DPK contributed experimental data. All authors contributed to data interpretation and collaborated on writing the manuscript. All authors declare they have no competing interests. 1 Authors contributed equally. 2 Authors contributed equally. 2 To whom correspondence should be addressed. schmidt@phy.duke.edu, ajliu@physics.upenn.edu PNAS | December 21, 2023 E-mail: | dkiehart@duke.edu, cf- vol. XXX | no. XX | 1–7" 2312.12939v1,"Fabrication of angstrom-scale two-dimensional channels for mass transport Ankit Bhardwaj 1,2 , Marcos Vinicius Surmani Martins 1,2 , Yi You 1,2 , Ravalika Sajja 1,2 , Max Rimmer 1,2 , Solleti Goutham 1,2 , Rongrong Qi 1,2 , Sidra Abbas Dar 1,2 , Boya Radha 1,2 and Ashok Keerthi 1,3* 1 National Graphene Institute, The University of Manchester, Manchester M13 9PL, United Kingdom. 2 Department of Physics and Astronomy, School of Natural Sciences, The University of Manchester, Manchester M13 9PL, United Kingdom. 3 Department of Chemistry, School of Natural Sciences, The University of Manchester, Manchester M13 9PL, United Kingdom. *Please address all correspondence to: Ashok Keerthi (ashok.keerthi@manchester.ac.uk) or Radha Boya (radha.boya@manchester.ac.uk) Abstract Fluidic channels at atomic scales regulate cellular trafficking and molecular filtration across membranes and thus play crucial roles in the functioning of living systems. However, constructing synthetic channels experimentally at these scales has been a significant challenge due to the limitations in nanofabrication techniques and the surface roughness of the commonly used materials. Angstrom (Å)- scale slit-like channels address this challenge, as these can be made with precise control over their dimensions and can be used to study the fluidic properties of gases, ions and water at unprecedented scales. Here, we provide a detailed fabrication method of the two-dimensional (2D) Å-scale channels, which can be assembled as a single channel or up to hundreds of channels made with atomic scale precision using layered crystals. The procedure includes the fabrication of the substrate, flake, spacer layer, flake transfers, van der Waals assembly, and post-processing. We further explain how to perform molecular transport measurements with the Å-channels, for the development of methods directed at unravelling interesting and anomalous phenomena that help shed light on the physics of nanofluidic transport systems. The procedure requires a total of 1 – 2 weeks for the fabrication of the 2D channel device and is suitable for users with prior experience in clean room working environments and nanofabrication. Introduction Microfluidics, the study of fluid transport at microscale, has evolved as a major research field over the last three decades with important applications in diagnostics, optical imaging, and the local cooling of semiconductor chips, amongst others 1-3 . Particularly, after developments in microfabrication techniques used in microelectronics, microfluidic devices have gained momentum and expanded to make contributions to biotechnology, flow chemistry, membrane science and energy storage applications 1,4 . Nanoelectronics also emerged as a subfield due to the increased interest in device miniaturization. Advances in the fabrication processes allowed to push the boundaries of microfluidics to nanofluidics 2,4 . Nanofluidics is not simply about downscaling the dimensions already found in microfluidic systems, but rather develops know-how about the nanoscale effects of molecular interactions. Reducing the dimensions further to the atomic scale, i.e., roughly a few angstroms, opens avenues to atomic-scale confined fluidics, which can be called angstrofluidics. The method to fabricate two-dimensional (2D) capillaries with Å-scale precision is of wide interest, as these devices mark an important milestone towards the development of angstrofluidics 2,4 . In recent decades, the field of nanofluidics has seen notable applications in membrane science, surface science and biosciences 2 , as an inspiration is derived from biological systems (e.g., the human body 1" 2312.12948v1,"Accuracy of reaction coordinate based rate theories for modelling chemical reactions: insights from the thermal isomerization in retinal Simon Ghysbrecht and Bettina G. Keller ∗ Freie Universität Berlin, Department of Biology, Chemistry and Pharmacy, Arnimallee 22, 14195 Berlin Luca Donati Freie Universität Berlin, Department of Mathematics and Computer Science, Arnimallee 22, 14195 Berlin and Zuse Institute Berlin, Takustraße 7, 14195 Berlin (Dated: December 21, 2023) Modern potential energy surfaces have shifted attention to molecular simulations of chemical reactions. While various methods can estimate rate constants for conformational transitions in molecular dynamics simulations, their applicability to studying chemical reactions remains uncertain due to the high and sharp energy barriers and complex reaction coordinates involved. This study focuses on the thermal cis-trans isomerization in retinal, employing molecular simulations and comparing rate constant estimates based on one-dimensional rate theories with those based on sampling transitions and grid-based models for low-dimensional collective variable spaces. Even though each individual method to estimate the rate passes its quality tests, the rate constant estimates exhibit disparities of up to four orders of magnitude. Rate constant estimates based on one-dimensional reaction coordinates prove challenging to converge, even if the reaction coordinate is optimized. However, consistent estimates of the rate constant are achieved by sampling transitions and by multi-dimensional grid-based models. I. INTRODUCTION Elucidating chemical reaction mechanisms and reaction rates is a central goal in computational chemistry. Yet, calculating dynamical properties remains much more challenging than obtaining structural or thermodynamic information. Quantitative predictions of reaction rates are especially difficult, with discrepancies on the order of magnitude between computed and experimental outcomes currently deemed acceptable. The difficulties arise from two main sources: inaccuracies in the model of the potential energy surface (PES) [1], and inaccuracies in the method to calculate the rate on this PES [2]. Modelling a chemical reaction often requires a highly accurate PES based on explicitly evaluating the electronic structure at each nuclear configuration. Until recently, the computational cost of electronic structure methods has been so large that their use has been confined to single-point calculations [3] or short simulations of small systems [4]. Only few rate theories can work with so little information, and thus Eyring transition state theory [5] remains the standard for calculating reaction rates. With recent advances in electronic structure methods [6, 7] and the advent of neural network potentials [8, 9], sampling chemical reactions becomes possible. Thus a wide variety of methods to estimate rates[10, 11], that have been developed in the context of molecular dynamics (MD) simulations, are now accessible. So far, these methods have been tested for systems with rugged PES ∗ bettina.keller@fu-berlin.de with multiple minima connected by energy barriers that are in the same range as the thermal energy, e.g. Examples are peptide[12] and protein dynamics[13], molecular binding[14] or crystal nucleation[15]. In contrast, chemical reactions are characterized by very high and sharp barriers, and it is not obvious that rate estimates which are accurate on rugged PES remain reliable in this scenario. In fact, in a recent study [2] of the thermal cis-trans isomerization of a C=C double bond, we found that two of the most frequently used rate models for MD simulations, infrequent metadynamics [16] and Kramers’ rate theory [17, 18], yield rate constants that differ by multiple orders of magnitude. Methods to estimate rates from MD simulations broadly fall into two distinct categories. The first approach is based on counting transitions across the reaction barrier. Since for most chemical reactions, the mean first passage time exceeds the accessible simulation time by far, one employs dynamical reweighting techniques, in which the sampling is enhanced and the transition count is subsequently reweighted [19–21]. Infrequent metadynamics[16] falls into this category. The second approach is based on assuming an effective dynamics on a one-dimensional reaction coordinate, which requires the free-energy surface and diffusion profile along this reaction coordinate. These can be estimated from the MD simulations in the full molecular configuration space [22, 23]. From the effective dynamics, one derives analytical expressions for the rate constants. Kramers’ rate theory [17, 18] falls into this category. The purpose of this work is to explain the different rate constant estimates of these two approaches for the case of a C=C double bond isomerization. Several error sources come to mind. Infrequent metadynamics may yield in-" 2312.12957v1,"Original article CFD-Driven Optimization of Dual-Throat Micro-Nozzle for Enhanced Thrust in Cold Gas Propulsion for Microsatellites AmirHossein Niksirat a, * a. Ph.D. Researcher, Tehran, Iran Abstract: Micro spacecraft have garnered increasing favor for their adaptability in space missions. Cold gas propellant-based (CGP) micro propulsion systems assume a pivotal role in enabling maneuvering, monitoring, and precise attitude control in micro/nanosatellites, offering attributes of simplicity, non-toxicity, and minimal leakage compared to alternative propulsion methods. The convergent-divergent micro-nozzle, an integral component of micro thrusters, is instrumental in thrust generation. This research conducts a sensitivity analysis of the micro-nozzle to discern influential geometric variables, employing response surface optimization techniques through ANSYS FLUENT. Results indicate a noteworthy thrust enhancement, reaching 113.1 mN in the optimized design. Additionally, a novel curved throat concept is introduced, yielding a 25 percent thrust increase and culminating in a final design achieving 141 mN. Further exploration involves a dual-throat micro-nozzle, integrating response surface optimization and a curved throat design, resulting in an impressive thrust level of 261 mN, surpassing prior designs without added complexity. This study advances micro spacecraft propulsion by addressing challenges and introducing innovative approaches, emphasizing the pioneering nature of this investigation within the realm of micro propulsion systems. Keywords: Micro-thruster; Cold gas propulsion; Dual-throat micro-nozzle; CFD; Optimization; Design of experiments *Corresponding author. Tel.: (+98) 9125139762. E-mail address: amirhossien.niksirat@gmail.com. Copyright©2023, Iran University of Science and Technology University. - 1 -" 2312.12966v1,"Rank-based Bayesian clustering via covariate-informed Mallows mixtures Emilie Eliseussen 1 1 Arnoldo Frigessi 1 Valeria Vitelli 1 Oslo Centre for Biostatistics and Epidemiology, Department of Biostatistics, University of Oslo, Oslo, Norway E-mail: valeria.vitelli@medisin.uio.no December 20, 2023 Abstract Data in the form of rankings, ratings, pair comparisons or clicks are frequently collected in diverse fields, from marketing to politics, to understand assessors’ individual preferences. Combining such preference data with features associated with the assessors can lead to a better understanding of the assessors’ behaviors and choices. The Mallows model is a popular model for rankings, as it flexibly adapts to different types of preference data, and the previously proposed Bayesian Mallows Model (BMM) offers a computationally efficient framework for Bayesian inference, also allowing capturing the users’ heterogeneity via a finite mixture. We develop a Bayesian Mallows-based finite mixture model that performs clustering while also accounting for assessor-related features, called the Bayesian Mallows model with covariates (BMMx). BMMx is based on a similarity function that a priori favours the aggregation of assessors into a cluster when their covariates are similar, using the Product Partition models (PPMx) proposal. We present two approaches to measure the covariate similarity: one based on a novel deterministic function measuring the covariates’ goodness-of-fit to the cluster, and one based on an augmented model as in PPMx. We investigate the performance of BMMx in both simulation experiments and real-data examples, showing the method’s potential for advancing the understanding of assessor preferences and behaviors in different applications. Keywords: Bayesian inference; clustering; rankings; covariate embedding; product partition models 1. Introduction Preference data are frequently encountered and utilized to assess the preferences of individuals, here referred to as ”assessors”. Assessors generate preference data in the form of (incomplete) rankings, ratings, pair comparisons, or by clicking on proposed items, often resulting in large sparse datasets. The primary objective is to uncover the missing parts of each assessor’s ranking and identify the shared consensus ranking among assessors. However, this task is challenging due to the vast parameter space encompassing all possible permutations of the items ranked. The Mallows model [21] has emerged as a promising choice to address this task, and recent advancements, such as the Bayesian Mallows model [37], have introduced methods that enable to address the associated challenges in the utilization of arbitrary right-invariant distances, enhancing the model’s flexibility. In this framework, the unknown parameters are the latent orderings of all items for each individual assessor, and the latent consensus ranking shared by all assessors in a homogeneous group. However, assuming a single consensus ranking for all assessors in a large pool is often unrealistic, as assessors differ group-wise in their preferences. Within each group of assessors with alike preferences one can 1" 2312.12976v1,"Astronomy & Astrophysics manuscript no. 48328corr December 21, 2023 ©ESO 2023 The Rossiter-McLaughlin effect and exoplanet transits: A delicate association at medium and low spectral resolution. Yann Carteret 1 , Vincent Bourrier 1 and William Dethier 2 1 Observatoire Astronomique de l’Université de Genève, Chemin Pegasi 51b, CH-1290 Versoix, Switzerland e-mail: yann.carteret@gmail.com 2 Univ. Grenoble Alpes, CNRS, IPAG, 38000 Grenoble, France Received December 21, 2023 ABSTRACT The characterization of exoplanetary atmospheres via transit spectroscopy is based on the comparison between the stellar spectrum filtered through the atmosphere and the unadulterated spectrum from the occulted stellar region. The disk-integrated spectrum is often used as a proxy for the occulted spectrum, yet they differ along the transit chord depending on stellar type and rotational velocity. This is refereed to as the Rossiter-McLaughlin (RM) effect, which is known to bias transmission spectra at high spectral resolution when calculated with the disk-integrated stellar spectrum. Recently, it was shown that the first claimed atmospheric signal from an exoplanet cannot arise from absorption in the core of the sodium doublet, because the features observed at high resolution are well reproduced by the RM effect. However, it remains unclear as to whether the detection made at medium spectral resolution with the HST arises from the smoothed RM signature or from the wings of the planetary absorption line. More generally, the impact of the RM effect at medium and low spectral resolution remains poorly explored. To address this question, we simulated realistic transmission spectra in a variety of systems using the EVaporating Exoplanets code. We find that the RM effect should not bias broadband atmospheric features, such as hazes or molecular absorption, measured with the JWST/NIRSPEC (prism mode) at low resolution. However, absorption signatures from metastable helium or sodium measured at medium resolution with the JWST/NIRSPEC (G140H mode) or HST/STIS can be biased, especially for planets on misaligned orbits across fast rotators. In contrast, we show that the Na signature originally reported in HD209458b, an aligned system, cannot be explained by the RM effect, supporting a planetary origin. Contamination by the RM effect should therefore be accounted for when interpreting high- and medium-resolution transmission spectra of exoplanets. Key words. Planets and satellites: atmospheres – Methods: numerical – Techniques: spectroscopic – Planets and satellites: individual: HD 209458 b 1. Introduction High-resolution (R ≳ 50000) spectroscopy has proven to be one of the most prolific techniques for characterizing exoplanetary atmospheres. As a result, spectrographs originally designed to search for exoplanets through velocimetry (such as CARMENES Quirrenbach et al. 2016, and ESPRESSO Pepe et al. 2021) are increasingly used to probe their atmospheres, from escaping light atoms (see review on helium by Guilluy et al. 2023, and references therein), to heavier metals (see e.g., Hoeijmakers et al. 2018; Borsato et al. 2023; Prinoth et al. 2023), and molecules (Snellen et al. 2010; Birkby et al. 2013; Carleo et al. 2022). While the narrow absorption lines of these species mainly trace the dynamics and chemistry of the upper atmosphere, medium- and low-resolution instruments provide complementary access to the lower layers through clouds, hazes, and molecules (e.g., Lecavelier Des Etangs et al. 2008; Snellen et al. 2010; Sing et al. 2016). Atmospheric signatures from transiting planets can be obtained by subtracting the in-transit spectra from the out-of-transit stellar spectrum (to isolate the stellar spectrum filtered by the planetary atmosphere), and dividing this difference by a proxy for the occulted stellar lines. Because the emission of the star is not spatially resolved, the disk-integrated stellar spectrum is usually used as a proxy. However, the stellar spectrum is not homogeneous across the photosphere and the disk-integrated spectrum is not necessarily representative of local spectra, which vary along the transit chord due to stellar rotation (which induces the Rossiter-McLaughlin (RM) effect Rossiter 1924; McLaughlin 1924), center-to-limb variations (CLVs) of the line profiles (e.g., Vernazza et al. 1981; Allende Prieto et al. 2004), and variation of their continua (broadband limb darkening (LD); Knutson et al. 2007; Morello et al. 2017) to name but a few. Transmission spectra calculated in this way display planetocculted line distortions (POLDs, Dethier & Bourrier 2023) that can bias or even mimic planetary atmospheric signatures. The most famous case is the first claim of an exoplanetary atmosphere through the detection of sodium absorption. Casasayas- Barris et al. (2020, 2021) showed that the signal measured at high resolution in the sodium line mainly arises from POLDs, casting doubt on the planetary origin of the feature measured at medium resolution by Charbonneau et al. (2002). While the biases due to POLDs are now acknowledged and well characterized at high resolution, little is known about their impact at lower resolution, as the poorly resolved stellar lines are then assumed to have negligible effect. Considering the importance of space-based facilities such as JWST (Beichman et al. 2014) and Ariel (Tinetti et al. 2018) for the future of atmo- Article number, page 1 of 9" 2312.13018v1,"Sample Design and Cross-sectional Weights of the Brazilian PCSVDF-Mulher Study (Waves 2016 and 2017): Integrating a Refreshment Sample with an Ongoing Longitudinal Sample to Calculate IPV Prevalence José Raimundo Carvalho ∗ Diego de Maria André † First Version: June, 2023 This Version: November, 2023 Abstract Addressing unit non-response between waves of longitudinal studies (attrition) by means of sampling design in weighting has moved from an approach focused on participant retention or modern missing data analysis procedures to an approach based on the availability of supplemental samples, either collecting refreshment or replacement samples on an ongoing larger sample. We implement a strategy for calculating individual cross-sectional weights and apply them to the 2016 and 2017 waves of the PCSVDF-Mulher (Pesquisa de Condições Socioeconômicas e Violência Doméstica e Familiar contra a Mulher - Survey of Socioeconomic Conditions and Domestic and Family Violence against Women), a large (≈ 10, 000), household interdisciplinary longitudinal data set in Brazil to study intimate partner violence (IPV), its causes and consequences. We developed a set of weights that combines a refreshment sample collected in 2017 with the ongoing longitudinal sample started in 2016. Armed with this set of individual weights, we calculated IPV prevalence for nine capital cities in Brazil for the years 2016 and 2017. As far as we know, this is the first attempt to calculate cross-sectional weights with the aid of supplemental samples applied to a population representative sample study focused on IPV. Our analysis produced a set of weights whose comparison to unweighted designs shows clearly neglected trends in the literature on IPV measurement. Indeed, one of our key findings pointed out to the fact that, even in well-designed longitudinal household surveys, the indiscriminate use of unweighted designs to calculate IPV prevalence might artificially and inadvertently inflate their values, which in turn might bring distortions and considerable political, social, budgetary, and scientific implications. Keywords: Survey Design, Intimate Partner Violence, Longitudinal Data, Refreshment Sample JEL codes: C83, J12, J16 ∗ Professor in the Graduate Program in Economics, CAEN/UFC and PI of the PCSVDF-Mulher Project. Av. da Universidade, 2762 - Prédio CAEN/História - 1º e 2º andares - Benfica - CEP: 60.020-181 - Fortaleza-CE. E-mail: josecarv@ufc.br. ORCID: 0000-0001-5774-5925 (Author for correspondence). † Professor in the Graduate Program in Economics (PPECO), Federal University of Rio Grande do Norte (UFRN). Av. Sen. Salgado Filho, 3000, Lagoa Nova, Natal/RN, CEP 59078-970, Brazil. E-mail:diego.andre@ufrn.br. ORCID: 0000-0003-3142- 8336. 1" 2312.13036v1,"Quantum State Compression Shadow Chen Ding, 1 Xiao-Yue Xu, 1 Shuo Zhang, 1 Wan-Su Bao, 1, 2, ∗ and He-Liang Huang 1, 2, † 1 Henan Key Laboratory of Quantum Information and Cryptography, Zhengzhou, Henan 450000, China 2 Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China (Dated: December 21, 2023) Quantum state readout serves as the cornerstone of quantum information processing, exerting profound influence on quantum communication, computation, and metrology. In this study, we introduce an innovative readout architecture called Compression Shadow (CompShadow), which transforms the conventional readout paradigm by compressing multi-qubit states into single-qubit shadows before measurement. Compared to direct measurements of the initial quantum states, CompShadow achieves comparable accuracy in amplitude and observable expectation estimation while consuming similar measurement resources. Furthermore, its implementation on near-term quantum hardware with nearest-neighbor coupling architectures is straightforward. Significantly, CompShadow brings forth novel features, including the complete suppression of correlated readout noise, fundamentally reducing the quantum hardware demands for readout. It also facilitates the exploration of multi-body system properties through singlequbit probes and opens the door to designing quantum communication protocols with exponential loss suppression. Our findings mark the emergence of a new era in quantum state readout, setting the stage for a revolutionary leap in quantum information processing capabilities. In the realm of quantum physics, quantum measurement emerges as a pivotal and distinctive element. Its paramount role resides in the capacity to extract essential information from quantum states, enabling us to observe the fascinating phenomena of quantum physics, including measurementinduced phase transitions [1–4]. Moreover, it serves as a prerequisite for harnessing the quantum power, with phenomena like stochastic collapse forming the security foundation for quantum key distribution [5, 6]. Thus, advancements in measurement techniques are poised to revolutionize the development of quantum information processing. For instance, classical shadow [7–13] methods have been proffered as a potent tool for extracting numerous properties from quantum manybody systems with a significantly fewer measurements. This innovation showcases the potential for more efficient utilization of quantum resources in exploring complex quantum systems. Additionally, the introduction of readout error mitigation methods [14–20] seeks to surmount inaccuracies in quantum state information extraction caused by readout errors. These efforts result in a substantial enhancement of the capabilities of near-term quantum computing devices, marking a significant stride towards utility of quantum computing before fault tolerance. A notable example is the successful simulation of a 127-qubit transverse-field Ising model achieved through error mitigation techniques [21]. The confluence of these advancements underlines the depth of impact that refined measurement techniques can have on the multifaceted landscape of quantum information. Here, we present a new paradigm for quantum state readout from a distinct perspective, introducing the concept of quantum state compression shadow (CompShadow). The primary goal is to compress the original quantum state into a collection of single-qubit states while ensuring the faithful recovery of the initial state’s information, including amplitudes or ∗ bws@qiclab.cn † quanhhl@ustc.edu.cn the expectation values of specific observables, through measurement on these compressed qubits. Importantly, Comp- Shadow introduces a plethora of new functionalities, augmenting quantum information processing capabilities: 1) It notably addresses the challenging issue of correlated measurement errors in multi-qubit systems. As quantum processors scaling up, the coupling and crosstalk between qubits become significant, leading to a globally correlated error channel with, in principle, an exponential cost for noise suppression [22– 25]. In contrast, CompShadow simplifies large-scale quantum state measurements by measuring only a single-qubit, thereby elegantly removing correlated errors. Numerical simulations reveal that CompShadow outperforms mainstream readout error mitigation methods such as tensor product noise inversion (TPN) [26], unfolding [23], and model-free method [27] on the near-term quantum device, Zuchongzhi 2.1 [28, 29]. Moreover, as gate accuracy and qubit number increase, the advantage of CompShadow becomes more pronounced. 2) CompShadow facilitates revealing the properties of multiqubit system using a single qubit prober, such as entanglement entropy and local density, potentially playing a crucial role in many-body quantum simulations. 3) It also exhibits exponential resilience against loss in quantum state transmission, significantly enhancing communication efficiency. These findings underscore CompShadow as a novel paradigm for quantum state readout, poised to markedly enhance the capabilities of contemporary quantum computing, communication, and metrology. Results Framework Compression shadows. Given a n-qubit quantum state ρ, CompShadows is a collection of compressed quantum states {σ 1 , σ 2 , ..., σ 2 n −1 }, obtained by applying a series of compression circuits U j to ρ, retaining the first qubit, and discarding the remaining qubits. Mathematically, σ j = Tr {2,...,n} (U j ρU j † ), j = 1, ..., 2 n − 1, (1) where U j represents a hardware-efficient shallow quantum" 2312.13047v1,"ON COMPACT SUBSETS OF THE REALS WOJCIECH BIELAS, MATEUSZ KULA, AND SZYMON PLEWIK Abstract. Motivated by results of J. R. Kline and R. L. Moore (1919) that a compact subset of the plane, homeomorphic to a subset of the reals, lies on the arc, we give a purely topological characterisation of compact sets of the reals. This allows us to reduce investigations of Cantorvals to properties of countable linear orders and to show, applying the Mazurkiewicz–Sierpiński Theorem (1920), that there exist continuum many non-homeomorphic L-Cantorvals. 1. Introduction If X is a compact subset of the reals, then (⋆). Each non-trivial component of X is an arc [a, b] and the set (a, b) = [a, b] \ {a, b} is open. J. R. Kline and R. L. Moore [10, Theorem 1] showed that a compact subset of the plane R 2 that satisfies condition (⋆), lies on an arc. We are impressed by this achievement, more than 100 years old, and we have decided to continue this. While Kline and Moore dealt only with compact subsets of the plane, their results had been generalised, for example [16] and [17]. Here, we present a variation that gives an internal characterisation of compact subsets of the reals. Also, we have found some applications to Cantorvals. As far as we know, the name Cantorval has been introduced by P. Mendes and F. Oliveira [6]. The first characterization of Cantorvals was given by J. A. Guthrie and J. E. Nymann [4]. As it is noted by S. Głąb and J. Marchwicki [3], a few authors pointed out the existence of some concrete Cantorvals before Guthrie and Nymann. By an arc we understand a closed interval [a, b] ⊆ R, or a homeomorphic image of a closed interval [a, b], which also will be denoted by [a, b]. In both cases, points a and b are called endpoints of the arc [a, b]. 2010 Mathematics Subject Classification. Primary: 54F65; Secondary: 26A03, 54F05. Key words and phrases. Cantorval, L-Cantorval, gaps, intervals. 1" 2312.13056v1,"Lightcone fluctuations in a five dimensional Kaluza-Klein model and an estimation on the size of the extra dimension 1 1 Giulia Aleixo ∗ and 1 Herondy Mota † Departamento de Fı́sica, Universidade Federal da Paraı́ba, Caixa Postal 5008, João Pessoa, Paraı́ba, Brazil. In this work we consider lightcone fluctuation effects in a five-dimensional spacetime arising as a consequence of the compactification of the extra dimension via a quasiperiodic condition, characterized by a phase angle 2πα. By considering light propagating in a non-compactified direction we are able to compute both the renormalized graviton two-point function and the flight time of a photon caused by the fluctuations. We show that the resulting expressions depend on the quasiperiodic parameter, the compactification length and also on the distance traveled by the photon. Based on the Near-Infrared Spectrograph (NIRSpec) sensitivity built on the James Webb Space Telescope, we discuss the possibility of making estimations on the size of the extra dimension if one assumes that the mean deviation on the flight time of photons can be observed through the NIRSpec. We also analyze the differences between the estimations in the periodic α = 0, antiperiodic α = 1/2 and other condition cases for α. I. INTRODUCTION In a full-fledged theory of gravity divergences that commonly appear in Quantum Field Theory are supposed to be smoothed out and, as an example, we can mention divergences stemming from observables calculated exactly at the lightcone. In fact, Pauli conjectured that lightcone divergences may be removed upon quantization of gravity [1]. Such possibility was subsequently discussed by Deser, Isham, and others [2–4]. In the context of a linearized quantum theory of gravity, for instance, it has been shown that some lightcone divergences are smeared out due to nonzero metric fluctuations [5]. The lightcone fluctuation effects are analogous to the Casimir effect in the sense that the presence of boundary conditions, nontrivial topology, and spacetime dimensionality can introduce perturbations to the usual quantities [5–8]. These fluctuations may modify the two-point function of the quantized metric perturbation and its effects on photon propagation could, in principle, be observed: the smeared lightcone is reflected as a change in the photon speed, thereby also modifying its typical flight time [5–7]. This modification can vary slightly from a photon to another, however, the observed spectral lines of a light pulse will exhibit a characteristic mean deviation from the original configuration. Observable effects such as this could help us understand many phenomena involving cosmic messengers and the structure of spacetime even within a particular scope such as the linearized theory of gravity. The latter can also be applied to lightcone fluctuations in order to understand horizon fluctuations, in particular, in the case of black hole horizons, some interesting developments on black hole thermodynamics can arise [7]. Furthermore, since the effects of metric fluctuations resulting from modifications imposed to a particular direction are not limited to that same direction, this approach could also provide us with a powerful mean to test the existence of extra dimensions. After the formulation of General Relativity several attempts have been made to unify gravity and the electromagnetic theory. Among them, in 1921, Theodor Kaluza tried to grasp a solution describing a world beyond our usual (3 + 1) dimensions introducing an extra dimension and, a few years later, Oskar Klein revisited Kaluza’s work under the scope of quantum mechanics. Hence, (n + 1)D scenarios with compact extra dimensions are often referred to as the Kaluza-Klein models, whereas the particular case of (4 + 1) is referred to as the original Kaluza-Klein model. In recent years, such models are sought out in an attempt to describe several phenomena in many areas of physics [9–12]. In particular, in Refs. [13–15] lightcone fluctuations have been considered assuming periodically compactified extra dimensions. In this work we consider the (4 + 1) dimensional Kaluza-Klein model by compactifying the extra dimension via a quasiperiodic condition, which could bring new mathematical features to our results and shed more light on the search for observable lightcone fluctuations effects and on the possible structure of the extra dimension. We also provide an estimation on the size of the extra dimension if one assumes that the flight time of a photon ∗ Electronic address: giulia.aleixo@academico.ufpb.br † Electronic address: hmota@fisica.ufpb.br" 2312.13067v1,"Modelling of impurity heating during reconnections in a Reverse Field Pinch device as due to parallel electric field acceleration and chaos-induced thermalization F. Sattin ∗ Consorzio RFX (CNR, ENEA, INFN, Università di Padova, Acciaierie Venete SpA), Padova, Italy D.F. Escande Aix-Marseille Université, CNRS, PIIM, UMR 7345, Marseille, France M. Gobbin, I. Predebon CNR ISTP, Istituto per la Scienza e Tecnologia dei Plasmi, Sede di Padova, Italy; Consorzio RFX (CNR, ENEA, INFN, Università di Padova, Acciaierie Venete SpA), Padova, Italy. The ion temperature during magnetic reconnections measured along the direction of the magnetic field at the MST Reverse Field Pinch has not yet received a satisfactory theoretical explanation. In this work we argue that it is consistent with a picture of ion energization by the parallel electric fields generated by the plasma during reconnection, and thermalization due to the chaotic ion dynamics. Three possible sources of randomness are pointed out: particle motion along static stochastic magnetic field lines, breakup of the adiabatic ion dynamics caused by the strong gradient nonlinearity of the magnetic field, parallel acceleration along stochastic time-dependent electric fields. The three mechanisms are likely operative simultaneously; regardless the specific mechanism active, the correct scaling laws with ion parameters are recovered. Furthermore, we argue that quantitative agreement can be obtained by feeding the model with realistic values for the plasma conditions. I. INTRODUCTION Reconnection of magnetic field lines is a basic process, ubiquitous wherever magnetized plasmas are present. During reconnection, a fraction of the energy accumulated in the magnetic field is delivered to the particle component of the plasma, ions and electrons. The ways by which energy is transferred are potentially several, a detailed assessment of the energy budget is an area of active investigation, both in astrophysical and laboratory plasmas; it is usually a difficult task, possible only in a few well-controlled environments (see, e.g., [1]); furthermore, it is likely that different mechanisms are active among different physical scenarios. The Reversed Field Pinch (RFP) is a toroidal device designed for fusion plasma research, characterized by a magnetic field structure that is mostly self-organized [2]. The sustainment of quasi-steady-state conditions requires the generation of toroidal flux by the plasma itself, which occurs via continuous and quasiperiodic reconnection events. Accordingly, the physics of reconnection is a particularly important topic in these devices, from the theory as well as the experimental side [2–4]. This work addresses the extensive campaigns of experiments carried out in the period 2008-2014 in the MST RFP device and summarized in a long list of works [5–11]. These papers provide a detailed characterization of both the particle and field components of the plasma during reconnections, including thermal and magnetic energy budget, time- and space-resolved measurements of the temperature along the directions both aligned and perpendicular to the magnetic field, scan over several ion species, frequency- and wavelength-resolved power spectra of magnetic fluctuations. The data allowed a comparison with the predictions from several of the most popular models of ion heating, as well as some models developed ad-hoc. None of them was found able to satisfactorily match all of the experimental evidence. Therefore, the mechanism behind ion heating in this kind of devices is so far unexplained. In paper [10] it was argued, in particular, that a complete explanation of the ion heating likely requires two separate mechanisms, delivering energy to the particles respectively along and perpendicularly to the magnetic field. In this work we propose a plausible explanation for the findings of the MST team focussing on the interpretation of ion heating along the direction parallel to the magnetic field. We show that it is quantitatively consistent with the predictions of a model of ion energization due to parallel electric fields coupled to some non-collisional thermalization mechanism. We identify three different possible origins for the electric field and the thermalization mechanism, likely ∗ fabio.sattin@igi.cnr.it" 2312.13081v1,"BEVSeg2TP: Surround View Camera Bird’s-Eye-View Based Joint Vehicle Segmentation and Ego Vehicle Trajectory Prediction Sushil Sharma 1,2 , Arindam Das 1 , Ganesh Sistu 1 , Mark Halton 1 , and Ciarán Eising 1,2 1 Department of Electronic & Computer Engineering, University of Limerick, Ireland 2 SFI CRT Foundations in Data Science, University of Limerick, Ireland 1,2 firstname.lastname@ul.ie Keywords: Surrounded-view Camera, Encoder-Decoder Transformer, Segmentation, Trajectory Prediction. Abstract: Trajectory prediction is, naturally, a key task for vehicle autonomy. While the number of traffic rules is limited, the combinations and uncertainties associated with each agent’s behaviour in real-world scenarios are nearly impossible to encode. Consequently, there is a growing interest in learning-based trajectory prediction. The proposed method in this paper predicts trajectories by considering perception and trajectory prediction as a unified system. In considering them as unified tasks, we show that there is the potential to improve the performance of perception. To achieve these goals, we present BEVSeg2TP - a surround-view camera bird’s-eye-view-based joint vehicle segmentation and ego vehicle trajectory prediction system for autonomous vehicles. The proposed system uses a network trained on multiple camera views. The images are transformed using several deep learning techniques to perform semantic segmentation of objects, including other vehicles, in the scene. The segmentation outputs are fused across the camera views to obtain a comprehensive representation of the surrounding vehicles from the bird’s-eye-view perspective. The system further predicts the future trajectory of the ego vehicle using a spatiotemporal probabilistic network (STPN) to optimize trajectory prediction. This network leverages information from encoder-decoder transformers and joint vehicle segmentation. The predicted trajectories are projected back to the ego vehicle’s bird’s-eye-view perspective to provide a holistic understanding of the surrounding traffic dynamics, thus achieving safe and effective driving for vehicle autonomy. The present study suggests that transformer-based models that use cross-attention information can improve the accuracy of trajectory prediction for autonomous driving perception systems. Our proposed method outperforms existing state-of-the-art approaches on the publicly available nuScenes dataset. This link is to be followed for the source code: https://github.com/sharmasushil/BEVSeg2TP/. 1 INTRODUCTION Accurate trajectory prediction is a critical capability for autonomous driving systems, playing a pivotal role in enhancing safety, efficiency, and driving policies. This technology is increasingly vital as autonomous vehicles become more prevalent on public roads, as it enables these vehicles to anticipate the movements of various road users, including pedestrians, cyclists, and other vehicles. By doing so, autonomous vehicles can proactively plan and execute safe manoeuvres, reducing the risk of potential collisions (Li and Guo, 2021; Cheng et al., 2019) and effectively navigating through complex traffic scenarios. Moreover, trajectory prediction empowers autonomous vehicles to optimise their driving behaviour, enabling smoother lane changes (Chen et al., 2020) and seamless merging to improve overall traffic flow and reduce congestion (Wei et al., 2021). Furthermore, trajectory prediction also plays a crucial role in facilitating effective communication and interaction between autonomous vehicles, human drivers, and pedestrians. By behaving predictably, autonomous vehicles can earn the trust of other road users (Liu et al., 2021; Yang et al., 2021) and support other extended applications in the ADAS perception stack, such as pedestrian detection (Das et al., 2023; Dasgupta et al., 2022), and pose estimation (Das et al., 2022). In this paper, we introduce an approach called BEVSeg2TP for joint vehicle segmentation and ego vehicle trajectory prediction, leveraging a bird’seye-view perspective from surround-view cameras. Our proposed system employs a network trained on" 2312.13099v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article Preventing sinking of a disk by leveraging the Parametric Hydraulic Jump phenomenon Jan Turczynowicz 12 , Radost Waszkiewicz 12 , and Łukasz Gładczuk 13 † 1 Fenix Science Club, Aleja Stanów Zjednoczonych 24, 03-964 Warsaw 2 Institute of Theoretical Physics, Faculty of Physics, University of Warsaw, L. Pasteura 5, 02-093 Warsaw, Poland 3 Department of Physics, Clarendon Laboratory, University of Oxford, Oxford OX1 3PU, United Kingdom (Received xx; revised xx; accepted xx) Although it is commonly expected that a metal disk placed on the surface of water will sink, our investigation has revealed a surprising phenomenon: a vertical jet directed onto the disk from above can allow it to remain afloat. This result defies intuition, as one would assume that the force of the jet’s impact would cause the disk to sink. We have discovered that this phenomenon occurs as a result of water displacement from the top of the disk caused by the impacting jet, operating through a mechanism similar to a classical hydraulic jump. This displacement generates a difference in hydrostatic pressures, resulting in an upward buoyancy force capable of balancing the force of gravity. In contrast to the classical case, here the jump radius is fixed by the geometric parameters of a disk, a phenomenon we refer to as the parametric hydraulic jump. To further explore this effect, we have presented a theoretical model based on scaling laws, which provides the conditions required for the disk to float. The dimensionless scaling constant’s value was determined through an independent experiment. Finally, we conducted experiments on the disk’s floating and sinking, which showed a good match with the proposed theory. Key words: Jets, Thin films, Wakes 1. Introduction Placing a thin metal disk on the surface of water and directing a vertical water jet onto the disk reveals an unusual phenomenon. Despite the disk being denser than water, in some cases, the weight of water displaced from the surface of the disk is sufficient for the buoyancy force to balance both the impact force of the jet and the weight of the disk. This balance allows the disk to remain afloat. To understand the necessary conditions for this phenomenon to occur, it is essential to study the water flow dynamics on the upper surface of the disk. Due to the cylindrical symmetry † Email address for correspondence: lukasz@fenix.club" 2312.13105v1,"Exploring ChatGPT for Toxicity Detection in GitHub Shyamal Mishra Preetha Chatterjee Drexel university Philadelphia, Pennsylvania, USA sm4825@drexel.edu Drexel university Philadelphia, Pennsylvania, USA preetha.chatterjee@drexel.edu Abstract Fostering a collaborative and inclusive environment is crucial for the sustained progress of open source development. However, the prevalence of negative discourse, often manifested as toxic comments, poses significant challenges to developer well-being and productivity. To identify such negativity in project communications, especially within large projects, automated toxicity detection models are necessary. To train these models effectively, we need large software engineering-specific toxicity datasets. However, such datasets are limited in availability and often exhibit imbalance (e.g., only 6 in 1000 GitHub issues are toxic) [1], posing challenges for training effective toxicity detection models. To address this problem, we explore a zero-shot LLM (ChatGPT) that is pre-trained on massive datasets but without being fine-tuned specifically for the task of detecting toxicity in software-related text. Our preliminary evaluation indicates that ChatGPT shows promise in detecting toxicity in GitHub, and warrants further investigation. We experimented with various prompts, including those designed for justifying model outputs, thereby enhancing model interpretability and paving the way for potential integration of ChatGPT-enabled toxicity detection into developer communication channels. ACM Reference Format: Shyamal Mishra and Preetha Chatterjee. 2023. Exploring ChatGPT for Toxicity Detection in GitHub. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 5 pages. https://doi.org/XXXXXXX.XXXXXXX 1 Introduction The open source software (OSS) development community has emerged as a powerful engine driving innovation and collaboration across various domains. The fundamental principle of collective problem solving has led to the creation of exceptional software projects. However, amidst this collaborative landscape, the prevalence of negative discourse, often manifested as toxic comments, causes substantial harm on developers, diminishing their well-being, motivation, job satisfaction, and productivity [1–10]. In a 2017 GitHub survey, it was found that 50% of OSS developers experienced negative interactions. Among those, 21% mentioned that such behavior led them to stop contributing [11]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Mitigating negativity is essential to cultivate healthier and more productive software environments and retain talent [12–15]. Collaboration platforms such as GitHub has implemented preliminary measures to tackle negative behavior, such as issue locking [16], but such manual inspection remains labor-intensive due to the sheer volume of daily content. More recently, machine learningbased techniques for detecting toxicity in software-related text have started emerging [1, 12, 17, 18]. However, these models often show a high false positive rate and limited generalizability across different communication types (e.g., issue comments , code reviews) [19]. Creating effective toxicity detection models is challenging due to limited open-source toxicity datasets [4, 17, 20]. Additionally, these datasets are often imbalanced, with just 6 out of 1000 issues being toxic [1], making training effective models a hurdle. Therefore, there is a significant gap in the development and adoption of effective automated techniques for identifying toxic conversations in software engineering platforms. Large Language Models (LLMs) have recently gained prominence as a powerful category of deep learning technique, demonstrating their effectiveness in related tasks such as emotion and sentiment analysis [21–33]. Some of the most substantial and influential LLMs, such as ChatGPT [34], are readily available that can be deployed as a “zero-shot"" model, without requiring specific fine-tuning for a particular task. Given that creating an extensive training dataset for toxicity detection in software engineering communication is costly and resource-intensive, utilizing a zero-shot approach offers an attractive alternative. In this paper, we explore ChatGPT [34] in detecting toxicity in software-related text. We use a benchmark toxicity dataset of 1597 GitHub issue comments [1] to evaluate the model, and conduct a qualitative analysis to understand the common errors. Specifically, we investigate the following research questions: • RQ1. How effective is OpenAI’s ChatGPT in detecting toxic text on GitHub? • RQ2. What types of toxic comments are misclassified or difficult to detect using ChatGPT? Our preliminary findings suggest that ChatGPT shows promise in detecting toxicity in GitHub, achieving a precision of 0.49 and recall of 0.94. This result is comparable to the state-of-the-art domainspecific toxicity detectors (e.g., Raman et al. [1] showed a precision of 0.91 and a recall of 0.42 on the same dataset). We explore different prompts, including those intended for explaining model results, thus improving model interpretability, and thus opening up possibilities for integrating ChatGPT-supported toxicity detection into developer communication platforms. We also show an example implementation of possible proactive moderation of toxic content by integrating ChatGPT into Slack, a popular developer chat platform." 2312.13119v1,"Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs Xin Jin ∗† Charalampos Katsis ∗† Fan Sang ∗† The Ohio State University jin.967@osu.edu Purdue University ckatsis@purdue.edu Georgia Institute of Technology fsang@gatech.edu Jiahao Sun † Elisa Bertino Ramana Rao Kompella Georgia Institute of Technology jiahaosun@gatech.edu Purdue University bertino@purdue.edu Cisco Research rkompell@cisco.com Ashish Kundu Cisco Research ashkundu@cisco.com exponentially, providing attackers with numerous entry points [26]. Moreover, the interconnected nature of networks intensifies the impact of a single vulnerability, enabling adversaries to navigate interconnected systems and compromise multiple hosts and devices. Finally, hundreds of vulnerabilities are disclosed monthly in the national vulnerability databases; thus, an approach to evaluating and understanding their impact is of paramount importance for several reasons, such as prioritizing patching efforts. Faced with those complex challenges, ensuring a robust security posture is thus critical in today’s dynamic landscape of enterprise networks, where strategies, policies, and practices collectively fortify an organization’s cybersecurity defense. Problem Scope. Given the expanding attack surface, we need comprehensive systems able not only to identify vulnerabilities specific to the infrastructure of interest but also to discern how these vulnerabilities can be exploited in sequences. Our goal is to develop a solution that leverages attack graphs to (1) understand how vulnerabilities might serve as a sequence of steps in a multi-step attack and (2) scrutinize and grasp the implications of a vulnerability on the infrastructure under analysis. The system implementing the solution should incorporate continuous monitoring to detect known vulnerabilities across host applications, devices, and their configurations. Additionally, a deep understanding of the nature and impact of each vulnerability is essential to tailor effective approaches for mitigation by subject matter experts. Challenges. Designing such a system requires addressing the following challenges: (C1) The vulnerabilities are typically described in natural language (i.e., common vulnerabilities and exposures – CVE) rather than in a formally defined encoded format. Therefore, a systematic approach is needed to capture the vulnerability semantics and convert them into a suitable format for further analysis. (C2) The formulation of attack paths constituting a chain of vulnerabilities to the attacker’s objectives with the least manual effort requires extracting the conditions that allow one to exploit a vulnerability (i.e., preconditions) and the state of the system once a vulnerability is exploited (i.e., postconditions). (C3) Finally, it is hard to come up with security quantification metrics that capture both the criticality of vulnerabilities and the impact on the system under analysis. ABSTRACT The rampant occurrence of cybersecurity breaches imposes substantial limitations on the progress of network infrastructures, leading to compromised data, financial losses, potential harm to individuals, and disruptions in essential services. The current security landscape demands the urgent development of a holistic security assessment solution that encompasses vulnerability analysis and investigates the potential exploitation of these vulnerabilities as attack paths. In this paper, we propose Prometheus, an advanced system designed to provide a detailed analysis of the security posture of computing infrastructures. Using user-provided information, such as device details and software versions, Prometheus performs a comprehensive security assessment. This assessment includes identifying associated vulnerabilities and constructing potential attack graphs that adversaries can exploit. Furthermore, Prometheus evaluates the exploitability of these attack paths and quantifies the overall security posture through a scoring mechanism. The system takes a holistic approach by analyzing security layers encompassing hardware, system, network, and cryptography. Furthermore, Prometheus delves into the interconnections between these layers, exploring how vulnerabilities in one layer can be leveraged to exploit vulnerabilities in others. In this paper, we present the end-to-end pipeline implemented in Prometheus, showcasing the systematic approach adopted for conducting this thorough security analysis. 1 INTRODUCTION The escalating complexity of enterprise networks has resulted in environments highly susceptible to cyber-attacks [13]. The proliferation of thousands of applications deployed on network hosts and the influx of software packages from diverse sources, whether active or dormant, significantly magnify security concerns. The presence of such a diverse range of software raises questions about the potential vulnerabilities they may introduce to the network. The intricate network of interconnected devices, coupled with emerging technologies such as cloud computing, Internet of Things (IoT) devices, and interconnected systems, expands the attack surface ∗ These authors contributed equally to this work. † This work was partially completed during the authors’ internship at Cisco Research. 1" 2312.13139v1,"Preprint. U NLEASHING L ARGE -S CALE V IDEO G ENERATIVE P RE - TRAINING FOR V ISUAL R OBOT M ANIPULATION Hongtao Wu, Ya Jing, Chilam Cheang, Guangzeng Chen, Jiafeng Xu, Xinghang Li, Minghuan Liu, Hang Li, Tao Kong † ByteDance Research {wuhongtao.123,kongtao}@bytedance.com A BSTRACT Generative pre-trained models have demonstrated remarkable effectiveness in language and vision domains by learning useful representations. In this paper, we extend the scope of this effectiveness by showing that visual robot manipulation can significantly benefit from large-scale video generative pre-training. We introduce GR-1, a straightforward GPT-style model designed for multi-task languageconditioned visual robot manipulation. GR-1 takes as inputs a language instruction, a sequence of observation images, and a sequence of robot states. It predicts robot actions as well as future images in an end-to-end manner. Thanks to a flexible design, GR-1 can be seamlessly finetuned on robot data after pre-trained on a large-scale video dataset. We perform extensive experiments on the challenging CALVIN benchmark and a real robot. On CALVIN benchmark, our method outperforms state-of-the-art baseline methods and improves the success rate from 88.9% to 94.9%. In the setting of zero-shot unseen scene generalization, GR-1 improves the success rate from 53.3% to 85.4%. In real robot experiments, GR-1 also outperforms baseline methods and shows strong potentials in generalization to unseen scenes and objects. We provide inaugural evidence that a unified GPT- style transformer, augmented with large-scale video generative pre-training, exhibits remarkable generalization to multi-task visual robot manipulation. Project page: https://GR1-Manipulation.github.io 1 I NTRODUCTION Recently, generative pre-trained models have demonstrated impressive performance in both natural language processing (NLP) and computer vision (CV) (Brown et al., 2020; Chen et al., 2020; He et al., 2022; Touvron et al., 2023). They model sequences of inputs in a generative manner and pre-train on large-scale datasets before finetuning on specific tasks. Large-scale pre-training allows these models to learn general patterns from large datasets and thus enables them to easily generalize to related finetuning tasks with inherited generalizability and robustness. Robotics data is also generative in a sense that the observation is only revealed after the action is taken. However, unlike NLP and CV, robot data is sparse, as its collection often requires costly and time-consuming human demonstrations. Moreover, robot data is multi-modal, including images, robot states, actions, and language instructions. To address these challenges, prior research has delved into diverse pre-training methods, aiming to enhance the learning capabilities of robots (Nair et al., 2022; Radosavovic et al., 2022; Seo et al., 2023; Radosavovic et al., 2023; Parisi et al., 2022; Shah et al., 2023; Lin et al., 2023; Kumar et al., 2022; Liu et al., 2022; Yen-Chen et al., 2020). In this paper, we adapt similar generative pre-training paradigm for tackling the challenging problem of multi-task language-conditioned visual robot manipulation. We argue that video generative pre-training is a closely related task to robot action learning for the reason that a robot trajectory itself contains a video sequence. The ability to forecast future frames based on past images and language instructions empowers the robot to anticipate forthcoming events, thereby facilitating the † Corresponding author. 1" 2312.13156v1,"A CCIDENT GPT: ACCIDENT ANALYSIS AND PREVENTION FROM V2X E NVIRONMENTAL P ERCEPTION WITH M ULTI - MODAL L ARGE M ODEL Lening W ang a,b , Han Jiang a , P inlong Cai b , Daocheng F u b , T ianqi W ang c , Zhiyong Cui ∗ a , Y ilong Ren ∗ a , Haiyang Y u ∗ a , Xuesong W ang d , and Y inhai W ang e a Beihang University, Beijing, China, 100191 {leningwang; buaajh; zhiyongc; yilongren; hyyu} @buaa.edu.cn b Shanghai Artificial Intelligence Laboratory, Shanghai, China, 200232 {caipinlong; fudaocheng}@pjlab.org.cn c The Chinese University of Hong Kong, Hong Kong, China, 999077 wangtq@connect.hku.hk d Tongji University, Shanghai, China, 201804 wangxs@tongji.edu.cn e University of Washington, Washington, United States, 98195-2700 yinhai@uw.edu * Corresponding author A BSTRACT Traffic accidents, being a significant contributor to both human casualties and property damage, have long been a focal point of research for many scholars in the field of traffic safety. However, previous studies, whether focusing on static environmental assessments or dynamic driving analyses, as well as pre-accident predictions or post-accident rule analyses, have typically been conducted in isolation. There has been a lack of an effective framework for developing a comprehensive understanding and application of traffic safety. To address this gap, this paper introduces AccidentGPT, a comprehensive accident analysis and prevention multi-modal large model. AccidentGPT establishes a multi-modal information interaction framework grounded in multi-sensor perception, thereby enabling a holistic approach to accident analysis and prevention in the field of traffic safety. Specifically, our capabilities can be categorized as follows: for autonomous driving vehicles, we provide comprehensive environmental perception and understanding to control the vehicle and avoid collisions. For human-driven vehicles, we offer proactive long-range safety warnings and blind-spot alerts while also providing safety driving recommendations and behavioral norms through human-machine dialogue and interaction. Additionally, for traffic police and management agencies, our framework supports intelligent and real-time analysis of traffic safety, encompassing pedestrian, vehicles, roads, and the environment through collaborative perception from multiple vehicles and road testing devices. The system is also capable of providing a thorough analysis of accident causes and liability after vehicle collisions. Our framework stands as the first large model to integrate comprehensive scene understanding into traffic safety studies. Project page: https://accidentgpt.github.io Keywords traffic accident analysis and safety · multi-modal large model · collaborative perception · human-machine interaction 1 Introduction Like the majority of research in traffic safety, the study of accident analysis and prevention, aiming to enhance the safety of the traffic system and reduce casualties and property losses, is a necessary endeavor [1, 2, 3]. In previous" 2312.13157v1,"Leptogenesis from a Phase Transition in a Dynamical Vacuum Dipendu Bhandari, 1, ∗ Arghyajit Datta, 2, 3, † and Arunansu Sil 1, ‡ 2 1 Department of Physics, Indian Institute of Technology Guwahati, Assam-781039, India Center for Precision Neutrino Research, Chonnam National University, Gwangju 61186, Republic of Korea 3 Department of Physics, Kyungpook National University, Daegu 41566, Republic of Korea We show that a phase transition may take place in the early Universe at a temperature T ∗ via a Standard Model singlet scalar field which happens to couple to right handed neutrinos (RHN) resulting a temperature dependent mass for them that finally relaxes to a constant value after electroweak phase transition (EWPT). As a result, a requisite amount of lepton asymmetry can be produced at a temperature close to T ∗ satisfying the observed baryon asymmetry of the Universe via sphaleron process even when the zero temperature masses of the RHNs fall in sub GeV regime providing a testable scenario for leptogenesis. Interestingly, the framework is also capable of predicting a primordial lepton asymmetry (generated at a temperature below the EWPT), as hinted by helium abundance measuring experiments, bearing a correlation with early phase of leptogenesis. The precise measurement of cosmological parameters by PLANCK [1] and prediction of the big-bang nucleosynthesis (BBN) [2] point toward a visible Universe with an excess of baryonic matter over antimatter, quantified as n B /s = 8.72 ± 0.06 × 10 −11 [1]. In order to address the origin of such an excess, among many possibilities, production of lepton asymmetry (leptogenesis [3–6]) from the out-of-equilibrium decay of heavy Standard Model (SM) singlet right-handed neutrinos (RHN) N i into SM lepton (ℓ TL = (ν L , e L )) and Higgs (H) doublets, turns out to be the most motivated one as it can simultaneously account for the origin of neutrino mass via Type-I seesaw [7–13] mechanism. Eventually this lepton asymmetry gets converted to baryon asymmetry partially by sphaleron process [14–18] before it decouples from bath (at temperature T sp ) around the critical temperature T c , marking the onset of EWPT. The Lagrangian relevant for Type-I seesaw (in the charged lepton and RHN mass diagonal basis) is expressed as: quasi-degenerate RHNs, the associated CP asymmetry can be resonantly enhanced [21–24] which may bring the scale of RHN mass down to TeV scale 2 . In an endeavor to bring this RHN mass scale further down so as to enhance its detection possibility, the first obstacle one would face is related to the decoupling of the sphaleron process at T sp as below this temperature the lepton asymmetry, even produced, can’t be converted to baryon asymmetry. The ambiguity in specifying the RHN mass scale (small or large) is further amplified noticing that the corresponding bare mass term in the Lagrangian is not protected by any symmetry and in principle may assume any values upto the Planck scale. A compelling alternative is available in the literature by introducing additional symmetry like U (1) B−L [27, 28] and a symmetry breaking (SM scalar singlet) field ϕ having an interaction term, 1 −L I = ℓ̄ L α (Y ν ) αi H̃N i + N i c M i N i + h.c., 2 Once the symmetry is spontaneously broken by the vacuum expectation value (vev) of ϕ (v ϕ ), a Majorana mass term for the RHN, M i = α i v ϕ , follows. We further venture into this possibility noticing that such a vev may evolve dynamically over a period of time in the expanding (radiation dominated) Universe with temperature T before settling to a constant value. It turns out that a temperature dependent behavior of v ϕ (T ) can approximately be parametrised as   ; T > T ∗ ,  0 (3) v ϕ (T ) ≃ AT 2 ; T c < T ≤ T ∗ ,   AT 2 + Bv 2 (T ) ; T < T , c (1) where i = 1, 2 (for minimal scenario) and α = e, µ, τ in general. Due to the seesawing nature of the light neutrino masses (m ν = v 2 Y ν M −1 Y ν T /2 with M = diagJM i K and v = 246 GeV), these RHNs are naturally (without any fine tuning within Yukawa entries) thought to be very heavy ones. However, such a speculation is against the possibility of finding them in experiments. Also, from the thermal leptogenesis point of view, the mass of the lightest RHN (N 1 ) responsible for successful leptogenesis is bounded by M 1 ≳ 10 9 GeV (known as Davidson-Ibarra (DI) bound [19]) for hierarchical RHNs 1 . Alongside, with ∗ dbhandari@iitg.ac.in † arghyad053@gmail.com ‡ asil@iitg.ac.in 1 Note that this bound remains valid as long as the lepton asymme- try is generated in the radiation dominated phase after the end −L int = 1 α i ϕN i c N i . 2 (2) of reheating. However for leptogenesis during reheating phase a modified bound on the lightest RHN will be observed. See [20] for details. 2 An alternative scenario [25, 26] exists where instead of RHN decay, leptogenesis is governed by Higgs decay which is found to be efficient within T sp and T c ." 2312.13159v1,"TAMARI INTERVALS AND BLOSSOMING TREES WENJIE FANG ∗ , ÉRIC FUSY ∗ AND PHILIPPE NADEAU † Abstract. We introduce a simple bijection between Tamari intervals and the blossoming trees (Poulalhon and Schaeffer, 2006) encoding planar triangulations, using a new meandering representation of such trees. Its specializations to the families of synchronized, Kreweras, new/modern, and infinitely modern intervals give a combinatorial proof of the counting formula for each family. Compared to (Bernardi and Bonichon, 2009), our bijection behaves well with the duality of Tamari intervals, enabling also the counting of self-dual intervals. 1. Introduction The Tamari lattice Tam n is a well-known poset on Catalan objects of size n, that plays an important role in several domains, such as representation theory [BMFPR11, BPR12] and polyhedral combinatorics and Hopf algebra [BCP23, LR98]. Motivated in part by such links, the enumeration of intervals in the Tamari lattice was first considered by Chapoton [Cha06] who discovered the beautiful formula   2 4n + 1 (1) I n = n(n + 1) n − 1 for the number of intervals in Tam n . The subject has attracted much attention since then, with strikingly simple counting formulas found for several other families [BMCPR13, BMFPR11, FPR17]. As for combinatorial proofs, Bernardi and Bonichon [BB09] gave a bijection between Tamari intervals and planar (simple) triangulations via Schnyder woods. Then, a bijection by Poulalhon and Schaeffer [PS06] encodes the same triangulations by a class of blossoming trees, which yields (1). The bijection in [BB09] can be specialized to some subfamilies of Tamari intervals, such as Kreweras intervals [BB09] and synchronized Tamari intervals [FH23]. Another strategy, for instance in [Fan18, Fan21a, FPR17, PR12], is to construct bijections between Tamari intervals and planar maps inspired by their recursive decompositions. With a similar approach, bijections between Tamari intervals and planar maps via certain branching polyominoes called fighting fish [DGRS17] have been recently developed [DH22]. In this article, we present a more direct bijection denote Φ between Tamari intervals and the blossoming trees from [PS06]. Our construction proceeds via certain ∗ LIGM, CNRS, Univ. Gustave Eiffel, ESIEE Paris, F-77454 Marne-la-Vallée, France. Email address: {eric.fusy,wenjie.fang}@univ-eiffel.fr † Univ Lyon, CNRS, Université Claude Bernard Lyon 1, Institut Camille Jordan, F69622 Villeurbanne Cedex, France. Email address: nadeau@math.univ-lyon1.fr . 1" 2312.13211v1,"DSFormer: Effective Compression of Text-Transformers by Dense-Sparse Weight Factorization Rahul Chand* Microsoft Research chandrahul0320@gmail.com Yashoteja Prabhu Pratyush Kumar Microsoft Research Microsoft Research & IIT Madras yprabhu@microsoft.com pratyush@iitm.ac.in Abstract With the tremendous success of large transformer models in natural language understanding, down-sizing them for cost-effective deployments has become critical. Recent studies have explored the low-rank weight factorization techniques which are efficient to train, and apply out-of-the-box to any transformer architecture. Unfortunately, the low-rank assumption tends to be over-restrictive and hinders the expressiveness of the compressed model. This paper proposes, DSFormer, a simple alternative factorization scheme which expresses a target weight matrix as the product of a small dense and a semi-structured sparse matrix. The resulting approximation is more faithful to the weight distribution in transformers and therefore achieves a stronger efficiency-accuracy trade-off. Another concern with existing factorizers is their dependence on a task-unaware initialization step which degrades the accuracy of the resulting model. DSFormer addresses this issue through a novel Straight-Through Factorizer (STF) algorithm that jointly learns all the weight factorizations to directly maximize the final task accuracy. Extensive experiments on multiple natural language understanding benchmarks demonstrate that DSFormer obtains up to 40% better compression than the state-of-the-art low-rank factorizers, leading semi-structured sparsity baselines and popular knowledge distillation approaches. Our approach is also orthogonal to mainstream compressors and offers up to 50% additional compression when added to popular distilled, layer-shared and quantized transformers. We empirically evaluate the benefits of STF over conventional optimization practices. 1 Introduction Large pre-trained transformer models such as BERT (Devlin et al., 2019) have achieved tremen- *Work completed during time at Microsoft Research dous success in various natural language understanding (NLU) tasks including text classification (Wang et al., 2018), question answering (Rajpurkar et al., 2016), and summarization (Liu, 2019). Unfortunately, these large models also incur exorbitant serving costs when deployed in practical applications. In addition, they are unaffordable for resource-constrained settings such as inference on mobile or edge devices. This has inspired recent research on down-sizing these models without significant quality degradation. The model compression approaches exploit the parameter redundancies present in a pre-trained model (Frankle and Carbin, 2019) to learn a smaller task-specific network with reduced working memory, storage, runtime or energy demands. A popular technique for transformer compression is to distil the knowledge of a pre-trained teacher network into a small student network by training from a large corpus (Sanh et al., 2019; Jiao et al., 2020). The distillation approaches have been shown to achieve high compression ratios but require extravagant training and student architecture search which limit its utility and generality. The other mainstream approaches involve accelerating the attention dot products (Kitaev et al., 2020), parameter sharing across network layers (Lan et al., 2020) or quantizing individual weights of a network (Bai et al., 2021). These only reduce model size or inference time or are dependent on specialized hardware. Another line of recent work explores the use of lightweight low-rank factorization techniques to derive an efficient and generic compression scheme (Chen et al., 2021; Hsu et al., 2022). These approaches decompose the dense weight matrices, which account for a major portion of a transformer’s model size, as product of two smaller matrices. This also accelerates the expensive dense matrix multiplication operations in the multi-head attention and feed-forward layers at inference time. Such factorization techniques are applicable to" 2312.13225v1,"Automated DevOps Pipeline Generation for Code Repositories using Large Language Models Deep Mehta, Kartik Rawool, Subodh Gujar, Bowen Xu North Carolina State University Raleigh, North Carolina, USA {dmmehta2,khrawool,sgujar,bxu22}@ncsu.edu ABSTRACT Automating software development processes through the orchestration of GitHub Action workflows has revolutionized the efficiency and agility of software delivery pipelines. This paper presents a detailed investigation into the use of Large Language Models (LLMs) – specifically, GPT 3.5 and GPT 4 – to generate and evaluate GitHub Action workflows for DevOps tasks. Our methodology involves data collection from public GitHub repositories, prompt engineering for LLM utilization, and evaluation metrics encompassing exact match scores, BLEU scores, and a novel DevOps Aware score. The research scrutinizes the proficiency of GPT 3.5 and GPT 4 in generating GitHub workflows, while assessing the influence of various prompt elements in constructing the most efficient pipeline. Results indicate substantial advancements in GPT 4, particularly in DevOps awareness and syntax correctness. The research introduces a GitHub App built on Probot, empowering users to automate workflow generation within GitHub ecosystem. This study contributes insights into the evolving landscape of AI-driven automation in DevOps practices. 1 INTRODUCTION Automation has become integral to modern software development, and GitHub Action workflows stand as a pivotal tool in orchestrating streamlined software delivery pipelines. This paper delves into an in-depth exploration of Large Language Models (LLMs), specifically GPT 3.5 and GPT 4, to generate and evaluate GitHub Action workflows tailored for DevOps tasks. Our research methodology involves the curation of pertinent data from public GitHub repositories and the engineering of prompts to guide LLMs in workflow generation. Evaluation metrics, including exact match scores, BLEU scores, and a newly introduced DevOps Aware score, assess the fidelity of generated workflows to DevOps best practices. Moreover, a pivotal contribution of this research is the development of a dedicated GitHub App. This App capitalizes on the capabilities of LLMs, allowing seamless workflow generation for any GitHub repository and immediate commit into the repository itself. This innovative tool empowers developers by automating the generation and integration of workflows directly into their projects, streamlining their software development lifecycle. The outcomes of this research present promising advancements, particularly in the enhanced capabilities of GPT 4, exhibiting heightened DevOps awareness and improved syntactic accuracy. The GitHub App’s development further signifies the practical application of AI-driven models in the realm of DevOps practices, albeit with identified limitations. 2 RELATED WORK In the work titled ""Let’s Supercharge the Workflows: An Empirical Study of GitHub Actions"" [1], an in-depth analysis is conducted on the usage patterns of GitHub Actions. Findings reveal that during the GitHub Actions configuration, developers are required to set multiple components, each presenting numerous alternatives. This complexity poses a challenge for less experienced developers in configuring a suitable GitHub Action Workflow. Furthermore, the study highlights the dependence of the GitHub Action configuration process on developers’ personal experience, suggesting a need for assistive tools to facilitate the configuration of GitHub Actions. This paper [2] addresses the gap of domain specific language models by focusing on Ansible-YAML, a widely employed markup language for IT Automation. The proposed solution, Ansible Wisdom, is a transformer-based model, uniquely trained on a dataset containing Ansible-YAML. To comprehensively assess its performance, the paper introduces two novel performance metrics tailored for YAML and Ansible, aimed at capturing the distinctive characteristics inherent to this specialized domain. 3 METHOD AND IMPLEMENTATION In the section, we details the core design (i.e., prompt engineering) in Section 3.1 and implementation in Section 3.2 of our method DevOps-LLM-Bot. 3.1 Prompt Engineering For generating a YAML file for a given repository, ideally, the more information about the repository in the prompt, the better performance is expected to be achieved. However, in practice, due to the token limit and also the imperfection of the LLM, we integrate our expert knowledge as the feature of the task into the prompt. In this work, we customize the prompt with the following 2 parts as our first attempt. Particularly, for designing context, we consider 2 pieces of task-specific information, which are file structure and default branch based on our observation. For example, Figure 1 presents a real-world YAML file 1 . It carries both information about file structure (i.e. requirements.txt in the install step, ) and branch (i.e. master while defining workflow triggers, ). 3.2 Tool We develop a tool based on GitHub App 2 . Figure 2 describes the architecture of this app built on top of Probot framework, which responds to the following events: 1 https://github.com/ajcr/rolling/blob/master/.github/workflows/python- package.yml 2 https://github.com/apps/devops-llm-bot" 2312.13241v1,"Deterministic Ansätze for the Variational Quantum Eigensolver Measurement-based Anna Schroeder 1,2 , Matthias Heller 3,4 , and Mariami Gachechiladze 2 1 Merck KGaA, Darmstadt, Germany 2 Department of Computer Science, Technical University of Darmstadt, Darmstadt, Germany 3 Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany 4 Interactive Graphics Systems Group, Technical University of Darmstadt, Darmstadt, Germany Measurement-based quantum computing (MBQC) is a promising approach to reducing circuit depth in noisy intermediate-scale quantum algorithms such as the Variational Quantum Eigensolver (VQE). Unlike gate-based computing, MBQC employs local measurements on a preprepared resource state, offering a trade-off between circuit depth and qubit count. Ensuring determinism is crucial to MBQC, particularly in the VQE context, as a lack of flow in measurement patterns leads to evaluating the cost function at irrelevant locations. This study introduces MBVQE-ansätze that respect determinism and resemble the widely used problemagnostic hardware-efficient VQE ansatz. We evaluate our approach using ideal simulations on the Schwinger Hamiltonian and XY -model and perform experiments on IBM hardware with an adaptive measurement capability. In our use case, we find that ensuring determinism works better via postselection than by adaptive measurements at the expense of increased sampling cost. Additionally, we propose an efficient MBQC-inspired method to prepare the resource state, specifically the cluster state, on hardware with heavy-hex connectivity, requiring a single measurement round, and implement this scheme on quantum computers with 27 and 127 qubits. We observe notable improvements for larger cluster states, although direct gate-based implementation achieves higher fidelity for smaller instances. lems tailored to a particular hardware [1–3], attaining computational speedup for problems with practical applications remains an important challenge. On the one hand, we already have Shor’s algorithm [4] and concepts from error-correction [5] to solve the factoring problem more efficiently than on any classical supercomputers, but such fault-tolerant schemes have stringent and potentially prohibitive requirements. On the other hand, quantum devices available today are noisy, have a limited number of qubits, and can only operate short quantum circuits on which we can endeavor to solve practical problems. Therefore, the greatest challenge for the foreseeable future is figuring out how to utilize noisy and intermediate-scale quantum (NISQ) hardware. Hybrid quantum-classical algorithms and specifically the variational methods, which embed the problems into parameterized short-depth quantum circuits and employ the classical optimization routines to find the quantum circuits that best solve the problem at hand, have attracted significant interest [6–9]. They address the problem of estimating the ground state energy of a quantum many-body Hamiltonian and have applications in quantum chemistry [9–11], highenergy physics [12–14], materials science [15], and classical optimization [16, 17]. Alongside the success, this approach suffers from a few challenges: in general, training variational quantum algorithms is NP- hard [18] and the error-mitigation might require a superpolynomial number of samples even for logarithmically shallow circuits, threatening any possible quantum advantage [19]. Even though a few methods have been proposed to ease the former problem [20–24], the latter looks more terminal. For significant classes of local Hamiltonians, any circuit aiming to prepare the ground state must have at least logarithmic depth [25–27], which poses the trade-off, one either resorts to inadequate approximation of the ground state, or the noise takes over the computation. In general, optimizing the depth of variational quantum algorithms is strongly QCMA-hard [28]. 1 Introduction The notion of quantum advantage is a highly intriguing application of quantum mechanics. Although it has been successfully showcased in computing prob- Anna Schroeder: anna.schroeder@merckgroup.com Matthias Heller: matthias.heller@igd.fraunhofer.de Mariami Gachechiladze: mariami.gachechiladze@tu-darmstadt.de Here, we tackle the second problem. We propose a hardware-efficient protocol that borrows tools from measurement-based quantum computation [29, 30], 1" 2312.13244v1,"universe Article Mass Distribution and Maximum Mass of Neutron Stars: Effects of Orbital Inclination Angle Lívia S. Rocha * ,† , Jorge E. Horvath and Marcio G. B. de Avellar , Lucas M. de Sá , Gustavo Y. Chinen , Lucas G. Barão Departamento de Astronomia, Instituto de Astronomia, Geofísica e Ciências Atmosféricas (IAG), Universidade de São Paulo, R. do Matão 1226, C. Universitária, São Paulo 05508-090, Brazil; foton@iag.usp.br (J.E.H.); lucasmdesa@usp.br (L.M.d.S.); gutavo.chinen@usp.br (G.Y.C.); lucasgbarao@usp.br (L.G.B.); marcio.avellar@alumni.usp.br (M.G.B.d.A.) * Correspondence: livia.silva.rocha@usp.br Abstract: Matter at ultra-high densities finds a physical realization inside neutron stars. One key property is their maximum mass, which has far-reaching implications for astrophysics and the equation of state of ultra dense matter. In this work, we employ Bayesian analysis to scrutinize the mass distribution and maximum mass threshold of galactic neutron stars. We compare two distinct models to assess the impact of assuming a uniform distribution for the most important quantity, the cosine of orbital inclination angles (i), which has been a common practice in previous analyses. This prevailing assumption yields a maximum mass of 2.25 M ⊙ (2.15–3.32 M ⊙ within 90% confidence), with a strong peak around the maximum value. However, in the second model, which 0.87 indirectly includes observational constraints of i, the analysis supports a mass limit of 2.56 + − 0.58 M ⊙ (2σ uncertainty), a result that points in the same direction as some recent results gathered from gravitational wave observations, although their statistics are still limited. This work stresses the importance of an accurate treatment of orbital inclination angles, and contributes to the ongoing debate about the maximum neutron star mass, further emphasizing the critical role of uncertainties in the individual neutron star mass determinations. Keywords: neutron stars; mass distribution; TOV mass Citation: Rocha, L.S.; Horvath, J.E.; de Sá, L.M.; Chinen, G.Y.; Barão, L.G.; de Avellar, M.G.B. Mass Distribution and Maximum Mass of Neutron Stars: Effects of Orbital Inclination Angle. Universe 2023, 1, 0. https://doi.org/ Academic Editor(s): Name Received: 30 October 2023 Revised: 9 December 2023 Accepted: 17 December 2023 Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). 1. Introduction More than fifty years after the detection of the first pulsar [1], these compact objects continue to challenge our understanding. The study of neutron stars (hereafter NSs), of which pulsars are a subset, provides insights into fundamental aspects of the Universe, ranging from the state of matter at ultra-high densities to interstellar enrichment with heavy elements. Additionally, they offer the most precise tests for General Relativity (GR) [2] and contribute to the understanding of stellar evolution and binary interactions. The importance of studying such stars is clear, and the last 10–15 years of research have brought about paradigm shifts, correcting previously unquestioned beliefs in the field. The proposal that NSs are formed at the end of the life of massive progenitor stars, initially suggested by Baade and Zwicky [3], coupled with their known associations with supernova remnants [4], helped construct an evolutionary scenario for their formation. Despite an initial variety of ideas [5], the prevailing notion was that NSs are formed from the collapse of an Iron ( 56 Fe and neighbour isotopes) core, developed at the center of progenitor stars with initial masses ranging from 8 to 25 M ⊙ . A misleading association of the iron core before the collapse with the Chandrasekhar limit, together with early mass measurements, contributed to establishing a paradigm of a unique formation channel for NSs, with a mass scale around 1.4 M ⊙ and minimal dispersion [6]. Simultaneously, the existence of a mass limit predicted by the Tolman–Oppenheimer– Volkoff (TOV) equation, derived from the theory of GR and not from fermion degeneracy, Universe 2023, 1, 0. https://doi.org/10.3390/universe1010000 https://www.mdpi.com/journal/universe" 2312.13275v1,"SciPost Physics Codebases Submission CERN-TH-2023-238, Nikhef 2023-026, OUTP-23-16P Introduction to the PanScales framework, version 0.1 Melissa van Beekveld 1 , Mrinal Dasgupta 2 , Basem Kamal El-Menoufi 2,3 , Silvia Ferrario Ravasio 4 , Keith Hamilton 5 , Jack Helliwell 6 , Alexander Karlberg 4 , Rok Medves 6 , Pier Francesco Monni 4 , Gavin P. Salam 6,7 , Ludovic Scyboz 3,6 , Alba Soto-Ontoso 4 , Gregory Soyez 8 , Rob Verheyen 5 1 Nikhef, Theory Group, Science Park 105, 1098 XG, Amsterdam, The Netherlands 2 Department of Physics & Astronomy, University of Manchester, Manchester M13 9PL, United Kingdom 3 School of Physics and Astronomy, Monash University, Wellington Rd, Clayton VIC-3800, Australia 4 CERN, Theoretical Physics Department, CH-1211 Geneva 23, Switzerland 5 Department of Physics and Astronomy, University College London, London, WC1E 6BT, UK 6 Rudolf Peierls Centre for Theoretical Physics, Clarendon Laboratory, Parks Road, University of Oxford, Oxford OX1 3PU, UK 7 All Souls College, Oxford OX1 4AL, UK 8 Université Paris-Saclay, CNRS, CEA, Institut de physique théorique, 91191, Gif-sur-Yvette, France mbeekvel@nikhef.nl, mrinal.dasgupta@manchester.ac.uk, basem.el-menoufi@monash.edu, silvia.ferrario.ravasio@cern.ch, keith.hamilton@ucl.ac.uk, jack.helliwell@physics.ox.ac.uk, alexander.karlberg@cern.ch, pier.monni@cern.ch, gavin.salam@physics.ox.ac.uk, ludovic.scyboz@monash.edu, alba.soto.ontoso@cern.ch, gregory.soyez@ipht.fr Abstract In this article, we document version 0.1 of the PanScales code for parton shower simulations. With the help of a few examples, we discuss basic usage of the code, including tests of logarithmic accuracy of parton showers. We expose some of the numerical techniques underlying the logarithmic tests and include a description of how users can implement their own showers within the framework. Some of the simpler logarithmic tests can be performed in a few minutes on a modern laptop. As an early step towards phenomenology, we also outline some aspects of a preliminary interface to Pythia8.3, for access to its hard matrix elements and its hadronisation modules. The code is available from https://gitlab.com/panscales/panscales-0.X 1" 2312.13286v1,"Generative Multimodal Models are In-Context Learners Quan Sun 1∗ Yufeng Cui 1∗ Xiaosong Zhang 1∗ Fan Zhang 1∗ Qiying Yu 2,1∗ Zhengxiong Luo 1 Yueze Wang 1 Yongming Rao 1 Jingjing Liu 2 Tiejun Huang 1,3 Xinlong Wang 1† 1 Beijing Academy of Artificial Intelligence ∗ 2 Tsinghua University equal contribution † 3 Peking University project lead code & models: https://github.com/baaivision/Emu Abstract instructions – a capability that current multimodal models have yet to learn. Recently, generative pretrained language models have demonstrated strong in-context learning abilities [12, 22, 74]. By training a 37-billion-parameter model Emu2 and thoroughly evaluating it on diverse multimodal tasks, we demonstrate that a scaled-up multimodal generative pretrained model can harness similar in-context learning abilities and effectively generalize to unseen multimodal tasks. Emu2 is trained with a unified autoregressive objective: predict-the-next-multimodal-element (either visual embeddings or textual tokens). In this unified generative pretraining process, large-scale multimodal sequences (e.g., text, image-text pairs, and interleaved image-text-video) are used for model training. We measure Emu2’s capabilities of learning from a few examples or instructions on standard multimodal datasets, as well as new tasks unseen in the training set. Specifically, Emu2 is evaluated under two scenarios: (a) few-shot setting, where we allow as many examples as possible to fit the context window of the model; and (b) instruction tuning, where the model is tuned to follow specific instructions. Emu2 achieves promising results in the few-shot setting on a wide range of vision-language tasks. For example, it demonstrates state-of-the-art few-shot performance on multiple visual question-answering datasets. We observe a performance improvement when the number of examples in context increases. Figure 1 illustrates Emu2’s strong multimodal reasoning capabilities for tasks in the wild, e.g., recognition and counting in a specific format. Emu2 also learns to follow visual prompting in context (e.g., the circles laid on the images in Figure 1), even although it struggles at a smaller scale or at zero shot. As Emu2 is inherently equipped to handle interleaved text-image-video at both input and output, it serves as a powerful and versatile base model for diverse multimodal tasks, by following specific task instructions. For example, after instruct tuning with conversational data, The human ability to easily solve multimodal tasks in context (i.e., with only a few demonstrations or simple instructions), is what current multimodal systems have largely struggled to imitate. In this work, we demonstrate that the task-agnostic in-context learning capabilities of large multimodal models can be significantly enhanced by effective scaling-up. We introduce Emu2, a generative multimodal model with 37 billion parameters, trained on large-scale multimodal sequences with a unified autoregressive objective. Emu2 exhibits strong multimodal in-context learning abilities, even emerging to solve tasks that require on-the-fly reasoning, such as visual prompting and object-grounded generation. The model sets a new record on multiple multimodal understanding tasks in few-shot settings. When instruction-tuned to follow specific instructions, Emu2 further achieves new state-of-the-art on challenging tasks such as question answering benchmarks for large multimodal models and open-ended subject-driven generation. These achievements demonstrate that Emu2 can serve as a base model and general-purpose interface for a wide range of multimodal tasks. Code and models are publicly available to facilitate future research. 1. Introduction Multimodal tasks [26, 42] encompass anything involving understanding and generation in single or multiple modalities [5, 20, 59], which can be highly diverse and longtail. Previous multimodal systems largely rely on designing task-specific architecture and collecting a sizable supervised training set, both of which are difficult to scale, particularly when this process needs to be repeated for each new task encountered. By contrast, humans can solve a new task in context, i.e., with only a few demonstrations or simple † Correspondence to wangxinlong@baai.ac.cn 1" 2312.13303v1,"RealGen: Retrieval Augmented Generation for Controllable Traffic Scenarios * Wenhao Ding 1,2 * Yulong Cao 2 1 Carnegie Mellon University 2 Ding Zhao 1 Chaowei Xiao 2,3 Marco Pavone 2,4 NVIDIA 3 UW Madison 4 Stanford University wenhaod@andrew.cmu.edu, yulongc@nvidia.com Abstract Simulation plays a crucial role in the development of autonomous vehicles (AVs) due to the potential risks associated with real-world testing. Although significant progress has been made in the visual aspects of simulators, generating complex behavior among agents remains a formidable challenge. It is not only imperative to ensure realism in the scenarios generated but also essential to incorporate preferences and conditions to facilitate controllable generation for AV training and evaluation. Traditional methods, mainly relying on memorizing the distribution of training datasets, often fall short in generating unseen scenarios. Inspired by the success of retrieval augmented generation in large language models, we present RealGen, a novel retrieval-based in-context learning framework for traffic scenario generation. RealGen synthesizes new scenarios by combining behaviors from multiple retrieved examples in a gradient-free way, which may originate from templates or tagged scenarios. This in-context learning framework endows versatile generative capabilities, including the ability to edit scenarios, compose various behaviors, and produce critical scenarios. Evaluations show that RealGen offers considerable flexibility and controllability, marking a new direction in the field of controllable traffic scenario generation. Check our project website for more information: https://realgen.github.io. Figure 1. (a) Conventional methods make the model memorize the data distribution for generating. (b) In contrast, our method employs a retriever to query datasets (including external data obtained after training) and uses a generative model to generate scenarios by integrating the information from the retrieved scenarios of agent behavior remains constrained because of the complicated interactions among naturalistic agents. To counteract this issue, data-driven simulation has emerged as a promising approach in the realm of autonomous driving, which leverages real-world scenario datasets to accurately generate the behaviors of agents. With the rapid achievement of deep generative models [28] and imitation learning algorithms [31], current data-driven simulations [22, 37] can generate scenarios that closely mimic human driver behavior. However, the effectiveness of these simulations in accelerating the development of AV is limited. This limitation stems from the need for scenarios that meet specific conditions tailored for targeted training and evaluation. Achieving such controllability in simulations is challenging due to the complex nature of driving scenarios, which involve intricate interactions, diverse road layouts, and varying traffic regulations. In pursuit of controllability, existing work applies additional guidance, typically in the form of constraint functions [17, 62] or languages [49, 61], to pre-trained scenario generative models. Regularization of the generation process through these tools is straightforward and effective, yet it encounters two principal challenges. First, the training 1. Introduction Simulation is indispensable in the development of autonomous vehicles (AVs), primarily due to the considerable risks associated with training and evaluating these systems in real-world conditions. The biggest challenge in simulations lies in achieving realistic driving scenarios, as this realism influences the discrepancy between AV performance in simulated and actual environments. Although advancements in high-quality graphical engines have significantly enhanced the perception quality of simulators, the realism * Equal contribution 1" 2312.13304v1,"End-to-end Rain Streak Removal with RAW Images First Author GuoDong DU Institution1: National University of Singapore Institution1 address: 21 Lower Kent Ridge Rd, 119077 duguodong7@gmail.com Second Author HaoJian Deng Institution2 Harbin Institute of Technology, Shenzhen First line of institution2 address: Harbin Institute of Technology, Shenzhen Third author JiaHao Su Institution3: Harbin Institute of Technology, Shenzhen First line of institution3 address: Harbin Institute of Technology, Shenzhen Fourth author Yuan Huang Institution4: Waseda University First line of institution4: address West Waseda 1-6-1, Shinjuku ku, Tokyo Abstract In this work we address the problem of rain streak removal with RAW images. The general approach is firstly processing RAW data into RGB images and removing rain streak with RGB images. Actually the original information of rain in RAW images is affected by image signal processing (ISP) pipelines including none-linear algorithms, unexpected noise, artifacts and so on. It gains more benefit to directly remove rain in RAW data before being processed into RGB format. To solve this problem, we propose a joint solution for rain removal and RAW processing to obtain clean color images from rainy RAW image. [Method] To be specific, we generate rainy RAW data by converting color rain streak into RAW space and design simple but efficient RAW processing algorithms to synthesize both rainy and clean color images. The rainy color images are used as reference to help color corrections. [Result] Different backbones show that our method conduct a better result compared with several other state-ofthe-art deraining methods focused on color image. In addition, the proposed network generalizes well to other cameras beyond our selected RAW dataset. Finally, we give the result tested on images processed by different ISP pipelines to show the generalization performance of our model is bet- ter compared with methods on color images. 1. Introduction As a fundamental problem in computer vision, rain removal aims to reconstruct the visibility of objects and scenes in photos captured under rainy days. Since the atmospheric process is complicated, the visibility degradation caused by rain have different types in terms of raindrop size, rain density, and wind velocity [18]. For example, nearby rain streak can distort background scene content; adherent raindrops that fall and flow on camera lenses can obstruct or blur the scenes; distant rain accumulated throughout the scene, creating a mist-like phenomenon in a manner more similarly to fog. Rain removal has thus become a necessary preprocessing step for subsequent outdoor tasks, like visual tracking [24], person reidentification [17], or event detection [22]. In the last decade, we have witnessed a continuous progress on rain removal research with many methods for both video and images. While conventional methods utilize the prior knowledge of background scenes and encoding physical properties, most recent methods employ the data-driven manner and design specific convolution neural" 2312.13316v1,"ECAMP: Entity-centered Context-aware Medical Vision Language Pre-training Rongsheng Wang 1,3,5∗ Qingsong Yao 3,4∗ Haoran Lai 2,3,5 Zhiyang He 5 Xiaodong Tao 5 Zihang Jiang 2,3† S.Kevin Zhou 2,3,4† 1 School of Computer Science and Technology, University of Science and Technology of China 2 School of Biomedical Engineering & Suzhou Institute for Advanced Research, University of Science and Technology of China 3 Center for Medical Imaging, Robotics, Analytic Computing & Learning (MIRACLE). Suzhou Institute for Advanced Research, University of Science and Technology of China 4 Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology 5 Anhui IFLYTEK CO., Ltd. {rongsheng wang, Haoranlai}@mail.ustc.edu.cn {jzh0103, skevinzhou}@ustc.edu.cn yaoqingsong19@mails.ucas.edu.cn Abstract Despite significant advancements in medical visionlanguage pre-training, existing methods have largely overlooked the inherent entity-specific context within radiology reports and the complex cross-modality contextual relationships between text and images. To close this gap, we propose a novel Entity-centered Context-aware Medical Vision-language Pre-training (ECAMP) framework, which is designed to enable a more entity-centered and context-sensitive interpretation of medical data. Utilizing the recent powerful large language model, we distill entity-centered context from medical reports, which enables ECAMP to gain more effective supervision from the text modality. By further pre-training our model with carefully designed entity-aware, context-enhanced masked language modeling and context-guided super-resolution tasks, ECAMP significantly refines the interplay between text and image modalities, leading to an enhanced ability to extract entity-centered contextual features. Besides, our proposed multi-scale context fusion design also improves the semantic integration of both coarse and fine-level image representations, prompting better performance for multi-scale downstream applications. Combining these components leads to significant performance leaps over current state-ofthe-art methods and establishes a new standard for crossmodality learning in medical imaging, whose effectiveness ∗ † These authors contributed equally to this work Corresponding authors is demonstrated by our extensive experiments on various tasks including classification, segmentation, and detection across several public datasets. Code and models are available at https://github.com/ToniChopp/ECAMP. 1. Introduction By virtue of its exceptional accuracy and efficiency, deep learning (DL) is increasingly pivotal in medical image analysis [5, 25, 56, 63, 64]. However, precision is contingent upon large-scale and high-quality annotations, which require an extensive number of experienced medical professionals, rendering it a costly endeavor. Fortunately, the diagnosis and experiential knowledge [62] of radiologists are preserved in the form of paired reports and images, which provide valuable semantic context for training DL-based models. More notably, these supervised signals are relatively accessible at little to no additional costs. Cutting-edge algorithms [35] in medical visionlanguage pre-training (Med-VLP) primarily leverage the information-rich medical report-image pairs to learn generic representations from two aspects: contrastivebased methods align the text and image features at both global [13] and local [7, 12] levels; while reconstructionbased methods generate the masked words [2] and image patches [24] using cross-modality information [3]. Nevertheless, these methods still exhibit limitations in harnessing the potential of supervision in the report context. First, the linguistic challenge [38] posed by complex biomedical" 2312.13322v1,"Domain-Specific Code Language Models: Unraveling the Potential for HPC Codes and Tasks Tal Kadosh 1, 2 , Niranjan Hasabnis 3 , Vy A. Vo 3 , Nadav Schneider 1, 2 , Neva Krien, Mihai Capota 3 , Abdul Wasay 3 , Guy Tamir 4 , Ted Willke 3 , Nesreen Ahmed 3 , Yuval Pinter 1 , Timothy Mattson and Gal Oren 5, 6 1 Ben-Gurion University, Israel, 2 IAEC, Israel, 3 Intel Labs, United States, 4 Intel, United States, 5 NRCN, Israel, 6 Technion, Israel talkad@post.bgu.ac.il, niranjan.hasabnis@intel.com, vy.vo@intel.com, nadavsch@post.bgu.ac.il, nevo.krien@gmail.com, mihai.capota@intel.com, abdul.wasay@intel.com, guy.tamir@intel.com, ted.willke@intel.com, nesreen.k.ahmed@intel.com, pintery@bgu.ac.il, tim@timmattson.com, galoren@cs.technion.ac.il Large language models (LLMs) [5], particularly exemplified by models such as GPT-3 [6] and its successors [7], have demonstrated the potential to grasp intricate linguistic structure and context, sparking exploration of their applicability beyond natural language tasks. Recently, GPT-3.5 and GPT-4 have been deployed in conversational environments in the form of ChatGPT [8]. In parallel, the field of high-performance computing (HPC) has been tackling increasingly complex and data-intensive problems [9]. The field of HPC has experienced notable advancements in hardware, software, and algorithms, resulting in substantial improvements in computational performance and efficiency [10], [11]. Combining the two trends, integrating LMs into HPC workflows has emerged as a compelling avenue for innovation [12]. For instance, several recent efforts have applied LLMs for automatically inserting OpenMP pragmas or MPI functions in code [13]–[18], overcoming limitations of static tools [19]–[23]. Although existing LLMs have shown remarkable results on programming tasks [24], [25], such as code generation, bug fixing, etc., to our surprise, we found that they performed poorly on some of HPC-related programming tasks such as code parallelization, vectorization, etc. [12], [15], [16], [26]. This led us to ponder on several research questions: (i) How well do existing LLMs perform on domain-specific tasks such as those for HPC domain, (ii) Will more domain-specific training data help in improving the performance?, (iii) When applying LMs for a specific domain, do we finetune existing LMs, or should we train them from scratch? This last question is I. I NTRODUCTION specifically important in the context of training costs. For Recent breakthroughs in the field of AI have led significant instance, HPC-Coder [16], a recently-introduced LM for HPC attention to language models (LMs) due to their remarkable ca- tasks, is obtained by finetuning PolyCoder [27] on an HPC pabilities in natural language processing [4] and understanding. dataset; PolyCoder itself is a code LM (not specific to HPC) that is trained on 249 GB of code corpus that is made up of This research was supported by the Israeli Council for Higher Education (CHE) via the Data Science Research Center, Ben-Gurion University of the programs written in 12 programming languages. HPC-GPT [28], Negev, Israel; Intel Corporation (oneAPI CoE program); and the Lynn and LM4HPC [12], and AutoParLLM [29] rely on LLaMA as their William Frankel Center for Computer Science. Computational support was base model — with up to 34 billion parameters — or even provided by HPE HPC & AI Cloud [1], Intel Developer Cloud [2], and the NegevHPC project [3]. on GPT-4. Such setups looked counter-intuitive to us — Is it Abstract—With easier access to powerful compute resources, there is a growing trend in AI for software development to develop larger language models (LLMs) to address a variety of programming tasks. Even LLMs applied to tasks from the high-performance computing (HPC) domain are huge in size and demand expensive compute resources for training. This is partly because these LLMs for HPC tasks are obtained by finetuning existing LLMs that support several natural and/or programming languages. We found this design choice confusing — why do we need large LMs trained on natural languages and programming languages unrelated to HPC for HPC-specific tasks? In this line of work, we aim to question choices made by existing LLMs by developing smaller LMs for specific domains — we call them domain-specific LMs. Specifically, we start with HPC as a domain and build an HPC-specific LM, named M ONO C ODER , which is orders of magnitude smaller than existing LMs but delivers similar, if not better performance, on non-HPC and HPC tasks. Specifically, we pre-trained M ONO C ODER on an HPC-specific dataset (named HPC ORPUS ) of C and C++ programs mined from GitHub. We evaluated the performance of M ONO C ODER against conventional multi-lingual LLMs. Results demonstrate that M ONO C ODER , although much smaller than existing LMs, achieves similar results on normalized-perplexity tests and much better ones in CodeBLEU competence for high-performance and parallel code generations. Furthermore, fine-tuning the base model for the specific task of parallel code generation (OpenMP parallel for pragmas) demonstrates outstanding results compared to GPT, especially when local misleading semantics are removed by our novel pre-processor T OKOMPILER , showcasing the ability of domain-specific models to assist in HPC-relevant tasks. The sources of this work are available at our GitHub MonoCoder repository. 1" 2312.13331v1,"A Bayesian Spatial Berkson error approach to estimate small area opioid mortality rates accounting for population-at-risk uncertainty Emily N. Peterson a,∗ , Rachel C. Nethery b , Jarvis T. Chen b , Loni P. Tabb d , Brent A. Coull b , Frederic B. Piel c , Lance A. Waller a a Department of Biostatistics and Bioinformatics, Emory Rollibs School of Public Health, Atlanta, GA, USA b Department of Biostatistics, Harvard TH Chan School of Public Health, Boston, MA, USA c Department of Epidemiology and Biostatistics, School of Public Health, Imperial College London, London, UK d Department of Epidemiology and Biostatistics, Dornsife School of Public Health, Drexel University, Philadelphia, PA, USA Abstract Monitoring small-area geographical population trends in opioid mortality has large scale implications to informing preventative resource allocation. A common approach to obtain small area estimates of opioid mortality is to use a standard disease mapping approach in which population-atrisk estimates are treated as fixed and known. Assuming fixed populations ignores the uncertainty surrounding small area population estimates, which may bias risk estimates and under-estimate their associated uncertainties. We present a Bayesian Spatial Berkson Error (BSBE) model to incorporate population-at-risk uncertainty within a disease mapping model. We compare the BSBE approach to the naive (treating denominators as fixed) using simulation studies to illustrate potential bias resulting from this assumption. We show the application of the BSBE model to obtain 2020 opioid mortality risk estimates for 159 counties in GA accounting for population-at-risk uncertainty. Utilizing our proposed approach will help to inform interventions in opioid related public health responses, policies, and resource allocation. Additionally, we provide a general framework to improve in the estimation and mapping of health indicators. Keywords: Spatial uncertainty, Disease mapping, Berkson measurement error, Opioid mortality trends TABLE OF CONTENTS Page 1 2 Introduction 1 Methods 2.1 Description of population-at-risk uncertainty . . . . . . . . . . . . . . . . . . . 3 3 ∗ Corresponding Author Email address: emily.nancy.peterson@emory.edu (Emily N. Peterson) Preprint submitted to Elsevier Friday 22 nd December, 2023" 2312.13334v1,"1 Transparency and Privacy: The Role of Explainable AI and Federated Learning in Financial Fraud Detection Tomisin Awosika, Raj Mani Shukla, and Bernardi Pranggono School of Computing and Information Science, Anglia Ruskin University, UK Email: tma132@student.aru.ac.uk, raj.shukla@aru.ac.uk, bernardi.pranggono@aru.ac.uk Abstract—Fraudulent transactions and how to detect them remain a significant problem for financial institutions around the world. The need for advanced fraud detection systems to safeguard assets and maintain customer trust is paramount for financial institutions, but some factors make the development of effective and efficient fraud detection systems a challenge. One of such factors is the fact that fraudulent transactions are rare and that many transaction datasets are imbalanced; that is, there are fewer significant samples of fraudulent transactions than legitimate ones. This data imbalance can affect the performance or reliability of the fraud detection model. Moreover, due to the data privacy laws that all financial institutions are subject to follow, sharing customer data to facilitate a higher-performing centralized model is impossible. Furthermore, the fraud detection technique should be transparent so that it does not affect the user experience. Hence, this research introduces a novel approach using Federated Learning (FL) and Explainable AI (XAI) to address these challenges. FL enables financial institutions to collaboratively train a model to detect fraudulent transactions without directly sharing customer data, thereby preserving data privacy and confidentiality. Meanwhile, the integration of XAI ensures that the predictions made by the model can be understood and interpreted by human experts, adding a layer of transparency and trust to the system. Experimental results, based on realistic transaction datasets, reveal that the FL-based fraud detection system consistently demonstrates high performance metrics. This study grounds FL’s potential as an effective and privacypreserving tool in the fight against fraud. Index Terms—Fraud Detection, Explainable AI, Federated Learning, Machine Learning I. I NTRODUCTION In the era of digital banking, ensuring the security and integrity of financial activities has become paramount. While this transformation offers unparalleled convenience, it also exposes users to the vulnerabilities of cyber threats, a significant one being bank account fraud. Financial frauds, particularly in online banking and credit card transactions, pose serious threats to the global economy, the trustworthiness of financial institutions, and the financial well-being of individuals. According to the UK Finance 2022 report, billions are lost annually due to fraudulent activities, highlighting the need for more robust detection mechanisms [1]. With this, financial institutions have conducted and continue to undertake rigorous research to combat and identify fraud, irrespective of its nature. Nevertheless, fraud remains complicated due to its ever-evolving tactics and diverse behaviors. A prevalent domain that is the subject of extensive research is bank-related fraud [2], which translates into bank account fraud on which this research is based. Bank account fraud differs from other financial deceptions in its methods, impacts, and detection challenges. Unlike credit card fraud, where unauthorized transactions can be quickly detected due to unusual spending patterns, bank account fraud can manifest itself in subtler ways, such as unauthorized funds transfers, account takeovers, or even identity theft leading to the creation of new accounts [3]. The consequences for the victim can be long-lasting, both financially and emotionally. Understanding and mitigating these threats requires thorough research, underpinned by rich and diverse datasets. In the quest to develop systems that can detect bank account fraud, Machine Learning (ML) is frequently adopted because it effectively trains systems to deliver precise predictions based on data inputs. The choice of a specific machine learning algorithm is contingent upon the nature of the data and the specific type of fraud that the target is trying to identify. Data sets of bank account transactions not only hold confidential data but also display an imbalance, with fraudulent transactions less frequent than legitimate ones. Such characteristics present obstacles in devising a robust fraud detection system. Banks employ their proprietary data to train different ML models to recognize potentially fraudulent activities, reflecting a centralized ML methodology. This centralized approach is predominant in the financial sector today, credited largely to its proficiency in processing vast data volumes and discerning underlying patterns [4]. However, one challenge with the centralized model is that different banks often face diverse fraudulent patterns, which could hinder their ability to spot new fraudulent behaviors. This is where Federated Learning comes into the picture. Federated Learning (FL) is a novel privacy-preserving approach to decentralized machine learning, [5], [6]. It presents a potential solution to this predicament by enabling model training on local devices and only sharing aggregated updates. The core difference between the centralized method is in the realm of collaboration and data protection. While the former remains confined within the walls of one bank, the latter is a collective effort that spans multiple banks. In the context of fraud detection, FL stands out as more than just a novel technological approach; it is identified as the indicator of a collaborative and confidential countermeasure against fraudulent schemes. This growing significance arises" 2312.13383v1,"Masses and Magnetic Moments of Doubly Heavy Tetraquarks via Diffusion Monte Carlo Method Halil Mutuk 1, ∗ 1 Department of Physics, Faculty of Science, Ondokuz Mayis University, 55200 Samsun, Türkiye We present mass spectrum and magnetic moments of the n̄n̄QQ states, where n = u, d, s and Q = c, b. We solve four-body Schrödinger equation with a quark potential model by using diffusion Monte Carlo (DMC) method. The quark potential is based on the Coulomb, confinement and spin-spin interaction terms. We find + mass and magnetic moment of the T cc state as M T cc + = 3892 MeV and µ = 0.28µ N ,respectively. We also − find the mass and magnetic moment of T bb as M T − = 10338 MeV and µ = −0.32µ N , respectively. We find bb some bound state candidates of doubly heavy tetraquark systems with I(J P ) = 0(1) + nnb̄ b̄, I(J P ) = 0(0) + nnc̄ b̄, I(J P ) = 0(1) + nnc̄ b̄, and I(J P ) = 1/2(1) + nsb̄ b̄. We compare our results with other approaches in the literature. I. PROLOGUE After the breakthrough works of Gell-Mann [1] and Zweig [2] in 1964, hadrons can be classified into two groups in terms of their valence quarks and antiquarks: quark-antiquark (q q̄) configuration as mesons and three-quark configuration (qqq) as baryons. This classification was called as quark model and reproduced reasonably well many hadron observables such as baryon and meson spectrum, strong decays, magnetic moments of baryons, etc. However, the Quantum Chromodynamics (QCD) allows exotic hadrons beyond the scope of quark model. The existence of multiquark states is consistent with QCD. In fact, in Refs. [1, 2], multiquark states beyond conventional ones (mesons and baryons) were conjectured as combinations of quarks. The era of conventional hadrons directed in a different route when the observation of χ c1 (3872) by the Belle Collaboration [3] announced in 2003. This state has a narrow width, decays into J/ψ2π and J/ψ3π and does not fall into the traditional charmonium spectra. Many unconventional states have been reported by Belle, BaBar, CLEO, BESIII, CDF, D0, LHCb, ATLAS, and CMS collaborations since 2003. These unconventional charmonium and bottomonium states are named as XYZ mesons. For a recent naming convention of these states, see Ref. [4]. These unconventional states mostly decay into final states which include (cc̄) and (bb̄) pairs. At this point, heavy quarkonium physics becomes important for elucidating these states. The current status and prospects of the heavy quarkonium physics can be found in Refs. [5–10]. + The recent discovery of T cc tetraquark is of particular importance due to the its quark content [11, 12]. The quark configuration is ccū d ¯ and its mass is a few MeV below the lowest two-meson threshold of DD ∗ . Since the lowest comparable decay threshold consists of heavy-light meson pairings rather than a threshold consisting of a light meson and quarkonium, such QQq̄ q̄ multiquark states are flavor unusual. Exotic hadrons with two heavy quarks, QQq̄ q̄, were in the to do’s list starting from 1980s [13–18]. Especially during the last decade, doubly heavy tetraquarks were studied by means of quark level models [19–61], chromomagnetic interaction ∗ hmutuk@omu.edu.tr models [62–70], QCD sum rule [71–92], lattice QCD simulations [93–112], and so on. QQq̄ q̄ tetraquarks should be stable when the quark masses are sufficiently large. In other words, when the ratio of m QQ /m qq is large in the four-quark state, then it is natural to consider the stability of this multiquark state [18, 113]. In this limit two heavy quarks (antiquarks) form an anticolor (color) triplet due to the Coulomb term of the potential at small QQ ( Q̄ Q̄) separations. Then the fourquark structure is quite similar to Q̄q̄ q̄ (Qqq) baryons. The same logic applies to the ( Q̄ Q̄q) baryons which are related to heavy-light mesons Qq̄ [114–117]. Furthermore, heavy quark symmetry (HQS) also implies stable QQq̄ q̄ tetraquark states [35]. Hadron spectroscopy constitutes basis to test predictions of QCD. Hadron spectroscopy is related to masses and decays of the hadrons. The abundance and clear signals in the charmonium and bottomonium states prompt hadron spectroscopy. Charmonium and bottomonium states are heavy quarkonium states. Heavy quarkonium is a good laboratory for QCD: at high energies (small distances) where a perturbative calculations are possible and at low energies (large distances) nonperturbative effects take place [118]. Since charm and bottom quarks are heavy, nonrelativistic approach of QCD can be used for these mesons. There are various methods to study physical properties of exotic states. QCD motivated phenomenological models can be used to classify and specify the components (coloured constituents) and forces between them in order to study these exotic states. In that line, many important problems related to these states can be addressed by solving Schrödinger equation. Since these exotic states include at least more than three quarks, solving many-body Schrödinger equation is quite challenging. In general four-quark states are often taken as diquark-antidiquark states or meson-meson molecules. Such quark clusterings yield a two-body Schrödinger equation in the context of potential models. In this present work we rely on a different method for solving four-quark Schrödinger equation. In our model, none of the valence quarks will be assumed to be clustered together. The interaction in the context of potential model for this system is the widely accepted and used one: Coulomb + linear confining + spin-spin term. We solve four-quark Schrödinger equation by using Diffusion Monte Carlo (DMC) method which takes into account full correlations between the constituents of the system and is ca-" 2312.13423v1,"VADIS – a VAriable Detection, Interlinking and Summarization system Yavuz Selim Kartal 1[0000−0002−2146−2680] , Muhammad Ahsan Shahid , Sotaro Takeshita 2,3[0000−0002−6510−7058] , Tornike 2[0000−0003−4298−3570] Tsereteli , Andrea Zielinski 4[0000−0003−2092−6153] , Benjamin 1[0000−0001−9495−040X] Zapilko , and Philipp Mayr 1[0000−0002−6656−1658] 1[0000−0002−7274−7934] 1 GESIS – Leibniz Institute for the Social Sciences, Cologne, Germany firstname.lastname@gesis.org 2 University of Mannheim, Germany sotaro.takeshita, tornike.tsereteli@uni-mannheim.de 3 Hochschule Mannheim, Germany 4 Fraunhofer ISI, Karlsruhe, Germany andrea.zielinski@isi.fraunhofer.de Abstract. The VADIS system addresses the demand of providing enhanced information access in the domain of the social sciences. This is achieved by allowing users to search and use survey variables in context of their underlying research data and scholarly publications which have been interlinked with each other. Keywords: Variable Search · Text Summarization · Variable Detection. 1 Introduction In the social sciences, as in other scientific disciplines, there is a growing necessity to support researchers by providing enhanced information access through linking of publications and underlying datasets. One of the key artifacts in social science studies are concepts, namely survey variables (SV), which have been used to measure sociological phenomena. These variables are generally the access to research data [7], but are neither represented nor interlinked in the information sources relevant for social science research, i.e., scholarly publications. The key objective of the VADIS (VAriable Detection, Interlinking and Summarization) project [8] is to allow for searching and using survey variables in context and thereby enhance information access of scholarly publications and help to increase the reproducibility of research results. We combine text mining techniques and semantic web technologies that identify and exploit links between publications, their topics, and the specific variables that are covered in the surveys. These semantic links build the basis for the VADIS system which offers users better access to the scientific literature by, e.g., search, summarization, and linking of identified survey variables. In detail, the system follows three objectives: (1) serving as a demonstrator for the summarization and SV identification methods, (2) enabling search and" 2312.13432v1,"Can Digital Aid Deliver During Humanitarian Crises? Michael Callen 1† , Miguel Fajardo-Steinhäuser 1† , Michael G. Findley 2† , Tarek Ghani 3*† 1 Department of Economics, London School of Economics, 32 Lincoln’s Inn Fields, London, WC2A 3PH, United Kingdom. 2 Department of Government; McCoombs School of Business; LBJ School of Public Affairs, University of Texas Austin, 3.102 Batts, Austin, 78712, TX, USA. 3 Olin Business School, Washington University St. Louis, 1 Brookings Dr, St. Louis, 63130, Missouri, USA. *Corresponding author(s). E-mail(s): tghani@wustl.edu; Contributing authors: m.j.callen@lse.ac.uk; m.fajardo-steinhauser@lse.ac.uk; mikefindley@utexas.edu; † These authors contributed equally to this work. Abstract Global hunger levels have set new records in each of the last three years, outpacing aid budgets [1, 2]. Most households experiencing food insecurity crises are now in fragile states [3], making it difficult to support vulnerable, hard-to-reach populations without interference from oppressive governments and non-state actors [4, 5]. Despite growing interest in using digital payments for crisis response [6–8], there is limited causal evidence on their efficacy [9, 10]. We show that digital payments can address basic needs during a humanitarian crisis. We conducted a randomized evaluation among very poor, mostly tech-illiterate, female-headed households in Afghanistan with digital transfers of $45 every two weeks for two months. Digital aid led to significant improvements in nutrition and in mental well-being. We find high usage rates, no evidence of diversion by the Taliban despite rigorous checks, and that 80% of recipients would prefer digital aid rather than pay a 2.5% fee to receive aid in cash. Conservative assumptions put the cost of delivery under 7 cents per dollar, which is 10 cents per dollar less than the World Food Program’s global figure for cash-based humanitarian assistance. These savings could help reduce hunger without additional resources. Asked to predict our findings, policymakers and experts underestimated beneficiaries’ ability to use digital transfers and overestimated the likelihood of diversion and the costs of delivery. Such misperceptions might impede the adoption of new technologies during crises. These results highlight the potential for digital aid to complement existing approaches in supporting vulnerable populations during crises. Keywords: Economic development, Social protection, Fragile states, Digital Payments, Food Insecurity 1" 2312.13433v1,"Towards Distributed Semi-speculative Adaptive Anisotropic Parallel Mesh Generation Kevin Garner ∗ , Christos Tsolakis † , Polykarpos Thomadakis ‡ and Nikos Chrisochoides § Center for Real-time Computing, Old Dominion University, Norfolk, VA 23529, USA This paper presents the foundational elements of a distributed memory method for mesh generation that is designed to leverage concurrency offered by large-scale computing. To achieve this goal, meshing functionality is separated from performance aspects by utilizing a separate entity for each - a shared memory mesh generation code called CDT3D and PREMA for parallel runtime support. Although CDT3D is designed for scalability, lessons are presented regarding additional measures that were taken to enable the code’s integration into the distributed memory method as a black box. In the presented method, an initial mesh is data decomposed and subdomains are distributed amongst the nodes of a high-performance computing (HPC) cluster. Meshing operations within CDT3D utilize a speculative execution model, enabling the strict adaptation of subdomains’ interior elements. Interface elements undergo several iterations of shifting so that they are adapted when their data dependencies are resolved. PREMA aids in this endeavor by providing asynchronous message passing between encapsulations of data, work load balancing, and migration capabilities all within a globally addressable namespace. PREMA also assists in establishing data dependencies between subdomains, thus enabling ""neighborhoods"" of subdomains to work independently of each other in performing interface shifts and adaptation. Preliminary results show that the presented method is able to produce meshes of comparable quality to those generated by the original shared memory CDT3D code. Given the costly overhead of collective communication seen by existing state-of-the-art software, relative communication performance of the presented distributed memory method also shows that its emphasis on avoiding global synchronization presents a potentially viable solution in achieving scalability when targeting large configurations of cores. I. Nomenclature 𝑆 𝐼 1,2 M 𝑀 𝐶 (·) 𝐿 𝑎 𝑀 𝑚𝑒𝑎𝑛 |𝑘 | 𝑄 𝑘 = = = = = = = = = subdomain of a partitioned grid interface boundary between subdomains 1 and 2 continuous metric field discrete metric field defined at the vertices of a grid complexity of a metric field Euclidean edge length evaluated in the metric of vertex a metric tensor interpolated at the centroid of a tetrahedron volume of a tetrahedron in evaluated metric 𝑀 𝑚𝑒𝑎𝑛 mean ratio shape measure II. Introduction This paper presents the foundational elements of a distributed memory method for mesh generation that is designed to leverage concurrency offered by large-scale computing. To achieve this goal, meshing functionality is separated from performance (scalability) aspects by utilizing a separate entity for each - CDT3D [1, 2] for mesh generation and PREMA [3–5] for parallel runtime support. CDT3D is a shared memory code that is intended to be used as a ""black box"" for ∗ Research Assistant † Research Assistant ‡ Research Assistant § Richard T. Cheng Chair Professor of Computer Science, email: nikos@cs.odu.edu 1" 2312.13444v1,"Optimal energy storage in the Tavis-Cummings quantum battery Hui-Yu Yang, 1 Hai-Long Shi, 2, 3, ∗ Qing-Kun Wan, 4, 5 Kun Zhang, 1, 6, 7, † Xiao-Hui Wang, 1, 6, 7, ‡ and Wen-Li Yang 8, 6, 7 1 School of Physics, Northwest University, Xi’an 710127, China QSTAR and INO-CNR, Largo Enrico Fermi 2, 50125 Firenze, Italy 3 Hefei National Laboratory, Hefei 230088 China 4 Innovation Academy for Precision Measurement Science and Technology, Chinese Academy of Sciences, Wuhan 430071, China 5 University of Chinese Academy of Sciences, Beijing 100049, China 6 Shaanxi Key Laboratory for Theoretical Physics Frontiers, Xi’an 710127, China 7 Peng Huanwu Center for Fundamental Theory, Xi’an 710127, China 8 Institute of Modern Physics, Northwest University, Xi’an 710127, China (Dated: December 22, 2023) 2 The Tavis-Cummings (TC) model, which serves as a natural physical realization of a quantum battery, comprises N b atoms as battery cells that collectively interact with a shared photon field, functioning as the charger, initially containing n 0 photons. In this study, we introduce the invariant subspace method to effectively represent the quantum dynamics of the TC battery. Our findings indicate that in the limiting case of n 0 ≫ N b or N b ≫ n 0 , a distinct SU(2) symmetry emerges in the dynamics, thereby ensuring the realization of optimal energy storage. We also establish a negative relationship between the battery-charger entanglement and the energy storage capacity. As a result, we demonstrate that the asymptotically optimal energy storage can be achieved in the scenario where N b = n 0 ≫ 1. Our approach not only enhances our comprehension of the algebraic structure inherent in the TC model but also contributes to the broader theoretical framework of quantum batteries. Furthermore, it provides crucial insights into the relation between energy transfer and quantum correlations. I. INTRODUCTION Embracing the promising trend of device miniaturization, quantum batteries (QBs) have been proposed to exploit quantum features, thereby accelerating charging rates compared to their classical counterparts. From a theoretical perspective, QBs offer fundamental insights into the influence of quantum correlations on extractable work, a pivotal concept in quantum thermodynamics [1– 16]. QBs, in conjunction with quantum heat engines, offer a tangible approach to incorporate quantum correlations, such as quantum entanglement and quantum coherence, into the field of quantum thermodynamics [17– 26]. One notable characteristic of QBs is the phenomenon known as “charging speedup” [27–29]. When connecting a group of N b QB cells to a shared charger, the charging rate of the QB can potentially scale up to N b 2 [30], indicating a significant quantum advantage over classical batteries, whose charging speed scales linearly with N b . This quantum advantage has been verified in various models, including Dicke QBs [31–33], Sachdev-Ye-Kitaev QBs [34], spin-chain QBs [35], cavity spin-chain QBs [36] and central-spin QBs [37]. Nevertheless, it is imperative to emphasize that a charging speedup does not inherently ensure the optimal energy storage. Here, the optimal energy storage denotes the complete transfer of input energy from the charger to the battery. To enrich the theory ∗ hl shi@yeah.net † kunzhang@nwu.edu.cn ‡ xhwang@nwu.edu.cn of QBs, we will shift our focus towards an important cavity quantum electrodynamics (cavity-QED) system, the Tavis-Cummings (TC) model, to address the challenge of achieving optimal energy storage. The TC model serves as a foundational framework for investigating the collective behavior of atoms or qubits in the presence of electromagnetic fields [38–41]. It constitutes a theoretical underpinning for the fields of quantum optics and cavity-QED [42–44]. Furthermore, it enhances our comprehension of the qubit manipulation and the generation of entangled states, both of which are pivotal components in the advancement of quantum computing and quantum information processing technologies [45–52]. Moreover, the TC model naturally lends itself to describing a QB, wherein each of the N b atoms serves as an individual battery cell and the optical field serves as the charger, as illustrated in Fig. 1(a). The eigenproblem associated with the TC model can be exactly solved using the algebraic Bethe ansatz [53]. However, this approach does not alleviate the inherent challenges,exponential wall [54] , associated with calculating quantum dynamics, which is at the core of investigating the energy storage problem. Transitioning from the eigenproblem to quantum dynamics is inherently challenging, not to mention the complexity of solving the Bethe ansatz equations. For instance, in Ref. [55] employing the Bethe ansatz approach, numerical calculations were conducted for a scenario involving 10 QB cells. The study concluded that Fock state is the optimal initial charger state for the maximum stored energy capacity. Reference [2] utilized the PYTHON toolbox QuTiP2 to numerically investigate cases in the TC battery where the initial photon number equals the number of battery" 2312.13454v1,"MixEHR-SurG: a joint proportional hazard and guided topic model for inferring mortality-associated topics from electronic health records Yixuan Li, BSc 1,2 , Ariane Marelli, MD 3,* , Archer Y. Yang, PhD 1,2,4,* , and Yue Li, PhD 2,4,* 1 Department of Mathematics and Statistics, McGill University, Montreal, Canada 2 Mila - Quebec AI institute, Montreal, Canada 3 McGill Adult Unit for Congenital Heart Disease (MAUDE Unit), McGill University of Health Centre, Montreal, Canada 4 School of Computer Science, McGill University, Montreal, Canada * Co-corresponding: ariane.marelli@mcgill.ca; archer.yang@mcgill.ca; yueli@cs.mcgill.ca Abstract Objective: To improve survival analysis using EHR data, we aim to develop a supervised topic model called MixEHR-SurG to simultaneously integrate heterogeneous EHR data and model survival hazard. Materials and Methods: Our technical contributions are three-folds: (1) integrating EHR topic inference with Cox proportional hazards likelihood; (2) inferring patient-specific topic hyperparameters using the PheCode concepts such that each topic can be identified with exactly one PheCode-associated phenotype; (3) multi-modal survival topic inference. This leads to a highly interpretable survival and guided topic model that can infer PheCode-specific phenotype topics associated with patient mortality. We evaluated MixEHR-SurG using a simulated dataset and two real-world EHR datasets: the Quebec Congenital Heart Disease (CHD) data consisting of 8,211 subjects with 75,187 outpatient claim data of 1,767 unique ICD codes; the MIMIC-III consisting of 1,458 subjects with multi-modal EHR records. Results: Compared to the baselines, MixEHR-SurG achieved a superior dynamic AUROC for mortality prediction, with a mean AUROC score of 0.89 in the simulation dataset and a mean AUROC of 0.645 on the CHD dataset. Qualitatively, MixEHR-SurG associates severe cardiac conditions with high mortality risk among the CHD patients after the first heart failure hospitalization and critical brain injuries with increased mortality among the MIMIC-III patients after their ICU discharge. Conclusion: The integration of the Cox proportional hazards model and EHR topic inference in MixEHR- SurG not only led to competitive mortality prediction but also produced meaningful phenotype topics for in-depth epidemiological analysis of the onset of acute conditions, including deaths. The software is available at GitHub: https://github.com/li-lab-mcgill/MixEHR-SurG. Background and Significance The rapid adoption of Electronic Health Records (EHRs) [1] enables systematic investigation of phenotypes and their comorbidity [2–5]. Briefly, EHR include rich phenotypic observations of patient subjects from physician and nursing notes to diagnostic codes and prescription. One important application of EHR is 1" 2312.13455v1,"1 Revisiting Deep Generalized Canonical Correlation Analysis Paris A. Karakasis, Graduate Student Member, IEEE and Nicholas D. Sidiropoulos, Fellow, IEEE Abstract—Canonical correlation analysis (CCA) is a classic statistical method for discovering latent co-variation that underpins two or more observed random vectors. Several extensions and variations of CCA have been proposed that have strengthened our capabilities in terms of revealing common random factors from multiview datasets. In this work, we first revisit the most recent deterministic extensions of deep CCA and highlight the strengths and limitations of these state-of-the-art methods. Some methods allow trivial solutions, while others can miss weak common factors. Others overload the problem by also seeking to reveal what is not common among the views – i.e., the private components that are needed to fully reconstruct each view. The latter tends to overload the problem and its computational and sample complexities. Aiming to improve upon these limitations, we design a novel and efficient formulation that alleviates some of the current restrictions. The main idea is to model the private components as conditionally independent given the common ones, which enables the proposed compact formulation. In addition, we also provide a sufficient condition for identifying the common random factors. Judicious experiments with synthetic and real datasets showcase the validity of our claims and the effectiveness of the proposed approach. Index Terms—Generalized Canonical Correlation Analysis, Deep Learning, Conditional Independence I. I NTRODUCTION EEKING out and reasoning about similarity enables us to abstract common patterns, learn new patterns, and ultimately reason about our world. In many applications, we nowadays have rich multimodal information about an entity, topic, or concept of interest, e.g., audio and video, images and text, or different medical sensing and imaging modalities, such as EEG, MEG, and fMRI, which can be combined to provide more complete information in support of critical decision making. The different sources of information can be considered as different “views” of an underlying phenomenon that we are interested in analyzing to accomplish several downstream tasks, such as predicting missing pieces of information or improving the quality of the observed signals. Multiview/Multimodal learning lies under the umbrella of unsupervised learning and studies how the information of multiple jointly observed views can be fused for the aforementioned problems. Under certain assumptions, the advantages of multiview techniques S Paris A. Karakasis and Nicholas D. Sidiropoulos are with the Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, VA 22904 USA (e-mail: {karakasis, nikos}@virginia.edu). P. A. Karakasis and N. D. Sidiropoulos were partially supported by NSF IIS-1908070 and ECCS-2118002. This paper has supplementary downloadable material available at https: //github.com/ParisKarakasis/Revisiting-DGCCA. The material includes software for reproducing all the presented experimental results. for several downstream tasks have also been theoretically corroborated [1], [2], [3]. Canonical Correlation Analysis (CCA) is a well-known statistical tool [4] that can be used to extract shared information from multiple views. CCA can be considered as a generalization of Principal Component Analysis (PCA). In a scenario with two views, CCA treats the views as different random vectors and it poses the problem of finding individual linear combinations of the views that generate a common latent random vector. CCA and Generalized CCA (GCCA – the extension to more than two views) have found many successful applications in speech processing [5], [6], [7], communications [8], [9], biomedical signal processing [10], [11], [12], [13], and many other areas. Various attempts to extend CCA to deal with nonlinear transformations have been made over the years. Kernel CCA in [14] was one of the first attempts, while many more have followed after adopting a probabilistic point of view, as in Deep Variational CCA [15] and Nonparametric CCA [16], or a deterministic one as in Deep CCA (DCCA) [17] and other works that built upon it, as in [18], [19], [20], [21]. Nonlinear CCA is an active research area, but one clear lesson that has emerged is that DCCA and its variants can significantly outperform the classical linear CCA in many downstream tasks. In this work, we first highlight what are the advantages and limitations of the previous nonlinear GCCA approaches under a deterministic setting, and then propose a novel formulation of DCCA that bypasses most of the current limitations. We provide careful motivation and experiments on synthetic and real datasets that compare the proposed approach to the prior art and showcase its promising performance. Reproducible Research: The codes for reproducing all the presented experimental results have been submitted, for reviewing purposes, as Supplementary material in a .rar file. As for the considered datasets, they can be automatically downloaded/generated using the provided codes. II. B ACKGROUND AND R ELATED P RIOR W ORK Consider a collection of K random vectors x (k) ∈ R D k ∼ D x (k) , for k ∈ [K] := {1, . . . , K}. When these K random vectors provide different indirect “views” of the same latent random vector g ∈ R F ∼ D g , estimating g from realizations of the views is often the main problem of interest. This problem lies at the heart of (G)CCA and many prior works have considered nonlinear extensions of (G)CCA for more or less general problem instances [20], [22], [23], [24], [12]. In" 2312.13458v1,"Fourier Quantum Process Tomography Francesco Di Colandrea, 1, ∗ Nazanin Dehghan, 1 Alessio D’Errico, 1 and Ebrahim Karimi 1 1 Nexus for Quantum Technologies, University of Ottawa, K1N 5N6, Ottawa, ON, Canada The characterization of a quantum device is a crucial step in the development of quantum experiments. This is accomplished via Quantum Process Tomography, which combines the outcomes of different projective measurements to deliver a possible reconstruction of the underlying process. The tomography is typically performed by processing an overcomplete set of measurements and extracting the process matrix from maximum-likelihood estimation. Here, we introduce a new technique, referred to as Fourier Quantum Process Tomography, which requires a reduced number of measurements, and benchmark its performance against the standard maximum-likelihood approach. Fourier Quantum Process Tomography is based on measuring probability distributions in two conjugate spaces for different state preparations and projections. Exploiting the concept of phase retrieval, our scheme achieves a complete and robust characterization of the setup by processing a near-minimal set of measurements. We experimentally test the technique on different spacedependent polarization transformations, reporting average fidelities higher than 90% and significant computational advantage. I. INTRODUCTION The functionalities of a black-box quantum device can be assessed via Quantum Process Tomography (QPT) techniques. These techniques prescribe a set of experimental measurements to identify the unknown parameters of the underlying process matrix [1]. QPT is routinely performed across various quantum architectures, ranging from nuclear magnetic resonances [2] to cold atoms [3], trapped ions [4, 5], superconducting circuits [6, 7] and photonic setups [8–18]. In principle, one could extract the analytical relations between the operator parameters and the outcomes of suitable projective measurements [19]. However, this proves to be often incompatible with realistic experimental noise, typically yielding nonphysical reconstructions. This inconvenience can be overcome by formulating the process tomography as an optimization problem, as first proposed for the tomography of quantum states [20]. In this framework, the most elementary scenario is the characterization of an SU(2) gate Û acting on a twolevel quantum system (qubit). Polarization of photons provides a natural way of encoding qubits, with Û implemented via one or multiple birefringent waveplates. Accordingly, the characterization of devices acting on light polarization can be accomplished via QPT [21]. Here, we address the more challenging scenario of characterizing optical SU(2) gates that are dependent on some d-dimensional degree of freedom, hereafter referred to as lattice. We introduce a new technique, named Fourier Quantum Process Tomography (FQPT), that allows retrieving all the parameters of the unknown transformation by processing only three sets of projective measurements collected in 2 conjugate planes. This method applies to SU(2 × d) transformations, which can be decomposed in a 2 × 2 block-diagonal form. FQPT is validated experimentally on complex polarization transformations realized via liquid-crystal metasurfaces (LCMSs) patterned with high spatial frequencies [22], and its performance is compared with a standard maximum-likelihood (ML) approach. In this experiment, the measurements can be conveniently chosen to be performed in two conjugate planes, namely the near and far field, wherein the light distributions are directly connected via a Fourier transform. If the near field is associated with an intermediate plane or two intermediate planes are selected, then the Fourier transform is replaced by a paraxial Fresnel propagator [23]. FQPT can also be implemented in other platforms. For instance, integrated photonic technologies [24] can support additional chips specifically implementing the Quantum Fourier Transform (QFT) algorithm [25–27]. At the same time, SU(2) operations could be implemented either in the polarization [28–30] or path encoding. In the latter case, the waveguide array would simulate a composite lattice. Similar schemes have also been reported in several non-photonic platforms [31–33]. II. THEORY A qubit rotation of an angle 2E around the axis n = (n 1 , n 2 , n 3 ), with 0 ≤ E < π and |n| = 1, is described by an SU(2) operator Û = e −iEn·σ = cos(E)σ 0 − i sin(E)(n · σ), where σ 0 is the 2×2 identity matrix and σ = (σ 1 , σ 2 , σ 3 ) is the vector of the three Pauli matrices. The characterization of an optical SU(2) gate is typically performed by processing an overcomplete set of 16 projective measurements of the form 2 I ab = ⟨b| Û |a⟩ , ∗ Correspondence email address: francesco.dicolandrea@uottawa.ca (1) (2) where |a⟩ and |b⟩ are extracted from the three sets of states forming the Mutually Unbiased Bases (MUB) of" 2312.13472v1,"Task Planning for Multiple Item Insertion using ADMM Gavin Zheng 1 Abstract— Mixed-integer nonlinear programmings (MINLPs) are powerful formulation tools for task planning. However, it suffers from long solving time especially for large scale problems. In this work, we first formulate the task planning problem for item stowing into a mixed-integer nonlinear programming problem, then solve it using Alternative Direction Method of Multipliers (ADMM). ADMM separates the complete formulation into a nonlinear programming problem and mixed-integer programming problem, then iterate between them to solve the original problem. We show that our ADMM converges better than non-warm-started nonlinear complementary formulation. Our proposed methods are demonstrated on hardware as a high level planner to insert books into the bookshelf. I. I NTRODUCTION Optimization-based techniques serve as valuable tools in addressing challenges related to robotic motion planning. Various approaches, including mixed-integer convex programs (MICPs) [1]–[3], nonlinear or nonconvex programs (NLPs), [4], [5], mixed-integer nonlinear programs (MINLPs) [6]–[8], and convex optimizations [9]–[11] provide robust frameworks for problem formulation. Despite their efficacy, each formulation method has its own set of limitations. Convex optimization, while offering reliable online solutions with guaranteed convergence and rapid solving speed [12], is constrained to problems amenable to convex formulation. NLPs often converge to local optima, introducing issues such as inconsistent behavior due to reliance on initial guesses. Mixed-integer programs explicitly address discrete variables, commonly utilizing branch-and-bound for solving MIPs [13]. MIP solvers aim for globally optimal solutions, exhibiting more consistent behavior compared to NLP solvers. These solvers typically yield optimal solutions for small-scale problems within a reasonable timeframe [2], [14]. . Conversely, MIPs may encounter impractically long solving times when dealing with problems featuring a substantial number of integer variables [15]. MINLPs, incorporating both integer variables and nonlinear constraints, offer a high level of expressiveness. Unfortunately, the lack of efficient algorithms for handling MINLPs results in extended solving times and low success rates [16]. Consequently, implementing most optimization schemes online becomes challenging. Recently, researchers have begun exploring the application of machine learning techniques to gather problem-specific heuristics and expedite the optimization solving process. Conventional algorithms employed for solving Mixed-Integer Programs (MIPs), such as branch-and-bound and cutting 1 Gavin Zheng is with the Department of Mechanical and Aerospace Engineering, University of California, Los Angeles, CA 90095, USA. {gavinzheng0927}@ucla.edu plane methods, heavily rely on heuristics for efficiently eliminating infeasible regions. Learning methods offer the potential to enhance these heuristics. For instance, in their work, [17] utilized graph neural networks to acquire heuristics, while [18] employed reinforcement learning to identify effective cutting planes. Alternatively, data collection can be employed to learn and address specific problems or tasks, as demonstrated in studies like [19]–[21]. This process effectively transforms into a classification problem, assigning a unique label to each strategy. In the context of online solving, the neural network proposes candidate solutions, effectively reducing the problem to a convex program. Results indicate that CoCo can successfully solve MIPs with approximately 50 integer variables in less than a second. However, it’s worth noting that CoCo employs a relatively simple neural network structure. Given that the number of potential strategies grows exponentially with the number of integer variables, the count of unique strategies tends to be close to the total amount of available data. In numerous multi-agent optimization scenarios, agents may operate in diverse modes defined by discrete variables. The incorporation of discrete mode switching, coupled with collision avoidance constraints, results in a challenging mixed-integer bilinear formulation. To comprehensively assess the efficacy of various data-driven approaches in addressing such problems, [22] introduced the bookshelf organization problem as a benchmark. This problem involves placing an additional book on a bookshelf with minimal disturbance to existing books. The bookshelf problem serves as an effective benchmark for several reasons: 1) it represents a Mixed-Integer Nonlinear Programming (MINLP) that can be transformed into a Mixed-Integer Convex Programming (MICP) problem with hundreds of integer variables, 2) it can be readily scaled to push algorithms to their limits, and 3) it holds practical significance, allowing for the reasonable collection of data, especially in industries such as logistics. In this paper, we introduce the Alternating Direction Method of Multipliers (ADMM) to address this problem. ADMM separates the whole MINLP formulation into two parts: a MIP formulation, and a NLP formulation, both solved with applicable solvers. It then iterates between those two formulations until their solutions converge. Despite the process can be slower, it does not require choosing a good warm-start. We demonstrate that this method has a significantly higher chance of finding a solution than the commonly used nonlinear complementary formulation." 2312.13476v1,"Fortify Your Defenses: Strategic Budget Allocation to Enhance Power Grid Cybersecurity * Rounak Meyur, Sumit Purohit, Braden K. Webb Pacific Northwest National Laboratory, Richland {rounak.meyur, sumit.purohit, braden.webb}@pnnl.gov Abstract The abundance of cyber-physical components in modern day power grid with their diverse hardware and software vulnerabilities has made it difficult to protect them from advanced persistent threats (APTs). An attack graph depicting the propagation of potential cyber-attack sequences from the initial access point to the end objective is vital to identify critical weaknesses of any cyber-physical system. A cyber security personnel can accordingly plan preventive mitigation measures for the identified weaknesses addressing the cyberattack sequences. However, limitations on available cybersecurity budget restrict the choice of mitigation measures. We address this aspect through our framework, which solves the following problem: given potential cyber-attack sequences for a cyber-physical component in the power grid, find the optimal manner to allocate an available budget to implement necessary preventive mitigation measures. We formulate the problem as a mixed integer linear program (MILP) to identify the optimal budget partition and set of mitigation measures which minimize the vulnerability of cyber-physical components to potential attack sequences. We assume that the allocation of budget affects the efficacy of the mitigation measures. We show how altering the budget allocation for tasks such as asset management, cybersecurity infrastructure improvement, incident response planning and employee training affects the choice of the optimal set of preventive mitigation measures and modifies the associated cybersecurity risk. The proposed framework can be used by cyber policymakers and system owners to allocate optimal budgets for various tasks required to improve the overall security of a cyber-physical system. Introduction An increased reliance on Information Technology (IT) in various aspects of modern life has created a vast ecosystem * The research described in this paper is part of the Resilience Through Data Driven, Intelligently Designed Control (RD2C) Initiative at Pacific Northwest National Laboratory (PNNL). It was conducted under the Laboratory Directed Research and Development Program at PNNL, a multiprogram national laboratory operated by Battelle for the U.S. Department of Energy. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. of interconnected systems, networks and devices (Bansal and Kumar 2020). This provides a large attack surface for cyber adversaries to target, allowing them to gain unauthorized access, steal data, and disrupt operations. The availability of off-the-shelf hacking tools and malware in the underground market makes their task even easier to an extent, which allows them to initiate complex attacks without the requirement of sophisticated programming expertise (Liggett et al. 2019). Sophisticated malware, APTs and multi-stage cyber attacks involving multiple attack vectors are principal factors, which increase the complexity of these attacks and make them harder to detect and mitigate (Li and Liu 2021). This requires system owners and cybersecurity personnel to be well aware about the latest vulnerabilities and plan to mitigate them effectively. The modern day energy infrastructure is equipped with smart devices, which aid in its monitoring and control. These devices are an integral part of the cyber-physical energy system (CPES). They form the link between the physical power grid and the communication network, allowing system operators to take online decisions and alter system conditions remotely. However, this comes at a cost of increased vulnerability to cyber attacks where adversaries can gain access to these devices and adversely impact the power grid infrastructure, leading to severe events such as widespread blackout. A typical CPES consists of multiple smart devices interlinked through a communication network. These smart devices (such as a smart inverter or a protective relay) can be accessed directly by a cyber adversary or via the communication network after a successful intrusion into a centrally situated device (such as a substation automation controller). Therefore, the goal of cybersecurity personnel is to protect these smart devices (or components) from adversarial cyber intrusions. From hereon, we use the terms ‘component’ and ‘smart device’ interchangeably. In this work, we aim to identify an optimal set of preventive cybersecurity measures for each component in the CPES in order to reduce the risk of adversarial cyber attacks. A bottom-up approach involves evaluating the risk associated with the failure of a component by assessing the loss of power grid resilience or stability, and thereafter, allocating budget towards securing the ‘critical’ components (Zo-" 2312.13482v1,"Spatially Adaptive Variable Screening in Presurgical fMRI Data Analysis ∗ Yifei Hu and Xinge Jessie Jeng December 22, 2023 Abstract Accurate delineation of tumor-adjacent functional brain regions is essential for plan- ning function-preserving neurosurgery. Functional magnetic resonance imaging (fMRI) is increasingly used for presurgical counseling and planning. When analyzing presurgi- cal fMRI data, false negatives are more dangerous to the patients than false positives because patients are more likely to experience significant harm from failing to identify functional regions and subsequently resecting critical tissues. In this paper, we pro- pose a novel spatially adaptive variable screening procedure to enable effective control of false negatives while leveraging the spatial structure of fMRI data. Compared to existing statistical methods in fMRI data analysis, the new procedure directly control false negatives at a desirable level and is completely data driven. The new method is also substantially different from existing false negative control procedures which do not take spatial information into account. Numerical examples show that the new method outperforms several state-of-the-art methods in retaining signal voxels, especially the subtle ones at the boundaries of functional regions, while providing cleaner separation of functional regions from background noise. Such results could be valuable to preserve critical tissues in neurosurgery. ∗ Address for correspondence: Xinge Jessie Jeng, Department of Statistics, North Carolina State University, SAS Hall, 2311 Stinson Dr., Raleigh, NC 27695-8203, USA. E-mail: xjjeng@ncsu.edu. 1" 2312.13489v1,"XIII. Mimarlıkta Sayısal Tasarım Ulusal Sempozyumu 20-21 Mayıs 2019, Kocaeli Üniversitesi, Mimarlık ve Tasarım Fakültesi Fotogrametri Verilerinde Yapım Bilgisinin Modellenmesine Yönelik Gömülü Biçim Eşlemesi Demircan Taş 1 ; Mine Özkar 2 İstanbul Teknik Üniversitesi 1 http://demircantas.com, 1 demircan.tas@itu.edu.tr; 2 http://akademi.itu.edu.tr/ozkar/, 2 ozkar@itu.edu.tr 1,2 Özet Mevcut yapıların fotogrametri yoluyla elde edilmiş üç boyutlu modellerinde, gözün seçebildiği tüm biçimler modelin geometrik bileşenlerinde her zaman karşılıklarını bulamaz. Oysa anlamlı parça ve bütünlerin hızlı ve detaylı belgeleme yöntemleriyle alınan kayıtlarla eşlenmesi, mevcut yapıların bilgi modellerinin oluşturulmasına yönelik avantaj sağlayacaktır. Bu probleme cevap üretmeyi hedeflerken, üç boyutlu modellerde örüntü tanımanın zorluklarını aşmak için izdüşümle elde edilmiş iki boyutlu sade bir örneklem kullanılan çalışmamızda, fotogrametrik veriden yapı bilgi modeline doğru bir iş akışında kullanılabilecek bir biçim eşlemesi yöntemi geliştirilmiştir. Ortam ışığı kısıtlaması (ambient occlusion) gibi işleme teknikleri, eğrilik (curvature) ve normal haritaları, üç boyutlu yüzey niteliklerinin iki boyutlu veri setlerinde temsilini mümkün kılan, çağdaş bilgisayar grafiği uygulamalarında sıklıkla kullanılan öğelerdir. Önerdiğimiz yöntem, ışık tabanlı görselleştirme yerine, bu haritalamalar üzerinden örüntü tanınmasını temel alır. Uygulamanın ilk aşamasını tarihi mozaiklerin fotogrametri yoluyla taranması ve tarihi tuğla duvarların belgelere dayalı olarak üç boyutlu modellenmesi, ikinci aşamasını bu verilerden Alice Vision, OpenCV-Python, ve Autodesk Maya kullanılarak elde edilen yüzey temsilinin işlenmesi ile duvarların yapım bilgisini ve olası öz niteliklerini içeren modellerin oluşturulmasını kapsamaktadır. Sonraki aşamada elde edilen eşleme verisinin kural temelli tasarım ve yapım süreçlerindeki bilgiyi beslemesi öngörülmektedir. Anahtar Kelimeler: Bilgisayarla görme, dijital kültürel miras, görme ve yapma, görsel hesaplama, üretken sistemler. Embedded Shape Matching in Photogrammetry Data for Modeling Making Knowledge Abstract In three-dimensional models obtained by photogrammetry of existing structures, all of the shapes that the eye can select cannot always find their equivalents in the geometric components of the model. However, the matching of meaningful parts and assemblages with the records acquired with rapid and detailed documentation methods will provide an advantage for the creation of information models of existing structures. While aiming to produce answers to this problem and in order to overcome the difficulties of pattern recognition in three-dimensional models, we used two-dimensional samples obtained by projection. Processing techniques such as ambient occlusion, curvature and normal maps are commonly used in modern computer graphics applications that enable the representation of three-dimensional surface properties in twodimensional data sets. The method we propose is based on the recognition of patterns through these mappings instead of the usual light-based visualization. The first stage of the application is photogrammetric capture of a few examples of Zeugma mosaics and three-dimensional digital modeling of a set of Seljuk era brick walls based on knowledge obtained through architectural history literature. The second stage covers the creation of digital models by processing the surface representation obtained from this data using Alice Vision, OpenCV-Python, and Autodesk Maya to include information on aspects of the making of the walls. What is envisioned for the next stages is that the mapping data contributes and supports the knowledge for rule-based design and making processes. Keywords: Computer vision, digital cultural heritage, seeing and doing, visual computation, generative systems. 1" 2312.13513v1,"An integrated framework for accelerating reactive flow simulation using GPU and machine learning models Runze Mao a,b , Yingrui Wang c , Min Zhang a,b , Han Li a,b , Jiayang Xu b , Xinyu Dong a,b , Yan Zhang d,e , Zhi X. Chen a,b,∗ a State Key Laboratory of Turbulence and Complex Systems, Aeronautics and Astronautics, College of Engineering, Peking University, Beijing, 100871, China b AI for Science Institute (AISI), Beijing, 100080, China c Shanghai SenseTime Intelligent Technology Co., LTD, Shanghai, 200233, China d CAEP Software Center for High Performance Numerical Simulation, Beijing 100088, China e Institute of Applied Physics and Computational Mathematics, Beijing 100088, China Abstract Recent progress in artificial intelligence (AI) and high-performance computing (HPC) have brought potentially game-changing opportunities in accelerating reactive flow simulations. In this study, we introduce an open-source computational fluid dynamics (CFD) framework that integrates the strengths of machine learning (ML) and graphics processing unit (GPU) to demonstrate their combined capability. Within this framework, all computational operations are solely executed on GPU, including ML-accelerated chemistry integration, fully-implicit solving of PDEs, and computation of thermal and transport properties, thereby eliminating the CPU-GPU memory copy overhead. Optimisations both within the kernel functions and during the kernel launch process are conducted to enhance computational performance. Strategies such as static data reorganisation and dynamic data allocation are adopted to reduce the GPU memory footprint. The computational performance is evaluated in two turbulent flame benchmarks using quasi-DNS and LES modelling, respectively. Remarkably, while maintaining a similar level of accuracy to the conventional CPU/CVODE-based solver, the GPU/ML-accelerated approach shows an overall speedup of over two orders of magnitude for both cases. This result highlights that high-fidelity turbulent combustion simulation with finite-rate chemistry that requires normally hundreds of CPUs can now be performed on portable devices such as laptops with a medium-end GPU. Keywords: Compressible reacting flow; GPU acceleration; HPC; machine learning; Chemical kinetics; LES; Quasi-DNS *Corresponding author. E-mail address: chenzhi@pku.edu.cn (Zhi X. Chen). 1" 2312.13528v1,"DyBluRF: Dynamic Deblurring Neural Radiance Fields for Blurry Monocular Video Minh-Quan Viet Bui 1 * 1 Jihyong Oh 2 * Jongmin Park 1 * 2 KAIST Chung-Ang University {bvmquan, jm.park, mkimee}@kaist.ac.kr Munchurl Kim 1† jihyongoh@cau.ac.kr https://kaist-viclab.github.io/dyblurf-site/ Figure 1. Dynamic deblurring novel view synthesis results. We first propose a novel dynamic deblurring NeRF for blurry monocular videos with inaccurate camera poses, called DyBluRF, which significantly outperforms previous SOTA NeRF methods for deblurring static scenes (BAD-NeRF [59]) and monocular videos (HexPlane [7], HyperNeRF [42]), trained on the newly synthesized Blurry iPhone Dataset. Abstract Video view synthesis, allowing for the creation of visually appealing frames from arbitrary viewpoints and times, offers immersive viewing experiences. Neural radiance fields, particularly NeRF, initially developed for static scenes, have spurred the creation of various methods for video view synthesis. However, the challenge for video view synthesis arises from motion blur, a consequence of object or camera movement during exposure, which hinders the precise synthesis of sharp spatio-temporal views. In response, we propose a novel dynamic deblurring NeRF framework for blurry monocular video, called DyBluRF, consisting of an Interleave Ray Refinement (IRR) stage and a Motion Decomposition-based Deblurring (MDD) stage. Our DyBluRF is the first that addresses and handles the novel view synthesis for blurry monocular video. The IRR stage jointly reconstructs dynamic 3D scenes and refines the inaccurate camera pose information to combat imprecise pose information extracted from the given blurry frames. The MDD stage is a novel incremental latent sharp-rays prediction (ILSP) approach for the blurry monocular video frames by decomposing the latent sharp rays into global camera motion and local object motion components. Extensive experimental results demonstrate that our DyBluRF outperforms qualitatively and quantitatively the very recent state-of-the-art methods. Our project page including source codes and pretrained model are publicly available at https://kaist-viclab.github.io/dyblurfsite/. 1. Introduction Free viewpoint rendering for spatio-temporal novel view synthesis has increased lots of interests due to its diverse applications. Especially, video view synthesis can render visu- * Co-first authors (equal contribution). † Corresponding author." 2312.13536v1,"UNSUPERVISED DOMAIN ADAPTIVE GRAPH CLASSIFICATION Siyang Luo 1† , Ziyi Jiang 2† , Zhenghan Chen 3∗ , Xiaoxuan Liang 4 1 Shanghai Infortech Software Development Co.,Ltd, Shanghai, China 2 New York University Shanghai, Shanghai, China 3 Peking University, Beijng, China 4 University of Massachusetts Amherst, Amherst MA, USA ABSTRACT Despite the remarkable accomplishments of graph neural networks (GNNs), they typically rely on task-specific labels, posing potential challenges in terms of their acquisition. Existing work have been made to address this issue through the lens of unsupervised domain adaptation, wherein labeled source graphs are utilized to enhance the learning process for target data. However, the simultaneous exploration of graph topology and reduction of domain disparities remains a substantial hurdle. In this paper, we introduce the Dual Adversarial Graph Representation Learning (DAGRL), which explore the graph topology from dual branches and mitigate domain discrepancies via dual adversarial learning. Our method encompasses a dual-pronged structure, consisting of a graph convolutional network branch and a graph kernel branch, which enables us to capture graph semantics from both implicit and explicit perspectives. Moreover, our approach incorporates adaptive perturbations into the dual branches, which align the source and target distribution to address domain discrepancies. Extensive experiments on a wild range graph classification datasets demonstrate the effectiveness of our proposed method. Index Terms— Adversarial Learning, Dual Graph Representation Learning, Unsupervised Domain Adaptive Learning 1. INTRODUCTION Graph neural networks (GNNs) have achieved remarkable accomplishments in various domains such as social network analysis [1, 2], time series prediction [3, 4], and protein property prediction [5, 6]. These networks leverage the rich relational information present in graph-structured data to make accurate predictions and learn meaningful representations. However, the success of GNNs often depends on the task-specific labels, which can be costly and slow to obtain. To address the challenge of label acquisition, researchers have explored unsupervised domain adaptation techniques for GNNs [7, 8, 9]. These techniques aim to transfer knowledge learned from labeled source graphs to improve the learning ∗ Contact author: 1979282882@pku.edu.cn process for target data, which lacks labeled information. By aligning the distribution of source and target data, unsupervised domain adaptation enabling the application of GNNs in scenarios where labeled target data is scarce. Existing work on unsupervised domain adaptation for GNNs faces significant challenges. The first is how to efficiently extract source and target topological features with limited labeled data. Simply utilizing implicit topological information is not enough for predicting unlabeled target graphs. The second challenge is the domain discrepancy. The model trained on the source domain cannot directly apply to the target domain with different data distributions. Moreover, the extracted topological information may interfere with the domain alignment. Therefore, a third challenge is how to extract graph topology exploration and reduce domain discrepancy alternately. In this paper, we propose a novel approach called Dual Adversarial Graph Representation Learning (DAGRL) to tackle these challenges. DAGRL introduces a dual-brunch graph structure, comprising a graph convolutional network branch and a graph kernel branch. This dual-branch architecture enables us to capture graph semantics from both implicit and explicit perspectives, leveraging both the local neighborhood information and global structural properties. Moreover, our method incorporates adaptive perturbations into the dual branches to align the source and target distributions and address domain discrepancies. By perturbing the graph representations in a controlled manner, DAGRL encourages the network to learn robust and domain-invariant features. This adversarial learning framework allows us to jointly optimize the graph topology exploration and domain adaptation iteratively, resulting in improved representation learning for target graphs. To evaluate the effectiveness of our proposed DA- GRL method, we conduct extensive experiments on a wide range of graph classification datasets. The experimental results demonstrate the superiority of our approach compared to existing state-of-the-art methods, highlighting its potential to enhance graph representation learning in various domains. The main contributions can be summarized as follows: • We propose a novel technique DAGRL for graph classification that adapts to different domains. DAGRL contains a" 2312.13545v1,"Developing Interactive Tourism Planning: A Dialogue Robot System Powered by a Large Language Model* Katsumasa Yoshikawa 1 and Takato Yamazaki 1 and Masaya Ohagi 1 and Tomoya Mizumoto 1 and Keiya Sato 1 Abstract— In this paper, we propose a novel tourism planning system for Dialogue Robot Competition 2023 (a.k.a DRC2023). I. INTRODUCTION In recent years, large language models (LLMs) have rapidly proliferated and have been utilized in various tasks, including research in dialogue systems. We aimed to construct a system that not only leverages the flexible conversational abilities of LLMs but also their advanced planning capabilities to reduce the speaking load on human interlocutors and efficiently plan trips. Furthermore, we propose a method that divides the complex task of a travel agency into multiple subtasks, managing each as a separate phase to effectively accomplish the task. Our proposed system confirmed a certain level of success by achieving fourth place in the DRC2023[1] preliminaries rounds. We report on the challenges identified through the competition. II. P ROPOSED S YSTEM Our system advances the conversation based on a predetermined scenario-based approach. Table I shows the scenarios used, along with methods for controlling the robot’s movements and the display. The scenario consists of five phases as shown in the table, each aimed at accomplishing a subtask in tourist guidance. A large-scale language model is employed for response generation, and different types of prompts are used in each phase. For the large-scale language model, the system uses the API of gpt-4-32k-0613 (referred to as GPT) provided by OpenAI. We used the Streaming API and input the text into the Text-to-Speech (TTS) system every time a punctuation mark appeared, in order to speed up the speech delivery. We implemented two types of transitions between phases. One is to instruct the system to output a termination sign [END] when the objective of the phase is achieved. When [END] is output, a transition is made to the next phase. This allows, for example, an automatic transition to the next phase when the system has heard everything it needs to hear in the inquiry phase. However, the model often does not output [END], so the first transition condition may not be satisfied. To address this issue, we implemented a second transition that sets a maximum number of turns for each phase and forcibly terminates the phase if the number of turns is exceeded. 1 SB Tower Intuitions Corp. Tokyo Portcity 1-7-1, Kaigan, Minato-Ku, Tokyo, Takeshiba 105-7529 katsumasa.yoshikawa@sbintuitions.co.jp Office Japan Your name is Shoko... # background and personas Introduce two courses... # task instruction --- # Model courses information Course A: The autumn leaves are... (Spot1-Spot2-...) Course B: Famous temples are...(Spot3-Spot4-...) === # Shots Shoko: ... Customer: ... ... # Up to two shots === # Ongoing conversation Shoko: ... # Dialogue history Customer: ... ... Shoko: # Start from here Fig. 1. Main Prompt A. Image and Map Viewer In this competition, monitors are set up to display information about tourist spots, including names, photos, and maps, provided through a designated API. A web-based viewer is implemented for this display. This viewer can show information up to 4 tourist spots. Additionally, to aid those who might find it difficult to read the Kanji (Chinese characters) names of these tourist spots, phonetic readings (Furigana) are provided. For displaying images, we implemented two types of timing. The first is to display the image when the name of a tourist spot appears in the system’s utterance. If more than one spot appears in the same utterance, the images of all the spots are displayed. However, since more than four images cannot be displayed at the same time, only the fourth image on the display is replaced after the fifth image. The second timing is to display a list of images associated with the model course when the name of the model course is mentioned. Since this list of images is composed of images that symbolize the model course and are considered to be highly appealing to customers, it was displayed in preference to the first condition. B. Model Courses and Course Selection In the proposed system, model courses for a trip to Kyoto are collected from the internet in advance, and these are used to generate pairs of various personas and original model courses. We then adopt a strategy to select and present the appropriate model courses from these candidates based on the content of the dialogue. This strategy reduces the decision-making burden on the customer’s side and allows for the construction of a travel plan smoothly and in a short time. Specifically, based on the dialogue history with the customer after inquiry phase, our system selects the top two model courses suitable for the customer." 2312.13552v1,"Holographic study on Einstein ring for a charged black hole in conformal gravity Xin-Yun Hu, 1 Xiao-Xiong Zeng, 2, ∗ Li-Fang Li, 3, † and Peng Xu 3, 4 1 College of Economic and Management, Chongqing Jiaotong University, Chongqing 400074, China 2 Department of Mechanics, Chongqing Jiaotong University, Chongqing 400074, China 3 Center for Gravitational Wave Experiment, National Microgravity Laboratory, Institute of Mechanics, Chinese Academy of Sciences, Beijing 100190, China. 4 Lanzhou Center of Theoretical Physics, Lanzhou University, No. 222 South Tianshui Road, Lanzhou 730000, China With the help of AdS/CFT correspondence, the Einstein ring of a charged black hole in conformal gravity has been studied. Imposing an oscillating Gauss source on one side of the AdS boundary which propagates in the bulk, we derive the response function on the other side of the boundary. With the proposed wave optics system, we observe the Einstein ring as expect. The results reveal that when the observer locates at the north pole, the Einstein ring and surrounding concentric stripes always exist. While the observer departs away from the north pole, the ring becomes into a luminosity-deformed ring or light spot. We also investigate the effect of temperature T , chemical potential u and gravity-related parameters c 0 on the ring radius. We find the ring radius increases with the decrease of the temperature, increase of the chemical potential, and increase of the gravity-related parameters respectively. To check the results in the framework of holography, we investigate the ingong angle of photon at the photon ring via geometric optics and find it is consistent with the angle of Einstein ring obtained via holography. ∗ † Electronic address: xxzengphysics@163.com Corresponding author: lilifang@imech.ac.cn" 2312.13563v1,"1 Energy Efficiency Maximization for Intelligent Surfaces Aided Massive MIMO with Zero Forcing Wilson de Souza Junior and Taufik Abrão Abstract In this work, we address the energy efficiency (EE) maximization problem in a downlink commu- nication system utilizing reconfigurable intelligent surface (RIS) in a multi-user massive multiple-input multiple-output (mMIMO) setup with zero-forcing (ZF) precoding. The channel between the base station (BS) and RIS operates under a Rician fading with Rician factor K 1 . Since systematically optimizing the RIS phase shifts in each channel coherence time interval is challenging and burdensome, we employ the statistical channel state information (CSI)-based optimization strategy to alleviate this overhead. By treating the RIS phase shifts matrix as a constant over multiple channel coherence time intervals, we can reduce the computational complexity while maintaining an interesting performance. Based on an ergodic rate (ER) lower bound closed-form, the EE optimization problem is formulated. Such a problem is non-convex and challenging to tackle due to the coupled variables. To circumvent such an obstacle, we explore the sequential optimization approach where the power allocation vector p, the number of antennas M , and the RIS phase shifts v are separated and sequentially solved iteratively until convergence. With the help of the Lagrangian dual method, fractional programming (FP) techniques, and supported by Lemma 1, insightful compact closed-form expressions for each of the three optimization variables are derived. Simulation results validate the effectiveness of the proposed method across different generalized channel scenarios, including non-line-of-sight (NLoS) (K 1 = 0) and partially line-of-sight (LoS) (K 1 ̸ = 0) conditions. Our numerical results demonstrate an impressive performance of the proposed Statistical CSI-based EE optimization method, achieving ≈ 92% of the performance attained through perfect instantaneous CSI-based EE optimization. This underscores its potential to significantly This work was supported by the National Council for Scientific and Technological Development (CNPq) of Brazil, Grant: 310681/2019-7, by CAPES, Grant: FC001, and by Londrina State University (UEL), Brazil. W. Junior and T. Abrão are with the Department of Electrical Engineering (DEEL). State University of Londrina (UEL). Po.Box 10.011, CEP:86057-970, Londrina, PR, Brazil. Email: wilsoonjr98@gmail.com; taufik@uel.br December 22, 2023 DRAFT" 2312.13616v1,"Navigating the Structured What-If Spaces: Counterfactual Generation via Structured Diffusion Nishtha Madaan * Srikanta Bedathur Indian Institute of Delhi, India nishtha.madaan@iitd.ac.in Indian Institute of Delhi, India srikanta@cse.iitd.ac.in Abstract—Generating counterfactual explanations is one of the most effective approaches for uncovering the inner workings of black-box neural network models and building user trust. While remarkable strides have been made in generative modeling using diffusion models in domains like vision, their utility in generating counterfactual explanations in structured modalities remains unexplored. In this paper, we introduce Structured Counterfactual Diffuser or SCD, the first plug-and-play framework leveraging diffusion for generating counterfactual explanations in structured data. SCD learns the underlying data distribution via a diffusion model which is then guided at test time to generate counterfactuals for any arbitrary black-box model, input, and desired prediction. Our experiments show that our counterfactuals not only exhibit high plausibility compared to the existing state-ofthe-art but also show significantly better proximity and diversity. I. I NTRODUCTION As AI models become more capable and widespread, the issue of trust becomes critical [1]. While traditional software is transparent—allowing tracing its control flow and easily resolving trust concerns—modern AI is built upon neural networks that are not transparent. Their underlying control flow is not understood, making it difficult to trust in high-risk settings such as loan or hiring decisions. Although the remarkable power and flexibility of neural networks have allowed building systems that achieve capabilities not possible with traditional software alone [2], [3], this lack of transparency and trust becomes a significant hurdle in realizing the full potential of neural networks [4]–[6]. To address concerns about trust, one needs to answer why a model behaves in a certain way. One of the most promising directions to answer this is via what-if scenarios or counterfactuals [6]. For instance, consider a model which declines a loan for [Female, Earns $100K]. To answer why, it is of interest to discover counterfactuals for which the same model approves loans. For instance, if the model approves the loan for a counterfactual instance [Male, Earns $100K], this suggests that the model may be making decisions based on potentially problematic criteria, prompting model developers to investigate and fix the problem. Additionally, counterfactuals can also provide actionable insights to the end-users on how to achieve a different outcome [7]. In our previous example, if the model approves the loan for a counterfactual instance *Nishtha Madaan is a researcher at IBM Research and this work was done as a part of PhD research at IIT Delhi. [Female, Earns $110K], it explains what the applicant might need to do to obtain approval. While [6] originally introduced the idea of counterfactual explanations, the idea has gained significant attention in recent years [7]–[11]. Ideally, counterfactuals should possess the following characteristics: 1) they should maintain proximity to the original input, 2) they should attain the desired counterfactual label to ensure its validity, 3) they should be diverse and capture a wide range of distinct scenarios and 4) they should be plausible. While proximity, validity, and diversity criteria have been studied extensively, there has been little focus on the plausibility of the generated counterfactuals, i.e., ensuring that the generated counterfactuals are realistic and conform to the underlying data distribution. Previous works have approached plausibility in a minimal sense, e.g., enforcing values to lie in legal ranges or applying user-designed constraints [7], [8]. Recently, in the visual domain, diffusion models [12] have been successfully used to acquire the underlying data distribution for generating plausible counterfactual explanations [13]–[16]. However, in the domain of tabular or structured data, counterfactual explanation methods have largely ignored these recent advances in diffusion modeling raising another important question: “Can diffusion models, which are known for their remarkable generation capabilities in vision, help generate high-quality plausible counterfactuals in the structured domain?” To answer this question, in this work, we propose a novel counterfactual explainer called Structured Counterfactual Diffuser or SCD. SCD is the first plug-and-play framework leveraging diffusion modeling for generating counterfactual explanations for structured data. SCD works by learning the underlying data distribution via a diffusion model [12], [17]. At test time, the diffusion model is used to perform guided iterative denoising to generate counterfactuals for any given input and black-box model in a plug-and-play manner. In experiments, we show that our counterfactual explainer not only exhibits high plausibility compared to the state-of-theart approaches but also shows significantly better proximity and diversity scores of the generated counterfactuals. In our analysis, we also find that our method, due to its unique stochastic denoising process, does not require explicit incentives to generate diverse counterfactuals, unlike the previous counterfactual explainers for structured data." 2312.13632v1,"ProvFL: Client-Driven Interpretability of Global Model Predictions in Federated Learning Waris Gill Computer Science Department Virginia Tech Blacksburg, USA waris@vt.edu Ali Anwar Computer Science and Engineering Department University of Minnesota Twin Cities Minneapolis, USA aanwar@umn.edu Muhammad Ali Gulzar Computer Science Department Virginia Tech Blacksburg, USA gulzar@cs.vt.edu Abstract Federated Learning (FL) trains a collaborative machine learning model by aggregating multiple privately trained clients’ models over several training rounds. Such a long, continuous action of model aggregations poses significant challenges in reasoning about the origin and composition of such a global model. Regardless of the quality of the global model or if it has a fault, understanding the model’s origin is equally important for debugging, interpretability, and explainability in federated learning. FL application developers often question: (1) what clients contributed towards a global model and (2) if a global model predicts a label, which clients are responsible for it? We introduce, neuron provenance, a fine-grained lineage capturing mechanism that tracks the flow of information between the individual participating clients in FL and the final global model. We operationalize this concept in ProvFL that functions on two key principles. First, recognizing that monitoring every neuron of every client’s model statically is ineffective and noisy due to the uninterpretable nature of individual neurons, ProvFL dynamically isolates influential and sensitive neurons in the global model, significantly reducing the search space. Second, as multiple clients’ models are fused in each round to form a global model, tracking each client’s contribution becomes challenging. ProvFL leverages the invertible nature of fusion algorithms to precisely isolate each client’s contribution derived from selected neurons. When asked to localize the clients responsible for the given behavior (i.e., prediction) of the global model, ProvFL successfully localizes them with an average provenance accuracy of 97%. Additionally, ProvFL outperforms the state-of-the-art FL fault localization approach by an average margin of 50%. 1 Introduction Increasing ML/AI use cases are transitioning to Federated Learning (FL) McMahan et al. [2017], which enables privacy-preserving, collaborative training across many clients such as cellphones and hospitals. FL frameworks enable individual clients (e.g., user participants or organizations) to train an ML model on their local data in a secure environment, and then share the trained model to build a global model collaboratively. FL has gained extreme popularity as it trains accurate models without accessing user data, keeping data privacy intact Kairouz et al. [2021]. With the advent of" 2312.13633v1,"Multi-Modal Domain Adaptation Across Video Scenes for Temporal Video Grounding Haifeng Huang Yang Zhao Zehan Wang Yan Xia Zhou Zhao Labeled Source Domain: Kitchen Abstract Introduction Temporal video grounding is a task that aims to locate the temporal boundary of a specific segment in an untrimmed video based on a given language query. This task has garnered increasing attention in recent years due to its potential applications, such as video search engines and automated video editing. Supervised methods require a large number of precise temporal boundary labels to train discriminative models, which is highly labor-intensive and time-consuming. Due to the expensive annotation cost, TVG datasets typically collect long untrimmed videos from only a single (Regneri et al. 2013) or a few (Krishna et al. 2017; Gao et al. 2017; Zhou, Xu, and Corso 2018) scenes. These limited scenes impose strong scene-related factors on the learned knowledge of supervised models, leading to poor performance when applied Query: Query: 12.8s 21.9s Unlabeled Target Domain: Bedroom domain gap GT: A person is eating some food on the bed. modal gap Temporal Video Grounding (TVG) aims to localize the temporal boundary of a specific segment in an untrimmed video based on a given language query. Since datasets in this domain are often gathered from limited video scenes, models tend to overfit to scene-specific factors, which leads to suboptimal performance when encountering new scenes in realworld applications. In a new scene, the fine-grained annotations are often insufficient due to the expensive labor cost, while the coarse-grained video-query pairs are easier to obtain. Thus, to address this issue and enhance model performance on new scenes, we explore the TVG task in an unsupervised domain adaptation (UDA) setting across scenes for the first time, where the video-query pairs in the source scene (domain) are labeled with temporal boundaries, while those in the target scene are not. Under the UDA setting, we introduce a novel Adversarial Multi-modal Domain Adaptation (AMDA) method to adaptively adjust the model’s scenerelated knowledge by incorporating insights from the target data. Specifically, we tackle the domain gap by utilizing domain discriminators, which help identify valuable scenerelated features effective across both domains. Concurrently, we mitigate the semantic gap between different modalities by aligning video-query pairs with related semantics. Furthermore, we employ a mask-reconstruction approach to enhance the understanding of temporal semantics within a scene. Extensive experiments on Charades-STA, ActivityNet Captions, and YouCook2 demonstrate the effectiveness of our proposed method. domain gap Zhejiang University huanghaifeng@zju.edu.cn A person is eating food from various dishes beside the cooking table. Figure 1: An example of unsupervised domain adaptation for TVG. The source domain Kitchen is labeled with the ground truth (GT) of the temporal boundary, while the target domain Bedroom is not. directly to a new scene, as explicitly observed in our experiment. Adapting the model to new scenes is a crucial aspect of this task in real-world applications. For instance, in the video surveillance field, the model must be capable of handling videos collected from various scenes. However, data from a new scene may be insufficient or lack fine-grained annotations, making it impractical to retrain a model on it. Additionally, it is currently infeasible to collect a sufficiently large dataset and train a scene-independent model. However, compared to the expensive fine-grained annotations, the video-query pairs are usually easy to obtain from a new scene. In such scenarios, it is natural to approach this problem in a domain adaptation manner. Transferring knowledge from a labeled source domain to an unlabeled target domain is known as Unsupervised Domain Adaptation (UDA). In this work, we explore UDA across video scenes for the TVG task, where only the source domain/scene is labeled with temporal boundaries, while the target domain is not. As an example, we consider two scenes (Kitchen and Bedroom) from the Charades-STA dataset, as shown in Figure 1. For the action class ”eat food”, a model trained on the Kitchen scene would learn some Kitchen-related knowledge, such as ”the food is in a dish” or ”the person is standing when eating”. Consequently, when the model is applied to the Bedroom scene, it may become confused about ”a" 2312.13636v1,"Quantum Optimization Algorithms in Operations Research: Methods, Applications, and Implications Florian Klug Munich University of Applied Sciences florian.klug@hm.edu Abstract Quantum optimization algorithms (QOAs) have the potential to fundamentally transform the application of optimization methods in decision making. For certain classes of optimization problems, it is widely believed that QOA enables significant run-time performance benefits over current state-of-the art solutions. With the latest progress on building quantum computers entering the industrialization stage, quantum-based optimization algorithms have become more relevant. The recent extreme increase in the number of publications in the field of QOA demonstrates the growing importance of the topic in both the academia and the industry. The objectives of this paper are as follows: (1) First, we provide insight into the main techniques of quantum-based optimization algorithms for decision making. (2) We describe and compare the two basic classes of adiabatic and gate-based optimization algorithms and argue their potentials and limitations. (3) Herein, we also investigate the key operations research application areas that are expected to be considerably impacted by the use of QOA in decision making in the future. (4) Finally, current implications arising from the future use of QOA from an operations research perspective are discussed. 1. Introduction Quantum computing based on the principles of quantum mechanical phenomena has seen substantial advancements over the last few years. The ongoing evolution of quantum computing hardware and the advances of quantum algorithms have already demonstrated for specific problems, quantum speedups over classical computing (Arute et al., 2019). The intrinsic parallelism, based on the superposition principles of quantum states, in combination with interference effects, lead to exponential computing capabilities, which offer interesting possibilities in operations research (Creemers & Perez, 2022). From an optimization perspective, the superposition of quantum bits (qubits) – which exist in multiple states simultaneously - is therefore inherently well suited to solve optimization problems. However, the probabilistic nature of qubit measurement requires clever quantum algorithms to boost the probability of measuring some desired state that corresponds to a problem solution. Therefore, superposition alone is not sufficient to achieve a quantum advantage (Symons et al, 2023). As we progress toward large-scale quantum computers, operations researchers are increasingly addressing quantum-based optimization problems (Parekh, 2023). Modelling and solving 1" 2312.13655v1,"Compositional Zero-Shot Learning for Attribute- Based Object Reference in Human-Robot Interaction Peng Gao 1∗ , Ahmed Jaafar 1∗ , Brian Reily 2 , Christopher Reardon 3 , and Hao Zhang 1 1 University of Massachusetts Amherst, 2 DEVCOM Army Research Laboratory, 3 University of Denver penggao.robotics@gmail.com, ajaafar@umass.edu, brian.j.reily.civ@army.mil christopher.reardon@du.edu, hao.zhang@umass.edu *Authors contributed equally to this paper Abstract: Language-enabled robots have been widely studied over the past years to enable natural human-robot interaction and teaming in various real-world applications. Language-enabled robots must be able to comprehend referring expressions to identify a particular object from visual perception using a set of referring attributes extracted from natural language. However, visual observations of an object may not be available when it is referred to, and the number of objects and attributes may also be unbounded in open worlds. To address the challenges, we implement an attribute-based compositional zero-shot learning method that uses a list of attributes to perform referring expression comprehension in open worlds. We evaluate the approach on two datasets including the MIT-States and the Clothing 16K. The preliminary experimental results show that our implemented approach allows a robot to correctly identify the objects referred to by human commands. Keywords: Object Reference, Zero-Shot Learning, Human-Robot Interaction 1 Introduction Natural language-enabled robots have recently attracted considerable attention to enable intuitive, efficient, and transparent human-robot interaction and teaming [1, 2, 3], which has a wide variety of real-world applications throughout society, such as in elderly care, hospital assistance, education, inspection, and search and rescue [4, 5, 6]. Object reference, defined as the capability of identifying a particular object that a human teammate refers to, is essential for intelligent robots to appropriately communicate with humans [7]. In language-based communication, a language-enabled robot must comprehend a referring expression in order to recognize and localize a particular object from its visual perception using a set of referring attributes extracted from natural language by the human teammate. Figure 1: A motivating scenario of object reference for human-robot interaction. While robot perception has shown promising performance for recognizing object categories, they are insufficient for referring expression comprehension to represent and identify object instances from language and vision. First, an object instance can be referred to through language before it is observed, and visual data may not be available for the object at the time it is referenced, meaning that the robot may have to visually identify an unfamiliar object that has not previously observed. Second, most object recognition and detection techniques focus on identifying the same categories of objects but 7th Conference on Robot Learning (CoRL 2023), Atlanta, USA." 2312.13663v1,"Free-Editor: Zero-shot Text-driven 3D Scene Editing Nazmul Karim 1 , Umar Khalid 1 , Hasan Iqbal 2 , Jing Hua 2 , Chen Chen 1 1 University of Central Florida 2 Wayne State University mdnazmul.karim@ucf.edu, umar.khalid@ucf.edu, hasan.iqbal.cs@wayne.edu, https://free-editor.github.io/ Original Images Abstract Text-to-Image (T2I) diffusion models have gained popularity recently due to their multipurpose and easy-to-use nature, e.g. image and video generation as well as editing. However, training a diffusion model specifically for 3D scene editing is not straightforward due to the lack of large-scale datasets. To date, editing 3D scenes requires either re-training the model to adapt to various 3D edited scenes or design-specific methods for each special editing type. Furthermore, state-of-the-art (SOTA) methods require multiple synchronizedly edited images from the same scene to facilitate the scene editing. Due to the current limitations of T2I models, it is very challenging to apply consistent editing effects to multiple images, i.e. multi-view inconsistency in editing. This in turn compromises the desired 3D scene editing performance if these images are used. In our work, we propose a novel training-free 3D scene editing technique, F REE -E DITOR , which allows users to edit 3D scenes without further re-training the model during test time. Our proposed method successfully avoids the multiview style inconsistency issue in SOTA methods with the help of a “single-view editing” scheme. Specifically, we show that editing a particular 3D scene can be performed by only modifying a single view. To this end, we introduce an Edit Transformer that enforces intra-view consistency and inter-view style transfer by utilizing self- and crossattention, respectively. Since it is no longer required to re-train the model and edit every view in a scene, the editing time, as well as memory resources, are reduced significantly, e.g., the runtime being ∼ 20× faster than SOTA. We have conducted extensive experiments on a wide range of benchmark datasets and achieve the diverse editing capabilities with our proposed technique. T2I Edited Images jinghua@wayne.edu, chen.chen@crcv.ucf.edu Target Prompt: ""Turn him into Van Gogh Painting"" Figure 1. Multi-View Inconsistency in Current Text-to-Image (T2I) Editing Models: The current T2I editing model [6] faces significant challenges with multi-view consistency. This issue adversely affects the quality of 3D scene editing, especially when these edited views are used to synthesize novel views. This specific limitation is also acknowledged in InstructN2N [18]. It is important to note that this inconsistency is particularly problematic when rendering is performed without re-training, which aligns with the objectives of our study. as neural fields, have emerged as powerful 3D neural representations. Recent advances in this field [10, 11, 36, 55, 68] have focused on both novel view synthesis, scene reconstruction as well as 3D scene manipulations such as color editing [27, 55], scene composition [52, 54], and style transfer [16, 21]. Notably, it has been shown that text-guided 3D NeRF [18, 68] editing can be achieved through leveraging the diverse generation capability of 2D text-to-image (T2I) diffusion models [6, 17, 44]. Despite their demonstrated success existing methods need to i) re-train the editing model for each particular 3D scene which introduces computational and memory overhead, and ii) rely on the prior knowledge of specific editing types, which may not be feasible in most scenarios. For instance, InstructN2N [18] iteratively edits the training images of a scene until it obtains the desired editing result of the scene. The iterative 1. Introduction Neural Radiance Fields (NeRF) [35], neural implicits [58] as well as subsequent work [30, 36, 56], collectively termed 1" 2312.13694v1,"Data Transformation to Construct a Dataset for Generating Entity-Relationship Model from Natural Language Zhenwen Li 1 , Jian-Guang Lou 2 , Tao Xie 1 * 1 School of Computer Science, Peking University, China; 2 Microsoft Research Asia, Beijing, China; lizhenwen@pku.edu.cn, jlou@microsoft.com, taoxie@pku.edu.cn Abstract In order to reduce the manual cost of designing ER models, recent approaches have been proposed to address the task of NL2ERM, i.e., automatically generating entity-relationship (ER) models from natural language (NL) utterances such as software requirements. These approaches are typically rulebased ones, which rely on rigid heuristic rules; these approaches cannot generalize well to various linguistic ways of describing the same requirement. Despite having better generalization capability than rule-based approaches, deeplearning-based models are lacking for NL2ERM due to lacking a large-scale dataset. To address this issue, in this paper, we report our insight that there exists a high similarity between the task of NL2ERM and the increasingly popular task of text-to-SQL, and propose a data transformation algorithm that transforms the existing data of text-to-SQL into the data of NL2ERM. We apply our data transformation algorithm on Spider, one of the most popular text-to-SQL datasets, and we also collect some data entries with different NL types, to obtain a large-scale NL2ERM dataset.Because NL2ERM can be seen as a special information extraction (IE) task, we train two state-of-the-art IE models on our dataset. The experimental results show that both the two models achieve high performance and outperform existing baselines. Introduction Data modeling is the task to design a data model underlying a system under development. A commonly used type of data model is an entity-relationship (ER) model, which can be of great help in designing a database. An ER model consists of entities, attributes of entities, and relationships. There are two types of relationships: the relationship between a pair of entities (entity-entity relationship), and the relationship between an entity and an attribute (entity-attribute relationship). Given that manually designing an ER model is a daunting task (Omar, Hanna, and McKevitt 2004), recent approaches (Ahmed et al. 2021; Kashmira and Sumathipala 2018; Btoush and Hammad 2015; Omar, Hanna, and McK- evitt 2004; Hettiarachchi et al. 2019) use two steps to automatically generate ER models from natural language (NL) utterances such as software requirements, by first extracting entities/attributes and then extracting their relationships. The preceding existing NL2ERM approaches (typically rule-based ones that rely on rigid heuristic rules) face two * The corresponding author is Tao Xie. major limitations, causing them not to generalize well to various linguistic ways of describing the same requirement. First, a large number of rules are needed to cover the possible synonyms of a word appearing in the NL utterances. For example, there is a widely used rule: if two nouns are separated by “have” or “has”, then the former is an entity, while the latter is an attribute (Hettiarachchi et al. 2019; Btoush and Hammad 2015). However, there are a lot of sentences that the rule cannot process because the sentences use synonyms of the verb “have” (such as “own”, “contain”, and “possess”) not covered by the rule. Second, a large number of rules are needed to cover the possible patterns of NL utterances, because these rules process the NL utterances based on templates or regular expressions, instead of semantics. For example, there is a widely used rule: consecutive nouns separated by commas or “and” are attributes (Ahmed et al. 2021; Hettiarachchi et al. 2019). However, the sentence “Students are described by name and age” can be written as “Students not only have the name, but have the age as well”, and the latter pattern of the sentence is not applicable to the rule. Compared with rule-based approaches, deep-learningbased NL2ERM models can provide better generalization capability for various tasks (Edunov et al. 2018; Scholak, Schucher, and Bahdanau 2021; Pinter and Eisenstein 2018); however, there are two main reasons for lacking a largescale dataset (needed by these models), which is not readily available from previous related work (Btoush and Hammad 2015; Ahmed et al. 2021; Omar, Hanna, and McKevitt 2004). First, there are only a small number of data entries 1 in the datasets from the previous work, and there is no publicly available dataset released by the authors of the previous work. Most of the previous work evaluates their proposed approaches based on only case studies (Btoush and Hammad 2015; Ahmed et al. 2021). One exception is ER-Converter (Omar, Hanna, and McKevitt 2004), which is evaluated on a dataset with 30 entries, but the dataset is not publicly released. Second, training a deep-learning-based model needs data entries with fine-grained annotations (not provided by the previous work). A token-level annotation can greatly improve the model’s performance. The data used in the previ- 1 A data entry in NL2ERM includes some NL utterances and the corresponding ER model." 2312.13695v1,"Unexplored Frontiers: A Review of Empirical Studies of Exploratory Search Alan Medlar Denis Kotkov Dorota Głowacka Department of Computer Science University of Helsinki Helsinki, Finland alan.j.medlar@helsinki.fi Department of Computer Science University of Helsinki Helsinki, Finland denis.kotkov@helsinki.fi Department of Computer Science University of Helsinki Helsinki, Finland dorota.glowacka@helsinki.fi ABSTRACT 1 This article reviews how empirical research of exploratory search is conducted. We investigated aspects of interdisciplinarity, study settings and evaluation methodologies from a systematically selected sample of 231 publications from 2010-2021, including a total of 172 articles with empirical studies. Our results show that exploratory search is highly interdisciplinary, with the most frequently occurring publication venues including high impact venues in information science, information systems and human-computer interaction. However, taken in aggregate, the breadth of study settings investigated was limited. We found that a majority of studies (77%) focused on evaluating novel retrieval systems as opposed to investigating users’ search processes. Furthermore, a disproportionate number of studies were based on scientific literature search (20.7%), a majority of which only considered searching for Computer Science articles. Study participants were generally from convenience samples, with 75% of studies composed exclusively of students and other academics. The methodologies used for evaluation were mostly quantitative, but lacked consistency between studies and validated questionnaires were rarely used. In discussion, we offer a critical analysis of our findings and suggest potential improvements for future exploratory search studies. Exploratory search was conceptualised as the interdisciplinary study of how search could be used to facilitate complex tasks related to learning and investigation [29]. These search tasks are open-ended, give rise to evolving information needs and are highly subjective in terms of the relevance of search results to those needs [1, 48]. Research in exploratory search, therefore, necessitates empirical studies that blend aspects of information science, information retrieval and human-computer interaction to build retrieval systems that support exploratory search activities and to understand related search behaviors. While the complexity of exploratory search has led to definitions that are broad in scope [48], empirical studies tend to define exploratory search indirectly according to the attributes of search tasks believed to elicit exploratory behavior [24, 49]. In this article, we present a systematic review of empirical studies of exploratory search. The motivations for this review are twofold. First, since White and Roth there have been no reviews of exploratory search that surveyed the field as a whole [48]. Furthermore, while there have been reviews that focused on specific aspects of exploratory search, such as search tasks [49] and information seeking models [38], there have been no systematic reviews of the research literature. The period considered in our review, 2010-2021, was chosen to follow on from White and Roth. Second, we believe that analyzing empirical studies will help to clarify what the research community believes exploratory search is in practice or, at the very least, what aspects of exploratory search receive more attention than others. Furthermore, the related work sections of articles only give a limited snapshot of current research, whereas systematic reviews can provide an unbiased view of a given field of study. This article aims to provide as complete a picture of research in exploratory search as possible. We look at the interdisciplinary nature of exploratory search, identifying the most common publication venues and how authors from different disciplines position their research contributions. We enumerate what is studied in empirical studies, covering retrieval systems, search domains and simulated work tasks. We additionally investigate the experimental design characteristics of exploratory search studies, including the types of participants studied and what data is collected during evaluation. Lastly, we provide a discussion where we put our findings into context. We detail what we see as problems associated with current research practices and suggest potential improvements for future exploratory search studies CCS CONCEPTS • Information systems → Information retrieval; • Humancentered computing → User studies. KEYWORDS exploratory search, information retrieval, systematic review ACM Reference Format: Alan Medlar, Denis Kotkov, and Dorota Głowacka. 2018. Unexplored Frontiers: A Review of Empirical Studies of Exploratory Search. J. ACM 37, 4, Article 111 (August 2018), 9 pages. https://doi.org/XXXXXXX.XXXXXXX Authors’ addresses: Alan Medlar, Department of Computer Science University of Helsinki, Helsinki, Finland, alan.j.medlar@helsinki.fi; Denis Kotkov, Department of Computer Science University of Helsinki, Helsinki, Finland, denis.kotkov@helsinki.fi; Dorota Głowacka, Department of Computer Science University of Helsinki, Helsinki, Finland, dorota.glowacka@helsinki.fi. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM 0004-5411/2018/8-ART111 https://doi.org/XXXXXXX.XXXXXXX INTRODUCTION" 2312.13704v1,"A Forecasting-Based DLP Approach for Data Security Kishu Gupta and Ashwani Kush Abstract Sensitive data leakage is the major growing problem being faced by enterprises in this technical era. Data leakage causes severe threats for organization of data safety which badly affects the reputation of organizations. Data leakage is the flow of sensitive data/information from any data holder to an unauthorized destination. Data leak prevention (DLP) is set of techniques that try to alleviate the threats which may hinder data security. DLP unveils guilty user responsible for data leakage and ensures that user without appropriate permission cannot access sensitive data and also provides protection to sensitive data if sensitive data is shared accidentally. In this paper, data leakage prevention (DLP) model is used to restrict/grant data access permission to user, based on the forecast of their access to data. This study provides a DLP solution using data statistical analysis to forecast the data access possibilities of any user in future based on the access to data in the past. The proposed approach makes use of renowned simple piecewise linear function for learning/training to model. The results show that the proposed DLP approach with high level of precision can correctly classify between users even in cases of extreme data access. Keywords Data leakage · Data leakage prevention · Forecast · Guilty agent · Statistical analysis 1 Introduction The NIST explains computer security as “protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, K. Gupta ( B ) Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India e-mail: kishugupta2@gmail.com A. Kush Institute of Integrated and Hons. Studies, Kurukshetra University, Kurukshetra, India e-mail: akush20@gmail.com © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 A. Khanna et al. (eds.), Data Analytics and Management, Lecture Notes on Data Engineering and Communications Technologies 54, https://doi.org/10.1007/978-981-15-8335-3_1 1 This article has been accepted in Springer Nature Singapore Pte Ltd. © 2021 Springer. Personal use of this material is permitted. Permission from Springer Nature Singapore must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This work is freely available for survey and citation." 2312.13715v1,"Meta-control of Dialogue Systems Using Large Language Models Kotaro Shukuri 1 , Ryoma Ishigaki 1 , Jundai Suzuki 1 , Tsubasa Naganuma 1 , Takuma Fujimoto 1 Daisuke Kawakubo 1 , Masaki Shuzo 1 and Eisaku Maeda 1 Abstract— Utilizing Large Language Models (LLMs) facilitates the creation of flexible and natural dialogues, a task that has been challenging with traditional rule-based dialogue systems. However, LLMs also have the potential to produce unexpected responses, which may not align with the intentions of dialogue system designers. To address this issue, this paper introduces a meta-control method that employs LLMs to develop more stable and adaptable dialogue systems. The method includes dialogue flow control to ensure that utterances conform to predefined scenarios and turn-taking control to foster natural dialogues. Furthermore, we have implemented a dialogue system that utilizes this meta-control strategy and verified that the dialogue system utilizing meta-control operates as intended. Start GPT-4 DFCP Command Index Utterance System Utterance Control Command Command Index I. INTRODUCTION In the construction of dialogue systems, it is common to design rule-based systems to achieve system-driven dialogue tailored to their intended purpose. However, it was difficult for this rule-based dialogue system to make a dialogue like a chatting dialogue continue for a long period of time without breaking down. Recently, there has been an increasing trend towards utilizing Large Language Models (LLMs) to enable flexible and diverse utterance generation. However, controlling LLMs outputs explicitly remain a challenge, and creating stable and ongoing dialogue systems using LLMs is not always straightforward. The Dialogue Robot Competition (DRC2023) [1] presented a challenge: constructing a multimodal dialogue system for an android robot acting as a travel agency representative. The objective of this dialogue is to attentively listen to user’s travel needs, and formulate and present a satisfying travel plan. In addition to maintaining a stable dialogue that progresses toward a clear, predefined goal, it is necessary to have the ability to generate flexible utterances and control the dialogue in response to the user’s various utterances. II. OVERVIEW OF DIALOGUE SYSTEM DSML-TDU For DRC2023, we developed the DSML-TDU dialogue system, the overview of which is shown in Fig. 1. In managing the introduction, closing, and the 10-minute dialogue duration, we employed a rule-based dialogue control. For *This work was supported by Grant-in-Aid for Scientific Research on Innovative Areas, Grant Numbers JP19H05693 1 K. Shukuri, R. Ishigaki, J. Suzuki, T. Naganuma, T. Fujimoto, D. Kawakubo, M. Shuzo, E. Maeda are with Tokyo Denki University, 5 Senju Asahi-cho, Adachi-ku, Tokyo 120-8551, Japan {20aj076@ms, 20aj012@ms, 20aj078@ms, 20aj098@ms, 20aj112@ms, 22amj10@ms, shuzo@mail, maeda.e@mail}.dendai.ac.jp GPT-4 TTCP Image Viewer Control Command Tanka Generator User Utterance GSR End Fig. 1. Overview of dialogue flow in DSML-TDU system other components of the system, we utilized an LLM for both utterance generation and dialogue control. We used GPT-4 as the LLM and Google Speech Recognizer (GSR) for speech recognition. To effectively harness GPT-4, we prepared two types of prompts: “Dialogue Flow Control Prompt (DFCP)” and “Turn-Take Control Prompt (TTCP).” The distinctive features of these prompts are that, in addition to generating utterances, they facilitate branching decisions at scenario junctions and control the turn-taking in dialogues. We refer to this functionality as ‘meta-control.’ The prompts in this paper are originally written in Japanese and have been translated into English. III. META-CONTROL BY 2 PROMPTS FOR GPT-4 A. Dialogue Flow Control Prompt (DFCP) The DFCP is a tool designed to simultaneously generate utterances and control the overall dialogue flow, consisting of 146 lines and 4905 characters. Parts of it are presented in Fig. 2 and 3. The part of DFCP shown in Fig. 2 defines the dialogue content and flow, with the system’s utterances and the dialogue flow changing based on the its history. In this system, GPT-4 generates utterances solely based on the DFCP and dialogue history. Fig. 3 shows the part of the DFCP that controls the commands to be executed. It" 2312.13718v1,"Thermodynamics and Holography of Three-dimensional Accelerating black holes Jia Tian 1,2∗ and Tengzhou Lai 3† 1 State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Theoretical Physics, Shanxi University, Taiyuan 030006, P. R. China 2 Kavli Institute for Theoretical Sciences (KITS), University of Chinese Academy of Science, 100190 Beijing, P. R. China 3 School of Physical Sciences, University of Chinese Academy of Sciences, Zhongguancun East Road 80, Beijing 100190, P. R. China Abstract We address the problem of describing the thermodynamics and holography of three-dimensional accelerating black holes. By embedding the solutions in the Chern-Simons formalism, we identify two distinct masses, each with its associated first law of thermodynamics. We also show that a boundary entropy should be included (or excluded) in the black hole entropy. 1 Introduction Black holes play pivotal roles in general relativity, quantum gravity, and AdS/CFT holography [1–3]. An intriguing category is the accelerating black hole. Its exact solution existed solely in four-dimensional (4D) spacetime, termed the C-metric, until recently when 3D C-metrics describing compact accelerating black holes were introduced in [4,5]. 4D C-metrics have been scrutinized in many aspects [6–38]. However, the 3D C-metric which is supposed to be a simpler playground for holographic exploration proves more enigmatic [4, 39–41]. ∗ † wukongjiaozi@ucas.ac.cn laitengzhou20@mails.ucas.ac.cn 1" 2312.13742v1,"First measurement of the neutron-emission probability with a surrogate reaction in inverse kinematics at a heavy-ion storage ring M. Sguazzin, 1, ∗ B. Jurado, 1, † J. Pibernat, 1 J. A. Swartz, 1, ‡ M. Grieser, 2 J. Glorius, 3 Yu. A. Litvinov, 3 J. Adamczewski-Musch, 3 P. Alfaurt, 1 P. Ascher, 1 L. Audouin, 4 C. Berthelot, 1 B. Blank, 1 K. Blaum, 2 B. Brückner, 5 S. Dellmann, 5 I. Dillmann, 6, 7 C. Domingo-Pardo, 8 M. Dupuis, 9, 10 P. Erbacher, 5 M. Flayol, 1 O. Forstner, 3 D. Freire-Fernández, 2, 11 M. Gerbaux, 1 J. Giovinazzo, 1 S. Grévy, 1 C. J. Griffin, 6 A. Gumberidze, 3 S. Heil, 5 A. Heinz, 12 D. Kurtulgil, 5 N. Kurz, 3 G. Leckenby, 6, 13 S. Litvinov, 3 B. Lorentz, 3 V. Méot, 9, 10 J. Michaud, 1, ∗ S. Pérard, 1 N. Petridis, 3 U. Popp, 3 D. Ramos, 14 R. Reifarth, 5, 15 M. Roche, 1 M.S. Sanjari, 3, 16 R.S. Sidhu, 17, 3, 2 U. Spillmann, 3 M. Steck, 3 Th. Stöhlker, 3 B. Thomas, 1 L. Thulliez, 18 M. Versteegen, 1 and B. W loch 1 1 Université de Bordeaux, CNRS, LP2I Bordeaux, 33170 Gradignan, France 2 Max-Planck-Institut für Kernphysik, 69117 Heidelberg, Germany 3 GSI Helmholtzzentrum für Schwerionenforschung, 64291 Darmstadt, Germany 4 Université Paris-Saclay, CNRS, IJCLab, 91405 Orsay, France 5 Goethe University of Frankfurt, 60438 Frankfurt, Germany 6 TRIUMF, Vancouver, British Columbia, V6T 2A3, Canada 7 Department of Physics and Astronomy, University of Victoria, Victoria, BC, V8P 5C2, Canada 8 IFIC, CSIC-Universidad de Valencia, 46980 Valencia, Spain 9 CEA, DAM, DIF, 91297 Arpajon, France 10 Université Paris-Saclay, CEA, LMCE, 91680 Bruyères-Le-Châtel, France 11 Ruprecht-Karls-Universität Heidelberg, 69117 Heidelberg, Germany 12 Chalmers University of Technology, 41296 Gothenburg, Sweden 13 Department of Physics and Astronomy, University of British Columbia, Vancouver, BC, V6T 1Z1, Canada 14 GANIL, CRNS/IN2P3-CEA/DRF, 14000 Caen, France 15 Los Alamos National Laboratory, Los Alamos, NM, 87544, USA 16 Aachen University of Applied Sciences, Aachen, Germany 17 School of Physics and Astronomy, University of Edinburgh, EH9 3FD Edinburgh, United Kingdom 18 IRFU, CEA, Université Paris-Saclay, 91191 Gif-sur-Yvette, France (Dated: December 22, 2023) Neutron-induced reaction cross sections of short-lived nuclei are imperative to understand the origin of heavy elements in stellar nucleosynthesis and for societal applications, but their measurement is extremely complicated due to the radioactivity of the targets involved. One way of overcoming this issue is to combine surrogate reactions with the unique possibilities offered by heavy-ion storage rings. In this work, we describe the first surrogate-reaction experiment in inverse kinematics, which we successfully conducted at the Experimental Storage Ring (ESR) of the GSI/FAIR facility, using the 208 Pb(p,p’) reaction as a surrogate for neutron capture on 207 Pb. Thanks to the outstanding detection efficiencies possible at the ESR, we were able to measure for the first time the neutron-emission probability as a function of the excitation energy of 208 Pb. We demonstrate the strong connection between this probability and the neutron-induced radiative capture cross section of 207 Pb, and provide reliable results for this cross section at neutron energies for which no experimental data exist. Knowledge of neutron-induced reaction cross sections of short-lived nuclei is pivotal to our understanding of the synthesis of elements via the astrophysical slow (s) and rapid (r) neutron capture processes, about which there are still many uncertainties and open questions [1]. Furthermore, it is also of interest for applications such as nuclear waste management and innovative fuel cycles [2]. In traditional experiments, the direct measurement of neutron-induced cross sections of short-lived nuclei is very challenging because of the difficulties to produce and handle radioactive targets. Performing the same ∗ Present address: IJCLab, 91405 Orsay, France † Corresponding author, jurado@cenbg.in2p3.fr ‡ Present address: FRIB, MSU, Michigan 48824, USA reaction in inverse kinematics, with the heavy, radioactive nucleus impinging upon a target of neutrons, is not possible either, since free neutron targets are currently not available. For these reasons, when the target nuclei are highly radioactive, experimental data are scarce and most of the neutron-induced reaction cross sections rely on theoretical model predictions. However, these predictions often have very large uncertainties due to difficulties in describing the de-excitation process of the nucleus formed after the capture of the neutron. This process is ruled by fundamental properties (γ-ray strength functions, nuclear level densities, fission barriers, etc.) for which the existing nuclear models give very different predictions. This can lead to discrepancies between the calculated cross sections as large as two orders of magnitude or more [3, 4]." 2312.13749v1,"Automated Market Maker on the XRP Ledger Firas Dahi 1 , Walter Hernandez 1,2 , Yebo Feng 3 , Jiahua Xu 1,2 , Aanchal Malhotra 4 , Paolo Tasca 1,2 University College London, 2 DLT Science Foundation, 3 Nanyan Technological University, 4 Ripple Labs Inc {firas.dahi.22, walter.hernandez.18, jiahua.xu, p.tasca}@ucl.ac.uk, yebo.feng@ntu.edu.sg, amalhotra@ripple.com 1 Abstract—This research paper focuses on the testing and evaluation of the proposed XRP Ledger (XRPL)-Automated Market Maker (AMM), designed to address the limitations observed in traditional Ethereum-based Automated Market Makers (AMMs), such as high transaction fees, significant slippage, high impermanent losses, synchronization issues, and low transaction throughput. XRPL-AMM leverages the swift, cost-efficient transaction capabilities of XRPL and its unique design, featuring a Continuous Auction Mechanism (CAM) that encourages arbitrage transactions for more efficient price synchronization with external markets. Our testing and evaluation of the proposed XRPL-AMM compares its performance against established players like Uniswap. Our evaluation results reveal that the XRPL-AMM, leveraging market volatility, outperforms Uniswap in various areas, including slippage and impermanent loss reduction, the pace of price synchronization, and overall operational efficiency. Our research contributes to the growing field of Decentralized Finance (DeFi) by providing comprehensive testing results that underline XRPL-AMM’s potential as a more efficient alternative to current AMMs while encouraging further exploration in XRPL-based DeFi ecosystems. Index Terms—Automated Market Maker, XRP Ledger, Decentralized Finance, Continuous Auction Mechanism I. I NTRODUCTION Decentralized Finance (DeFi) has revolutionized the financial sector by leveraging blockchain technology to offer alternative, transparent financial services, eliminating the need for traditional intermediaries like banks [1]. DeFi, enabled by smart contracts on platforms such as Ethereum, encompasses a variety of services, ranging from lending to asset management [2]–[4]. It is characterized by its ability to reduce intermediary costs and democratize financial access, earning the nickname ”financial lego” due to its modular nature that facilitates the creation of complex financial products [2]. This innovation suggests a potential reshaping of the financial landscape. A pivotal aspect of DeFi is the Automated Market Maker (AMM), a novel Decentralized Exchange (DEX) protocol introduced by Bancor in 2017 and later popularized by Uniswap in 2018 [5], [6]. AMMs use algorithms for asset pricing to facilitate trading and liquidity creation, eliminating the need for traditional market participants. AMMs have become instrumental in providing liquidity for less popular assets [5]– [8]. Despite their utility, most AMMs operate on the Ethereum blockchain and face challenges such as high transaction fees, significant slippage, impermanent loss risks, and synchronization issues [9], [10]. To address these concerns, this paper investigates the performance of an AMM integrated at the protocol level of the XRP Ledger (XRPL), known for its rapid and low-cost transactions. We aim to demonstrate that the XRPL-AMM surpasses traditional Ethereum-based AMMs like Uniswap regarding speed, scalability, and efficiency [11]. Our research compares the XRPL-AMM with Uniswap, chosen for its dominance of over 60% in Decentralized Exchanges (DEXs) market share by trading volume [12]. Our results show that the XRPL-AMM reduces slippage and impermanent losses, improves price synchronization speed, and enhances overall operational efficiency. II. R ELATED W ORK Significant research has focused on various AMMs, yielding diverse models and approaches. Key studies, such as [10], [13], [14], offer insights into major AMMs’ features, crucial for comparing with the XRPL-AMM. Notably, Uniswap V2 minimizes gas fees with a simple bonding curve, V3 improves capital efficiency via concentrated liquidity, Balancer supports multi-asset pools, Curve.fi specializes in similar-pegged assets, and DODO integrates external price feeds to counteract divergence loss [10]. Despite these differences, most AMMs, including these, are based on or adapted from Uniswap V2’s Constant Product Market Maker (CPMM) model [10], [15]. On the other hand, existing AMM research predominantly focuses on Ethereum-based DEXs [10], which are mostly built as smart contracts executing on top of a blockchain via, most of the time, the Ethereum Virtual Machine (EVM). This architecture often lags in transaction execution speed compared to native transactions, leading to increased slippage. Additionally, to the best of our knowledge, there are no other AMMs built directly at the protocol level of a blockchain, making direct comparisons with the XRPL-AMM challenging. Moreover, considering the lack of existing research on XRPL- based AMM solutions, this inaugural study ventures into the unexplored domain of XRPL-based AMMs and highlights the advantages of protocol-level integration compared to traditional smart contracts implementations, noting the challenges of direct comparison. III. B ACKGROUD & T ERMINOLOGY Table I provides a brief overview of AMM-based DEXs. Additionally, we include in Table II a glossary of terms used in this paper. IV. U NDERLYING I NFRASTRUCTURE The XRPL-AMM is powered by the XRPL, which has been operating, conceivably, the world’s oldest DEX [16]. This platform has provided liquidity through manual market making" 2312.13767v1,"SUBSTITUTIONS AND CANTOR REAL NUMERATION SYSTEMS ÉMILIE CHARLIER 1,∗ , CÉLIA CISTERNINO 1 , ZUZANA MASÁKOVÁ 2 AND EDITA PELANTOVÁ 2 Abstract. We consider Cantor real numeration system as a frame in which every nonnegative real number has a positional representation. The system is defined using a bi-infinite sequence B = (β n ) n∈Z of real numbers greater than one. We introduce the set of B-integers and code the sequence of gaps between consecutive B-integers by a symbolic sequence in general over the alphabet N. We show that this sequence is S-adic. We focus on alternate base systems, where the sequence B of bases is periodic and characterize alternate bases B, in which B-integers can be coded using a symbolic sequence v B over a finite alphabet. With these so-called Parry alternate bases we associate some substitutions and show that v B is a fixed point of their composition. The paper generalizes results of Fabre and Burdík et al. obtained for the Rényi numerations systems, i.e., in the case when the Cantor base B is a constant sequence. 2010 Mathematics Subject Classification: 11K16, 11R06, 37B10, 68Q45 Keywords: Expansions of real number, Cantor real bases, Alternate base, Integers 1. Introduction In the pursuit of a generalization of the famous Cobham’s theorem, Fabre [16] has associated substitutions with numeration systems with one real base β which is a Parry number. Such substitutions have for their fixed points infinite sequences which are sometimes called Parry words, or k-bonacci-like words. They include the famous Fibonacci sequence corresponding to the golden ratio numeration system. Although Fabre himself viewed the substitutions in the context of automata recognizing the language of an associated linear numeration system, it can be derived already from Thurston [24] that the substitutions may serve for generating the set of numbers with integer expansion in base β, the so-called β-integers. These numbers were identified as a suitable tool in the description of mathematical models of quasicrystals [10], since their arithmetic and diffractive properties generalize the arithmetic and diffractive properties of ordinary integers which give an underlying structure of periodic crystals. Certain physical properties of materials such as electron conductivity can be derived from the character of the spectrum of a Schroedinger operator associated with the model. As identified in the works of Damanik [14, 15], the spectrum depends on combinatorial properties of infinite sequences coding distances in the β-integers, such as the factor complexity, palindromicity, repetition index, etc. Other physical properties can be derived from their geometric behavior [1, 3, 21]. First studies of combinatorics of Parry sequences date back to the paper of Burdík et al. [10]. More general results about their factor complexity can be found in [17, 5]. Palindromic complexity is the subject of [2]. Turek in [25] gives a tool to compute abelian E-mail address: echarlier@uliege.be, celiacisternino@gmail.com, zuzana.masakova@fjfi.cvut.cz and edita.pelantova@fjfi.cvut.cz ∗ Corresponding author. 1" 2312.13783v1,"Few Shot Part Segmentation Reveals Compositional Logic for Industrial Anomaly Detection Soopil Kim 1,3 , Sion An 1 , Philip Chikontwe 1 , Myeongkyun Kang 1,3 , Ehsan Adeli 3 , Kilian M. Pohl 3 , Sanghyun Park 1,2 1 Robotics and Mechatronics Engineering, DGIST, Daegu, Korea 2 AI Graduate School, DGIST, Daegu, Korea 3 Stanford University, Stanford, CA 94305, USA {soopilkim, shpark13135}@dgist.ac.kr Abstract Logical anomalies (LA) refer to data violating underlying logical constraints e.g., the quantity, arrangement, or composition of components within an image. Detecting accurately such anomalies requires models to reason about various component types through segmentation. However, curation of pixel-level annotations for semantic segmentation is both time-consuming and expensive. Although there are some prior few-shot or unsupervised co-part segmentation algorithms, they often fail on images with industrial object. These images have components with similar textures and shapes, and a precise differentiation proves challenging. In this study, we introduce a novel component segmentation model for LA detection that leverages a few labeled samples and unlabeled images sharing logical constraints. To ensure consistent segmentation across unlabeled images, we employ a histogram matching loss in conjunction with an entropy loss. As segmentation predictions play a crucial role, we propose to enhance both local and global sample validity detection by capturing key aspects from visual semantics via three memory banks: class histograms, component composition embeddings and patch-level representations. For effective LA detection, we propose an adaptive scaling strategy to standardize anomaly scores from different memory banks in inference. Extensive experiments on the public benchmark MVTec LOCO AD reveal our method achieves 98.1% AU- ROC in LA detection vs. 89.6% from competing methods. Introduction In industrial images, defects can be categorized into two main types: structural and logical anomalies (Bergmann et al. 2022). Structural anomalies (e.g., cracks and contamination) occur in localized regions often absent in normal data, whereas logical anomalies refer to data that does not adhere to underlying logical constraints, e.g., component composition and arrangement. Herein, effective detection requires the consideration of long-range dependencies within and across images. Existing research on anomaly detection (AD) for industrial images has primarily focused on unsupervised approaches that aim to learn the distribution of normal data and detect outliers as anomalies. This has resulted in stateof-the-art models that have reported impressive scores ex- Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. (A) Unsupervised AD (C) Man Normal Normal Images (B) Part Segmentation Few Labeled Images Unsupervised AD Normal Images Figure 1: Comparison of approaches at a conceptual level. (A) The anomaly detection (AD) model is directly trained using images. (B) Our proposed method guides part segmentation models using a few labeled samples to accurately segment components and then uses the segments for AD. (C) Examples of logical anomalies show the importance of semantically segmenting components for detection. ceeding 99% (Roth et al. 2022). This high score can be attributed to the nature of public benchmarks (e.g., MVTec AD (Bergmann et al. 2019) and MTD (Huang et al. 2020)), which predominantly comprises structural anomalies, resulting in models with much lower performance when targeting logical anomalies (Bergmann et al. 2022). To address logical AD, current methods implicitly consider global dependencies among multiple components for effective detection, as described in Fig. 1A. For example, (Bergmann et al. 2022) proposed a hybrid feature reconstruction model, while (Tzachor, Hoshen et al. 2023) introduced a histogram-based density estimation model. Despite these advancements, performance is constrained by the inability to accurately differentiate various components. For more accurate logical AD, it is essential to semantically segment the product’s components, as they often exhibit similar features (e.g., peaches vs. mandarins in Fig. 1C). This task is closely related to co-part segmentation (Hung et al. 2019), as normal samples’ similar components follow pre-defined logics. However, existing unsupervised methods (Hung et al. 2019; Gao et al. 2021) often fail to precisely segment such components since they cannot distinguish similar features without relying on supervised guidance. (C" 2312.13784v1,"Accepted at the 4 th Workshop on Graphs and more Complex structures for Learning and Reasoning (GCLR) at AAAI 2024 Benchmarking Evolutionary Community Detection Algorithms in Dynamic Networks Giordano Paoletti 1 , Luca Gioacchini 1 , Marco Mellia 1 , Luca Vassio 1 , Jussara M. Almeida 2 1 Politecnico di Torino, Turin, Italy first.last@polito.it 2 Universidade Federal de Minas Gerais, Belo Horizonte, Brazil jussara@dcc.ufmg.br Abstract In dynamic complex networks, entities interact and form network communities that evolve over time. Among the many static Community Detection (CD) solutions, the modularitybased Louvain, or Greedy Modularity Algorithm (GMA), is widely employed in real-world applications due to its intuitiveness and scalability. Nevertheless, addressing CD in dynamic graphs remains an open problem, since the evolution of the network connections may poison the identification of communities, which may be evolving at a slower pace. Hence, naı̈vely applying GMA to successive network snapshots may lead to temporal inconsistencies in the communities. Two evolutionary adaptations of GMA, sGMA and αGMA, have been proposed to tackle this problem. Yet, evaluating the performance of these methods and understanding to which scenarios each one is better suited is challenging because of the lack of a comprehensive set of metrics and a consistent ground truth. To address these challenges, we propose (i) a benchmarking framework for evolutionary CD algorithms in dynamic networks and (ii) a generalised modularity-based approach (NeGMA). Our framework allows us to generate synthetic community-structured graphs and design evolving scenarios with nine basic graph transformations occurring at different rates. We evaluate performance through three metrics we define, i.e. Correctness, Delay, and Stability. Our findings reveal that αGMA is wellsuited for detecting intermittent transformations, but struggles with abrupt changes; sGMA achieves superior stability, but fails to detect emerging communities; and NeGMA appears a well-balanced solution, excelling in responsiveness and instantaneous transformations detection. 1 Introduction Dynamic complex networks, or graphs, serve as a powerful tool to model computer, social or generic communications where entities (nodes) interact with each other establishing connections (edges) that evolve over time (Wang et al. 2019; Dakiche et al. 2019). Detecting communities, or groups of nodes that exhibit stronger internal connections compared to their connections with the broader network (Girvan and Newman 2002), and understanding their temporal dynamics is crucial for a deeper comprehension of the underlying structure and function of the systems they represent. The scientific literature is rich in Community Detection (CD) approaches for static graphs, like the application of spectral clustering algorithms to the graph Laplacian (Ng, Jordan, and Weiss 2001; Dall’Amico, Couillet, and Tremblay 2020), hierarchical CD (Li et al. 2022) or statistical modelling (Peixoto 2019; Geng, Bhattacharya, and Pati 2019), just to cite few. Among them, the modularity-based Louvain, or Greedy Modularity Algorithm (GMA) (Blondel et al. 2008), is one of the most used methods for realworld applications. It is a fast and scalable solution to detect an unspecified number of communities in both small and large heterogeneous networks by optimising their modularity (Newman 2006), an intuitive and easily understandable measure of a graph tendency to form communities. Nevertheless, due to the ever-changing nature of connections, network topologies are constantly changing. Such changes may or may not represent a natural evolution of the underlying communities. For example, short-term changes in node and edge sets might suggest substantial changes. However, beneath these rapid fluctuations, the underlying communities might remain consistent or evolve at a significantly slower pace than the observed changes suggest. Finding effective solutions to address CD problems in dynamic graphs is still an arduous challenge (Dakiche et al. 2019). A naı̈ve approach involves independently running GMA on successive snapshots of the dynamic graph. Nevertheless, this necessitates an additional step to align communities across time, typically by comparing membership overlap (Spiliopoulou et al. 2013), which can result in a loss of temporal coherence. To our knowledge, the first attempt to adapt GMA for evolutionary scenarios is the Stabilised Louvain (sGMA) (Aynaud and Guillaume 2010). This method iteratively applies the standard Louvain over snapshots by initialising nodes as members of their previously assigned communities. Another approach is Louvain with memory (αGMA) (Elgazzar, Spurlock, and Bogart 2021). This approach incorporates a memory term into the weights of the graph edges prior to the application of standard GMA. While these algorithms successfully maintain temporal consistency in community assignments, their relative performance in different scenarios of community evolution is still unclear. For illustration purposes, in Figure 1 we consider the detection of communities in the SocioPatterns dataset (Stehlé et al. 2011), which records the interactions between children and teachers in ten classes of a primary school during a day. To that end, we run 50 instances of independent GMA as well as the two aforementioned evolution-" 2312.13832v1,"S YNC D REAMER FOR 3D R ECONSTRUCTION OF E NDANGERED A NIMAL S PECIES WITH N E RF AND N EU S Ahmet Haydar Ornek, Deniz Sen, Esmanur Civil Huawei Türkiye R&D Center İstanbul, Türkiye {ahmet.haydar.ornek2, deniz.sen1, esmanur.civil1}@huawei.com A BSTRACT The main aim of this study is to demonstrate how innovative view synthesis and 3D reconstruction techniques can be used to create models of endangered species using monocular RGB images. To achieve this, we employed SyncDreamer to produce unique perspectives and NeuS and NeRF to reconstruct 3D representations. We chose four different animals, including the oriental stork, frog, dragonfly, and tiger, as our subjects for this study. Our results show that the combination of SyncDreamer, NeRF, and NeuS techniques can successfully create 3D models of endangered animals. However, we also observed that NeuS produced blurry images, while NeRF generated sharper but noisier images. This study highlights the potential of modeling endangered animals and offers a new direction for future research in this field. By showcasing the effectiveness of these advanced techniques, we hope to encourage further exploration and development of techniques for preserving and studying endangered species. Keywords SyncDreamer · NeuS · NeRF · 3D · Reconstruction · Novel View Synthesis 1 Introduction In recent years, the pervasive influence of Artificial Intelligence (AI) and deep learning technologies has substantially reshaped our daily lives, revolutionizing diverse sectors ranging from healthcare to entertainment. Within this transformative landscape, generative AI, with its ability to autonomously create realistic and intricate content, has emerged as a focal point of technological innovation. This surge in interest has been notably propelled by the advent of the stable diffusion(SD) algorithm, a groundbreaking development that has propelled generative AI to new heights. Concurrently, the field has witnessed remarkable progress in 3D generation capabilities, further expanding the potential applications of AI in various domains. As the amount of data and the advancements in the field of neural implicit 3D representations have remarkably increased, the utilization of generative AI has started to be used in the industry. However, training consistent 3D representations requires large numbers of data samples, which is not always available in certain cases. Preserving biodiversity remains a critical concern, with many species facing the threat of extinction in the wild. Compounding this challenge is the scarcity of image data for certain endangered species, making it difficult to create 3D models using the existing generative AI-based approaches. This paper explores the intersection of 3D generative AI and wildlife conservation, discussing the results of the existing zero-shot 3D model generation approaches to address the data scarcity issue. By leveraging advanced AI techniques, particularly in generative novel view synthesis and neural implicit representations, we aim to generate 3D models of endangered species from limited existing samples. This study not only underscores the multifaceted impact of AI on real-world challenges but also exemplifies its potential to contribute meaningfully to the preservation of our planet’s biodiversity. The graphical abstract of the study can be seen in Fig 1. Our main contributions are as follows: • Generating a novel view of endangered species using SyncDreamer • Creating 3D representations using NeRF • Generating 3D representations using NeuS" 2312.13874v1,"Time resolved optical response of the Dicke’s model via the nonequilibrium Green’s function approach Megha Gopalakrishna*, Yaroslav Pavlyukh*, Claudio Verdozzi* Megha Gopalakrishna Department of Physics, Division of Mathematical Physics, Lund University, 22100 Lund, Sweden Email Address: megha.gopalakrishna@teorfys.lu.se Yaroslav Pavlyukh Institute of Theoretical Physics, Faculty of Fundamental Problems of Technology, Wroclaw University of Science and Technology, 50-370 Wroclaw, Poland Email Address: yaroslav.pavlyukh@pwr.edu.pl Claudio Verdozzi Department of Physics, Division of Mathematical Physics and ETSF, Lund University, 22100 Lund, Sweden Email Address: Claudio.Verdozzi@teorfys.lu.se Keywords: second harmonic generation, Dicke model, Disordered Dicke model, Non-equilibrium Green’s functions, Exact diagonalization, Cavity leakage Due to their conceptual appeal and computational convenience, two-level systems (TLS) and their generalisations are often used to investigate nonlinear behavior in quantum optics, and to assess the applicability of theoretical methods. Here the focus is on second harmonic generation (SHG) and, as system of interest, on the Dicke model, which consists of several TLSs inside an optical cavity. The main aspect addressed is the scope of non-equilibrium Green’s function (NEGF) to describe the effect of disorder and electronelectron (e-e) interactions on the SHG signal. For benchmarking purposes, exact diagonalization (ED) results are also presented and discussed. SHG spectra obtained with NEGF and ED are found to be in very good mutual agreement in most situations. Furthermore, inhomogeneity in the TLS and e-e interactions reduce the strength of SHG, and the reduction is stronger with inhomogeneity than with interactions. This trend is consistently noted across different (small to large) system sizes. Finally, a modified NEGF approach is proposed to account for cavity leakage, where the quantum photon fields are coupled to a bath of classical oscillators. As to be expected, within this mixed quantum-classical scheme a decrease in the intensity of the fluorescent spectra takes place depending on the entity of cavity leakage. 1 Introduction Second harmonic generation (SHG) is a non-linear phenomenon in which two incident photons are absorbed simultaneously, and a single photon is emitted with doubled frequency [1]. SHG is the focus of extensive basic and applied research in physics, chemistry, biology, engineering and medicine [2, 3, 4, 5, 6], because of its fundamental interest as optical process, and because its vast use in characterization technique and optical devices. Extensive investigations of SHG have been conducted both theoretically and experimentally in many systems and there is now a rather comprehensive and firm understanding of this optical process. There are, however, still some particular situations where our grasp of SHG remains conceptually not complete. The one of interest in this work is when many photon effects play a role, and yet quantum fluctuations remain noticeable [7, 8, 9]. This paper focusses on this specific regime, using the Dicke model [10] as the system of interest. The Dicke model holds significance in cavity optics, and has been vastly used in the study of superradiance [10, 11]. It is also a go-to model for many theoretical explorations concerning basic aspects of light-matter interaction, and has also been considered in a simplified form by applying the so-called rotating wave approximation (RWA)[12, 13]: in this case, the model is mostly known as as the Tavis-Cummings model [14] (see e.g. [15] for a review). 1" 2312.13883v1,"Filamentation of a Relativistic Proton Bunch in Plasma L. Verra, 1, ∗ C. Amoedo, 1 N. Torrado, 1, 2 A. Clairembaud, 1 J. Mezger, 3 F. Pannell, 4 J. Pucek, 3 N. van Gils, 1 M. Bergamaschi, 3 G. Zevi Della Porta, 1, 3 N. Lopes, 2 A. Sublet, 1 M. Turner, 1 E. Gschwendtner, 1 and P. Muggli 3 (AWAKE Collaboration) R. Agnello, 5 C.C. Ahdida, 1 Y. Andrebe, 5 O. Apsimon, 6, 7 R. Apsimon, 7, 8 J.M. Arnesano, 1 V. Bencini, 1, 9 P. Blanchard, 5 P.N. Burrows, 9 B. Buttenschön, 10 A. Caldwell, 3 M. Chung, 11 D.A. Cooke, 4 C. Davut, 6, 7 G. Demeter, 12 A.C. Dexter, 7, 8 S. Doebert, 1 J. Farmer, 3 A. Fasoli, 5 R. Fonseca, 13, 2 I. Furno, 5 E. Granados, 1 M. Granetzny, 14 T. Graubner, 15 O. Grulke, 10, 16 E. Guran, 1 J. Henderson, 7, 17 M.Á. Kedves, 12 F. Kraus, 15 M. Krupa, 1 T. Lefevre, 1 L. Liang, 6, 7 S. Liu, 18 K. Lotov, 19, 20 M. Martinez Calderon, 1 S. Mazzoni, 1 K. Moon, 11 P.I. Morales Guzmán, 3 M. Moreira, 2 T. Nechaeva, 3 N. Okhotnikov, 19, 20 C. Pakuza, 9 A. Pardons, 1 K. Pepitone, 21 E. Poimendidou, 1 A. Pukhov, 22 R.L. Ramjiawan, 1, 9 L. Ranc, 3 S. Rey, 1 R. Rossel, 1 H. Saberi, 6, 7 O. Schmitz, 14 E. Senes, 1 F. Silva, 23 L. Silva, 2 B. Spear, 9 C. Stollberg, 5 C. Swain, 7, 24 A. Topaloudis, 1 P. Tuev, 19, 20 F. Velotti, 1 V. Verzilov, 18 J. Vieira, 2 E. Walter, 25 C. Welsch, 7, 24 M. Wendt, 1 M. Wing, 4 J. Wolfenden, 7, 24 B. Woolley, 1 G. Xia, 7, 6 V. Yarygova, 19, 20 and M. Zepp 14 1 CERN, 1211 Geneva 23, Switzerland GoLP/Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisbon, Portugal 3 Max Planck Institute for Physics, 80805 Munich, Germany 4 UCL, London WC1 6BT, United Kingdom 5 Ecole Polytechnique Federale de Lausanne (EPFL), Swiss Plasma Center (SPC), 1015 Lausanne, Switzerland 6 University of Manchester M13 9PL, Manchester M13 9PL, United Kingdom 7 Cockcroft Institute, Warrington WA4 4AD, United Kingdom 8 Lancaster University, Lancaster LA1 4YB, United Kingdom 9 John Adams Institute, Oxford University, Oxford OX1 3RH, United Kingdom 10 Max Planck Institute for Plasma Physics, 17491 Greifswald, Germany 11 UNIST, Ulsan 44919, Republic of Korea 12 HUN-REN Wigner Research Centre for Physics, Budapest, Hungary 13 ISCTE - Instituto Universitéario de Lisboa, 1049-001 Lisbon, Portugal 14 University of Wisconsin, Madison, WI 53706, USA 15 Philipps-Universität Marburg, 35032 Marburg, Germany 16 Technical University of Denmark, 2800 Kgs. Lyngby, Denmark 17 STFC/ASTeC, Daresbury Laboratory, Warrington WA4 4AD, United Kingdom 18 TRIUMF, Vancouver, BC V6T 2A3, Canada 19 Budker Institute of Nuclear Physics SB RAS, 630090 Novosibirsk, Russia 20 Novosibirsk State University, 630090 Novosibirsk , Russia 21 Angstrom Laboratory, Department of Physics and Astronomy, 752 37 Uppsala, Sweden 22 Heinrich-Heine-Universität Düsseldorf, 40225 Düsseldorf, Germany 23 INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisbon, Portugal 24 University of Liverpool, Liverpool L69 7ZE, United Kingdom 25 Max Planck Institute for Plasma Physics, Munich, Germany (Dated: December 22, 2023) 2 We show in experiments that a long, underdense, relativistic proton bunch propagating in plasma undergoes the oblique instability, that we observe as filamentation. We determine a threshold value for the ratio between the bunch transverse size and plasma skin depth for the instability to occur. At the threshold, the outcome of the experiment alternates between filamentation and self-modulation instability (evidenced by longitudinal modulation into microbunches). Time-resolved images of the bunch density distribution reveal that filamentation grows to an observable level late along the bunch, confirming the spatio-temporal nature of the instability. We calculate the amplitude of the magnetic field generated in the plasma by the instability and show that the associated magnetic energy increases with plasma density. ∗ livio.verra@lnf.infn.it; Present Address: Nazionali di Frascati, 00044 Frascati, Italy INFN Laboratori" 2312.13886v1,"The Cosmological Constant Potential: a resolution to the Hubble tension via the cosmological sound horizon Nima Khosravi 1, 2, ∗ 1 Department of Physics, Sharif University of Technology, Tehran 11155-9161, Iran 2 Department of Physics, Shahid Beheshti University, 1983969411, Tehran, Iran (Dated: December 22, 2023) The cosmological constant term can be seen as a constant potential for a (scalar) field. In this viewpoint, at late times, the field is stopped rolling and behaves as a cosmological constant (w = −1). While at the early universe, its kinetic term can be dominant and behaves as a stiff fluid (w = +1). This new phase lowers the cosmological sound horizon by increasing the Hubble parameter for very high redshifts. Consequently, the lower cosmological sound horizon results in the higher Hubble constant at the present time. This early phase ends before the photon decoupling, so we do not expect any new physics after the last scattering surface. We checked this model in the presence of (reduced) CMB, BAO’s and H 0 datasets and could show the Hubble tension is fully relieved. I. INTRODUCTION: The tensions and anomalies can lead us to understand better and deeper our theoretical models as well as observations. In recent years the Hubble (H 0 ) tension in cosmology made us to think more about the standard model of cosmology ΛCDM which includes the cosmological constant (Λ) and the cold dark matter (CDM) as main ingredients. The H 0 tension shows a discrepancy between the local direct measurements of H 0 by distance ladders [1–3] and the inferred value by the cosmic microwave background (CMB) [4]. Although, the CMB is an indirect measurement which means one needs to assume the ΛCDM to connect physics of early universe to the present time observations. Though H 0 tension seems to be the most severe one but there are many other reported tensions and anomalies: the S 8 tension [5], the lensing anomaly [4] and the spatial anomalies [6, 7]. However our main focus will be on the H 0 tension in this work. If these tensions are not statistical flukes or systematics then there is a request to explain them by new theoretical models, the models beyond the standard ΛCDM [8]. There are a vast literature trying to address the H 0 tension by modifying different parts of the standard model. The natural scenarios seem those which are related to the late time dark energy [8]. But there are some counterarguments against them [9]. A way to see the problem is to look at BAO’s: BAO’s share the same physics with CMB. This makes solving the H 0 tension by the late time modifications hard since it seems the late time modifications affect CMB and BAO differently. Then (based on this argument) there are early modification of cosmological constitutes [10–12]. The idea is to modify the sound horizon scale, r s , and since the CMB put constraint on a combination of H 0 and r s then one can be able to address the Hubble tension indirectly. Again there is still some ∗ Electronic address: nima@sharif.edu arguments against these models [13]. In this work, we study (maybe) the simplest possible model i.e. the standard ΛCDM but we change our viewpoint on the cosmological constant term. We look at this constant as a constant potential where its associated (scalar) field stoped rolling at the late times. The early dynamics of this field can affect the cosmological expansion and consequently r s and H 0 as we will show. II. MODEL: The model is (almost) exactly the standard ΛCDM model with a twist of interpretation on the cosmological constant, Λ, which opens a new way to look at. We assume the Λ term is a potential of a (scalar) field i.e. V (ϕ) = Λ. This means we have a very specific case of quintessence model   √ µ L = −g R − ∂ µ ϕ ∂ ϕ − V (ϕ) (1) where as mentioned above V (ϕ) = Λ is a constant. Now the equation of motion for the scalar field will be □ϕ + V ,ϕ = 0 (2) which for our scenario reduces to □ϕ = 0 with two solutions (in the case of isotropic and homogeneous cosmological background) ϕ = constant, ϕ ∝ a −3 (3) (4) where a is the scale factor for the FRW metric. The first solution gives exactly the standard ΛCDM model but the second one has some non-trivial and interesting properties. However since the equation in linear in ϕ so the superposition of both is a solution. To go further let’s switch to the perfect fluid prescription for the scalar fields . ρ ϕ = ∂ µ ϕ ∂ µ ϕ + V (ϕ) = ∂ µ ϕ ∂ µ ϕ + Λ, (5) . p ϕ = ∂ µ ϕ ∂ µ ϕ − V (ϕ) = ∂ µ ϕ ∂ µ ϕ − Λ (6)" 2312.13892v1,"Efficient Quantum Algorithm for Filtering Product States Reinis Irmejs, ∗ Mari Carmen Bañuls, and J. Ignacio Cirac Max-Planck-Institut für Quantenoptik, Hans-Kopfermann-Straße 1, D-85748 Garching, Germany and Munich Center for Quantum Science and Technology (MCQST), Schellingstraße 4, D-80799 Munich, Germany (Dated: December 22, 2023) We introduce a quantum algorithm to efficiently prepare states with an arbitrarily small energy variance at the target energy. We achieve it by filtering a product state at the given energy with a Lorentzian filter of width δ. Given a local Hamiltonian on N qubits, we construct a parent Hamiltonian whose ground √ state corresponds to the filtered product state with variable energy variance proportional to δ N . We prove that the parent Hamiltonian is gapped and its ground state can be efficiently implemented in poly(N, 1/δ) time via adiabatic evolution. We numerically benchmark the algorithm for a particular non-integrable model and find that the adiabatic evolution time to prepare the filtered state with a width δ is independent of the system size N . Furthermore, the adiabatic evolution can be implemented with circuit depth O(N 2 δ −4 ). Our algorithm provides a way to study the finite energy regime of many body systems in quantum simulators by directly preparing a finite energy state, providing access to an approximation of the microcanonical properties at an arbitrary energy. I. INTRODUCTION Quantum computing introduces a novel approach to computational tasks, with one of the main advantages being the efficient simulation of physical quantum systems. The advantage lies in the potential for exponential enhancement in spatial resources by encoding the system’s degrees of freedom into qubits, enabling direct operations and calculations on them [1–4]. A particularly compelling application pertains to determining the ground state properties of systems – a realm of zero-temperature behavior. While, in general, identifying the ground state of a local Hamiltonian stands as a QMA-hard problem [5, 6], for typical physically relevant systems solutions are attainable. Quantum adiabatic evolution offers a method for preparing the ground state of a specified Hamiltonian. This process commences from a readily preparable ground state of the Hamiltonian H 0 and involves time-evolving the system to a target Hamiltonian H 1 . This strategy’s success relies on an energy gap that scales favorably with system size [7]. Nonetheless, studying excited states is equally important, particularly to understand systems in thermal equilibrium. In practice, addressing a particular eigenstate of the system is extremely difficult. However, analyzing states of a small energy variance around the target energy is equally interesting. Having access to finite energy states of a small energy variance could be useful for studying physics in many fields. In the field of manybody physics, one can calculate the expectation values for observables, perform time dynamics simulations, and calculate entanglement properties of the state, i.e., Renyi entropies [8, 9]. Furthermore, given access to two states at different energies, it becomes possible to verify the predictions of the eigenstate thermalization hypothesis [10]. ∗ reinis.irmejs@mpq.mpg.de In chemistry, the excited states can be used to simulate molecular dynamics [11]. The preparation of such states has been well studied using tensor networks [12–14]. In [13], a relationship between the energy variance and the associated entanglement entropy of the state was established, showing the need for a large bond dimension to approximate the states with small energy variance. The difficulty of analyzing the excited states classically has sparked an interest in developing quantum algorithms for this purpose. The first quantum algorithm to prepare excited states with reduced variance was quantum phase estimation (QPE) [15, 16]; however, this approach is very costly. An alternative is to use time series [17–21], which does not require preparation of the state to extract its properties; nevertheless, it uses costly controlled evolution operations. In [22], observables at a given energy were calculated without direct state preparation but through energy filtering with a cosine filter, deconstructing it into a sum of Loschmidt echoes coupled with subsequent classical post-processing. In this work, we propose a very different way of directly preparing a state of small energy variance. For a given Hamiltonian H, we find a product state |Ψ⟩ at the target energy and filter it to an arbitrarily small variance. This is achieved by defining a parent Hamiltonian H that depends on H, |Ψ⟩, and on a filter width parameter δ that is proportional to the desired energy variance. By construction, the unique ground state |Φ⟩ of the parent Hamiltonian H corresponds to the filtered product state. Furthermore, we define a gapped adiabatic path that connects the initial product state |Ψ⟩ with the filtered state |Φ⟩. Thus, performing adiabatic evolution along this path allows one to efficiently prepare a finite variance approximation of the excited eigenstate at a given energy. We notice that in [23], a similar parent Hamiltonian construction was used to prepare a Gibbs state of a Hamiltonian with commuting terms. In Section II, we formally introduce the algorithm, in Section III, we perform a numerical investigation to es-" 2312.13896v1,"Comparative Evaluation of Anomaly Detection Methods for Fraud Detection in Online Credit Card Payments Hugo Thimonier 1 , Fabrice Popineau 1 , Arpad Rimmel 1 , Bich-Liên Doan 1 , and Fabrice Daniel 2 1 Université Paris-Saclay, CNRS, CentraleSupélec, Laboratoire Interdisciplinaire des Sciences du Numérique, 91190, Gif-sur-Yvette, France name.surname@lisn.fr, 2 LUSIS AI, Paris, France Abstract. This study explores the application of anomaly detection (AD) methods in imbalanced learning tasks, focusing on fraud detection using real online credit card payment data. We assess the performance of several recent AD methods and compare their effectiveness against standard supervised learning methods. Offering evidence of distribution shift within our dataset, we analyze its impact on the tested models’ performances. Our findings reveal that LightGBM exhibits significantly superior performance across all evaluated metrics but suffers more from distribution shifts than AD methods. Furthermore, our investigation reveals that LightGBM also captures the majority of frauds detected by AD methods. This observation challenges the potential benefits of ensemble methods to combine supervised, and AD approaches to enhance performance. In summary, this research provides practical insights into the utility of these techniques in real-world scenarios, showing LightGBM’s superiority in fraud detection while highlighting challenges related to distribution shifts. Keywords: Imbalanced Learning, Anomaly Detection, Fraud Detection 1 Introduction Detecting fraudulent behaviors has emerged as a critical problem that has garnered significant attention from practitioners and scholars alike. In sectors such as banking, frauds incurred an estimated annual cost of $28.58 billion in 2021, as highlighted by the Nilson Report 2021 3 . To address the challenge of identifying frauds within regular credit card payments, banks have increasingly turned to machine learning techniques, known for their effectiveness in many classification tasks, particularly with unstructured data. Two critical features of fraud detection pose challenges to constructing effective and accurate classifiers: highly imbalanced classes and distribution shift. 3 https://nilsonreport.com/" 2312.13912v1,"Solving Long-run Average Reward Robust MDPs via Stochastic Games Krishnendu Chatterjee 1 , Ehsan Kafshdar Goharshady 1 , Mehrdad Karrabi 1 , Petr Novotný 2 , Ðord̄e Žikelić 3∗ 1 Institute of Science and Technology Austria (ISTA), Austria 2 Masaryk University, Czech Republic 3 Singapore Management University, Singapore {krishnendu.chatterjee, ehsan.goharshady, mehrdad.karrabi}@ist.ac.at, petr.novotny@fi.muni.cz, dzikelic@smu.edu.sg Abstract Markov decision processes (MDPs) provide a standard framework for sequential decision making under uncertainty. However, transition probabilities in MDPs are often estimated from data and MDPs do not take data uncertainty into account. Robust Markov decision processes (RMDPs) address this shortcoming of MDPs by assigning to each transition an uncertainty set rather than a single probability value. The goal of solving RMDPs is then to find a policy which maximizes the worstcase performance over the uncertainty sets. In this work, we consider polytopic RMDPs in which all uncertainty sets are polytopes and study the problem of solving long-run average reward polytopic RMDPs. Our focus is on computational complexity aspects and efficient algorithms. We present a novel perspective on this problem and show that it can be reduced to solving long-run average reward turn-based stochastic games with finite state and action spaces. This reduction allows us to derive several important consequences that were hitherto not known to hold for polytopic RMDPs. First, we derive new computational complexity bounds for solving long-run average reward polytopic RMDPs, showing for the first time that the threshold decision problem for them is in NP∩ CO NP and that they admit a randomized algorithm with sub-exponential expected runtime. Second, we present Robust Polytopic Policy Iteration (RPPI), a novel policy iteration algorithm for solving long-run average reward polytopic RMDPs. Our experimental evaluation shows that RPPI is much more efficient in solving long-run average reward polytopic RMDPs compared to state-of-theart methods based on value iteration. 1 Introduction Robust Markov decision processes Markov decision processes (MDPs) are widely adopted as a framework for ∗ Part of the work done while the author was at Institute of Science and Technology Austria (ISTA). sequential decision making in environments that exhibit stochastic uncertainty [Puterman, 1994]. The goal of solving an MDP is to compute a policy which maximizes expected payoff with respect to some reward objective. However, classical algorithms for solving MDPs assume that transition probabilities are known and available. While this is plausible from a theoretical perspective, in practice this assumption is not always justified – transition probabilities are typically inferred from data and as such their estimates come with a certain level of uncertainty. This has motivated the study of robust Markov decision processes (RMDPs) [Nilim and Ghaoui, 2003; Iyengar, 2005]. RMDPs differ from MDPs in that they only assume knowledge of some uncertainty set containing true transition probabilities. The goal of solving RMDPs is to compute a policy which maximizes the worstcase expected payoff with respect to all possible choices of transition probabilities belonging to the uncertainty set. The advantage of considering RMDPs rather than MDPs for planning and sequential decision making tasks is that solving RMDPs provides policies that are robust to potential uncertainty in the underlying environment model. Long-run average reward RMDPs Recent years have seen significant interest in solving RMDPs. Two most fundamental reward objectives defined over unbounded or infinite time horizon trajectories are the discounted-sum reward and the long-run average reward. While there are many works on solving discounted-sum reward RMDPs (see an overview of related work below), the problem of solving long-run average reward RMDPs remains comparatively less explored. However, long-run average reward is, along with discounted-sum, one of the two fundamental objectives used in agent planning and reinforcement learning [Puterman, 1994; Sutton et al., 1999]. Unlike discounted-sum, which places more emphasis on earlier rewards, long run average reward focuses on the long-term sustainability of the reward signal. Prior work and challenges Most prior work on solving long-run average reward RMDPs focuses on special instances of RMDPs in which uncertainty sets are either products of intervals (i.e. L ∞ -balls) or L 1 -balls around some pivot probability distribution. These works typically focus on studying Blackwell optimality in RMDPs. In standard MDPs, Blackwell optimality [Puterman, 1994] is a classical result which says that there exists some threshold discount factor" 2312.13939v1,"BINARY ENDOGENOUS TREATMENT IN STOCHASTIC FRONTIER MODELS WITH AN APPLICATION TO SOIL CONSERVATION IN EL SALVADOR SAMUELE CENTORRINO ∗ ( ∗ ) Corresponding Author. Economics Department, the State University of New York at Stony Brook, USA. Email address: samuele.centorrino@stonybrook.edu. MARÍA PÉREZ URDIALES Inter-American Development Bank, Water and Sanitation Division, USA. Email address: mariaurdl@iadb.org. BORIS BRAVO-URETA Department of Agricultural and Resource Economics, University of Connecticut, USA. Email address: boris.bravoureta@uconn.edu. ALAN WALL Oviedo Efficiency Group and Department of Economics, University of Oviedo, Spain. Email address: awall@uniovi.es. Abstract. Improving the productivity of the agricultural sector is part of one of the Sustainable Development Goals set by the United Nations. To this end, many international organizations have funded training and technology transfer programs that aim to promote productivity and income growth, fight poverty and enhance food security among smallholder farmers in developing countries. Stochastic production frontier analysis can be a useful tool when evaluating the effectiveness of these programs. However, accounting for treatment endogeneity, often intrinsic to these interventions, only recently has received any attention in the stochastic frontier literature. In this work, we extend the classical maximum likelihood estimation of stochastic production frontier models by allowing both the production frontier and inefficiency to depend on a potentially endogenous binary treatment. We use instrumental variables to define an assignment mechanism for the treatment, and we explicitly model the density of the first and second-stage composite error terms. We provide empirical evidence of the importance of controlling for endogeneity in this setting using farm-level data from a soil conservation program in El Salvador. Keywords: Binary treatment; Endogeneity; Stochastic Frontier; Maximum Likelihood; Technical efficiency. JEL Codes: C10; C13; C25; C26; Q12. Date: December 22, 2023. The authors wish to thank Christopher F. Parmeter, participants in the 11th North American Productivity 1 and seminar participants at the Center of Produc- Workshop (NAPW XI), especially Subal C. Kumbhakar, tivity and Performance of Loughborough University, and the Center for Econometrics and Business Analytics for valuable comments and remarks. The views expressed do not reflect those of the IDB, its Executive Board or its Management." 2312.13969v1,"Article An event-driven link-level simulator for validation of AFDX and Ethernet avionics networks Pablo Vera-Soto 1 , Javier Villegas 1 , Sergio Fortes 1, * , José Pulido 1 , Vicente Escaño 2 , Rafael Ortiz 2 Raquel Barco 1 1 2 * Keywords: Avionics, ARINC664, AFDX, Ethernet, communications, verification and validation, protocols Citation: Vera-Soto, P.; Villegas, J.; 1. Introduction R.; Barco, R. An event-driven link-level simulator for validation of AFDX and Ethernet avionics networks. Aerospace 2023, 1, 0. https://doi.org/ Received: Revised: Accepted: Published: Copyright: © 2023 by the authors. Submitted to Aerospace for possible access publication the terms the Creative and under conditions Commons of Attri- bution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Telecommunication Research Institute (TELMA), University of Málaga, E.T.S. Ingeniería de Telecomunicación, Boulevar Louis Pasteur 35, 29010, Málaga, Spain; {pvera, jvc, sfr, josepa, rmb}@ic.uma.es Aerospace and Defence Systems, Aertec Solutions, 29590 Málaga, Spain; {vescano, rortiz}@aertecsolutions.com Correspondence: sfr@ic.uma.es Abstract: Aircraft are composed of many electronic systems: sensors, displays, navigation equipment and communication elements. These elements require a reliable interconnection, which is a major challenge for communication networks as high reliability and predictability requirements must be verified for safe operation. In addition, their verification via hardware deployments is limited because these are costly and make difficult to try different architectures and configurations, thus delaying the design and development in this area. Therefore, verification at early stages in the design process is of great importance and must be supported by simulation. In this context, this work presents an event-driven link level framework and simulator for the validation of avionics networks. The presented tool supports communication protocols such as Avionics Full-Duplex Switched Ethernet (AFDX), which is a common protocol in avionics, as well as Ethernet, used with static routing. Alsa, accurate results are facilitated by the simulator through the utilization of realistic models for the different devices. The proposed platform is evaluated in Clean Sky’s Disruptive Cockpit for Large Passenger Aircraft architecture scenario showing capabilities of the simulator. The speed of the verification is a key factor in its application, so the computational cost is analysed, proving that the execution time is linearly dependent on the number of messages sent. Fortes, S.; Pulido, J.; Escaño, V.; Ortiz, open and The aerospace industry has undergone tremendous advances since its conception just over 100 years ago by the Wright brothers. Of great importance in these advances has been the introduction of avionics (a term derived from the combination of aviation and electronics), which encompasses all the electronic systems that have been added to aircraft, including a wide range of equipment such as actuators, sensors and communication systems, and which make up the majority of the safety-critical elements in an aircraft. Within the advancement of avionics, the approach based on the concept of Integrated Modular Avionics (IMA) [1] has been extended to commercial aviation with the design of airplanes like the Airbus A380 [2] and Boeing 777 [3]. This approach involves distributing various safety-critical functions, which are becoming increasingly numerous due to technological advancements, into separate independent modules connected within an avionics network. Moreover, the new generations of IMAs use not only software distribution, as in the original versions, but also employ hardware distribution, which places the modules closer to the components they monitor for faster response. These newer generations are referred to as Distributed IMA (DIMA). These systems cover diverse categories and applications, such as navigation, communication, flight control, etc. Version December 22, 2023 submitted to Aerospace https://www.mdpi.com/journal/aerospace" 2312.13976v1,"Anatomical basis of sex differences in human post-myocardial infarction ECG phenotypes identified by novel automated torsocardiac 3D reconstruction Hannah J. Smith 1 , Blanca Rodriguez 1 , Yuling Sang 2 , Marcel Beetz 2 , Robin P. Choudhury 3 , Vicente Grau 2 , and Abhirup Banerjee 2,3 1 Computational Cardiovascular Science Group, Department of Computer Science, University of Oxford, Oxford OX1 3QD, United Kingdom 2 Institute of Biomedical Engineering, Department of Engineering Science, University of Oxford, Oxford OX3 7DQ, United Kingdom 3 Division of Cardiovascular Medicine, Radcliffe Department of Medicine, University of Oxford, Oxford OX3 9DU, United Kingdom * Address for correspondence. Abhirup Banerjee, Institute of Biomedical Engineering, Department of Engineering Science, University of Oxford, Oxford OX3 7DQ, United Kingdom, abhirup.banerjee@eng.ox.ac.uk Acknowledgements. This research has been conducted using the UK Biobank Resource under Application Number ‘40161’. HJS is supported by a Wellcome Trust Studentship. AB is a Royal Society University Research Fellow and is supported by the Royal Society Grant No. URF\R1\221314. The works of AB, RPC, and VG are supported by the British Heart Foundation (BHF) Project under Grant PG/20/21/35082. This work was funded by a Wellcome Trust Fellowship in Basic Biomedical Sciences to BR (214290/Z/18/Z) and the CompBioMed 2 Centre of Excellence in Computational Biomedicine (European Commission Horizon 2020 research and innovation programme, grant agreements No. 823712) to BR and VG. The authors would like to thank Dr Ernesto Zacur for providing valuable suggestions on the 3D anatomical mesh reconstruction. Competing interests. The authors declare no competing interests. Author contributions. HJS, BR, VG, and AB conceptualised the study and designed the research. BR, VG, RPC, and AB supervised the research. HJS and AB acquired and curated the dataset. AB and HJS developed the reconstruction pipeline. HJS, AB, YS, and MB pre-processed and cleaned the data. HJS and AB conducted the study and analysed the data and the results. HJS, AB, BR, and VG prepared the original draft and reviewed and edited the manuscript. All authors discussed the results, provided comments regarding the manuscript, and agreed on the final draft. Data availability. The UK Biobank data is publicly available and can be accessed by application upon approval here: https://www.ukbiobank.ac.uk/enable-your-research/register. Code availability. The codes used to create the models and perform analysis were implemented on multiple programming platforms and can be accessed by contacting the corresponding author upon a reasonable request." 2312.13997v1,"MNRAS 000, 1–22 (2023) Preprint 22 December 2023 Compiled using MNRAS L A TEX style file v3.0 Spatially resolving the volatile sulfur abundance in the HD 100546 protoplanetary disk Luke Keyte, 1★ Mihkel Kama, 1,2 Ko-Ju Chuang, 3 L. Ilsedore Cleeves, 4 Maria N. Drozdovskaya, 5 Kenji Furuya, 6 Jonathan Rawlings, 1 Oliver Shorttle 7 1 Department of Physics and Astronomy, University College London, Gower Street, WC1E 6BT London, United Kingdom 2 Tartu Observatory, Observatooriumi 1, Tõravere 61602, Tartu, Estonia 3 Laboratory for Astrophysics, Leiden Observatory, Leiden University, P.O. Box 9513, NL-2300 RA Leiden, the Netherlands. 4 Department of Astronomy, University of Virginia, Charlottesville, VA 22904, USA 5 Center for Space and Habitability, Universität Bern, Gesellschaftsstrasse 6, CH-3012 Bern, Switzerland 6 National Astronomical Observatory of Japan, Osawa 2-21-1, Mitaka, Tokyo 181-8588, Japan 7 Department of Earth Sciences & Institute of Astronomy, University of Cambridge, United Kingdom Accepted on 20th December 2023 ABSTRACT Volatile elements play a crucial role in the formation of planetary systems. Their abundance and distribution in protoplanetary disks provide vital insights into the connection between formation processes and the atmospheric composition of individual planets. Sulfur, being one of the most abundant elements in planet-forming environments, is of great significance, and now observable in exoplanets with JWST. However, planetary formation models currently lack vital knowledge regarding sulfur chemistry in protoplanetary disks. Developing a deeper understanding of the major volatile sulfur carriers in disks is essential to building models that can meaningfully predict planetary atmospheric composition, and reconstruct planetary formation pathways. In this work, we combine archival observations with new data from ALMA and APEX, covering a range of sulfurbearing species/isotopologs. We interpret this data using the dali thermo-chemical code, for which our model is highly refined and disk-specific. We find that volatile sulfur is heavily depleted from the cosmic value by a factor of ∼ 1000, with a disk-averaged abundance of S/H ∼ 10 −8 . We show that the gas-phase sulfur abundance varies radially by ≳ 3 orders of magnitude, with the highest abundances inside the inner dust ring and coincident with the outer dust ring at 𝑟 ∼ 150 to 230 au. Extracting chemical abundances from our models, we find OCS, H 2 CS, and CS to be the dominant molecular carriers in the gas phase. We also infer the presence of a substantial OCS ice reservoir. We relate our results to the potential atmospheric composition of planets in HD 100546, and the wider exoplanet population. Key words: protoplanetary disks – exoplanets – planets and satellites: formation – submillimetre: planetary systems 1 INTRODUCTION Sulfur is one of the most abundant elements in the Universe, essential to astrochemistry and biological processes. Understanding sulfur’s path from the interstellar medium, through disks, and into planets is of increasing importance, relevant to the study of planetary formation and the search for life. Despite this, sulfur chemistry in star- and planet-forming environments is poorly understood. In the interstellar medium the total sulfur abundance is S/H = 1.32 × 10 −5 , of which 99% is in the gas phase (Savage & Sembach 1996; Asplund et al. 2009). In molecular clouds, however, a factor of ≥10 depletion is observed (e.g. Tieftrunk et al. 1994). This missing sulfur constitutes one of the major outstanding questions in astrochemistry. Similarly, the main carrier of volatile sulfur in protoplanetary disks is also unknown. Chemical models predict the dominant volatile carriers to include species such as H 2 S, OCS, SO, SO 2 and CS, but ★ E-mail: luke.keyte.18@ucl.ac.uk © 2023 The Authors past observations have typically lacked the sensitivity to definitively address the volatile sulfur budget in disks (e.g. Wakelam et al. 2004). In some systems, upper limits determined from non-detections have been used to provide useful constraints (eg. Le Gal et al. 2021). Some clues about sulfur’s chemical pathway through molecular clouds and into planetary systems come from observations of our own Solar System, where sulfur-bearing species are routinely detected in comets. These are most often in the form of H 2 S and S 2 (Mumma & Charnley 2011), but also include a large variety of other species. Observations of 67P/Churyumov-Gerasimneko, for example, uncovered a wealth of sulfurated species in the cometary coma, including H 2 S, S, S 2 , S 3 , S 4 , SO, SO 2 , H 2 CS, CS 2 , OCS, C 2 H 6 S, CH 3 SH, and NH + 4 SH − (Le Roy et al. 2015; Calmonte et al. 2016; Altwegg et al. 2022). Such observations provide valuable insights into the conditions and processes that existed during the formation of the Solar System. By comparison, observations of sulfur-bearing species in protoplanetary disks are relatively rare, with only six different molecules" 2312.14021v1,"IEEE/ACM TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING 1 Leveraging Visual Supervision for Array-based Active Speaker Detection and Localization Davide Berghi, Student Member, IEEE, and Philip J.B. Jackson, Member, IEEE Abstract—Conventional audio-visual approaches for active speaker detection (ASD) typically rely on visually pre-extracted face tracks and the corresponding single-channel audio to find the speaker in a video. Therefore, they tend to fail every time the face of the speaker is not visible. We demonstrate that a simple audio convolutional recurrent neural network (CRNN) trained with spatial input features extracted from multichannel audio can perform simultaneous horizontal active speaker detection and localization (ASDL), independently of the visual modality. To address the time and cost of generating ground truth labels to train such a system, we propose a new self-supervised training pipeline that embraces a “student-teacher” learning approach. A conventional pre-trained active speaker detector is adopted as a “teacher” network to provide the position of the speakers as pseudo-labels. The multichannel audio “student” network is trained to generate the same results. At inference, the student network can generalize and locate also the occluded speakers that the teacher network is not able to detect visually, yielding considerable improvements in recall rate. Experiments on the TragicTalkers dataset show that an audio network trained with the proposed self-supervised learning approach can exceed the performance of the typical audio-visual methods and produce results competitive with the costly conventional supervised training. We demonstrate that improvements can be achieved when minimal manual supervision is introduced in the learning pipeline. Further gains may be sought with larger training sets and integrating vision with the multichannel audio system. Index Terms—active speaker detection and localization, selfsupervised learning, multichannel, microphone array. I. I NTRODUCTION OUND and vision present different yet complementary sensory information. On the one hand, visual sensors such as cameras, typically operate in the frontal field of vision (FoV) and cannot sense occluded objects, whereas the audio’s field of audition (FoA) is omni-directional and does not require direct line-of-sight with the target. On the other hand, vision-based algorithms usually guarantee higher spatial resolution compared to audio systems. A good audiovisual (AV) system must be designed to take full advantage of these complementary features but also to rely on a single modality when its counterpart is corrupted or fails. This work investigates whether these systems can benefit from joint AV training to gain performance when the visual input fails. In particular, we consider the active speaker detection and localization (ASDL) task, i.e., detecting and locating the active speaker within the visual reference frame. This task is vital as it relates to many other AI tasks, such as speaker diarization S The authors are with the Centre for Vision, Speech and Signal Processing (CVSSP) of the University of Surrey, Guildford, Surrey GU2 7XH, U.K. (email: {davide.berghi, p.jackson}@surrey.ac.uk). Voice Activity labels Regression pseudo labels Mic  ASD Face Tracker  Mic 1 Mic 2 Mic 16 v x  FT output Feature Extractor ASD output  C x Audio Network x Fig. 1. Block diagram of the proposed learning pipeline. The ‘teacher’ network, composed of an audio-visual active speaker detector (ASD) preceded by a face tracker, produces pseudo-labels with the speaker’s position (x̂) at each time instance. The ‘student’ audio network is trained to regress the speaker’s horizontal position (x) from the directional audio features extracted from the multichannel input. Voice activity annotations are used to supervise the training for the detection subtask and to mask the teacher’s pseudo-labels when the frame is silent. [1], human-robot interaction (HRI) [2], human activity recognition [3], scene understanding [4], augmented reality (AR) [5] and immersive media production [6]. Therefore, it has a huge breadth of potential applications in, for example, entertainment, communications, human-robot collaborative manufacturing, assisted living in health and social care, and other applications besides. ASDL can be tackled in two separate stages. The first stage corresponds to the localization task which is accomplished in advance by a visual face detector that builds a set of hypothetical candidate speakers. The second stage classifies the detected faces as active/inactive. This classification stage is called active speaker detection (ASD) and is typically performed as an AV problem with single-channel audio [7]–[10]. In practice, the face of the speaker might not be visible from the viewpoint of the camera and therefore not be included in the set of candidates, causing the failure of the overall ASDL system. We solve this problem holistically with an audioonly system that tackles the task using multichannel audio. Our system performs the detection and horizontal localization of the speaker in the visual frames simultaneously thanks to directional cues encoded in the multichannel audio signals. However, annotating the ground truth speaker positions to train the system, as is required in traditional supervised machine learning, is expensive and time-consuming. Therefore, we propose a self-supervised student-teacher training approach that leverages automatic pseudo-labels generated by a conventional AV active speaker detector to supervise the training of our multichannel audio-based network. To the best of our knowl-" 2312.14035v1,"GRIL-Calib: Targetless Ground Robot IMU-LiDAR Extrinsic Calibration Method using Ground Plane Motion Constraints TaeYoung Kim 1 , Gyuhyeon Pak 2 and Euntai Kim 2, ∗ Abstract— Targetless IMU-LiDAR extrinsic calibration methods are gaining significant attention as the importance of the IMU-LiDAR fusion system increases. Notably, existing calibration methods derive calibration parameters under the assumption that the methods require full motion in all axes. When IMU and LiDAR are mounted on a ground robot the motion of which is restricted to planar motion, existing calibration methods are likely to exhibit degraded performance. To address this issue, we present GRIL-Calib: a novel targetless Ground Robot IMU-LiDAR Calibration method. Our proposed method leverages ground information to compensate for the lack of unrestricted full motion. First, we propose LiDAR Odometry (LO) using ground plane residuals to enhance calibration accuracy. Second, we propose the Ground Plane Motion (GPM) constraint and incorporate it into the optimization for calibration, enabling the determination of full 6- DoF extrinsic parameters, including theoretically unobservable direction. Finally, unlike baseline methods, we formulate the calibration not as sequential two optimizations but as a single optimization (SO) problem, solving all calibration parameters simultaneously and improving accuracy. We validate our GRIL- Calib by applying it to three public real-world datasets and comparing its performance with that of existing state-of-theart methods in terms of accuracy and robustness. Our code is available at https://github.com/Taeyoung96/GRIL-Calib. Index Terms— Calibration and identification, Sensor Fusion, Optimization, Mobile Robot. I. INTRODUCTION LiDAR (Light Detection And Ranging) acquires more accurate 3D information than other sensors, making it broadly applicable to a variety of robotic applications such as egomotion estimation [1], localization [2] and mapping [3] system. However, LiDAR has the drawback that when it is applied to fast motion, it is vulnerable to motion distortion. Recently, to overcome the drawback, LiDAR has been used in conjunction with IMU (Inertial Measurement Unit) [4], [5], [6]. The IMU effectively compensates for the motion distortion of the LiDAR, as it measures acceleration and angular velocity at a high frequency. Obviously, accurate extrinsic calibration is a fundamental requirement in the IMU-LiDAR fusion system. Extrinsic calibration refers to the process of establishing the spatial transformations between IMU and LiDAR, thereby aligning the measurements from the two sensors. If the extrinsic calibration is not accurate enough, the ∗ is that the corresponding author. 1 TaeYoung Kim is the Department of Vehicle Convergence Engineering, Yonsei University, Seoul 03722, South Korea tyoung96@yonsei.ac.kr 2 Gyuhyeon Pak and Euntai Kim are with the Department of Electrical and Electronic Engineering, Yonsei University, Seoul 03722, South Korea {ghpak, etkim}@yonsei.ac.kr Fig. 1: Illustration of a ground robot equipped IMU (I) sensor and LiDAR (L) sensor. We leverage the IMU height from the ground ( d ˆ I ) as minimal prior knowledge and the LiDAR ground segmentation points (G) for IMU-LiDAR extrinsic calibration. fusion of IMU and LiDAR becomes less effective, leading to significant degradation in overall performance [7]. Therefore, a lot of research has been conducted regarding the extrinsic calibration between IMU and LiDAR, and the research can be divided into two directions: target-based and targetless approaches. Target-based approach uses known, predefined objects such as cylinders [8] to estimate the spatial transformations between IMU and LiDAR. Target-based approach is relatively accurate, but it has the shortcoming that predetermined targets are required. On the other hand, the targetless approach does not use any predefined objects for calibration, receiving much attention due to ease of use and repeatability. Instead, the targetless method requires comprehensive excitation motion of both sensors to activate all Degrees of Freedom (DoF). Achieving this motion is straightforward for handheld devices with integrated IMU and LiDAR sensors, as they can easily perform a full range of motions. However, for ground robots, it becomes a significant challenge because their motion is limited to planar motion. Furthermore, from a theoretical perspective, the lack of full motion will make the rank of Fisher information matrix (FIM) less than its dimension, and the degenerate or rankdeficient FIM will cause the estimated calibration parameters to have high uncertainty or not to become unique. To address the issue, some papers perform observability analysis [9], [10], [11], but the analysis only identifies unobservable directions and does not directly estimate calibration parameters. In this paper, we present GRIL-Calib: novel targetless Ground Robot IMU-LiDAR extrinsic Calibration method. To address the aforementioned degenerate problem, we utilize a ground plane motion (GPM) constraint. The GPM provides" 2312.14053v1,"JOURNAL OF IEEE TRANSACTIONS ON ARTIFICIAL INTELLIGENCE, VOL. 00, NO. 0, MONTH 2024 1 Dual Attention U-Net with Feature Infusion: Pushing the Boundaries of Multiclass Defect Segmentation Rasha Alshawi, Md Tamjidul Hoque, Md Meftahul Ferdaus, Mahdi Abdelguerfi, Kendall Niles, Ken Prathak, Joe Tom, Jordan Klein, Murtada Mousa, and Johny Javier Lopez Abstract—The proposed architecture, Dual Attentive U-Net with Feature Infusion (DAU-FI Net), addresses challenges in semantic segmentation, particularly on multiclass imbalanced datasets with limited samples. DAU-FI Net integrates multiscale spatial-channel attention mechanisms and feature injection to enhance precision in object localization. The core employs a multiscale depth-separable convolution block, capturing localized patterns across scales. This block is complemented by a spatialchannel squeeze and excitation (scSE) attention unit, modeling inter-dependencies between channels and spatial regions in feature maps. Additionally, additive attention gates refine segmentation by connecting encoder-decoder pathways. To augment the model, engineered features using Gabor filters for textural analysis, Sobel and Canny filters for edge detection are injected guided by semantic masks to expand the feature space strategically. Comprehensive experiments on a challenging sewer pipe and culvert defect dataset and a benchmark dataset validate DAU-FI Net’s capabilities. Ablation studies highlight incremental benefits from attention blocks and feature injection. DAU-FI Net achieves state-of-the-art mean Intersection over Union (IoU) of 95.6% and 98.8% on the defect test set and benchmark respectively, surpassing prior methods by 8.9% and 12.6%, respectively. Ablation studies highlight incremental benefits from attention blocks and feature injection. The proposed architecture provides a robust solution, advancing semantic segmentation for multiclass problems with limited training data. Our sewer-culvert defects dataset, featuring pixel-level annotations, opens avenues for further research in this crucial domain. Overall, this work delivers key innovations in architecture, attention, and feature engineering to elevate semantic segmentation efficacy. Impact Statement—Automatic defect detection in underground infrastructure is crucial yet challenging, with manual inspection being hazardous, time-consuming, and prone to errors. Our proposed DAU-FI Net architecture provides an accurate automated solution, overcoming key limitations of prior methods. By integrating innovations in attention mechanisms and feature engineering, DAU-FI Net achieved 95.6% and 98.8% intersection-over-union on a sewer-culvert defect dataset and “This research was supported in part by the U.S. Department of the Army – U.S. Army Corps of Engineers (USACE) under contract W912HZ-23-2-0004. The views expressed in this paper are solely those of the authors and do not necessarily reflect the views of the funding agencies.” Rasha Alshawi, Md Tamjidul Hoque, Md Meftahul Ferdaus, Mahdi Abdelguerfi, and Johny Javier Lopez are with the Canizaro Livingston Gulf States Center for Environmental Informatics, Department of Computer Science, The University of New Orleans, LA 70148 USA (e-mail: ralshawi@uno.edu, thoque@uno.edu, mferdaus@uno.edu., mahdi@cs.uno.edu) Kendall Niles, Ken Prathak, Joe Tom, and Jordan Klein are with US Army Corps of Engineers, Vicksburg, Mississippi 39183 USA (e-mail: Kendall.N.Niles@erdc.dren.mil). Murtada Mousa is registered professional engineer in the State of Louisiana (e-mail: murtadamousa@providenceeng.com). This paragraph will include the Associate Editor who handled your paper. cell nuclei benchmark, respectively, surpassing state-of-the-art by 8.9% and 12.6%. This level of performance on complex real-world data enables reliable automation of infrastructure inspection, improving efficiency and safety. The curated pixelannotated defect dataset also opens up new research avenues. With further development, this technology can be deployed in the field to autonomously analyze sewers, tunnels, and pipelines, providing rapid anomaly detection to prioritize maintenance and prevent catastrophic failures. This work establishes an integral benchmark, pushing boundaries in architectural design, attention modeling, and feature infusion to elevate deep learning capabilities. Index Terms—Attention Mechanism, Feature Engineering, Infrastructure Inspection, Semantic Segmentation, U-Net I. I NTRODUCTION EMANTIC segmentation, a vital subfield of computer vision, continues to be an active and dynamic area of research. This technique enables machines to better understand visual scenes by labeling each pixel with a corresponding class and precise spatial location. Among the most promising advances in this domain are fully convolutional networks (FCNs). FCNs excel at semantic segmentation through an elegant encoder-decoder architecture centered around convolutional neural networks (CNNs). The encoder portion condenses an input image into a compact latent representation via convolutional and downsampling layers. This representation encoding high-level features is then passed to the decoder network, which up-samples to produce a segmentation map matching the original image dimensions. The encoder-decoder structure allows FCNs to perform end-to-end pixel-wise prediction for inputs of arbitrary sizes. FCNs are comprehensive neural network architectures that can accommodate inputs of varying dimensions and generate outputs with matched dimensions. This unique architectural approach enables FCNs to efficiently assign categorical labels to individual pixels within an image, aligning them with their corresponding object categories [1]. A particularly noteworthy FCN architecture is U-Net, which has recently gained prominence, especially for its ability to produce precise segmentation outputs even when trained on limited data [2]. The U-Net’s encoder-decoder structure and incorporation of skip connections allow it to leverage both local details and global context when generating segmentations. By combining convolutional layers that capture hierarchical feature representations with upsampling layers that enable precise localization, U-Nets S" 2312.14069v1,"EmphAssess : a Prosodic Benchmark on Assessing Emphasis Transfer in Speech-to-Speech Models Maureen de Seyssel 1,2 Antony D’Avirro 1 Adina Williams 1 Emmanuel Dupoux 1,2 1 Meta AI Research 2 ENS, EHESS, CNRS, PSL University, France maureen.deseyssel@gmail.com {adavirro,adinawilliams,dpx}@meta.com Abstract We introduce EmphAssess, a prosodic benchmark designed to evaluate the capability of speech-to-speech models to encode and reproduce prosodic emphasis. We apply this to two tasks: speech resynthesis and speech-to-speech translation. In both cases, the benchmark evaluates the ability of the model to encode emphasis in the speech input and accurately reproduce it in the output, potentially across a change of speaker and language. As part of the evaluation pipeline, we introduce EmphaClass, a new model that classifies emphasis at the frame or word level. 1 Introduction In recent years, significant advancements have been made in the development of Self-Supervised Learning (SSL) models for speech, extending beyond the traditional text-only methods prevalent in the field (Mohamed et al., 2022). Such speechbased models find successful application across various domains from generative language modelling (Lakhotia et al., 2021; Borsos et al., 2023; Nguyen et al., 2023b) to speech-to-speech translation (S2ST) (Jia et al., 2019, 2022; Lee et al., 2021; Rubenstein et al., 2023; Barrault et al., 2023). Unlike text-only models, they exploit additional cues present in the speech signal which are absent in textual input. One crucial speech-only cue is prosody. Also termed the “music of speech” (Wennerstrom, 2001), prosody is marked by the perceived loudness, rhythm, and pitch of speech. Prosody not only adds naturalness to an utterance but also has the capacity to modify the meaning of the conveyed message, both at a global level, such as in the expression of different emotions, and at a local level, by influencing the interpretation of individual phrases or words (Cutler et al., 1997; Dahan, 2015). For instance, slower speech may suggest hesitation, while altering something like pause placement can actually change the segmentation into words or syntactic constituents, with downstream consequences for the meaning. Hence, accurately capturing these prosodic elements is essential in SSL speech models for any application (Avila and Ward, 2023). To address this, Kharitonov et al. (2021) proposed explicitly adding prosodically-relevant information such as fundamental frequency and duration to the speech representations models learn, while others aimed at explicitly modelling emotions in such representations (Gan et al., 2022; Duret et al., 2023). Although some progress has been made, robust evaluation metrics for prosody remain scarce, and human evaluation, while insightful, is subjective - which can limit reproducibility; as well as being expensive and time intensive - which can hinder its utility in large-scale applications. Objective evaluations of prosody fall into two main categories: one focuses on utterance-level features like emotion and speech rate to assess global prosody, and the other examines local prosody, which is concerned with prosodic effects at the level of a word or a phrase, such as breaks, turn ends and emphasis. In addition, one may address prosody for two classes of models: generative decoder-only models (the speech equivalent of GPT (Radford et al., 2018) (e.g. GSLM, Lakhotia et al., 2021; AudioLM, Borsos et al., 2023; dGSLM, (Nguyen et al., 2023b)), and speech-tospeech (encoder-decoder) approaches, which take speech as input and produce output in a different voice (speech resynthesis) or a different language (S2ST). In this paper, we address the second class of models. In the context of speech-to-speech (S2S) models, evaluating global prosody can be relatively straightforward, as the features are not directly related to the lexical content. The assessment of local prosody, however, presents more of a challenge, as it necessitates mapping at the lexical level. This can" 2312.14117v1,"MNRAS 000, 1–8 (2023) Preprint 22 December 2023 Compiled using MNRAS L A TEX style file v3.0 Clustering of dark matter in the cosmic web as a probe of massive neutrinos Mohadese Khoshtinat 1 , Mohammad Ansarifard 2 , Farbod Hassani 3 , Shant Baghram 1,4 ★ 1 Department of Physics, Sharif University of Technology, P. O. Box 11155-9161, Tehran, Iran 2 School of Astronomy, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5531, Tehran, Iran 3 Institute of Theoretical Astrophysics, Universitetet i Oslo, 0315 Oslo, Norway 4 Research Center for High Energy Physics, Department of Physics, Sharif University of Technology, P.O.Box 11155-9161, Tehran, Iran Accepted XXX. Received YYY; in original form ZZZ ABSTRACT The large-scale structure of the universe is distributed in a cosmic web. Studying the distribution and clustering of dark matter particles and halos may open up a new horizon for studying the physics of the dark universe. In this work, we investigate the nearest neighbour statistics and spherical contact function in cosmological models with massive neutrinos. For this task, we use the relativistic N-body code, gevolution and study particle snapshots at three different redshifts. In each snapshot, we find the halos and evaluate the letter functions for them. We show that a generic behaviour can be found in the nearest neighbour, 𝐺 (𝑟), and spherical contact functions, 𝐹 (𝑟), which makes these statistics promising tools to constrain the total neutrino mass. Key words: Large Scale Structures, the total neutrino mass, 1-point statistics, the spatial point patterns 1 INTRODUCTION The data sets from ongoing (Aghamousa et al. 2016) and upcoming (Amendola et al. 2018) Large Scale Structure (LSS) surveys not only let tighter constraints on the cosmological parameters but make it possible to address some fundamental questions in physics and cosmology- e.g., the equation-of-state of dark energy, the characteristics of dark matter, and the total neutrino mass. With a wealth of raw data, the task is to extract as much possible information in a computationally efficient way from these data sets. Due to the presence of non-linearities, especially in the late-time Universe, this will be a challenging task. On one hand, the Linear Perturbation Theory (LPT) still holds on large scales (Dodelson 2003), where the density contrast field can also be considered a Gaussian random field. So, the traditional 2-point correlation function contains all the information and is the most suitable statistic for extracting the information from the LSS data (Romanello et al. 2023). On the contrary, at small scales (Cooray & Sheth 2002), the nonlinear gravitational evolution of matter leads to a non-Gaussian field as a result of mode couplings. In this situation, information diffuses into the higher-order correlation functions, and the 2-point correlation function does not contain all the information. So it fails to grasp the complete content of the data set. The direct way to capture leaked information from the second moment is to compute higher-order ★ baghram@sharif.edu © 2023 The Authors correlation functions, e.g., bispectrum (Sefusatti et al. 2016). As going to deep non-linear regimes, it is not straightforward that the information is stored in low moments of the correlation function. It means that the whole Probability Distribution Function (PDF) incorporates the non-Gaussian effects. One approach to circumvent these difficulties is to consider the 2-point correlation function (or its Fourier counterpart, the power spectrum) equipped with extra information - e.g., the marked power spectrum (Stoyan 1984) - or by calculating it in different environments like voids, nodes, sheets and filaments in real space (Bonnaire et al. 2022), or in redshift space (Bonnaire et al. 2023). Parallel to these efforts, many nonlinear semi-analytical models have been introduced, that use the relation between linear scale matter distribution statistics and nonlinear observables such as the number density of dark matter halos. Peak theory (Bardeen et al. 1986; Sheth & Tormen 1999) and the excursion set theory (Bond et al. 1991; Sheth et al. 2001; Zentner 2007; Nikakhtar & Baghram 2017; Nikakhtar et al. 2018) are two non-linear structure formation models, which use the relation between linear and non-linear scales to probe the distribution of matter over a wide range of scales. Another strategy is to search for other statistical measures sensitive to all higher-order correlation functions that are computed for one point in space. To mention a few - the PDF of the matter density field smoothed at some radius (Uhlemann et al. 2020; Boyle et al. 2021; Gough & Uhlemann 2022), k-nearest neighbours Cumulative Distribution Functions (CDF) or peaked-CDF (Banerjee" 2312.14121v1,"Fast and Knowledge-Free Deep Learning for General Game Playing (Student Abstract) Michał Maras, Michał K˛epa, Jakub Kowalski, Marek Szykuła, University of Wrocław, Faculty of Mathematics and Computer Science mmaras1999@gmail.com, kempus1999@gmail.com, jko@cs.uni.wroc.pl, msz@cs.uni.wroc.pl Abstract We develop a method of adapting the AlphaZero model to General Game Playing (GGP) that focuses on faster model generation and requires less knowledge to be extracted from the game rules. The dataset generation uses MCTS playing instead of self-play; only the value network is used, and attention layers replace the convolutional ones. This allows us to abandon any assumptions about the action space and board topology. We implement the method within the Regular Boardgames GGP system and show that we can build models outperforming the UCT baseline for most games efficiently. Introduction General Game Playing (GGP) is an Artificial Intelligence challenge focused on developing an autonomous gameplaying agent that can play, without human intervention, any game given its rules (Genesereth, Love, and Pell 2005). Such a task requires a proper formalism to encode a possibly large class of games in a machine-processable and simultaneously human-readable way. Several such formalisms were developed, Stanford’s Game Description Language (GDL) (Genesereth, Love, and Pell 2005) being arguably the most famous and deep-researched, providing a great domain for testing AI algorithms, especially Monte Carlo Tree Search (MCTS) with UCT (Browne et al. 2012). A newer approach, focusing on more efficient game processing, is Regular Boardgames (RBG) (Kowalski et al. 2019), which encodes game rules as regular expressions. A natural path of GGP research is to apply Neural Networks (NN) and Deep Reinforcement Learning (DRL). The most famous NN-based approach that was advertised as general was AlphaZero (Silver et al. 2018), applying the same learning algorithm for Go, Chess, and Shogi. However, although the proposed method really generalizes (at least among two-player, zero-sum board games), the network architecture had to be manually prepared for each game, which is inconsistent with the pure GGP principles. A clone of AlphaZero, based on GDL and aimed to resolve some of these restrictions, was presented in (Goldwaser and Thielscher 2020). MCTS-based DRL approach for Ludii GGP system, created via a bridge to Polygames can be found in (Soemers Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. et al. 2021). Deep Reinforcement Learning using only value networks combined with a variant of Unbounded Minimax is described in (Cohen-Solal and Cazenave 2023). We address some issues that appear in the GGP context and focus on training within a short time limit and further restricting assumptions about the given game rules. Our Method We adapted AlphaZero to the RBG framework and we focus on two-player zero-sum games, but the proposed method is limited only by the requirement of perfect information. Our modifications focus on the following areas: Action space. The original AlphaZero approach requires the knowledge of action space, which must be either defined manually or inferred from the game rules (in GGP). There are two issues. First, the action space depends on a particular game encoding, and one game can have many implementations. Second, since tensors generally must have a fixed shape, games with a huge action space are particularly problematic, even if they have a small branching factor. The second problem could be alternatively addressed by splitting actions into elementary fragments (Kowalski et al. 2022), yet this may lose heuristic information of actions. To address these problems, we omit the policy network and attempt to use only the value network, abandoning any dependence on the action space. Thus, we use the standard UCT formula instead of the PUCT (Rosin 2011), a variant of the UCT algorithm that uses a predictor to provide recommendations about the order of actions during exploration. Board topology. Another piece of information that must be extracted from game rules is the neighborhood of board tiles, which is necessary for the standard convolutional approach. In GGP, extracting such information from the game description requires additional effort and is not always reliable. There is no guarantee that the games will have natural board topology, especially for non-rectangular topologies, or even the descriptions can be intentionally obfuscated. Also, the natural board topology does not guarantee that adjacent cells are, by definition, the most correlated ones. To avoid assumptions, we propose using an attentionbased NN (Vaswani et al. 2017). The model creates a (sinusoidal or learned positional) embedding for each tile and passes them through the encoder layers. This allows the network to learn the relations between tiles without any game-" 2312.14129v1,"WellFactor: Patient Profiling using Integrative Embedding of Healthcare Data Dongjin Choi ∗ , Andy Xiang † , Ozgur Ozturk † , Deep Shrestha † , Barry Drake ‡ , Hamid Haidarian † , Faizan Javed † , and Haesun Park ∗§ ∗ School of Computational Science and Engineering, Georgia Institute of Technology, Atlanta, GA, USA † Kaiser Permanente, USA ‡ Georgia Tech Research Institute, Atlanta, GA, USA ∗ jin.choi@gatech.edu, hpark@cc.gatech.edu † {Andy.X.Xiang, Ozgur.X.Ozturk, deep.x.shrestha, Hamid.Haidarian, Faizan.X.Javed}@kp.org ‡ drakeleeb@gmail.com Abstract—In the rapidly evolving healthcare industry, platforms now have access to not only traditional medical records, but also diverse data sets encompassing various patient interactions, such as those from healthcare web portals. To address this rich diversity of data, we introduce WellFactor: a method that derives patient profiles by integrating information from these sources. Central to our approach is the utilization of constrained low-rank approximation. WellFactor is optimized to handle the sparsity that is often inherent in healthcare data. Moreover, by incorporating task-specific label information, our method refines the embedding results, offering a more informed perspective on patients. One important feature of WellFactor is its ability to compute embeddings for new, previously unobserved patient data instantaneously, eliminating the need to revisit the entire data set or recomputing the embedding. Comprehensive evaluations on real-world healthcare data demonstrate WellFactor’s effectiveness. It produces better results compared to other existing methods in classification performance, yields meaningful clustering of patients, and delivers consistent results in patient similarity searches and predictions. Index Terms—Patient profiling, Healthcare, Nonnegative matrix factorization, Recommendation systems I. I NTRODUCTION The digital revolution and the rise of healthcare web portals have significantly changed patient interactions within the healthcare domain. While these portals primarily serve purposes such as accessing personal clinical records or scheduling appointments, they also store extensive data on patient activities, including searches for clinical information and browsing patterns [1]–[4]. This surge in healthcare big data comes with challenges. One such challenge is the infrequent nature of user interactions on these portals. While these portals experience infrequent user interactions, unlike generic web domains, they maintain a more accurate record of user demographics and offer detailed clinical diagnosis information. Profile-based models, leveraging user interaction histories, have been effectively used for recommendation across various domains [5]–[8]. Studies on embedding often focus on using the learned vector in downstream machine learning models § Haesun Park is the corresponding author. 979-8-3503-2445-7/23/$31.00 ©2023 IEEE Fig. 1. Illustration of the diverse patient data sources collected from interactions on the web portal and with medical professionals. regardless of their numerical value [9]. In contrast, our approach, akin to profile-based models, recognizes the latent significance of each dimension in the learned profiles for further recommendations. This is demonstrated in our Cluster Analysis (subsection V-D), where embedding dimensions directly correspond to key patient cluster characteristics. This study aims to create comprehensive patient profiles on healthcare web portals and utilizes demographic data for refined classification and recommendation tasks. These profiles integrate interaction data with diagnostic information, offering a robust foundation for various applications, including personalized healthcare recommendations. While many digital platforms aim solely to enhance user engagement, healthcare portals have additional considerations. Consequently, every patient embedding or subsequent recommendation must reflect both patient preferences and prospective health advantages. For instance, demographic nuances, such as age, can significantly influence user interaction patterns. Younger users, notably those in their 20s and 30s, may display a pronounced affinity for mobile applications, making them more receptive to app-based health recommendations [10]–[13]. Conversely, older users, particularly those in their 50s and above, may also require more mental wellness support due to chronic illnesses and related pains [14]–[16]. In this study, we introduce WellFactor, an algorithm based on constrained low rank approximation (CLRA) that particularly employs nonnegativity constraints. This approach facilitates the integration of diverse user feature vectors directly within the objective function. Several innovative aspects define WellFactor:" 2312.14133v1,"Draft version December 22, 2023 Typeset using L A TEX default style in AASTeX631 Morphologies of Bright Complex Fast Radio Bursts with CHIME/FRB Voltage Data Jakob T. Faber, 1, 2, 3 Daniele Michilli, 4, 5 Ryan Mckinven, 1, 2 Jianing Su, 1, 6 Aaron B. Pearlman, 1, 2 Kenzie Nimmo, 4, 5 Robert A. Main, 1, 2 Victoria Kaspi, 1, 2 Mohit Bhardwaj, 1, 2, 7 Shami Chatterjee, 8 Alice P. Curtin, 1, 2 Matt Dobbs, 1, 2 Gwendolyn Eadie, 6, 9 B. M. Gaensler, 6, 10, 11 Zarif Kader, 1, 2 Calvin Leung, 4, 5 Kiyoshi W. Masui, 4, 5 Ayush Pandhi, 6, 10 Emily Petroff, 12 Ziggy Pleunis, 6 Masoud Rafiei-Ravandi, 1, 2 Ketan R. Sand, 1, 2 Paul Scholz, 6, 13 Kaitlyn Shin, 4, 5 Kendrick Smith, 12 and Ingrid Stairs 14 1 Department of Physics, McGill University, 3600 rue University, Montréal, QC H3A 2T8, Canada 2 Trottier Space Institute, McGill University, 3550 rue University, Montréal, QC H3A 2A7, Canada 3 Cahill Center for Astronomy and Astrophysics, MC 249-17 California Institute of Technology, Pasadena CA 91125, USA 4 MIT Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, MA 02139, USA 5 Department of Physics, Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, MA 02139, USA 6 Dunlap Institute for Astronomy & Astrophysics, University of Toronto, 50 St. George Street, Toronto, ON M5S 3H4, Canada 7 Department of Physics, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, 15213, PA, USA 8 Department of Astronomy and Cornell Center for Astrophysics and Planetary Science, Cornell University, Ithaca NY 14853, USA 9 Department of Statistical Sciences, University of Toronto, 700 University Ave., Toronto, ON M5G 1Z5, Canada 10 David A. Dunlap Department of Astronomy & Astrophysics, University of Toronto, 50 St. George Street, Toronto, ON M5S 3H4, Canada 11 Present address: Division of Physical and Biological Sciences, University of California Santa Cruz, Santa Cruz, CA 95064, USA 12 Perimeter Institute for Theoretical Physics, 31 Caroline Street N, Waterloo, ON N25 2YL, Canada 13 Department of Physics & Astronomy, York University 14 Department of Physics and Astronomy, University of British Columbia, 6224 Agricultural Road, Vancouver, BC V6T 1Z1 Canada ABSTRACT We present the discovery of twelve thus far non-repeating fast radio burst (FRB) sources, detected by the Canadian Hydrogen Intensity Mapping Experiment (CHIME) telescope. These sources were selected from a database comprising O(10 3 ) CHIME/FRB full-array raw voltage data recordings, based on their exceptionally high brightness and complex morphology. Our study examines the timefrequency characteristics of these bursts, including drifting, microstructure, and periodicities. The events in this sample display a variety of unique drifting phenomenologies that deviate from the linear negative drifting phenomenon seen in many repeating FRBs, and motivate a possible new framework for classifying drifting archetypes. Additionally, we detect microstructure features of duration ≲ 50 µs in seven events, with some as narrow as ≈ 7 µs. We find no evidence of significant periodicities. Furthermore, we report the polarization characteristics of seven events, including their polarization fractions and Faraday rotation measures (RMs). The observed |RM| values span a wide range of 17.24(2) - 328.06(2) rad m −2 , with linear polarization fractions between 0.340(1) - 0.946(3). The morphological properties of the bursts in our sample appear broadly consistent with predictions from both relativistic shock and magnetospheric models of FRB emission, as well as propagation through discrete ionized plasma structures. We address these models and discuss how they can be tested using our improved understanding of morphological archetypes. Keywords: Radio transient sources (2008), High energy astrophysics (739), Compact objects (288) Corresponding author: Jakob T. Faber jfaber@caltech.edu" 2312.14135v1,"V ∗ : Guided Visual Search as a Core Mechanism in Multimodal LLMs Penghao Wu † UC San Diego Saining Xie New York University pew011@ucsd.edu saining.xie@nyu.edu Contextual cues: Initial answer: Question: “The glass is most likely to “Sorry, the current visual information is not enough. I need to find the glass first.” What color is the liquid in the glass? [search starts] appear on the dining table.” 1 2 [search iterations] image resolution: 1920 830 V*: LLM‐guided Search VQA LLM What color is the liquid in the glass? Final answer: “The liquid in the glass is green.” [tokenize VWM] ,… [search ends; construct VWM] GPT4‐V answer: “The liquid in the glass appears to be a shade of pink.” 𝑙𝑜𝑐 𝑥1, 𝑦1, 𝑥2, 𝑦2 , … [targets located] 3 Visual Working Memory (VWM) Figure 1. The visual search mechanism enables humans to identify a target within a multitude of stimuli, streamlining the organization of information critical for problem-solving and reasoning. In this work, we explore this core mechanism in the context of MLLMs, addressing its absence, which currently impedes precise visual grounding, especially for high-resolution images. In this example, the VQA LLM could not immediately answer the question, thus activating V ∗ , an LLM-guided visual search process that uses common sense and contextual cues to search for the required details. Throughout this informed search, it builds a visual working memory (VWM), tokenizing the overall context and the areas of interest related to the targets, which are then re-fed to the VQA LLM, enabling it to accurately answer the question. 1. Introduction Abstract One of the hallmarks of human intelligence is being able to process and integrate multi-sensory information to perform complex tasks. A salient aspect of our cognitive reasoning process involving visual information is the ability to conduct visual search – the process of efficiently recognizing and localizing key objects within intricate real-world scenes. This mechanism plays a fundamental role in the interaction with the environment and happens everywhere, from finding keys on a cluttered table to searching for a friend in the crowd. Besides, it is also an indispensable step for complex tasks that require multiple reasoning steps. The intricacy of visual search has been studied for a long time in cognitive science and vision science [37, 46, 48, 50–52]. While visual search seems intuitive for humans, it is actually a complex process underpinned by a series of complex behaviors. To accomplish this task efficiently, topdown feature guidance and contextual scene guidance are two fundamental factors, guiding humans’ visual search process [51]. The top-down feature guidance directs humans’ attention to items with specific features or attributes (e.g. color, shape, and orientation) based on the specifica- When we look around and perform complex tasks, how we see and selectively process what we see is crucial. However, the lack of this visual search mechanism in current multimodal LLMs (MLLMs) hinders their ability to focus on important visual details, especially when handling highresolution and visually crowded images. To address this, we introduce V ∗ , an LLM-guided visual search mechanism that employs the world knowledge in LLMs for efficient visual querying. When combined with an MLLM, this mechanism enhances collaborative reasoning, contextual understanding, and precise targeting of specific visual elements. This integration results in a new MLLM meta-architecture, named Show, sEArch, and TelL (SEAL). We further create V ∗ Bench, a benchmark specifically designed to evaluate MLLMs in their ability to process high-resolution images and focus on visual details. Our study highlights the necessity of incorporating visual search capabilities into multimodal systems. The code is available here. † Work done during an internship at NYU. 1" 2312.14138v1,"Revisiting Foreground and Background Separation in Weakly-supervised Temporal Action Localization: A Clustering-based Approach Qinying Liu 1 Zilei Wang *1 Shenghai Rong 1 Junjie Li 1 Yixin Zhang 1,2 University of Science and Technology of China 2 Institute of Artificial Intelligence, Hefei Comprehensive National Science Center 1 {lydyc, rongsh, hnljj@}@mail.ustc.edu.cn, {zhyx12, zlwang}@ustc.edu.cn Abstract Weakly-supervised temporal action localization aims to localize action instances in videos with only videolevel action labels. Existing methods mainly embrace a localization-by-classification pipeline that optimizes the snippet-level prediction with a video classification loss. However, this formulation suffers from the discrepancy between classification and detection, resulting in inaccurate separation of foreground and background (F&B) snippets. To alleviate this problem, we propose to explore the underlying structure among the snippets by resorting to unsupervised snippet clustering, rather than heavily relying on the video classification loss. Specifically, we propose a novel clustering-based F&B separation algorithm. It comprises two core components: a snippet clustering component that groups the snippets into multiple latent clusters and a cluster classification component that further classifies the cluster as foreground or background. As there are no ground-truth labels to train these two components, we introduce a unified self-labeling mechanism based on optimal transport to produce high-quality pseudo-labels that match several plausible prior distributions. This ensures that the cluster assignments of the snippets can be accurately associated with their F&B labels, thereby boosting the F&B separation. We evaluate our method on three benchmarks: THUMOS14, ActivityNet v1.2 and v1.3. Our method achieves promising performance on all three benchmarks while being significantly more lightweight than previous methods. Code is available at https://github. com/Qinying-Liu/CASE 1. Introduction Temporal action localization (TAL) [53, 34, 37] is a task to localize the temporal boundaries of action instances and recognize their categories in videos. In recent years, numer- * Corresponding author ous works put effort into the fully supervised manner and gain great achievements. Albeit successful, these methods require extensive manual frame-level annotations, which are expensive and time-consuming. Without the requirement of frame-level annotations, weakly-supervised TAL (WTAL) has received increasing attention, as it allows us to detect the action instances with only video-level action labels. There has been a wide spectrum of WTAL methods developed in the literature [59, 70, 46, 36]. With only videolevel labels, mainstream methods employ a localization-byclassification pipeline, which formulates WTAL as a video action classification problem to learn a temporal class activation sequence (T-CAS). For this pipeline, foreground (i.e., action) and background separation remains an open question since video-level labels do not provide any cue for background class. There are two types of existing approaches to solve it. The first type [59, 70] is based on the multiple instance learning (MIL), which uses the T-CAS to select the most confident snippets for each action class. The second type [46, 33] introduces an attention mechanism to learn class-agnostic foreground weights that indicate the probabilities of the snippets belonging to foreground. Despite recent progress, these methods typically rely on the video classification loss to guide the learning of the T-CAS or the attention weights. There is an inherent downside: the loss is easily minimized by the salient snippets [42] and fails to explore the distribution of the whole snippets, resulting in erroneous T-CAS or attention weights. This issue is rooted in the supervision gap between the classification and detection tasks. Recent studies [48, 40] are devoted to producing snippet-level pseudo-labels to bridge the gap. However, the pseudo-labels are still derived from the unreliable T-CAS or attention weights. Deep clustering [8], which automatically partitions the samples into different groups, has been proven to be capable of revealing the intrinsic distribution of the samples in many label-scarce tasks [1, 5, 12, 30, 35]. A natural issue arises: is it possible to adopt the clustering to capture the" 2312.14185v1,"Auto311: A Confidence-guided Automated System for Non-emergency Call Zirong Chen 1 , Xutong Sun 1 , Yuanhe Li 1 , Meiyi Ma 1 1 Department of Computer Science, Vanderbilt University, Nashville, Tennessee 37235, USA {zirong.chen, xutong.sun, yuanhe.li, meiyi.ma}@vanderbilt.edu Abstract Emergency and non-emergency response systems are essential services provided by local governments and critical to protecting lives, the environment, and property. The effective handling of (non-)emergency calls is critical for public safety and well-being. By reducing the burden through non-emergency callers, residents in critical need of assistance through 911 will receive fast and effective response. Collaborating with the Department of Emergency Communications (DEC) in Nashville, we analyzed 11,796 non-emergency call recordings and developed Auto311 1 , the first automated system to handle 311 non-emergency calls, which (1) effectively and dynamically predicts ongoing non-emergency incident types to generate tailored case reports during the call; (2) itemizes essential information from dialogue contexts to complete the generated reports; and (3) strategically structures system-caller dialogues with optimized confidence. We used real-world data to evaluate the system’s effectiveness and deployability. The experimental results indicate that the system effectively predicts incident type with an average F-1 score of 92.54%. Moreover, the system successfully itemizes critical information from relevant contexts to complete reports, evincing a 0.93 average consistency score compared to the ground truth. Additionally, emulations demonstrate that the system effectively decreases conversation turns as the utterance size gets more extensive and categorizes the ongoing call with 94.49% mean accuracy. Introduction Emergency and non-emergency response systems are essential services provided by local governments and critical to protecting lives, the environment, and property. While 911 is primarily used for emergency services, 311 is a nonemergency phone number that people can call to find information about municipal services, make complaints, or report problems like stolen property, road damage, etc. Both emergency and non-emergency calls are operated by the Department of Emergency Communication (DEC) in most cities. DECs across the nation receive an overwhelmingly high number of calls, with the national yearly average of 911 calls being close to 240 million (NYC911 2022; Ma et al. 2019). The growing use of response systems comes Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 Code and Demo: https://github.com/AICPS-Lab/Auto311 at a time when local governments face increasing pressure to do more with less resources. Indeed, the number of local government employees in the United States has shrunk by nearly 5% in 2021 (Saxon et al. 2022), and a large proportion of counties and municipalities anticipate a significant general fund shortfall as the United States transitions out of the COVID pandemic (Afonso 2021). To mitigate this issue, we introduce Auto311, the first automated system to handle 311 non-emergency calls. Auto311 features two key components: incident type detection and information itemization. It identifies probable incident types from ongoing calls and dynamically generates and updates case reports accordingly. Simultaneously, these reports direct the information itemization module to gather necessary information, streamlining the process. Previous works have aimed to optimize (non-)emergency management (Sun, Bocchini, and Davison 2020; Wex et al. 2014; Manoj and Baker 2007; Ma et al. 2021a; Ma, Stankovic, and Feng 2021, 2018; Chen et al. 2008). However, most of those works focus more on the emergency resource allocation after one case report is placed, for example, route optimization for ambulances and response center localization for faster responses (Mukhopadhyay et al. 2022). Although other available could frameworks like AWS’s Lex (Amazon Web Services 2023) and Google’s DialogFlow (Google 2023) can set up automated dialogue service within a few hours, they require clear and relatively fixed dialogue charts to guide the conversation. When it comes to non-emergency call handling, leaving alone privacy and safety issues brought by online solutions, most incident types have unique dialogue charts compared to others, making it unrealistic to separately handle the conversation for each incident type. However, Auto311, at a system level, takes full advantage of the emitted confidence scores of each component to strategically optimize the dialogue. However, developing Auto311 poses some key challenges. First, unlike plenty of work that has been done to solve text classification problems (Kowsari et al. 2019; Mirończuk and Protasiewicz 2018; Minaee et al. 2021; Aggarwal and Zhai 2012) with outputting the most likely one category in the end, the incident prediction in this task has to cope with calls involving multiple incident types instead, see Section Motivating Study for more details. Second, although measuring confidence in machine learning models" 2312.14237v1,"AI-Lorenz: A physics-data-driven framework for black-box and gray-box identification of chaotic systems with symbolic regression Mario De Florio a,∗ , Ioannis G. Kevrekidis c,d , George Em Karniadakis a,b a Division of Applied Mathematics, Brown University, Providence, RI, USA b School of Engineering, Brown University, Providence, RI, USA c Department of Chemical and Biomolecular Engineering, Johns Hopkins University, Baltimore, MD, USA d Department of Applied Mathematics and Statistics, Johns Hopkins University, Baltimore, MD, USA Abstract Discovering mathematical models that characterize the observed behavior of dynamical systems remains a major challenge, especially for systems in a chaotic regime. The challenge is even greater when the physics underlying such systems is not yet understood, and scientific inquiry must solely rely on empirical data. Driven by the need to fill this gap, we develop a framework that learns mathematical expressions modeling complex dynamical behaviors by identifying differential equations from noisy and sparse observable data. We train a small neural network to learn the dynamics of a system, its rate of change in time, and missing model terms, which are used as input for a symbolic regression algorithm to autonomously distill the explicit mathematical terms. This, in turn, enables us to predict the future evolution of the dynamical behavior. The performance of this framework is validated by recovering the right-hand sides and unknown terms of certain complex, chaotic systems such as the well-known Lorenz system, a six-dimensional hyperchaotic system, and the non-autonomous Sprott chaotic system, and comparing them with their known analytical expressions. Keywords: Chaotic systems, Black-Box identification, Gray-Box identification, Random projection neural networks, Symbolic regression, Time series, Functional interpolation 1. Introduction Understanding the behavior of complex systems has long been a central pursuit in physics. The ability to predict the evolution of such systems is of fundamental importance for numerous fields of science, including weather forecasting, economics, and biology. However, the challenge persists when the underlying physical principles are not fully understood, making it necessary to rely solely on observable data. Many works have highlighted the significance of both black-box and gray-box models in the context of dynamical system identification [1, 2, 3, 4] and non-autonomous dynamics with periodic forcing [5]. While gray-box models incorporate some knowledge of the physics of the phenomena under study, black-box models solely rely on data-driven approaches. Some of the earliest works in the direction of system identification using neural networks (NN) based methods are given by [6, 7, 8, 9], to obtain models representing the dynamical behavior of the chemical and fluid dynamics systems considered. In an early paper, González-Garcı́a et al. [10] proposed an NN-based methodology for the identification of distributed parameter systems. The algorithm couples a finite differences scheme with integration using the method of lines, to create the template for the NN identifier. Then, the NN is used to approximate the righthand-side (RHS) of the partial differential equation (PDE), based on spatially distributed and temporally resolved measurements of the state variable. In more recent work [11], the authors aim to learn the unknown dynamics from data, by using ODE-nets based on implicit numerical initial value problem (IVP) solvers, thus identifying a so-called “inverse modified differential equation” of the system. This framework can be easily adapted to solve gray-box identification, by incorporating partially known physical terms. An interesting application of NN for directly learning evolution equations (black-box), parameters discovery (white-box), and learning partially unknown kinetics terms (gray-box) is given by Cui et al. [12], which was applied to Chinese hamster ovary cell bioreactors by using process data. Recently, new deep NNs frameworks have been ∗ Corresponding author. Email address: mario de florio@brown.edu Preprint submitted to arXiv.org December 25, 2023" 2312.14247v1,"1 Deep Reinforcement Learning Based Placement for Integrated Access Backhauling in UAV-Assisted Wireless Networks Yuhui Wang, Student Member, IEEE and Junaid Farooq, Member, IEEE Abstract—The advent of fifth generation (5G) networks has opened new avenues for enhancing connectivity, particularly in challenging environments like remote areas or disaster-struck regions. Unmanned aerial vehicles (UAVs) have been identified as a versatile tool in this context, particularly for improving network performance through the Integrated access and backhaul (IAB) feature of 5G. However, existing approaches to UAV-assisted network enhancement face limitations in dynamically adapting to varying user locations and network demands. This paper introduces a novel approach leveraging deep reinforcement learning (DRL) to optimize UAV placement in real-time, dynamically adjusting to changing network conditions and user requirements. Our method focuses on the intricate balance between fronthaul and backhaul links, a critical aspect often overlooked in current solutions. The unique contribution of this work lies in its ability to autonomously position UAVs in a way that not only ensures robust connectivity to ground users but also maintains seamless integration with central network infrastructure. Through various simulated scenarios, we demonstrate how our approach effectively addresses these challenges, enhancing coverage and network performance in critical areas. This research fills a significant gap in UAV-assisted 5G networks, providing a scalable and adaptive solution for future mobile networks. Index Terms—Internet of things, integrated access and backhaul, dueling double deep Q network, quality-of-service, reinforcement learning, unmanned aerial vehicles. I. I NTRODUCTION The advent of fifth-generation (5G) cellular networks has ushered in a wealth of opportunities for enhancing connectivity and coverage, particularly in remote or rural areas with limited network infrastructure. Unmanned aerial vehicles (UAVs) have emerged as a promising tool to augment the performance of these networks, capitalizing on their versatility and mobility, especially for mission-critical operations [2], [3]. In the context of UAV-assisted 5G network, the UAV is connected to a base station over the radio access network (RAN), which is strategically divided into two distinct units: the centralized unit (CU) and the distributed unit (DU) [4]. This division aims to optimize network efficiency and enhance overall performance by allocating specific functions to each unit. The DU, a crucial component of this split architecture, can be Yuhui Wang and Junaid Farooq are with the Department of Electrical & Computer Engineering, College of Engineering and Computer Science, University of Michigan-Dearborn, Dearborn, MI 48128 USA. E-mails: {ywangdq, mjfarooq}@umich.edu. Preliminary results from this work have appeared in Proceedings of the 20 th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), International Workshop on Unmanned Autonomous Vehicles and IoT (UAV-IoT 2023) [1]. Fig. 1: Overview of the deep reinforcement learning based placement optimization framework for integrated access backhauling in UAV networks. conveniently positioned on UAVs, enabling them to serve as integrated access and backhaul (IAB) nodes. This empowers the UAVs to act as dynamic, mobile base stations, enhancing network coverage and connectivity. On the other hand, the CU is typically situated at the traditional base stations (BS), housing the centralized processing and control functions. This segregation of responsibilities allows for a more distributed and flexible network architecture, enabling UAVs to efficiently handle communication tasks at the edge of the network, while the centralized units manage core functionalities and resource allocation [5]. This paper addresses the challenge of optimizing end-to-end performance in UAV-assisted cellular networks, focusing on the dynamic and adaptive 3D placement of UAVs. The fluid nature of the network topology, characterized by coverage gaps and rapidly changing user locations, poses significant challenges for ensuring consistent connectivity and optimal performance. Integrated access and backhaul in 5G presents a potential solution that can utilize UAVs to augment coverage for short durations in critical areas [6]. However, the demand for enhanced coverage can unpredictably arise at various locations and times, making conventional fixed placement strategies impractical and ineffective [7]. Furthermore, an essential consideration in UAV deployment is the balance between maintaining robust backhaul connectivity, facilitating seamless data transfer between UAVs and the central infrastructure, and optimizing fronthaul communication with ground users. This tradeoff requires adaptive and dynamic decision making as the prioritization of one link can potentially compromise the performance of the others [8]. For instance, in natural disasters such as a hurricane or earthquake, where traditional terrestrial network infrastructure has been severely impacted, cellular users may be able to connect to" 2312.14259v1,"1 Multi-Agent Bandit Learning through Heterogeneous Action Erasure Channels Osama A. Hanna † *, Merve Karakas † *, Lin F. Yang † , and Christina Fragouli † † University of California, Los Angeles Email: { ohanna, mervekarakas, linyang, christina.fragouli } @ucla.edu Abstract Multi-Armed Bandit (MAB) systems are witnessing an upswing in applications within multi-agent distributed environments, leading to the advancement of collaborative MAB algorithms. In such settings, communication between agents executing actions and the primary learner making decisions can hinder the learning process. A prevalent challenge in distributed learning is action erasure, often induced by communication delays and/or channel noise. This results in agents possibly not receiving the intended action from the learner, subsequently leading to misguided feedback. In this paper, we introduce novel algorithms that enable learners to interact concurrently with distributed agents across heterogeneous ac- tion erasure channels with different action erasure probabilities. We illustrate that, in contrast to existing bandit algorithms, which experience linear regret, our algorithms assure sub-linear regret guarantees. Our proposed solutions are founded on a meticulously crafted repetition protocol and scheduling of learning across heterogeneous channels. To our knowledge, these are the first algorithms capable of effectively learning through heterogeneous action erasure channels. We substantiate the superior performance of our algorithm through numerical experiments, emphasizing their practical significance in addressing issues related to communication constraints and delays in multi-agent environments. I. INTRODUCTION Multi-armed bandits, a well-established and effective online learning model, are increasingly finding applications in multi-agent distributed environments. One notable use-case involves lever- aging a central learner, with actions (arms) communicated to remote agents to collect rewards, as * indicates equal contribution. This work is partially supported by NSF grants #2221871, #2007714, and #2221871, by Army Research Laboratory grant under Cooperative Agreement W911NF-17-2-0196, and by Amazon Faculty Award." 2312.14262v1,"Whitepaper Exploring the intersection of Generative AI and Software Development Filipe Calegario 1 , Vanilson Burégio 2 , Francisco Erivaldo 3 , Daniel Moraes Costa Andrade 1 , Kailane Felix 1 , Nathalia Barbosa 1 , Pedro Lucas da Silva Lucena 1 , César França 3 Centro de Informática - UFPE Recife, Brazil 1 Universidade Federal Rural de Pernambuco - UFRPE Recife, Brazil 2 CESAR Innovation Center Recife, Brazil 3 fcac @cin.ufpe.br vanilson.buregio@ufrpe.br franssa@cesar.school Abstract In the ever-evolving landscape of Artificial Intelligence (AI), the synergy between generative AI and Software Engineering emerges as a transformative frontier. This whitepaper delves into the unexplored realm, elucidating how generative AI techniques can revolutionize software development. Spanning from project management to support and updates, we meticulously map the demands of each development stage and unveil the potential of generative AI in addressing them. Techniques such as zero-shot prompting, self-consistency, and multimodal chain-of-thought are explored, showcasing their unique capabilities in enhancing generative AI models. The 1" 2312.14265v1,"Applications of Lipschitz neural networks to the Run 3 LHCb trigger system Blaise Delaney 1,2,∗ , Nicole Schulte 3 , Gregory Ciezarek 4 , Niklas Nolte 5 , Mike Williams 1,2 , and Johannes Albrecht 3 1 Massachusetts Institute of Technology, Cambridge MA, USA NSF AI Institute for Artificial Intelligence and Fundamental Interactions (IAIFI) 3 TU Dortmund University, Dortmund, Germany 4 CERN, Meyrin, Switzerland 5 Meta AI (FAIR) 2 Abstract. The operating conditions defining the current data taking campaign at the Large Hadron Collider, known as Run 3, present unparalleled challenges for the real-time data acquisition workflow of the LHCb experiment at CERN. To address the anticipated surge in luminosity and consequent event rate, the LHCb experiment is transitioning to a fully software-based trigger system. This evolution necessitated innovations in hardware configurations, software paradigms, and algorithmic design. A significant advancement is the integration of monotonic Lipschitz neural networks into the LHCb trigger system. These deep learning models offer certified robustness against detector instabilities, and the ability to encode domain-specific inductive biases. Such properties are crucial for the inclusive heavy-flavour triggers and, most notably, for the topological triggers designed to inclusively select b-hadron candidates by exploiting the unique kinematic and decay topologies of beauty decays. This paper describes the recent progress in integrating Lipschitz neural networks into the topological triggers, highlighting the resulting enhanced sensitivity to highly displaced multi-body candidates produced within the LHCb acceptance. 1 Introduction The LHCb detector [1] located at the Large Hadron Collider at CERN is a single-arm forward spectrometer instrumented to achieve acceptance in the pseudorapidity range, 2 < η < 5. The primary goal of the LHCb experiment is the discovery of Beyond the Standard Model (BSM) physics through the analysis of heavy-flavour processes, with particular focus placed on investigating b-hadron decays. Since its inception, however, the LHCb physics programme has grown substantially to include, among other endeavours, the search for feebly interacting dark-portal candidates produced in the LHCb geometrical acceptance [2–6]. Throughout its Run 3 data taking campaign, the LHCb experiment is tasked with operating under unprecedented conditions, namely a nominal instantaneous luminosity, L = 2 × 10 33 cm −2 s −1 , amounting to a five-fold increase on the data taking conditions present in Runs 1 and 2. In order to cope with the challenging detector occupancy of Run 3, the ∗ e-mail: blaise.delaney@cern.ch" 2312.14275v1,"Two-site reduced density matrix from one- and two-particle Green’s functions Gergő Roosz, 1 Anna Kauch, 2 Frederic Bippus, 2 Daniel Wieser, 2 and Karsten Held 2 1 HUN-REN Wigner Research Centre for Physics, H-1525 Budapest, P.O.Box 49, Hungary 2 Institute of Solid State Physics, TU Wien, 1040 Vienna, Austria Strongly correlated electron systems are challenging to calculate, and entanglement in such systems is not widely analyzed. We present an approach that can be used as a post-processing step for calculating the two-site reduced density matrix and from it entanglement measures such as the mutual information and entanglement negativity. Input is only the one- and two-particle Green’s function which is the output of numerous many-body methods. As an illustration, we present results for a toy model, the Hubbard model on a 2 × 2 cluster. There is recent interest in the entanglement properties of strongly correlated many-body systems in general [1–5] and in the entanglement properties of the Hubbard model in particular [6, 7]. With the augmented perspective of entanglement, there is the hope of arriving at a better understanding of phase transitions and the complex physics of correlated electron systems. In general, entanglement measures such as the von Neumann [8] or Rényi entropy [9] at zero temperature or the mutual information [10] and entanglement negativity [11, 12] at finite temperatures require knowing the reduced density matrix. For wave function-based methods such as exact diagonalization (ED) [13] or matrix product states (MPS) [14], the reduced density matrix can be calculated directly. The exact diagonalization is restricted to rather small fermionic systems; the MPS can overcome this exponential problem if the entanglement in the system is moderate as it is the case, e.g., in one dimension or in strip-like systems [6]. Then it is possible to calculate entanglement measures of extended subsystems. For Green’s function-based methods, on the other hand, or in experiments, we obtain typically only oneand two-particle Green’s functions or measure corresponding spectral functions. Determining the full reduced density matrix for an extensive subsystem is then impossible. Green’s function-based methods such as DΓA [15] or (cluster) dynamical mean field theory [6, 16] allow the simulation of larger systems and wider parameter range than MPS, quantum Monte Carlo, or ED. The goal of the present paper is to show the possibility of calculating the two-site reduced density matrix using one- and two-particle Green’s functions. The information of this two-site density matrix is equivalent to obtaining the expectation values of every hermitian operator, which can be defined on the two sites. Let us emphasize that the two sites can be at varying distances which allows us to extract much more information on entanglement than if the two sites were fixed. For qubits or spins, there is agreement on how to define useful measures of entanglement [17–19]. In comparison, entanglement for strongly correlated fermions is still in its infancy [19–23]. Among others, there is an ongoing discussion on several types of entanglement measures [24–26], the experimental usefulness of one-body fermionic entanglement [27], and the possible restriction (projection) of the reduced density matrix by the superselection rule [25, 26]. The last is relevant if experiments are restricted to locally measurable operators. As an illustration we calculate, in the present paper, the mutual information and the entanglement negativity in small Hubbard clusters, but we emphasize that having the reduced density matrix at hand, one can calculate any entanglement or correlation measure based on it. The mutual information is defined as follows: Let A and B be two selected sites of our much larger strongly correlated electron system that we consider. Then the reduced density matrix for both sites A ∪ B is ρ A∪B , and the reduced density matrices of the individual sites A and B are ρ A and ρ B . With these, the mutual information is defined as I = S A + S B − S A∪B S A∪B = − Tr ρ A∪B ln ρ A∪B S A = − Tr ρ A ln ρ A S B = − Tr ρ B ln ρ B . (1) (2) (3) (4) The entanglement negativity [11, 12] characterizes the entanglement between the two parts (here sites) of a system A and B. To define it, we consider a basis |n, m⟩ where |n⟩ is a basis in the A part, and |m⟩ is a basis in the B part. One defines the partial transpose of an operator O in the Hilbert space of A ∪ B as ⟨n, m|O T A |r, s⟩ ≡ ⟨r, m|O|n, s⟩ (5) The density matrix has only nonnegative eigenvalues, however in the case of entanglement between A and B the partial transpose ρ T A of the density matrix may have negative eigenvalues. The negativity is defined as the sum of these negative eigenvalues X N = |λ k | , (6) λ k <0 where λ k denotes the spectrum of the partial transpose of the density matrix. The outline of the paper is as follows: In Sec. I, we introduce the Hubbard model to set the notation and units. In Sec. II the two-site reduced density matrix is" 2312.14284v1,"Manuscript under consideration of J. Fluid Mech. 1 Enhancing Transport Barriers with Swimming Microorganisms in Chaotic Flows Ranjiangshang Ran 1,2 and Paulo E. Arratia 1, † 1 Department of Mechanical Engineering and Applied Mechanics, University of Pennsylvania, Philadelphia, PA 19104, USA 2 Department of Physics, Emory University, Atlanta, GA 30322, USA (Received xx; revised xx; accepted xx) We investigate the effects of bacterial activity on the mixing and transport properties of two-dimensional, time-periodic flows in experiments and in a simple model. We focus on the interactions between swimming E. coli and the flow Lagrangian Coherent Structure (LCS), which are computed from experimentally measured velocity fields. Experiments show that such interactions are non-trivial and can lead to transport barriers through which the tracer flux is significantly reduced. Using the Poincaré map, we show that these transport barriers coincide with the outermost members of elliptic LCSs known as Lagrangian vortex boundaries. Numerical simulations further show that elliptic LCSs can repel elongated swimmers and lead to swimmer depletion within Lagrangian coherent vortices. A simple mechanism shows that such depletion is due to the preferential alignment of elongated swimmers with the tangents of elliptic LCSs. Our results provide insights into understanding the transport of microorganisms in complex flows with dynamical topological features from a Lagrangian viewpoint. Key words: 1. Introduction Many microorganisms live in environments characterized by currents (e.g., oceans, rivers, human intestines), and flow mediates many important microbial processes such as infection (Costerton et al. 1999; Yawata et al. 2016), nutrients uptake (Taylor & Stocker 2012; Musielak et al. 2009), and reproduction (Riffell & Zimmer 2007; Zimmer & Riffell 2011). Flow exerts forces and torques on microorganisms that affect their motility dynamics and spatial distribution (Guasto et al. 2012; Wheeler et al. 2019). It also controls the transport of essential molecules including nutrients, oxygen, and signals of mates and predators (Kim et al. 2016). Microorganisms, in turn, can adapt their swimming behavior to these physical and chemical gradients (Stocker et al. 2008). Such interactions can lead to non-trivial phenomena such as rheotaxis (Hill et al. 2007; Marcos et al. 2012; Mathijssen et al. 2019), gyrotaxis (De Lillo et al. 2014; Borgnino et al. 2018), and chemotaxis (Locsei & Pedley 2009; Stocker & Seymour 2012), to name a few examples. Even simple shear flows, when coupled to cell motility and morphology, can give rise to complex transport and cell motility behavior (Rusconi et al. 2014; Durham et al. 2009; Ezhilan & Saintillan 2015; Gustavsson et al. 2016). For instance, fluid shear can cause † Email address for correspondence: parratia@seas.upenn.edu" 2312.14297v1,"Scalable nanoimprint manufacturing of multi-layer hybrid metasurface device Shinhyuk Choi 1 , Jiawei Zuo 1 , Nabasindhu Das 1 , Yu Yao 1* and Chao Wang 1,2,  1 School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ 85287, USA 2 Biodesign Center for Molecular Design and Biomimetics, Arizona State University, AZ 85287, USA  Corresponding author. E-mail address: yuyao@asu.edu; wangch@asu.edu 1" 2312.14329v1,"Invariant Anomaly Detection under Distribution Shifts: A Causal Perspective João B. S. Carvalho, Mengtao Zhang, Robin Geyer, Carlos Cotrini, Joachim M. Buhmann Institute for Machine Learning Department of Computer Science ETH Zürich {joao.carvalho, mengtao.zhang, robin.geyer, ccarlos, jbuhmann}@inf.ethz.ch Abstract Anomaly detection (AD) is the machine learning task of identifying highly discrepant abnormal samples by solely relying on the consistency of the normal training samples. Under the constraints of a distribution shift, the assumption that training samples and test samples are drawn from the same distribution breaks down. In this work, by leveraging tools from causal inference we attempt to increase the resilience of anomaly detection models to different kinds of distribution shifts. We begin by elucidating a simple yet necessary statistical property that ensures invariant representations, which is critical for robust AD under both domain and covariate shifts. From this property, we derive a regularization term which, when minimized, leads to partial distribution invariance across environments. Through extensive experimental evaluation on both synthetic and real-world tasks, covering a range of six different AD methods, we demonstrated significant improvements in out-ofdistribution performance. Under both covariate and domain shift, models regularized with our proposed term showed marked increased robustness. Code is available at: https://github.com/JoaoCarv/invariant-anomaly-detection. 1 Introduction Anomaly detectors are the subject of increased interest in fields such as finance (Ahmed et al. [2016], Hilal et al. [2022]), medicine (Schlegl et al. [2019]), and security (Mothukuri et al. [2021], Siddiqui et al. [2019], Hosseinzadeh et al. [2021]). Having been trained on a sample from an unknown distribution, these models are capable of identifying abnormal objects unlikely to come from the original distribution (Bishop and Nasrabadi [2006]). Anomaly detection (AD) stands apart from supervised classification as it does not involve anomalies during training, making it challenging to articulate a model that depicts the class of objects deemed as normal. AD as a field boasts a plethora of diverse methodologies (Ruff et al. [2021]). Current detectors have demonstrated the advantage of approaches based on representation learning (Reiss and Hoshen [2021], Deng and Li [2022]). In this context, an encoder maps objects to representations which capture the most distinctive features of an object. In addition, it strives to map the class of normal objects onto a subset characterized by a more regular shape, thereby rendering representations from abnormal samples easily identifiable by comparison. Central to this second goal is a notable vulnerability of representation learning-based methods: they hinge on the assumption of independent and identically distributed (i.i.d.) training and test data. This implies that normal samples in the training data are expected to be sampled identically in the test data, thereby being mapped to the same vicinity in the representation space - an assumption that is frequently violated in real-world scenarios (Koh et al. [2021]). Indeed, distribution shifts in the context of AD present a unique challenge because it involves discerning two types of distribution shifts targeting the distribution of the normal objects, p n . Anomalies 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.14333v1,"Behaviour Modelling of Social Animals via Causal Structure Discovery and Graph Neural Networks Gaël Gendron 1 Yang Chen 1 Mitchell Rogers 1 Yiping Liu 1 Mihailo Azhar 2 Shahrokh Heidari 1 David Arturo Soriano Valdez 1 Kobe Knowles 1 Padriac O’Leary 1 Simon Eyre 3 Michael Witbrock 1 Gillian Dobbie 1 Jiamou Liu 1 Patrice Delmas 1 NAOInstitute, The University of Auckland 1 Department of Ecoscience, Aarhus University 2 Wellington Zoo 3 ABSTRACT Better understanding the natural world is a crucial task with a wide range of applications. In environments with close proximity between humans and animals, such as zoos, it is essential to better understand the causes behind animal behaviour and what interventions are responsible for changes in their behaviours. This can help to predict unusual behaviours, mitigate detrimental effects and increase the well-being of animals. There has been work on modelling the dynamics behind swarms of birds and insects but the complex social behaviours of mammalian groups remain less explored. In this work, we propose a method to build behavioural models using causal structure discovery and graph neural networks for time series. We apply this method to a mob of meerkats in a zoo environment and study its ability to predict future actions and model the behaviour distribution at an individual-level and at a group level. We show that our method can match and outperform standard deep learning architectures and generate more realistic data, while using fewer parameters and providing increased interpretability. 1 (a) Carrying a pup. (b) Digging. (c) Low sitting or standing. (d) Interacting with a foreign object. (e) Playfighting. (f) Raised guarding. Figure 1: Examples of meerkat behaviours in the Meerkat Behaviour Recognition Dataset [23]. INTRODUCTION Understanding and modelling non-human animal behaviour is a fundamental task in ecological research, with wide applications ranging from unusual behaviour detection [3], population dynamics [17], habitat selection analysis [42], and disease spread modelling [7]. One particular application of behaviour modelling is to monitor the well-being of animals in zoo environments, where evidencebased approaches for animal behaviour monitoring and prediction are essential to help zoos maximise the well-being of their captive wild animals [24, 30, 31]. To model animal behaviour, classical rule-based methods rely predominantly on the manual identification of correlations. In many cases, these methods begin with a hypothesis and subsequently validating it using the collected data [3, 42]. However, despite the achievements of these approaches, they rely on human expertise, which can be expensive and impractical when dealing with complex behavioural rules. The advent of machine learning has opened up the possibility of simultaneously considering multiple factors when investigating complex correlations [41]. However, learning correlations without recovering the cause and effect knowledge cannot provide a full understanding of the studied phenomenon [29]. While existing research has largely concentrated on the interplay between behaviour and environmental factors, the causeand-effect relationships among behaviours have been less explored. Causal relationships among behaviours are particularly prominent 1 Corresponding author. Email address: gael.gendron@auckland.ac.nz in social mammals, such as meerkats and chimpanzees [5, 10, 45] and are often interrelated in complex ways. In zoo populations, human intervention adds an additional layer of complexity. Consequently, determining the causal relationships between behaviours that evolve over time can be challenging. Causality theory for time series aims to recover the causal dependencies between variables that evolve over time [9, 16]. These methods are well suited to discriminate true causal links from spurious correlations (e.g. variables can be correlated because they share a common cause but have no causal links between them). A small body of work recovers the causal structure of animal behaviours but focuses on insect swarms [15] or bird flocks [4] and does not attempt to model the complex social interactions of individuals. In this work, we propose an approach based on Causal Structure Discovery [9] and Neural-Causal Inference [48] to (1) automatically discover the causal relationships between the behaviours of individuals in a social group and (2) model and predict the behaviours of individuals over time. We build a causal graph from the data using a Causal Structure Discovery algorithm to tackle the first objective. We present the algorithm in Section 3.1. We then use the causal graph to constrain a Graph Neural Network [12, 28] to perform Causal Inference and predict the next behaviour of an individual, as described in Section 3.2. In Section 4, we apply the proposed method to simulate the behaviours of a mob of meerkats in an enclosure of the Wellington Zoo. Figure 1 illustrates some examples of the" 2312.14335v1,"Context-aware Decoding Reduces Hallucination in Query-focused Summarization Zhichao Xu ZHICHAO . XU @ UTAH . EDU University of Utah Abstract Query-focused summarization (QFS) aims to provide a summary of a single document/multi documents that can satisfy the information needs of a given query. It is useful for various real-world applications, such as abstractive snippet generation or more recent retrieval augmented generation (RAG). A prototypical QFS pipeline consists of a retriever (sparse or dense retrieval) and a generator (usually a large language model). However, applying large language models (LLM) potentially leads to hallucinations, especially when the evidence contradicts the prior belief of LLMs. There has been growing interest in developing new decoding methods to improve generation quality and reduce hallucination. In this work, we conduct a large-scale reproducibility on one recently proposed decoding method—Context-aware Decoding (CAD). In addition to replicating CAD’s experiments on news summarization datasets, we include experiments on QFS datasets, and conduct more rigorous analysis on computational complexity and hyperparameter sensitivity. Experiments with eight different language models show that performance-wise, CAD improves QFS quality by (1) reducing factuality errors/hallucinations while (2) mostly retaining the match of lexical patterns, measured by ROUGE scores, while also at a cost of increased inference-time FLOPs and reduced decoding speed. The code implementation based on Huggingface Library is made available 1 . 1 Introduction Query-focused summarization (QFS) aims to provide a summary of a single document/multiple documents that can satisfy the information need of a given query [XC23; Mar06]. It is useful for various realworld applications, such as abstractive snippet generation [Che+20] or more recent retrieval augmented generation (RAG) [Lew+20]. A prototypical QFS pipeline consists of a retriever to retrieve the documents to use as evidence, and a generator (usually based on large language models) to read the documents and generate natural language answers/summaries. While the idea of combining large language models (LLM) and information retrieval seems tempting [Met+21], a few problems persist. For example, deploying generative models requires more inference FLOPs and specialized hardwares (GPUs or TPUs); and more importantly, the usage of LLMs in QFS/RAG pipeline also potentially leads to the hallucination problem where the generated summary contains information contradicting the source documents/evidence [SB22; Ben+21], which might hurt users’ experience in information seeking processes and potentially escalate the spread of misinformation. As such, mainstream search engines (Google, Bing, etc.) still deploy extractive snippets [BC14]. In parallel to training better language models to reduce hallucinations, there has been growing interest in developing decoding methods to allow the language models to better attend to evidence or to penalize degeneration, thus improving generation quality. For example, Li et al. [Li+23] propose contrastive decoding, leveraging the output probability distribution difference between an expert LM and an amateur LM to improve generation quality. DExperts [Liu+21] focus on reducing toxicity by contrasting the expert LM with toxicity LM. Xu and Cohen [XC23] show that directly injecting knowledge constraints can poten- 1 https://github.com/zhichaoxu-shufe/context-aware-decoding-qfs . 1" 2312.14341v1,"A FULL SPLITTING ALGORITHM FOR FRACTIONAL PROGRAMS WITH STRUCTURED NUMERATORS AND DENOMINATORS ˚ RADU IOAN BOŢ : , GUOYIN LI ; , AND MIN TAO § Abstract. In this paper, we consider a class of nonconvex and nonsmooth fractional programming problems, which involve the sum of a convex, possibly nonsmooth function composed with a linear operator and a differentiable, possibly nonconvex function in the numerator and a convex, possibly nonsmooth function composed with a linear operator in the denominator. These problems have applications in various fields, including CT reconstruction and sparse signal recovery. We propose an adaptive full-splitting proximal subgradient algorithm with an extrapolated step that addresses the challenge of evaluating the composition in the numerator by decoupling the linear operator from the nonsmooth component. We specifically evaluate the nonsmooth function using its proximal operator, while the linear operator is assessed through forward evaluations. Furthermore, the smooth component in the numerator is evaluated through its gradient, the nonsmooth component in the denominator is managed using its subgradient, and the linear operator in the denominator is also assessed through forward evaluations. We demonstrate subsequential convergence toward an approximate lifted stationary point and ensure global convergence under the Kurdyka- Lojasiewicz property, all achieved without relying on any full-row rank assumptions regarding the linear operators. We further explain the reasoning behind aiming for an approximate lifted stationary point. This is exemplified by constructing a scenario illustrating that the algorithm could diverge when seeking exact solutions. Lastly, we present a practical iteration of the algorithm incorporating a nonmonotone line search, significantly enhancing its convergence performance. Our theoretical findings are validated through simulations involving limited-angle CT reconstruction and the robust sharp ratio minimization problem. Key words. structured fractional programs, full splitting algorithm, convergence analysis, lifted stationary points, Kurdyka- Lojasiewicz property, nonmonotone line search AMS subject classifications. 90C26, 90C32, 49M27, 65K05 1. Introduction. In this paper, we consider the following class of nonsmooth and nonconvex fractional programs: (1.1) min F pxq :“ xPS gpAxq ` hpxq , f pKxq where S is a nonempty convex and compact subset of R n , f : R p Ñ R :“ RYt`8u and g : R s Ñ R are proper, convex and lower semicontinuous functions; A : R n Ñ R s and K : R n Ñ R p are linear operators; h : R n Ñ R is a (possibly nonconvex) differentiable function over an open set containing S and its derivative ∇h is Lipschitz continuous over this open set with a Lipschitz constant L ∇h . To ensure the model problem is well-defined, we also assume for the denominator that f pKxq ą 0 for all x P S. For more detailed assumptions, we direct the reader to our subsequent sections. ˚ Submitted to the editors DATE. Funding: The research of RIB has been partially supported by the Austrian Science Fund (FWF), project number W1260-N35. The research of MT has been partially supported by the Natural Science Foundation of China (No. 11971228), by the Jiangsu University QingLan Project, and by the China Scholarship Council (202006195015) and it has been conducted during her research visit at the University of Vienna in 2023. : Faculty of Mathematics, University of Vienna, A-1090 Vienna, Austria, radu.bot@univie.ac.at. ; Department of Applied Mathematics, University of New South Wales, Sydney 2052, Australia, g.li@unsw.edu.au. § Department of Mathematics, National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, 210093, Republic of China, taom@nju.edu.cn. 1" 2312.14388v1,"A Generalized Shuffle Framework for Privacy Amplification: Strengthening Privacy Guarantees and Enhancing Utility E Chen, 1 Yang Cao, 2, * Yifei Ge 3 1 Zhejiang Lab Hokkaido University 3 Xi’an Jiaotong-Liverpool University chene@zhejianglab.com, yang@ist.hokudai.ac.jp, Yifei.Ge23@student.xjtlu.edu.cn 2 Abstract The shuffle model of local differential privacy is an advanced method of privacy amplification designed to enhance privacy protection with high utility. It achieves this by randomly shuffling sensitive data, making linking individual data points to specific individuals more challenging. However, most existing studies have focused on the shuffle model based on (ϵ 0 , 0)-Locally Differentially Private (LDP) randomizers, with limited consideration for complex scenarios such as (ϵ 0 , δ 0 )-LDP or personalized LDP (PLDP). This hinders a comprehensive understanding of the shuffle model’s potential and limits its application in various settings. To bridge this research gap, we propose a generalized shuffle framework that can be applied to any (ϵ i , δ i )-PLDP setting with personalized privacy parameters. This generalization allows for a broader exploration of the privacy-utility trade-off and facilitates the design of privacy-preserving analyses in diverse contexts. We prove that shuffled (ϵ i , δ i )-PLDP process approximately preserves µ-Gaussian Differential Privacy with r µ = 2 1−δi 1−δi i=1 1+eϵi −max i 1+eϵi P n . This approach allows us to avoid the limitations and potential inaccuracies associated with inequality estimations. To strengthen the privacy guarantee, we improve the lower bound by utilizing hypothesis testing instead of relying on rough estimations like the Chernoff bound or Hoeffding’s inequality. Furthermore, extensive comparative evaluations clearly show that our approach outperforms existing methods in achieving strong central privacy guarantees while preserving the utility of the global model. We have also carefully designed corresponding algorithms for average function, frequency estimation, and stochastic gradient descent. 1 Introduction The shuffle model (Bittau et al. 2017) is a state-of-the-art technique to balance privacy and utility for differentially private data analysis. In traditional differential privacy, a trusted server (or aggregator) is often assumed to collect all users’ data before privacy-preserving data analysis (Dwork and Roth 2014). However, such approaches may not be feasible or practical in scenarios where a trusted curator does * Corresponding author: Yang Cao, yang@ist.hokudai.ac.jp Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. not exist. Given this, Local Differential Privacy (LDP) (Kasiviswanathan et al. 2011) has been proposed to achieve differential privacy by allowing the users to add noises individually; however, LDP suffers from low utility due to the accumulated noise. To address this, the shuffle model of differential privacy (shuffle DP) (Bittau et al. 2017; Balle et al. 2019; Erlingsson et al. 2019) adds a shuffler between the users and the server to randomly shuffle the noisy data before sending the server. The shuffle DP has an intriguing theoretical privacy amplification effect, which means a small amount of local noise could result in a strong privacy guarantee against the untrusted server. Extensive studies (Balle et al. 2019; Erlingsson et al. 2019; Girgis et al. 2021b; Feldman, McMillan, and Talwar 2022; Liu et al. 2021; Girgis et al. 2021a) have been devoted to proving a better (tighter) privacy amplification in the shuffle DP. However, most existing studies have focused on the shuffle model based on (ϵ 0 , δ 0 )-LDP randomizer with uniform and limited settings of local privacy parameters ϵ 0 and δ 0 . For example, Erlingsson et al. 2019 assumes 0 < ϵ 0 < 1/2 and δ 0 = 0. Although a recent work Liu et al. 2023 provides a privacy bound for local personalized privacy parameter ϵ i for each user i (and a fixed δ 0 ), the bound is relatively rough and has a large room to be improved. To address this problem, we make the following contributions: 1. We propose a Generalized Shuffle framework for Privacy Amplification (GSPA) to allow arbitrary local privacy parameters and provide new privacy amplification analysis. Our analysis technique benefits from the adoption of Functional Differential Privacy (Dong, Roth, and Su 2022) and carefully analyzing the distance between two multinomial distributions (see Theorem 1 and 2). For both uniform and personalized privacy parameter settings, we provide lower privacy bounds that exceed that of existing results (see Figure 2). 2. We apply GSPA with different personalized privacy parameter settings to diverse privacy-preserving analysis tasks, including private mean, private frequency estimation, and DP-SGD, to demonstrate the effectiveness of our approach. For mean and frequency estimation with GSPA (see Figure 3), the more conservative users there are, the less utility is observed, showing a negative linear relationship. Simultaneously, as the privacy parameters of conservative users increase, utility demonstrates" 2312.14406v1,"Generative Pretraining at Scale: Transformer-Based Encoding of Transactional Behavior for Fraud Detection Ze Yu Zhao 1,* , Zheng Zhu 1,* , Guilin Li 1,† , Wenhan Wang 1,† , and Bo Wang 1 feynmanzhao, adamzzhu, guilinli, ezewang, pollowang@tencent.com 1 Tencent, WeChat Pay Abstract In this work, we introduce an innovative autoregressive model leveraging Generative Pretrained Transformer (GPT) architectures, tailored for fraud detection in payment systems. Our approach innovatively confronts token explosion and reconstructs behavioral sequences, providing a nuanced understanding of transactional behavior through temporal and contextual analysis. Utilizing unsupervised pretraining, our model excels in feature representation without the need for labeled data. Additionally, we integrate a differential convolutional approach to enhance anomaly detection, bolstering the security and efficacy of one of the largest online payment merchants in China. The scalability and adaptability of our model promise broad applicability in various transactional contexts. 1 Introduction In the dynamic world of digital finance, protecting transactions from fraud is an increasingly intricate challenge. Machine learning has advanced behavioral analysis, yet it faces difficulties with the detailed patterns of transaction data—both vast in volume and complex in nature. Conventional models fall short in decoding this data accurately. Our study introduces a novel method that applies Generative Pretrained Transformers, acclaimed for language understanding, to model financial transactions. By pretraining on extensive user payment data, our model overcomes the common obstacles of behavioral sequence analysis such as the need for large amounts of labeled data. We detail three major contributions: firstly, an innovative autoregressive pretraining method designed specifically for financial data. Secondly, we introduce a differential convolution structure that enhances the model’s capacity for anomaly detection. Lastly, from a methodological perspective, we demonstrate the model’s flexibility in adapting to diverse financial scenarios, and from an application standpoint, we validate its scalability through extensive testing in our dataset. Our work not only moves the needle forward in financial fraud detection but also showcases the potential of unsupervised learning in environments where protecting data and user privacy is crucial. 2 Related Work 2.1 Sequential Recommendation and Pre-training Techniques Sequential recommendation models primarily rely on users’ chronological behavior sequences to learn their preferences. Recently, various deep neural networks have been employed for sequence-based recommendation, such as GRU4Rec [1], which uses Gated Recurrent Units for session-based recommendation. Inspired by the success of Transformer [2] and BERT [3], models like SASRec [4] and Bert4Rec [5] adopt self-attention mechanisms to model user behavior sequences. Cold-start problems in sequential recommendation have also attracted researchers’ attention, with methods like meta-learning mechanisms and behavior sequence augmentation being proposed to address these issues. * Co-first authors with equal contributions † Corresponding authors 1" 2312.14428v1,"A Unified Industrial Large Knowledge Model Framework in Smart Manufacturing Jay Lee, Hanqi Su * Center for Industrial Artificial Intelligence, Department of Mechanical Engineering University of Maryland, College Park, MD, USA {leejay, hanqisu}@umd.edu Abstract The recent emergence of large language models (LLMs) shows the potential for artificial general intelligence, revealing new opportunities in industry 4.0 and smart manufacturing. However, a notable gap exists in applying these LLMs in industry, primarily due to their training on general knowledge rather than domain-specific knowledge. Such specialized domain knowledge is vital for effectively addressing the complex needs of industrial applications. To bridge this gap, this paper proposes an Industrial Large Knowledge Model (ILKM) framework emphasizing their potential to revolutionize the industry in smart manufacturing. In addition, ILKMs and LLMs are compared from eight perspectives. Finally, “6S Principle” is proposed as the guideline for the development of ILKMs in smart manufacturing. knowledge, not domain knowledge, which may not be entirely suitable for the specific and often intricate needs of industrial applications. Therefore, there is an urgent need for the development of an advanced large ML model leveraging the powers of LLMs and domain knowledge to address complex challenges in smart manufacturing. Recognizing this gap, we propose an industrial large knowledge model (ILKM) framework for domain-driven data-centric industrial systems in Smart Manufacturing, and the “6S Principle” is proposed for the development of ILKM. The role of ILKMs and the comparison with LLMs are discussed in detail. Through this exploration, we aim to provide a comprehensive understanding of the transformative power of ILKMs in the modern manufacturing landscape, highlighting their significance as a cornerstone of the ongoing industrial revolution. 2 1 Introduction In the era of Industry 4.0 [5], a paradigm shift is unfolding in the manufacturing sector, driven by the advent of smart manufacturing practices. At the heart of this revolution lies the integration of many advanced techniques, such as Industrial Big Data Analytics [15], Industrial Artificial Intelligence (AI) [7], Machine Learning (ML) [11, 17], Cyber-Physical Systems (CPS) [6], Internet of Things (IoT) [13], etc. These techniques are all aimed at enhancing efficiency, productivity, and flexibility in manufacturing processes. Recent advances in large language models (LLMs) [2, 14, 20] have showcased extraordinary capabilities in natural language processing for understanding, interpreting, and generating human language. However, a gap exists in the application of these LLMs within smart manufacturing, primarily because LLMs are predominantly trained on general * Corresponding author The role of industrial large knowledge models in smart manufacturing In the domain of smart manufacturing, the deployment of ILKMs emerges as a pivotal element. Figure 1 shows the general process of how ILKM works within Industry 4.0, where ILKM functions at the core of this advanced manufacturing paradigm. The process begins with the acquisition and aggregation of a vast array of industrial data, derived from diverse industrial products. This data is categorized into two primary forms: human-interpretable data and structured machine-generated data. Leveraging technologies such as LLMs, a comprehensive Large Knowledge Library (LKL), along with various Machine Learning (ML) and Artificial Intelligence (AI) techniques, the ILKM serves as Artificial General Intelligence (AGI), which plays a vital role in enabling advanced and sophisticated data analytics. This, therefore, paves the way for a more insightful and informed decision-making process. Beyond this, the ILKM can also interface with and improve supply chain management, leading to more efficient, resilient, and customer-" 2312.14435v1,"Thermodynamic and Stoichiometric Laws Ruling the Fates of Growing Systems Atsushi Kamimura, 1, ∗ Yuki Sughiyama, 1, 2, ∗ and Tetsuya J. Kobayashi 1, † 1 Institute of Industrial Science, The University of Tokyo, 4-6-1, Komaba, Meguro-ku, Tokyo 153-8505 Japan 2 Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan (Dated: December 25, 2023) We delve into growing open chemical reaction systems (CRSs) characterized by autocatalytic reactions within a variable volume, which changes in response to these reactions. Understanding the thermodynamics of such systems is crucial for comprehending biological cells and constructing protocells, as it sheds light on the physical conditions necessary for their self-replication. Building on our recent work, where we developed a thermodynamic theory for growing CRSs featuring basic autocatalytic motifs with regular stoichiometric matrices, we now expand this theory to include scenarios where the stoichiometric matrix has a nontrivial left kernel space. This extension introduces conservation laws, which limit the variations in chemical species due to reactions, thereby confining the system’s possible states to those compatible with its initial conditions. By considering both thermodynamic and stoichiometric constraints, we clarify the environmental and initial conditions that dictate the CRSs’ fate—whether they grow, shrink, or reach equilibrium. We also find that the conserved quantities significantly influence the equilibrium state achieved by a growing CRS. These results are derived independently of specific thermodynamic potentials or reaction kinetics, therefore underscoring the fundamental impact of conservation laws on the growth of the system. I. INTRODUCTION Chemical thermodynamics provides solid physical principles for explaining the energetics and for predicting the fate of chemical reaction processes [1, 2]. Applications of these principles to autocatalytic reactions are essential to elucidate physical constraints on the capability of self-replication [3, 4]. In the self-replication process, both the chemical components and the encapsulating volume of the system have to grow in a coherent manner [5–8]. This consideration introduces a unique theoretical challenge to establish the thermodynamic consistency between autocatalytic reactions and volume expansion because the conventional chemical thermodynamics is based solely on the density (concentration) of chemicals, presuming a constant volume [9–18]. We have recently established a thermodynamic theory for growing systems, in which the number of chemicals and the volume are treated based on the rigorous thermodynamic basis [19]. Accordingly, the theory generally formulates physical conditions to realize the growth of the system, identifies several thermodynamic constraints for the possible states of the growing system, and derives the form of entropy production and heat dissipation accompanying growth. However, this theory can only address systems with regular (full-rank) stoichiometric matrices, thus limiting its applicability to a set of minimum autocatalytic motifs [20]. Given that chemical reaction systems (CRSs) are subject to stoichiometric constraints in general, and various biological functions are robustly ∗ These two authors contributed equally. † E-mail:tetsuya@mail.crmind.net; Also at Universal Biology In- stitute, The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8654, Japan. realized by specific stoichiometric properties [21, 22], it becomes imperative to delve into the influence of stoichiometry to growing systems for comprehensive understanding of the thermodynamics of self-replication. In this work, we clarify how stoichiometric conservation laws shape the fate of growing systems. The stoichiometry gives rise to linear combinations of the numbers of chemicals being conserved during the dynamics of chemical reactions [9, 12–16, 23–30]. These conservation laws stringently restrict possible changes in the number of chemicals within the stoichiometric compatibility class, definned by the stoichiometric matrix’s left kernel and the initial condition. In biological contexts, particularly in metabolic networks, these laws are crucial in linking the dynamic variations of different chemicals (metabolites) and also in providing insights into a cell’s production capabilities [31–38]. This study elucidates the complex interplay between thermodynamics and stoichiometric conservation laws for the growing system and its consequence to the fate of the growing systems. By disentangling the geometric relationship among chemical numbers, densities, and potentials, we establish the conditions for the system to grow, shrink, or equilibrate, while simultaneously satisfying the second law of thermodynamics and the conservation laws. Furthermore, we show that the existence of conservation laws qualitatively alter the fate of the system and the geometric properties of the equilibrium state. These results are derived solely based on thermodynamic and stoichiometric requirements and thus remain independent of specific thermodynamic potentials or reaction kinetics. This renders our theory universally applicable, enhancing our understanding of the origins of life and the construction of protocells[20, 39–62], and enabling the search for the universal laws of biological cells [63–76]." 2312.14448v1,"1 Quantum-Assisted Joint Caching and Power Allocation for Integrated Satellite-Terrestrial Networks Yu Zhang, Student Member, IEEE, Yanmin Gong, Senior Member, IEEE, Lei Fan, Senior Member, IEEE, Yu Wang, Fellow, IEEE, Zhu Han, Fellow, IEEE, and Yuanxiong Guo, Senior Member, IEEE Abstract—Low earth orbit (LEO) satellite network can complement terrestrial networks for achieving global wireless coverage and improving delay-sensitive Internet services. This paper proposes an integrated satellite-terrestrial network (ISTN) architecture to provide ground users with seamless and reliable content delivery services. For optimal service provisioning in this architecture, we formulate an optimization model to maximize the network throughput by jointly optimizing content delivery policy, cache placement, and transmission power allocation. The resulting optimization model is a large-scale mixed-integer nonlinear program (MINLP) that is intractable for classical computer solvers. Inspired by quantum computing techniques, we propose a hybrid quantum-classical generalized Benders’ decomposition (HQCGBD) algorithm to address this challenge. Specifically, we first exploit the generalized Benders’ decomposition (GBD) to decompose the problem into a master problem and a subproblem and then leverage the state-of-art quantum annealer to solve the challenging master problem. Furthermore, a multi-cut strategy is designed in HQCGBD to accelerate the solution process by leveraging the quantum advantages in parallel computing. Simulation results demonstrate the superiority of the proposed HQCGBD algorithm and validate the effectiveness of the proposed cache-enabled ISTN architecture. Index Terms—Integrated satellite-terrestrial network, cache placement, content delivery, quantum computing, generalized Benders’ decomposition. I. I NTRODUCTION W ITH the explosion of Internet-of-Things (IoT) devices, it is estimated that the global mobile data traffic will grow by a factor of nearly 4, reaching 325 EB per month in 2028 [1]. These data will cause an enormous burden on networks. Furthermore, emerging content-centric communications, such as full-motion video streaming and online live shows, typically require vast network throughput [2]. It is challenging for traditional terrestrial networks to meet these demands due to their limited backhaul capacity. Content caching at the network edge has been considered as a promising solution that could significantly alleviate backhaul Y. Zhang and Y. Gong are with the Department of Electrical and Computer Engineering, University of Texas at San Antonio, Texas, 78249, USA. (e-mail: {yu.zhang@my., yanmin.gong@}utsa.edu). L. Fan is with the Department of Engineering Technology, University of Houston, Houston, TX 77204 USA (e-mail: lfan8@central.uh.edu). Y. Wang is with Department of Computer and Information Sciences, Temple University, Philadelphia, Pennsylvania 19122, USA. (e-mail: wangyu@temple.edu). Z. Han is with the Department of Electrical and Computer Engineering, University of Houston, Houston, TX 77004 USA, and also with the Department of Computer Science and Engineering, Kyung Hee University, Seoul 446-701, South Korea. (e-mail: zhan2@uh.edu). Y. Guo is with the Department of Information Systems and Cyber Security, University of Texas at San Antonio, Texas, 78249, USA. (e-mail: yuanxiong.guo@utsa.edu). pressure. Popular contents are proactively cached at the base stations (BSs), which are close to ground users, and delivered to the users directly without fetching from the content server via backhaul link [3]. However, the traditional cacheenabled terrestrial network is still infeasible in some signalblocked or shadowed environments due to the immobility of infrastructure-based BSs [4]. In recent years, low earth orbit (LEO) satellite communication has attracted growing attention. Since LEO satellites operate from 500 m to 2000 km [5], LEO satellites can break through geographical restrictions. Consequently, several major LEO projects have been launched. For example, SpaceX Starlink plans to launch more than 12,000 LEO satellites to provide seamless global service for terrestrial users [6]. However, there are two major challenges in the satellite networks. One challenge is that satellite connections might experience interruptions due to various factors like atmospheric conditions or solar interference. The other challenge is that transmitting data over satellite links is costly. To address these challenges, we not only integrate caching into satellite networks but also integrate the satellite networks with terrestrial networks. This cache-enabled integrated satellite-terrestrial network (ISTN) is envisioned to play an essential role in 6G mobile communication systems [7]. Resource management becomes a critical problem in ISTNs due to the limited resources of satellites and edge base stations compared to remote clouds. There is a rich literature on resource management in ISTN with the goal of optimizing network throughput [8]–[10], energy efficiency [11]–[13], and system latency [14], [15]. Different from the terrestrial networks, ISTNs comprise not only terrestrial but also satellite segments. Specifically, satellites serve as the space base stations to complement the terrestrial edge networks, which are capable of attaining full coverage. These result in a higher level of collaboration and coordination among the various components in ISTNs. Thus, resource management optimization in the area of ISTN needs to be formulated as large-scale mixed-integer nonlinear programs (MINLPs), which are NP-hard. It is difficult to utilize classical computing techniques to solve them. Quantum computing (QC) techniques provide a new promising approach to tackling this challenge. QC differs from classical computing in that it encodes information using qubits, representing a superposition of states, rather than binary bits [16]. Besides, QC utilizes entanglement and quantum tunneling to find the solution. These features enable quantum computers to simultaneously explore exponentially large combinations of states, which can solve large-scale real-world optimization problems more efficiently and faster [16]. There are two" 2312.14451v1,"A torus of N-dimensional charged anti-de-Sitter black holes in the quadratic form of f (Q) gravitational theory G. G. L. Nashed 1 1, ∗ Centre for Theoretical Physics, The British University, P.O. Box 43, El Sherouk City, Cairo 11837, Egypt (Dated: December 25, 2023) Due to the absence of spherically symmetric black hole solutions in f (Q) because of the constraint derived from its field equations, which yields either Q = 0 or f QQ = 0 [1, 2]. We are going to introduce a tours solutions for charged anti-de-Sitter black holes in N -dimensions within the framework of the quadratic form of f (Q) gravity, where the coincident gauge condition is applied [1]. Here, f (Q) = Q + 2 1 αQ 2 − 2Λ, and the condition N ≥ 4 is satisfied. These black hole solutions exhibit flat or cylindrical horizons as their distinctive features. An intriguing aspect of these black hole solutions lies in the coexistence of electric monopole and quadrupole components within the potential field, which are indivisible and exhibit interconnected momenta. This sets them apart from the majority of known charged solutions in the linear form of the non-metricity theory and its extensions. Moreover, the curvature singularities in these solutions are less severe compared to those found in known charged black hole solutions within the characteristic can be demonstrated by computing certain invariants of the curvature and non-metricity tensors. Finally, we calculate thermodynamic parameters, including entropy, Hawking temperature, and Gibbs free energy. These thermodynamic computations affirm the stability of our model. PACS numbers: 04.50.Kd, 98.80.-k, 04.80.Cc, 95.10.Ce, 96.30.-t I. INTRODUCTION While Einstein’s general relativity (GR) has undeniably enjoyed success, its constraints in various aspects have become evident in recent years, leading scholars to investigate alternative theories. Subsequently, on flat spacetime, an affine connection that is compatible with the metric and exhibits torsion was introduced, supplanting the initially used Levi-Civita connection that is both free of torsion and compatible with the metric, serving as the foundation for GR. This allowed the torsion to assume the entire responsibility for characterizing gravity. The theory introduced by Einstein himself [3], known as metric teleparallel gravity, is of particular note. Recently, a newcomer has joined this family, the symmetric teleparallel theory. It is derived from an affine connection characterized by both vanishing curvature and torsion, attributing the gravitational effects to the non-metricity of spacetime [4]. In the metric teleparallel theory and its symmetric counterpart, one can build the torsion scalar T from √ the torsion tensor and the non-metricity scalar Q respectively. Subsequently, by adopting the Lagrangian L = −gT in the former and √ L = −gQ in the latter, the corresponding field equations can be derived. Nevertheless, given that the scalars T and Q are the same as the Levi-Civita Ricci scalar, modulo a surface term, both of these theories are equivalent to GR up to a boundary term. Undoubtedly, the “dark” issue that metric and symmetric teleparallelism experience in GR is shared by both. In order to address this difficulty, updated gravity theories have been presented in their respective fields, with f (T) [5] and f (Q) [6]. It is important to emphasize that the teleparallel theory incorporates an affine link independent of the metric tensor, in contrast to GR. Therefore, teleparallel theories can be thought of as metric-affine theories in which the connection and the metric are both dynamic variables. Unlike f (R) which is fourth-order equations, the two theories, f (Q) and f (T), display second-order field equations. This directly outperforms f (R) and positions f (Q) and f (T) as viable explanations for the universe’s accelerating expansion [7–14]. Nevertheless, models grounded in f (T) encounter significant challenges related to coupling and the local Lorentz invariance problem, concerns that do not apply to the theories of non-metricity. More research is warranted given the deeper similarities between these two intriguing subfields of teleparallel theories of gravity, see [15–18] and the references therein. The principle of equivalence requires gravity to demonstrate a geometric essence. Einstein’s GR serves as a gravity theory based on geometry, portraying a Riemannian manifold as spacetime. In this context, the affine connection ∗ Electronic address: nashed@bue.edu.eg" 2312.14453v1,"1 Hybrid Aerodynamics-Based Model Predictive Control for a Tail-Sitter UAV Bailun Jiang, Boyang Li, Member, IEEE, Ching-Wei Chang, and Chih-Yung Wen Abstract—It is challenging to model and control a tail-sitter unmanned aerial vehicle (UAV) because its blended wing body generates complicated nonlinear aerodynamic effects, such as wing lift, fuselage drag, and propeller–wing interactions. We therefore devised a hybrid aerodynamic modeling method and model predictive control (MPC) design for a quadrotor tail-sitter UAV. The hybrid model consists of the Newton–Euler equation, which describes quadrotor dynamics, and a feedforward neural network, which learns residual aerodynamic effects. This hybrid model exhibits high predictive accuracy at a low computational cost and was used to implement hybrid MPC, which optimizes the throttle, pitch angle, and roll angle for position tracking. The controller performance was validated in real-world experiments, which obtained a 57% tracking error reduction compared with conventional nonlinear MPC. External wind disturbance was also introduced and the experimental results confirmed the robustness of the controller to these conditions. Index Terms—Aerodynamic modeling, learning-based model predictive control, neural network, tail-sitter UAV, trajectory tracking. S UPPLEMENTARY M ATERIALS The collected dataset for model training can be found at https://ieee-dataport.org/documents/ quadrotor-tail-sitter-uav-flight-log. A video demonstration is available at https://youtu.be/GLJdBFR3OvU. The implemented algorithm source code is availiable at https://github.com/HKPolyU-UAV/airo control interface. I. INTRODUCTION R ECENT advancements in microcontroller and sensing technologies have led to rapid developments in unmanned aerial vehicles (UAVs). The UAVs find extensive application in tasks such as environmental monitoring, land surveying, and disaster response [1]–[3]. These applications impose specific requirements on the performance of UAV systems, including factors such as endurance during flight, tracking accuracy, and wind resistance capability. Multi-rotor UAVs have simple structures and agile maneuvering capabilities. However, their flight range and endurance are usually limited by their relatively low aerodynamic efficiency. Conversely, fixed-wing UAVs characterized by high B. Jiang and C.-Y. Wen are with the AIRo-Lab, Department of Aeronautical and Aviation Engineering, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong. E-mail: (bailun-robin.jiang@connect.polyu.hk; bo-yang.li@polyu.edu.hk; cywen@polyu.edu.hk). B. Li is with the School of Engineering, The University of Newcastle, Callaghan, NSW, Australia. E-mail: (boyang.li@newcastle.edu.au) C.-W. Chang is with the Department of Mechanical Engineering, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong. E-mail: (chingwei.chang@connect.polyu.hk). Fig. 1. The tail-sitter quadrotor UAV in hovering flight against a strong wind disturbance. eficiency typically necesitate a runway for both take-off and landing, a condition that may not be feasible in urban environments. Therefore, versatile hybrid UAVs have been developed that can convert between rotary-wing and fixed-wing modes to balance the trade-off between flight efficiency and vertical take-off and landing (VTOL) capabilities, such as tail-sitter, quad-plane, and tilt-wing UAVs [4]–[9]. Such VTOL UAVs usually take-off and land in urban area with limited space or on moving platforms such as boats. In these conditions, precise position tracking and robustness against disturbance are crucial. For transition and level-flight modes, on the other hand, the tracking accuracy is not as important as the hovering phase since these maneuvers are usually conducted up in the air with few obstacles. This study focused on the hovering control of a quadrotor tail-sitter UAV based on the dualrotor Arkbird VTOL airframe, shown in Fig. 1. The quadrotor tail-sitter UAV is more controllable and robust than its dualrotor counterpart. The large wing area of the quadrotor tail-sitter UAV mean that its dynamics are dominated by the strong nonlinear aerodynamic effects of the wing, which increases the difficulty of flight controller design. In hovering flight, the quadrotor tail-sitter UAV shares a similar control form to that of a quadrotor UAV; herein, its pitch and yaw control inputs were mapped to elevon angle command to enhance its controllability. Accurate trajectory tracking plays a pivotal role in enhancing the operational safety and efficiency of UAVs across diverse environmental conditions. Many research works have developed and implemented model predictive control (MPC) to enhance the position tracking accuracy on UAVs [10]–[12]. MPC considers a system dynamic model based on the receding" 2312.14463v1,"1 Dynamic Programming Approximate Optimal Control for Model-Based Reinforcement Learning Prakash Mallick 1 , Zhiyong Chen 2 1 Australian Institute of Machine Learning (AIML), 2 University of Newcastle Abstract—This article proposes an improved trajectory optimization approach for stochastic optimal control of dynamical systems affected by measurement noise by combining optimal control with maximum likelihood techniques to improve the reduction of the cumulative costto-go. A modified optimization objective function that incorporates dynamic programming-based controller design is presented to handle the noise in the system and sensors. Empirical results demonstrate the effectiveness of the approach in reducing stochasticity and allowing for an intermediate step to switch optimization that can allow an efficient balance of exploration and exploitation mechanism for complex tasks by constraining policy parameters to parameters obtained as a result of this improved optimization. This research study also includes theoretical work on the uniqueness of control parameter estimates and also leverages a structure of the likelihood function which has an established theoretical guarantees. Furthermore, a theoretical result is also explored that bridge the gap between the proposed optimization objective function and existing information theory (relative entropy) and optimal control dualities. Index Terms—Stochastic systems, optimal control, trajectory optimization, robust control, maximum likelihood, robust expectation maximization I. I NTRODUCTION Model-based trajectory optimization offers a general method of planning, and therefore has been utilized to generate/reproduce a wide range of behaviours; see e.g., [1], [2], [3]. However, such methods does not directly handle the partially observed environments. Research study conducted by [4] and [5] handled the latency in states fairly well over a 2D task; however these proposed paradigms have not been tested on more complicated tasks. This paper delves into empirical study of the expectation-maximization-based stochastic control approach widely evaluated on complicated robotic simulation framework assigned to carry out complex tasks. The new modified optimization approach leverages the fundamentals of dynamic programming and the newly formulated optimization routine has the same functional structure that of the likelihood. As a consequence of this, all of the theoretical results presented in the research studies of [4] can be leveraged into this newly proposed optimization procedure. The modified objective function is experimented on two complex tasks involving a PR2 similar robotic simulation platform i.e., MUJOCO [6]; details of which will be described later in the chapter. The contributions of this research can be summarized as follows, with references to relevant works: • The research methods developed in [4], [5] propose a sophisticated approach to address trajectory optimization, particularly in the presence of measurement noise. While Expectation- Maximization (EM) methods are effective in handling measurement noise, the simplicity and computational efficiency of iLQG [1] make it highly appealing for practical and industrial Prakash Mallick is with the Australian Institute of Machine Learning (AIML) affiliated to University of Adelaide and Zhiyong Chen is with the School of Engineering, University of Newcastle, Callaghan, NSW 2308, Australia and Emails: prakash.mallick@adelaide.edu.au, zhiyong.chen@newcastle.edu.au applications. Therefore, the subsequent sections of this chapter aim to integrate iLQG and EM-based stochastic optimal control (SOC) into a unified framework, which is evaluated on complex tasks. • In order to introduce a novel dynamic programming-based optimization for locally optimal controller design, the optimization objective function has been modified. Building on the approach in [7], the locally optimal solutions of the newly proposed objective function guide the iLQG control design routine. The new policy is constrained by previous policies, and significant results are presented in the simulation experiments. • Moreover, inspired by the research connection between information theory and optimal control dualities, particularly the work in [8], this study leverages these connections, with a focus on free energy [9]. The developed model can be interpreted as a special case of information theory (relative entropy) and optimal control dualities. • Theoretical foundations establish the uniqueness characteristic of the maximizer of the likelihood function based on dynamic programming. This provides a practical and viable approach to achieve a lower-dimensional approximation in each iteration. Additionally, it is demonstrated that this new optimization technique effectively explores the state space, which is characterized by high uncertainty in the control actions of the robotic joints of the manipulator. Furthermore, numerical evidence showcases improved state trajectories with reduced stochasticity and better reduction in the cumulative cost-to-go. The paper is organised in the following manner: Section II elucidates fundamental definitions of Kullback-Leibler divergence, relative entropy and free energy in a manner pertinent to the context of optimal control. Then, section II delineates the underlying mathematical problem statement, provides an explanation of the procedure of the solution. This is followed by Section IV, which demonstrates the new DP optimization and a few theoretical results which is new in accordance to the new objective function. Then, Section V of this manuscript focusses on providing an information theoretic view of the EM-based stochastic optimal control approach. II. P RELIMINARIES , P ROBLEM S TATEMENT AND S OLUTION P ROCEDURE In this section, the dynamic model being investigated, the problem formulation, and the proposed solvability procedure are presented. Additionally, the mathematical notations involved in addressing the problem discussed in this paper are elaborated upon. For a summary of the symbols used, readers may refer to Table I. A. Preliminaries In this section, we briefly review the key concepts underlying the fundamental duality relationships between free energy and relative entropy [10]. Definition 1 presents the concept of “free energy”," 2312.14479v1,"Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors Aishwarya Upadhyay, Vijay Laxmi, Smita Naval Department of Computer Science and Engineering Malaviya Naional Institue of Technology Jaipur Email: 2022rcp9026@mnit.ac.in, vlaxmi@mnit.ac.in, smita.cse@mnit.ac.in Abstract—As technology continues to advance and we usher in the era of Industry 5.0, there has been a profound paradigm shift in operating systems, file systems, web, and network applications. The conventional utilization of multiprocessing and multicore systems has made concurrent programming increasingly pervasive. However, this transformation has brought about a new set of issues known as concurrency bugs, which, due to their wide prevalence in concurrent programs, have led to severe failures and potential security exploits. Over the past two decades, numerous researchers have dedicated their efforts to unveiling, detecting, mitigating, and preventing these bugs, with the last decade witnessing a surge in research within this domain. Among the spectrum of concurrency bugs, data races or race condition vulnerabilities stand out as the most prevalent, accounting for a staggering 80% of all concurrency bugs. This survey paper is focused on the realm of race condition bug detectors. We systematically categorize these detectors based on the diverse methodologies they employ. Additionally, we delve into the techniques and algorithms associated with race detection, tracing the evolution of this field over time. Furthermore, we shed light on the application of fuzzing techniques in the detection of race condition vulnerabilities. By reviewing these detectors and their static analyses, we draw conclusions and outline potential future research directions, including enhancing accuracy, performance, applicability, and comprehensiveness in race condition vulnerability detection. Keywords: Race condition, Vulnerability detection, Concurrent programming, Synchronization, Shared resources, Software security, Multi-threading I. I NTRODUCTION The current era witnessed the emergence of Industry 5.0, also known as the Fifth Industrial Revolution, characterized by the collaboration between humans and advanced technology. This industrial paradigm shift involves the integration of humans and AI-powered machines, such as robots, to enhance workplace processes[1]. As a result, industries like textiles, agriculture, healthcare, and transportation are leveraging information and communication technology to drive efficiency[2]. Therefore, in the contemporary era of multicore processors, harnessing concurrency has become a key driver for enhancing the performance of system software. As OS kernels and file systems evolve, an array of programming paradigms, including asynchronous work queues, read-copyupdate (RCU), and optimistic locking, have been introduced to leverage multi-core computing capabilities [3][4][5][6]. However, these performance enhancements have not come without a cost. Concurrency bugs, particularly race conditions, have infiltrated the codebase, significantly compromising the reliability and security of file systems. These bugs can lead to deadlock situations, kernel panics, data inconsistencies, and privilege escalations [7][8][9][10][11][12][13][14]. Despite ongoing efforts to harden OS kernels against various attacks, such as kASLR, kCFI, and UniSan, these defenses primarily address memory errors (e.g., stack and buffer overflows) and have limited effectiveness in mitigating attacks that exploit concurrency bugs. Race conditions, in particular, represent a challenging class of concurrency bugs, wherein two threads erroneously access a shared memory location without proper synchronization or ordering, as depicted in Figure 1. Due to the inherent non-determinism in thread interleaving, race conditions are notoriously elusive, demanding precise timing and rare interleaving conditions to manifest. For instance, even widely used file systems like ext4[14] and btrfs[12], with 50,000 and 130,000 lines of code respectively, witnessed an alarming number of reported bugs in a single year[15]. According to the Linux kernel bug tracker, there are currently 1,234 open bugs in Linux kernel 5.15.0. Of these, 627 are classified as critical, 307 are classified as serious, and 300 are classified as moderate.[16]. In extreme cases, the Fig. 1. A simple depiction of data race condition failure to protect the system from concurrency vulnerability has led to a fatality. The Therac-25, a radiation therapy machine developed by Atomic Energy of Canada Limited (AECL), serves as a striking example of a significant threat posed by concurrent programming errors, commonly known as race conditions. Tragically, these errors occasionally led to patients receiving radiation doses hundreds of times higher than intended, resulting in fatalities or severe injuries[17]." 2312.14492v1,"Context Enhanced Transformer for Single Image Object Detection Seungjun An * 1 , Seonghoon Park * 1 , Gyeongnyeon Kim * 1 , Jeongyeol Baek 2 , Byeongwon Lee 2 , Seungryong Kim 1 1 Introduction Object detection is one of the fundamental and essential tasks in the computer vision field with its extensive versatility across a wide range of applications. Moreover, various applications in real-world scenarios, including video surveillance (Nascimento and Marques 2006; Fu et al. 2019), autonomous driving (Chen et al. 2015, 2016), and robot navigation (Hernández et al. 2016), heavily rely on video data. Despite the remarkable success of object detectors for a single image, directly applying them to video data encounters challenges due to appearance deterioration caused by motions and occlusions. To address this challenge, video object detection (VOD) models (Zhu et al. 2017a; Wang et al. 2018) have been proposed to improve object detection performance by leveraging temporal information. Previous approaches usually * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Current image Image CNN Backbone Encoder Transformer Encoder Memory Encoder Transformer CNN Backbone Queries Transformer Queries CNN Backbone Queries With the increasing importance of video data in real-world applications, there is a rising need for efficient object detection methods that utilize temporal information. While existing video object detection (VOD) techniques employ various strategies to address this challenge, they typically depend on locally adjacent frames or randomly sampled images within a clip. Although recent Transformer-based VOD methods have shown promising results, their reliance on multiple inputs and additional network complexity to incorporate temporal information limits their practical applicability. In this paper, we propose a novel approach to single image object detection, called Context Enhanced TRansformer (CETR), by incorporating temporal context into DETR using a newly designed memory module. To efficiently store temporal information, we construct a class-wise memory that collects contextual information across data. Additionally, we present a classification-based sampling technique to selectively utilize the relevant memory for the current image. In the testing, We introduce a test-time memory adaptation method that updates individual memory functions by considering the test distribution. Experiments with CityCam and ImageNet VID datasets exhibit the efficiency of the framework on various video systems. The project page and code will be made available at: https://ku-cvlab.github.io/CETR. Reference images Image Abstract … Korea University, Seoul, Korea 2 SK Telecom, Seoul, Korea {dkstmdwns, seong0905, kkn9975}@korea.ac.kr, {jeongyeol.baek, bwon.lee}@sk.com, seungryong kim@korea.ac.kr Transformer Decoder Transformer Decoder Transformer Temporal Transformer Decoder FFN FFN FFN Box & Class Box & Class Box & Class (a) Standard DETR (b) DETR-based VOD (c) Ours Figure 1: Comparisons between existing works and ours. (a) standard DETR (Carion et al. 2020), (b) DETR-based video object detection (Zhou et al. 2022), and (c) our proposed framework, dubbed CETR. Our method effectively detects objects in video data without adding heavy components. aggregate features from nearby frames exploiting optical flow (Zhu et al. 2017a; Wang et al. 2018) or LSTM (Kang et al. 2017a,b). Nevertheless, these methods primarily focus on short-term frames, thus limiting their ability to capture a more extensive feature representation. To overcome this limitation, attention-based approaches (Chen et al. 2020; Deng et al. 2019a,b) attempt to capture long-range temporal dependency by utilizing memory structures to aggregate features globally or locally. Yet, they depend on randomly sampled images within a clip, which struggle to integrate holistic contextual information from video data. Furthermore, the construction of stacked memory modules to store features of adjacent frames incurs high computational costs and unnecessary memory usage. On the other hand, in light of the remarkable performance of Transformer-based models in image object detection (Carion et al. 2020; Liu et al. 2022), e.g., detection with Transformers (DETR), researchers have commenced extending them to the video domain (Zhou et al. 2022; Wang et al. 2022a). However, these methods exhibit an essential reliance on auxiliary networks and the need for multiple sequential frames, as shown in Fig. 1. Such prerequisites lead" 2312.14496v1,"First Author et al.: Title Digital twin-assisted three-dimensional electrical capacitance tomography for multiphase flow imaging Shengnan Wang, Yi Li, Zhou Chen, Student Member, IEEE, and Yunjie Yang, Member, IEEE Abstract—Three-dimensional electrical capacitance tomography (3D-ECT) has shown promise for visualizing industrial multiphase flows. However, existing 3D-ECT approaches suffer from limited imaging resolution and lack assessment metrics, hampering their effectiveness in quantitative multiphase flow imaging. This paper presents a digital twin (DT)-assisted 3D-ECT, aiming to overcome these limitations and enhance our understanding of multiphase flow dynamics. The DT framework incorporates a 3D fluid-electrostatic field coupling model (3D-FECM) that digitally represents the physical 3D-ECT system, which enables us to simulate real multiphase flows and generate a comprehensive virtual multiphase flow 3D imaging dataset. Additionally, the framework includes a deep neural network named 3D deep back projection (3D-DBP), which learns multiphase flow features from the virtual dataset and enables more accurate 3D flow imaging in the real world. The DT-assisted 3D-ECT was validated through virtual and physical experiments, demonstrating superior image quality, noise robustness and computational efficiency compared to conventional 3D-ECT approaches. This research contributes to developing accurate and reliable 3D-ECT techniques and their implementation in multiphase flow systems across various industries. Index Terms—Three-dimensional electrical capacitance tomography (3D-ECT), multiphase flow, digital twin (DT), field coupling model, machine learning. M I. I NTRODUCTION U LTIPHASE flows serve a pivotal role in many industrial processes such as renewable energy, oil and gas, chemical and petrochemical sectors, pharmaceutical industry, food and beverage industry, and mining and mineral processing This work was supported in part by the National Natural Science Foundation of China under Grant 51906209 and European Union’s Horizon 2020 Research and Innovation Programme under the Marie Sklodowska-Curie actions COFUND Transnational Research and Innovation Network at Edinburgh under Grant 801215. Shengnan Wang is with the College of Metrology and Measurement Engineering, China Jiliang University, Zhejiang 310018, China. (e-mail: 691656937@qq.com). Yi Li is with the Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China (e-mail: liyi@sz.tsinghua.edu.cn). Zhou Chen and Yunjie Yang are with the SMART Group, Institute for Digital Communications, School of Engineering, The University of Edinburgh, Edinburgh EH9 3FG, U.K. (e-mail: y.yang@ed.ac.uk). [1]. The accurate visualization and characterization of these flows are crucial for process optimization, safety and efficiency [2], [3]. Electrical capacitance tomography (ECT) is a promising non-invasive technique for imaging industrial multiphase flows [4]. Traditional two-dimensional (2D) ECT, while providing valuable insights, misses information in the vertical dimension, limiting our comprehension of flow dynamics in complex three-dimensional (3D) environments [5]. Recent research has been shifting focus towards advancing 3D electrical capacitance tomography (3D-ECT) [6-9]. By incorporating real-time and 3D imaging capabilities, 3D-ECT provides a more detailed and comprehensive assessment of flow dynamics, phase distribution, and flow patterns [10]. These advancements hold great promise for enhancing process understanding and ensuring the efficient and safe functioning of multiphase flow systems across various industries. However, quantitatively imaging multiphase flows using existing 3D-ECT approaches faces challenges due to the ill-posed nature of the inverse problem and the complex features of multiphase flows [10], [11]. To address these challenges, it is crucial to 1) develop robust and efficient inversion algorithms tailored to 3D-ECT-based multiphase flow imaging, and 2) assess the image quality against true 3D flow profiles, rather than simplified static phantoms. Traditional iterative methods, such as Landweber iteration (LI) [12] and Total Variation (TV) [13], have been employed for 3D image reconstruction in electrical tomography (ET). However, these methods often require significant computational time, thus unsuitable for real-time applications. Deep learning (DL) provides potential solutions for the nonlinear 3D-ECT inverse problem, which can possibly achieve high-precision and real-time performance. Several networks including convolutional neural network (CNN) [14] and graph convolutional network (GCN) [6], have been explored for high-quality 3D image reconstruction in ET. However, these networks heavily rely on static phantom data and struggle to transfer to realistic multiphase flow imaging scenarios that involve dynamic flow behaviours. Furthermore, the evaluation of the accuracy and reliability of 3D-ECT for multiphase flow imaging is challenging due to the absence of ground truth data. Recently, we proposed a virtual evaluation platform for 2D electrical tomography, allowing for the quantitative assessment of 2D image reconstruction algorithms in dynamic multiphase flows [15]. We also reported a DT framework for 2D ECT," 2312.14499v1,"Hutchinson Trace Estimation for High-Dimensional and High-Order Physics-Informed Neural Networks Zheyuan Hu * † Zekun Shi * † George Em Karniadakis ‡ § Kenji Kawaguchi † Abstract Physics-Informed Neural Networks (PINNs) have proven effective in solving partial differential equations (PDEs), especially when some data are available by blending seamlessly data and physics. However, extending PINNs to high-dimensional and even high-order PDEs encounters significant challenges due to the computational cost associated with automatic differentiation in the residual loss function calculation. Herein, we address the limitations of PINNs in handling high-dimensional and high-order PDEs by introducing the Hutchinson Trace Estimation (HTE) method. Starting with the second-order high-dimensional PDEs, which are ubiquitous in scientific computing, HTE is applied to transform the calculation of the entire Hessian matrix into a Hessian vector product (HVP). This approach not only alleviates the computational bottleneck via Taylor-mode automatic differentiation but also significantly reduces memory consumption from the Hessian matrix to an HVP’s scalar output. We further showcase HTE’s convergence to the original PINN loss and its unbiased behavior under specific conditions. Comparisons with the Stochastic Dimension Gradient Descent (SDGD) highlight the distinct advantages of HTE, particularly in scenarios with significant variability and variance among dimensions. We further extend the application of HTE to higherorder and higher-dimensional PDEs, specifically addressing the biharmonic equation. By employing tensor-vector products (TVP), HTE efficiently computes the colossal tensor associated with the fourth-order high-dimensional biharmonic equation, saving memory and enabling rapid computation. The effectiveness of HTE is illustrated through experimental setups, demonstrating comparable convergence rates with SDGD under memory and speed constraints. Additionally, HTE proves valuable in accelerating the Gradient-Enhanced PINN (gPINN) version as well as the Biharmonic equation. Overall, HTE opens up a new capability in scientific machine learning for tackling high-order and high-dimensional PDEs. 1 Introduction Physics-Informed Neural Networks (PINNs) [44] have made significant strides in solving partial differential equation (PDE) problems in scientific computing, particularly for low-dimensional equations. This is attributed to their powerful fitting capability [34], generalization [36], and stability in optimization [37]. However, despite the demonstrated capacity of neural networks in modeling high-dimensional data in image and text domains, PINNs’ exploration of high-dimensional and high-order PDEs has been relatively limited. The primary challenge arises from the enormous computational cost involved in the automatic differentiation process of calculating the residual loss function steps for high-dimensional and high-order PDEs under the PINNs framework. Solving problems related to high-dimensional PDEs is crucial, considering the curse-of-dimensionality, which is prevalent in various fields such as the Black-Scholes equation in mathematical finance for option pricing, the Hamilton- Jacobi-Bellman (HJB) equation in optimal control, and the Schrödinger equation in quantum physics. Despite the availability of specialized high-dimensional PDE solvers for different domains, such as DeepBSDE [16] and Deep Splitting Method [1] for high-dimensional parabolic equations and specific algorithms for the Hamilton-Jacobi equation [13, 14], a unified and effective approach for solving general high-dimensional PDEs is lacking. PINNs is a versatile method capable of handling arbitrary PDEs and being mesh-free, in principle it is not susceptible to the curse-of-dimensionality. Despite recent efforts to use PINNs for solving high-dimensional PDEs, such as Stochastic Dimension Gradient Descent (SDGD) [22] and random smoothing [18, 23], these approaches have their limitations. SDGD attempts to reduce each stochastic gradient’s computational cost and memory consumption by sampling dimensions. However, when significant variability and variance among dimensions exist, SDGD’s stochastic gradients may suffer from substantial variance, hindering convergence. As for random smoothing methods, they smooth the original neural network with Gaussian noise, impacting the network’s expressive power and making it less effective in handling non-smooth PDE solutions. * Equal Contribution † Department of Computer Science, National University of Singapore, Singapore, 119077 (e0792494@u.nus.edu,kenji@nus.edu.sg) ‡ Division of Applied Mathematics, Brown University, Providence, RI 02912, USA (george karniadakis@brown.edu) § Advanced Computing, Mathematics and Data Division, Pacific Northwest National Laboratory, Richland, WA, United States 1" 2312.14506v1,"Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited ∗ Ran Cohen † Pouyan Forghani ‡ Juan Garay ‡ Rutvik Patel ‡ Vassilis Zikas § Abstract It is well known that without randomization, Byzantine agreement (BA) requires a linear number of rounds in the synchronous setting, while it is flat out impossible in the asynchronous setting. The primitive which allows to bypass the above limitation is known as oblivious common coin (OCC). It allows parties to agree with constant probability on a random coin, where agreement is oblivious, i.e., players are not aware whether or not agreement has been achieved. The starting point of our work is the observation that no known protocol exists for information-theoretic multi-valued OCC—i.e., OCC where the coin might take a value from a domain of cardinality larger than 2—with optimal resiliency in the asynchronous setting (with eventual message delivery). This apparent hole in the literature is particularly problematic, as multi-valued OCC is implicitly or explicitly used in several constructions. (In fact, it is often falsely attributed to the asynchronous BA result by Canetti and Rabin [STOC ’93], which, however, only achieves binary OCC and does not translate to a multi-valued OCC protocol.) In this paper, we present the first information-theoretic multi-valued OCC protocol in the asynchronous setting with optimal resiliency, i.e., tolerating t < n/3 corruptions, thereby filling this important gap. Further, our protocol efficiently implements OCC with an exponentialsize domain, a property which is not even achieved by known constructions in the simpler, synchronous setting. We then turn to the problem of round-preserving parallel composition of asynchronous BA. A protocol for this task was proposed by Ben-Or and El-Yaniv [Distributed Computing ’03]. Their construction, however, is flawed in several ways: For starters, it relies on multi-valued OCC instantiated by Canetti and Rabin’s result (which, as mentioned above, only provides binary OCC). This shortcoming can be repaired by plugging in our above multi-valued OCC construction. However, as we show, even with this fix it remains unclear whether the protocol of Ben-Or and El-Yaniv achieves its goal of expected-constant-round parallel asynchronous BA, as the proof is incorrect. Thus, as a second contribution, we provide a simpler, more modular protocol for the above task. Finally, and as a contribution of independent interest, we provide proofs in Canetti’s Universal Composability framework; this makes our work the first one offering composability guarantees, which are important as BA is a core building block of secure multiparty computation protocols. ∗ This is the full version of a paper that appeared at TCC 2023. The proceedings version is available at https: //doi.org/10.1007/978-3-031-48624-1_16. † Efi Arazi School of Computer Science, Reichman University. E-mail: cohenran@runi.ac.il. ‡ Department of Computer Science and Engineering, Texas A&M University. E-mail: {pouyan.forghani,garay, rsp7}@tamu.edu. § Department of Computer Science, Purdue University. E-mail: vzikas@cs.purdue.edu." 2312.14516v1,"Non-classicality of Primordial Gravitational Waves in Three-mode Representation Through Quantum Poincare Sphere Anom Trenggana ∗1 and Freddy P. Zen †1,2 1 Theoretical Physics Laboratory, THEPi (Theoretical High Energy Physics) Division, Faculty of Mathematics and Natural Sciences, Institut Teknologi Bandung, Bandung 40132, West Java, Indonesia 2 Indonesian Center for Theoritecal and Mathematical Physics (ICTMP), Institut Teknologi Bandung, Bandung 40132, West Java, Indonesia (December 25, 2023) Abstract In this research, we generalize the transformation of the vacuum state that generated gravitational waves in the early universe which is usually transformed using a two-mode into a three-mode Bogoliubov transformation. Based on the calculation of quantum discord this transformation allows the universe to be classical when the squeezed parameter is large if only of the three possible modes, only two are considered. We also studied the quantum characteristics of those gravitational waves by calculating an observable quantity named the quantum Poincare sphere. The result will be the same as the two-mode transformation, where quantum characteristics appear if the squeezed parameter is greater than zero. However, if the initial state is coherent, different results will be obtained, the quantum Poincare sphere will not depend on the squeezed parameter and will be non-classical if cos θ or sin θ is not zero. Keywords— Primordial Gravitational Waves, Quantum Discord and Poincare Sphere ∗ † Electronic address: gstagunganom@gmail.com Electronic address: fpzen@fi.itb.ac.id 1" 2312.14542v1,"Automatic Data Retrieval for Cross Lingual Summarization Nikhilesh Bhatnagar 1* Ashok Urlana 2* Vandan Mujadia 1 Pruthwik Mishra 1 Dipti Misra Sharma 1 IIIT Hyderabad 1 TCS Research, Hyderabad, India 2 tingc9@gmail.com, ashok.urlana@tcs.com, vandan.mu@research.iiit.ac.in pruthwik.mishra@research.iiit.ac.in, dipti.m@iiit.ac.in Abstract Cross-lingual summarization involves the summarization of text written in one language to a different one. There is a body of research addressing cross-lingual summarization from English to other European languages. In this work, we aim to perform cross-lingual summarization from English to Hindi. We propose pairing up the coverage of newsworthy events in textual and video format can prove to be helpful for data acquisition for cross lingual summarization. We analyze the data and propose methods to match articles to video descriptions that serve as document and summary pairs. We also outline filtering methods over reasonable thresholds to ensure the correctness of the summaries. Further, we make available 28,583 mono and cross-lingual article-summary pairs * . We also build and analyze multiple baselines on the collected data and report error analysis. 1 Introduction In the field of Natural Language Processing (NLP), advancements in human language understanding and processing have often required extensive data. Cross-lingual summarization, a recent focus in NLP, has seen the emergence of well-known datasets like CrossSumm (Bhattacharjee et al., 2023) and PMIndiaSum (Urlana et al., 2023). In the context of Indian languages, recent datasets such as XL-Sum (Hasan et al., 2021), MassiveSumm (Varab and Schluter, 2021), and PMIndiaSum (Urlana et al., 2023) promote research in lowresource language setting. Generating human-annotated datasets is a laborintensive and costly endeavor (Urlana et al., 2022b). To address the scarcity of resources for lowresource languages, some efforts involve scraping news websites and use source document prefixes or headlines as summaries. However, this approach * Equal Contribution https://github.com/tingc9/ Cross-Sum-News-Aligned * Unfiltered pairs * Article Summary Deduplication Unigram Overlap * Cosine Similarity * Filtered pairs En-En En-Hi Hi-Hi 80868 78183 49116 25898 6340 6340 210056 204975 133538 33054 7892 7892 276599 274342 148421 68025 14351 14351 Table 1: Data filtering and statistics has two main shortcomings: 1) It often lacks diversity in information since all article-summary pairs originate from a single domain, and 2) Many source documents lack comprehensive coverage of specific events or incidents. In this work, we present the data collection and alignment approach aimed at enhancing both mono and cross-lingual summarization for Indian languages. Our core hypothesis is that news events can serve as a basis for aligning diverse sources of coverage in the context of summarization. Specifically, we concentrate on textual summarization and propose that by pairing up YouTube descriptions with corresponding news article coverage of different events from a multitude of sources, we can create a substantial summarization dataset comprising of 28,583 pairs. We have experimented with state-of-the-art multilingual summarization models and performed error analysis to assess the effectiveness of the pretrained models for both mono and cross-lingual summarization. In the subsequent sections, we outline related work, our data collection methodology, the process of matching summarization pairs, and the subsequent filtering to derive the final dataset for our work in 1. Furthermore, we describe the training of various baseline models using the collected data and present our research findings." 2312.14552v1,"Machine learning for structure-guided materials and process design Lukas Morand* 1 , Tarek Iraki 2,3 , Johannes Dornheim 3,4 , Stefan Sandfeld 2 , Norbert Link 3 , and Dirk Helm 1 1 Fraunhofer Institute for Mechanics of Materials IWM, Freiburg, Germany 2 Institute for Advanced Simulations - Materials Data Science and Informatics (IAS-9), Forschungszentrum Jülich GmbH, 52425, Jülich, Germany 3 Intelligent Systems Research Group ISRG, University of Applied Sciences, Karlsruhe, Germany 4 Institute for Applied Materials - Computational Materials Sciences IAM-CMS, Karlsruhe Institute of Technology, Karlsruhe, Germany * corresponding author, email: lukas.morand@iwm.fraunhofer.de December 25, 2023 Abstract In recent years, there has been a growing interest in accelerated materials innovation in both, research and industry. However, to truly add value to the development of new advanced materials, it is inevitable to take into account manufacturing processes and thereby tailor materials design approaches to support downstream process design approaches. As a major step into this direction, we present a holistic optimization approach that covers the entire materials process-structure-property chain. Our approach specifically employs machine learning techniques to address two critical identification problems. The first is to solve a materials design problem, which involves identifying near-optimal material structures that exhibit desired macroscopic properties. The second is to solve a process design problem that is to find an optimal processing path to manufacture these material structures. Both identification problems are typically ill-posed, which presents a significant challenge for solution approaches. However, the non-unique nature of these problems also offers an important advantage for processing: By having several target structures that perform similarly well, the corresponding processes can be efficiently guided towards manufacturing the best reachable structure. In particular, we apply deep reinforcement learning for process design in combination with a multi-task learningbased optimization approach for materials design. The functionality of 1" 2312.14591v1,"Preprint R EASONS TO R EJECT ? A LIGNING L ANGUAGE M ODELS WITH J UDGMENTS Weiwen Xu ♡♠∗ Deng Cai ♡† Zhisong Zhang ♡ Wai Lam ♠ Tencent AI Lab ♠ The Chinese University of Hong Kong {wwxu,wlam}@se.cuhk.edu.hk {jcykcai,zhisonzhang,shumingshi}@tencent.com Shuming Shi ♡ ♡ A BSTRACT As humans, we consistently engage in interactions with our peers and receive feedback in the form of natural language. This language feedback allows us to reflect on our actions, maintain appropriate behavior, and rectify our errors. The question arises naturally: can we use language feedback to align large language models (LLMs)? In contrast to previous research that aligns LLMs with reward or preference data, we present the first systematic exploration of alignment through the lens of language feedback (i.e., judgment). We commence with an in-depth investigation of potential methods that can be adapted for aligning LLMs with judgments, revealing that these methods are unable to fully capitalize on the judgments. To facilitate more effective utilization of judgments, we propose a novel framework, Contrastive Unlikelihood Training (CUT), that allows for finegrained inappropriate content detection and correction based on judgments. Our offline alignment results show that, with merely 1317 off-the-shelf judgment data, CUT (LLaMA2-13b) can beat the 175B DaVinci003 and surpass the best baseline by 52.34 points on AlpacaEval. The online alignment results demonstrate that CUT can align LLMs (LLaMA2-chat-13b) in an iterative fashion using modelspecific judgment data, with a steady performance improvement from 81.09 to 91.36 points on AlpacaEval. Our analysis further suggests that judgments exhibit greater potential than rewards for LLM alignment and warrant future research. 1 1 I NTRODUCTION Large language models (LLMs) acquire extensive knowledge and remarkable reasoning capabilities through self-supervised pre-training on large-scale corpora (Brown et al., 2020; Du et al., 2022; Touvron et al., 2023). To unleash the power of pre-trained LLMs for addressing real-world applications, it is crucial to ensure LLMs can follow human intentions and values (Ouyang et al., 2022). This process, known as alignment, has the potential to pave the way for a future in which artificial intelligence (AI) serves as a helpful and reliable partner for humanity (Wang et al., 2023b). Figure 1 shows three typical paradigms to achieve alignment. The most straightforward one is learning from demonstrations, wherein human demonstrations of desired responses to a set of instructions are collected to fine-tune LLMs using supervised learning (Wei et al., 2022; Ouyang et al., 2022). However, the performance gains diminish rapidly when scaling up the data size (Zhou et al., 2023). On the other hand, learning from feedback offers a more scalable approach (Ouyang et al., 2022; Glaese et al., 2022; Bai et al., 2022a). One key advantage of feedback over demonstrations is that feedback can convey both positive and negative aspects, enabling the model to discern desirable and undesirable outcomes. In addition, feedback is usually tailored to the current model-generated responses, adhering to the principle of teaching according to the learner’s aptitude. Prior research on learning from feedback has been primarily focused on incorporating value feedback (i.e., scalar rewards) into the alignment process. The most widely adopted reinforcement learning (RL) ∗ Work done during an internship at Tencent AI Lab. Corresponding author. 1 Our source codes and models are publicly available at https://github.com/wwxu21/CUT † 1" 2312.14641v1,"Can we observe effects of early nonequilibrium dynamics using collective flow Piotr Bożek 1,∗ 1 AGH University of Krakow, Faculty of Physics and Applied Computer Science, aleja Mickiewicza 30, 30-059 Cracow, Poland Abstract. The rapid expansion of the fireball created in a heavy-ion collision causes strong departures from local equilibrium. Such effects are especially important in the very early phase of the collision, bringing a substantial pressure asymmetry. We investigate effects of this early stage pressure asymmetry in a kinetic model without boost-invariance. In the kinetic evolution the pressure asymmetry results from the competition of the longitudinal expansion and the kinetic relaxation. Unlike the transverse flow, the directed flow is found to be very sensitive to the equilibration rate and the pressure anisotropy. 1 Introduction One of the main goals of the experimental program in ultrarelativistic heavy-ion collisions at the BNL Relativistic Heavy Ion Collider and the CERN Large Hadron Collider is to study the properties of the quark-gluon plasma formed in the collision [1, 2]. The dense matter formed in the interaction region of an ultrarelativistic heavy-ion collision expands very fast. The equilibrium properties of the deconfined state of matter can be simulated in lattice QCD simulations. On the other hand, the strong expansion of the fireball in heavy-ion collisions generates large deviations from local thermal equilibrium. The nonequilibrium effects are important if the expansion rate dominates over the equilibration rate of the matter. Deviations from equilibrium are especially important in two instances: at the late stages, when freezeout occurs, and at the very early stages when the expansion rate is very high. At late stages the nonequilibrium dynamics can be modeled realistically using a hadronic cascade. In this paper, we study effects of nonequilibrium dynamics at the early stage. If the deviations from local equilibrium are important, the dynamics of at the very early stage cannot be reliably described using viscous hydrodynamics [3]. It is possible to address the far from equilibrium dynamics using kinetic equations. In the framework of the kinetic description, the fast longitudinal expansion in a heavy-ion collision leads to a nonisotropic momentum distribution [4]. The effective longitudinal pressure is much smaller than the transverse one. It is interesting to ask the question whether this strong deviation from equilibrium can be observed in the final collective flow observables. For collective flow observables build on the transverse momenta of the emitted particles, e.g. transverse and harmonic flow, the answer is negative. The effect of the strong pressure asymmetry on the such collective flow observables is very small [5]. On the other hand, we find that the effect of the pressure asymmetry on the direct flow is important in the kinetic dynamics [6]. ∗ e-mail: piotr.bozek@fis.agh.edu.pl" 2312.14647v1,"Pub/Sub Message Brokers for GenAI Alaa Saleh, Susanna Pirttikangas, Lauri Lovén ∗ Authors are with the Center for Ubiquitous Computing, University of Oulu, Finland. Abstract In today’s digital world, Generative Artificial Intelligence (GenAI) such as Large Language Models (LLMs) is becoming increasingly prevalent, extending its reach across diverse applications. This surge in adoption has sparked a significant increase in demand for data-centric GenAI models, highlighting the necessity for robust data communication infrastructures. Central to this need are message brokers, which serve as essential channels for data transfer within various system components. This survey aims to delve into a comprehensive analysis of traditional and modern message brokers, offering a comparative study of prevalent platforms. Our study considers numerous criteria including, but not limited to, open-source availability, integrated monitoring tools, message prioritization mechanisms, capabilities for parallel processing, reliability, distribution and clustering functionalities, authentication processes, data persistence strategies, fault tolerance, and scalability. Furthermore, we explore the intrinsic constraints that the design and operation of each message broker might impose, recognizing that these limitations are crucial in understanding their real-world applicability. We then leverage these insights to propose a sophisticated message broker framework—one designed with the adaptability and robustness necessary to meet the evolving requisites of GenAI applications. Finally, this study examines the enhancement of message broker mechanisms specifically for GenAI contexts, emphasizing the criticality of developing a versatile message broker framework. Such a framework would be poised for quick adaptation, catering to the dynamic and growing demands of GenAI in the foreseeable future. Through this dual-pronged approach, we intend to contribute a foundational compendium that can guide future innovations and infrastructural advancements in the realm of GenAI data communication. Keywords: Generative AI, Message Brokers, Publish/Subscribe Paradigm, Brokerless, MLOps, Continuous Diagnostics and Mitigation, Large Language Models. 1. Introduction of publish/subscribe (pub/sub) message broker systems, considering in particular their emerging role for seamless and scalable data exchange in GenAI applications. We scrutinize contemporary message brokers for their adaptability and efficiency in GenAI contexts, outline existing challenges, and chart promising research avenues for future development. In the burgeoning field of Generative Artificial Intelligence (GenAI), the computing continuum faces unprecedented challenges in efficiently managing data flows and computational resources. GenAI has predominantly targeted consumer applications, offering applications such as the chatGPT, based on a large language model (LLMs), a type of machine learning (ML) model with a deep neural network. However, a surge in machine-to-machine (M2M) use cases beckons a reevaluation of the supporting communication infrastructure. This survey paper delves into the role In more detail, while the focus of GenAI systems has been on consumer-oriented applications, there is an increased interest towards M2M use cases. GenAI has been proposed to be used in, for example, for networking, wireless communication, and compression [1]. As a result, current computing continuum platforms, spanning the networks and computational resources from user devices to cloud [2, 3], face new challenges. These platforms provide support AI mod- ∗ Corresponding author Email addresses: alaa.saleh@oulu.fi (Alaa Saleh), susanna.pirttikangas@oulu.fi (Susanna Pirttikangas), lauri.loven@oulu.fi (Lauri Lovén) 1" 2312.14664v1,"Density Uncertainty Quantification with NeRF-Ensembles: Impact of Data and Scene Constraints Miriam Jäger a,∗ , Steven Landgraf a , Boris Jutzi a a Institute of Photogrammetry and Remote Sensing (IPF), Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany Abstract In the fields of computer graphics, computer vision and photogrammetry, Neural Radiance Fields (NeRFs) are a major topic driving current research and development. However, the quality of NeRF-generated 3D scene reconstructions and subsequent surface reconstructions, heavily relies on the network output, particularly the density. Regarding this critical aspect, we propose to utilize NeRF-Ensembles that provide a density uncertainty estimate alongside the mean density. We demonstrate that data constraints such as low-quality images and poses lead to a degradation of the training process, increased density uncertainty and decreased predicted density. Even with high-quality input data, the density uncertainty varies based on scene constraints such as acquisition constellations, occlusions and material properties. NeRF-Ensembles not only provide a tool for quantifying the uncertainty but exhibit two promising advantages: Enhanced robustness and artifact removal. Through the utilization of NeRF-Ensembles instead of single NeRFs, small outliers are removed, yielding a smoother output with improved completeness of structures. Furthermore, applying percentile-based thresholds on density uncertainty outliers proves to be effective for the removal of large (foggy) artifacts in post-processing. We conduct our methodology on 3 different datasets: (i) synthetic benchmark dataset, (ii) real benchmark dataset, (iii) real data under realistic recording conditions and sensors. Keywords: Neural Radiance Fields, Deep Ensembles, NeRF-Ensembles, Density Uncertainty, Artifact Removal, Robustness, 3D Reconstruction 1. Introduction The groundbreaking research on Neural Radiance Fields (NeRFs) [30] initiated a new era in computer graphics. NeRFs take a sparse set of images and corresponding camera poses to predict position-dependent density and view-dependent color values, creating new views through the so-called novel-view synthesis. Furthermore, NeRFs provide opportunities in computer vision and photogrammetry by enabling 3D surface and point cloud reconstructions. However, these density-dependent reconstructions often yield noisy and incomplete surfaces [22, 41]. Unfortunately, the resulting geometry of 3D scene reconstruction depends on the network output, especially the predicted density. Since the network optimization is based on the error between training images and rendered images, the density is not controlled with respect to a ground truth information and only learned implicitly. Additionally, each neural network generally leads to a slightly different prediction, which invariably leads to different results. For this reason, the application of Deep Ensemble to approximate the predictive uncertainty is of interest. In the context of NeRFs, our investigations focus on the position-dependent density in 3D space to quantify the density uncertainty. For this purpose, we apply NeRF-Ensembles. Such NeRF-Ensembles consist of randomly initialized, independent members of individual NeRFs, providing a quantification of the density uncertainty of the network output, as well as a mean density. ∗ Corresponding author. Email address: miriam.jaeger@kit.edu (Miriam Jäger) 1" 2312.14669v1,"Macroscopic elasticity of the hat aperiodic tiling Romain Rieger a,b , Alexandre Danescu c,∗ a Université de Lyon, Lyon, VetAgro Sup, UPSP ICE 2021, A104, 1 Av. Bourgelat, Marcy l’Etoile, 69280, France b Univ. Lyon, École Centrale de Lyon, , 69134 Ecully, France 36 Av. Guy de Collongue, Ecully, 69134, France c Lyon Institute of Nanotechnologies, Université de Lyon, CNRS - UMR 5270, Ecole Centrale de Lyon, INSA Lyon, UCBL, CPE Lyon, 36 Guy de Collongue, Ecully, 69134, France Abstract In this paper, we explore the macroscopic elastic behavior of the aperiodic but hyperuniform ein stein (single tile) tiling, as recently reported in [1, 2]. The first step involves assigning mechanical properties to the geometric pattern. The simplest approach includes near-neighbor type (NN) interactions (springs) along the edges of the geometric pattern. To eliminate zero modes, we also incorporate angular interactions using the simplest quadratic approximation—the Kirkwood-Keating three-body potential. We compute the macroscopic elastic response on circular domains for various realizations across an increasing sequence of length scales. As the domain radius increases, the set average at a fixed length scale of the obtained macroscopic Hooke tensor approaches the hyperplane of two-dimensional isotropic Hooke tensors. In a closer-to-experiment scenario, we also discuss a second mechanical setting where edges of all polygons in the considered domain are treated as one-dimensional continua (straight beams). These continua are endowed with both extension/compression, shear and bending energy within the framework of the Timoshenko theory. The macroscopic response of the hat tiling aligns with that of an isotropic elastic continuum. Keywords: macroscopic elasticity, hyperunifom materials, aperiodic tiling of the plane PACS: : 46.25.-y, 62.20.de 2000 MSC: : 784B05, 74E05, 74E10 1. Introduction Answering a long-standing open question, an aperiodic tiling of the plane that use a single tile was recently discovered [1, 2]. Previous aperiodic tilings of the plane using multi-tiles already known are commonly related to quasicrystals and well understood as particular slices in higher-dimensional periodic lattices. Recent results [3] show that the hat tiling is also quasicrystalline, but posses additional symmetry properties reminiscent from the hexagonal lattice on which the tiling is build on. In order to investigate the physical properties of the hat tiling, one has to endow the tiling geometry with some minimal physical attributes. In the frame of condensedmatter physics, the most common choice [4, 5] is the vertex tight-binding model on the quasi-lattice [6], where hopping between near-neighbor vertices has equal probabilities. As the hat tiling edges form a subset of the symmetry lines of the hexagonal lattice in the plane, the spectral and transport properties obtained using the above assumption inherit some of the main features of graphene, i.e., Dirac cones and six-fold symmetry. However, the practical realization of such structures and experimental evidence of ∗ Corresponding author Email address: alexandre.danescu@ec-lyon.fr (Alexandre Danescu) Preprint submitted to Elsevier the theoretical predictions require complex phases in order to reproduce the underlying physical characteristics of the system. In contrast to condensed-matter physical models, the macroscopic mechanical properties of a planar tiling are much easier to interpret: they reflect the material response at a length-scale which is much larger than that of the particle interactions. The main theoretical tool to achive this is the homogenization theory[7, 8] and a qualitative homogenization result (existence of the macroscopic response) for functionals that depend on the Penrose tiling geometry through the shape and orientation is provided in [9]. The fact that the Penrose tiling is a quasicrystal, i.e. a two-dimensional projection of a particular slice in a R 5 -lattice is one of the main ingredients of the proof. In an attempt to extend the class of classical long-range order of lattice interactions to include locally disordered materials, Stillinger and Torquato introduced the concept of hyperuniformity [10, 11]. The definition of hyperuniformity concerns the scaling law for the variance of the number of points in a spherical observation window. Hyperuniform materials include disordered sphere packings and quasicrystals. Obviously, this purely geometric definition tacitly assumes that the physical nature of particle interactions is completely determined by the particles spatial distribution, a property that holds true in most physi- December 25, 2023" 2312.14687v1,"EAI Endorsed Transactions Preprint Research Article/Editorial Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs Ioannis Mavromatis ∗1 , Theodoros Spyridopoulos 3 , Pietro Carnelli ∗2 , Woon Hau Chin 2 , Ahmed Khalil 4 , Jennifer Chakravarty 4 , Lucia Cipolina Kun 4 , Robert J. Piechocki 4 , Colin Robbins 5 , Daniel Cunnington 5 , Leigh Chase 6 , Lamogha Chiazor 6 , Chris Preston 7 , Rahul 7 and Aftab Khan ∗2 1 Digital Catapult, London, UK 2 Bristol Research & Innovation Laboratory, Toshiba Europe Ltd., Bristol, UK 3 School of Computer Science & Informatics, Cardiff University, Cardiff, UK 4 Department of Electrical and Electronic Engineering, University of Bristol, Bristol, UK 5 Nexor Ltd., Nottingham, UK, 6 IBM Research, Winchester, UK, 7 Honda R&D Europe (UK) Ltd., Reading, UK Abstract The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolster research, testing, and evaluation of the cybersecurity of C-ITSs. We explore the design, functionality, and challenges of CSCE’s testing facilities, outlining the technological, security, and societal requirements. Through a thorough survey and analysis, we assess the effectiveness of these systems in detecting and mitigating potential threats, highlighting their flexibility to adapt to future C-ITSs. Finally, we identify current unresolved challenges in various C-ITS domains, with the aim of motivating further research into the cybersecurity of C-ITSs. Received on XXXX; accepted on XXXX; published on XXXX Keywords: C-ITS; Cybersecurity; CAV; Cybersecurity Centre of Excellence; Cybersecurity Ecosystem; Threat Detection/Mitigation Copyright © XXXX Author Name et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited. doi:10.4108/XX.X.X.XX 1. Introduction Cooperative Intelligent Transportation Systems (C-ITSs) and the Connected Autonomous Vehicles (CAVs), are expected to revolutionise the Mobility-as-a-Service (MaaS) paradigm [1]. As we move towards smarter and more sustainable cities, there will be numerous opportunities for MaaS use-cases in areas such as on-demand transportation, accessibility, and road safety [2]. However, these use cases will require specialised hardware, complex software implementations, and scalable data architectures [3]. C-ITSs integrate multiple entities for enhanced ∗ Corresponding authors: Ioannis.Mavromatis@digicatapult.org.uk, {Pietro.Carnelli, Aftab.Khan}@toshiba-bril.com transport solutions. As they grow, C-ITSs become complex System-of-Systems (SoS), where independent systems combine to achieve broader functionalities. This complexity introduces significant cybersecurity risks. The different “data surfaces”, communication interfaces, and Internet-facing entry points for such an ecosystem increase the potential vulnerabilities and attack surfaces within a C-ITS [4]. This is especially concerning as the increase in vehicle autonomy means a single attack point could have catastrophic effects on the entire C-ITSs ecosystem and the fleet of vehicles [5]. As CAV adoption increases, a robust cybersecurity assurance framework is needed to ensure safety and public trust [6]. Therefore, this paper presents the concept of a Cybersecurity Test and Evaluation Facility (CTEF) targeting C-ITSs and a CAV-enabled EAI Endorsed Transactions Preprint 1" 2312.14697v1,"This is a preprint of a published article in Journal of Electronic Imaging (JEI). (The final publication will be available soon) Pola4All: survey of polarimetric applications and an open-source toolkit to analyze polarization Joaquin Rodriguez 1 Lew-Fock-Chong Lew-Yan-Voon 1 Renato Martins 2,3 Olivier Morel 1 1 Université de Bourgogne, ImViA UR 7535 2 Université de Bourgogne, CNRS UMR 6303 ICB 3 Université de Lorraine, CNRS, Inria, LORIA Emails: {joaquin-jorge.rodriguez,lew.lew-yan-voon,renato.martins,olivier.morel}@u-bourgogne.fr Abstract cellphones based on LCD screens are typical examples. Light polarization is naturally generated when an unpolarized light source (e.g., light bulbs or the sun) hits a surface and is reflected. The polarized light generated in this way can be of two types: specular, when the reflection of the light is in a single direction; or diffuse, when the reflection is in all directions. The way the reflected wave oscillates depends on the characteristics and the shape of the material. This relationship between the observed light and the object properties is a key feature that vision algorithms can use to improve their accuracy with respect to another one that uses only texture information. These additional features can be leveraged, for instance, to improve object detection and scene segmentation results, detect mirrors and other surfaces that polarize the light, or uniquely identify places in a room that will serve as landmarks in navigation algorithms. It is worth noting that polarization cues are the main sources of information used by many biological agents such as insects and bees for their orientation in space[1]. Polarization information of the light can provide rich cues for computer vision and scene understanding tasks, such as the type of material, pose, and shape of the objects. With the advent of new and cheap polarimetric sensors, this imaging modality is becoming accessible to a wider public for solving problems such as pose estimation, 3D reconstruction, underwater navigation, and depth estimation. However, we observe several limitations regarding the usage of this sensorial modality, as well as a lack of standards and publicly available tools to analyze polarization images. Furthermore, although polarization camera manufacturers usually provide acquisition tools to interface with their cameras, they rarely include processing algorithms that make use of the polarization information. In this paper, we review recent advances in applications that involve polarization imaging, including a comprehensive survey of recent advances on polarization for vision and robotics perception tasks. We also introduce a complete software toolkit that provides common standards to communicate with and process information from most of the existing micro-grid polarization cameras on the market. The toolkit also implements several image processing algorithms for this modality, and it is publicly available on GitHub: https://github. com/vibot-lab/Pola4all_JEI_2023. Keywords: polarization, computer vision, robotics, scene understanding, division-of-focal-plane 1 The introduction of micro-grid polarization sensors, such as Sony Polarsens, boosted the research in the polarization domain since they are capable of capturing the intensity, the color and the linear polarization information in a single snapshot, and they also allow measurements outside laboratory conditions. However, the number of approaches leveraging polarization for performing computer vision and robotics tasks is, unfortunately, still quite limited. For these reasons, to promote the usage of polarization cameras in robotics and computer vision tasks, we provide in this paper a comprehensive review of the latest advances in the field of polarization imaging. The revised papers have been chosen to show the potential of this modality to improve the results given by RGB-only methods, especially in challenging Introduction The polarization of the light is present in several real-world physical phenomena. Light coming from rainbows in the sky, reflections from water on highways, and monitors and 1" 2312.14708v1,"Balancing the Style-Content Trade-Off in Sentiment Transfer Using Polarity-Aware Denoising Sourabrata Mukherjee [0000−0002−1713−2769] , Zdeněk Kasner [0000−0002−5753−5538] , and Ondřej Dušek [0000−0002−1415−1702] Charles University, Faculty of Mathematics and Physics, Institute of Formal and Applied Linguistics Prague, Czechia {mukherjee,kasner,odusek}@ufal.mff.cuni.cz Abstract. Text sentiment transfer aims to flip the sentiment polarity of a sentence (positive to negative or vice versa) while preserving its sentiment-independent content. Although current models show good results at changing the sentiment, content preservation in transferred sentences is insufficient. In this paper, we present a sentiment transfer model based on polarity-aware denoising, which accurately controls the sentiment attributes in generated text, preserving the content to a great extent and helping to balance the style-content trade-off. Our proposed model is structured around two key stages in the sentiment transfer process: better representation learning using a shared encoder and sentiment-controlled generation using separate sentiment-specific decoders. Empirical results show that our methods outperforms state-of-the-art baselines in terms of content preservation while staying competitive in terms of style transfer accuracy and fluency. Source code, data, and all other related details are available on Github. 1 Keywords: Sentiment Transfer · Text Style Transfer · Natural Language Generation 1 Introduction Text sentiment transfer is the task of changing the sentiment polarity of a text while retaining sentiment-independent semantic content (e.g., “The food was tasteless” to “The food was delicious”) [26, 20, 12, 14]. It has been introduced in the context of textual style transfer, where positive and negative sentiment are considered distinct styles [14]. Style transfer is motivated by various writing assist tasks for copywriting or personalized chatbots, e.g. changing review sentiment, debiasing or simplifying a news text, or removing offensive language [14, 25, 9]. With the success of deep learning in the last decade, a variety of neural methods have been proposed for this task [27, 9]. If parallel data are provided, standard sequence-tosequence models can be directly applied [23]. However, due to lack of parallel corpora (paired sentences with opposite sentiment and otherwise identical content), learning sentiment transfer – and text style transfer in general – from unpaired data represents a substantial research challenge. 1 https://github.com/SOURO/polarity-denoising-sentiment-transfer" 2312.14713v1,"Inverse Transfer Multiobjective Optimization JIAO LIU, School of Computer Science and Engineering, Nanyang Technological University, Singapore AHBISHEK GUPTA, School of Mechanical Sciences, Indian Institute of Technology, Goa, India YEW-SOON ONG, School of Computer Science and Engineering, Nanyang Technological University, Singapore Transfer optimization enables data-efficient optimization of a target task by leveraging experiential priors from related source tasks. This is especially useful in multiobjective optimization settings where a set of trade-off solutions is sought under tight evaluation budgets. In this paper, we introduce a novel concept of inverse transfer in multiobjective optimization. Inverse transfer stands out by employing probabilistic inverse models to map performance vectors in the objective space to population search distributions in task-specific decision space, facilitating knowledge transfer through objective space unification. Building upon this idea, we introduce the first Inverse Transfer Evolutionary Multiobjective Optimizer (invTrEMO). A key highlight of invTrEMO is its ability to harness the common objective functions prevalent in many application areas, even when decision spaces do not precisely align between tasks. This allows invTrEMO to uniquely and effectively utilize information from heterogeneous source tasks as well. Furthermore, invTrEMO yields high-precision inverse models as a significant byproduct, enabling the generation of tailored solutions on-demand based on user preferences. Empirical studies on multi- and many-objective benchmark problems, as well as a practical case study, showcase the faster convergence rate and modelling accuracy of the invTrEMO relative to stateof-the-art evolutionary and Bayesian optimization algorithms. The source code of the invTrEMO is made available at https://github.com/LiuJ-2023/invTrEMO. Additional Key Words and Phrases: Inverse transfer, multiobjective optimization, evolutionary algorithms, Gaussian processes ACM Reference Format: Jiao Liu, Ahbishek Gupta, and Yew-Soon Ong. 2018. Inverse Transfer Multiobjective Optimization. J. ACM 37, 4, Article 111 (August 2018), 31 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION A plethora of optimization problems in the real-world, from engineering design [Osyczka 1978] and manufacturing operations [Li et al. 2018] to finance [Wang et al. 2022] or even scientific discovery [MacLeod et al. 2022], often seek to minimize/maximize a set of conflicting objectives. These are known as multiobjective optimization problems (MOPs) [Branke 2008]. Typically, there is no single solution that minimizes/maximizes all of the objectives in an MOP [Deb 2011; Ehrgott 2005]. Therefore, the goal is to find a representative set of optimized solutions—referred to as nondominated or Pareto optimal solutions—that map to the Pareto front (PF) of best achievable performance trade-offs in the objective space. Evolutionary algorithms (EAs), by virtue of the Authors’ addresses: Jiao Liu, School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore, Singapore, jiao.liu@ntu.edu.sg; Ahbishek Gupta, School of Mechanical Sciences, Indian Institute of Technology, Goa, Goa Engineering College Campus, Farmagudi, Ponda, Goa, India, abhishekgupta@iitgoa.ac.in; Yew-Soon Ong, School of Computer Science and Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore, Singapore, asyong@ntu.edu.sg. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. 0004-5411/2018/8-ART111 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 37, No. 4, Article 111. Publication date: August 2018. 111" 2312.14731v1,"Analytic Approximation of Free-Space Path Loss for Implanted Antennas MINGXIANG GAO 1 , SUJITH RAMAN 1,3 (Senior Member, IEEE), ZVONIMIR SIPUS 2 (Senior Member, IEEE), AND ANJA K. SKRIVERVIK 1 1 Microwaves and Antennas Group, Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland 2 Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia 3 Radio Systems Group, University of Twente, Enschede, Netherlands CORRESPONDING AUTHOR: ANJA K. SKRIVERVIK ABSTRACT Implantable wireless bioelectronic devices enable communication and/or power transfer through RF wireless connections with external nodes. These devices encounter notable design challenges due to the lossy nature of the host body, which significantly diminishes the radiation efficiency of the implanted antenna and tightens the wireless link budget. Prior research has yielded closed-form approximate expressions for estimating losses occurring within the lossy host body, known as the in-body path loss. To assess the total path loss between the implanted transmitter and external receiver, this paper focuses on the free-space path loss of the implanted antenna, from the body–air interface to the external node. This is not trivial, as in addition to the inherent radial spreading of spherical electromagnetic waves common to all antennas, implanted antennas confront additional losses arising from electromagnetic scattering at the interface between the host body and air. Employing analytical modeling, we propose closed-form approximate expressions for estimating this free-space path loss. The approximation is formulated as a function of the free-space distance, the curvature radius of the body–air interface, and the permittivity of the lossy medium. This proposed method undergoes thorough validation through numerical calculations, simulations, and measurements for different implanted antenna scenarios. This study contributes to a comprehensive understanding of the path loss in implanted antennas and provides a reliable analytical framework for their efficient design and performance evaluation. INDEX TERMS Implanted antennas, analytical modeling, path loss, body–air interface, lossy medium. I. INTRODUCTION Implantable bioelectronics have undergone rapid development since the inception of the first artificial cardiac pacemaker was implanted in 1958 [1], allowing for direct interfacing with biological tissues and organs. Today, implantable bioelectronics are widely used in monitoring and treating a range of medical conditions, including heart disease, neurological disorders, hearing impairment, etc [2], [3]. These devices are minimally invasive, customizable to individual patients, and offer the potential for prolonged monitoring and treatment. Given these characteristics, the long-term stability and sustainability of implantable bioelectronics require efficient wireless communication and power supply [4], [5], [6], [7]. Consequently, understanding the loss mechanisms and evaluating the path loss of implanted antennas becomes critical for achieving optimal wireless links. Despite the widespread adoption of wireless systems due to advancements in radio frequency (RF) technology, establishing wireless connections for implantable devices remains a formidable challenge. The primary obstacle lies in the significant electromagnetic absorption and losses caused VOLUME XX, XXXX by highly lossy biological tissues [8], [9], [10]. In the context of implanted antennas, electromagnetic radiation cannot be separated from the surrounding medium and is strongly affected by near-field coupling, propagation attenuation, and interaction with the body interfaces [11], [12]. Additionally, the miniaturized dimensions of implantable bioelectronics impose further constraints on the radiation performance of implanted antennas [13]. For a transmitter and a receiver in free space, the Friis transmission equation is commonly used to estimate wireless transmission efficiency, i.e., the free-space path loss formula, combined with the gains of the antennas [14], [15]. This approach quantitatively assesses losses or gains from various factors, providing crucial guidance in the initial phases of wireless system design. However, when dealing with an implantable wireless system that includes an implanted antenna and an external antenna, quick path loss estimates must account for the effects of the lossy host body. Ideally, with the gain of the implanted antenna available, the Friis formula could still be employed for transmission efficiency estimation. Unfortunately, evaluating antenna gain remains challenging during the early stages of implanted antenna 1" 2312.14737v1,"Computational Semantics and Evaluation Benchmark for Interrogative Sentences via Combinatory Categorial Grammar Hayate Funakura Kyoto University Kyoto, Japan funakura.hayate.28p @st.kyoto-u.ac.jp Abstract We present a compositional semantics for various types of polar questions and wh-questions within the framework of Combinatory Categorial Grammar (CCG). To assess the explanatory power of our proposed analysis, we introduce a question-answering dataset QSEM specifically designed to evaluate the semantics of interrogative sentences. We implement our analysis using existing CCG parsers and conduct evaluations using the dataset. Through the evaluation, we have obtained annotated data with CCG trees and semantic representations for about half of the samples included in QSEM. Furthermore, we discuss the discrepancy between the theoretical capacity of CCG and the capabilities of existing CCG parsers. 1 Introduction Interrogative sentences, encompassing various question types, hold a crucial position in the study of syntax and semantics within the field of theoretical linguistics (Dayal, 2016). Of particular significance are wh-questions, which serve as a benchmark for testing linguistic theories that explore the interface between syntax and semantics, including Categorial Grammar (Steedman, 1996). For example, the extraction phenomena involved in whquestions, one of the representative examples in the mismatch between syntax and semantics, provide valuable insights for understanding this interface (Kubota and Levine, 2020). However, despite their importance, the exploration of interrogative sentences within the framework of Categorial Grammar remains relatively underdeveloped with few exceptions (Vermaat, 2005; Xiang, 2021). Furthermore, while computational linguistics has witnessed growing research on question sentences in terms of semantic parsing (Kwiatkowski et al., 2011; Reddy et al., 2014), there exists a notable disparity between the semantic parsing literature and theoretical investigations into the syntaxsemantics interface. The latter research focuses Koji Mineshima Keio University Tokyo, Japan minesima@abelard.flet.keio.ac.jp on formal semantics and its detailed examination of various semantic phenomena. This disparity presents an opportunity for bridging the gap and fostering a more integrated approach to the study of interrogative sentences. Motivated by these gaps in the current literature, this paper aims to present a compositional analysis of different types of interrogatives, including polar and wh-questions, within the framework of Combinatory Categorial Grammar (CCG) (Steedman, 2000). This analysis defines a procedure to assign logic-based semantic representations to both questions and their answers, based on their respective CCG trees. These representations can be combined with automated theorem provers to perform logical inferences for question-answering. 1 To facilitate practical implementation and empirical testing, a computational system ccg2hol will be introduced in this paper. This system leverages existing CCG parsers and can be employed for question-answering tasks by integrating it with a theorem prover. In order to evaluate the syntactic and semantic analyses of interrogative sentences, we design and introduce a dataset of Question-Answer pairs, which we call QSEM. 2 The construction of this dataset follows the methodological approach established by FraCaS (Cooper et al., 1996), which serves as a reliable starting point for natural language inferences that carefully separates the semantic and pragmatic factors involved in determining entailment relations. The QSEM dataset comprises two primary categories of problems: complex and diverse issues frequently discussed in formal semantics, such as generalized quantifiers and scope ambiguity, and problems that are closer to real-world language use commonly observed in 1 As will be mentioned later, we reduce questionanswering to recognizing textual entailment. Therefore, a theorem prover can be used as a question-answering engine. 2 QSEM is available at https://github.com/hfunakura/qsem." 2312.14742v1,"The lattice Boltzmann method for fluid flows at relaxation time equal one: performance study Wojciech Bacza, Tadeusz Tomczak b , Maciej Matyka a,∗ a Faculty of Physics and Astronomy, University of Wrocław, pl. M. Borna 9, 50-205 Wrocław, Poland, tel.: +48713759357, fax: +48713217682 b Wrocław University of Science and Technology, Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland Abstract Running large-scale computer codes for huge fluid flow problems requires not only large supercomputers but also efficient and well-optimized computer codes that save the resources of those supercomputers. This paper evaluates the high-performance implementation of the recently proposed Lattice Boltzmann Method (LBM) algorithm with a fixed viscosity and relaxation time τ = 1 called Tau1. We show that the performance of the Tau1 algorithm is almost 4× higher than other state-of-the-art standard LBM implementations. We support this finding by detailed complexity analysis and performance study based on the code with several optimizations, including multithreading, vector processing, significantly decreased number of divisions, and dedicated memory layout. We studied its performance in porous media flow in the three-dimensional model of porosity-varying porous medium to make it sound in the physical context. We find performance drops with porosity, which we link to the fact that memory access patterns change dramatically with the increased complexity of the pore space. In contrast to standard LBM implementations, where the performance drops with the number of lattice links, the processing speed of the new algorithm measured in fluid node updates per second is almost constant regardless of lattice arrangements. Keywords: LBM, lattice Boltzmann method, computational fluid dynamics, CFD, high performance, parallel computing, CPU, memory bandwidth 1. Introduction Many real-life fluid flow problems require large computational grids, long simulation runs, and highly optimized codes to be efficiently run on supercomputers [1, 2]. The lattice Boltzmann method (LBM) is a numerical method used to study fluid flow problems, especially useful in complex geometries such as those found in porous media [3, 4] and artery system [5]. The method uses discrete velocity particle distribution, which is evaluated according to the discrete form of the Boltzmann equation [6, 7, 4]. In addition, it proved its accuracy in simulating fluid flows in various conditions, including turbulence and complex flows [6, 7, 3]. Although the ∗ Corresponding author Email addresses: wojtekbacza@gmail.com (Wojciech Bacza), tadeusz.tomczak@pwr.edu.pl (Tadeusz Tomczak), maciej.matyka@uwr.edu.pl (Maciej Matyka) Preprint submitted to Journal of Computational Physics December 25, 2023" 2312.14748v1,"Progressing from Anomaly Detection to Automated Log Labeling and Pioneering Root Cause Analysis Thorsten Wittkopp 1 , Alexander Acker 2 , and Odej Kao 1 1 Technische Universität Berlin, Germany, { t.wittkopp, odej.kao } @tu-berlin.de 2 logsight.ai { alexander.acker@logsight.ai } Abstract—The realm of AIOps is transforming IT landscapes with the power of AI and ML. Despite the challenge of limited labeled data, supervised models show promise, emphasizing the importance of leveraging labels for training, especially in deep learning contexts. This study enhances the field by introducing a taxonomy for log anomalies and exploring automated data labeling to mitigate labeling challenges. It goes further by investigating the potential of diverse anomaly detection techniques and their alignment with specific anomaly types. However, the exploration doesn’t stop at anomaly detection. The study envisions a future where root cause analysis follows anomaly detection, unraveling the underlying triggers of anomalies. This uncharted territory holds immense potential for revolutionizing IT systems management. In essence, this paper enriches our understanding of anomaly detection, and automated labeling, and sets the stage for transformative root cause analysis. Together, these advances promise more resilient IT systems, elevating operational efficiency and user satisfaction in an ever-evolving technological landscape. Index Terms—AIOps, Anomaly Detection, Automatic Labeling, Log Taxonomy, Root Cause Analysis I. I NTRODUCTION The complexity of modern IT systems presents operation and development teams with challenges in terms of both implementation and maintenance [1]. To address this issue, the area of artificial intelligence for IT operations (AIOps) has emerged [2], which aims to support users in troubleshooting and problem mitigation. AIOps systems rely on the three pillars of observability: metrics, traces, and logs [3]. A key use case for AIOps is to support DevOps teams in detecting anomalies, resolving system failures, and mitigating their root causes. Due to the heavy use of logging in modern systems, many works have hereby focused on log anomaly detection [4]–[10]. These can generally be divided into two classes: unsupervised [11]–[13] and supervised [14], [15]. One of the main obstacles in log anomaly detection is the lack of labeled log data [16] to train sufficient anomaly detection methods [15]. Labeling data is resource-intensive and time-consuming, requiring experts to examine each log message and identify associated errors. Supervised models trained on extensive datasets containing both normal and abnormal instances exhibit remarkable log anomaly detection performance [12], [14]. Utilizing labels, regardless of their granularity, for training is advantageous. Labeled training data is particularly crucial for deep learning approaches and significantly enhances log anomaly detection acceleration [17]. Moreover, a critical catalyst for advancing anomaly detection techniques is the comprehension of the specific types of anomalies present within the log data. A less explored area lies in the stages that follow anomaly detection, specifically in the realm of root cause analysis. Investigating this field has the potential to offer a valuable understanding of the underlying factors triggering these anomalies. Hence, this study demonstrates the categorization of anomalies into distinct classes and the composition of known datasets corresponding to these anomalies. Moreover, it delves into how diverse anomaly detection techniques identify these distinct anomalies [18]. To address the challenge of unlabeled data, an approach is presented for automated data labeling [6]. Lastly, this paper explores the vision of identifying root causes for failures. The remainder of this paper is structured as follows. Section II provides an overview of supervised, unsupervised, and weak-supervised methods. Section III presents PU learning to solve log analysis tasks. Section IV points out our log anomaly taxonomy. Section V evaluates our automated log labeling approach LogLAB in comparison to nine other approaches. Section VI envision a root cause analysis strategy with PU learning. Lastly Section VII concludes the paper. II. U NSUPERVISED , W EAK -S UPERVISED AND S UPERVISED L OG A NALYSIS Anomaly detection, a fundamental task in log analysis, aims to identify instances that deviate significantly from the norm or expected behavior in an IT system. Two primary approaches used for anomaly detection are supervised and unsupervised methods, each with its own strengths and limitations. Supervised anomaly detection involves training a model on a labeled dataset that includes both normal and anomalous instances. The model learns to differentiate between the two classes based on the provided labels. During training, the model gains insights into the characteristics of normal instances and is then capable of identifying anomalies based on deviations from the learned normal behavior. The advantages of supervised methods are: Clear Labeling: Since supervised methods require labeled training data, the anomalies’ true nature is known, leading to accurate detection. Effective for Known Anomalies: Supervised methods are well-suited for scenarios where the types of anomalies are known and can be labeled. Whereas the disadvantages are: Labeling Effort: Labeled data is often expensive and time-consuming to obtain, par-" 2312.14764v1,"Orbit determination from one position vector and a very short arc of optical observations Erica Scantamburlo ∗1 , Giovanni F. Gronchi †2 , and Giulio Baù ‡2 1 Department of Mechanical and Aerospace Engineering, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129, Italy 2 Dipartimento di Matematica, University of Pisa, Largo B. Pontecorvo 5, 56127, Italy December 25, 2023 Abstract In this paper we address the problem of computing a preliminary orbit of a celestial body from one topocentric position vector and a very short arc (VSA) of optical observations. Using the conservation laws of the two-body dynamics, we write the problem as a system of 8 polynomial equations in 6 unknowns. We prove that this system is generically consistent, namely it admits solutions at least in the complex field. From this system we derive a univariate polynomial v of degree 8 in the unknown topocentric distance at the mean epoch of the VSA. Through Gröbner bases theory, we show that the degree of v is minimum among the degrees of all the univariate polynomials solving this problem. The proposed method is relevant for different purposes, e.g. the computation of a preliminary orbit of an Earth satellite with radar and optical observations, the detection of maneuvres of an Earth satellite, and the recovery of asteroids which are lost due to a planetary close encounter. We also show some numerical tests in the case of asteroids undergoing a close encounter with the Earth. Keywords: Orbit determination – Keplerian integrals – Algebraic methods 1 Introduction The problem of computing the orbit of celestial bodies has attracted the interest of scientists since a long time, see Laplace (1780), Lagrange (1783), Gauss (1809). The recent improvements in the observation technology have posed new interesting mathematical problems in this field. The number of asteroids observations performed by modern telescopes is very large. Usually they can be grouped into very short arcs (VSAs) of optical observations, however it is not easy to determine whether VSAs collected in different nights belong to the same observed objects. In general, from a VSA we can not compute a reliable preliminary orbit, but we can try to put together different VSAs to perform this task, see e.g. Milani et al. (2005). Assuming that two VSAs belong to the same asteroid, ∗ erica.scantamburlo@polito.it giovanni.federico.gronchi@unipi.it ‡ giulio.bau@unipi.it † 1" 2312.14769v1,"Large Language Model (LLM) Bias Index—LLMBI Abiodun Finbarrs Oketunji ∗ University of Oxford Oxford, United Kingdom abiodun.oketunji@conted.ox.ac.uk Muhammad Anas † University Canada West Vancouver, Canada muhammad.anas@myucwest.ca Deepthi Saina ‡ Amazon Web Services (AWS) Manchester, United Kingdom dssaina@amazon.com Abstract 1 To operationalise this metric, we engaged in a multi-step process involving collecting and annotating LLM responses, applying sophisticated Natural Language Processing (NLP) techniques for bias detection, and computing the LLMBI score through a specially crafted mathematical formula. The formula integrates weighted averages of various bias dimensions, a penalty for dataset diversity de�ciencies, and a correction for sentiment biases. Our empirical analysis, conducted using responses from OpenAI’s API, employs advanced sentiment analysis as a representative method for bias detection. Bias in LLMs is not merely a technical anomaly but a re- �ection of deeper societal and cultural imbalances. Organisations train these models on vast datasets derived from human language, which inherently contain societal biases (Bender et al., 2021) [2]. As a result, LLMs can perpetuate and even amplify biases, leading to skewed responses with signi�cant implications, especially when these models are deployed in decision-making processes or as interfaces in various sectors (Caliskan et al., 2017) [3]. The Large Language Model Bias Index (LLMBI) is a pioneering approach designed to quantify and address biases inherent in large language models (LLMs), such as GPT-4. We recognise the increasing prevalence and impact of LLMs across diverse sectors. This research introduces a novel metric, LLMBI, to systematically measure and mitigate biases potentially skewing model responses. We formulated LLMBI using a composite scoring system incorporating multiple dimensions of bias, including but not limited to age, gender, and racial biases. The research reveals LLMs, whilst demonstrating impressive capabilities in text generation, exhibit varying degrees of bias across di�erent dimensions. LLMBI provides a quanti�- able measure to compare biases across models and over time, o�ering a vital tool for systems engineers, researchers and regulators in enhancing the fairness and reliability of LLMs. It highlights the potential of LLMs in mimicking unbiased human-like responses. Additionally, it underscores the necessity of continuously monitoring and recalibrating such models to align with evolving societal norms and ethical standards. Keywords Large Language Model, LLM, Model Calibration, Bias Quanti�cation, Bias Mitigation, Natural Language Processing, NLP, Sentiment Analysis, Algorithmic Fairness, Algorithmic Governance, LLM Bias Index (LLMBI), AI Ethics, EU AI Act, United Kingdom National AI Strategy, Global AI Governance ∗ Engineering Manager (Data/Software Engineer) † Senior Software Engineer ‡ Senior Data Architect Introduction Large Language Models (LLMs) like GPT-4 marks a signi�- cant milestone in arti�cial intelligence, particularly in Natural Language Processing (NLP). These models have revolutionised the way machines understand and generate human language, o�ering unprecedented capabilities in various applications, from chatbots to content creation (Brown et al., 2020) [1]. However, alongside their remarkable advancements, LLMs have raised urgent concerns regarding inherent biases. The Large Language Model Bias Index (LLMBI) introduced in this research addresses this pressing issue by providing a quanti�able approach to measure and mitigate these biases. The LLMBI, a pioneering metric, programmatically quanti- �es biases in LLMs across multiple dimensions, including gender, race, religion, age, nationality, disability, sexual orientation, physical appearance, and cultural and socioeconomic status. Bias in AI is multifaceted, which we cannot address adequately through a singular lens (Buolamwini & Gebru, 2018) [4]. The LLMBI’s composite scoring system integrates various aspects of bias, o�ering a nuanced and holistic view of the biases present in LLMs. A multi-step process is employed to develop the LLMBI, beginning with collecting and annotating responses from LLMs. This process involves meticulously examining the language generated by these models and identifying instances where biases are evident. The next step involves applying sophisticated NLP techniques to detect these biases. Advanced sentiment analysis, a primary component of this process, is utilised to discern subtle nuances in language indicating bias (Hutto & Gilbert, 2014) [5]. The computation of the LLMBI score is a critical aspect of this research. The formula crafted for this purpose is not merely a" 2312.14792v1,"1 The Rate-Distortion-Perception-Classification Tradeoff: Joint Source Coding and Modulation via Inverse-Domain GANs Junli Fang ⋆ , João F. C. Mota ⋆ , Baoshan Lu, Weicheng Zhang, Xuemin Hong Abstract—The joint source coding and modulation (JSCM) framework was enabled by recent developments in deep learning, which allows to automatically learn from data, and in an end-toend fashion, the best compression codes and modulation schemes. In this paper, we show the existence of a strict tradeoff between channel rate, distortion, perception, and classification accuracy in a JSCM scenario. We then propose two image compression methods to navigate that tradeoff: an inverse-domain generative adversarial network (ID-GAN), which achieves extreme compression, and a simpler, heuristic method that reveals insights about the performance of ID-GAN. Experiment results not only corroborate the theoretical findings, but also demonstrate that the proposed ID-GAN algorithm significantly improves system performance compared to traditional separation-based methods and recent deep JSCM architectures. Index Terms—Image compression, joint source coding and modulation, generative adversarial networks, rate-distortionperception-classification tradeoff. I. I NTRODUCTION Traditional communication systems follow the celebrated source-channel coding theorem by Shannon [1], which states that source coding and channel coding can be designed separately without loss of optimality. Source coding removes redundant information from a signal, for example, by representing it in a different domain and zeroing out small coefficients. Channel coding, on the other hand, adds to the resulting compressed signal additional information, error-correcting codes, to make its transmission via a noisy channel more robust. Such a modular design, while optimal for memoryless ergodic channels with codes of infinite block length, becomes unsuitable for extreme scenarios, e.g., when bandwidth is highly limited or the channel varies rapidly. An example is underwater acoustic communication, in which multipath interference and noise are so large that the performance of separate source-channel coding schemes sharply drops below a certain signal-to-noise ratio (SNR), a phenomenon known as the cliff effect [2]. Traditional techniques like fast adaptive modulation and coding rarely work in such an environment, especially for long source bit sequences like images. Junli Fang, Weicheng Zhang, Wenhui Hua, and Xuemin Hong are with the School of Informatics, Xiamen University, Xiamen, China. (e-mail: {junlifang,zhangweicheng,huawenhui,}@stu.xmu.edu.cn, xuemin.hong@xmu.edu.cn) Baoshan Lu is with the School of Electronics and Information Engineering, Guangxi Normal University, Guilin, China. (e-mail: baoshanlu@gxnu.edu.cn) João F. C. Mota is with the School of Engineering & Physical Sciences, Heriot-Watt University, Edinburgh EH14 4AS, UK. (e-mail: j.mota@hw.ac.uk) ⋆ equal contribution Joint source coding and modulation. The above problem can be addressed by designing the source coding and modulation schemes jointly, a framework known as joint source coding and modulation (JSCM). Enabled by deep learning, JSCM leverages training data to automatically learn the best compression codes and modulation schemes in an end-to-end fashion. Signals are thus directly mapped onto a complexvalued constellation space, and the resulting representation is transmitted through the noisy channel. In the context of complex signals (like images), and under extreme compression requirements (as in underwater communication), the selection of the features to be compressed strikes different tradeoffs between different metrics: for example, optimizing for image reconstruction may reduce the perceptual quality of the reconstructed image or decrease the accuracy of a subsequent image classification algorithm. The study of such type of tradeoffs started with the seminal work in [3], which modified the rate-distortion framework [1] to study the tradeoff between perception and distortion metrics of image restoration algorithms. In this paper, we extend the study of such tradeoffs to a JSCM scenario. This requires considering not only vector signals, and thus the possibility to reduce their dimension, but also various metrics, including rate, distortion, perception, and classification performance. The RDPC function. We introduce the rate-distortionperception-classification (RDPC) function in a JSCM scenario. To define it, we consider an n-dimensional source signal X ∈ R n that can be drawn from one of L classes: X|H l ∼ p X|H l , l = 1, . . . , L , (1) where H l represents the hypothesis that X is drawn from class l, which occurs with probability p l := P(H l ). The communication process is modeled as a Markov chain H l p X|Hl X p Y |X Y p Y c |Y Y b p X| c c Y c , X (2) c ∈ R n represent the source and reconstructed where X, X signals, and Y , Y b ∈ R m , with m < n, represent the transmitted and received signals. The distribution p Y |X (resp. p Y b |Y and p X| b Y b ) characterizes the encoder (resp. channel and decoder). We assume the channel adds zero-mean Gaussian  noise to Y , i.e., p Y b |Y (b y |y) = N y , Σ , where Σ is an m × m diagonal matrix whose ith diagonal entry Σ ii > 0 represents the noise power of channel i." 2312.14798v1,"Semantic Parsing for Complex Data Retrieval: Targeting Query Plans vs. SQL for No-Code Access to Relational Databases Ben Eyal 1 , Amir Bachar 1 , Ophir Haroche and Michael Elhadad 1 1 Ben-Gurion University of the Negev, Be’er Sheva, Israel Abstract Large Language Models (LLMs) have spurred progress in text-to-SQL, the task of generating SQL queries from natural language questions based on a given database schema. Despite the declarative nature of SQL, it continues to be a complex programming language. In this paper, we investigate the potential of an alternative query language with simpler syntax and modular specification of complex queries. The purpose is to create a query language that can be learned more easily by modern neural semantic parsing architectures while also enabling non-programmers to better assess the validity of the query plans produced by an interactive query plan assistant. The proposed alternative query language is called Query Plan Language (QPL). It is designed to be modular and can be translated into a restricted form of SQL Common Table Expressions (CTEs). The aim of QPL is to make complex data retrieval accessible to non-programmers by allowing users to express their questions in natural language while also providing an easier-to-verify target language. The paper demonstrates how neural LLMs can benefit from QPL’s modularity to generate complex query plans in a compositional manner. This involves a question decomposition strategy and a planning stage. We conduct experiments on a version of the Spider text-to-SQL dataset that has been converted to QPL. The hierarchical structure of QPL programs enables us to measure query complexity naturally. Based on this assessment, we identify the low accuracy of existing text-to-SQL systems on complex compositional queries. We present ways to address the challenge of complex queries in an iterative, user-controlled manner, using fine-tuned LLMs and a variety of prompting strategies in a compositional manner. Keywords text-to-SQL, semantic parsing, text-to-code, compositionality 1. Introduction Relational databases constitute the most widespread form of structured data storage. Querying and exploring complex relational data stores necessitate programming skills and domain-specific knowledge of the data. However, recent advancements in Natural Language Processing (NLP) have made it feasible to formulate questions about relational data in natural language, convert the questions into SQL, and present the results. The First International Workshop on the Future of No-Code Digital Apprentices, August 19–25, 2023, Macao, S.A.R $ bene@post.bgu.ac.il (B. Eyal); amirbac@post.bgu.ac.il (A. Bachar); ophirbh@gmail.com (O. Haroche); elhadad@bgu.ac.il (M. Elhadad)  0000-0002-1160-8973 (B. Eyal); 0000-0002-5629-2351 (M. Elhadad) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)" 2312.14805v1,"Quantum repeater node with free-space coupled trapped ions Max Bergerhoff, ∗ Omar Elshehy, ∗ Stephan Kucera, Matthias Kreis, and Jürgen Eschner † Fachrichtung Physik, Universität des Saarlandes, Campus E2.6, 66123 Saarbrücken, Germany (Dated: December 25, 2023) The quantum repeater cell is a basic building block for a quantum network, as it allows to overcome the distance limitations due to unavoidable fiber loss in direct transmission. We demonstrate the implementation of a quantum repeater cell, based on two free-space coupled 40 Ca + ions in the same trap that act as quantum memories. We demonstrate the asynchronous generation of atom-photon and photon-photon entanglement by controlled emission of single photons from the individually addressed ions and entanglement swapping. We discuss the fidelity as well as the scaling of the generated rate. I. INTRODUCTION Large quantum networks [1, 2] with single photons as flying qubits require tools for overcoming propagation loss. To this end, quantum repeaters [3–6] using quantum memories and entanglement have been proposed. The fact that quantum signals cannot be amplified or copied because of the no-cloning theorem [7] is then counteracted by distributing entanglement over smaller distances. This enables networking application such as qubit transmission by quantum teleportation [8], or quantum key distribution (QKD) [9], or distributed quantum gates [10]. Two basic building blocks of a quantum repeater link are identified according to [11]: the quantum repeater segment, where two memory qubits are connected via a photonic link, and the quantum repeater cell (QR cell) where two closely spaced and interacting memory qubits are each connected to a photonic link. Using this configuration, the key generation rate for QKD is proven to be advantageous compared to the direct link [12]. Implementations towards a quantum repeater are being developed on different platforms, such as vacancy centers [13, 14], atomic ensembles [15, 16], single atoms coupled in free space [17] or in a cavity [18], and ions in a macroscopic cavity [19]. Realizations of a QR cell that include the basic demonstration of the repeater advantage have so far been achieved with atoms in a cavity [18] and ions in a macroscopic cavity [19]. Trapped-ion based quantum memories are promising candidates for realizing quantum repeater protocols [20, 21], as the necessary elements for their control are well developed and can be combined with relatively low effort. This platform offers long storage times [22, 23], the possibility to generate high-fidelity memory-photon entanglement [24, 25] and coherent manipulations to implement two-ion quantum gates and a Bell-state measurement between the memory qubits for entanglement swapping [26, 27]. In this manuscript, an implementation of a QR cell is demonstrated, based on two 40 Ca + ions in the same ∗ These authors contributed equally to this work. † juergen.eschner@physik.uni-saarland.de trap that act as quantum memories, coupled to photonic channels in free space. In section II an overview on the experimental setup and protocols are given. The core element of the protocol is the asynchronous generation of atom-photon entanglement which is described in detail in section II A. The generated photons from each atom are free-space coupled into separate single mode fibers. The entanglement swapping from the memory to the photons, in order to generate the targeted photonphoton entanglement, is described in section II B. It is implemented by the use of the Mølmer-Sørensen quantum gate [28, 29] and subsequent projective measurement of the atomic states. In section III the experimental realization is presented. First the asynchronous generation of atom-photon entanglement is demonstrated (section III A), then the state of the two photons after applying the entanglement swapping procedure is characterized (section III B). Finally the scaling of the coincidence rate and probability is discussed (section III C). The experiment presented in the recent publication [19] follows a similar approach, also using single 40 Ca + ions as quantum memories. The main differences are in some implementation steps of the protocol and, importantly, in the way of collecting the photons. While in [19] individually addressed excitation of the ions and photon collection via a large optical cavity are used, in our experiment individually addressed repumping is performed, and photon collection happens into free space. In the final discussion we will compare the rates of entangled photon pairs achievable with the two approaches. II. EXPERIMENT The experimental protocol for generating the targeted photon-photon entanglement is schematically shown in Figure 1. The protocol is divided into two parts: the first part creates atom-photon entanglement between atom 1 and a photon in arm A, and asynchronously between atom 2 and a photon in arm B. A detailed description is given in section II A. The second part performs the entanglement swapping from the atoms to the photon pair, by projecting the two atoms onto a basis of maximally entangled states (Bell-state measurement, abbreviated as BSM). Details are explained in section II B." 2312.14806v1,"THE EFFECTS OF SIGNAL-TO-NOISE RATIO ON GENERATIVE ADVERSARIAL NETWORKS APPLIED TO MARINE BIOACOUSTIC DATA Georgia Atkinson * , Nick Wright * , A. Stephen McGough † and Per Berggren ‡ * School of Engineering, † School of Computing, ‡ School of Natural & Environmental Sciences Newcastle University, United Kingdom {g.atkinson, nick.wright, stephen.mcgough, per.berggren}@ncl.ac.uk ABSTRACT In recent years generative adversarial networks (GANs) have been used to supplement datasets within the field of marine bioacoustics. This is driven by factors such as the cost to collect data, data sparsity and aid preprocessing. One notable challenge with marine bioacoustic data is the low signalto-noise ratio (SNR) posing difficulty when applying deep learning techniques such as GANs. This work investigates the effect SNR has on the audio-based GAN performance and examines three different evaluation methodologies for GAN performance, yielding interesting results on the effects of SNR on GANs, specifically WaveGAN. Evaluating GAN-generated bioacoustics typically focuses on improving model performance whilst ignoring the synthetic data’s quality [4, 5, 9]. Work assessing synthetic data production often makes use of Dynamic Time Warping [6], visually comparing frequencies to that of similar real-world data [3], spectrogram inspection [3], cluster analysis [10, 11], training discriminator networks to obtain error networks [11], and Siamese Neural Networks (SNNs) to generate similarity scores between the real and generated data [10]. There is currently no standardised evaluation method for synthetic audio data. Additionally, the effect of SNR on audio generation has not been explored in the marine context. Index Terms—generative adversarial network, signal-to-noise ratio, bioacoustics, underwater acoustics, evaluation methods 3. DATA 1. INTRODUCTION Generative adversarial networks (GANs) are used in a variety of settings within the audio domain, including speech synthesis [1], music generation [2], and bioacoustic synthesis [3]. In marine bioacoustics, GANs have previously been employed for tasks such as dataset generation and augmentation [4–6]. Some bioacoustic data, like those from deployed passive acoustic monitoring systems, typically have a low signal-to-noise ratio (SNR). This can cause challenges when generating synthetic data with GANs. Despite this, there is little work on the effect of low SNR on GAN-generated synthetic bioacoustics. As such, this work examines how the SNR of marine bioacoustic data affects GAN performance. Further, this work investigates three different methodologies for evaluating GAN performance. 2. RELATED WORK In 2018, Donahue et al. introduced WaveGAN [7], an audio-based GAN based on DCGAN [8] adapted to a onedimensional network. To address the issue of chequerboard artefacts in DCGAN-generated images, WaveGAN phaseshuffles the discriminator at each layer. THIS WORK WAS SUPPORTED BY THE ENGINEERING AND PHYSICAL SCIENCES RESEARCH COUN- CIL, CENTRE FOR DOCTORAL TRAINING IN CLOUD COMPUTING FOR BIG DATA (EP/L015358/1) Neural networks which operate on raw audio are often sample rate specific. WaveGAN is designed for audio sampled at 16kHz [7], making it suitable for marine acoustics at frequencies ≤ 8kHz. To evaluate the efficacy of WaveGAN at lower sampling rates, data was generated at 32kHz 1 . Audio of a specific SNR is generated via x = s + βn, where s is the upsweep signal, n is the noise signal, SNR is A s is the SNR scaling parameter. the SNR, and β = A √ n SNR A j is the root mean square amplitude of signal j. To investigate the effect of SNR on GANs, an upsweep frequency shape which mimics cetacean whistles is used as the signal, chosen as it is a simple shape but one which could reasonably be present within marine bioacoustic data [12]. Whistles of varying height, length, and gradient were generated at 32kHz. One-second clips of underwater noise, devoid of anthropogenic activity or whistles, were randomly selected, downsampled to 32kHz, β-scaled, and combined with the generated whistle. SNR data is systematically generated to cover the range [−15, 10]dB, at 5k clips per SNR. An additional 5k noise clips are sampled for analysis. See Figure 1 for example data. 1 Data generated using: https://github.com/chrisdonahue/wavegan" 2312.14828v1,"Plan, Posture and Go: Towards Open-World Text-to-Motion Generation Jinpeng Liu 1 * 1 Yiji Cheng 1 Chunyu Wang 2 * Wenxun Dai 1 * Yansong Tang 1† Xin Tong 2 Shenzhen International Graudate School, Tsinghua University 2 Microsoft Research Asia {liujp22@mails., daiwx23@mails., cyj22@mails., tang.yansong@sz.}tsinghua.edu.cn {chnuwa, xtong}@microsoft.com Figure 1. Exemplary motions generated by our proposed PRO-Motion system. Different from conventional models trained on paired text-motion data, our PRO-Motion can generate 3D human motion with global body translation and rotation from open-world text prompts, such as “Jump on one foot” and “Experiencing a profound sense of joy”. tion planner instructs Large Language Models (LLMs) to generate a sequence of scripts describing the key postures in the target motion. Differing from natural languages, the scripts can describe all possible postures following very simple text templates. This significantly reduces the complexity of posture-diffuser, which transforms a script to a posture, paving the way for open-world generation. Finally, godiffuser, implemented as another diffusion model, estimates whole-body translations and rotations for all postures, resulting in realistic motions. Experimental results have shown the superiority of our method with other counterparts, and demonstrated its capability of generating diverse and realistic motions from complex open-world prompts such as “Experiencing a profound sense of joy”. The project page is available at https://moonsliu.github.io/Pro-Motion/. Abstract Conventional text-to-motion generation methods are usually trained on limited text-motion pairs, making them hard to generalize to open-world scenarios. Some works use the CLIP model to align the motion space and the text space, aiming to enable motion generation from natural language motion descriptions. However, they are still constrained to generate limited and unrealistic in-place motions. To address these issues, we present a divide-and-conquer framework named PRO-Motion 1 , which consists of three modules as motion planner, posture-diffuser and go-diffuser. The mo- * Equal Contribution † Corresponding Author 1 PRO-Motion: Plan, postuRe and gO for text-to-Motion generation 1" 2312.14831v1,"ASYNCHRONOUS COMPOSITION OF LTL PROPERTIES OVER INFINITE AND FINITE TRACES ALBERTO BOMBARDELLI a,b AND STEFANO TONETTA a Fondazione Bruno Kessler, via Sommarive 18, Trento Italy 380123 e-mail address: abombardelli@fbk.eu, tonettas@fbk.eu b University of Trento, via Sommarive 16, Trento Italy 380123 e-mail address: alberto.bombardell-1@unitn.it a Abstract. The verification of asynchronous software components poses significant challenges due to the way components interleave and exchange input/output data concurrently. Compositional strategies aim to address this by separating the task of verifying individual components on local properties from the task of combining them to achieve global properties. This paper concentrates on employing symbolic model checking techniques to verify properties specified in Linear-time Temporal Logic (LTL) on asynchronous software components that interact through data ports. Unlike event-based composition, local properties can now impose constraints on input from other components, increasing the complexity of their composition. We consider both the standard semantics over infinite traces as well as the truncated semantics over finite traces to allow scheduling components only finitely many times. We propose a novel LTL rewriting approach, which converts a local property into a global one while considering the interleaving of infinite or finite execution traces of components. We prove the semantic equivalence of local properties and their rewritten version projected on the local symbols. The rewriting is also optimized to reduce formula size and to leave it unchanged when the temporal property is stutter invariant. These methods have been integrated into the OCRA tool, as part of the contract refinement verification suite. Finally, the different composition approaches were compared through an experimental evaluation that covers various types of specifications. 1. Introduction Software model checking [Roz11, BK08] is a technique employed. It combines a variety of methods based on deductive reasoning, abstraction, and state space exploration. Model checking typically specifies the property to be verified in a temporal logic. One of the most common logic used to express properties of programs is Linear-time Temporal Logic (LTL) [Pnu77]. Software model checking [Roz11, BK08] is a technique employed for the verification of complex programs. This approach combines different methods based on deductive reasoning, state space exploration and abstract to prove whether or not a given property is satisfied. In most cases, properties are expressed either as invariants or as temporal properties; in Preprint submitted to Logical Methods in Computer Science © A. Bombardelli and S. Tonetta CC ⃝ Creative Commons" 2312.14838v1,"Temperature flow in pseudo-Majorana functional renormalization for quantum spins Benedikt Schneider, 1, 2 Johannes Reuther, 3, 4, 5 Matı́as G. Gonzalez, 3, 4 Björn Sbierski, 1, 2, 6 and Nils Niggemann 3, 4, 5 1 Department of Physics and Arnold Sommerfeld Center for Theoretical Physics, Ludwig-Maximilians-Universität München, Theresienstr. 37, 80333 Munich, Germany 2 Munich Center for Quantum Science and Technology (MCQST), 80799 Munich, Germany 3 Dahlem Center for Complex Quantum Systems and Institut für Theoretische Physik, Freie Universität Berlin, Arnimallee 14, 14195 Berlin, Germany 4 Helmholtz-Zentrum für Materialien und Energie, Hahn-Meitner-Platz 1, 14109 Berlin, Germany 5 Department of Physics and Quantum Centers in Diamond and Emerging Materials (QuCenDiEM) group, Indian Institute of Technology Madras, Chennai 600036, India 6 Institut für Theoretische Physik, Universität Tübingen, Auf der Morgenstelle 14, 72076 Tübingen, Germany (Dated: December 25, 2023) We implement the temperature flow scheme first proposed by Honerkamp and Salmhofer in Phys. Rev. B 64, 184516 (2001) into the pseudo-Majorana functional renormalization group method for quantum spin systems. Since the renormalization group parameter in this approach is a physical quantity – the temperature T – the numerical efficiency increases significantly compared to more conventional renormalization group parameters, especially when computing finite temperature phase diagrams. We first apply this method to determine the finite temperature phase diagram of the J 1 -J 2 Heisenberg model on the simple cubic lattice where our findings support claims of a vanishingly small nonmagnetic phase around the high frustration point J 2 = 0.25J 1 . Perhaps most importantly, we find the temperature flow scheme to be advantageous in detecting finite temperature phase transitions as, by construction, a phase transition is never encountered at an artificial, unphysical cutoff parameter. Finally, we apply the temperature flow scheme to the dipolar XXZ model on the square lattice where we find a rich phase diagram with a large non-magnetic regime down to the lowest accessible temperatures. Wherever a comparison with error-controlled (quantum) Monte Carlo methods is applicable, we find excellent quantitative agreement with less than 5% deviation from the numerically exact results. I. INTRODUCTION Frustrated quantum spin systems are known for their rich phenomenology, allowing for peculiar effects such as order-by-disorder phase transitions [1, 2] or magnetically disordered low-temperature phases [3–8]. Examples for the latter are valence bond solids or the highly sought-after quantum spin liquids in which spin excitations fractionalize into emergent quasi-particles with unusual quantum statistics [9]. Given these desirable properties, there is a high demand for numerical techniques to treat these systems. While a few notable models are amenable to exact solutions [10] or quantum Monte Carlo [11–13], the treatment of general frustrated spin systems is notorious for its difficulty, even if significant approximations are employed. In the last decade, the pseudo-fermion functional renormalization group (PFFRG) [14, 15] has established itself as a useful tool for the numerical treatment of a variety of spin models at zero temperature due to its remarkable flexibility [16–21]. Treating spin operators through a fermionic particle representation to leverage the established functional renormalization group formalism, the PFFRG does not suffer from the sign problem and can treat translational invariant systems with arbitrary lattice geometry and two-body spin interactions. One of its shortcomings, the inclusion of unphysical states in the pseudo-fermion representation, can be circumvented at finite temperatures via the Popov- Fedotov trick [22, 23] or by avoiding unphysical states altogether via a faithful spin representation in terms of Majorana fermions in the pseudo-Majorana (PM)-FRG [24, 25]. It was found that these approaches accurately capture the interplay between thermal and quantum fluctuations, enabling computations of magnetic phase diagrams and critical temperatures in quantitative agreement to quantum Monte Carlo (whenever the latter is applicable). On the other hand, while PMFRG simulations at finite temperature represent an important method extension and become even perturbatively error-controlled at large temperature, the cost of this improvement is significant, as it requires a separate solution of the numerically expensive FRG flow equations at each temperature. The renormalization group parameter is typically implemented through an artificial infrared cutoff Λ in the single particle Green function, suppressing fermionic propagation with Matsubara frequencies |ω n | ≪ Λ. An alternative formulation was first demonstrated by Honerkamp and Salmhofer in Ref. [26] for systems of itinerant fermions where temperature was employed as a flow parameter instead. In this approach, a single FRG flow along the physical temperature provides a whole slice through a finite-temperature phase diagram at once. On the other hand, however, the usual notion of RG as a successive integration of UV degrees of freedom is lost [27, 28]. Motivated by the above advantages, in this paper, we demonstrate an implementation of the temperature flow" 2312.14841v1,"Quantitative real-time measurements of dose and dose rate in UHDR proton pencil beams via scintillation imaging system Megan Clark 1 , Joseph Harms 2 , Roman Vasyltsiv 1 , Austin Sloop 1 , Jakub Kozelka 3 , Bill Simon 3 , Rongxiao Zhang 1 , David Gladstone 1 , Petr Bruza 1 1 2 Thayer School of Engineering, Dartmouth College, Hanover, NH University of Alabama at Birmingham, Department of Radiation Oncology, Birmingham, AL 3 Sun Nuclear Inc., Melbourne FL 32940, US Version typeset December 25, 2023 Author to whom correspondence should be addressed is Megan Clark. email: megan.a.clark.th@dartmouth.edu i" 2312.14844v1,"An Implantable Piezofilm Middle Ear Microphone: Performance in Human Cadaveric Temporal Bones John Z. Zhang 1† , Lukas Graf 2† , Annesya Banerjee 2 , Aaron Yeiser 1 , Christopher I. McHugh 2 , Ioannis Kymissis 3 , Jeffrey H. Lang 1 , Elizabeth S. Olson 3 and Hideko Heidi Nakajima 2* 1 Massachusetts Institute of Technology. 2 Harvard University and Mass Eye and Ear. 3 Columbia University. *Corresponding author(s). E-mail(s): heidi nakajima@meei.harvard.edu; † These authors contributed equally as first authors to this work. Abstract Purpose: One of the major reasons that totally implantable cochlear microphones are not readily available is the lack of good implantable microphones. An implantable microphone has the potential to provide a range of benefits over external microphones for cochlear implant users including the filtering ability of the outer ear, cosmetics, and usability in all situations. This paper presents results from experiments in human cadaveric ears of a piezofilm microphone concept under development as a possible component of a future implantable microphone system for use with cochlear implants. This microphone is referred to here as a drum microphone (DrumMic) that senses the robust and predictable motion of the umbo, the tip of the malleus. Methods: The performance was measured of five DrumMics inserted in four different human cadaveric temporal bones. Sensitivity, linearity, bandwidth, and equivalent input noise were measured during these experiments using a sound stimulus and measurement setup. Results: The sensitivity of the DrumMics was found to be tightly clustered across different microphones and ears despite differences in umbo and middle ear anatomy. The DrumMics were shown to behave linearly across a large dynamic range (46 dB SPL to 100 dB SPL) 1" 2312.14867v1,"VIEScore: Towards Explainable Metrics for Conditional Image Synthesis Evaluation Max Ku ♠ Dongfu Jiang ♠ Cong Wei ♠ Xiang Yue ♡ Wenhu Chen ♠ {m3ku, dongfu.jiang, c58wei}@uwaterloo.ca, xiangyue@in.ai, wenhu.chen@uwaterloo.ca University of Waterloo ♠ IN.AI Research ♡ https://tiger-ai-lab.github.io/VIEScore/ VIEScore Input Output Alignment: Instruction MLLM Image & Text Traditional Metrics “A tiger in a lab coat ... tuning a welloiled science content machine, digital art.” 0.8 ""The image successfully depicts a tiger in a lab coat… However, the prompt's mention of 'well oiled' could be … which isn't clearly depicted… Reasoning Explainability Task Awareness Output Alignment: Text vector 0.179252 Image vector Reasoning Explainability Task Awareness Embeddings Figure 1: Which method (VIES CORE or traditional metrics) is “closer” to the human perspectives? Metrics in the future would provide not just the score but also the rationale, enabling the understanding of each judgment. Abstract In the rapidly advancing field of conditional image generation research, challenges such as limited explainability lie in effectively evaluating the performance and capabilities of various models. This paper introduces VIES CORE , a Visual Instruction-guided Explainable metric for evaluating any conditional image generation tasks. VIES CORE leverages general knowledge from Multimodal Large Language Models (MLLMs) as the backbone and does not require training or fine-tuning. We evaluate VIES CORE on seven prominent tasks in conditional image tasks and found: (1) VIES CORE (GPT4-v) achieves a high Spearman correlation of 0.3 with human evaluations, while the human-to-human correlation is 0.45. (2) VI- ES CORE (with open-source MLLM) is significantly weaker than GPT-4v in evaluating synthetic images. (3) VIES CORE achieves a correlation on par with human ratings in the generation tasks but struggles in editing tasks. With these results, we believe VIES CORE shows its great potential to replace human judges in evaluating image synthesis tasks. 1 Introduction Diffusion models have become a focal point in AI research for image synthesis. Over the past year, several new models (Kumari et al., 2023; Ruiz et al., 2023; Li et al., 2023c; Zhang and Agrawala, 2023) have been introduced to enhance control over image generation. However, comprehensively evaluating AI-synthesized images remains a challenging and unresolved issue. While metrics like LPIPS (Zhang et al., 2018), CLIP-Score (Hessel et al., 2021), and DreamSim (Fu et al., 2023b) were proposed, they have certain limitations: (1) these metrics are agnostic the end task, which can fail to measure the desired aspects of the generated images, (2) the score is opaque with limited explainability. These limitations heavily restrict their effectiveness in assessing conditional image generation. Some research work (Denton et al., 2015; Isola et al., 2017; Meng et al., 2021; Chen et al., 2023; Sheynin et al., 2023) relied on human-driven evaluation methods. While humans excel at understanding and interpreting visual content, such methods in the context are facing challenges such as scalability limits and preference subjectivity issues. This reliance on" 2312.14874v1,"Parallel Prefix Sum with SIMD Yanbin Wang Kenneth A. Ross Columbia University Columbia University Columbia University zwd@cs.columbia.edu yw3372@columbia.edu kar@cs.columbia.edu ABSTRACT In data compression using differential encoding, prefix sums are also used to reconstruct the original data, and prefix-sum computations can account for the majority of the running time [22, 23]. The prefix sum operation takes a binary associative operator ⊕ and an input array of n elements [a 0 , a 1 , . . . , a n−1 ], and outputs the array containing the sums of prefixes of the input: [a 0 , (a 0 ⊕ a 1 ), . . . , (a 0 ⊕ a 1 ⊕ a n−1 )]. This definition is also known as an inclusive scan operation [5]. The output of an exclusive scan (also called pre-scan) would remove the last element from the above output array, and insert an identity value at the beginning of the output. In this paper, we use addition as the binary operator ⊕ and compute inclusive scans by default. The basic algorithm to compute prefix sums simply requires one sequential pass of additions while looping over all elements in the input array and writing out the running totals to the output array. Although this operation seems to be inherently sequential, there are actually parallel algorithms to compute prefix sums. To compute the prefix sums of n elements, Hillis and Steele presented a data parallel algorithm that takes O(log n) time, assuming there are n processors available [14]. This algorithm performs O(n log n) additions, doing more work than the sequential version, which only needs O(n) additions. Work-efficient algorithms [19, 5] build a conceptual balanced binary tree to compute the prefix sums in two sweeps over the tree, using O(n) operations. In Section 3, we implement and compare SIMD versions of these data-parallel algorithms, as well as a vertical SIMD algorithm that is also work-efficient. In a shared-memory environment, we can speed up prefix sum computations using multiple threads on a multicore platform. Prefix sums can be computed locally within each thread, but because of the sequential dependencies, thread t m has to know the previous sums computed by threads t 0 . . . t m−1 in order to compute the global prefix sum results. Thus, a two-pass algorithm is necessary for multithreaded execution [34]. There are multiple ways to organize the computation subprocedures, depending on (a) whether prefix sums are computed in the first or the second pass, and (b) how the work is partitioned. For example, to balance the work among threads, it is necessary to tune a dilation factor to the local configuration for optimal performance [34]. To understand the best multithreading strategy, we analyze and compare different multithreaded execution strategies (Section 2.1). More importantly, with many concurrent threads accessing memory, the prefix sum can become a memory bandwidth- The prefix sum operation is a useful primitive with a broad range of applications. For database systems, it is a building block of many important operators including join, sort and filter queries. In this paper, we study different methods of computing prefix sums with SIMD instructions and multiple threads. For SIMD, we implement and compare horizontal and vertical computations, as well as a theoretically work-efficient balanced tree version using gather/scatter instructions. With multithreading, the memory bandwidth can become the bottleneck of prefix sum computations. We propose a new method that partitions data into cache-sized smaller partitions to achieve better data locality and reduce bandwidth demands from RAM. We also investigate four different ways of organizing the computation sub-procedures, which have different performance and usability characteristics. In the experiments we find that the most efficient prefix sum computation using our partitioning technique is up to 3x faster than two standard library implementations that already use SIMD and multithreading. 1. ∗ Wangda Zhang INTRODUCTION Prefix sums are widely used in parallel and distributed database systems as building blocks for important database operators. For example, a common use case is to determine the new offsets of data items during a partitioning step, where prefix sums are computed from a previously constructed histogram or bitmap, and then used as the new index values [6]. Applications of this usage include radix sort on CPUs [30, 25] and GPUs [29, 20], radix hash joins [16, 3], as well as parallel filtering [32, 4]. In OLAP data cubes, prefix sums are precomputed so that they can be used to answer range sum queries at runtime [15, 10, 21]. Data mining algorithms such as K-means can be accelerated using parallel prefix sum computations in a preprocessing step [18]. ∗ This research was supported in part by a gift from Oracle Corporation. This article is published under a Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/), which permits distribution and reproduction in any medium as well allowing derivative works, provided that you attribute the original work to the author(s) and ADMS 2020. 11th International Workshop on Accelerating Analytics and Data Management Systems (ADMS’20), August 31, 2020, Tokyo, Japan. 1" 2312.14881v1,"On the Interval Coloring Impropriety of Graphs MacKenzie Carr a,∗ , Eun-Kyung Cho b , Nicholas Crawford c , Vesna Iršič d,e , Leilani Pai f , Rebecca Robinson c a Department of Mathematics, Simon Fraser University, 8888 University Dr., Burnaby BC, V5A 1S6, Canada b Department of Mathematics, Hankuk University of Foreign Studies, Yongin-si, Gyeonggi-do, Republic of Korea c Department of Mathematics, University of Colorado Denver, 1201 Larimer Street, Denver, 80204, USA d Faculty of Mathematics and Physics, University of Ljubljana, Jadranska ulica 19, Ljubljana, Slovenia e Institute of Mathematics, Physics and Mechanics, Ljubljana, Slovenia, Jadranska ulica 19, Ljubljana, Slovenia f Department of Mathematics, University of Nebraska-Lincoln, Avery Hall 203, Lincoln, NE, 68588, USA Abstract An improper interval (edge) coloring of a graph G is an assignment of colors to the edges of G satisfying the condition that, for every vertex v ∈ V (G), the set of colors assigned to the edges incident with v forms an integral interval. An interval coloring is k-improper if at most k edges with the same color all share a common endpoint. The minimum integer k such that there exists a k-improper interval coloring of the graph G is the interval coloring impropriety of G, denoted by µ int (G). In this paper, we determine improved upper bounds on the interval coloring impropriety of several classes of graphs, namely 2-trees, iterated triangulations, and outerplanar graphs. Additionally, we investigate the interval coloring impropriety of the corona product of two graphs, G ⊙ H. Finally, we provide a construction of an interval coloring of a subclass of complete multipartite graphs. This provides additional evidence to the conjecture by Casselgren and Petrosyan that µ int (G) ≤ 2 for all complete multipartite graphs G. Keywords: edge coloring, improper coloring, interval coloring, interval coloring impropriety 1. Introduction Let G be a finite graph with vertex set V (G), and edge set E(G). An edge coloring of a graph G is a function φ : E(G) → C assigning labels, or colors, from a set C, normally N, to the edges of G. An edge coloring is proper if the colors are assigned in a way so that adjacent edges (those sharing an endpoint) in G receive different colors. Otherwise, the edge coloring is improper. Asratian and Kamalian [1, 2] introduced the problem of interval k-coloring a graph as a model for creating timetables without gaps for teachers and students. A proper edge coloring of a graph G is said to be an interval k-coloring (also called a consecutive coloring, for example in [3]) if exactly k colors are used to color the edges of G and the colors assigned to the edges incident to each vertex v ∈ V (G) are distinct and form a set of consecutive integers. Note that there exist graphs that do not have an interval coloring, for example complete graphs K n for odd n ≥ 3. This leads to the question of whether a given graph has an interval coloring, which has been shown to be NP-complete to determine for bipartite graphs [4]. This problem has been investigated for several classes of graphs, including trees, regular graphs and complete bipartite graphs [5, 6], subclasses of bipartite graphs [5, 7, 8], outerplanar graphs with maximum degree 3 [9], Cartesian, strong, lexicographic and tensor products and compositions of graphs [3, 10–12], complete tripartite graphs K 1,m,n [13], and biregular graphs [14–22]. However, there remain many classes of graphs for which it is not known whether an interval coloring exists for all graphs in the class, including (3, 4)-biregular graphs. ∗ Corresponding author Email addresses: mackenzie_carr@sfu.ca (MacKenzie Carr), ekcho2020@gmail.com (Eun-Kyung Cho), nicholas.2.crawford@ucdenver.edu (Nicholas Crawford), vesna.irsic@fmf.uni-lj.si (Vesna Iršič), lpai@huskers.unl.edu (Leilani Pai), rebecca.j.robinson@ucdenver.edu (Rebecca Robinson) December 22, 2023" 2312.14886v1,"Sample Path Regularity of Gaussian Processes from the Covariance Kernel Nathaël Da Costa 1 Marvin Pförtner 1 Lancelot Da Costa 2,3,4 Philipp Hennig 1 nathael.da-costa@uni-tuebingen.de marvin.pfoertner@uni-tuebingen.de lance.dacosta@verses.ai philipp.hennig@uni-tuebingen.de 1 Tübingen AI Center, University of Tübingen, Tübingen, Germany VERSES AI Research Lab, Los Angeles, USA 3 Department of Mathematics, Imperial College, London, UK 4 Wellcome Centre for Human Neuroimaging, UCL, London, UK 2 Abstract Gaussian processes (GPs) are the most common formalism for defining probability distributions over spaces of functions. While applications of GPs are myriad, a comprehensive understanding of GP sample paths, i.e. the function spaces over which they define a probability measure on, is lacking. In practice, GPs are not constructed through a probability measure, but instead through a mean function and a covariance kernel. In this paper we provide necessary and sufficient conditions on the covariance kernel for the sample paths of the corresponding GP to attain a given regularity. We use the framework of Hölder regularity as it grants us particularly straightforward conditions, which simplify further in the cases of stationary and isotropic GPs. We then demonstrate that our results allow for novel and unusually tight characterisations of the sample path regularities of the GPs commonly used in machine learning applications, such as the Matérn GPs. Keywords: Gaussian processes, Gaussian random fields, differentiability, Hölder regularity, Sobolev regularity, stationary kernels, isotropic kernels, Matérn kernels 1 Introduction Gaussian processes (GPs) provide a formalism to assign probability distributions over spaces of functions. That distribution is principally characterised and controlled by the process’ covariance function, which is a positive definite kernel. Such kernels are also associated with reproducing kernel Hilbert spaces (RKHSs). However, it is relatively widely known that the sample paths of the associated GP are not generally elements of the RKHS, but form a “larger” space of typically less regular functions (Kanagawa et al., 2018, Section 4). This sample path space is much harder to characterise than the RKHS. GP regression is widely applied in statistics and machine learning for inference from physical observations. In such settings, practitioners mostly concern themselves with the posterior mean function (which is an element of the RKHS) and the marginal variance (which is not in the RKHS, but inherits its regularity) while largely ignoring the regularity of the sample paths and other properties of the support of the prior probability measure. But recently relevant use cases for GPs in computational tasks urgently require a more careful, and ideally tight analysis of the sample path regularity, which we provide in this work. ©2023 Nathaël Da Costa, Marvin Pförtner, Lancelot Da Costa, and Philipp Hennig. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/." 2312.14905v1,"Unlinking symmetric quivers ∗1 †2 Piotr Kucharski , Hélder Larraguı́vel , ‡3 §4 Dmitry Noshchenko , and Piotr Su lkowski 1 Institute of Mathematics, University of Warsaw, ul. Banacha 2, 02-097 Warsaw, Poland 2 Institute of Theoretical Physics and Mark Kac Center for Complex Systems Research, Jagiellonian University, ul. Lojasiewicza 11, 30-348 Kraków, Poland 3 School of Theoretical Physics, Dublin Institute for Advanced Studies, 10 Burlington Road, Dublin 4, D04 C932, Ireland 4 Faculty of Physics, University of Warsaw, ul. Pasteura 5, 02-093 Warsaw, Poland December 25, 2023 Abstract We analyse the structure of equivalence classes of symmetric quivers whose generating series are equal. We consider such classes constructed using the basic operation of unlinking, which increases a size of a quiver. The existence and features of such classes do not depend on a particular quiver but follow from the properties of unlinking. We show that such classes include sets of quivers assembled into permutohedra, and all quivers in a given class are determined by one quiver of the largest size, which we call a universal quiver. These findings generalise the previous ones for permutohedra graphs for knots. We illustrate our results with generic examples, as well as specialisations related to the knots-quivers correspondence. ∗ piotr.kucharski@mimuw.edu.pl helder.larraguivel@uj.edu.pl ‡ dsnoshchenko@stp.dias.ie § psulkows@fuw.edu.pl † 1" 2312.14907v1,"Imaging extended single crystal lattice distortion fields with multi-peak Bragg ptychography S. Kandel 1 , S. Maddali 2,* , M. Allain 3 , X. Huang 4 , Y. S. G. Nashed 5,** , C. Jacobsen 6 , and S. O. Hruszkewycz 2, † 1 X-ray Science Division, Argonne National Laboratory, Lemont IL 60439, USA 2 Materials Science Division, Argonne National Laboratory, Lemont IL 60439, USA 3 Aix-Marseille Univ, CNRS, Centrale Marseille, Institut Fresnel, Marseille, France 4 National Synchrotron Light Source II, Brookhaven National Laboratory, Upton, NY, 11973, USA 5 Mathematics & Computer Science Division, Argonne National Laboratory, Lemont IL 60439, USA 6 Department of Physics and Astronomy, Northwestern University, Evanston, IL 60208, USA * Currently at KLA Corporation, CA (USA) ** Currently at Bristol Myers Squibb, NJ (USA) † Corresponding author: shrus@anl.gov Abstract We describe a phase-retrieval-based imaging method to directly spatially resolve the vector lattice distortions in an extended crystalline sample by explicit coupling of independent Bragg ptychography data sets into the reconstruction process. Our method addresses this multi-peak Bragg ptychography (MPBP) inverse problem by explicit gradient descent optimization of an objective function based on modeling of the probe-lattice interaction, along with corrective steps to address spurious reconstruction artifacts. Robust convergence of the optimization process is ensured by computing exact gradients with the automatic differentiation capabilities of high-performance computing software packages. We demonstrate MPBP reconstruction with simulated ptychography data mimicking diffraction from a single crystal membrane containing heterogeneities that manifest as phase discontinuities in the diffracted wave. We show the superior ability of such an optimization-based approach in removing reconstruction artifacts compared to existing phase retrieval and lattice distortion reconstruction approaches. 1 Introduction Bragg coherent diffraction imaging (BCDI) is a valuable tool to spatially resolve the lattice strain in crystalline materials at the scale of ∼10 nm by using coherent x-rays as a probe [1, 2, 3]. Bragg ptychography, the scanning variant of BCDI, is used for extended crystalline samples larger than the beam size [4, 5, 6]. Both techniques have been applied to a variety of materials science problems, such as the performance of batteries [7, 8, 9], catalytic phenomena at metal interfaces [10, 11, 12, 13], and characterization of quantum sensors [14]. These conventional BCDI methods enable the spatial resolution of a single component of the three-component elastic lattice distortion field. This component corresponds to the Bragg diffraction vector of momentum transfer that comes about via a specific orientation of the single crystal lattice of the sample with respect to the beam (one of the crystal’s Bragg conditions). Reorienting the crystal into other configurations with respect to the incident x-ray probe permits the independent components of the lattice distortion to be imaged. When three or more independent Bragg conditions can be satisfied and measured with BCDI, it is possible to unambiguously resolve the lattice displacement vector field within the sample. Recent efforts to simultaneously reconstruct all components of internal lattice distortion fields with BCDI have shown promising results with simulations [15, 16] as well as experiments [17, 18] The experimental works have employed different combinations of well-known fixed point iterative projection algorithms [19], typically in parallel reconstruction threads. The solutions of these parallel reconstructions are analyzed for desirable properties in order to seed the next generation of randomized solutions (i.e., the ‘guided’ approach using genetic algorithms [20]). All the vector field reconstruction demonstrations referenced above explicitly minimize the discrepancy between the bulk distortion field and the computed phase from conventional phase retrieval. A recent alternate approach seeks to directly and simultaneously minimize the discrepancy in the measured and estimated coherent diffraction signals in 1" 2312.14915v1,"PoseGen: Learning to Generate 3D Human Pose Dataset with NeRF Mohsen Gholami, Rabab Ward, Z. Jane Wang University of British Columbia, Vancouver, Canada {mgholami, rababw, zjanew}@ece.ubc.ca Abstract This paper proposes an end-to-end framework for generating 3D human pose datasets using Neural Radiance Fields (NeRF). Public datasets generally have limited diversity in terms of human poses and camera viewpoints, largely due to the resource-intensive nature of collecting 3D human pose data. As a result, pose estimators trained on public datasets significantly underperform when applied to unseen out-ofdistribution samples. Previous works proposed augmenting public datasets by generating 2D-3D pose pairs or rendering a large amount of random data. Such approaches either overlook image rendering or result in suboptimal datasets for pretrained models. Here we propose PoseGen, which learns to generate a dataset (human 3D poses and images) with a feedback loss from a given pre-trained pose estimator. In contrast to prior art, our generated data is optimized to improve the robustness of the pre-trained model. The objective of PoseGen is to learn a distribution of data that maximizes the prediction error of a given pre-trained model. As the learned data distribution contains OOD samples of the pre-trained model, sampling data from such a distribution for further fine-tuning a pre-trained model improves the generalizability of the model. This is the first work that proposes NeRFs for 3D human data generation. NeRFs are data-driven and do not require 3D scans of humans. Therefore, using NeRF for data generation is a new direction for convenient user-specific data generation. Our extensive experiments show that the proposed PoseGen improves two baseline models (SPIN and HybrIK) on four datasets with an average 6% relative improvement. Introduction 3D human pose and mesh estimation, the task of reconstructing human pose in 3D space given a 2D image of the person, is an ill-posed problem, and many data-driven approaches using deep learning were recently proposed (Liu, Kortylewski, and Yuille 2023; Gholami et al. 2022a; Li et al. 2022). A dataset covering the distribution of possible human poses, global orientation, appearance, and other attributes would be large and difficult to capture in practice. In contrast to vision tasks such as classification and object detection, 3D human pose labels can not be obtained by manual annotation and require an expensive setting for accurate measuring. Therefore, there are limited public datasets Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Train Data 3DPW Test Data AGORA Figure 1: There is a domain gap between the training data used for training pose estimators and in-the-wild images (OOD samples). Therefore, pre-trained models underperform when applied to OOD samples. and these datasets generally have limited diversity. Unfortunately, most pose estimation models that are trained on public datasets underperform when applied to the out-ofdistribution (OOD) samples or samples in the tails of the distribution. Figure 1 shows the domain gap between training and test data. To address the above-mentioned concern, prior work proposed augmenting the publicly available datasets by generating 2D-3D human pose pairs (Gong, Zhang, and Feng 2021; Gholami et al. 2022b; Li et al. 2020; Li and Pun 2023) or by rendering synthetic images in more variant poses and appearances (Patel et al. 2021; Black et al. 2023). Augmenting a 3D dataset in the 2D-3D pose space is useful merely for the models that accept 2D poses as input. Therefore, the majority of 3D pose estimators that accept RGB images as input (not 2D pose) can not be fine-tuned with augmented 2D-3D pose pairs. AGORA (Patel et al. 2021) and BED-" 2312.14924v1,"Journal of Machine Learning Research xx (20xx) 1-21 Submitted 11/23; Revised x/xx; Published x/xx 1 2 Training Convolutional Neural Networks with the Forward-Forward algorithm Riccardo Scodellaro 1,∗,† Ajinkya Kulkarni 1 , † Frauke Alves 1,2,3 Matthias Schröter 3,4,∗ riccardo.scodellaro@mpinat.mpg.de ajinkya.kulkarni@mpinat.mpg.de falves@gwdg.de matthias.schroeter@mpinat.mpg.de 1 Translational Molecular Imaging Max Planck Institute for Multidisciplinary Sciences Hermann-Rein-Straße 3, 37075 Göttingen, Germany. 2 Department of Haematology and Medical Oncology University Medical Center Göttingen Robert-Koch-Straße 40, 37075 Göttingen, Germany 3 Institute for Diagnostic and Interventional Radiology University Medical Center Göttingen Robert-Koch-Straße 40, 37075 Göttingen, Germany 4 subject to approval, some other place in Göttingen, Germany Editor: XXX Abstract The recent successes in analyzing images with deep neural networks are almost exclusively achieved with Convolutional Neural Networks (CNNs). The training of these CNNs, and in fact of all deep neural network architectures, uses the backpropagation algorithm where the output of the network is compared with the desired result and the difference is then used to tune the weights of the network towards the desired outcome. In a 2022 preprint, Geoffrey Hinton suggested an alternative way of training which passes the desired results together with the images at the input of the network. This so called Forward Forward (FF) algorithm has up to now only been used in fully connected networks. In this paper, we show how the FF paradigm can be extended to CNNs. Our FF-trained CNN, featuring a novel spatially-extended labeling technique, achieves a classification accuracy of 99.0% on the MNIST hand-written digits dataset. We show how different hyperparameters affect the performance of the proposed algorithm and compare the results with CNN trained with the standard backpropagation approach. Furthermore, we use Class Activation Maps to investigate which type of features are learnt by the FF algorithm. Keywords: Forward-Forward, keyword two, keyword three 1. * corresponding authors 2. † equal contribution ©20xx Scodellaro, Kulkarni, Alves and Schröter. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/vxx/21-0000.html." 2312.14927v1,"Model Reduction to Spectral Submanifolds in Non-Smooth Dynamical Systems Leonardo Bettini, Mattia Cenedese, George Haller ∗ Institute for Mechanical Systems, ETH Zürich, Leonhardstrasse 21, 8092 Zürich, Switzerland Abstract We develop a model reduction technique for non-smooth dynamical systems using spectral submanifolds. Specifically, we construct low-dimensional, sparse, nonlinear and non-smooth models on unions of slow and attracting spectral submanifolds (SSMs) for each smooth subregion of the phase space and then properly match them. We apply this methodology to both equation-driven and data-driven problems, with and without external forcing. Keywords: Invariant manifolds, Reduced-order modeling, Spectral submanifolds, Piecewise smooth systems 1. Introduction The ever increasing need to reduce complex, highdimensional dynamical systems to simple, low-dimensional models has yielded a number of different reduction techniques (see Benner et al. [2], Rowley and Dawson [27], Ghadami and Epureanu [12], Brunton et al. [3], Taira et al. [32], Touzé et al. [33] for recent reviews). Here, we focus on an extension of one of these methods, spectral submanifold (SSM) reduction, to non-smooth mechanical systems. Defined originally for smooth dynamical systems by Haller and Ponsioen [14], a primary SSM is the smoothest invariant manifold that is tangent to, and has the same dimension as, a spectral subspace of the linearized system at a steady state. As such, SSMs mathematically formalise and extend the original idea of nonlinear normal modes (NNMs) introduced in seminal work by Shaw and Pierre [28, 29] and Shaw et al. [30] (see Mikhlin and Avramov [25] for a recent review). The existence, uniqueness and persistence of SSMs in autonomous and non-autonomous systems have been proven whenever no resonance relationship holds between the linearized spectrum within the spectral subspace and outside that subspace (Haller and Ponsioen [14], Cabré et al. [4], Haro and de la Llave [15]). The primary SSM tangent to the spectral subspace spanned by the slowest linear modes attracts all nearby trajectories and hence its internal dynamics is an ideal, mathematically justified nonlinear reduced model. Recent work has revealed the existence of an additional, infinite family of secondary (or fractional) SSMs near the primary one in C ∞ dynamical systems (Haller et al. [13]). ∗ Corresponding author. Email address: georgehaller@ethz.ch (George Haller) Preprint submitted to International Journal of Non-Linear Mechanics Fractional SSMs are also tangent to the same spectral subspace as their primary counterpart, but they are only finitely many times differentiable. Accordingly, they can only be approximated via fractional-powered polynomial expansions. When the equations of the system are known, its SSMs can be approximated via Taylor expansion at the stationary state using the SSMTool algorithm developed by Jain and Haller [17], Jain et al. [18]. SSMTool can compute a low-dimensional reduced order model even for systems with hundreds of thousands degrees of freedom. The SSM-reduced models can in turn predict the response of the system to small harmonic forcing (Jain and Haller [17], Jain et al. [19], Ponsioen et al. [26]) and its bifurcations (Li and Haller [23], Li et al. [24]). In the absence of governing equations, SSMs and their reduced dynamics can also be approximated from data using the SSMLearn algorithm developed in Cenedese et al. [7]. Such data-driven SSM-reduced models have been found to capture the essentially nonlinear features of autonomous systems and also accurately predict nonlinear response under additional external forcing (Cenedese et al. [7, 8, 9]). A more recent variant of the same algorithm, fastSSM, provides a simplified, faster SSM-reduction procedure with somewhat reduced accuracy (Axås et al. [1]). Application of these methodologies has proven successful in a variety of examples, both numerical and experimental, ranging from beam oscillations and sloshing in water tank to structural vibrations and transition in shear flows (Cenedese et al. [7, 8], Axås et al. [1], Kaszás et al. [20]). As most model reduction methods, SSM reduction also assumes that the full system to be reduced is sufficiently many times differentiable. In the absence of the required" 2312.14928v1,"Family Puzzle, Framing Topology, c − = 24 and 3(E 8 ) 1 Conformal Field Theories: 48 = 45 = 24 =3 16 15 8 Juven Wang 1, ∗ 1 Center of Mathematical Sciences and Applications, Harvard University, MA 02138, USA Family Puzzle or Generation Problem demands an explanation of why there are 3 families or generations of quarks and leptons in the Standard Model of particle physics. Here we propose a novel solution — the multiple of 3 families of 16 Weyl fermions (namely (N f = 3) × 16) in the 3+1d spacetime dimensions are topologically robust due to constraints rooted in profound mathematics (such as Hirzebruch signature and Rokhlin’s theorems, and cobordism) and derivable in physics (such as chiral edge states, quantized thermal Hall conductance, and gravitational Chern-Simons theory), which holds true even forgetting or getting rid of any global symmetry or gauge structure of the Standard Model. By the dimensional reduction through a sequence of sign-reversing mass domain wall of domain wall and so on, we reduce the Standard Model fermions to obtain the (N f = 3) × 16 multiple of 1+1d Majorana-Weyl fermion with a total chiral central charge c − = 24. Effectively via the fermionization-bosonization, the 1+1d theory becomes 3 copies of c − = 8 of (E 8 ) 1 conformal field theory, living on the boundary of 3 copies of 2+1d E 8 quantum Hall states. Based on the framing anomaly-free c − = 0 mod 24 modular invariance, the framed bordism and string bordism Z 24 class, the 2-framing and p 1 -structure, the w 1 -p 1 bordism Z 3 class constraints, we derive the 48 = 24 = 3)Z. The dimensional reduction process, although not family number constraint N f ∈ ( 16 8 necessary, is sufficiently supported by the Z 16 class Smith homomorphism. We also comment on the 45 = 3 relation: the 3 families of 15 Weyl-fermion Standard Model vacuum where the absence of 15 some sterile right-handed neutrinos is fulfilled by additional topological field theories or conformal field theories in Ultra Unification. CONTENTS I. Introduction and Summary A. Family Puzzle B. Background Information 2 2 2 II. Physics Model Setup A. General Arguments: c − = 24 and 3(E 8 ) 1 Conformal Field Theories B. Mass Domain Wall of Domain Wall Reduction Toy Model 3 4 6 III. From 6d Anomaly Polynomial, 5d Convertible Field Theory, 4d Anomaly of the SM to 3d Gravitational Chern-Simons Term A. Spin × Z F2 U(1) Q−N c L ≡ Spin c and Spin × Z F2 Z 4,X with a vector U(1) Q−N c L and a chiral X 8 9 B. Another Spin × Z F2 U(1) ≡ Spin c with a chiral U(1): 3(E 8 ) 1 quantum Hall states C. Index Theorem and (Gravitational) Chern-Simons: Framing, String, 2-Framing, and w 1 -p 1 structures D. Cobordism constraints of Framing, String, 2-Framing, and w 1 -p 1 structures IV. Conclusion and Comparison 10 10 12 12 Acknowledgments 13 References 14 ∗ jw@cmsa.fas.harvard.edu; http://sns.ias.edu/˜juven/" 2312.14941v1,"Multi-Criteria Client Selection and Scheduling with Fairness Guarantee for Federated Learning Service Meiying Zhang ∗ , Huan Zhao ∗ , Sheldon Ebron ∗ , Ruitao Xie † , Kan Yang ∗ ∗ Dept. of Computer Science, University of Memphis, USA. {mzhang6, hzhao2, sebron, kan.yang}@memphis.edu † College of Computer Science and Software Engineering, Shenzhen University, China. drtxie@gmail.com Abstract—Federated Learning (FL) enables multiple clients to train machine learning models collaboratively without sharing the raw training data. However, for a given FL task, how to select a group of appropriate clients fairly becomes a challenging problem due to budget restrictions and client heterogeneity. In this paper, we propose a multi-criteria client selection and scheduling scheme with a fairness guarantee, comprising two stages: 1) preliminary client pool selection, and 2) per-round client scheduling. Specifically, we first define a client selection metric informed by several criteria, such as client resources, data quality, and client behaviors. Then, we formulate the initial client pool selection problem into an optimization problem that aims to maximize the overall scores of selected clients within a given budget and propose a greedy algorithm to solve it. To guarantee fairness, we further formulate the per-round client scheduling problem and propose a heuristic algorithm to divide the client pool into several subsets such that every client is selected at least once while guaranteeing that the ‘integrated’ dataset in a subset is close to an independent and identical distribution (iid). Our experimental results show that our scheme can improve the model quality especially when data are non-iid. Keywords—Federated Learning, Client Selection, Scheduling, Fairness, Behavior, Resource, Data Quality I. Client plications (e.g., FLaaS [16]). In an FL service system, FL task requesters (i.e., customers) send different types of FL tasks to the FL service provider with some requirements (e.g., datasets and budgets). The FL service provider will recruit an appropriate group of clients who can satisfy the task requirements. Due to the heterogeneity of clients (including computing and communication resources, dataset size, and data quality), different clients may ask for different per-round prices for an FL task. Moreover, even if a client is selected for an FL task, it does not mean the client is able to participate in all the FL rounds because a) only a subset of clients will be selected from the client pool to participate in an individual FL round in order to reduce the communication and computation costs and b) a client may be unavailable during several FL rounds due to conflicting scheduling, out-of-battery, unstable networking environments. This makes the client selection a challenging problem in the FL service. Specifically, a promising client selection solution should consider both initial client pool selection and client selection in each FL round with the following requirements: • Model Quality The main goal of the client selection is to maximize the quality of the final model by selecting well-performed clients within the total budget. However, the actual performance is unknown during the initial client pool selection for an FL task. Moreover, many existing client selection algorithms [1], [11], [18], [23], [29] only focus on the per-round client selection for a given FL task. • Fairness The fairness consists of two parts: 1) each client who satisfied the FL task requirement has the chance to be selected into the initial client pool for an FL task; and 2) each client has a similar chance to be selected during a given FL task. Many existing client selection methods may prefer a specific type of clients (e.g., with high computing/communication resources [1], [23], low non-iid data distribution [19], [30], or high model performance [6]), which makes it unfair for those clients whose resource or data quality may not be the best, especially for FL services. In [13], the authors consider fairness during the client selection and aim to minimize the average model exchange time subjecting to long-term fairness guarantee and client availability. I NTRODUCTION In traditional machine learning, the training data are usually hosted by a centralized server (e.g., cloud server) running the learning algorithm or shared to a set of participating nodes for distributed learning [21]. However, in many applications, the data cannot be shared to the cloud or other participating nodes due to privacy or legal restrictions, especially when multiple organizations are involved. Federated Learning (FL) enables multiple parties to train machine learning models collaboratively without sharing the raw training data [15], [20]. All parties train the model on their local datasets and send the local model updates to an aggregator, who will aggregate all the local model updates and send the global model to each client for the next round of training until converge. Due to the privacy-preserving nature and the decentralized structure, the FL framework can be widely applied in many AI-driven applications where data are sensitive or legally restricted, such as smart healthcare [5], [24], smart transportation [22], [26], smart finance [2], [10], and smart life [12], [27]. However, when deploying FL in these applications, it is challenging to find a group of clients who have the corresponding datasets and are willing to participate in an FL task. To cope with this challenge, we envision an FL service provider that will provide FL as a service for different ap- In this paper, we propose a multi-criteria client selection and scheduling scheme with a fairness guarantee for FL service which consists of two stages: 1) selecting an initial client pool for each FL task by mapping requirements from the FL requester with the client capabilities (e.g., resources," 2312.14962v1,"NT@UW-23-17 LA-UR-23-33343 Non-Markovian character and irreversibility of real-time quantum many-body dynamics Aurel Bulgac, 1 Matthew Kafker, 1 Ibrahim Abdurrahman, 2 and Ionel Stetcu 2 1 2 Department of Physics,University of Washington, Seattle, WA 98195–1560, USA Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545, USA (Dated: December 27, 2023) The presence of pairing correlations within the time-dependent density functional theory (TDDFT) extension to superfluid systems, is tantamount to the presence of a quantum collision integral in the evolution equations, which leads to an obviously non-Markovian behavior of the single-particle occupation probabilities, unexpected in a traditional quantum extension of kinetic equations. The quantum generalization of the Boltzmann equation, based on a collision integral in terms of phase-space occupation probabilities, is the most used approach to describe nuclear dynamics and which by construction has a Markovian character. By contrast, the extension of TDDFT to superfluid systems has similarities with the Baym and Kadanoff kinetic formalism, which however is formulated with much more complicated evolution equations with long-time memory terms and non-local interactions. The irreversibility of quantum dynamics is properly characterized using the canonical wave functions/natural orbitals, and the associated canonical occupation probabilities, which provide the smallest possible representation of any fermionic many-body wave function. In this basis, one can evaluate the orbital entanglement entropy, which is an excellent measure of the non-equilibrium dynamics of an isolated system. To explore the phenomena of memory effects and irreversibility, we investigate the use of canonical wave functions/natural orbitals in nuclear many-body calculations, assessing their utility for static calculations, dynamics, and symmetry restoration. As the number of single-particle states is generally quite large, it is highly desirable to work in the canonical basis whenever possible, preferably with a cutoff. We show that truncating the number of canonical wave functions can be a valid approach in the case of static calculations, but that such a truncation is not valid for time-dependent calculations, as it leads to the violation of continuity equation, energy conservation, and other observables, as well as an inaccurate representation of the dynamics. Indeed, in order to describe the dynamics of a fissioning system within a TDDFT framework all the canonical states must be included in the calculation. Finally, we demonstrate that the canonical representation provides a very efficient basis for performing symmetry projections. I. INTRODUCTION We address the question of whether nuclear dynamics has a Markovian character or not, and the related aspect, whether the dynamics of a typically excited isolated nucleus is irreversible and how to describe its irreversibility. As we will show, the main technical tool needed to address these issues is the set of canonical wave functions or natural orbitals. Canonical wave functions were introduced in 1957 by Bardeen, Cooper, and Schrieffer to describe superconductors [1]. A year earlier in 1956 Löwdin introduced a very similar set of single-particle wave functions, which he called natural orbitals [2–6]. It was proven [2–4] that the canonical wave functions/natural orbitals can serve as the most economical way to represent any many-body wave function as a sum over Slater determinants, each one of which obviously describes a system of N independent fermions. The sum of many such Slater determinants however describes in general a strongly interacting system of particles. After determining the set of canonical wave functions/natural orbitals one can extract a unique and well-defined set of single-particle occupation probabilities, known as the canonical occupation probabilities, which allows one to evaluate the orbital entan- glement entropy of the many-body wave function, which serves as a basis-independent characterization of its complexity. While such a set of single-particle wave functions is likely the best way to establish the complexity of a many-body wave function of an interacting system, the use of such set become problematic for time-dependent or non-equilibrium situations. The reason is quite obvious: due to particle-particle interactions the singleparticle occupation probabilities are time-dependent, and so are also the canonical wave functions/natural orbitals, and so the appealing first thought that one can use the canonical wave functions defined at the initial time in time-dependent problems proves false right away, even after one time step. Bardeen et al. [1] (BCS) were the first to introduce a highly correlated many-body wave function to describe fermionic superfluids, immediately followed by similar suggestions due to Bogoliubov [7] and Valatin [8]. The BCS wave function has the form ∣Φ⟩ = ∏ (u k + v k a † k a † )∣0⟩, k k ∣u k ∣ 2 + ∣v k ∣ 2 = 1, ϕ k (ξ) = ⟨ξ∣a † k ∣0⟩, ϕ k (ξ) = ⟨ξ∣a † ∣0⟩, k (1) (2) where a † k a † are single-particle creation operators for k" 2312.14973v1,"© 2023 IEEE. This is the author’s version of the article that has been published in IEEE Transactions on Visualization and Computer Graphics. The final version of this record is available at: xx.xxxx/TVCG.201x.xxxxxxx/ Interactive Visualization of Time-Varying Flow Fields Using Particle Tracing Neural Networks Mengjiao Han, Jixian Li, Sudhanshu Sane, Shubham Gupta, Bei Wang, Steve Petruzza, Chris R. Johnson Fig. 1: Our web-based visualization interface, integrated with our particle tracing neural networks, enables users to visualize and explore large 3D time-varying flow fields interactively. The interface offers 3D visualization of pathlines and user-uploaded scalar fields, along with a variety of configuration options for seed placement and rendering parameter adjustments. In this example, the model trained on the ScalarFlow dataset was used to display pathlines, with the FTLE of the dataset serving as the scalar field defining the background volume and pathlines’ color mapping. The training dataset was generated using 100,000 seeds placed in the injection area of [44, 64] × [0, 7] × [38, 58] over 90 time steps. Three deep learning models, each trained for 30 time steps, were utilized in this case. It took one second to load the models and 2.7 seconds to infer 300 pathlines displayed in the visualization using a dual-socket workstation equipped with an NVIDIA Titan RTX GPU. The trained model’s total storage size is 78.6 MB, further reducing the space consumption required for saving the original flow maps by 46 times. Abstract— Lagrangian representations of flow fields have gained prominence for enabling fast, accurate analysis and exploration of time-varying flow behaviors. In this paper, we present a comprehensive evaluation to establish a robust and efficient framework for Lagrangian-based particle tracing using deep neural networks (DNNs). Han et al. (2021) first proposed a DNN-based approach to learn Lagrangian representations and demonstrated accurate particle tracing for an analytic 2D flow field. In this paper, we extend and build upon this prior work in significant ways. First, we evaluate the performance of DNN models to accurately trace particles in various settings, including 2D and 3D time-varying flow fields, flow fields from multiple applications, flow fields with varying complexity, as well as structured and unstructured input data. Second, we conduct an empirical study to inform best practices with respect to particle tracing model architectures, activation functions, and training data structures. Third, we conduct a comparative evaluation against prior techniques that employ flow maps as input for exploratory flow visualization. Specifically, we compare our extended model against its predecessor by Han et al. (2021), as well as the conventional approach that uses triangulation and Barycentric coordinate interpolation. Finally, we consider the integration and adaptation of our particle tracing model with different viewers. We provide an interactive web-based visualization interface by leveraging the efficiencies of our framework, and perform high-fidelity interactive visualization by integrating it with an OSPRay-based viewer. Overall, our experiments demonstrate that using a trained DNN model to predict new particle trajectories requires a low memory footprint and results in rapid inference. Following the best practices for large 3D datasets, our deep learning approach is shown to require approximately 46 times less memory while being more than 400 times faster than the conventional methods. Index Terms—Flow visualization, Lagrangian-based particle tracing, deep learning, neural networks, scientific machine learning 1 I NTRODUCTION Time-varying flow visualization is useful for validating, exploring, and gaining insight from computational fluid dynamics simulations. It typically requires the computation and rendering of a large number of particle trajectories, such as pathlines and finite-time Lyapunov exponents (FTLEs), which can be computationally expensive and memory intensive. Furthermore, these computational challenges limit the interactivity of flow visualization. To address these challenges, conventional approaches decouple the particle advection and the rendering process to accelerate the visualization performance. For instance, pathlines are • Mengjiao Han is with the University of Utah. E-mail: jcarberry@example.com • Jixian Li is with the University of Utah. E-mail: jixianli@sci.utah.edu • Sudhanshu Sane is with Luminary Cloud. E-mail: ssane@luminarycloud.com. • Shubham Gupta is with the Utah State University. • Bei Wang is with the University of Utah. E-mail: beiwang@sci.utah.edu • Steve Petruzza is with the Utah State University. • Chris R. Johnson is with the University of Utah. obtaining reprints of this article, please send e-mail to: reprints@ieee.org. Digital Object Identifier: xx.xxxx/TVCG.201x.xxxxxxx Manuscript received xx xxx. 201x; accepted xx xxx. 201x. Date of Publication xx xxx. 201x; date of current version xx xxx. 201x. For information on 1" 2312.14983v1,"A Literature Review of Energy Justice Weihang Ren 1 , Yongpei Guan 1 , Feng Qiu 2,* , Todd Levin 2 , and Miguel Heleno 3 1 Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL, USA 2 Energy Systems Division, Argonne National Laboratory, Lemont, IL, USA * fqiu@anl.gov 3 Lawrence Berkeley National Lab December 27, 2023 Abstract Energy justice, at the intersection of energy and societal ethics, studies the origins, quantification, and resolution of persistent and potential inequities within the energy sector, serving as a foundational pillar for societal harmony. In this review, we overview the historical and modern definitions of energy equity and frameworks of energy justice. We highlight the tools adopted to measure equity in the energy context, unveiling multifaceted inequities that permeate global energy landscapes. We discuss the limitations of prevalent metrics such as the Gini coefficient and Generalized Entropy Indices in the evaluation of energy justice concerns. Finally, we analyze publications that examined current practices and proposed improving methods towards a more equitable energy market for the society from policy, planning, and operation perspectives. Keywords— energy justice, energy equity, energy burden, inequality In the last three decades, energy justice has emerged as a subject of considerable discourse among research communities and policy makers. Energy justice refers to the fair distribution of benefits and burdens associated with energy production, distribution, and consumption. It encompasses the idea that all individuals, regardless of socioeconomic status, race, or geographic location, should have equal access to the benefits of clean and affordable energy, as well as a fair share of the costs and risks associated with energy development. The understanding, definition, measurements, priorities on energy justice are also evolving, especially in recent years as renewable penetration and electric vehicle adaption surge, power market reform continues, and new business models emerge. These latest development in energy sector, plus significant disruptions by recent pandemics and extreme weather events, have created more challenges for energy justice. In a significant stride towards this goal, the 2021 Biden administration’s Justice40 Initiative [1] aims to deliver at least 40% of the overall benefits of relevant federal investments in climate and clean energy to disadvantaged communities. Notably, the number of publications on energy justice during 2019-2021 (1003) exceeds the total number of publications in the previous three decades (879) [2], as shown in Figure 1. To better understand and address energy justice in this complex and dynamic environment, in this review, we delve into the historical evolution of energy justice and equity definitions and summarize prevalent metrics employed to reveal the various forms of energy inequities around the world, highlighting efforts in policies, grid planning, and operations that dedicated to ushering justice into energy systems. 1 Energy Justice and Equity in Government Definitions Qiu: please comment Energy justice and energy equity are crucial concepts affecting society in many ways. Before delving into the broad academic research on them, we start with the government definitions that reflect the comprehensive ideas behind these terms. 1.1 Energy Justice As energy is an indispensable branch of the environment, there was no formal government definition of energy justice alone in the 20th century, instead, the energy justice concept was covered under the umbrella of environmental justice. The latter was provided in 1994 during President Clinton’s administration and defined 1" 2312.14999v1,"Leveraging Habitat Information for Fine-grained Bird Identification Tin Nguyen 1 * Anh Nguyen 2 Auburn University ttn0011@auburn.edu, anh.ng8@gmail.com Test Accuracy on NABirds Abstract Original Images Traditional bird classifiers mostly rely on the visual characteristics of birds. Some prior works even train classifiers to be invariant to the background, completely discarding the living environment of birds. Instead, we are the first to explore integrating habitat information, one of the four major cues for identifying birds by ornithologists, into modern bird classifiers. We focus on two leading model types: (1) CNNs and ViTs trained on the downstream bird datasets; and (2) original, multi-modal CLIP [31]. Training CNNs and ViTs with habitat-augmented data results in an improvement of up to +0.83 and +0.23 points on NABirds and CUB-200, respectively. Similarly, adding habitat descriptors to the prompts for CLIP yields a substantial accuracy boost of up to +0.99 and +1.1 points on NABirds and CUB-200, respectively. We find consistent accuracy improvement after integrating habitat features into the image augmentation process and into the textual descriptors of vision-language CLIP classifiers. Code is available at: https://anonymous.4open. science/r/reasoning-8B7E/. Habitat Augmented Images Habitat Augmented Data 81.06 Original Data 80.23 Zero-shot Accuracy on NABirds (Ours) Visual [3] + Habitat [3] Visual [3] {class name}, which has an orange-yellow belly with a black head. {class name}, which lives in dessert, cactus flat. {class name}, which has an orange-yellow with a black head. CLIP [31] A photo of a {class name}. Visual + Habitat Description 57.97 Visual Description 56.98 Class names 56.07 Figure 1. Top: CNN trained on with habitat-augmented data improves accuracy by +0.83 pts over original data. Bottom: Adding habitat descriptions to CLIP boosts zero-shot accuracy, exceeding visually-based or class name-only descriptions by +0.99 pts and +1.90 pts, respectively (details in Tab. 1, 3, and 4). Note that, both models are tested on NABirds. 1. Introduction Bird identification, despite recent progress, continues to be challenging, particularly in distinguishing between species with similar appearances, such as various sparrow species [40]. A promising feature that can address the issue is habitat, which is recognized as one of four keys to identifying birds by bird watchers and ornithologists [5, 6, 11]. This is exemplified by species like the Scott Oriole and Evening Grosbeak (Fig. 2), which are visually similar but inhabit distinct environments: The former nest and forage in deserts or cactus flats, whereas the latter breed in pine-oak, pinyonjuniper, and aspen forests [3]. Early works focus on finding the most discriminative features of birds, giving rise to part-based models [22, 45, 48]. More recent efforts have expanded to include additional information like geolocation [10, 24, 37] and textual descriptions [12, 20] to enhance identification accuracy. [43] made preliminary efforts to emphasize the significance of background for classification. Additionally, other researchers have approached the problem by focusing on habitat classification [16, 42]. However, to our best knowledge, no prior works explored how to leverage habitat information to improve bird identification accuracy. Our study addresses this research gap by introducing novel methodologies for integrating habitat information into both vision-only and vision-language models, broadening the scope of bird identification techniques. For vision-only models, we introduce a technique of superimposing bird images onto their relevant habitat backgrounds, creating habitat-augmented data for training purposes. In 1" 2312.15006v1,"A SSESSING THE I MPACT OF P ROMPTING , P ERSONA , AND C HAIN OF T HOUGHT M ETHODS ON C HAT GPT’ S A RITHMETIC C APABILITIES Yuhao Chen, Chloe Wong, Hanwen Yang, Juan Aguenza, Sai Bhujangari, Benthan Vu, Xun Lei, Amisha Prasad, Manny Fluss, Eric Phuong, Minghao Liu, James Davis University of California, Santa Cruz Santa Cruz {ychen514, cwong771}@ucsc.edu A BSTRACT This study critically evaluates the mathematical proficiency of OpenAI’s language model, ChatGPT, by juxtaposing its default computational capabilities against the efficiency of three prescriptive methods: strategic prompting, persona implementation, and the Chain of Thought approach. The evaluation harnessed the diverse and extensive problem sets from the MATH, GSM8K, and MMLU datasets, which encompassing a broad spectrum of mathematical conundrums and levels of complexity. A sophisticated grading script was designed to determine the efficacy of these interventions in enhancing the model’s mathematical precision. Contrary to expectations, our empirical analysis revealed that none of the trialed methods substantially improved ChatGPT’s baseline performance. In some cases, these interventions inadvertently disrupted the model’s response generation. This investigation concluded that while the pursuit of innovative strategies for augmenting language model performance remains crucial, the specific methods examined within this study did not induce significant improvements in ChatGPT’s computational aptitude. These findings underscore the importance of further comprehensive research and exploration of novel techniques to enhance the precision and dependability of such models across diverse domains. Keywords ChatGPT · MATH · LLM 1 Introduction Large language models, such as ChatGPT, represent a transformative development in the field of Machine Learning. Demonstrating remarkable proficiency in generating coherent responses, these models effectively address intricate challenges, including mathematical problem-solving. To improve accuracy, researchers and practitioners have explored various methodologies, with prompting, persona, and Chain of Thoughts emerging as significant strategies aimed at augmenting ChatGPT’s performance. This study’s primary objective was to benchmark ChatGPT’s default arithmetic capabilities and compare it to the performance of ChatGPT when utilizing prompting, persona, and Chain of Thoughts methods. Prompting involves providing specific instructions or questions to guide a language model’s response generation. Persona refers to the creation of a fictional character with a distinct personality, whose perspective is utilized to generate responses. Chain of Thoughts involves the sequential connection of ideas or concepts to guide response generation. To assess the arithmetic capabilities of ChatGPT, we used three distinct datasets: MATH[1], GSM8K[2], and MMLU[3]. Each of these datasets presented a range of mathematical problems across multiple domains and difficulty levels." 2312.15018v1,"Annu. Rev. Earth Planet. Sci. 2023.51:671-695. Downloaded from www.annualreviews.org Access provided by 2600:8800:6215:7500:4526:b649:b5dd:a4b on 12/22/23. See copyright for approved use. Annual Review of Earth and Planetary Sciences The Role of Giant Impacts in Planet Formation Travis S.J. Gabriel 1,∗ and Saverio Cambioni 2,∗ 1 Astrogeology Science Center, U.S. Geological Survey, Flagstaff, AZ, USA; email: tgabriel@usgs.gov 2 Department of Earth, Atmospheric and Planetary Sciences, Massachusetts Institute of Technology, Cambridge, MA, USA; email: cambioni@mit.edu Annu. Rev. Earth Planet. Sci. 2023. 51:671–95 Keywords The Annual Review of Earth and Planetary Sciences is online at earth.annualreviews.org collisions, giant impacts, planet formation https://doi.org/10.1146/annurev-earth-031621- 055545 Abstract This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. See credit lines of images or other third-party material in this article for license information. ∗ The authors contributed equally to this review, and their order was determined by coin flip Planets are expected to conclude their growth through a series of giant impacts: energetic, global events that significantly alter planetary composition and evolution. Computer models and theory have elucidated the diverse outcomes of giant impacts in detail, improving our ability to interpret collision conditions from observations of their remnants. However, many open questions remain, as even the formation of the Moon—a widely suspected giant-impact product for which we have the most information—is still debated. We review giant-impact theory, the diverse nature of giant-impact outcomes, and the governing physical processes. We discuss the importance of computer simulations, informed by experiments, for accurately modeling the impact process. Finally, we outline how the application of probability theory and computational advancements can assist in inferring collision histories from observations, and we identify promising opportunities for advancing giant-impact theory in the future. Giant impacts exhibit diverse possible outcomes leading to changes in planetary mass, composition, and thermal history depending on the conditions. ■ Improvements to computer simulation methodologies and new laboratory experiments provide critical insights into the detailed outcomes of giant impacts. ■ When colliding planets are similar in size, they can merge or escape one another with roughly equal probability, but with different effects on their resulting masses, densities, and orbits. ■ 671" 2312.15029v1,"Spectrally Decomposed Diffusion Models for Generative Turbulence Recovery Mohammed Sardar School of Engineering The University of Manchester mohammed.sardar@manchester.ac.uk Małgorzata J. Zimoń 1,2 1 IBM Research Europe 2 School of Mathematics, The University of Manchester Alex Skillen School of Engineering The University of Manchester Samuel Draycott School of Engineering The University of Manchester Alistair Revell School of Engineering The University of Manchester Abstract We investigate the statistical recovery of missing physics and turbulent phenomena in fluid flows using generative machine learning. Here we develop a two-stage super-resolution method using spectral filtering to restore the high-wavenumber components of a Kolmogorov flow. We include a rigorous examination of generated samples through the lens of statistical turbulence. By extending the prior methods to a combined super-resolution and conditional high-wavenumber generation, we demonstrate turbulence recovery on a 8× upsampling task, effectively doubling the range of recovered wavenumbers. 1 Introduction Numerical approaches to fluid dynamics typically require a compromise between computational accuracy and tractability. The range of length scales in turbulence means that lower-fidelity approaches necessarily lose some characteristics of a flow, while directly solving the governing equations remains computationally infeasible in most cases. Developments in machine learning to increase image resolution and recover missing details present us with generative super-resolution methods, which may be used to recover small-scale turbulent structures from fields produced by lower-fidelity methods. However, despite efforts to capture all scales through super-resolution (SR), small lengthscale turbulent structures remain elusive. Turbulence super-resolution considers the recovery of turbulent structures from lower-resolution fields. Often in low-resolution fields, the sub-grid scale stresses act to alter the resolved field, obscuring high-frequency turbulence information and changing the trajectory of turbulence evolution. As a result, the solution field is not simply a low-pass filtered version of the high-fidelity field. This can make it difficult to infer useful information regarding the impact of turbulence on the resolved fields. Fukami et al. [1] established that non-generative convolutional methods can be used to super-resolve turbulent flow fields, by exploiting the ability of Convolutional Neural Networks (CNNs) to learn spatial correlations. Their analysis of vorticity distributions and spectra in the reconstructed flows showed that there are limitations to this approach, with many super-resolved samples deviating substantially from the reference Direct Numerical Simulation (DNS). This may be attributed to the fact that CNNs in SR produce blurred images without sharp detail. Attempts to address this were made by Liu et al. [2], by including a temporal component of the data in their super-resolution method. Taking contiguous-in-time snapshots of turbulence as training samples allows for a CNN to Preprint. Under review." 2312.15036v1,"SODA: Protecting Proprietary Information in On-Device Machine Learning Models Akanksha Atrey 1 , Ritwik Sinha 2 , Saayan Mitra 2 , Prashant Shenoy 1 1 University of Massachusetts Amherst, 2 Adobe Research aatrey@cs.umass.edu,{risinha,smitra}@adobe.com,shenoy@cs.umass.edu ABSTRACT The growth of low-end hardware has led to a proliferation of machine learning-based services in edge applications. These applications gather contextual information about users and provide some services, such as personalized offers, through a machine learning (ML) model. A growing practice has been to deploy such ML models on the user’s device to reduce latency, maintain user privacy, and minimize continuous reliance on a centralized source. However, deploying ML models on the user’s edge device can leak proprietary information about the service provider. In this work, we investigate on-device ML models that are used to provide mobile services and demonstrate how simple attacks can leak proprietary information of the service provider. We show that different adversaries can easily exploit such models to maximize their profit and accomplish content theft. Motivated by the need to thwart such attacks, we present an end-to-end framework, SODA, for deploying and serving on edge devices while defending against adversarial usage. Our results demonstrate that SODA can detect adversarial usage with 89% accuracy in less than 50 queries with minimal impact on service performance, latency, and storage. CCS CONCEPTS • Security and privacy → Intrusion/anomaly detection and malware mitigation; • Computing methodologies → Distributed artificial intelligence; Machine learning. KEYWORDS on-device, machine learning, proprietary information, privacy ACM Reference Format: Akanksha Atrey 1 , Ritwik Sinha 2 , Saayan Mitra 2 , Prashant Shenoy 1 . 2023. SODA: Protecting Proprietary Information in On-Device Machine Learning Models. In The Eighth ACM/IEEE Symposium on Edge Computing (SEC ’23), December 6–9, 2023, Wilmington, DE, USA. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3583740.3626617 1 INTRODUCTION The ubiquity of machine learning (ML) models in distributed applications such as fitness tracking, entertainment recommendations, virtual personal assistance, and social media services has changed Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SEC ’23, December 6–9, 2023, Wilmington, DE, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0123-8/23/12. . . $15.00 https://doi.org/10.1145/3583740.3626617 the way humans interact with their devices. This proliferation has led to consumers being more proactive and conscious about their choices, including about what data leaves their edge devices [11] and the need for faster response times [6]. This implies that ML-based predictions and recommendations cannot be conducted in a centralized manner and require them to be served closer to where the consumer is. For instance, consider a personalization model that takes as input the context of the user and recommends entertainment choices. With the advancement of low-end hardware technologies [1–3], this inference can be conducted on the consumer’s device (i.e., mobile phone). Conducting inference on the end user’s device is advantageous in many aspects [10]. First, serving on the device reduces the service latency seen by the end user. Second, keeping the model on the device preserves user privacy as all the user data processing happens on the device. Third, on-device models are capable of running offline without continuous network connectivity to the centralized server. Lastly, running inference on the device reduces cloud compute cycles, consequently reducing costs for the service provider. However, on-device ML models are prone to exploitation since they lie outside the natural security perimeter of the service provider cloud that could detect, track, and protect against adversarial actions. We examine the privacy of on-device models from a service provider’s point of view in this paper. Previous works have proposed attacks to steal ML models in ML-as-a-service applications by training substitute models [15, 25, 29, 33]. This approach considers the model as intellectual property, necessitating considerable effort to train substitute models that exhibit comparable performance. However, once a model is deployed on the device, the primary concern shifts from model access to safeguarding the proprietary information embedded within the model. We argue that extracting proprietary information from models requires substantially fewer resources than model stealing. In this work, we define the adversarial goal to be to steal proprietary information embedded in an ML model that is located on the device. For example, consider a bank application that produces personalized credit card offers based on users’ contextual information. Assume a ML model is deployed on the edge for this purpose. Here the distribution and range of offers available along with ‘who is recommended what’ is proprietary information. An adversary can learn what sets of inputs give them the most profitable output by learning the probability distribution of the potential offers as shown in Figure 1a. Alternatively, consider an image authentication service that accepts or rejects images on a social media platform based on their authenticity. Here the criteria or rules embedded in the model are proprietary information. An adversary can learn the rules by investigating the model’s most salient features and" 2312.15041v1,"W4-Groups: Modeling the Who, What, When and Where of Group Behavior via Mobility Sensing AKANKSHA ATREY, University of Massachusetts Amherst, USA CAMELLIA ZAKARIA, University of Toronto, Canada RAJESH BALAN, Singapore Management University, Singapore PRASHANT SHENOY, University of Massachusetts Amherst, USA Human social interactions occur in group settings of varying sizes and locations, depending on the type of social activity. The ability to distinguish group formations based on their purposes transforms how group detection mechanisms function. Not only should such tools support the effective detection of serendipitous encounters, but they can derive categories of relation types among users. Determining who is involved, what activity is performed, and when and where the activity occurs are critical to understanding group processes in greater depth, including supporting goal-oriented applications (e.g., performance, productivity, and mental health) that require sensing social factors. In this work, we propose W4-Groups that captures the functional perspective of variability and repeatability when automatically constructing short-term and long-term groups via multiple data sources (e.g., WiFi and location check-in data). We design and implement W4-Groups to detect and extract all four group features who-what-when-where from the user’s daily mobility patterns. We empirically evaluate the framework using two real-world WiFi datasets and a location check-in dataset, yielding an average of 92% overall accuracy, 96% precision, and 94% recall. Further, we supplement two case studies to demonstrate the application of W4-Groups for next-group activity prediction and analyzing changes in group behavior at a longitudinal scale, exemplifying short-term and long-term occurrences. Additional Key Words and Phrases: Group modeling, social interactions, user mobility, next activity prediction ACM Reference Format: Akanksha Atrey, Camellia Zakaria, Rajesh Balan, and Prashant Shenoy. 2024. W4-Groups: Modeling the Who, What, When and Where of Group Behavior via Mobility Sensing. Proc. ACM Hum.-Comput. Interact. 8, CSCW1, Article 150 (April 2024), 29 pages. https://doi.org/10.1145/3637427 1 INTRODUCTION Humans are social by nature, and many of our everyday routines involve social interactions with others. For example, activities such as having meals, watching movies, and attending meetings and classes are commonly conducted in groups; with family, friends, and colleagues. Many of these daily routines that involve such group interaction also recur periodically, often involving the same group, yielding four key group interaction characteristics: with who is the activity performed, what activity is performed, when and where the interaction occurred. Accounting for these group dynamics – who-what-when-where (W4) – for a user reveals many vital aspects of their behavior, including productivity [62], performance [63], and mental and social health [3, 75]. Authors’ addresses: Akanksha Atrey, aatrey@cs.umass.edu, University of Massachusetts Amherst, USA; Camellia Zakaria, camellia.zakaria@utoronto.ca, University of Toronto, Canada; Rajesh Balan, rajesh@smu.edu.sg, Singapore Management University, Singapore; Prashant Shenoy, shenoy@cs.umass.edu, University of Massachusetts Amherst, USA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. 2573-0142/2024/4-ART150 $15.00 https://doi.org/10.1145/3637427 Proc. ACM Hum.-Comput. Interact., Vol. 8, No. CSCW1, Article 150. Publication date: April 2024. 150" 2312.15088v1,"Adaptive Domain Inference Attack Yuechun Gu, Keke Chen Marquette University, Trustworthy and Intelligent Computing Lab ethan.gu@marquette.edu, keke.chen@marquette.edu 1 Abstract—As deep neural networks are increasingly deployed in sensitive application domains, such as healthcare and security, it’s necessary to understand what kind of sensitive information can be inferred from these models. Existing model-targeted attacks all assume the attacker has known the application domain or training data distribution, which plays an essential role in successful attacks. Can removing the domain information from model APIs protect models from these attacks? This paper studies this critical problem. Unfortunately, even with minimal knowledge, i.e., accessing the model as an unnamed function without leaking the meaning of input and output, the proposed adaptive domain inference attack (ADI) can still successfully estimate relevant subsets of training data. We show that the extracted relevant data can significantly improve, for instance, the performance of model-inversion attacks. Specifically, the ADI method utilizes a concept hierarchy built on top of a large collection of available public and private datasets and a novel algorithm to adaptively tune the likelihood of leaf concepts showing up in the unseen training data. The ADI attack not only extracts partial training data at the concept level, but also converges fast and requires much fewer target-model accesses than another domain inference attack, GDI. 1. Introduction Large-scale deep learning models are increasingly deployed in application domains, playing pivotal roles in sectors where sensitive or proprietary data is used in training the models [1]–[3]. These models might be packaged in API services or embedded into applications, becoming a concerning new attack vector. Recent studies have shown several effective model-targeted privacy attacks, including model inversion (or training data reconstruction) [4], [5], property inference [6], [7], and membership inference attacks [8], [9]. However, we have noticed all these model-targeted attacks depend on a certain level of knowledge about the application domain. (1) Model-inversion attacks depend on a learning procedure, e.g., a GAN method [10], to progressively adjust seed images from a domain or distribution similar to the training data domain towards most likely training examples. Without this domain knowledge, i.e., with irrelevant auxiliary data, the attack performance can be significantly reduced [11]. (2) Membership-inference attacks estimate the possibility of a target sample belonging to the training data of a model. This attack assumes the adversary knows the type and distribution of training data and tries to estimate the probability of using a target sample in model training. Without knowing the target domain, membership inference does not make much sense. (3) Property-inference attacks try to uncover global properties of the training data that the model’s creator did not intend to reveal. These attacks also need shadow classifiers that are trained on tasks similar to that of the target classifier. Domain knowledge plays an important role in training shadow classifiers. Thus, one may wonder whether it is possible to protect a model from all these attacks by stripping off all the domainrelated information in model inference. More specifically, can we achieve the protection goal by packaging the model as a function call or a service API: y = f (x) , where an input x leads to a prediction y , with x and y encrypted in transmission? Such a service API mechanism can be very convenient and deployable in a cloud-based application ecosystem. It leads to a question: whether this minimal-knowledge model deployment mechanism is sufficient to protect models. Recent studies show that even with such a minimalknowledge setting, attackers can find ways to re-establish knowledge about the application domain. Gu et al. [11] first attempted to reconstruct the domain information with model accesses only. They use a generative adversarial network (GAN) approach (GDI) to infer which of a set of known candidate datasets is most similar to (or likely from) the target model’s domain. However, the GDI method has several drawbacks. (1) It’s dataset-oriented, i.e., assuming datasets similar to the target training data exist in the candidate datasets. Our experiment shows if the candidate dataset is only partially similar to the target dataset, e.g., only one or a few classes are similar, this method does not work satisfactorily. (2) The GAN-based procedure requires a large number of accesses to the target model, which the model service owner might easily detect. Scope of our research. We propose the adaptive domain inference attack (ADI) to address the weaknesses of Gu et al. attack [11]. Specifically, the ADI approach can detect likely training examples at the concept (or class) level, compared to the GDI’s dataset level, which makes the extracted domain information more accurate. It also requires much fewer model accesses than GDI, as Section 3.4 shows. The ADI attachment assumes that the attacker has min-" 2312.15095v1,"SciPost Placeholder Submission Two-dimensional topological paramagnets protected by Z 3 symmetry: Properties of the boundary Hamiltonian Hrant Topchyan 1 , Vasilii Iugov 2,3 , Mkhitar Mirumyan 1 , Tigran Hakobyan 1,4 , Tigran Sedrakyan 5⋆ and Ara Sedrakyan 1 1 Alihkanyan National Laboratory, Yerevan Physics Institute, Yerevan, Armenia 2 Simons Center for Geometry and Physics, Stony Brook University, Stony Brook, NY, 11794-3636, USA 3 C. N. Yang Institute for Theoretical Physics, Stony Brook University, Stony Brook, NY, 11794-3636, USA 4 Yerevan State University, Yerevan, Armenia 5 Department of Physics, University of Massachusetts, Amherst, Massachusetts 01003, USA ⋆ tsedrakyan@umass.edu Abstract We systematically construct two-dimensional Z 3 symmetry-protected topological (SPT) three-state Potts paramagnets with gapless edge modes on a triangular lattice. First, we study microscopic lattice models for the gapless edge and, using the density-matrix renormalization group (DMRG) approach, investigate the finite size scaling of the lowlying excitation spectrum and the entanglement entropy. Based on the obtained results, we identify the universality class of the critical edge, namely the corresponding conformal field theory and the central charge. Finally, we discuss the inherent symmetries of the edge models and the emergent winding symmetry distinguishing between two SPT phases. As a result, the two topologically nontrivial and the trivial phases define a general one-dimensional chain supporting a tricriticality, which we argue supports a gapless SPT order in one dimension. Copyright attribution to authors. This work is a submission to SciPost Physics Lecture Notes. License information to appear upon publication. Publication information to appear upon publication. Received Date Accepted Date Published Date Contents 1 Introduction 2 2 Symmetry protected topological phase and the edge Hamiltonian 3 3 Symmetries of edge Hamiltonian 3.1 Winding number 3.2 Boundary ’t Hooft anomaly for the SPT Hamiltonian 7 7 8 4 Alternate forms of the Hamiltonian 4.1 From Z 3 N to Z N /3Z 9 10 5 Conformal properties of the edge model 11 1" 2312.15098v1,"Unsupervised Auditory and Semantic Entrainment Models with Deep Neural Networks Jay Kejriwal 1,2 , Štefan Beňuš 1,3 , Lina M. Rojas-Barahona 4 1 2 Institute of Informatics, Slovak Academy of Sciences, Slovakia Faculty of Informatics and Information Technology, Slovak Technical University, Slovakia 3 Constantine the Philosopher University, Nitra, Slovakia 4 Orange Innovation, Lannion, France jay.kejriwal@savba.sk, sbenus@ukf.sk, linamaria.rojasbarahona@orange.com Abstract Speakers tend to engage in adaptive behavior, known as entrainment, when they become similar to their interlocutor in various aspects of speaking. We present an unsupervised deep learning framework that derives meaningful representation from textual features for developing semantic entrainment. We investigate the model’s performance by extracting features using different variations of the BERT model (DistilBERT and XLM- RoBERTa) and Google’s universal sentence encoder (USE) embeddings on two human-human (HH) corpora (The Fisher Corpus English Part 1, Columbia games corpus) and one humanmachine (HM) corpus (Voice Assistant Conversation Corpus (VACC)). In addition to semantic features we also trained DNN- based models utilizing two auditory embeddings (TRIpLet Loss network (TRILL) vectors, Low-level descriptors (LLD) features) and two units of analysis (Inter pausal unit and Turn). The results show that semantic entrainment can be assessed with our model, that models can distinguish between HH and HM interactions and that the two units of analysis for extracting acoustic features provide comparable findings. Index Terms: entrainment, deep learning, unsupervised, DNN embeddings, behavioral signal processing, conversations, interaction. 1. Introduction Entrainment in spoken interaction is the tendency of speakers to adjust some properties of their speech to match the characteristics of their interlocutors. It affects several linguistic dimensions, such as lexical choice [1], syntactic structure [2], acoustic prosodic features [3], or semantic similarity [4]. In addition, it correlates with different social aspects of the conversation, such as task success [5], liking [6], cooperation [7], or naturalness and rapport [8]. Assessing and formally modelling entrainment in both human-human (HH) and human-machine (HM) spoken interactions is widely researched particularly due to the assumption that implementing natural entrainment functionalities reliably detected in HH dialogues would increase the naturalness and efficacy of applications using HM spoken interactions. To this end, several methods for measuring entrainment have been used ranging from time-series analyses, Pearson’s correlations, recurrence analyses, and spectral methods [9]. Most of these approaches, however, assume a linear relationship between features of adjacent speaker turns. Yet, current understanding of entrainment is that it is a complex multi-layered phenomenon. For example, in [10], the authors reported that also dis-entrainment could sometimes enhance conversation development. It seems that linear functions cannot capture this diverse and complex nature of entrainment. A potential approach addressing this issue was suggested in [11] who developed a DNN-based Neural entrainment distance (NED) that uses a non-linear function to measure auditory entrainment. They developed a novel unsupervised model, which relies on an auto-encoder architecture to produce the next turn’s features. Instead of compressing and reconstructing the original embeddings, the main goal of this architecture was to learn the representation of the next turn based on the previous turn. Using these bottleneck features, NED represents the degree of auditory entrainment. With low-level description (LLD) auditory features extracted from inter-pausal units (IPUs) they reported classification accuracy of 98.87% on Fisher corpus English Part 1 [12]. In their extended work, [13] proposed a triplet networkbased approach where they used i-vectors for training the DNN model measuring auditory entrainment. They compared the performance of both approaches on different corpora and reported that the NED-based approach with LLD features provides the highest accuracy of 98.87% in the Fisher corpus but the triplet network-based approach with i-vectors trained on Fisher corpus was best (94.63%) in the Suicide Risk Assessment corpus [14]. Finally, [15], proposed a DNN based entrainment model that isolates the effect of consistency; i.e. the tendency to adhere to one’s own vocal style. The authors extracted LLD features from each adjacent IPU of both speakers and trained the DNN model using the deconfounding measures proposed in [16]. They reported that their model performs slightly worse than the NED measure, with an accuracy of 92.3%. In this paper we have two main goals in extending this promising line of work. While the mentioned studies explore the auditory modality of entrainment, to fully understand HH entrainment and design applications using it in HM interactions, also the textual modality has to be included. Hence, our first goal is to propose augmenting the original auto-encoder NED- based DNN architecture so that it could be used to assess also semantic entrainment. We test our approach and the performance of the models using variations of BERT and Google’s Universal Sentence Encoder (USE). The second goal is to test some aspects of the auditory NED-based approach in the effort to improve our understanding of its usability and reliability. First, it is not clear how different features, embeddings and units of analysis affect the performance of these models. Several types of auditory features have been identified for detecting auditory entrainment, including LLDs comprising temporal, spectral, and acoustic-prosodic features or DNN embeddings such as i-vectors. Also, TRILL vectors have shown state-of-the-art performance in a classification task related to detecting stress in speech outperforming LLDs and also the above-mentioned i-vectors [17]. Therefore, we test these types of features with the NED-based architecture on three different spoken corpora. Regarding the unit of analy-" 2312.15099v1,"To Appear in the 45th IEEE Symposium on Security and Privacy, May 20-23, 2024. Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models Nishant Vishwamitra ∗¶ , Keyan Guo †¶ , Farhan Tajwar Romit ∗ , Isabelle Ondracek † , Long Cheng ‡ , Ziming Zhao † , Hongxin Hu † ∗ University of Texas at San Antonio, † University at Buffalo, ‡ Clemson University { nishant.vishwamitra, farhantajwar.romit } @utsa.edu, lcheng2@clemson.edu { keyanguo, ikondrac, zimingzh, hongxinh } @buffalo.edu Abstract—Online hate is an escalating problem that negatively impacts the lives of Internet users, and is also subject to rapid changes due to evolving events, resulting in new waves of online hate that pose a critical threat. Detecting and mitigating these new waves present two key challenges: it demands reasoningbased complex decision-making to determine the presence of hateful content, and the limited availability of training samples hinders updating the detection model. To address this critical issue, we present a novel framework called H ATE G UARD for effectively moderating new waves of online hate. H ATE G UARD employs a reasoning-based approach that leverages the recently introduced chain-of-thought (CoT) prompting technique, harnessing the capabilities of large language models (LLMs). H ATE G UARD further achieves prompt-based zero-shot detection by automatically generating and updating detection prompts with new derogatory terms and targets in new wave samples to effectively address new waves of online hate. To demonstrate the effectiveness of our approach, we compile a new dataset consisting of tweets related to three recently witnessed new waves: the 2022 Russian invasion of Ukraine, the 2021 insurrection of the US Capitol, and the COVID-19 pandemic. Our studies reveal crucial longitudinal patterns in these new waves concerning the evolution of events and the pressing need for techniques to rapidly update existing moderation tools to counteract them. Comparative evaluations against state-of-the-art tools illustrate the superiority of our framework, showcasing a substantial 22.22% to 83.33% improvement in detecting the three new waves of online hate. Our work highlights the severe threat posed by the emergence of new waves of online hate and represents a paradigm shift in addressing this threat practically. Disclaimer. This manuscript contains harmful content, including hate speech, which has the potential to be offensive and may disturb readers. 1. Introduction We live in a world with rapidly evolving events. These rapidly evolving events consequently affect the global dig- ¶ These authors contributed equally to this work. ital landscape [1], especially Internet platforms that enable online discourse, such as Online Social Networks (OSNs). As a result, emotions of anger and anxiety, and rhetoric from these events also spill over into our global digital landscape. For example, recent polarizing events, such as the 2022 Russian invasion of Ukraine [2], the 2021 insurrection of the US Capitol [3], and the COVID-19 pandemic [4], rapidly transformed the online discourse in our cyberspaces [5]. As a consequence, the context of online hate has also rapidly changed, leading to the emergence of new waves of online hate. For example, during the 2021 insurrection of the US Capitol, a wave of hateful content against vulnerable groups, such as LGBTQ and minorities, was witnessed [3], [6]. During the COVID-19 pandemic, a rapid rise in online hate against Asian-Americans [4], [7], mask [8], [9], and vaccine mandates [10], [11] was reported on several OSNs. More recently, during the 2022 Russian invasion of Ukraine, we saw yet newer waves of online hate against citizens of the nations involved in the conflict [12], [13]. New waves of online hate are a crucial issue that demands immediate attention not only for the present but also for the future well-being of our digital spaces. As new waves are likely to arise in the future, it becomes imperative to address this problem proactively. Currently, various existing tools, such as Perspective API [14], Azure Text Moderation [15], and IBM Toxic Comment Classifier [16], utilize artificial intelligence and machine learning (AI/ML) models for moderating violations of online hate policies [17], [18]. However, there is a concern regarding the effectiveness of these tools in preventing violations caused by new waves of online hate. For example, the recent Anti-Asian hate [4], [7], mask-related hate [8], [9], and vaccine-related hate [10], [11] witnessed during the COVID-19 pandemic could not be sufficiently detected by these tools, and online hate against minority communities and other vulnerable groups continued to spread unabated during this period. A major limitation of these existing tools, which hinders their effectiveness against new waves of online hate, is their reliance on traditional AI/ML models. This poses two key challenges. First, the detection of new waves of online hate poses a complex decision-making challenge, significantly different from the traditional classification tasks typically addressed by AI/ML models. Online hate is inher-" 2312.15108v1,"Roaming Performance Analysis and Comparison between Wi-Fi and Private Cellular Network Vanlin Sathya, Aasawaree Deshmukh, Mohit Goyal, and Mehmet Yavuz Celona. Inc, Cupertino, California, USA. Email: vanlin@celona.io, aasawaree@celona.io, mohit@celona.io, mehmet@celona.io Abstract—Private network deployment is gaining momentum in warehouses, retail, automation, health care, and many such use cases to guarantee mission-critical services with less latency. Guaranteeing the delay-sensitive application in Wi-Fi is always challenging due to the nature of unlicensed spectrum. As the device ecosystem keeps growing and expanding, all the current and future devices can support both Wi-Fi and Private Cellular Network (CBRS is the primary spectrum in the US for private network deployment). However, due to the existing infrastructure and huge investment in the dense Wi-Fi network, consumers prefer two deployment models. The first scenario is deploying the private network outdoors and using the existing Wi-Fi indoors. The second scenario is to use the existing Wi-Fi network as a backup for offloading the traffic indoors and parallely utilizes the private network deployment for less latency applications. Hence, we expect, in both scenarios, a roaming between two technologies i.e., Wi-Fi and Private Cellular Network. In this work, we would like to quantify the roaming performance or service interruption time when the device moves from Wi-Fi to Private Network (CBRS) and vice-versa. Keywords: CBRS, Unlicensed, Wi-Fi, Private and Network, Macro Network, Battery Consumption. I. I NTRODUCTION In recent days, the mobile device is capable of supporting both Wi-Fi and Citizens Broadband Radio Service (CBRS) [1] technology. The recent Wi-Fi 6E supports the operation of Wi-Fi in the unlicensed 6 GHz band. It is effectively an extension of the existing Wi-Fi 6 (or 802.11ax [2]) standard (which operates in the 2.4 GHz & 5 GHz bands), which is known to improve the overall network performance using technologies such as Orthogonal Frequency Division Multiple Access (OFDMA), Basic Service Set (BSS) coloring, target wait times, etc. Thus, the sole benefit of Wi-Fi 6E is using 6 GHz. In the current scenario, the density of 6 GHz APs will not increase as much as when you transitioned from 2.4 GHz to 5 GHz [3]; it will still increase due to challenges with propagation. Some Wi-Fi vendors recommend designing for 5 GHz as the propagation model so the coverage patterns will not vary as much for 6 GHz. However, to take advantage of the high data rates supported by 6 GHz, you will need more APs in 6 GHz than it is required in a 5 GHz deployment. This obviously results in higher capital and operational costs. Even if you augment your existing Wi-Fi deployment with 6 GHz capable APs and do not do a rip and replace, you will still need additional cable runs/drops, switch ports, power (more on this below), RF design considerations (channel, power) and finally additional management and troubleshooting. Is private cellular to be the panacea of all wireless issues? Definitely not. However, it is a welcomed alternative for some latency-sensitive use cases and critical business applications. If you are thinking about 6 GHz or a Wi-Fi refresh, you should definitely consider private cellular. This hope is not only based on the fact that private cellular solves many of the aforementioned limitations of 6 GHz specifically (and Wi-Fi in general) but also on the fact that many of your mission-critical apps and devices will greatly benefit from a reliable, predictable wireless connection. The private network deployment in the US is based on CBRS spectrum availability of 150 MHz in the range of 3.55 GHz to 3.7 GHz channel capacity. Using the CBRS spectrum, enterprises can deploy their private wireless network independently of the licensed spectrum. Unlike Wi-Fi, where devices contend for the medium and are prone to interference (unlicensed spectrum [3]), private cellular [1] is more prescriptive. The network, not the devices, determines how clients connect and roam – effectively facilitating the contention for each AP and device along with determining the channel and power each AP operates at via a central database (Spectrum Access System (SAS [4]) in USA). This not only makes the wireless connection reliable but also provides a better connection experience especially when the device is handed off (roams to) to another AP since the core (network) decides when a device has to be handed off. In contrast, in Wi-Fi, the device decides which AP to connect to, at what signal strength, which AP to roam to, and when. If this was not enough, each Original Equipment Manufacturer (OEM) has their own roaming algorithm. The private cellular network is the turnkey solution that integrates with your existing LAN - whether it is by requesting IP addresses for devices from your DHCP server, routing traffic based on your network configurations, or easily recognizing applications used by devices, seamlessly integrates into the same LAN which is set up for supporting your Wi-Fi networks. Additionally, strong mutual authentication and endto-end encryption along the full data path, whether wireless or wired, and with MicroSlicing, network segmentation can also be extended over the air. In most use cases, private cellular will be the best choice compared to Wi-Fi. But due to the existing infrastructure and huge investment in the dense Wi-Fi network, consumers" 2312.15141v1,"Improving the Performance of Echo State Networks Through Feedback Peter J. Ehlers a , Hendra I. Nurdin b , Daniel Soh a a b Wyant College of Optical Sciences, University of Arizona, Tuscon, Arizona, USA School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia Abstract Reservoir computing, using nonlinear dynamical systems, offers a cost-effective alternative to neural networks for complex tasks involving processing of sequential data, time series modeling, and system identification. Echo state networks (ESNs), a type of reservoir computer, mirror neural networks but simplify training. They apply fixed, random linear transformations to the internal state, followed by nonlinear changes. This process, guided by input signals and linear regression, adapts the system to match target characteristics, reducing computational demands. A potential drawback of ESNs is that the fixed reservoir may not offer the complexity needed for specific problems. While directly altering (training) the internal ESN would reintroduce the computational burden, an indirect modification can be achieved by redirecting some output as input. This feedback can influence the internal reservoir state, yielding ESNs with enhanced complexity suitable for broader challenges. In this paper, we demonstrate that by feeding some component of the reservoir state back into the network through the input, we can drastically improve upon the performance of a given ESN. We rigorously prove that, for any given ESN, feedback will almost always improve the accuracy of the output. For a set of three tasks, each representing different problem classes, we find that with feedback the average error measures are reduced by 30% − 60%. Remarkably, feedback provides at least an equivalent performance boost to doubling the initial number of computational nodes, a computationally expensive and technologically challenging alternative. These results demonstrate the broad applicability and substantial usefulness of this feedback scheme. Keywords: Reservoir Computing, Echo State Network, Feedback Improvement 1. Introduction Compared to recurrent neural networks where excellent performance could only be obtained with very computationally expensive system adjustment procedures, the premise of reservoir computing is to use a fixed nonlinear dynamical system of the form Email addresses: ehlersp@arizona.edu (Peter J. Ehlers), h.nurdin@unsw.edu.au (Hendra I. Nurdin), danielsoh@optics.arizona.edu (Daniel Soh) Preprint submitted to Elsevier December 27, 2023" 2312.15144v1,"Spatial-Temporal Decoupling Contrastive Learning for Skeleton-based Human Action Recognition Shaojie Zhang 1 , Jianqin Yin 1,2∗ , Yonghao Dang 1 1 Beijing University of Posts and Telecommunications 2 Queen Mary School Hainan, Beijing University of Posts and Telecommunications {zsj, jqyin, dyh2018}@bupt.edu.cn Abstract Skeleton-based action recognition is a central task of human-computer interaction. Current methods apply the modeling paradigm of image recognition to it directly. However, the skeleton sequences abstracted from the human body is a sparse representation. The features extracted from the skeleton encoder are spatiotemporal decoupled, which may confuse the semantics. To reduce the coupling and improve the semantics of the global features, we propose a framework (STD-CL) for skeleton-based action recognition. We first decouple the spatial-specific and temporal-specific features from the spatiotemporal features. Then we apply the attentive features to contrastive learning, which pulls together the features from the positive pairs and pushes away the feature embedding from the negative pairs. Moreover, the proposed training strategy STD-CL can be incorporated into current methods. Without additional compute consumption in the testing phase, our STD-CL with four various backbones (HCN, 2S-AGCN, CTR-GCN, and Hyperformer) achieves improvement on NTU60, NTU120, and NW- UCLA benchmarks. We will release our code at: https://github.com/BUPTSJZhang/STD-CL. 1 Introduction Human action recognition is an active task in the computer vision area. Due to its wide range of applications in humancomputer interaction, video analysis, virtual reality, and so on, this task has been researched extensively in the past decade [Ren et al., 2020]. In recent years, with the development of depth sensors [Cao et al., 2017] and human pose estimation algorithms [Dang et al., 2019], the skeleton sequence consisting of coordinates of human joints can be easily acquired. The so-called skeleton-based action recognition utilizing human joints has attracted much interest due to its robustness to background clutter, illumination, and viewpoint changes [Zhang et al., 2019]. ∗ Concat Author The body stretches. Action Recognition Temporal clue of left-shoulder jumping The man falls first and then rises. spatiotemporal score category feature 0.7 jumpimg z Encoder ••• y 0.1 • • • falling 0.1 dancing • • • x Figure 1: Comparison of the image recognition framework (top) with the action recognition framework (down) in both the perspective of humans and Deep Neural Network (DNN). Generally, most of the previous approaches [Shi et al., 2019; Chen et al., 2021a; Chen et al., 2021b] in skeletonbased action recognition follow a paradigm as shown in Figure 1. A skeleton encoder extracts the spatiotemporal cooccurrence feature, and a softmax linear classifier is used to project the feature to the category distributions. However, the global features may mix the spatiotemporal information, which confuses the spatial- and temporal-specific information reflecting different semantics at the joint level and frame level. For example, when distinguishing between the action ”put on a hat” and ”take off a hat”, which have more differences in the frame-level dimension, temporal-specific information is more important. But for the action ”point to something” and ”throw”, they have more spatial differences in the joint-level dimension, so spatial-specific information is more important to distinguish them. The key to action recognition is matching the motion patterns to the action categories. When our humans do this job, we can infer the actions by individually matching the spatial context information or the temporal context information to the actions we have seen before. Thus, the motion patterns might be decoupled into spatial motion patterns and temporal motion patterns. The same action performed by different persons may have similar spatiotemporal-decoupling attentive features. This motivates us to model cross-sequence spatiotemporal relations of human skeleton sequences. In recent years, contrastive learning [He et al., 2020; Chen et al., 2020] has achieved great success in self-supervised representation learning, due to its strong ability to study crosssample relations. It can pull together the features from posi-" 2312.15153v1,"Design and Implementation Considerations for a Virtual File System Using an Inode Data Structure Qin Sun Grace McKenzie Guanqun Song Ting Zhu Department of Computer Science Department of Computer Science Department of Computer Science Department of Computer Science The Ohio State University The Ohio State University The Ohio State University The Ohio State University Columbus, OH, United States Columbus, OH, United States Columbus, OH, United States Columbus, OH, United States sun.3301@osu.edu mckenzie.401@osu.edu song.2107@osu.edu zhu.3445@osu.edu Abstract—Virtual file systems are a tool to centralize and mobilize a file system that could otherwise be complex and consist of multiple hierarchies, hard disks, and more. In this paper, we discuss the design of Unix-based file systems and how this type of file system layout using inode data structures and a disk emulator can be implemented as a single-file virtual file system in Linux. We explore the ways that virtual file systems are vulnerable to security attacks and introduce straightforward solutions that can be implemented to help prevent or mitigate the consequences of such attacks. Keywords—file system, virtual disk, inode I. I NTRODUCTION Virtual file systems are a useful way to abstract a concrete file system in order to simplify the view of the system into a unified entity which can also potentially be easily portable as well as customizable according to the needs of the user. A virtual file system acts as a layer on top of any operating system that provides a way to access data in a structured manner that avoids the complexities of the underlying system, which could be running multiple operating systems, or using multiple hard disks, for example. The virtual file system uses the same components for file management as a concrete file system, while at the same time allowing for abstraction to a single hierarchy rather than multiple hierarchies [4]. One basic type of a virtual file system is the single-file virtual file system, which can involve an emulator that encapsulates the functionality of a concrete file system and potentially also the disk layout, using software. This design is the basis for our project, in which we explore how the concrete file system can be modeled using inode data structures, as well as how to virtualize the disk and emulate its functionality using only a single file. File systems are vulnerable to a wide variety of cyberattacks. Some of these attacks such as injection attacks, backdoor attacks, and unauthorized access to the system are preventable by security measures such as user authentication techniques, verifying user input, and file encryption [3]. Virtual file systems provide a unified and simplified view of complex file systems, allowing for easy portability and customization. They act as a layer over various operating Fig. 1. Program flow chart showing the flow of input. (figure caption) systems, managing data in a structured way while abstracting the complexities of the underlying systems [4]. This abstraction is similar to how heterogeneous IoT devices manage diverse data types through concurrent communication [8-9], offering a unified interface over complex underlying structures. In addition, File systems, including virtual ones, face various cybersecurity threats. Solutions like user authentication, input verification, and file encryption [3] echo the security protocols used in IoT networks [10-11], ensuring integrity and preventing unauthorized access. Virtual file systems provide an essential abstraction layer over various operating systems, streamlining data management in a way that resonates with the complexities of IoT environments. This abstraction is crucial in handling diverse data types and communication protocols, prevalent in heterogeneous IoT networks [8-11, 15-19]. Our exploration of inode data structures in virtual file systems draws parallels with efficient data dissemination and aggregation strategies in IoT networks [16, 17]. In addressing cybersecurity threats to virtual file systems, we take cues from secured protocols developed for IoT devices [22, 23]. The development of robust security measures, such as" 2312.15157v1,"CodeScholar: Growing Idiomatic Code Examples MANISH SHETTY, Universtiy of California, Berkeley, USA KOUSHIK SEN, Universtiy of California, Berkeley, USA ION STOICA, Universtiy of California, Berkeley, USA Programmers often search for usage examples for API methods. A tool that could generate realistic, idiomatic, and contextual usage examples for one or more APIs would be immensely beneficial to developers. Such a tool would relieve the need for a deep understanding of the API landscape, augment existing documentation, and help discover interactions among APIs. We present CodeScholar, a tool that generates idiomatic code examples demonstrating the common usage of API methods. It includes a novel neural-guided search technique over graphs that grows the query APIs into idiomatic code examples. Our user study demonstrates that in ≈70% of cases, developers prefer CodeScholar generated examples over state-of-the-art large language models (LLM) like GPT3.5. We quantitatively evaluate 60 single and 25 multi-API queries from 6 popular Python libraries and show that across-the-board CodeScholar generates more realistic, diverse, and concise examples. In addition, we show that CodeScholar not only helps developers but also LLM-powered programming assistants generate correct code in a program synthesis setting. 1 INTRODUCTION Suppose a programmer is learning to build an image classifier. The programmer is aware of the torch library in Python and some relevant Application Programming Interface (API) methods like nn.Conv2D and nn.ReLU, but is unsure how to use them. The programmer looks up the official documentation of these APIs and finds a vast list of parameters and a few usage examples: >>> m = nn.Conv2d(16, 33, 3, stride=2) >>> input = torch.randn(20, 16, 50, 100) >>> output = m(input) >>> m = nn.ReLU() >>> input = torch.randn(2) >>> output = m(input) However, these examples don’t describe the realistic and common usage of these APIs. Specifically, the programmer wants to know the real-world usage of these API methods. Ideally, a tool that returns a few code snippets (shown below) demonstrating some ways in which these APIs are used together frequently would be highly beneficial. We call them idiomatic code examples. self.feat = nn.Sequential( nn.Conv2d(27, 16, kernel_size=3), nn.MaxPool2d(2), nn.ReLU(), nn.Conv2d(16, 32, kernel_size=3), nn.MaxPool2d(2), nn.ReLU()) self.feat = nn.Sequential(nn.Conv2d(64, 4, 3, padding=1), nn.ReLU()) Research in industry, such as at Facebook [Barnaby et al. 2020; Luan et al. 2019], has found that developers frequently query for such API usage examples in their internal code-to-code search tools, although they were deployed to get recommendations to modify or improve code. The Authors’ addresses: Manish Shetty, Universtiy of California, Berkeley, Berkeley, USA, manishs@berkeley.edu; Koushik Sen, Universtiy of California, Berkeley, Berkeley, USA; Ion Stoica, Universtiy of California, Berkeley, Berkeley, USA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. XXXX-XXXX/2023/12-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: December 2023." 2312.15158v1,"Map-Reduce for Multiprocessing Large Data and Multi-threading for Data Scraping Zefeng Qiu 1 , Prashanth Umapathy 2 , Qingquan Zhang 3 , Guanqun Song 4 , Ting Zhu 5 1,2,4,5 Computer Science and Engineering, The Ohio State University, Columbus, OH, USA Gies College of Business, University of Illinois at Urbana-Champaign, Champaign, IL, USA 1 qiu.573@osu.edu, 2 umapathy.5@osu.edu, 3 qingquan@illinois.edu, 4 song.2107 1 @osu.edu, 5 zhu.3445@osu.edu 3 Abstract—This document is the final project report for our advanced operating system class. During this project, we mainly focused on applying multiprocessing and multi-threading technology to our whole project and utilized the map-reduce algorithm in our data cleaning and data analysis process. In general, our project can be divided into two components: data scraping and data processing, where the previous part was almost web wrangling with employing potential multiprocessing or multithreading technology to speed up the whole process. And after we collect and scrape a large amount value of data as mentioned above, we can use them as input to implement data cleaning and data analysis, during this period, we take advantage of the map-reduce algorithm to increase efficiency. Index Terms—data scraping, data wrangling, multiprocessing, map-reduce I. I NTRODUCTION In this paper, we aim to provide a comprehensive overview of our final project in the advanced operating system class, highlighting the challenges we encountered and the strategies we implemented to address them. Furthermore, we will also explore potential areas for improvement in our future study and research related to this project. To begin with, we will provide an in-depth analysis of the problem we faced during the course of this project. This will involve a detailed discussion of the various technical and logistical issues that we encountered and the impact they had on our project goals. Subsequently, we will elucidate on our decision to incorporate multiprocessing and multi-threading technology in addition to the map-reduce algorithm to address these issues. By leveraging these advanced technologies, we were able to significantly enhance the performance and efficiency of our project. Moreover, we believe that these techniques hold great potential for future study and research in the field of operating systems, and we intend to explore this further in our future work. However, despite the positive outcomes of our project, we recognize that there are several areas that require further improvement. For instance, we encountered certain limitations in terms of multi-threading functions used in the Python library, which could be addressed through the use of more advanced data structures and algorithms. Therefore, we plan to focus our future research on developing and implementing more sophisticated techniques to overcome these challenges and further advance the field of operating systems. The internet is an essential resource for professionals from diverse sectors, providing an extensive range of information, including structured and unstructured data, in various formats and from multiple sources. However, while the internet offers immense potential benefits, the process of Web Scraping can be an arduous and challenging task, often necessitating significant time and resources, especially when executed manually. The complexity of Web Scraping can increase even further, depending on the nature of the data being collected and the websites from which it is sourced [1]. The process of Web Scraping involves various intricacies, including data extraction, cleaning, and analysis, which can be complex and timeconsuming, requiring advanced technical skills and specialized tools. Moreover, the constantly evolving nature of the internet necessitates that Web Scrapers keep pace with new developments, such as changing data formats, updated security measures, and other technical challenges. Furthermore, the type of data and websites being scraped can further compound the complexity of the task. For example, websites that incorporate interactive content or employ anti-scraping measures can pose significant challenges to the Web Scraping process. Similarly, large data sets or those that require frequent updates may require the implementation of more sophisticated techniques, such as machine learning algorithms or distributed data processing systems. When we worked as graduate research assistants with the Center for Tobacco Research in our University, we collaborated to collect and analyze information on products sold on the online marketplace, specifically, those offered by vape shops or dispensaries. Our objective was to support academic research on tobacco use and related trends, which required a robust dataset of product features, such as brand, price, and nicotine levels. Given the vast number of products available online, the scale of our data collection task was significant. Therefore, to ensure the credibility and validity of our analysis, we aimed to collect as much information as possible. This necessitated a solution that could efficiently and accurately extract data from multiple sources. In this context, Web Scraping emerged as an optimal choice, as it could enable us to scrape multiple types of data from a single web page, including structured text, plain text, and images. Moreover, with the ability to scrape data from multiple websites, we could enhance the breadth and depth of our dataset, enabling" 2312.15162v1,"Cycle-Consistency Learning for Captioning and Grounding Ning Wang 1 , Jiajun Deng 2 , Mingbo Jia 1 Huawei Inc. 2 University of Adelaide, Australian Institute for Machine Learning wn6149@mail.ustc.edu.cn, jiajun.deng@adelaide.edu.au, jiamingbo@huawei.com 1 Abstract We present that visual grounding and image captioning, which perform as two mutually inverse processes, can be bridged together for collaborative training by careful designs. By consolidating this idea, we introduce CyCo, a cyclicconsistent learning framework to ameliorate the independent training pipelines of visual grounding and image captioning. The proposed framework (1) allows the semi-weakly supervised training of visual grounding; (2) improves the performance of fully supervised visual grounding; (3) yields a general captioning model that can describe arbitrary image regions. Extensive experiments show that our fully supervised grounding model achieves state-of-the-art performance, and the semi-weakly supervised one also exhibits competitive performance compared to the fully supervised counterparts. Our image captioning model has the capability to freely describe image regions and meanwhile shows impressive performance on prevalent captioning benchmarks. Introduction The recent decades have witnessed the great success in vision-language (VL) related fields. Based on the primary target of bridging the modality gap between vision and language, deep neural networks addressing VL tasks generally share the pre-training objective, model structure, large-scale training corpus, etc. However, by the time of downstream fine-tuning, these tasks are typically individually tackled or simply combined in a multi-task training paradigm. In this work, we devote our efforts to two VL downstream tasks including image captioning (Vinyals et al. 2015; Anderson et al. 2018) and visual grounding (Mao et al. 2016; Yu et al. 2016), and explore their inherent relationships to enable effective joint training. To match the granularity of visual parts in visual grounding, we first extend image captioning to a more general scenario, where the model is intended to describe a given region. We define this generalized task as regional image captioning, which is similar to dense captioning task (Johnson, Karpathy, and Fei-Fei 2016) but is free of the requirement of object detection. Particularly, the conventional task definition of image captioning (Vinyals et al. 2015) is a special case of regional image captioning Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Cycle- Consistency Loss Initialization Box Predicted Box Image Captioning Predicted Caption a woman in a pink snowsuit Visual Grounding (a) Captioning-to-Grounding Cycle-Consistency Framework Initialization Caption Cycle- Consistency Loss right pink and blue person a woman in a pink snowsuit Predicted Caption Visual Grounding Predicted Box Image Captioning (b) Grounding-to-Captioning Cycle-Consistency Framework Figure 1: The proposed framework jointly optimizes image captioning and visual grounding models via cycleconsistency learning. In (a), our method computes the region (box) consistency in the captioning-to-grounding optimization cycle. In (b), our framework measures the caption consistency in the grounding-to-captioning cyclic process. that regards the whole image as a region. For visual grounding, which is also known as referring expression comprehension (Mao et al. 2016; Yu et al. 2016) and phrase localization (Kazemzadeh et al. 2014; Plummer et al. 2015) in the literature, we maintain the original task target to localize the corresponding region (generally denoted by a bounding box) described by a given language expression. Despite achieving inspiring progress, image captioning and visual grounding still suffer from several limitations. For visual grounding, this task simultaneously requires text descriptions and accurate object bounding boxes for model optimization. These fine-grained image-text-box triplets are rather laborious to collect. How to optimize the grounding model using limited data annotations has received considerable attention (Liu et al. 2021; Wang et al. 2021a). As for image captioning, existing methods typically focus on describing the whole image. The capabilities of modeling region relationships and properly describing them are largely overlooked in existing algorithms. We argue that a robust image captioner should be qualified to freely describe the image, from an arbitrary region to the whole image. Similar to the grounding task, obtaining the regional captioning" 2312.15166v1,"SOLAR 10.7B: Scaling Large Language Models with Simple yet Effective Depth Up-Scaling Dahyun Kim ∗ , Chanjun Park ∗† , Sanghoon Kim ∗† , Wonsung Lee ∗† , Wonho Song Yunsu Kim, Hyeonwoo Kim, Yungi Kim, Hyeonju Lee, Jihoo Kim Changbae Ahn, Seonghoon Yang, Sukyung Lee, Hyunbyung Park, Gyoungjin Gim Mikyoung Cha, Hwalsuk Lee † , Sunghun Kim † Upstage AI, South Korea {kdahyun, chanjun.park,limerobot, wonsung.lee, hwalsuk.lee, hunkim}@upstage.ai Abstract We introduce depth up-scaling (DUS), a novel technique to up-scale base LLMs efficiently and effectively in a simple manner. In contrast to mixture-of-experts (MoE), DUS does not require complex changes to train and inference. Using DUS, we build SOLAR 10.7B, a large language model (LLM) with 10.7 billion parameters, demonstrating superior performance in various natural language processing (NLP) tasks. Comparative evaluations show that SOLAR 10.7B outperforms existing open-source pretrained LLMs, such as Llama 2 and Mistral 7B. We additionally present SO- LAR 10.7B-Instruct, a variant fine-tuned for instruction-following capabilities, surpassing Mixtral-8x7B. SOLAR 10.7B is publicly available under the Apache 2.0 license, promoting broad access and application in the LLM field 1 . 1 Introduction The field of natural language processing (NLP) has been significantly transformed by the introduction of large language models (LLMs), which have enhanced our understanding and interaction with human language (Zhang et al., 2023a). These advancements, while beneficial, bring challenges such as the increased need to train ever larger models owing to the performance scaling law (Kaplan et al., 2020; Hernandez et al., 2021; Anil et al., 2023). To efficiently tackle the above, recent works in scaling language models such as a mixture of experts (MoE) (Shazeer et al., 2017; Komatsuzaki et al., 2022) have been proposed. While those approaches are able to efficiently and effectively scale-up LLMs, they often require nontrivial changes to the training and inference framework (Gale et al., 2023), which hinders widespread applicability. Effectively and efficiently scaling up ∗ Equal Contribution † Corresponding Author https://huggingface.co/upstage/ SOLAR-10.7B-v1.0 1 LLMs whilst also retaining the simplicity for ease of use is an important problem (Alberts et al., 2023; Fraiwan and Khasawneh, 2023; Sallam et al., 2023; Bahrini et al., 2023). Our study introduces depth up-scaling (DUS), an effective and efficient method to up-scale LLMs whilst also remaining strikingly easy to apply. Using DUS, we release SOLAR 10.7B, an LLM with 10.7 billion parameters, that outperforms existing models like Llama 2 (Touvron et al., 2023) and Mistral 7B (Jiang et al., 2023) in various benchmarks. The proposed DUS method is immediately compatible with easy-to-use LLM frameworks such as HuggingFace (Wolf et al., 2019) and does need additional changes to the training or inference framework. Furthermore, DUS is compatible with all transformer architectures, opening up new gateways to effectively and efficiently scale-up LLMs in a simple manner. We have also developed SOLAR 10.7B-Instruct, a variant fine-tuned for tasks requiring strict adherence to complex instructions. It significantly outperforms the Mixtral-8x7B model across various evaluation metrics, evidencing an advanced proficiency that exceeds the capabilities of even larger models in terms of benchmark performance. By releasing SOLAR 10.7B under the Apache 2.0 license, we aim to promote collaboration and innovation in NLP. This open-source approach allows for wider access and application of these models by researchers and developers globally. 2 SOLAR 10.7B Architectural Details For developing LLMs with a better performance-tosize trade-off, we argue that the commonly used 7B- sized LLMs need to be at the Pareto-optimal curve and proceed to scale up the 7B LLMs. In doing so, we utilize pretrained weights of base models to scale up to larger LLMs in a more efficient manner. Specifically, we choose a well-performing base model and apply the novel DUS method to obtain a" 2312.15187v1,"IRG: Generating Synthetic Relational Databases using GANs Jiayu Li Y.C. Tay li.jiayu@nus.edu.sg National University of Singapore BetterData AI Singapore, Singapore dcstayyc@nus.edu.sg National University of Singapore School of Computing Singapore, Singapore ABSTRACT There is an overgrowing demand for data sharing in academia and industry. However, such sharing has issues with personal privacy and data confidentiality. One option is to share only syntheticallygenerated versions of the real data. Generative Adversarial Network (GAN) is a recently-popular technique that can be used for this purpose. Relational databases usually have multiple tables that are related to each other. So far, the use of GANs has essentially focused on generating single tables. This paper presents Incremental Relational Generator (IRG), which uses GANs to synthetically generate interrelated tables. Given an empirical relational database, IRG can generate a synthetic version that can be safely shared. IRG generates the tables in some sequential order. The key idea is to construct a context, based on the tables generated so far, when using a GAN to generate the next table. Experiments with public datasets and private student data show that IRG outperforms stateof-the-art in terms of statistical properties and query results. 1 INTRODUCTION The Big Data era is characterized by the accumulation of vast datasets across various domains, including education, healthcare, and commercial activities. This ever-expanding amount and variety of data presents significant opportunities for enhanced utility through sharing, enabling a broader spectrum of researchers and analysts to access and analyze the data, which eventually fosters the potential for valuable insights. However, the regulations on privacy protection necessitates a balanced approach to data sharing, ensuring that accessibility does not compromise confidentiality. Generative Adversarial Network (GAN) [14] is one of the stateof-the-art deep learning techniques for synthetic data generation. GANs have a particular advantage in protecting privacy by a generator without direct access to real data. GANs have shown particular effectiveness in image generation, and have been successfully adapted for tabular data in some work, demonstrating commendable performance. Therefore, GANs are anticipated to be highly effective in creating synthetic datasets that protect privacy while retaining essential data relationships and utility However, current GANs for tabular data predominantly focus on single-table datasets, yet real-world data often exist in the form of multiple interrelated tables. Indeed, there are naïve application of GANs for multiple related tables: • generating each table separately and then associate the generated tables; or • generating the entire database as a huge joined table and decompose into small tables These approaches are feasible for databases of limited scale, both in terms of table count and row numbers. Nevertheless, as the sizes of tables increase or the relational schema becomes more complicated, the process of association and decomposition can become exceedingly challenging, due to the limited computing power of ordinary machines and the nuances of datasets in different domains that may require diverse forms of domain knowledge. Consequently, a GAN framework specifically tailored to handle multiple tables efficiently is a better solution to generated multiple interrelated tables. To bridge this gap, we propoes Incremental Relational Generator (IRG), which leverages the strengths of GANs in generating individual tables and synergizes them following the natural logic of a relational database schema. In this approach, tables in a relational database are generated sequentially, with each table being produced using a specialized GAN designed for tabular data with some context. To generate a table, a context from preceding tables in the specified order, constructed according to the relational schema, is used to assist the generation of the current table, which gives the word “incremental” in the model’s name. Therefore, existing tabular GANs need to be modified to take in such context. Moreover, since most existing tabular GANs focus more on the machine learning utility of synthetic data rather than data distribution, we further adjust the tabular GANs to emphasize data distribution by modifying the loss function. Then, because GANs generate data in tables in units of rows, the number of rows need to be decided before generation. In the case of modified GANs with context, this context is also given row by row, so not only the total number of rows, but also the number of occurrences for each context row, which we will refer to as “degree” in the rest of the paper, need to be decided before generation. To summarize, IRG generates tables in a database according to specified order, where each table is generated in three steps: (1) form context rows; (2) predict degrees; (3) predict table data. Details of the IRG model 1 are discussed in Section 4, with the preliminaries specified in Section 3. To demonstrate the usefulness of IRG, we make a case analysis on NUS Applied Learning Sciences and Educational Technology (ALSET) Data Lake (ADL) in Section 5. Further experimental results on some public datasets are described in Section 6. 1 Code is in https://github.com/lll-jy/irgv2" 2312.15223v1,"IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 A Survey on Large Language Models for Software Engineering Quanjun Zhang, Chunrong Fang, Yang Xie, Yaxin Zhang, Yun Yang, Weisong Sun, Shengcheng Yu, Zhenyu Chen Abstract—Software Engineering (SE) is the systematic design, development, and maintenance of software applications, underpinning the digital infrastructure of our modern mainworld. Very recently, the SE community has seen a rapidly increasing number of techniques employing Large Language Models (LLMs) to automate a broad range of SE tasks. Nevertheless, existing information of the applications, effects, and possible limitations of LLMs within SE is still not well-studied. In this paper, we provide a systematic survey to summarize the current state-of-the-art research in the LLM-based SE community. We summarize 30 representative LLMs of Source Code across three model architectures, 15 pre-training objectives across four categories, and 16 downstream tasks across five categories. We then present a detailed summarization of the recent SE studies for which LLMs are commonly utilized, including 155 studies for 43 specific code-related tasks across four crucial phases within the SE workflow. Besides, we summarize existing attempts to empirically evaluate LLMs in SE, such as benchmarks, empirical studies, and exploration of SE education. We also discuss several critical aspects of optimization and applications of LLMs in SE, such as security attacks, model tuning, and model compression. Finally, we highlight several challenges and potential opportunities on applying LLMs for future SE studies, such as exploring domain LLMs and constructing clean evaluation datasets. Overall, our work can help researchers gain a comprehensive understanding about the achievements of the existing LLM-based SE studies and promote the practical application of these techniques. Our artifacts are publicly available and will continuously updated at the living repository: https://github.com/iSEngLab/ AwesomeLLM4SE. Index Terms—Software Engineering, Large Language Model, AI and Software Engineering, LLM4SE ✦ 1 I NTRODUCTION Software engineering (SE) stands as an essential pursuit focused on systematically and predictably designing, developing, testing, and maintaining software systems [1]. As software increasingly becomes the infrastructure of various industries (e.g., transportation, healthcare, and education) nowadays, SE plays a crucial role in modern society by ensuring software systems are built in a systematic, reliable, and efficient manner [2]. As a very active area, SE has been extensively investigated in the literature and has sustained attention from both the academic and industrial communities for several decades [3], [4]. Very recently, one of the most transformative advancements in the realm of SE is the emergence of large language models (LLMs). Advanced LLMs (e.g., BERT [5], T5 [6] and GPT [7]) have significantly improved performance across a wide range of natural language processing (NLP) tasks, such as machine translation and text classification. Typically, • • • • • Quanjun Zhang, Chunrong Fang, Yang Xie, Yaxin Zhang, Shengcheng Yu and Zhenyu Chen are with the State Key Laboratory for Novel Software Technology, Nanjing University, China. E-mail: quanjun.zhang@smail.nju.edu.cn, fangchunrong@nju.edu.cn, serialxy@outlook.com, zhangyaxin032@gmail.com, yusc@smail.nju.edu.cn, zychen@nju.edu.cn Weisong Sun is with the School of Computer Science and Engineering, Nanyang Technological University. E-mail: weisong.sun@ntu.edu.sg. Yun Yang is with the Department of Computing Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia. E-mail: yyang@swin.edu.au Chunrong Fang is the corresponding author. This work was mainly done when Quanjun Zhang was a visiting student at Swinburne University of Technology. Manuscript received xxx xxx, 2023; revised xxx xxx, 2023. such models are pre-trained to derive generic language representations by self-supervised training on large-scale unlabeled data and then are transferred to benefit multiple downstream tasks by supervised fine-tuning on limited labeled data. Inspired by the success of LLMs in NLP, many recent attempts have been adopted to boost numerous code-related tasks (e.g., code summarization and code search) with LLMs (e.g., CodeBERT [8] and CodeT5 [9]). The application of LLMs to SE has had a profound impact on the field, transforming how developers approach coderelated tasks automatically. For example, ChatGPT [10], one of the most notable LLMs with billions of parameters, has demonstrated remarkable performance in a variety of tasks, showcasing the potential of LLMs to revolutionize the SE industry. Overall, the SE community has seen a rapidly increasing number of a broad range of SE studies equipped with LLMs, already yielding substantial benefits and further demonstrating a promising future in follow-up research. However, the complex SE workflow (e.g., software development, testing, and maintenance) and a mass of specific code-related tasks (e.g., vulnerability detection, fault localization, and program repair) make it difficult for interested researchers to understand state-of-the-art LLM-based SE research and improve upon them. Besides, the constant emergence of advanced LLMs with different architectures, training methods, sources, and a plethora of fine-tuning methods brings challenges in keeping pace with and effectively utilizing these advancements. For example, researchers have conducted various studies to extensively investigate the effectiveness of LLMs in the field of program repair [11], [11], [12]. These studies encompass different research aspects" 2312.15229v1,"Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks Toluwani Aremu Mohamed Bin Zayed University of Artificial Intelligence, UAE toluwani.aremu@mbzuai.ac.ae Abstract tion (MPC) [12], including secret sharing (SS). In typical privacy-preserving inference (PI) protocols, HE/SS handles linear operations, while garbled circuits (GC) are used for Private computation of nonlinear functions, such as nonlinear operations. Rectified Linear Units (ReLUs) and max-pooling opera- While these protocols efficiently handle linear operations, in deep neural networks (DNNs) poses significant tions, nonlinear operations present a significant challenge, challenges in terms of storage, bandwidth, and time often dominating runtime and incurring substantial costs consumption. To address these challenges, there has in terms of storage and latency. To address this issue, been a growing interest in utilizing privacy-preserving researchers have explored different strategies, including techniques that leverage polynomial activation functions budgeting [13–16] for nonlinear functions (although this and kernelized convolutions as alternatives to traditional remains inefficient) and leveraging polynomial activation ReLUs. However, these alternative approaches often suffer functions [17–24] and polynomial kernel convolutions [25]. from a trade-off between achieving faster private inference The latter approach combines convolutions and polynomial (PI) and sacrificing model accuracy. In particular, when activations, eliminating the need for separate nonlinear acapplied to much deeper networks, these methods encounter tivation functions. According to [2], the complete replacetraining instabilities, leading to issues like exploding grament of ReLUs with polynomial activation functions i.e., x 2 dients (resulting in NaNs) or suboptimal approximations. (Quad) [1] can result in impressive latency improvements of In this study, we focus on PolyKervNets, a technique known up to 3000× and communication efficiency gains of up to for offering improved dynamic approximations in smaller 300×. networks but still facing instabilities in larger and more complex networks. Our primary objective is to empirically However, while these innovations have contributed to the explore optimization-based training recipes to enhance design of privacy-friendly networks, they can introduce perthe performance of PolyKervNets in larger networks. By formance challenges, especially when fully replacing Redoing so, we aim to potentially eliminate the need for LUs [21]. Previous studies [1,9,17,22] that have completely traditional nonlinear activation functions, thereby advancreplaced ReLUs with low-degree polynomials have demoning the state-of-the-art in privacy-preserving deep neural strated improvements on smaller and simpler datasets and network architectures. Code can be found on GitHub at: models. However, when these approaches are applied to https://github.com/tolusophy/PolyKervNets/ larger datasets and more complex models, they encounter training instabilities, resulting in issues such as NaNs or significant performance degradation [21]. In this paper, we aim to solve these issues by finding the best training optimization-based training recipes for 1. Introduction deep polynomial residual models, with a specific focus on The widespread adoption of Machine Learning as a PolyKervNets (PKNs) [25], a recent state-of-the-art tech- Service (MLaaS) has encountered a substantial challenge nique which changes the convolution kernel from a linear in the form of privacy concerns associated with sensitive to a polynomial one. PKNs leverage expressive polynomial user data. To address these concerns, various privacyconvolution kernels (polykerv) to design dynamic functions preserving techniques have been developed and deployed. that adapt at each layer. However, like other approaches, One promising approach seeks to perform inference directly they face limitations, with the authors unable to extend them on encrypted data [1–10], employing methods such as hobeyond 18 layers of residual networks. By getting the best momorphic encryption (HE) [11] or multiparty computatraining recipes for PKNs, we believe they can be extended" 2312.15234v1,"Towards Efficient Generative Large Language Model Serving: A Survey from Algorithms to Systems XUPENG MIAO, Carnegie Mellon University, USA GABRIELE OLIARO, Carnegie Mellon University, USA ZHIHAO ZHANG, Carnegie Mellon University, USA XINHAO CHENG, Carnegie Mellon University, USA HONGYI JIN, Carnegie Mellon University, USA TIANQI CHEN, Carnegie Mellon University, USA ZHIHAO JIA, Carnegie Mellon University, USA In the rapidly evolving landscape of artificial intelligence (AI), generative large language models (LLMs) stand at the forefront, revolutionizing how we interact with our data. However, the computational intensity and memory consumption of deploying these models present substantial challenges in terms of serving efficiency, particularly in scenarios demanding low latency and high throughput. This survey addresses the imperative need for efficient LLM serving methodologies from a machine learning system (MLSys) research perspective, standing at the crux of advanced AI innovations and practical system optimizations. We provide in-depth analysis, covering a spectrum of solutions, ranging from cutting-edge algorithmic modifications to groundbreaking changes in system designs. The survey aims to provide a comprehensive understanding of the current state and future directions in efficient LLM serving, offering valuable insights for researchers and practitioners in overcoming the barriers of effective LLM deployment, thereby reshaping the future of AI. CCS Concepts: • Computing methodologies → Machine learning; Parallel computing methodologies; Natural language processing; • General and reference → Surveys and overviews; • Hardware → Analysis and design of emerging devices and systems; Emerging technologies; • Computer systems organization → Architectures; • Software and its engineering → Operating systems. Additional Key Words and Phrases: large language model, efficiency, algorithm, system, inference, serving ACM Reference Format: Xupeng Miao, Gabriele Oliaro, Zhihao Zhang, Xinhao Cheng, Hongyi Jin, Tianqi Chen, and Zhihao Jia. 2018. Towards Efficient Generative Large Language Model Serving: A Survey from Algorithms to Systems. J. ACM 37, 4, Article 111 (August 2018), 32 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Generative large language models (LLMs) have become a driving force behind significant advancements in artificial intelligence (AI) and have demonstrated exceptional performance across a wide range of language-related tasks. From machine translation to sentiment analysis, question answering, and text generation, these models have shown their prowess in understanding, generating, Authors’ addresses: Xupeng Miao, xupeng@cmu.edu, Carnegie Mellon University, USA; Gabriele Oliaro, goliaro@cs.cmu.edu, Carnegie Mellon University, USA; Zhihao Zhang, zhihaoz3@cs.cmu.edu, Carnegie Mellon University, USA; Xinhao Cheng, xinhaoc@andrew.cmu.edu, Carnegie Mellon University, USA; Hongyi Jin, hongyij@cs.cmu.edu, Carnegie Mellon University, USA; Tianqi Chen, tqchen@cmu.edu, Carnegie Mellon University, USA; Zhihao Jia, zhihao@cmu.edu, Carnegie Mellon University, USA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. 0004-5411/2018/8-ART111 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 37, No. 4, Article 111. Publication date: August 2018. 111" 2312.15241v1,"Measuring Value Alignment Fazl Barez Department of Engineering Sciences University of Oxford fazl@robots.ox.ac.uk Philip Torr Department of Engineering Sciences University of Oxford philip.torr@eng.ox.ac.uk Abstract As artificial intelligence (AI) systems become increasingly integrated into various domains, ensuring that they align with human values becomes critical. This paper introduces a novel formalism to quantify the alignment between AI systems and human values, using Markov Decision Processes (MDPs) as the foundational model. We delve into the concept of values as desirable goals tied to actions and norms as behavioral guidelines, aiming to shed light on how they can be used to guide AI decisions. This framework offers a mechanism to evaluate the degree of alignment between norms and values by assessing preference changes across state transitions in a normative world. By utilizing this formalism, AI developers and ethicists can better design and evaluate AI systems to ensure they operate in harmony with human values. The proposed methodology holds potential for a wide range of applications, from recommendation systems emphasizing well-being to autonomous vehicles prioritizing safety. 1 Introduction Aligning artificial intelligence (AI) systems with human values is critical as AI is deployed in highstakes domains like healthcare, transportation, and criminal justice [2]. However, defining and quantifying value alignment remains an open challenge. This formalism builds upon ideas presented in Sierra et al.’s paper on modeling value alignment using MDPs [14], but aims to provide a more general conceptual framework rather than focusing on preference modeling and aggregation details. We acknowledge the difficulty and complexity of formalizing human values and norms, which span disciplines like sociology, psychology, philosophy, and law [3, 1]. In this exploration, we aim to put forth a novel formalism for value alignment based on Markov Decision Processes (MDPs). We acknowledge the difficulty and complexity of formalizing human values and norms. We model AI decision making using MDPs and define a mathematical framework to compute the degree of alignment between a set of norms governing behavior and a set of human values. For example, recommendation systems can look out for human wellbeing [18], and autonomous vehicles can prioritize passenger and pedestrian safety [13]. To align AI with human values, several challenges must be addressed. Values must be formalized mathematically to represent moral principles [5]. The choice of value representation impacts how AI systems evaluate and compare values [10]. An ethical framework helps ensure responsible and ethical AI [8], and monitoring mechanisms can evaluate value alignment performance [9]. Overall, aligning AI with human values requires understanding the ethical implications of AI and how to technically evaluate and implement values [6]. This exploration provides an initial formalism for value alignment that captures intuitive informal descriptions used in the AI safety community [16]. We present a formalism based on Markov Decision Processes (MDPs) to model AI decision making and show how incorporating values and norms AI Meets Moral Philosophy And Moral Psychology NeurIPS 2023, New Orleans, USA." 2312.15265v1,"Monitoring the Evolution of Behavioural Embeddings in Social Media Recommendation Srijan Saket 1[0009−0006−9460−1203] 1 2 ShareChat, India srijanskt@gmail.com Abstract. Short video applications pose unique challenges for recommender systems due to the constant influx of new content and the absence of historical user interactions for quality assessment of uploaded content. This research characterizes the evolution of embeddings in short video recommendation systems, comparing batch and real-time updates to content embeddings. The analysis investigates embedding maturity, the learning peak during view accumulation, popularity bias, l2-norm distribution of learned embeddings, and their impact on user engagement metrics. The study unveils the contrast in the number of interactions needed to achieve mature embeddings in both learning modes, identifies the ideal learning point, and explores the distribution of l2-norm across various update methods. Utilizing a production system deployed on a large-scale short video app with over 180 million users, the findings offer insights into designing effective recommendation systems and enhancing user satisfaction and engagement in short video applications. Keywords: embeddings evolution; monitoring; short video 1 Introduction Short video applications have experienced a significant surge in demand, with users seeking short-form engaging content experiences. This has led to the adoption of embedding-based recommender systems for effective content recommendations. These systems utilize models like Field-aware factorization machines, wide-and-deep neural networks, and two-tower models to learn user and content embeddings, as cited in [3, 8, 4]. However, the unique nature of short video content presents challenges. With constant new content uploads and vast content space, recommending relevant content becomes complex, especially for new uploads without historical user interactions. Over time, the system can develop behavioral embeddings to capture user preferences. Yet, evaluating content and recommendations remains challenging due to limited view share, as well as the inherent challenges of short video content, such as diversity, varying shelf-life, and cold start problems, as mentioned in [1, 5, 2, 6]. To address this issue, it becomes essential to gain a comprehensive understanding of how embeddings evolve with user interactions over time. By studying the evolution of embeddings, we can uncover valuable insights into content" 2312.15272v1,"Detecting anxiety from short clips of free-form speech Prabhat Agarwal Stanford University Akshat Jindal Stanford University Shreya Singh Stanford University prabhat8@stanford.edu akshatj@stanford.edu ssingh16@stanford.edu Abstract Barriers to accessing mental health assessments including cost and stigma continues to be an impediment in mental health diagnosis and treatment. Machine learning approaches based on speech samples could help in this direction. In this work, we develop machine learning solutions to diagnose anxiety disorders from audio journals of patients. We work on a novel anxiety dataset (provided through collaboration with Kintsugi Mindful Wellness Inc.) and experiment with several models of varying complexity utilizing audio, text and a combination of multiple modalities. We show that the multimodal and audio embeddings based approaches achieve good performance in the task achieving an AUC ROC score of 0.68-0.69. 1 Introduction Mental and physical health are equally important components of overall health but there are many barriers to accessing mental health assessments including cost and stigma. Even when individuals receive professional care, assessments are intermittent and may be limited partly due to the episodic nature of psychiatric symptoms. Therefore, machine-learning technology using speech samples obtained in the clinic, remotely over telephone or through recording in personal mobile devices could help improve diagnosis and treatment. In this work, we study the problem of detecting anxiety disorders through speech. Since this is a relatively under-studied problem, the dataset is quite small and hence we plan to explore different approaches to deal with the problem including using hand-crafted features motivated by psychological studies on anxiety and pretrained embeddings models. The dataset provided by Kintsugi provides an interesting opportunity in this area as the recordings are self-recorded in a comforting environment as opposed to a clinical setting. The code is publicly available on Github 1 . The paper is outlined a follows: Section 2 gives details about the existing literature in this problem domain. In Section 3, we describe the dataset used for training our models along with the task description. In Section 4, we provide a detailed explanation of our five models implemented for the task. Section 5 outline the evaluation routines and presents the study results. Finally, we conclude our findings in Section 6. 2 Related Works Liu et. al. (Low et al., 2020) provides a systematic review of studies using speech for automated assessments across a broader range of psychiatric disorders and summarizes the different datasets, features, and methods that have been employed in this area. The authors summarize the key acoustic features used in these models across disorders. Many studies (Horwitz et al., 2013; Quatieri and Malyska, 2012; Cummins et al., 2015; Singh et al., 2019) have observed that depression is linked with a decrease in f0 and f0 range and also leads to jitter and shimmer with an increase in depression severity. While jitter and shimmer are also correlated with anxiety (Özseven et al., 2018; Silber-Varod et al., 2016), many studies (Gilboa-Schechtman et al., 2014; Özseven et al., 2018; Weeks et al., 2012; Galili et al., 2013) have found a significant increase in mean f0 in patients with an anxiety disorder. Most studies surveyed by the authors employed simple machine learning models like SVM, logistic regression and very few studies used more complex networks with transfer from speech recognition tasks (Singh et al., 2018). We plan to utilise these features which have been well studied both in the psychology and machine learning assessment of anxiety and depression in our work and compare 1 https://github.com/prabhat1081/Anxiety-Detectionfrom-free-form-audio-journals" 2312.15273v1,"Medical Image Analysis (2023) Contents lists available at ScienceDirect Medical Image Analysis journal homepage: www.elsevier.com/locate/media Benefit from public unlabeled data: A Frangi filtering-based pretraining network for 3D cerebrovascular segmentation Gen Shi a , Hao Lu b , Hui Hui c,∗ , Jie Tian a,∗ a School of Engineering Medicine and School of Biological Science and Medical Engineering, Beihang University, Beijing, 100191, China, and also with the Key Laboratory of Big DataBased Precision Medicine (Beihang University), Ministry of Industry and Information Technology of China, Beijing, 100191, China b State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academic of Science, Beijing 10086, China c CAS Key Laboratory of Molecular Imaging, Institute of Automation, Chinese Academy of Sciences, Beijing, 100190, China ARTICLE INFO ABSTRACT Article history: Received 1 May 2013 Received in final form 10 May 2013 Accepted 13 May 2013 Available online 15 May 2013 The precise cerebrovascular segmentation in time-of-flight magnetic resonance angiography (TOF-MRA) data is crucial for clinically computer-aided diagnosis. However, the sparse distribution of cerebrovascular structures in TOF-MRA results in an exceedingly high cost for manual data labeling. The use of unlabeled TOF-MRA data holds the potential to enhance model performance significantly. In this study, we construct the largest preprocessed unlabeled TOF-MRA datasets (1510 subjects) to date. We also provide three additional labeled datasets totaling 113 subjects. Furthermore, we propose a simple yet effective pertraining strategy based on Frangi filtering, known for enhancing vessel-like structures, to fully leverage the unlabeled data for 3D cerebrovascular segmentation. Specifically, we develop a Frangi filtering-based preprocessing workflow to handle the large-scale unlabeled dataset, and a multi-task pretraining strategy is proposed to effectively utilize the preprocessed data. By employing this approach, we maximize the knowledge gained from the unlabeled data. The pretrained model is evaluated on four cerebrovascular segmentation datasets. The results have demonstrated the superior performance of our model, with an improvement of approximately 3% compared to state-of-the-art semi- and self-supervised methods. Furthermore, the ablation studies also demonstrate the generalizability and effectiveness of the pretraining method regarding the backbone structures. The code and data have been open source at: https://github.com/shigen-StoneRoot/FFPN. © 2023 Elsevier B. V. All rights reserved. Communicated by S. Sarkar 2000 MSC: 41A05, 41A10, 65D05, 65D17 Keywords: Keyword1, Keyword2, Keyword3 1. Introduction TOF-MRA is one non-invasive medical imaging technique to visualize cerebral blood vessels. It provides detailed images of the blood vessels in the brain, enabling early detection and treatment of potentially life-threatening conditions Özsarlak et al. (2004); Hassouna et al. (2006). The accurate vessel segmentation is a crucial preprocessing step in TOF-MRA image anal- ∗ Corresponding author e-mail: hui.hui@ia.ac.cn (Hui Hui), tian@ieee.org (Jie Tian) ysis, which provides surgeons with essential information about the location, size, and connectivity of blood vessels and facilitates surgical planning and intervention Ni et al. (2020). Compared to the segmentation of other biological tissues, brain vessel segmentation based on TOF-MRA presents more challenges. Most organs typically have a spherical shape and are distributed in a concentrated manner, while blood vessels have a tubular structure and their distribution in TOF-MRA is relatively sparse Chen et al. (2022a); Xia et al. (2022), which increases the difficulty and cost in obtaining manually labeled MRA-TOF data. On the contrary, the unlabeled TOF-MRA" 2312.15331v1,"Energy conversion in thermoelectric materials of SnSSe and SnS 2 : a Monte-Carlo simulation of Boltzmann transport equation Seyedeh Ameneh Bahadori a , Zahra Shomali a,∗ a Department of Physics, Basic Sciences Faculty, Tarbiat Modares University, Tehran, Iran Abstract In the present work, thermal transport and the energy conversation in two thermoelectrically efficient candidates of Janus SnSSe and SnS 2 are investigated within the non-equilibrium Monte Carlo simulation of the phonon Boltzmann equation. The phonon analysis has been performed to determine the contributed phonon in heat transport. The results present that the dominant participating phonons are the ones from the longitudinal acoustic (LA) branch while the least belongs to the transverse acoustic (TA) modes. Both materials reached the very high maximum temperature in response to the implied wasted heat. This is attributed to the low presence of the critical TA phonons which are on one hand fast enough to leave the hotspot but on the other hand have frequencies commensurable to ZA phonons’ frequency. Also, the temperature profile achieved during the heating and cooling of the materials is studied. It is obtained that the heat propagation through the SnS 2 is, at first, swifter, which results in a temperature gradient through the whole material which is less than that of the SnSSe. As the time passes, the heat transfer that is directly related to the material thermal conductivity, slows down. So, the behavior of the SnS 2 and SnSSe, in case of the heat propagation status, becomes similar. Moreover, the behaviour of the thermoelectric figure of merit (zT), the efficiency (η), and the generated voltage have been figured out. It is stated that the higher zT and η do not guarantee a larger generated Seebeck voltage. This is true, while the generated Seebeck voltage is related to the temperature difference between the heated and the cold junction. Accordingly, how far the temperature of matter rises in response to the implied wasted heat is directly related to the obtained voltage. Mainly, it is presented that the maximum temperature that a material achieves, alongside the temperature gradient and the material property Seebeck coefficient, are essential in introducing thermoelectrically efficient materials with reasonable thermal to electrical energy conversion. Keywords: , Thermoelectric monolayer material, Nanoscale heat transport, SnSSe, SnS 2 , Monte Carlo, Janus monolayer, Seebek effect 1. Introduction Energy harvesting has been widely investigated since the early nineteenth. Nowadays, due to an urgent demand for the reduction of used nuclear, and fossil energy resources, the concept of renewable energy has been even more of interest [1]. A complete replacement for the fossil fuels is not possible in the current situation and therefore, improving energy efficiency, resulting in reducing energy sources consumption is an alternative solution. Meanwhile, using the thermoelectric materials with the ability to convert the heat to electricity by the Seebeck effect and in reverse, driving the heat flow with an electric current called as the Peltier effect [2], has been suggested as the way for promoting the energy performance. The thermoelectric material is the major part of a thermoelectric generator (TEG) [3, 4], which is a device having the potential to transform the waste heat into the electrical power. TEGs convert directly the temperature differences into the electric voltage [5]. As the voltage difference between the two nodes is linearly dependent on the amount of the temperature difference in between, the thermoelectric materials must have low thermal conductivity (κ), so, ∗ Corresponding author, Tel.: +98(21) 82883147. Email address: shomali@modares.ac.ir (Zahra Shomali) Preprint submitted to Elsevier while the temperature on one side of the material has increased, the other side stays cold. This behaviour helps a generation of significant voltage. On the other hand, the thermoelectric efficiency of the thermoelectric materials relies on a parameter called the thermoelectric figure of merit (zT), which is determined using the formula zT=S 2 σT/K. In this relation, S, σ and K, subsequently, represent the Seebeck coefficient, electrical conductance, and the thermal conductivity [6, 7]. The Seebeck coefficient measures the magnitude of an induced thermoelectric voltage in response to a temperature gradient across the material caused by the Seebeck effect. Further, the formula confirms the previously mentioned fact that decreasing the thermal conductivity, results in higher efficiency. The best thermoelectric performance measured until now, is reported in [8], which lies between 5 and 6. Additionally, the obtained voltage caused by the temperature gradient is defined as ∇V=S∇T, with ∇ T being the temperature gradient alongside the monolayer. In recent years, there have been many efforts to develop new thermoelectric materials for efficient power generation by increasing the zT. Specifically, the potential of low-dimensional materials has been widely discussed. For instance, 2D materials of stannane, silicene, phosphorene, bismuthene, MoS 2 , MoSe 2 , WSe 2 , and SnSe have been proposed as practical ther- December 27, 2023" 2312.15339v1,"MaDi: Learning to Mask Distractions for Generalization in Visual Deep Reinforcement Learning Bram Grooten 1 , Tristan Tomilin 1 , Gautham Vasan 2 , Matthew E. Taylor 2,3 , A. Rupam Mahmood 2,3 , Meng Fang 4 , Mykola Pechenizkiy 1 , Decebal Constantin Mocanu 5,1 1 Eindhoven University of Technology 2 University of Alberta 4 University of Liverpool ABSTRACT The visual world provides an abundance of information, but many input pixels received by agents often contain distracting stimuli. Autonomous agents need the ability to distinguish useful information from task-irrelevant perceptions, enabling them to generalize to unseen environments with new distractions. Existing works approach this problem using data augmentation or large auxiliary networks with additional loss functions. We introduce MaDi, a novel algorithm that learns to mask distractions by the reward signal only. In MaDi, the conventional actor-critic structure of deep reinforcement learning agents is complemented by a small third sibling, the Masker. This lightweight neural network generates a mask to determine what the actor and critic will receive, such that they can focus on learning the task. The masks are created dynamically, depending on the current input. We run experiments on the DeepMind Control Generalization Benchmark, the Distracting Control Suite, and a real UR5 Robotic Arm. Our algorithm improves the agent’s focus with useful masks, while its efficient Masker network only adds 0.2% more parameters to the original structure, in contrast to previous work. MaDi consistently achieves generalization results better than or competitive to state-of-the-art methods. 1 KEYWORDS Deep Reinforcement Learning, Generalization, Robotics ACM Reference Format: Bram Grooten 1 , Tristan Tomilin 1 , Gautham Vasan 2 , Matthew E. Taylor 2,3 ,, A. Rupam Mahmood 2,3 , Meng Fang 4 , Mykola Pechenizkiy 1 , Decebal Constantin Mocanu 5,1 . 2024. MaDi: Learning to Mask Distractions for Generalization in Visual Deep Reinforcement Learning. In Proc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems (AA- MAS 2024), Auckland, New Zealand, May 6 – 10, 2024, IFAAMAS, 23 pages. 1 INTRODUCTION Deep reinforcement learning (RL) has achieved remarkable success in a variety of complex tasks such as game playing [32, 37], robotics [2, 10, 17], nuclear fusion [7], and autonomous navigation [31, 60]. However, one of the major challenges faced by RL agents is their limited ability to generalize to unseen environments, particularly in the presence of distracting visual noise, such as a video playing in the background [22, 39]. These distractions can lead to significant 1 Code: github.com/bramgrooten/mask-distractions and video: youtu.be/2oImF0h1k48. Corresponding author: b.j.grooten@tue.nl Proc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2024), N. Alechina, V. Dignum, M. Dastani, J.S. Sichman (eds.), May 6 – 10, 2024, Auckland, New Zealand. © 2024 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). This work is licenced under the Creative Commons Attribution 4.0 International (CC-BY 4.0) licence. 3 Alberta Machine Intelligence Institute (Amii) 5 University of Luxembourg degradation in the performance of deep RL agents, thereby hindering their applicability in the real world. To address this, we propose a novel algorithm, Masking Distractions, which learns to filter out task-irrelevant visuals, enhancing generalization capabilities. The key idea behind MaDi is to supplement the conventional actor-critic architecture with a third lightweight component, the Masker (see Figure 1). This small neural network generates a mask that dims the irrelevant pixels, allowing the actor and critic to focus on learning the task at hand without getting too distracted. Unlike previous approaches that have attempted to address this issue [4, 21, 22], our method increases generalization performance while introducing minimal overhead in terms of model parameters, thus preserving the efficiency of the original architecture. Furthermore, no additional loss function is necessary for the Masker to optimize its parameters. To ensure that the Masker maintains visibility of the task-relevant pixels, it is trained on the critic’s loss function. The Masker and critic networks are aligned in their objective, as pixels that are essential to determine the value of an observation should not be hidden. Figure 1 shows an example of a mask, visualizing the output produced by the Masker network corresponding to the current input frame. The Masker is able to learn such precise segmentations without any additional labels, bounding boxes, or other annotations. The reward alone is enough. To evaluate the effectiveness of MaDi, we conduct experiments on multiple environments from three benchmarks: the DeepMind Control Generalization Benchmark [22], the Distracting Control Suite [39], and a real UR5 Robotic Arm for which we design a novel generalization experiment with visual distractions. Our results demonstrate that MaDi significantly improves the agent’s ability to focus on relevant visual information by generating helpful masks, leading to enhanced generalization performance. Furthermore, MaDi achieves state-of-the-art performance on many environments, surpassing well-known methods in vision-based reinforcement learning [4, 18, 21, 22, 28, 50]. Our main contributions are: • We introduce a novel algorithm, MaDi, which supplements the standard actor-critic architecture of deep RL agents with a lightweight Masker. This network learns to focus on the task-relevant pixels solely from the reward signal. • We present a comprehensive set of experiments on the Deep- Mind Control Generalization Benchmark and the Distracting Control Suite. MaDi consistently achieves state-of-the-art or competitive generalization performance. • We test MaDi on a physical robot, demonstrating that our algorithm increases the performance of the UR5 Robotic Arm in a challenging VisualReacher task, even when distracting videos are playing in the background." 2312.15349v1,"1 A WECC-based Model for Simulating Two-stage Market Clearing with High-temporal-resolution Ningkun Zheng, Student Member, IEEE, Bolun Xu, Member, IEEE Abstract—This paper presents a new open-source model for simulating two-stage market clearing based on the Western Electricity Coordinating Council Anchor Data Set. We model accurate two-stage market clearing with day-ahead unit commitment at hourly resolution and real-time economic dispatch with five-minute resolution. Both day-ahead unit commitment and real-time economic dispatch can incorporate look-ahead rolling horizons. The model includes seven market regions and a full year of data, detailing 2,403 individual generation assets across diverse energy sources. The year-long simulation demonstrates the capability of our model to closely reflect the generation and price patterns of the California ISO. Our sensitivity analysis revealed that extending the ED look-ahead horizon reduces system costs by up to 0.12%. We expect this new system model to fulfill the needs of conducting electricity market analysis at finer time granularity for market designs and emerging technology integration. While we focus on the western interconnection, the model serves as a base to simulate other two-stage clearing market locations. Index Terms—Economic dispatch, energy storage, power system economics, unit commitments. I. I NTRODUCTION The electric power sector is one of the major contributors to greenhouse gas emissions [1]. Over the past two decades, the US has undertaken substantial infrastructural shifts towards a sustainable, low-carbon electric power landscape [2]. Such progress is evident in regional developments. By the end of 2022, installed wind capacity exceeded 37 GW in Texas, with the numbers continuing to rise [3]. As of July 2023, California installed approximately 28.7 GW renewable energy systems (RES) and 5.5 GW battery storage [4]. To achieve its 2045 greenhouse gas reduction targets, the state anticipates a need for 79 GW of RES and 50 GW of battery storage [5]. These rapid evolutions of power systems have motivated researchers to take a finer look into electricity market clearing models to understand integration challenges associated with novel technologies, including revenue potential, market designs, and scale-up impacts. Modern power systems are inherently complex, spanning vast regions and integrating numerous components from transmission down to distribution levels. As power systems continue to grow, deriving analytical solutions becomes increasingly challenging due to their large scale and intricate nature This work was supported by the U.S. Department of Energy, Office of Electricity, partly through the Energy Storage program under Contract DE- AC05-76RL01830 and partly supported through the Advanced Grid Modeling Program under Contract DE-AC02-05CH11231. N. Zheng and B. Xu are with Columbia University, NY, USA (e-mail: nz2343@columbia.edu, bx2177@columbia.edu). with various components. On the other hand, conducting realworld tests is expensive and can pose risks to the stability and reliability of the power grid. Introducing new technologies, control methods, or market designs directly into the live grid without comprehensive testing is impractical. Therefore, highfidelity test systems, capable of simulating real-world scenarios and providing insights into system operation, become essential for research, development, and validation of novel technologies and methodologies [6], [7]. As power systems advance towards decarbonization, the significance of real-time markets is rising to address the growing system imbalances caused by the integration of new technologies. The increasing incorporation of intermittent and stochastic renewable energy sources, like wind and solar, is amplifying real-time system imbalances [8]–[10]. Besides, emerging technologies such as energy storage [11], demand response [12], hydrogen production [13], and carbon capture [14], are showing a heightened interest in participating in real-time markets, driven by motivations to exploit the volatility of real-time pricing or to reduce the carbon footprint of electricity consumption. Consequently, these developments create a pressing demand for innovative market models that can more accurately execute real-time market clearings and encapsulate the nuances of uncertainty. In this paper, we introduce an open-source test system for wholesale market simulation, emphasizing a high-temporalresolution real-time market with look-ahead horizons in both day-ahead market (DAM) / unit commitment (UC) and realtime market (RTM) / economic dispatch(ED). The main contributions of the paper are listed below: We develop a WECC-based model for two-stage wholesale market simulation, utilizing publicly accessible datasets and designed in the Julia language. This model offers high-temporal resolution and multi-interval lookahead horizon functions in both DAM UC and RTM ED with tractable computational cost, benefiting from Julia’s computational efficiency. • The yearly simulation using our proposed model closely emulating the generation and price trends observed in the California ISO (CAISO). Such accuracy is invaluable for modeling price-sensitive resources, like energy storage systems and demand response. • A sensitivity analysis with varied look-ahead horizons in DAM UC and RTM ED highlights the advantages of the look-ahead window, especially in the effective management of emerging technologies. • While our model focuses on CAISO due to its high integration" 2312.15379v1,"Expressive modular verification of termination for busy-waiting programs JUSTUS FASSE, KU Leuven, Belgium BART JACOBS, KU Leuven, Belgium Busy-waiting is an important, low-level synchronization pattern that is used to implement higher-level abstractions for synchronization. Its termination depends on cooperation by other threads as well as a fair thread scheduler. We present a general approach for modularly verifying busy-waiting concurrent programs based on higherorder separation logic. The approach combines two strands of prior work. First, the Jacobs and Piessens (2011) higher-order-programming perspective for verifying concurrent modules. Second, the Reinhard and Jacobs (2021) ghost signals approach to verify busy-waiting. Based on the latter, we extend the programming language with call permissions, obligations and signals as well as expect permissions. Call permissions prevent infinite recursion while the other auxiliary constructs enable the sound generation of call permissions to fuel a program’s busy-waiting loops. The resulting language has no infinite fair executions. Previously, these extensions were used to verify classical specifications for synchronization constructs where the module creates and discharges obligations. Such specifications, however, fix particular client patterns and would in general require “obligation transfer” to handle more intricate wait dependencies. This precludes clients from performing lock handoffs, an important mechanism to control (un)fairness in the design of locks. Our contribution—inspired by D’Osualdo, Sutherland, Farzan and Gardner (2021)’s TaDA Live—is to require the client to create and discharge obligations as necessary to satisfy the module’s liveness requirements. However, instead of building these liveness requirements into the logic, we express them by having the module’s operations take auxiliary code as arguments whose job it is to generate the call permissions the module needs for its busy-waiting. With this parameterized setup we recover or even surpass the expressiveness of the first-order approach taken by TaDA Live while being more amenable to mechanization in tools that support higher-order separation logic. In the paper we present specifications and proofs in Iris, a community standard for higher-order concurrent separation logic. We validated our approach by developing a (non-foundational) machine-checked proof of a cohort lock—to the best of our knowledge the first of its kind—using an encoding of our approach in the VeriFast program verifier for C and Java. This fair lock is implemented on top of another fair lock module and involves lock handoff, thus exercising the asserted contributions. 1 INTRODUCTION We use the program in Figure 1 both as introduction to busy-waiting and motivating example for “lock handoffs”. First, the program performs busy-waiting. Specifically the middle thread’s acquire lk (* Critical section *) f ≔ false while ! f do () done (* Critical section *) release lk acquire lk (* Critical section *) release lk Fig. 1. Thread-oblivious locks allow the acquiring and releasing thread to be different. In this example the lock is passed between the left and middle thread. We use OCaml inspired syntax: ! and ≔ to dereference and assign a reference respectively. The passing is synchronized by busy-waiting for the flag f to be cleared. If the left thread acquires the lock before the right, the latter will have to wait until both the left and middle thread are done with their critical sections. while loop does not make progress, even though it is continuously able to run, until the flag it Authors’ addresses: Justus Fasse, KU Leuven, Department of Computer Science, Celestijnenlaan 200A box 2402, Leuven, 3001, Belgium, justus.fasse@kuleuven.be; Bart Jacobs, KU Leuven, Department of Computer Science, Celestijnenlaan 200A box 2402, Leuven, 3001, Belgium, bart.jacobs@kuleuven.be." 2312.15383v1,"SoK: Technical Implementation and Human Impact of Internet Privacy Regulations Eleanor Birrell Jay Rodolitz Angel Ding Jenna Lee Pomona College eleanor.birrell@pomona.edu Northeastern University rodolitz.j@northeastern.edu Wellelsey College zd2@wellesley.edu University of Washington jdlee11@uw.edu Emily McReynolds Jevan Hutson Ada Lerner Unaffiliated ecm7962@nyu.edu Hintze Law PLLC jevan@hintzelaw.com Northeastern University ada@ccs.neu.edu most impactful and effective at informing and driving better privacy laws that create more meaningful and equitable privacy outcomes? This paper sets out to answer these questions through an interdisciplinary lens by an authorship team consisting of both computer scientists and legal scholars. We begin with a close reading of 25 Internet privacy and data protection regulations, which provides a broad overview of a landscape of laws far too numerous to discuss individually yet which often share significant commonalities due to the broad influence of the GDPR on legislators worldwide [290]. From this close reading we construct a taxonomy of rights guaranteed and business obligations imposed by current Internet privacy regulations. We then review and systematize the computer science literature around modern digital privacy laws by organizing studies according to the rights and obligations in our taxonomy that they examine. We find that while the research in this space is extensive, its thoroughness varies dramatically, with the overwhelming majority of papers studying either California’s CCPA or the EU’s GDPR, laws which protect only about 6.3% of the world’s population [5], [6], [45]. Additionally, certain aspects of these laws such as design patterns in consent banners have been explored deeply, while other aspects (e.g., the right to non-discrimination) have been studied little or not at all. Building on these analyses, our discussion presents two major arguments. First, we ask how great a limitation our focus on a few specific laws and a few specific rights is to our broad understanding of privacy law writ large. In other words: can we generalize from our deep study of these few contexts? Based on our systematization of the literature and on our interdisciplinary team’s analysis of legal factors that can cause varying privacy outcomes even under similar or identical laws, we argue that we should be wary of generalizing specific results beyond their cultural, temporal, and legal contexts. However, we also find that in combination with scholarship from other fields, this body of work has built a compelling case for certain general ideas about privacy law. Most prominently, we analyze the literature’s body of evidence against privacy self-management as a paradigm for privacy regulation, arguing that a strong case exists for Abstract—Growing recognition of the potential for exploitation of personal data and of the shortcomings of prior privacy regimes has led to the passage of a multitude of new online privacy regulations. Some of these laws—notably the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA)—have been the focus of large bodies of research by the computer science community, while others have received less attention. In this work, we analyze a set of Internet privacy and data protection regulations drawn from around the world—both those that have frequently been studied by computer scientists and those that have not—and develop a taxonomy of rights granted and obligations imposed by these laws. We then leverage this taxonomy to systematize 270 technical research papers published in computer science venues that investigate the impact of these laws and explore how technical solutions can complement legal protections. Finally, we analyze the results in this space through an interdisciplinary lens and make recommendations for future work at the intersection of computer science and legal privacy. Index Terms—SoK, Privacy Regulations, Data Protection, Usable Privacy, Measurements 1. Introduction Privacy law is shifting and developing rapidly throughout the world. As of March 2022, 157 nations have enacted privacy laws, with 12 laws enacted in 2021 alone [99]. Over the past decade, a large body of computer science research has emerged which studies these laws and their effects. This work has covered topics including rates of corporate compliance; people’s ability to exercise privacy rights; design patterns that subvert the consent process; and citizens’ expectations, understandings, and actions in the face of laws like the GDPR, which has been called “one of the strictest privacy laws in the world” [236]. What have computer scientists learned about these laws and their effects on privacy? And perhaps more importantly, what directions for future computer science research will be 1" 2312.15388v1,"DEAP: Design Space Exploration for DNN Accelerator Parallelism Ekansh Agrawal Xiangyu Sam Xu University of California, Berkeley agrawalekansh@berkeley.edu University of California, Berkeley xiangyu.xu@berkeley.edu ware configurations to meet performance, power, and resource constraints. We can leverage simulation to test different configurations off full-system hardware simulation platform that makes it easy to validate, profile, and debug RTL hardware [21], [28]. Given the architecture for a single accelerator, we aim describe a broad space of hardware topologies for multiple accelerators to be searched over by our DSE algorithms. In this research project, we will mostly use the Gemimini accelerator, a RoCC systolic array accelerator with non-standard RISC- V ISA [13], and explore different inter-accelerator and intraaccelerator hardware configuration through DSE algorithms. Current research focuses on software/algorithm level exploration by setting the hardware setting as an invariant. This invariant is usually in the form of a single accelerator. We aim to explore how to incorporate hardware directly into the system design. By expressing a LLM architecture, we want to be able to use multi-accelerator simulation to perform an exhaustive search and find hardware configurations that maximize metrics for power, latency, and total cycles spent. Our proposed workflow is as followed: 1) We use a hyperparameter search to create sequential LLMs of difference variations and sizes which allow us to simulate different LLMs. We also use a hyperparameters search to different hardware configurations. 2) We then break up the model architecture into sub-layers through different model parallelism techniques. 3) We then use a scheduler to assign these sub-layer computations to different accelerators based on a few heuristics. 4) We introduce DeapSim which simulates each accelerator’s workload with Timeloop and simulates the accelerator interconnect to get metrics on power, cycles, and latency on the given workload. Abstract—The boom in Large Language Models (LLMs) like GPT-4 and ChatGPT has marked a significant advancement in artificial intelligence. These models are becoming increasingly complex and powerful to train and serve. This growth in capabilities comes with a substantial increase in computational requirements, both in terms of hardware resources and energy consumption. The goal of this paper is to showcase how hardware and software co-design can come together and allow us to create customized hardware systems for specific LLM workloads. We propose a simulation workflow that allows us to combine model parallelism techniques with a multi-accelerator simulation framework for efficiency metrics. We focus on inference workloads and report power, cycle, and latency metrics upon performing a design space exploration search over multiple software and hardware configurations. I. I NTRODUCTION Coupled with the growing size of LLMs is the everincreasing cost of the computational and memory requirements to robustly serve these models. With the end of Dennard’s Scaling, providing sufficient power to a single System-on- Chip (SoC) large enough to deliver the computational power required to complete a Large Language Model (LLM) computation has become challenging. The natural solution to this problem is to leverage the compute power of multiple accelerators instead of just one. However, this approach of hardware multiplexing introduces it’s own inherent set of challenges. For starters, the communication bottlenecks between multiple accelerators can actually limit the potential speedups gained. Distributing the workload evenly across GPUs can be challenging, particularly when dealing with variable-sized inputs or residual connections. Fortunately, advancements such as Nvidia’s NVLink [12] and Google’s TPUv4 OCS technology [18] have provided high-bandwith – albeit expensive – communication interface solutions to mitigate some of the problems. Still, simply splitting an execution trace amongst multiple-accelerators is not a cookie cutter approach to running a LLM faster. In hyperscale data centers, where workloads can vary greatly, adaptability is crucial and is why FPGA accelerators are often employed. FPGAs can offer greater energy efficiency than GPUs which are often the de-facto accelerators of choice. FPGAs can be scaled more easily compared to other hardware solutions which is the main motivation behind this research project on design space exploration (DSE). DSE is crucial with FPGAs accelerators as it helps engineers optimize hard- II. B ACKGROUND A. LLMs LLMs are primarily built upon the Transformer architecture, leveraging techniques like word embeddings and attention mechanisms to process large amounts of data effectively. They have capabilities ranging from understanding and generating text based on context to passing standardized tests and recognizing humor [40]. Google’s BERT was the first LLM to leverage the attention mechanism to construct first 1" 2312.15393v1,"1 Debiased Learning for Remote Sensing Data Chun-Hsiao Yeh Xudong Wang Stella X. Yu Charles Hill Zackery Steck Scott Kangas Aaron Reite Abstract—Deep learning has had remarkable success at analyzing handheld imagery such as consumer photos due to the availability of large-scale human annotations (e.g., ImageNet). However, remote sensing data lacks such extensive annotation and thus potential for supervised learning. To address this, we propose a highly effective semi-supervised approach tailored specifically to remote sensing data. Our approach encompasses two key contributions. First, we adapt the FixMatch framework to remote sensing data by designing robust strong and weak augmentations suitable for this domain. Second, we develop an effective semisupervised learning method by removing bias in imbalanced training data resulting from both actual labels and pseudo-labels predicted by the model. Our simple semi-supervised framework was validated by extensive experimentation. Using 30% of labeled annotations, it delivers a 7.1% accuracy gain over the supervised learning baseline and a 2.1% gain over the supervised state-ofthe-art CDS method on the remote sensing xView dataset. Index Terms—class imbalance, debiased learning, pseudo-label imbalance, remote sensing imagery, semi-supervised learning Fig. 1. Our semi-supervised learning approach outperforms FixMatch [5], supervised baseline [6], and CDS [6] on remote sensing data [2]. I. I NTRODUCTION AND R ELATED W ORKS D EEP learning is remarkably successful at analyzing natural images, primarily due to the extensive human annotations available in datasets such as ImageNet [1]. However, the scenario changes significantly when using remote sensing data [2], [3], [4]. While there is an abundance of remote sensing data available, there are limited annotations due to the challenges in annotating such data: uncommon viewing angles and ambiguity in remote sensing data make it difficult for humans to annotate accurately. Previous works, such as transfer learning approaches, have had significant success in handling specific data domains by starting with a model pretrained on ImageNet [1] and finetuning it with a few samples of the target domain. These approaches have been highly effective for medical imaging [7] and self-driving [8] tasks. However, unlike these image domains, remote sensing data is characterized by a lack of highresolution details and class-imbalanced properties, making it challenging to transfer from an ImageNet pretrained model directly [9], [10], [11], [12]. Additionally, several proposed self-supervised learning methods [13], [14], [15], [16] can learn representations without human-annotated data. However, learning self-supervised models without pretraining is expensive and time-consuming. Moreover, the ability to discriminate positive and negative pairs may be worse on remote sensing data than on natural Chun-Hsiao Yeh, Xudong Wang, Stella X. Yu are with the University of California, Berkeley, CA 94720 USA ({daniel yeh, xdwang}@berkeley.edu). Yu is also with the University of Michigan, Ann Arbor, MI 48109, USA (stellayu@umich.edu). Charles Hill, Zackery Steck, Scott Kangas are with Etegent Technologies, Ltd. ({charles.hill,zackery.steck,scott.kangas}@etegent.com). Aaron Reite is with the National Geospatial-Intelligence Agency (aaron.a.reite@nga.mil). images due to the presence of complex and ambiguous patterns within the data. In remote sensing scenarios with limited annotated data and abundant unlabeled data, semi-supervised learning techniques [17], [18], [19], [20] hold significant promise. Fix- Match [5] is a popular approach that combines weak and strong augmentations with pseudo-labeling to enhance the model’s performance with limited labeled data. However, to adapt these techniques to remote sensing domains, we focus on the design of robust weak and strong augmentations specifically tailored to this context. We investigate the benefits of incorporating rotation, scaling, and horizontal flipping, with the aim of unlocking the full potential of semi-supervised learning for remote sensing data, enabling the use of more effective and context-aware analysis techniques. Previous studies have identified two sources of imbalance in real-world data [22], [23] which pose significant challenges to training deep neural networks. First is the class-imbalance problem which various works [24], [25], [26], [27] have attempted to address. Furthermore, machine-generated pseudolabels often suffer from inherent imbalances [21]. These imbalances pose a challenge for learning models as they introduce a bias towards false majorities within the pseudo-labels. Similar issues have been observed in widely used datasets like CIFAR and ImageNet [21]. To address this pseudo-label bias problem specifically in the context of remote sensing data, we incorporate the DebiasPL [21] method, which aims to alleviate the bias associated with pseudo-labeling. We demonstrate the effectiveness of our approach in Fig. 1, and illustrate our proposed framework in Fig. 2. Our key contributions in this Approved for public release, NGA-U-2023-02063" 2312.15396v1,"PKBOIN-12: A Bayesian optimal interval Phase I/II design incorporating pharmacokinetics outcomes to find the optimal biological dose Hao Sun ∗1 and Jieqi Tu 2 1 2 Global Biometrics & Data Sciences, Bristol Myers Squibb, New Jersey, USA Division of Epidemiology and Biostatistics, School of Public Health, University of Illinois at Chicago, Illinois, USA December 2023 Abstract Immunotherapies and targeted therapies have gained popularity due to their promising therapeutic effects across multiple treatment areas. The focus of early phase dose-finding clinical trials has shifted from finding the maximum tolerated dose (MTD) to identifying the optimal biological dose (OBD), which aims to balance the toxicity and efficacy outcomes, thereby optimizing the risk-benefit trade- off. These trials often collect multiple pharmacokinetics (PK) outcomes to assess drug exposure, which has shown correlations with toxicity and efficacy outcomes but has not been utilized in the current dose-finding designs for OBD selection. Moreover, PK outcomes are usually available within days after initial treatment, much faster than toxicity and efficacy outcomes. To bridge this gap, we introduce the innovative model-assisted PKBOIN-12 design, which enhances the BOIN12 design by integrating PK information into both the dose-finding algorithm and the final OBD determination process. We further extend PKBOIN-12 to the TITE-PKBOIN-12 design to address the challenges of late-onset toxicity and efficacy outcomes. Simulation results demonstrate that the PKBOIN-12 design more effectively identifies the OBD and allocates a greater number of patients to it than BOIN12. Additionally, PKBOIN-12 decreases the probability of selecting inefficacious doses as the OBD by excluding those with low drug exposure. Comprehensive simulation studies and sensitivity analysis confirm the robustness of both PKBOIN-12 and TITE-PKBOIN-12 designs in various scenarios. Keywords: Bayesian optimal interval design, dose finding, model-assisted design, optimal biological dose, pharmacokinetics, risk-benefit trade-off ∗ Corresponding author: *Hao Sun, Global Biometrics & Data Sciences, Bristol Myers Squibb, New Jersey, USA. Email: hao.sun@bms.com 1" 2312.15408v1,"1 Perception-Distortion Balanced Super-Resolution: A Multi-Objective Optimization Perspective Index Terms—Super-resolution, GAN, evolutionary algorithm, optimization. I. I NTRODUCTION I Mage super-resolution (SR) [1] is a valuable technique to reconstruct a high-resolution (HR) image with good quality from a low-resolution (LR) input image. Benefiting from the deep learning techniques, it has become popular to train a deep neural network (DNN) for SR by using a large amount of LR- HR image pairs [2–8]. One commonly used loss function to optimize the SR models is the distortion (or fidelity) measure, e.g., the norm of the prediction errors [2, 9–11]. However, SR is a typical ill-posed problem, and there are many possible HR estimations for the given LR input. It is well-known that the ℓ 2 or ℓ 1 loss tends to generate over-smoothed HR estimates [12, 13] although they can result in good distortion measures such as peak-to-noise ratio (PSNR). To better preserve the local structures and details of reconstructed images, the SSIM loss [14] and perceptual loss [15] have also been used to train SR models. The former adopts the widely used image quality assessment index, i.e., SSIM [14, 16], as the optimization objective, while the latter L. Sun, S. Liu, H. Yong, and L. Zhang are with the Department of Computing, the Hong Kong Polytechnic University, Hong Kong (email: ling-chen.sun@connect.polyu.hk; shuaizhengliu21@gmail.com; hongwei.yong@polyu.edu.hk; cslzhang@comp.polyu.edu.hk). This work is supported by the Hong Kong RGC RIF grant (R5001-18) and the PolyU-OPPO Joint Innovation Lab. J. Liang is with the OPPO Research Institute (e-mail: liang27jie@gmail.com). Optimized by Adam Optimized by Hybrid EA-Adam Fused Model Pretrained Model by ℓ 1 loss Optimization Stagnation LPIPS Abstract—High perceptual quality and low distortion degree are two important goals in image restoration tasks such as super-resolution (SR). Most of the existing SR methods aim to achieve these goals by minimizing the corresponding yet conflicting losses, such as the ℓ 1 loss and the adversarial loss. Unfortunately, the commonly used gradient-based optimizers, such as Adam, are hard to balance these objectives due to the opposite gradient decent directions of the contradictory losses. In this paper, we formulate the perception-distortion trade-off in SR as a multi-objective optimization problem and develop a new optimizer by integrating the gradient-free evolutionary algorithm (EA) with gradient-based Adam, where EA and Adam focus on the divergence and convergence of the optimization directions respectively. As a result, a population of optimal models with different perception-distortion preferences is obtained. We then design a fusion network to merge these models into a single stronger one for an effective perception-distortion tradeoff. Experiments demonstrate that with the same backbone network, the perception-distortion balanced SR model trained by our method can achieve better perceptual quality than its competitors while attaining better reconstruction fidelity. Codes and models can be found at https://github.com/csslc/EA-Adam. Unbalanced Performance better Lingchen Sun, Jie Liang, Shuaizheng Liu, Hongwei Yong, Lei Zhang better PSNR Fig. 1. Performance comparison of perception-distortion balanced SR models trained by the Adam optimizer and our hybrid EA-Adam optimizer on the BSD100 dataset. For the perceptual quality index LPIPS, the smaller the better. For the distortion degree index PSNR, the higher the better. The models optimized by Adam (orange triangle points) with different weighted combinations of ℓ 1 , perceptual and adversarial losses are either stagnated into an unsatisfactory solution, or achieve unbalanced performance. The models optimized by our EA-Adam optimizer (blue circle points) can obtain better convergence and divergence. Furthermore, the fused model (red star) from EA- Adam models achieves the best perceptual quality index while maintaining a high fidelity index. minimizes the ℓ 1 or ℓ 2 norm of the prediction difference in a feature space [7, 8]. In general, the SSIM loss and perceptual loss can improve the perceptual quality of SR outputs, but the improvement is limited because they can hardly generate details that are lost during degradation[17, 18]. To obtain perceptually more realistic HR images, the perception-distortion trade-off methods [7, 8, 19–22] have been developed in SR. Usually, they train a generative adversarial network (GAN) [23] by using the adversarial loss. Instead of minimizing the pixel-wise ℓ 2 or ℓ 1 loss or local structure-wise SSIM or perceptual loss, the adversarial loss is optimized to minimize the distribution divergence between the predicted SR images and HR images. In practice, it is unstable and even impossible to train the SR model by using only the adversarial loss. Therefore, most of the GAN-based SR methods weigh the ℓ 1 , perceptual and adversarial losses [7, 8] into one single loss for optimization. While GAN-based SR methods can generate a certain amount of realistic details, they will also introduce undesired artifacts [17, 24]. Many following works [12, 25–28] aim to reduce the artifacts caused by the adversarial loss while keeping the realistic details. Dario et al. [25] applied ℓ 1" 2312.15413v1,"S UPPRESSION OF E LECTROMAGNETIC C ROSSTALK BY D IFFERENTIAL E XCITATION FOR SAW G ENERATION A P REPRINT Shunsuke Ota 1,2 , Yuma Okazaki 2 , Shuji Nakamura 2 , Takehiko Oe 2 , Hermann Sellier 3 , Christopher Bäuerle 3 , Nobu-Hisa Kaneko 2 , Tetsuo Kodera 1 , and Shintaro Takada 2,4 1 Department of Electrical and Electronic Engineering, Tokyo Institute of Technology, Tokyo 152-8550, Japan National Institute of Advanced Industrial Science and Technology (AIST), National Metrology Institute of Japan (NMIJ), 1-1-1 Umezono, Tsukuba, Ibaraki 305-8563, Japan 3 Univ. Grenoble Alpes, CNRS, Grenoble INP, Institut Néel, 38000 Grenoble, France 4 Persent address: Department of Physics, Graduate School of Science, Osaka University, Toyonaka, Osaka 560-0043, Japan Corresponding author: ota.s.ab@m.titech.ac.jp 2 December 27, 2023 A BSTRACT Surface acoustic waves (SAWs) hold a vast potential in various fields such as spintronics, quantum acoustics, and electron-quantum optics, but an electromagnetic wave emanating from SAW generation circuits has often been a major hurdle. Here, we investigate a differential excitation method of interdigital transducers (IDTs) to generate SAWs while reducing the electromagnetic wave. The results show that electromagnetic waves are suppressed by more than 90 % in all directions. This suppression overcomes the operating limits and improves the scalability of SAW systems. Our results promise to facilitate the development of SAW-based applications in a wide range of research fields. Surface acoustic waves (SAWs) are a versatile phononic technology widely used in both industrial applications and basic research Delsing et al. [2019]. In industry, they are crucial for frequency filtering in wireless devices IEE and are used for the sensing and mixing of trace amounts of liquids Go et al. [2017]. In the realm of basic research, SAWs are leading to increasingly impressive results in spintronics, such as spin currents Kobayashi et al. [2017] and skyrmion generation Yokouchi et al. [2020], and in quantum acoustics, such as coupling to superconducting qubits Gustafsson et al. [2014], Manenti et al. [2017], Noguchi et al. [2017], Moores et al. [2018], Bolgar et al. [2018] and developing a beam splitter Qiao et al. [2023]. Furthermore, in the field of electron-quantum optics, various studies have been conducted Hermelin et al. [2011], McNeil et al. [2011], Stotz et al. [2005], Bertrand et al. [2016], Takada et al. [2019], Jadot et al. [2021], Ito et al. [2021], Edlbauer et al. [2021], Wang et al. [2022, 2023]. In combination with quantum dots on semiconductors, the transport of single electrons across micrometer distances has been demonstrated Hermelin et al. [2011], McNeil et al. [2011], Takada et al. [2019], as well as the coherent transport of electron spins Bertrand et al. [2016], Jadot et al. [2021]. The use of SAWs in quantum information processing has been proposed for some time Barnes et al. [2000], Foden et al. [2000], Rodriquez et al. [2005], and recently the development of electron flying qubits Bäuerle et al. [2018], Edlbauer et al. [2022] has been studied. Meanwhile, such developments of SAWs often face the persistent problem of electromagnetic wave crosstalk. High frequency components in experimental circuits to generate SAWs emit electromagnetic waves while generating SAWs. This electromagnetic wave is picked up by the metal gates of the target structure, which are used to conduct the intended experiments (e.g., the metal gates that define the quantum dots), and generates fluctuation of the electric potential in the target. This undesired fluctuation not only hides the desired effect by the SAW, but also interferes with the SAW to produce a negative effect Kataoka et al. [2006], ota [2023]. Indeed, this crosstalk is pronounced and should be one of the reasons why quantum current sources using SAWs were eventually largely abandoned, despite great efforts over the years Shilton et al. [1996], Talyanskii et al. [1997], Cunningham et al. [1999, 2000], Ebbecke et al. [2002], P. Utko and Lindelof [2003], Ford [2017]." 2312.15438v1,"Vincenzo Caligiuri, Hyunah Kwon, Andrea Griesi, Yurii P. Ivanov, Andrea Schirato, Alessandro Alabastri, Massimo Cuscunà, Gianluca Balestra, Antonio De Luca, Tlek Tapani, Haifeng Lin, Nicolò Maccaferri, Roman Krahne, Giorgio Divitini, Peer Fischer and Denis Garoli * Dry synthesis of bi-layer nanoporous metal films as plasmonic metamaterial Abstract: Nanoporous metals are a class of nanostructured materials finding extensive applications in multiple fields thanks to their unique properties attributed to their high surface area and interconnected nanoscale ligaments. They can be prepared following different strategies, but the deposition of an arbitrary pure porous metal is still challenging. Recently, a dry synthesis of nanoporous films based on the plasma treatment of metal thin layers deposited by physical vapour deposition has been demonstrated, as a general route to form pure nanoporous films from a large set of metals. An interesting aspect related to this approach is the possibility to apply the same methodology to deposit the porous films as a multilayer. In this way, it is possible to explore the properties of different porous metals in close contact. As demonstrated in this paper, interesting plasmonic properties emerge in a nanoporous Au-Ag bi-layer. The versatility of the method coupled with the possibility to include many different metals, provides an opportunity to tailor their optical resonances and to exploit the chemical and mechanical properties of components, which is of great interest to applications ranging from sensing, to photochemistry and photocatalysis. Keywords: nanoporous metal; plasmonics; multilayer; EELS; catholuminescence 1 Introduction Nanoporous metals (NPMs), are a unique class of metamaterials, made of solid metals with nanosized porosity, ultrahigh specific surface area, good electrical conductivity, high structural stability, and tunable optical properties.[1] These unique characteristics have facilitated their use in many fields, such as electrochemical and optical sensing, photo and chemical catalysis, and advanced energy technology. In particular, NPMs have been extensively explored for plasmonic applications,[2] as their structural and optical properties can be easily tuned by controlling the conditions used during their preparation. Many different methods, such as templating, dealloying, and colloidal chemistry, have previously been employed to prepare NPMs, each with its own merits and limitations. Template-based methods enable a precise control over size and microstructure, but are generally difficult and time consuming to implement.[3] Wet-chemistry methods have been also explored, however, the control over the porosity is still a challenge. Dealloying, a widely used method, allows varied pore sizes and structural properties, but it faces challenges in completely removing less noble metals during the etching process, impacting the final NPM’s properties. More importantly, it works only for a limited number of metals. [4]–[9] To address these limitations, a new dry-synthesis route to obtain impurity-free NPM films has been recently demonstrated.[10] In this method, the NPMs are formed by the coalescence of metal nanoparticles in a low-temperature plasma, enabling the production of a large set of metals with no impurities. The films can be extremely thin (about 10 nm), and can be thickened through replicating the process multiple times, i.e. thicker films can be deposited (as n layers) replicating the process several times using the n-1 layer as substrate. More importantly, the process allows for the serial deposition of multi-layered materials, either of the same or different metals. Therefore, it is particularly advantageous for creating bi-layer (or multi-layer) NPMs that are in close contact, which is challenging with conventional techniques. Here, we focus on bi-layer NPMs using gold and silver, the most used plasmonic materials, and we analyze their optical properties in detail. Our system is one of the first examples of bimetallic nanoporous coating, and promises a number of potential applications in various fields. The use of bi-metallic nanostructures has been recently reported as a very interesting configuration to explore plasmonics, in particular, for catalysis. Compound nanoparticles (NPs) are typical structures, where a plasmonic metal (generally Au or Ag) is supported by a catalytic metal (Pd, Pt, etc.) to leverage the combined effect of plasmonics that converts optical radiation into energy, and traditional catalysis that promotes adsorption of molecules and that facilitates chemical conversion due to surface active atoms. Bimetallic NPs systems have been explored in several recent papers [11][12]. Among them, the so-called “antenna-reactor” systems constitute the simplest but most effective example of bi-metallic nano-structures for catalysis.[12][13][14] [15] Bimetallic nano-structures find also broad applications in plasmonic heat generation,[17] Surface Enhanced Raman Spectroscopy (SERS),[18]–[20] dechlorination,[21] photothermal therapy,[22] among the others. Either a bottom up (chemical synthesis) or a top-down (physical or chemical vapor deposition, lithography, etc.) approach is adopted. All these techniques, involve sophisticated procedures, relying strongly on spatial order. The approach described in this work relies instead on a macroscopic homogenization effect for the achievement of a tailored dielectric permittivity. Our approach, therefore, lifts the strict geometric constraints of previous methods, and thereby expands *Corresponding author: Denis Garoli, Dip. di Scienze e Metodi dell'Ingegneria, Università di Modena e Reggio Emilia, via Amendola 2, 42122 Reggio Emilia, Italy , E-mail: denis.garoli@unimore.it Vincenzo Caligiuri, Denis Garoli, Roman Krahne, Andrea Griesi, Yurii P. Ivanov, Giorgio Divitini: Istituto Italiano di Tecnologia, Via Morego 30, 16136 Genova, Italy Hyunah Kwon, Peer Fischer: Institute for Molecular Systems Engineering and Advanced Materials, Heidelberg University, 69120 Heidelberg, Germany; Max Planck Institute for Medical Research, 69120 Heidelberg, Germany Andrea Schirato: Deparment of Physics, Politecnico di Milano, Piazza L. da Vinci 32, I-20133 Milan, Italy Alessandro Alabastri: Department of Electrical and Computer Engineering, Rice University, 6100 Main Street MS-378, Houston, TX 77005, USA Massimo Cuscunà, Gianluca Balestra: Institute of Nanotechnology - CNR NANOTEC c/o Campus Ecotekne, Via Monteroni 73100 Lecce (Italy) Tlek Tapani, Haifeng Lin, Nicolò Maccaferri: Department of Physics, Umea˚ University, Linnaeus v€ag 24, SE-90187 Umea˚, Sweden Vincenzo Caligiuri, Antonio De Luca: 1. Dipartimento di Fisica, Università della Calabria, via P. Bucci 33b, 87036 Rende (CS), Italy. 2. Istituto di Nanotecnologia (CNR-Nanotec) SS di Rende, via P. Bucci 33c, 87036 Rende, Italy." 2312.15444v1,"1 Variation-Resilient FeFET-Based In-Memory Computing Leveraging Probabilistic Deep Learning Bibhas Manna, Arnob Saha, Zhouhang Jiang, Kai Ni, and Abhronil Sengupta, Senior Member, IEEE Abstract—Reliability issues stemming from device level nonidealities of non-volatile emerging technologies like ferroelectric field-effect transistors (FeFET), especially at scaled dimensions, cause substantial degradation in the accuracy of In-Memory crossbar-based AI systems. In this work, we present a variationaware design technique to characterize the device level variations and to mitigate their impact on hardware accuracy employing a Bayesian Neural Network (BNN) approach. An effective conductance variation model is derived from the experimental measurements of cycle-to-cycle (C2C) and device-to-device (D2D) variations performed on FeFET devices fabricated using 28 nm high-k metal gate technology. The variations were found to be a function of different conductance states within the given programming range, which sharply contrasts earlier efforts where a fixed variation dispersion was considered for all conductance values. Such variation characteristics formulated for three different device sizes at different read voltages were provided as prior variation information to the BNN to yield a more exact and reliable inference. Near-ideal accuracy for shallow networks (MLP5 and LeNet models) on the MNIST dataset and limited accuracy decline by ∼3.8-16.1% for deeper AlexNet models on CIFAR10 dataset under a wide range of variations corresponding to different device sizes and read voltages, demonstrates the efficacy of our proposed device-algorithm co-design technique. Index Terms—Variation-Aware Design, FeFET Crossbar, Device-Algorithm Co-Design, Bayesian Neural Network, In- Memory Computing. I. I NTRODUCTION Emerging non-volatile memories capable of performing simultaneous compute and storage functionalities show great promise for the hardware acceleration of deep neural networks [1], [2]. The data-intensive and complex vector-matrix multiplication operations required in neural networks can be realized on-chip by harnessing the inherent physical attributes of the memory devices arranged in an array fashion - resulting in “In-Memory Computing”. Among different potential memory candidates such as resistive random-access memory (RRAM), phase-change memory (PCM), magnetic devices, etc., hafniabased FeFET has lately earned great interest due to its CMOS compatibility, low energy operation, multilevel programming capability with wider dynamic range, decoupled read-write operation, easy array-level integration, among others [3]– [6]. The voltage-driven partial polarization switching in the ferroelectric layer of FeFET promotes gradual tuning of channel conductivity, mimicking analog synaptic weight update B. Manna, A. Saha, and A. Sengupta are with the School of Electrical Engineering and Computer Science, The Pennsylvania State University, University Park, PA 16802, USA. E-mail: sengupta@psu.edu. Z. Jiang and K. Ni are with the Department of Electrical Engineering, University of Notre Dame, IN 46556 USA. behavior. However, process variation induced stochastic variabilities stemming primarily from the poly-crystalline ferroelectric and their pronounced effect with device scaling poses a serious challenge to accomplishing reliable computing using FeFET crossbars. The device-level non-idealities with readwrite fluctuations cause the stored weight (i.e., programmed conductance) to deviate significantly from the expected trained value, resulting in drastic accuracy degradation of the neural network at the hardware level. Thus, addressing device-level reliability and proposing practical solutions to combat their consequences are crucial to designing variation-tolerant FeFET based neuromorphic computing. Prior efforts in this direction mostly adopt either expensive retraining or repeated evaluation-remapping methods demanding non-trivial design overhead [7]–[9]. Some works incorporate generalized noise models in the network weights at the algorithm level and attempt to compensate for their effects through iterative training but are unable to perform the learning task jointly with robustness optimization [10], [11]. Bayesian inference-based approach on memristor-crossbar based systems considering device non-idealities and stuck-at-faults has been proposed recently to achieve robust computing [12], [13]. However, the proposal is formulated based on a parameterized canonical form of variation derived from a more generalized and hypothetical device model and therefore does not reflect realistic interplay of variations with device dimensions and operating voltage conditions. This work seeks to bridge this critical gap by underscoring the strong need to consider such hardware-software co-design effects in algorithm design supported by extensive experimental variation characterization on industry-scale FeFETs and subsequent performance evaluation on standard machine learning benchmark suites. An empirical conductance variation model derived at the individual device level is coupled to the probabilistic learning based uncertainty optimizer at the algorithm level to abate the effect of hardware non-idealities on recognition performance. The work possesses the following distinctive novelties: Formulation of a realistic conductance variation model capturing relationship of device non-idealities with scaling and operating voltage conditions through direct experimental characterization of scaled FeFET devices fabricated on industry standard process technology. • Design of a practically feasible variation-aware framework by incorporating device size-dependent unique variation characteristics against various programming voltages into the BNN training framework to deliver robust and stable inference. •" 2312.15447v1,"S UPERPIXEL - BASED AND S PATIALLY - REGULARIZED D IFFUSION L EARNING FOR U NSUPERVISED H YPERSPECTRAL I MAGE C LUSTERING Kangning Cui ∗,† Department of Mathematics City University of Hong Kong Kowloon, Hong Kong Ruoning Li Department of Mathematics City University of Hong Kong Kowloon, Hong Kong Sam L. Polk Department of Mathematics Tufts University Medford, MA, USA Yinyi Lin Department of Geography The University of Hong Kong Pokfulam, Hong Kong Hongsheng Zhang Department of Geography The University of Hong Kong Pokfulam, Hong Kong James M. Murphy Department of Mathematics Tufts University Medford, MA, USA Robert J. Plemmons Department of Computer Science Wake Forest University Winston-Salem, NC, USA Raymond H. Chan ∗ Department of Mathematics City University of Hong Kong Kowloon, Hong Kong A BSTRACT Hyperspectral images (HSIs) provide exceptional spatial and spectral resolution of a scene, enabling a wide range of applications in remote sensing. However, the high dimensionality, presence of noise and outliers, and the need for precise labels of HSIs present significant challenges to the analysis of HSIs, motivating the development of performant HSI clustering algorithms. In this paper, we propose a novel unsupervised HSI clustering algorithm—Superpixel-based and Spatiallyregularized Diffusion Learning (S 2 DL)—which addresses these challenges by incorporating rich spatial information encoded in HSIs into a diffusion geometrybased clustering procedure. S 2 DL employs the Entropy Rate Superpixel (ERS) segmentation technique to partition an image into superpixels. From these superpixels, a spatially-regularized diffusion graph is constructed using the most representative high-density pixels, reducing computational burden while maintaining an accurate perspective of the image. Cluster modes (points serving as exemplars for underlying cluster structure) are identified as the highest-density pixels farthest in diffusion distance (calculated using the aforementioned graph) from other highestdensity pixels. These cluster modes are used to guide the labeling of the remaining representative pixels from ERS superpixels. Finally, majority voting is applied to the labels assigned within each superpixel to propagate labels to the rest of the ∗ † Also affiliated with the Hong Kong Centre for Cerebro-Cardiovascular Health Engineering, 19W, Science Park, Hong Kong Corresponding author. Email: kangnicui2-c@my.cityu.edu.hk Code: github.com/ckn3/S2DL" 2312.15451v1,"Bistable microbeam-based airflow sensor with piezoresistive snap-through detection Bistable microbeam-based airflow sensor with piezoresistive snap-through detection I. Litvinov, 1 G. Spaer Milo, 1 A. Liberzon, 1 and S. Krylov 1 School of Mechanical Engineering, Tel Aviv University, Tel Aviv Jaffo, 6997801, Israel (*Electronic mail: ivanlitvinov@mail.tau.ac.il) (Dated: 27 December 2023) We report on the first implementation of a piezoresistive interrogation in a bifurcation-based airflow velocity sensor. The resistivity changes in an entire beam are measured to detect snap-through transitions in a bistable double-clamped microbeam that is affected by airflow and serves as a sensing element. The flow velocity is extracted by monitoring the critical voltages of snap-through transitions. Piezoresistive sensing is especially suitable for the responses monitoring of the exposed to the environment, free-standing heated microbeam sensor, where optical, piezoelectric, or electrostatic interrogation methods are not applicable. Our digital sensor has lower power consumption and higher sensitivity (∼ 3 V/m/s) than typical analog micro-hot-wire anemometers. Our results indicate that the suggested approach is a promising and reliable method for a flow sensor. The field of microscale flow sensors has garnered significant research attention within the micro-electro-mechanicalsystems (MEMS) community. 1 Hot-wire and hot-film sensors are the most commonly used types. 2 These sensors measure the heat loss in their elements caused by thermal convection generated by the surrounding fluid, which is directly related to the flow velocity and, in some cases, the flow direction. 3 Despite recent advancements in flow sensing using MEMS thermal sensors, challenges remain, including unwanted heat leakage, low sensitivity, and high power consumption. 4 Recently, we introduced a new flow measurement principle, which exploits the intrinsic coupling between the flow and the electrothermal and mechanical nonlinear behavior of bistable beams. 5 The initially curved double-clamped microbeam exhibits unique bistable behavior and can be in two stable states under the same load. This feature gives the beam exceptional sensitivity to external stimuli near the stability limits near the critical points, making it an ideal candidate for a flow sensor. The mechanical structure is pushed to its stability limits and is exceptionally responsive to even the smallest changes in heat transfer caused by flow. This device has the potential to offer increased velocity sensitivity, reduced power consumption, and improved robustness compared to traditional anemometer-type devices. 5–8 . While bifurcation flow sensors have shown promise, their integration remains unexplored. One of the central challenges is developing a reliable mechanical response detection approach suitable for implementation in an integrated stand-alone device. In our previous studies, Laser Doppler Vibrometry (LDV) was used to monitor the response of the microbeam. 5–9 Although LDV sensing is suitable in a laboratory environment 10 , it cannot be implemented in the integrated stand-alone sensors. Electrostatic 11 or piezoelectric sensing is also less practical, as closely spaced electrodes or additional piezo-layers can negatively affect the flow sensor functionality. 12 Piezoresistive pressure sensors are well known and rely on materials that change electrical resistance when subjected to stress or strain 13 . Piezoresistive sensing has been widely used in MEMS devices, allowing them to avoid additional design complexity. 14–16 The piezoresistive sensing using a nanowire-type gauge was recently successfully implemented in a nano-electromechanical-system (NEMS)-based gyroscope (see 17 ). In mechanical flow sensors, the piezoresistive effect is often exploited to detect deformations of cantilever-type structures caused by drag or lift forces. 18–21 This paper aims to present a simple yet reliable method for detecting the snap-through transitions in a bistable doubleclamped microbeam as a bifurcation-based airflow velocity sensor. Robust detection of the snap-through transitions using the piezoresistive effect of the entire microbeam proved to be the most suitable sensing approach. This study is essential to realizing a fully integrated MEMS flow sensor with enhanced performance. A double-clamped microbeam of length L, width b, thickness d, and initial midpoint elevation h is fabricated of highly doped single crystal Si using the SOIMUMPs™ process. 5–8 The initially curved bell-shaped microbeam is shown in Fig. 1(a,b). The nominal (as designed) initial shape of the beam is defined by lithography and is described by the function z 0 (x) = −hφ (x) (where φ (x) = 1/2(1 − cos (2πx/L)) is the first bucking mode of a straight beam). The beam’s dimensions are provided in Table I. The electrostatically actuated beam is designed to deflect in the in-plane (parallel to the substrate) z-direction. TABLE I. The nominal, as designed, parameters of the beam used in the experiments. Parameter Size (µm) Length, L 500 Width, b 25 Thickness, d 2.0 Initial elevation, h 2.5 Beam-electrode distance, g 0 10 The operating principle of this flow sensor can be summarized as follows: the voltage V ES applied to the electrode (shown in Fig. 1,(b)) influences the electrostatic force acting on the beam and causes the beam to be attracted to the electrode. Exceeding a critical snap-through (ST) value V ST causes a dynamic transition from the first to the second stable equilibrium, as displayed in Fig. 1(b, left axis)." 2312.15453v1,"Switching dynamics in Al/InAs nanowire-based gate-controlled superconducting transistor Tosson Elalaily, 1, 2, 3 Martin Berke, 1, 2 Ilari Lilja, 4, 5 Alexander Savin, 5 Gergő Fülöp, 1, 2 Lőrinc Kupás, 1, 2 Thomas Kanne, 6 Jesper Nygård, 6 Péter Makk, 1, 7, ∗ Pertti Hakonen, 4, 5, † and Szabolcs Csonka 1, 2, 8 1 Department of Physics, Institute of Physics, Budapest University of Technology and Economics, Müegyetem rkp. 3., H-1111 Budapest, Hungary 2 MTA-BME Superconducting Nanoelectronics Momentum Research Group, Müegyetem rkp. 3., H-1111 Budapest, Hungary 3 Department of Physics, Faculty of Science, Tanta University, Al-Geish St., 31527 Tanta, Gharbia, Egypt 4 Low-Temperature Laboratory, Department of Applied Physics, Aalto University School of Science, P.O. Box 15100, Fi-00076 Aalto, Finland 5 QTF Centre of Excellence, Department of Applied Physics, Aalto University, Fi-00076 Aalto, Finland 6 Center for Quantum Devices and Nano-Science Center, Niels Bohr Institute, University of Copenhagen, Universitetsparken 5, DK-2100, Copenhagen, Denmark 7 MTA-BME Correlated van der Waals Structures Momentum Research Group, Müegyetem rkp. 3., H-1111 Budapest, Hungary 8 Institute of Technical Physics and Materials Science, Center for Energy Research, Konkoly-Thege Miklós út 29-33., 1121, Budapest, Hungary (Dated: December 27, 2023) The observation of the gate-controlled supercurrent (GCS) effect in superconducting nanostructures increased the hopes for realizing a superconducting equivalent of semiconductor field-effect transistors. However, recent works attribute this effect to various leakage-based scenarios, giving rise to a debate on its origin. A proper understanding of the microscopic process underlying the GCS effect and the relevant time scales would be beneficial to evaluate the possible applications. In this work, we observed gate-induced two-level fluctuations between the superconducting state and normal state in Al/InAs nanowires (NWs). Noise correlation measurements show a strong correlation with leakage current fluctuations. The time-domain measurements show that these fluctuations have Poissonian statistics. Our detailed analysis of the leakage current measurements reveals that it is consistent with the stress-induced leakage current (SILC), in which inelastic tunneling with phonon generation is the predominant transport mechanism. Our findings shed light on the microscopic origin of the GCS effect and give deeper insight into the switching dynamics of the superconducting NW under the influence of the strong gate voltage. I. INTRODUCTION In 2018, De Simoni et al. [1] observed a monotonic suppression of the supercurrent in titanium (Ti) NWs by increasing the voltage beyond a certain threshold at a nearby gate (side or back) electrode. With further increases in the gate voltage, the supercurrent is fully suppressed, and the device is switched to the normal state, providing a superconducting equivalent of semiconductor CMOS transistors with an expected high switching speed and low power consumption. Moreover, the structure of gate-controlled superconducting nanodevices can be readily scaled up with greater compatibility for interfacing with CMOS transistors in comparison to alternative superconducting devices [2–5]. The earlier experimental observations of the GCS were associated with various unique fingerprints, which were attributed to the influence of the external E-field [1, 6–16]. Later on, most of these fingerprints were observed in other works suggesting leakage current-based scenarios [17–23]. Furthermore, the different experimental conditions, e.g., superconducting material, substrate, and device configuration, ∗ Makk.peter@ttk.bme.hu † Pertti.hakonen@aalto.fi make it hard to compare different works [24, 25]. As a result, the microscopic origin of the GCS remains controversial. In particular, the role of the leakage current is the key point in the ongoing debate between different studies. Therefore, it will be necessary to understand the microscopic origin behind the GCS effect to assess the reliability of the GCS-based devices to compete with semiconductor technology in various applications. The low-frequency 1/f α noise is widely observed in various nanoelectronic devices [26–29]. Investigation of 1/f α noise can provide valuable information and a deeper understanding of the transport mechanisms and the dominant sources of fluctuations in different nanodevices [26– 29]. In addition, noise correlation measurements are very powerful techniques that can be used for probing the cross-correlation between different fluctuating quantities in such systems, which has proven to be successful, for example in the investigation of the bosonic or fermionic, or even the anyonic nature of charge carriers in two-dimensional electron gas [30–33]. In this work, we address the GCS effect in Al/InAs NWs with 1/f α noise measurements for the first time. By carrying out cross-correlation measurements, we show that gateinduced fluctuations in the superconducting NW are directly related to time-dependent leakage current. Furthermore, we performed time-domain measurements to" 2312.15464v1,"k-Domination invariants on Kneser graphs Boštjan Brešar 1,2 , María Gracia Cornet 3,4 , Tanja Dravec 1,2 , and Michael A. Henning 5 1 Faculty of Natural Sciences and Mathematics, University of Maribor, Slovenia 2 Institute of Mathematics, Physics and Mechanics, Ljubljana, Slovenia 3 Depto. de Matemática, FCEIA, Universidad Nacional de Rosario, Argentina 4 Consejo Nacional de Investigaciones Científicas y Técnicas, Argentina 5 Department of Mathematics and Applied Mathematics, University of Johannesburg, South Africa December 27, 2023 Abstract In this follow-up to [M.G. Cornet, P. Torres, arXiv:2308.15603], where the k-tuple domination number and the 2-packing number in Kneser graphs K(n, r) were studied, we are concerned with two variations, the k-domination number, γ k (K(n, r)), and the k-tuple total domination number, γ t×k (K(n, r)), of K(n, r). For both invariants we prove monotonicity results by showing that γ k (K(n, r)) ≥ γ k (K(n + 1, r)) holds for any n ≥ 2(k + r), and γ t×k (K(n, r)) ≥ γ t×k (K(n + 1, r)) holds for any n ≥ 2r + 1. We prove that γ k (K(n, r)) = γ t×k (K(n, r)) = k + r when n ≥ r(k + r), and that in this case every γ k -set and γ t×k -set is a clique, while γ k (r(k + r) − 1, r) = γ t×k (r(k + r) − 1, r) = k + r + 1, for any k ≥ 2. Concerning the 2-packing number, ρ 2 (K(n, r)), of K(n, r), we prove the exact values of ρ 2 (K(3r − 3, r)) when r ≥ 10, and give sufficient conditions for ρ 2 (K(n, r)) to be equal to some small values by imposing bounds on r with respect to n. We also prove a version of monotonicity for the 2-packing number of Kneser graphs. Keywords: Kneser graphs, k-domination, k-tuple total domination, 2-packing. AMS subject classification (2010): 05C69, 05D05 1 Introduction Letting n ≥ 2r the Kneser graph K(n, r) has the r-subsets of an n-set as its vertices and two vertices are adjacent in K(n, r) if the corresponding sets are disjoint. The interest for Kneser graphs goes back to 1960s and 1970s when two classical theorems concerning their independence and chromatic number were proved [5, 18]. Many other graph invariants have been investigated in Kneser graphs, which makes them one of the most intensively studied classes of graphs. In particular, several authors have considered the domination number of Kneser graphs (see the most recent paper [19]), but only lower and upper bounds have been found in general, while the exact values of γ(K(n, r)) were found only when n is sufficiently large with respect to r. In three recent papers, the authors have considered Kneser graphs in relation with some variations of domination, namely, Grundy domination [2], Roman domination [21] and k-tuple domination [4]. This paper is a follow-up of the latter, where we extend our investigation from k-tuple domination to two similar variations, which we next present. 1" 2312.15467v1,"FPGA-Placement via Quantum Annealing Thore Gerlach Stefan Knipp David Biesner Fraunhofer IAIS Sankt Augustin, Germany thore.gerlach@iais.fraunhofer.de Thales SIX Ditzingen, Germany Stefan.KNIPP@thalesgroup.com Fraunhofer IAIS Sankt Augustin, Germany david.biesner@iais.fraunhofer.de Stelios Emmanouilidis Klaus Hauber Nico Piatkowski Thales SIX Fraunhofer IAIS Ditzingen, Germany Sankt Augustin, Germany stelios.emmanouilidis@iais.fraunhofer.de Klaus.HAUBER@thalesgroup.com ABSTRACT Field-Programmable Gate Arrays (FPGAs) have asserted themselves as vital assets in contemporary computing by offering adaptable, reconfigurable hardware platforms. FPGA-based accelerators incubate opportunities for breakthroughs in areas, such as real-time data processing, machine learning or cryptography—to mention just a few. The procedure of placement—determining the optimal spatial arrangement of functional blocks on an FPGA to minimize communication delays and enhance performance—is an NP-hard problem, notably requiring sophisticated algorithms for proficient solutions. Clearly, improving the placement leads to a decreased resource utilization during the implementation phase. Adiabatic quantum computing (AQC), with its capability to traverse expansive solution spaces, has potential for addressing such combinatorial problems. In this paper, we re-formulate the placement problem as a series of so called quadratic unconstrained binary optimization (Qubo) problems which are subsequently solved via AQC. Our novel formulation facilitates a straight-forward integration of design constraints. Moreover, the size of the sub-problems can be conveniently adapted to the available hardware capabilities. Beside the sole proposal of a novel method, we ask whether contemporary quantum hardware is resilient enough to find placements for real-world-sized FPGAs. A numerical evaluation on a D-Wave Advantage 5.4 quantum annealer suggests that the answer is in the affirmative. CCS CONCEPTS • Hardware → Reconfigurable logic and FPGAs; Quantum computation; • Theory of computation → Discrete optimization; • Mathematics of computing → Permutations and combinations. KEYWORDS Quantum Computing, QUBO, FPGA, Placement, QAP, Permutations 1 INTRODUCTION Logic optimization, placing and routing are fundamental and the most time-consuming steps in the field of chip design for both ASICs and FPGAs [30]. The number of transistors and logic gates on a single chip is increasing more and more, leading to the mentioned processes consuming more and more time. This limits the speed of development cycles, which is an issue of productivity but can also be a security issue, since faster development cycles for cryptography related algorithms allow for improved security analysis. Fraunhofer IAIS Sankt Augustin, Germany nico.piatkowski@iais.fraunhofer.de Here, we focus on the placement step, in which we aim to find an ideal placement of functional blocks on the chip. The advantages of a good placement are two-fold: On the one hand, minimizing the physical distance between connected elements leads to shorter wire lengths and therefore a higher maximum clock rate. On the other hand, a good placement can lead to a faster routing process, i.e., the routing algorithm of the connections between elements finding a good solution in fewer iterations and less time. Since the placement itself is an increasingly time-consuming step, decreasing the runtime of the placement algorithm while maintaining a high solution quality is of great interest. Taking a closer look at the math behind the placement in the floor-planning case, we find that it is equivalent to the quadratic assignment problem (QAP) [3, 13]. The goal of the QAP is to assign each given element to a unique location, minimizing a given cost function. In chip design, that cost function can be the total wire length between connected units given by a placement on the chip. Minimizing that function leads to a shorter maximum wire length and with that the possibility for a higher maximum clock rate. The QAP is an NP-hard combinatorial optimization problem, and moreover, one of the hardest in this class, since there is no approximation algorithm for producing a sub-optimal solution with guarantees in polynomial time [31]. Quantum computing (QC), especially adiabatic quantum computing (AQC) [2, 12] and its physical implementation of quantum annealing (QA), is very promising in solving such problems better than classical 1 algorithms. This can be done by reformulating the given QAP to a quadratic unconstrained binary optimization (Qubo) problem. While real-world quantum devices suffer from a series of technical limitations, there is theoretical evidence that hard combinatorial problems can be solved exactly via AQC. We leverage these theoretical insights and describe the first algorithm for placement of functional blocks (e.g., Lookup Tables (LUT), BlockRAMs (BRAM), Digital Signal Processing (DSP)) on an FPGA, based on solving a QAP via QC. Our contributions can be summarized as follows: • We propose a theoretically sound iterative adiabatic quantum algorithm for solving an unbalanced QAP with the ability of incorporating constraints on allowed permutations and convenient adaptation of the problem sizes to available hardware capabilities. • We explain how this algorithm can be applied to solve the FPGA-Placement problem. 1 The term “classical” is physics jargon and means “not quantum”." 2312.15488v1,"The Zeta (ζ) Notation for Complex Asymptotes Anurag Dutta 1 , K. Lakshmanan 2 , John Harshith 3 , and A. Ramamoorthy 4 1 Undergraduate, Department of Computer Science, Government College of Engineering and Textile Technology, Serampore, Calcutta, India 2 Professor, Department of Mathematics, Kuwait American School of Education, Salmiya, Kuwait 3 Undergraduate, Department of Computer Science, Vellore Institute of Technology, Vellore Campus, Tamil Nadu, India 4 Assistant Professor, Department of Mathematics, Velammal Engineering College, Anna University, Chennai, Tamil Nadu, India anuragdutta.research@gmail.com Abstract. Time Complexity is an important metric to compare algorithms based on their cardinality. The commonly used, trivial notations to qualify the same are the Big-Oh, Big-Omega, Big-Theta, Small-Oh, and Small-Omega Notations. All of them, consider time a part of the real entity, i.e., Time coincides with the horizontal axis in the argand plane. But what if the Time rather than completely coinciding with the real axis of the argand plane, makes some angle with it? We are trying to focus on the case when the Time Complexity will have both real and imaginary components. For Instance, if T (n) = n log n, the existing asymptomatic notations are capable of handling that in real time But, √ if we come across a problem where, T (n) = n log n + i · n 2 , where, i = 2 −1, the existing asymptomatic notations will not be able to catch up. To mitigate the same, in this research, we would consider proposing the Zeta Notation (ζ), which would qualify Time in both the Real and Imaginary Axis, as per the Argand Plane. Keywords: Complex Numbers · Exponential Integral · Euler Mascheroni Constant 1 Introduction Computing complexity theory within speculative mathematics and computer science is concerned with categorizing computation issues according to respective resource requirements and connecting different categories. Every computing task is a challenge that a computer can handle. The physical application of arithmetic computations, for instance, an algorithm [1], can solve a computation task. The evaluation of strategies and tractability theories [2] are subfields in mathematical computer science that are strongly linked. The aforementioned is completely dedicated to analyzing the number of resources required by a proposed methodology to come up with a solution, whereas the latter starts asking a" 2312.15494v1,"Variable Selection in High Dimensional Linear Regressions with Parameter Instability ∗ Alexander Chudik Federal Reserve Bank of Dallas, Dallas, USA M. Hashem Pesaran University of Southern California, Los Angeles, USA and Trinity College, Cambridge, UK Mahrad Sharifvaghefi † University of Pittsburgh, Pittsburgh, USA December 27, 2023 Abstract This paper is concerned with the problem of variable selection in the presence of parameter instability when both the marginal effects of signals on the target variable and the correlations of the covariates in the active set could vary over time. We pose the issue of whether one should use weighted or unweighted observations at the variable selection stage in the presence of parameter instability, particularly when the number of potential covariates is large. We allow parameter instability to be continuous or discrete, subject to certain regularity conditions. We discuss the pros and cons of Lasso and the One Covariate at a time Multiple Testing (OCMT) method for variable selection and argue that OCMT has important advantages under parameter instability. We establish three main theorems on selection, estimation post selection, and in-sample fit. These theorems provide justification for using unweighted observations at the selection stage of OCMT and down-weighting of observations only at the forecasting stage. It is shown that OCMT delivers better forecasts, in mean squared error sense, as compared to Lasso, Adaptive Lasso and boosting both in Monte Carlo experiments as well as in 3 sets of empirical applications: forecasting monthly returns on 28 stocks from Dow Jones , forecasting quarterly output growths across 33 countries, and forecasting euro area output growth using surveys of professional forecasters. Keywords: Lasso, One Covariate at a time Multiple Testing, OCMT, Parameter instability, Variable selection, Forecasting JEL Classifications: C22, C52, C53, C55 ∗ We are grateful to Elie Tamer (Editor), two anonymous reviewers and an associate editor, for their constructive comments and helpful suggestions. We have also benefited from discussions and comments by George Kapetanios, Oliver Linton, Ron Smith, and seminar participants at Cambridge University. The views expressed in this paper are those of the authors and do not necessarily reflect those of the Federal Reserve Bank of Dallas or the Federal Reserve System. This research was supported in part through computational resources provided by the Big-Tex High Performance Computing Group at the Federal Reserve Bank of Dallas. This paper in part was written when Sharifvaghefi was a doctoral student at the University of Southern California (USC). Sharifvaghefi gratefully acknowledges financial support from the Center for Applied Financial Economics at USC. † Corresponding author. Postal address: 230 S Bouquet St., Pittsburgh, PA, USA, 15260. Email: sharifvaghefi@pitt.edu." 2312.15497v1,"Deep Convolutional Neural Networks for Short- Term Multi-Energy Demand Prediction of Integrated Energy Systems Corneliu Arsene Department of Electrical and Electronic Engineering The University of Manchester Manchester, United Kingdom CorneliuArsene@gmx.com, ArseneCorneliu@tutanota.de arXiv Abstract— Forecasting power consumptions of integrated electrical, heat or gas network systems is essential in order to operate more efficiently the whole energy network. Multi-energy systems are increasingly seen as a key component of future energy systems, and a valuable source of flexibility, which can significantly contribute to a cleaner and more sustainable whole energy system. Therefore, there is a stringent need for developing novel and performant models for forecasting multi-energy demand of integrated energy systems, which to account for the different types of interacting energy vectors and of the coupling between them. Previous efforts in demand forecasting focused mainly on the single electrical power consumption or, more recently, on the single heat or gas power consumptions. In order to address this gap, in this paper six novel prediction models based on Convolutional Neural Networks (CNNs) are developed, for either individual or joint prediction of multi-energy power consumptions: the single input/single output CNN model with determining the optimum number of epochs (CNN_1), the multiple input/single output CNN model (CNN_2), the single input/ single output CNN model with training/validation/testing datasets (CNN_3), the joint prediction CNN model (CNN_4), the multiple-building input/output CNN model (CNN_5) and the federated learning CNN model (CNN_6). All six novel CNN models are applied in a comprehensive manner on a novel integrated electrical, heat and gas network system, which only recently has started to be used for forecasting. The forecast horizon is short-term (next half an hour) and all the predictions results are evaluated in terms of the Signal to Noise Ratio (SNR) and the Normalized Root Mean Square Error (NRMSE), while the Mean Absolute Percentage Error (MAPE) is used for comparison purposes with other existent results from literature. The numerical results show that the single input/single output CNN model with training/validation/testing datasets (CNN_3) is able to equal the performances of the single input/single output CNN model with determining the optimum number of epochs (CNN_1), and to outperform the other four prediction models. The prediction accuracy of the multi-energy buildings loads is shown to significantly depend on the level of non-linearity and scarcity existent in the input training dataset(s). Furthermore, this extensive multi-model study reveals that the characteristics (i.e. connections between the different networks, correlations between the different energy vectors) of the considered integrated system need to be explored when designing the predictive models. Keywords—Multi-Energy vector, Deep Learning models, Convolutional Neural Networks, Integrated Energy Systems, Electrical-Heat-Gas Networks, Federated Learning I. I NTRODUCTION Predicting the future state (i.e. power load consumption) The author would like to thank the Engineering and Physical Sciences Research Council (EPSRC) grants no. EP/T021969/1 (Multi-energy Control of Cyber-Physical Urban Energy System), EP/S00078X/2 (Supergen Energy Networks hub 2018) and EP/Y016114/1 (Supergen Energy Networks Impact Hub 2023) for supporting this work. of network systems is a key point in the operation of any such networks (e.g. electrical, heat) as it would allow the most appropriate decisions to be taken at the right time and at minimum costs [1]. Predicting the electrical power consumption has been studied by using different prediction models including Deep Learning (DL) models [2-20]. More recently, forecasting of the gas demand has been also implemented by using machine learning models [21-24]. Several methods to predict the heat demand have been also investigated such as Multiple Linear Regression (MLR), Seasonal Autoregressive Integrated Moving Average (SARIMA) [25], support vector machines [26,27], Artificial Neural Network (ANN) [28], wavelet methods [29], genetic algorithm or DL such as Temporal Convolutional Neural Network (TCN) [30]. The simulation and state estimation [33-41] of combined electrical, heat and gas network systems have received attention in the last decade [42-53]. However, the individual prediction (i.e. a single type of energy is predicted) or joint prediction (e.g. simultaneous prediction of electric, heat and gas energy vectors) of power consumption of combined electrical, heat and gas network systems is still at the beginning [54-60]. Therefore, there is a strong need to further develop and investigate predictive models, so that to gain a deeper understanding of the coupling and the interdependence between the different energy vectors (e.g. electric, heat or gas), their impact on forecasting as well as the need for forecasting the multiple-energy demands vectors, and not just one type of energy vector. One or multiple buildings are usually served by a single node of an electric, heat and/or gas network. Multiple interconnected nodes form the respective electric, heat or gas network, while multi-demand networks form an integrated energy system. Furthermore, not only the literature covering the forecasting of multi-energy demand is not developed yet, but just a few relevant models are commonly explored and compared (i.e. maximum two [55] or three [57]). For example, cooling/heating loads were predicted in [54] by using a multi-layer perceptron neural network. In [55] for single output forecasting of electric, cooling and heating loads, there were used static and non-linear ARX (Autoregressive Model with Exogenous Inputs). A model based on Deep Belief Networks (DBN) was developed in [56] for individual electric, heat and gas prediction of an industrial park, without considering the different energy network interconnections. In [57], there were compared mainly three models, the Long Short-Term Memory (LSTM) model, the NBeats model and a combination of a" 2312.15503v1,"Making Large Language Models A Better Foundation For Dense Retrieval Chaofan Li 1† , Zheng Liu 1†∗ , Shitao Xiao 1† , Yingxia Shao 2 1: Beijing Academy of Artificial Intelligence 2: Beijing University of Posts and Telecommunications zhengliu1026@gmail.com Abstract Dense retrieval needs to learn discriminative text embeddings to represent the semantic relationship between query and document. It may benefit from the using of large language models (LLMs), given LLMs’ strong capability on semantic understanding. However, the LLMs are pre-trained by text generation tasks, whose working pattern is completely different from representing texts as embeddings. As a result, it is imperative to study how to adapt LLMs properly so that they can be effectively initialized as the backbone encoder for dense retrieval. In this paper, we propose a novel approach, called LLaRA (LLM adatpeted for dense RetrivAl), which works as a post-hoc adaptation of LLM for the dense retrieval application. LLaRA consists of two pretext tasks: EBAE (Embedding-Based Auto-Encoding) and EBAR (Embedding-Based Auto-Regression), where the text embeddings from LLM are used to reconstruct the tokens for the input sentence and predict the tokens for the next sentence, respectively. LLaRA turns out to be simple, lightweight, and highly effective. It is applied to adapt LLaMA-2-7B (base) on the Wikipedia corpus, where it substantially improves the model’s fine-tuned performances on a variety of dense retrieval benchmarks, like MSMARCO and BEIR. Our model and code will be made publicly available at BGE repository 1 . 1 Introduction Dense retrieval is a new paradigm of IR brought forth by deep neural networks. Different from the conventional IR approaches, dense retrieval learns to represent the query and document as embeddings within the same latent space, where the semantic relationship between query and document can be reflected by the embedding similarity. Nowadays, dense retrieval has been a critical component in †. ∗. 1. Co-first authors. Corresponding author https://github.com/FlagOpen/FlagEmbedding many real-world applications, such as web search and open-domain question answering (Karpukhin et al., 2020; Xiong et al., 2020; Lu et al., 2020). Dense retrieval’s quality is severely influenced by the capacity of its backbone encoder. In the past few years, the pre-trained language models, e.g., BERT (Devlin et al., 2019), RoBERTa (Liu et al., 2019), T5 (Raffel et al., 2020), were intensively applied for the representation of query and document. It was empirically found that the expansion of model size and training scale can substantially contribute to both accuracy and generality of dense retrieval (Ni et al., 2021; Izacard et al., 2021; Wang et al., 2022b; Xiao et al., 2023). Recently, large language models (LLMs) have been fine-tuned as the general solutions for many classic NLP tasks (Wei et al., 2021; Chung et al., 2022). Considering LLMs’ superior capability on semantic understanding, it will also be promising to leverage such powerful models for dense retrieval. In fact, there have been pioneering endeavors in this direction, where LLMs are prompted or fine-tuned to generate discriminative embeddings to facilitate dense retrieval (Muennighoff, 2022; Neelakantan et al., 2022; Ma et al., 2023; Zhang et al., 2023). Despite the preliminary progress, it is still challenging to fully unleash LLMs’ potential for the dense retrieval application. Particularly, LLMs are pretrained by text generation, whose embeddings are learned to make predictions for the next tokens. As a result, the LLMs’ output embeddings will mainly focus on capturing the local and near-future semantic of the context. However, dense retrieval calls for embeddings to represent the global semantic about the entire context. Such a big discrepancy will severely restrict the direct application of LLMs for dense retrieval. To address the above problem, we propose a novel approach LLaRA (Figure 1), which works as a post-hoc adaptation of LLMs to improve their usability for dense retrieval. LLaRA can be regarded" 2312.15526v1,"Aspect category learning and sentimental analysis using weakly supervised learning Kalpa Subbaih a, b,* , Bharath Kumar Bolla c a UpGrad Education Private Limited, Mumbai, India b Liverpool John Moores University, UK c Salesforce, Hyderabad, India * Corresponding author Abstract The surge of e-commerce reviews has presented a challenge in manually annotating the vast volume of reviews to comprehend their underlying aspects and sentiments. This research focused on leveraging weakly supervised learning to tackle aspect category learning and the sentiment classification of reviews. Our approach involves the generation of labels for both aspects and sentiments, employing the Snorkel framework of WSL, which incorporates aspect terms, review sentiment scores, and review ratings as sources of weak signals. This innovative strategy significantly reduces the laborious labeling efforts required for processing such extensive datasets. In this study, we deployed hybrid models, namely BiLSTM , CNN-BiLSTM, and CNN-LSTM, which harness multiple inputs, including review text, aspect terms, and ratings. Our proposed model employs two distinct loss functions: Binary Cross Entropy with Sigmoid Activation for Multi-Label Classification, enabling us to learn aspect Labels such as Quality, Usability, Service, Size, and Price, and Categorical Cross Entropy with Softmax Activations for Multi-Class Classification. Subsequently, we meticulously evaluate the performance metrics of these three implemented models, including Macro F1 score and Macro Precision. CNN & Bi-LSTM model attained 0.78 and 0.79 F1 scores on aspect and sentiment identification, respectively. The outcomes of this research are poised to make a substantial contribution to e-commerce platforms, offering an efficient and automated means to label and analyze vast troves of user reviews. Keywords: Aspect Terms; Sentiment Analysis; Aspect based sentiment; Snorkel; Weak Supervision; BiLSTM; CNN; Multi class classification; * Corresponding author, E-mail address: bolla111@gmail.com 1. Introduction E-commerce has redefined the retail landscape, leveraging the internet to facilitate buying and selling. Central to this model is understanding and utilizing customer feedback, with 88% of customers making purchase decisions based on online reviews [1]. The surge in customer reviews has made it challenging to manually analyze feedback using traditional databases, giving rise to Big Data solutions like Hadoop for storage and Natural Language Processing (NLP) for understanding user sentiments. Sentiment Analysis, a crucial application of NLP, classifies sentiments at document, sentence, and aspect levels. For instance, in the user review, “The watch is too good but is very costly,” the 'product quality' aspect has a positive sentiment, while the 'price' aspect carries a negative sentiment. This form of sentiment analysis often relies on Lexiconbased approaches, Machine Learning, and, more recently, Deep Learning. Deep neural networks such as Bert and BiLSTM with Attention have shown impressive results for Sentiment Classification [1]. However, manual labeling of many e-commerce reviews for sentiment classification is a significant challenge. This issue has drawn research interest in weakly supervised learning (WSL), which uses noisy labeled data as weak signals to label many unlabeled data, thus reducing the laborious effort required for supervised learning [2]" 2312.15568v1,"Entangling two Dicke states in a periodic modulated quantum system Wuji Zhang, 1 Ruifang Wu, 1 Chunfang Sun, 1 Chunfeng Wu, 2 and Gangcheng Wang 1, ∗ 2 1 Center for Quantum Sciences and School of Physics, Northeast Normal University, Changchun 130024, China Science, Mathematics and Technology, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372, Singapore (Dated: December 27, 2023) We propose a theoretical approach for entangling two Dicke states in a periodic modulated quantum system. By considering two qubit ensembles that are nonuniformly coupled to a common resonator, we can derive an effective Hamiltonian whose energy levels depend nonlinearly on the excitation number of each qubit ensemble. More simplified effective Hamiltonian can be obtained by selecting appropriate driving parameters and initial state. Based on the dynamic evolution of the effective Hamiltonian, we can selectively achieve Dicke state transitions and generate entangled Dicke states controllably. For a special case, we can obtain ensemble-ensemble entangled states by performing a projective even-odd cat measurement. By implementing Gaussian soft temporal modulation, we can effectively suppress off-resonant contributions in the interaction and enhance the fidelity of target states. Furthermore, by utilizing the Holstein-Primakoff transformation, we study the resonator-ensemble coupling system in the thermodynamic limit and investigate the generation of entangled magnon states. Additionally, we propose a scheme of creating magnon NOON states through frequency modulation and study the influence of decoherence on the fidelity of target states. I. INTRODUCTION Quantum entanglement, as a valuable resource for quantum information processing [1–6], has garnered significant attention due to its pivotal role in testing the fundamentals of quantum mechanics [7–10]. Recently, it has demonstrated a wide range of potential applications across various systems, encompassing atomic systems [11, 12], photons [13–15], superconducting systems [16–21], trapped ions [22, 23], and waveguides [24]. However, for large numbers of atoms, these schemes that relying on global control of the spin ensemble typically require intricate measurement-based feedback, high-fidelity control, and extensive preparation times, resulting in costly entangling gate operations between them [25– 27]. Consequently, strategies for optimizing such schemes remain a significant challenge that requires attention [28]. Dicke states [29–31], originally introduced in the context of superradiance phenomenon [32, 33], represent a special type of multiparticle entangled state. Due to their favorable properties, they hold promise for providing a reliable approach to address this issue in quantum sensing [34–37]. Compared with other states typically used in quantum sensing, Dicke states have been demonstrated to possess greater robustness to diverse sources of noise, such as qubit dephasing, qubit damping, and fluctuations in spin number [38–40]. It is noteworthy that utilizing entangled states has the potential to enhance measurement sensitivity beyond the standard quantum limit, in principle [41]. Considering the challenges involved in achieving precise control over individual spin qubits, global control over a collective of spins facilitates the realization of optimal sensitivity through entangled Dicke states [42, 43]. On the other hand, periodic driving has significant advantages in enhancing controllability of systems. This technique has been widely utilized in various areas of quantum physics, such as the investigation of exotic quantum phenomena in artificial ∗ wanggc887@nenu.edu.cn materials [44], analysis of stochastic processes [45], floquet engineering [46] and so on. Through periodic driving, one can effectively promote selective resonant transitions while suppressing undesired transitions within the targeted Hilbert subspace. As a result, a broad spectrum of controllable and selective interactions can be achieved, enabling enhanced controllability and selectivity [47]. The concept of selective interaction plays an important role in the preparation of controllable quantum entangled states [48–51]. This approach exploits the non-linearity of energy levels to generate desired entangled states. In Refs. [47, 52], the authors investigated the generation of Dicke states by means of selective interactions. By employing selective preparation of Dicke states, the initialization of a permutation-invariant quantum error-correction code was explored in Ref. [53]. This method facilitated the rapid generation of highly symmetric codes with exceptional fidelity. To realize the permutation-invariant quantum error-correction code, each logical qubit is encoded on several physical qubits. However, previous studies have paid little attention to methods for entangling states of two or several quantum systems in a controlled manner. A natural question arises regarding how to entangle logical qubits with selective interaction. This motivates us to delve into entanglement of multiple systems. In this paper, we present a theoretical proposal for generating entangled Dicke states in the ultrastrong coupling regime. A series of unitary transformations have been applied to the Hamiltonian to derive the effective interaction. Additionally, we investigate how to utilize selective resonant interactions to obtain entangled Dicke states in a finite system [54–58]. Furthermore, by utilizing the soft temporal quantum control, we can effectively mitigate unwanted off-resonant contributions. This approach allows for an accurate description of highfidelity quantum states even in scenarios involving strong perturbations and long evolution times [59]. The collective operators can be mapped to Bosonic operators by means of Holstein-Primakoff transformation [60], thereby opening up exciting possibility for employing the same approach to generate magnon NOON states." 2312.15578v1,"1 Implicit Subgoal Planning with Variational Autoencoders for Long-Horizon Sparse Reward Robotic Tasks Fangyuan Wang, Anqing Duan, Peng Zhou, Shengzeng Huo, Guodong Guo, Senior Member, IEEE, Chenguang Yang, Fellow, IEEE, and David Navarro-Alarcon, Senior Member, IEEE Abstract—The challenges inherent to long-horizon tasks in robotics persist due to the typical inefficient exploration and sparse rewards in traditional reinforcement learning approaches. To alleviate these challenges, we introduce a novel algorithm, Variational Autoencoder-based Subgoal Inference (VAESI), to accomplish long-horizon tasks through a divide-and-conquer manner. VAESI consists of three components: a Variational Autoencoder (VAE)-based Subgoal Generator, a Hindsight Sampler, and a Value Selector. The VAE-based Subgoal Generator draws inspiration from the human capacity to infer subgoals and reason about the final goal in the context of these subgoals. It is composed of an explicit encoder model, engineered to generate subgoals, and an implicit decoder model, designed to enhance the quality of the generated subgoals by predicting the final goal. Additionally, the Hindsight Sampler selects valid subgoals from an offline dataset to enhance the feasibility of the generated subgoals. The Value Selector utilizes the value function in reinforcement learning to filter the optimal subgoals from subgoal candidates. To validate our method, we conduct several long-horizon tasks in both simulation and the real world, including one locomotion task and three manipulation tasks. The obtained quantitative and qualitative data indicate that our approach achieves promising performance compared to other baseline methods. These experimental results can be seen in the website https://sites.google.com/view/vaesi/home. Index Terms—Robotic Manipulation; Task Planning; Reinforcement Learning; Motion Control; Autonomous Agents. I. I NTRODUCTION H UMAN daily activities often involve performing longhorizon tasks, which are characterized by hierarchical structures and multiple objectives [1], [2]. These tasks typically comprise numerous simpler yet sequential subtasks, the successful execution of which necessitates long-horizon planning and reasoning capabilities [3]–[5]. Humans generally excel at performing long-horizon tasks, largely due to our This work is supported in part by the Research Grants Council (RGC) of Hong Kong under grant 15212721 and grant 15231023, and in part by the PolyU-EIT Collaborative PhD Training Programme under application number 220724983. Corresponding author: David Navarro-Alarcon. F. Wang, A. Duan, S. Huo and D. Navarro-Alarcon are with the Department of Mechanical Engineering, The Hong Kong Polytechnic University (PolyU), Kowloon, Hong Kong. F. Wang is also with the Eastern Institute of Technology (EIT), Ningbo, China. (e-mail: fangyuan.wang@connect.polyu.hk, aduan@polyu.edu.hk, kyle-sz.huo@connect.polyu.hk, dnavar@polyu.edu.hk) P. Zhou is with the Department of Computer Science, The University of Hong Kong (HKU), Pok Fu Lam, Hong Kong. (e-mail: jeffzhou@hku.hk) G. Guo is with the Ningbo Institute of Digital Twin, Eastern Institute of Technology (EIT), China. (e-mail: gdguo@eitech.edu.cn) C. Yang is with the Bristol Robotics Laboratory, University of the West of England (UWE Bristol), Bristol, UK. (e-mail: charlie.yang@uwe.ac.uk) understanding of the subgoal dependency structure inherent to the task of interest. Although recent advances in the field of intelligent control have demonstrated the effectiveness of robots in performing complex tasks through imitation and reinforcement learning [5]–[7], state-of-the-art methods are typically limited to completing either short-term tasks with intensive rewards or long-horizon tasks guided by a series of instructions provided by humans [8]. Empowering robots with the ability to reason and plan long-horizon tasks could increase the areas in which robots can assist or even replace humans, further expanding the frontiers of robotic automation. Current efforts in robotics to tackle long-horizon tasks involve, e.g., imitation of expert trajectories [6], [9], [10], enhancement of goal-oriented exploration [11]–[15] and divideand-conquer tactics [16]–[18]. For instance, imitation learning learns effective strategies to generate subgoals by extracting key points from expert demonstrations. Yet, it usually suffers from time-consuming demonstration collection and suboptimal expert strategies. While enhancing the exploration efficiency of robots is essential for the discovery of effective and feasible subgoals, the exploration of goals remains limited to neighboring states in proximity to the explored region. Given the conspicuous lack of experience with rarely explored state spaces, a significant gap remains in the efficiency requisite for more generalized reinforcement learning applications [19]. Recently, some research has focused on decomposing complex tasks into simpler ones for solving long-horizon problems. However, most existing methods [16]–[18] require an explicit specification of the number of subgoals or decision layers, implying that the entire task’s subgoals must be planned prior to execution, such as in the initial planner shown in Fig. 1 Left. Thus, developing a robot capable of solving an extensive range of combinatorial decision problems continues to pose a long-standing challenge. To alleviate these challenges, we propose a novel method, Variational Autoencoder-based Subgoal Inference (VAESI) that solves the long horizon problem by first dividing it into several subtasks in an incremental planner manner (as shown in Fig. 1 Left), and then addressing these subtasks sequentially. Our study mainly focuses on the subgoal generation process (without delving into the underlying subgoal approach process). As shown in Fig. 1 Right, humans can infer subgoals given an initial state and a final goal, and at the same time, they can predict the final goal when they are aware of the initial state and certain subgoals. Inspired by this capability," 2312.15579v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 A numerical study on the oscillatory dynamics of tip vortex cavitation Saman Lak 1 and Rajeev Jaiman 1 † 1 Department of Mechanical Engineering, University of British Columbia, Vancouver, BC, Canada (Received xx; revised xx; accepted xx) In this paper, we numerically study the mechanism of the oscillatory flow dynamics associated with the tip vortex cavitation (TVC) over an elliptical hydrofoil section. Using our recently developed 3D variational multiphase flow solver, we investigate the TVC phenomenon at a Reynolds number of Re = 8.95 × 10 5 via dynamic subgridscale modeling and the homogeneous mixture theory. To begin, we examine the grid resolution requirements and introduce a length scale that considers both the tip vortex strength and the core radius. This length scale is then employed to non-dimensionalize the spatial resolution in the tip vortex region and establish the mesh requirements for large eddy simulation of tip vortex cavitation. We next perform simulations to analyze the dynamical modes of tip vortex cavity oscillation at different cavitation numbers and compare them with the semi-analytical solution. The breathing mode of cavity surface oscillation is extracted from the results through the definition of an effective radius. The temporally-averaged effective radius demonstrates that the cavity experiences a growth region followed by decay as it progresses away from the tip. Further examination of the characteristics of local breathing mode oscillations in the growth and decay regions indicates the alteration of cavity’s oscillatory behavior as it travels from the growth region to the decay region, with the oscillations within the growth region being characterized by lower frequencies. For representative cavitation numbers σ ∈ [1.2, 2.6], we find that pressure fluctuations exhibit a shift of the spectrum towards lower frequencies as the cavitation number decreases, similar to its influence on breathing mode oscillations. The results indicate the existence of correlations between the breathing mode oscillations and the pressure fluctuations. It is found that the growth and decay regions contribute differently to the pressure fluctuations. The low-frequency pressure fluctuations are found to be correlated with the growth region, whereas the breathing mode oscillations within the decay region are correlated with higher-frequency pressure fluctuations, where the center frequency of a hump is observed. Key words: 1. Introduction Noise pollution due to human activity (i.e., anthropogenic noise) poses serious threats to the marine ecosystem (Duarte et al. (2021)). One of the main sources of anthrophony is shipping, which generates noise through the operation of propellers, hull vibrations, and onboard machinery (Smith & Rigby 2022). A significant proportion of the propeller noise † Email address for correspondence: rjaiman@mech.ubc.ca" 2312.15582v1,"Decoding Fear: Exploring User Experiences in Virtual Reality Horror Games He Zhang Xinyang Li hpz5211@psu.edu The Future Laboratory, Tsinghua University Beijing, China College of Information Sciences and Technology, Pennsylvania State University University Park, United States Academy of Arts & Design, Tsinghua University Beijing, China Christine Qiu Xinyi Fu ∗ School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology Stockholm, Sweden The Future Laboratory, Tsinghua University Beijing, China fuxy@mail.tsinghua.edu.cn ABSTRACT 1 This preliminary study investigated user experiences in VR horror games, highlighting fear-triggering and gender-based differences in perception. By utilizing a scientifically validated and specially designed questionnaire, we successfully collected questionnaire data from 23 subjects for an early empirical study of fear induction in a virtual reality gaming environment. The early findings suggest that visual restrictions and ambient sound-enhanced realism may be more effective in intensifying the fear experience. Participants exhibited a tendency to avoid playing alone or during nighttime, underscoring the significant psychological impact of VR horror games. The study also revealed a distinct gender difference in fear perception, with female participants exhibiting a higher sensitivity to fear stimuli. However, the preference for different types of horror games was not solely dominated by males; it varied depending on factors such as the game’s pace, its objectives, and the nature of the fear stimulant. Virtual reality (VR) has demonstrated immense potential across various fields, particularly in human-computer interaction (HCI) [15]. Over time, researchers and developers have focused their attention on improving the operability, accessibility, usability, and maintainability of VR systems. However, as VR devices already meet a certain level of usability and functionality, the value of enhancing the quality of VR applications based on design thinking becomes increasingly crucial. Emotions play an integral role in human society and have significantly impacted the progression of human-computer interaction technologies [27]. Particularly, they hold substantial influence in human-centered design. Nonetheless, our grasp on human emotions, behaviors, and strategies in VR settings is still in need of deepening [23]. Emotions, notably fear, are complex psychological phenomena involving cognitive and physiological aspects [12, 32]. Fear, a strong negative emotion, is triggered by perceived or actual danger and serves as a survival mechanism [5, 21]. The Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) [33] identifies five categories of fear-provoking factors, including animals, environment, blood/injections/injuries, situational factors, and other factors. VR games, particularly horror games, have proven to be effective in eliciting fear responses from players, owing to the immersive and realistic experiences they offer [4, 8, 19, 20, 24, 30]. Various game design techniques, including architectural spaces, movement restrictions, sound effects, and jump scares, are employed to induce fear [14, 25]. When fear is evoked, individuals employ various coping strategies, such as self-help strategies, approach (monitoring) strategies, and avoidance strategies [20, 21]. Physiological responses, including changes in heart rate, facial expressions, and specific action tendencies, are common indicators of fear [16]. Understanding fear stimuli is essential in studying user reflection in VR horror environments. Fears are usually classified as innate and acquired [1], where innate fears are inherent and include [10], for example, falling from a height, death or near death, loud noises [29], high-altitude flying, etc. At the same time, experiences or memories CCS CONCEPTS • Human-centered computing → Virtual reality; HCI design and evaluation methods. KEYWORDS Virtual reality game, affective computing, fear, coping strategy ACM Reference Format: He Zhang, Xinyang Li, Christine Qiu, and Xinyi Fu. 2023. Decoding Fear: Exploring User Experiences in Virtual Reality Horror Games. In Chinese CHI 2023 (CHCHI 2023), November 13–16, 2023, Denpasar, Bali, Indonesia. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3629606.3629646 ∗ Corresponding author This work is licensed under a Creative Commons “Attribution 4.0 International” license. CHCHI 2023, November 13–16, 2023, Denpasar, Bali, Indonesia © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1645-4/23/11. https://doi.org/10.1145/3629606.3629646 INTRODUCTION" 2312.15595v1,"Zero-Inflated Bandits Haoyu Wei * 1 Runzhe Wan * 2 Lei Shi 2 Rui Song 2 Abstract can be expressed in closed form. However, in realworld scenarios, there is no definitive evidence to confirm a specific distribution of rewards, as indicated by empirical studies [13]. The misspecification may lead to over- or under-exploration. Many real applications of bandits have sparse non-zero rewards, leading to slow learning rates. A careful distribution modeling that utilizes problem-specific structures is known as critical to estimation efficiency in the statistics literature, yet is under-explored in bandits. To fill the gap, we initiate the study of zero-inflated bandits, where the reward is modeled as a classic semiparametric distribution called zero-inflated distribution. We carefully design Upper Confidence Bound (UCB) and Thompson Sampling (TS) algorithms for this specific structure. Our algorithms are suitable for a very general class of reward distributions, operating under tail assumptions that are considerably less stringent than the typical sub-Gaussian requirements. Theoretically, we derive the regret bounds for both the UCB and TS algorithms for multi-armed bandit, showing that they can achieve rate-optimal regret when the reward distribution is sub-Gaussian. The superior empirical performance of the proposed methods is shown via extensive numerical studies. • Non-parametric: the reward distributions need only to satisfy certain characteristics, such as being sub- Gaussian [16, 23, 59] or bounded [32, 31, 25]. In some instances, an appropriate non-parametric approach can achieve a regret rate comparable to that of parametric methods [42, 25, 23]. However, These weaker assumptions are more general, yet sacrificing certain statistical efficiency from ignoring prior structure information. For example, even if the rates are the same, empirical performance may still exhibit a significant gap compared to the parametric approach when rewards are correctly specified in both methodologies [34]. As usual, a careful distribution modeling that utilizes problem-specific features can improve the learning efficiency, and in bandits, lead to lower regrets. However, compared to the rich statistical literature on univariate distribution, this direction is underexplored in bandits. Towards bridging this gap, this paper initiates the study of this direction by focusing on the sparse reward problem. Specifically, this work is motivated by the observation that in many real-world applications, rewards tend to be sparse, meaning they are zero (or a constant) in most instances. For instance, in online advertising, the majority of customers do not click on advertisements, resulting in a zero reward in most cases; however, for those instances where there is a click, the reward follows a specific distribution. Similar patterns are observed in a wide range of applications, including mobile health [35] and freemium games [54]. While some standard bandit algorithms can still be applied, they fail to utilize the distribution property and hence can be less efficient. 1. Introduction The bandit problem has received increasing attention and has been widely applied to areas such as clinical trials [19], finance [38], recommendation systems [58], among others. Accurate uncertainty quantification is the key to address the exploration-exploitation trade-off and typically requires certain assumptions regarding the reward distribution, which can be roughly divided into two groups: • Parametric: the reward distribution is assumed to belong to a parameterized family, such as Gaussian or Bernoulli distributions [6, 28, 3]. The strong assumption ensures that the design and theoretical analysis To develop efficient bandit algorithms tailored for these applications, this paper introduces the Zero-Inflated Bandits (ZIB) problem. Here, the reward distribution is modeled as a mixture of two distributions: one being a delta distribution at zero, and the other requiring only minimal assumptions. This makes our model semi-parametric, known 1 Department of Economics, University of California San Diego 2 Amazon. This work does not relate to the positions at Amazon . Correspondence to: Haoyu Wei . *: Equal contribution. 1" 2312.15596v1,"Mining Domain-Based Policies Si Zhang Philip W. L. Fong Department of Computer Science University of Calgary Calgary, Canada si.zhang2@ucalgary.ca Department of Computer Science University of Calgary Calgary, Canada pwlfong@ucalgary.ca ABSTRACT Protection domains are one of the most enduring concepts in Access Control. Entities with identical access control characteristics are grouped under the same protection domain, and domain-based policies assign access privileges to the protection domain as a whole. With the advent of the Internet of Things (IoT), devices play the roles of both subjects and objects. Domain-based policies are particularly suited to support this symmetry of roles. This paper studies the mining of domain-based policies from incomplete access logs. We began by building a theory of domainbased policies, resulting in a polynomial-time algorithm that constructs the optimal domain-based policy out of a given access control matrix. We then showed that the problem of domain-based policy mining (DBPM) and the related problem of mining policies for domain and type enforcement (DTEPM) are both NP-complete. Next, we looked at the practical problem of using a MaxSAT solver to solve DBPM. We devised sophisticated encodings for this purpose, and empirically evaluated their relative performance. This paper thus lays the groundwork for future study of DBPM. CCS CONCEPTS • Security and privacy → Access control. KEYWORDS Access control, protection domain, domain and type enforcement, policy mining, NP-completeness, MaxSAT encoding. ACM Reference Format: Si Zhang and Philip W. L. Fong. 2023. Mining Domain-Based Policies. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Protection domains are one of the most enduring concepts in the study of Access Control. Entities with identical access control characteristics are assigned to the same protection domain, and access privileges are granted to the protection domain as a whole. We use the term domain-based policies to refer to access control policies that are formulated in terms of protection domains. The Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn use of protection domains can be found in programming language environments (e.g., Java), databases [3], and operating systems. For example, at the core of the Android operating system is SELinux, which implements domain and type enforcement [2]. With the advent of the Internet of Things (IoT), devices play the roles of both subjects and objects. In other words, a device may request access to other devices but also act as a resource to be accessed by others. An access occurs when a requestor device sends a message to a resource-bearing device. Domain-based policies is particularly suited to support this symmetry of roles. Recognizing this advantage, Fuentes Carranza and Fong [14] extended the MQTT broker to provide fine-grained access control for IoT devices. More specifically, their extension of the event-based system architecture [11, 12] involves two protection mechanisms. First, their extension enforces brokering policies, so that one can control which network link the broker forward a message received from another network link. Second, execution monitors [26, 30] can be interposed on network links, so that messages can be suppressed or transformed. When combined, these mechanisms can enforce a form of domainbased policies over devices. This work studies the mining of domain-based policies from access logs. We take into consideration that in IoT systems, each entity (device) plays the dual role of requestor and resource. Access control is about controlling who can send which kind of message to whom. The authoring of access control policies, however, is a highly demanding task if it is done from scratch. It is therefore desirable to automatically mine a domain-based policy from existing access logs. When the access logs are complete, they allow us to reconstruct the entire access control matrix. Policy mining then corresponds to the construction of a domain-based policy from a fully specified access control matrix. When the access logs are incomplete, the corresponding access control matrix will have missing entries. Such a missing entry can be interpreted as “don’t care.” This, in theory, gives the policy mining algorithm more freedom to maneuver, in the sense that the algorithm may interpret each missing entry as either a grant or a deny. Every possible instantiation of the missing entries leads to the construction of a different domain-based policy. We desire an instantiation that results in the smallest number of protection domains. We claim the following contributions: (1) In §2, we developed a theory of domain-based policies, in which we characterized domain-based policies in terms of digraph strong homomorphism and an efficiently checkable equivalence relation. Armed with this understanding, we devised a polynomialtime algorithm for constructing a domain-based policy from an access control matrix. This is essentially an algorithm for mining domain-based policies from complete access logs." 2312.15614v1,"A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks WENTAO ZOU, QI LI, JIDONG GE ∗ , and CHUANYI LI ∗ , National Key Laboratory for Novel Software Technology at Nanjing University, China XIAOYU SHEN, Eastern Institute for Advanced Study, China LIGUO HUANG, Department of Computer Science, Southern Methodist University, USA BIN LUO, National Key Laboratory for Novel Software Technology at Nanjing University, China Pre-trained models (PTMs) have achieved great success in various Software Engineering (SE) downstream tasks following the “pre-train then fine-tune” paradigm. As fully fine-tuning all parameters of PTMs can be computationally expensive, a widely used solution is parameter-efficient fine-tuning (PEFT), which freezes PTMs while introducing extra parameters. Though work has been done to test PEFT methods in the SE field, a comprehensive evaluation is still lacking. This paper aims to fill in this gap by evaluating the effectiveness of five PEFT methods on eight PTMs and four SE downstream tasks. For different tasks and PEFT methods, we seek answers to the following research questions: 1) Is it more effective to use PTMs trained specifically on source code, or is it sufficient to use PTMs trained on natural language text? 2) What is the impact of varying model sizes? 3) How does the model architecture affect the performance? Besides effectiveness, we also discuss the efficiency of PEFT methods, concerning the costs of required training time and GPU resource consumption. We hope that our findings can provide a deeper understanding of PEFT methods on various PTMs and SE downstream tasks. All the codes and data are available at https://github.com/zwtnju/PEFT.git. CCS Concepts: • Software and its engineering → Software creation and management; • Computing methodologies → Artificial intelligence. Additional Key Words and Phrases: parameter-efficient fine-tuning, pre-trained model, software engineering, empirical study, transfer learning, effectiveness and efficiency ACM Reference Format: Wentao Zou, Qi Li, Jidong Ge, Chuanyi Li, Xiaoyu Shen, Liguo Huang, and Bin Luo. 2023. A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks. ACM Trans. Softw. Eng. Methodol. 1, 1 (December 2023), 32 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Pre-training language models on large amounts of data with self-supervision, and then fine-tuning them on downstream tasks has become a dominant approach in natural language processing (NLP) [1, 13, 43, 55, 61, 67, 82]. The same paradigm has also been applied to software engineering ∗ Corresponding Authors. Authors’ addresses: Wentao Zou, DZ1832005@smail.nju.edu.cn; Qi Li, MG21320006@smail.nju.edu.cn; Jidong Ge, gjd@ nju.edu.cn; Chuanyi Li, lcy@nju.edu.cn, National Key Laboratory for Novel Software Technology at Nanjing University, Nanjing, Jiangsu, China; Xiaoyu Shen, Eastern Institute for Advanced Study, China, xyshen@eitech.edu.cn; Liguo Huang, Department of Computer Science, Southern Methodist University, USA, lghuang@lyle.smu.edu; Bin Luo, luobin@nju.edu.cn, National Key Laboratory for Novel Software Technology at Nanjing University, Nanjing, Jiangsu, China. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. 1049-331X/2023/12-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Trans. Softw. Eng. Methodol., Vol. 1, No. 1, Article . Publication date: December 2023." 2312.15624v1,"Negative Controls for Instrumental Variable Designs ∗ Oren Danieli, Daniel Nevo, Itai Walk, Bar Weinstein, Dan Zeltzer † December 27, 2023 Abstract Studies using instrumental variables (IV) often assess the validity of their identification assumptions using falsification tests. However, these tests are often carried out in an ad-hoc manner, without theoretical foundations. In this paper, we establish a theoretical framework for negative control tests, the predominant category of falsification tests for IV designs. These tests are conditional independence tests between negative control variables and either the IV or the outcome (e.g., examining the “effect” on the lagged outcome). We introduce a formal definition for threats to IV exogeneity (alternative path variables) and characterize the necessary conditions that proxy variables for such unobserved threats must meet to serve as negative controls. The theory highlights prevalent errors in the implementation of negative control tests and how they could be corrected. Our theory can also be used to design new falsification tests by identifying appropriate negative control variables, including currently underutilized types, and suggesting alternative statistical tests. The theory shows that all negative control tests assess IV exogeneity. However, some commonly used tests simultaneously evaluate the 2SLS functional form assumptions. Lastly, we show that while negative controls are useful for detecting biases in IV designs, their capacity to correct or quantify such biases requires additional non-trivial assumptions. ∗ We thank Maya Orenstein for excellent research assistance. We thank seminar participants at Princeton University, the Technion - Israel Institute of Technology, the AEA Meeting in New Orleans, Tel Aviv University, and Stanford University for their helpful comments and suggestions. We acknowledge support from Tel Aviv University Center for AI and Data Science (TAD) in collaboration with Google as part of the initiative of AI and DS for social good. † All authors are from Tel Aviv University. Danieli is the corresponding author. Email: orendanieli@tauex.tau.ac.il." 2312.15626v1,"Received 13 October 2023, accepted 24 November 2023, date of publication 7 December 2023, date of current version 20 December 2023. Digital Object Identifier 10.1109/ACCESS.2023.3341029 RDF-star2Vec: RDF-star Graph Embeddings for Data Mining SHUSAKU EGAMI 1 , TAKANORI UGAI 1,2 , MASATERU OOTA 1 , KYOUMOTO MATSUSHITA 2 , TAKAHIRO KAWAMURA 3 , KOUJI KOZAKI 4 , AND KEN FUKUDA 1 1 National Institute of Advanced Industrial Science and Technology, Koto, Tokyo 135-0064, Japan 2 Fujitsu Ltd., Kawasaki, Kanagawa 105-7123, Japan 3 National Agriculture and Food Research Organization, Tsukuba, Ibaraki 305-0856, Japan 4 Department of Engineering Informatics, Faculty of Information and Communication Engineering, Osaka Electro-Communication University, Neyagawa, Osaka 572-0833, Japan Corresponding author: Ken Fukuda (ken.fukuda@aist.go.jp) This work was supported in part by the New Energy and Industrial Technology Development Organization (NEDO) under Project JPNP20006 and Project JPNP180013; and in part by the Japan Society for the Promotion of Science (JSPS) KAKENHI under Grant JP19H04168, Grant JP22K18008, and Grant JP23H03688. ABSTRACT Knowledge Graphs (KGs) such as Resource Description Framework (RDF) data represent relationships between various entities through the structure of triples (). Knowledge graph embedding (KGE) is crucial in machine learning applications, specifically in node classification and link prediction tasks. KGE remains a vital research topic within the semantic web community. RDF-star introduces the concept of a quoted triple (QT), a specific form of triple employed either as the subject or object within another triple. Moreover, RDF-star permits a QT to act as compositional entities within another QT, thereby enabling the representation of recursive, hyper-relational KGs with nested structures. However, existing KGE models fail to adequately learn the semantics of QTs and entities, primarily because they do not account for RDF-star graphs containing multi-leveled nested QTs and QT–QT relationships. This study introduces RDF-star2Vec, a novel KGE model specifically designed for RDF-star graphs. RDF-star2Vec introduces graph walk techniques that enable probabilistic transitions between a QT and its compositional entities. Feature vectors for QTs, entities, and relations are derived from generated sequences through the structured skip-gram model. Additionally, we provide a dataset and a benchmarking framework for data mining tasks focused on complex RDF-star graphs. Evaluative experiments demonstrated that RDF-star2Vec yielded superior performance compared to recent extensions of RDF2Vec in various tasks including classification, clustering, entity relatedness, and QT similarity. INDEX TERMS Knowledge graph embedding, RDF2Vec, RDF-star, hyper-relational knowledge graphs, N-ary relation, graph walk. I. INTRODUCTION Knowledge graphs (KGs) such as Resource Description Framework (RDF) data represent relationships between various entities in terms of triples (), facilitating advanced search and reasoning based on semantic relationships. Despite these capabilities, RDF faces the challenge of adequately representing relations beyond the binary. To address this limitation, RDF-star (formerly spelled RDF*) [1] has garnered considerable interest. This extension introduces the quoted triple (QT), a specific type of triple that can serve as the subject or object within another triple. To date, RDF-star has been implemented across numerous triplestores. 1 In addition, several use cases 2 [2], [3] and support tools [4], [5], [6], [7] for RDF-star have already been presented. Furthermore, the RDF-star Working Group 3 was established in August 2022 and is working on recommendations for extending 1 https://w3c.github.io/rdf-star/implementations.html The associate editor coordinating the review of this manuscript and approving it for publication was Giacomo Fiumara 142030 . 2 https://w3c.github.io/rdf-star/UCR/rdf-star-ucr.html 3 https://www.w3.org/2022/08/rdf-star-wg-charter/ 2023 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 11, 2023" 2312.15635v1,"SURFACE OF REVOLUTION RADON TRANSFORMS WITH CENTERS ON GENERALIZED SURFACES IN R n 27/12/2023 03:16 JAMES W. WEBBER † , SEAN HOLMAN ‡ , AND ERIC TODD QUINTO* Abstract. We present a novel analysis of a Radon transform, R, which maps an L 2 function of compact support to its integrals over smooth surfaces of revolution with centers on an embedded hypersurface in R n . Using microlocal analysis, we derive necessary and sufficient conditions relating to R for the Bolker condition to hold, which has implications regarding the existence and location of image artifacts. We present a general inversion framework based on Volterra equation theory and known results on the spherical Radon transform, and we prove injectivity results for R. Several example applications of our theory are discussed in the context of, e.g., Compton Scatter Tomography (CST) and Ultrasound Reflection Tomography (URT). In addition, using the proposed inversion framework, we validate our microlocal theory via simulation, and present simulated image reconstructions of image phantoms with added noise. Keywords - surfaces of revolution, generalized Radon transforms, inversion methods, microlocal analysis 1. Introduction In this paper, we analyze a novel generalized Radon transform, R, which gives the integrals of a compactly supported L 2 function over surfaces of revolution with centers on a smooth hypersurface in R n . We investigate the inversion stability of R using microlocal analysis, and show that R is injective using known theory on the spherical Radon transform. There is now a wealth of literature covering the inversion and stability properties of surface of revolution Radon transforms [2, 14, 23, 9, 33, 26, 3, 24, 16, 29, 6, 31, 20, 22, 21, 4, 34, 32, 7], which have applications in, e.g., CST [22], Emission CST (ECST) [29], seismic imaging [7], Synthetic Aperture Radar (SAR) [26], and URT [31]. In [34], the authors consider the microlocal properties of a Radon transform, denoted R (using the notation of [34]), which defines the integrals of an L 2 function over the surfaces of revolution of continuous curves defined by a function, q. The surfaces of revolution considered have centers on a flat plane, and the axes of revolution are perpendicular to the plane of centers. In this case, R is shown to be an elliptic Fourier Integral Operator (FIO) under certain conditions on q. Further, the authors provide necessary and sufficient conditions on q for R to satisfy the Bolker condition, which has important implications regarding image artifacts. Simulated image reconstructions are shown to verify (James W. Webber (corresponding author)) Department of Oncology and Gynecology, Brigham and Women’s Hospital, 221 Longwood Ave., Boston, MA 02115 (Sean Holman) Department of Mathematics, The University of Manchester, Alan Turing Building, Oxford Road, Manchester M13 9PY (Eric Todd Quinto) Department of Mathematics, Tufts University, 177 College Ave, Medford, MA 02155 E-mail addresses: jwebber5@bwh.harvard.edu † , sean.holman@manchester.ac.uk ‡ , todd.quinto@tufts.edu*. 1" 2312.15638v1,"Risk-Aware Control of Discrete-Time Stochastic Systems: Integrating Kalman Filter and Worst-case CVaR in Control Barrier Functions Masako Kishida, Senior Member, IEEE Abstract— This paper proposes control approaches for discrete-time linear systems subject to stochastic disturbances. It employs Kalman filter to estimate the mean and covariance of the state propagation, and the worst-case conditional valueat-risk (CVaR) to quantify the tail risk using the estimated mean and covariance. The quantified risk is then integrated into a control barrier function (CBF) to derive constraints for controller synthesis, addressing tail risks near safe set boundaries. Two optimization-based control methods are presented using the obtained constraints for half-space and ellipsoidal safe sets, respectively. The effectiveness of the obtained results is demonstrated using numerical simulations. I. I NTRODUCTION Safety-critical systems such as autonomous vehicles, aerospace vehicles, and medical devices demand high reliability due to the severe consequences of their failure or malfunction, such as loss of life, significant property damage, or environmental harm. As automation becomes more prevalent in these applications, the need for risk-aware controller design is becoming increasingly essential. In this context, Control Barrier Functions (CBFs) [1] are now recognized for their pivotal role. CBFs provide conditions for control inputs to ensure system states remain within a given safe set, thereby guaranteeing the satisfaction of safety requirements in various fields [2]–[5]. Recent advancements in CBF approaches, such as those discussed [6]–[8], have incorporated external stochastic disturbances into their considerations. Moreover, some approaches consider risk through chance constraints [9], or bounds on the probability of a collision [10]. In particular, studies [11]–[13] provide ways of considering the safety by using the quantified tail risk to avoid severe consequences. Additionally, although many existing approaches assume that the all the system states can be observed, which may be impractical in some real applications, some [14]–[17] deal with the cases where not all the system states can be directly accessible. Yet, comprehensive solutions addressing both stochastic disturbances and unmeasured states remain limited [14], [18]. The objective of this paper is to introduce a risk-aware control approach tailored for discrete-time linear systems affected by stochastic disturbances, where not all system states are directly observable. The approach integrates Kalman *This work was supported by JST, PRESTO Grant Number JP- MJPR22C3, Japan. Masako Kishida is with the National Institute of Informatics, Tokyo 101- 8430, Japan kishida@nii.ac.jp filter [19], [20] with the worst-case conditional value-at-risk (CVaR) [21], [22] and synthesizes it with a CBF framework. This integration is highly synergistic: Kalman filter provides estimates of mean and covariance of the state propagation, essential parameters for the worst-case CVaR to quantify tail risk. This combination effectively enhances controller design using CBFs. The paper is structured as follows: Section II introduces the notation, definitions and fundamental results. Sections III - V are the main part of this paper: After introducing building blocks in Section III, sets of admissible inputs are characterized using Kalman filter along with the worst-case CVaR and the control barrier function in Section IV, which is followed by the controller design in Section V. After numerical examples in Section VI, the paper is concluded with Section VII. II. M ATHEMATICAL P RELIMINARIES A. Notation The sets of real numbers, real vectors of length n, real matrices of size n × m, real symmetric matrices of size n, and positive definite matrices of size n are denoted by R, R n , R n×m , S n and S n + , respectively. For M ∈ R n×n , M ≻ 0 indicates M is positive definite, M ≽ 0 indicates M is positive semidefinite, and Tr(M ) denotes its the trace. For M ∈ R n×m , M ⊤ denotes its transpose. For a vector v ∈ R n , ∥v∥ denotes its Euclidean norm, v ≥ 0 its element-wise nonnegativity, and |v| the element-wise absolute value. B. Conditional Value-at-Risk To present risk quantification in our approach, we begin by showing the (worst-case) CVaR. Consider a random vector ξ ∈ R n under the true distribution P, characterized by its mean µ ∈ R n and covariance matrix Σ ∈ R n×n . The distribution P, representing the probability law of ξ, is assumed to have finite secondorder moments. We define P as the set of all probability distributions on R n with identical first- and second-order moments to P. Formally, ( ""    #  )  ⊤ Σδ ij 0 ξ i ξ j P = P : E P = , ∀i, j , 1 1 0 ⊤ 1 where δ ij is the Kronecker delta, and E P [·] the expected value under P. Although the exact form of P is unknown, it is clear that P ∈ P." 2312.15641v1,"FORMALISING THE DOUBLE-PUSHOUT APPROACH TO GRAPH TRANSFORMATION ROBERT SÖLDNER AND DETLEF PLUMP University of York, UK e-mail address: rs2040@york.ac.uk, detlef.plump@york.ac.uk Abstract. In this paper, we utilize Isabelle/HOL to develop a formal framework for the basic theory of double-pushout graph transformation. Our work includes defining essential concepts like graphs, morphisms, pushouts, and pullbacks, and demonstrating their properties. We establish the uniqueness of derivations, drawing upon Rosen’s 1975 research, and verify the Church-Rosser theorem using Ehrig’s and Kreowski’s 1976 proof, thereby demonstrating the effectiveness of our formalisation approach. The paper details our methodology in employing Isabelle/HOL, including key design decisions that shaped the current iteration. We explore the technical complexities involved in applying higher-order logic, aiming to give readers an insightful perspective into the engaging aspects of working with an Interactive Theorem Prover. This work emphasizes the increasing importance of formal verification tools in clarifying complex mathematical concepts. Introduction Formal methods are instrumental in minimizing software defects by rigorously verifying software correctness against their specification. These methods employ mathematical techniques to assure that software implementations align with predefined specifications and requirements, and include model checking, theorem proving, and symbolic interpretation [HR04] Interactive theorem provers (ITPs), have validated significant mathematical theorems such as the Four Colour Theorem [Gon07], the Prime Number Theorem [ADGR07], and the Kepler Conjecture [HAB + 15]. They have also been instrumental in verifying specific algorithms and software components, like in the cases of the seL4 Microkernel [KEH + 09] and the CompCert compiler [Ler09]. These instances showcase the efficacy of ITPs in handling complex theories and systems. Our research strives to rigorously prove fundamental results in the double-pushout approach to graph transformations [EEPT06], contributing to our overarching goal of verifying specific programs in the GP 2 graph programming language [Plu16, CCP22] using the Isabelle proof assistant [Nipkow2014]. This paper not only synthesizes previously published material [SP23] but also introduces new essential technical details, including: Key words and phrases: Double-pushout graph transformation and Isabelle/HOL and Uniqueness of derivations and Church-Rosser theorem. Preprint submitted to Logical Methods in Computer Science © R. Söldner and D. Plump CC ⃝ Creative Commons" 2312.15648v1,"Noether Symmetry Approach for Non-minimally Coupled Scalar Field Models Ahmadfikri Talek, 1, ∗ Narakorn Kaewkhao, 1, † Watcharakorn Srikom, 2, ‡ and Phongpichit Channuie 3, 4, § 1 Department of Physics, Faculty of Science, Prince of Songkla University, Hatyai 90112, Thailand 2 Department of Innovative Technology for Renewable Energy, Faculty of Science and Technology, Suratthani Rajabhat University, Surat Thani, 84100, Thailand 3 College of Graduate Studies, Walailak University, Thasala, Nakhon Si Thammarat, 80160, Thailand 4 School of Science, Walailak University, Thasala, Nakhon Si Thammarat, 80160, Thailand (Dated: December 27, 2023) Noether symmetry analysis permits a powerful approach for the investigation of integrable models in gravitational theories. In this work, we consider a framework of the non-minimally coupled scalar field to gravity in the Jordan frame in view of the Noether gauge symmetry approach. We then study the point-like Lagrangian for underlying theory based on the use of Noether gauge symmetries. Subsequently, we compute a Hessian matrix and derive the Euler- Lagrange equations associated with the the configuration spaces. Using the Noether gauge symmetry methodology, we obtain a system of partial differential equations and solve them for particular solutions. We find the potential is dependent on the non-minimal coupling, ξ. With a small field approximation ξφ 2 ≪ 1, however we obtain a power-law form of the potential. PACS numbers: I. INTRODUCTION Astrophysical observations, such as Type Ia Supernovae [1, 2], cosmic microwave background (CMB) radiation [3–9], large-scale structure [10], baryon acoustic oscillations (BAO) [11], and weak lensing [12], provide strong evidence for the ongoing acceleration of the universe’s expansion. ∗ Electronic address: fikri.talek@gmail.com Electronic address: naragorn.k@psu.ac.th ‡ Electronic address: watcharakorn.sri@sru.ac.th § Electronic address: phongpichit.ch@mail.wu.ac.th †" 2312.15661v1,"Unlocking the Potential of Large Language Models for Explainable Recommendations Yucong Luo, Mingyue Cheng, Hao Zhang, Junyu Lu, and Enhong Chen University of Science and Technology of China, Hefei, China {prime666,zh2001,lujunyu}@mail.ustc.edu.cn, {mycheng,cheneh}@ustc.edu.cn Abstract. Generating user-friendly explanations regarding why an item is recommended has become increasingly common, largely due to advances in language generation technology, which can enhance user trust and facilitate more informed decision-making when using online services. However, existing explainable recommendation systems focus on using small-size language models. It remains uncertain what impact replacing the explanation generator with the recently emerging large language models (LLMs) would have. Can we expect unprecedented results? In this study, we propose LLMXRec, a simple yet effective two-stage explainable recommendation framework aimed at further boosting the explanation quality by employing LLMs. Unlike most existing LLM-based recommendation works, a key characteristic of LLMXRec is its emphasis on the close collaboration between previous recommender models and LLM-based explanation generators. Specifically, by adopting several key fine-tuning techniques, including parameter-efficient instructing tuning and personalized prompt techniques, controllable and fluent explanations can be well generated to achieve the goal of explanation recommendation. Most notably, we provide three different perspectives to evaluate the effectiveness of the explanations. Finally, we conduct extensive experiments over several benchmark recommender models and publicly available datasets. The experimental results not only yield positive results in terms of effectiveness and efficiency but also uncover some previously unknown outcomes. To facilitate further explorations in this area, the full code and detailed original results are open-sourced at https://anonymous.4open.science/r/LLM rec explanation-7028/ Keywords: Explainable Recommendation, Large Language Models 1 Introduction Recommender systems [19] play a pivotal role in aiding users to navigate through enormous online content, personalizing recommendations based on user preferences. As recommender systems deeply impact personal decisions, it is increasingly crucial to ensure users’ understanding and trust. This has led to the emergence of explainable recommendation models [28], which not only predict users’ preferences but also provide explanations for their recommendations. These explanations, serving as a bridge between users and the system, can enhance user" 2312.15684v1,"Stochastic mean-shift clustering Itshak Lapidot 1 Afeka Tel-Aviv Academic College of Engineering, ACLP, Israel 2 Avignon University, LIA, France Abstract In this paper we presented a stochastic version mean-shift clustering algo- rithm. In the stochastic version the data points ”climb” to the modes of the distribution collectively, while in the deterministic mean-shift, each datum ”climbs” individually, while all other data points remains in their original coordinates. Stochastic version of the mean-shift clustering is comparison with a standard (deterministic) mean-shift clustering on synthesized 2- and 3-dimensional data distributed between several Gaussian component. The comparison performed in terms of cluster purity and class data purity. It was found the the stochastic mean-shift clustering outperformed in most of the cases the deterministic mean-shift. Keywords: Unsupervised learning, Mean-shift clustering, Stochastic mean-shift, Email address: itshakl@afeka.ac.il 1,2 (Itshak Lapidot) Preprint submitted to Elsevier December 27, 2023" 2312.15698v1,"RepairLLaMA: Efficient Representations and Fine-Tuned Adapters for Program Repair André Silva ∗ Sen Fang ∗ Martin Monperrus KTH Royal Institute of Technology Stockholm, Sweden andreans@kth.se KTH Royal Institute of Technology Stockholm, Sweden senf@kth.se KTH Royal Institute of Technology Stockholm, Sweden monperrus@kth.se ABSTRACT Automated Program Repair (APR) has evolved significantly with the advent of Large Language Models (LLMs). Fine-tuning LLMs for program repair is a recent avenue of research, with many dimensions which have not been explored. Existing work mostly fine-tunes LLMs with naive code representations and is fundamentally limited in its ability to fine-tune larger LLMs. To address this problem, we propose RepairLLaMA, a novel program repair approach that combines 1) code representations for APR and 2) the state-of-theart parameter-efficient LLM fine-tuning technique called LoRA. This results in RepairLLaMA producing a highly effective ‘program repair adapter’ for fixing bugs with language models. Our experiments demonstrate the validity of both concepts. First, fine-tuning adapters with program repair specific code representations enables the model to use meaningful repair signals. Second, parameterefficient fine-tuning helps fine-tuning to converge and contributes to the effectiveness of the repair adapter to fix data-points outside the fine-tuning data distribution. Overall, RepairLLaMA correctly fixes 125 Defects4J v2 and 82 HumanEval-Java bugs, outperforming all baselines. KEYWORDS Automated Program Repair, Large Language Models, Code Representations, Parameter-Efficient Fine-Tuning 1 INTRODUCTION Automated program repair (APR) [26] aims at automatically fixing a software bug without human intervention. Learning-based repair [7, 17, 18, 39, 42, 44, 47, 52] has become the mainstream solution to this problem due to the powerful ability of deep neural networks to learn complex bug fix patterns. Clearly, large language models (LLMs), pre-trained on vast amounts of data, have pushed learning-based repair to the next frontier [17, 43]. In program repair, LLMs have been mostly used with prompt engineering [21, 45], and recently, a line of work around fine-tuning has emerged [17, 18, 39, 49]. Fine-tuning LLMs for program repair is complex. Early work simply refines the network weights based on additional fine-tuning data. However, this kind of fine-tuning is rather primitive and suffers from two significant drawbacks. First, fine-tuning is also known to be able to adapt the input/output representations of the data under study [5]. In the context of program repair, there is an opportunity to fine-tune with code representations that maximize downstream task performance, that is, repair performance. In particular, previous work overlooks the realistic representation of fault localization in the input. Second, previous work considered * These authors contributed equally to this work. the most basic fine-tuning technique, which is full-parameter finetuning. As LLMs increase in size [24], full-parameter fine-tuning poses important overfitting problems when fine-tuning data is limited, which is typically the case in program repair. In this paper, we address the problem of devising efficient fine-tuning techniques [14] for program repair, with a focus on code representations and adapters. We propose RepairLLaMA, a new program repair approach that combines realistic repair-specific code representations with parameter-efficient fine-tuning. First, RepairLLaMA’s code representations incorporate fault localization signals and are designed to support multi-location bugs. Second, RepairLLaMA utilizes Low- Rank Adaption (LoRA), a state-of-the-art parameter-efficient finetuning technique, to train a much smaller repair adapter (when compared to the full LLM) that adapts the LLM for program repair while helping prevent overfitting. As we will demonstrate in this paper, the concept of repair adapter is novel and potent. Our experimental results validate RepairLLaMA’s core designs. First, RepairLLaMA achieves state-of-the-art performance in two benchmarks, correctly fixing 125 Defects4J v2 [22] bugs and 82 bugs on recently proposed HumanEval-Java [17], which boosts internal and external validity. The experiments show that the devised code representations with repair signals allow the LLM to synthesize patches more effectively than with a naive code-only representation. Also, RepairLLaMA clearly outperforms non-finetuned baselines, incl. GPT-4. Moreover, our results also show the effectiveness of parameter-efficient fine-tuning: RepairLLaMA’s repair adapters, with only 4M parameters, are 1600x smaller than the initial pre-trained LLM (CodeLLama-7B). To sum up, the efficient representations and repair adapters of RepairLLaMA outperform recent results on fine-tuning for program repair [15, 17, 39] as well as world-class models such as GPT-3.5 and GPT-4. To sum up, we make the following contributions: • We design RepairLLaMA, an original fine-tuning pipeline for automated program repair, that maximizes knowledge from the program repair domain, while keeping strong alignment with pre-training. • We systematically evaluate code representations for program repair fine-tuning. Our results clearly show that the best code representation leverages task-specific signals, including fault localization and original buggy code. • We demonstrate that parameter-efficient fine-tuning performs better than full-parameter fine-tuning in the context of program repair. The “repair adapters” of RepairLLaMA are training-efficient, inference-efficient, and powerful to repair bugs, achieving state-of-the-art performance across two" 2312.15735v1,"Quantitative stability for the Caffarelli-Kohn-Nirenberg inequality ∗ Yuxuan Zhou, Wenming Zou Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China. Abstract In this paper, we investigate the following Caffarelli-Kohn-Nirenberg inequality: Z R n |x| −pa  p 1 Z |∇u| dx ≥ S(p, a, b) p R n |x| −qb  1 q , |u| dx ∀ u ∈ D a p (R n ), q where S(p, a, b) is the sharp constant and a, b, p, q satisfy the relations: 0 ≤ a< n − p , p a ≤ b < a + 1, 1 < p < n, q = np . n − p(1 + a − b) Our main results involve establishing gradient stability within both the functional and the critical settings and deriving some qualitative properties for the stability constant. In the functional setting, the main method we apply is a simple but clever transformation inspired by Horiuchi [29], which enables us to reduce the inequality to some well-studied ones. Based on the gradient stability, we establish several refined Sobolev-type embeddings involving weak Lebesgue norms for functions supported in general domains. In the critical point setting, we use some careful expansion techniques motivated by Figalli and Neumayer [24] to handle the nonlinearity appeared in the Euler-Lagrange equations. We believe that the ideas presented in this paper can be applied to treat other weighted Sobolev-type inequalities. Key words: Caffarelli-Kohn-Nirenberg inequality, extremal function, gradient stability, critical point. 2020 Mathematics Subject Classification: Primary 46E35(Secondary 26D10); 35J61; 35B50; 35B06; 35J47; 1 Introduction In this paper, we are concerned with the following Caffarelli-Kohn-Nirenberg inequality proved in [6]: Z R n −pa |x| p |∇u| dx  1 p ≥ S(p, a, b) Z −qb R n |x| q |u| dx  1 q , ∀ u ∈ D a p (R n ), (1.1) Supported NSFC(No.12171265,11025106). E-mail addresses: zhou-yx22@mails.tsinghua.edu.cn(Zhou), zouwm@mail.tsinghua.edu.cn (Zou) ∗ 1" 2312.15738v1,"Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2022.Doi Number Enhanced Robot Motion Block of A-star Algorithm for Robotic Path Planning Raihan Kabir 1 , Yutaka Watanobe 2 (Member, IEEE), Md. Rashedul Islam 3 (Senior Member, IEEE) and Keitaro Naruse 4 (Member, IEEE) 1,2,4 School of Computer Science and Engineering, University of Aizu, Aizu-wakamatsu, Fukushima, 965-8580, Japan Chief Researcher of Computer Vision and AI, Chowagiken Corp., Japan 3 Corresponding author: Yutaka Watanobe, Raihan Kabir (e-mail: yutaka@u-aizu.ac.jp, raihan.kabir.cse@gmail.com). This paragraph of the first footnote will contain support information, including sponsor and financial support acknowledgment. ABSTRACT An efficient robot path-planning model is vulnerable to the number of search nodes, path cost, and time complexity. The conventional A-star (A*) algorithm outperforms other grid-based algorithms for its heuristic search. However it shows suboptimal performance for the time, space, and number of search nodes, depending on the robot motion block (RMB). To address this challenge, this study proposes an optimal RMB for the A* path-planning algorithm to enhance the performance, where the robot movement costs are calculated by the proposed adaptive cost function. Also, a selection process is proposed to select the optimal RMB size. In this proposed model, grid-based maps are used, where the robot’s next move is determined based on the adaptive cost function by searching among surrounding octet neighborhood grid cells. The cumulative value from the output data arrays is used to determine the optimal motion block size, which is formulated based on parameters. The proposed RMB significantly affects the searching time complexity and number of search nodes of the A* algorithm while maintaining almost the same path cost to find the goal position by avoiding obstacles. For the experiment, a benchmarked online dataset is used and prepared three different dimensional maps. The proposed approach is validated using approximately 7000 different grid maps with various dimensions and obstacle environments. The proposed model with an optimal RMB demonstrated a remarkable improvement of 93.98% in the number of search cells and 98.94% in time complexity compared to the conventional A* algorithm. Path cost for the proposed model remained largely comparable to other state-of-the-art algorithms. Also, the proposed model outperforms other state-of-the-art algorithms. INDEX TERMS A* algorithm, Adaptive cost function, BFS, Dijkstra, DFS, Path planning, Robot motion block (RMB). I. INTRODUCTION In the field of robotics, there are several challenging tasks, and path planning is one of the most important tasks among them to find a way to obtain the desired goal position. In this research area, the main objective is to develop an efficient path-planning algorithm by enhancing its performance in terms of searching time complexity, path cost, and search area [1]. As the application area of robot usage is increasing rapidly, the number of ongoing studies is also increasing in this area [2]. Generally, path-planning algorithms always search for the target position from the current position of the robot by keeping the overall path as shortest as possible. There are many path-planning algorithms for minimizing the path cost and finding the VOLUME XX, 2017 shortest path; however, for a path-planning algorithm, the importance of the three main factors, time complexity, path cost, and search area, mainly depends on the robot application [1]. Nevertheless, considering these factors, a general and efficient path-planning algorithm fits most robot applications. Generally, path-planning algorithms are categorized into two groups based on the surroundings of the known degree of environmental information global path planning and local path planning of the robot [3, 4]. A robot with global path planning needs to know the environmental information partially, such as a map of the environment required to calculate the optimal route from the start position to the goal position. The algorithm partially knew the obstacle 1" 2312.15751v1,"Solving Label Variation in Scientific Information Extraction via Multi-Task Learning Dong Pham 1 , Xanh Ho 2 , Quang-Thuy Ha 1 and Akiko Aizawa 2,3 1 VNU University of Engineering and Technology, Hanoi, Vietnam 2 National Institute of Informatics, Tokyo, Japan 3 The University of Tokyo, Tokyo, Japan dongpham120899@gmail.com thuyhq@vnu.edu.vn {xanh, aizawa}@nii.ac.jp Abstract Scientific Information Extraction (ScientificIE) is a critical task that involves the identification of scientific entities and their relationships. The complexity of this task is compounded by the necessity for domain-specific knowledge and the limited availability of annotated data. Two of the most popular datasets for ScientificIE are SemEval-2018 Task-7 and SciERC. They have overlapping samples and differ in their annotation schemes, which leads to conflicts. In this study, we first introduced a novel approach based on multi-task learning to address label variations. We then proposed a soft labeling technique that converts inconsistent labels into probabilistic distributions. The experimental results demonstrated that the proposed method can enhance the model robustness to label noise and improve the end-to-end performance in both ScientificIE tasks. The analysis revealed that label variations can be particularly effective in handling ambiguous instances. Furthermore, the richness of the information captured by label variations can potentially reduce data size requirements. The findings highlight the importance of releasing variation labels and promote future research on other tasks in other domains. Overall, this study demonstrates the effectiveness of multi-task learning and the potential of label variations to enhance the performance of ScientificIE. 1 1 Introduction Information extraction (IE) refers to the process of automatically identifying the entities and relations from unstructured text. Extracting the information from a scientific paper is more challenging than from open-domain data, given that scientific texts require in-depth knowledge of the subject matter for accuracy; thus, labeling is costly and the amount of labeled data is limited. Bassignana and Plank (2022b) revealed that two well- 1 Data and code are publicly available at: https:// github.com/dongpham120899/LabelVariation_SciIE known datasets, namely, SemEval-2018 (Gábor et al., 2018) and SciERC (Luan et al., 2018), contain overlapped abstracts and directly correspondent labels; however, they differ in their annotations. In particular, there are 307 abstracts (out of 500 abstracts) that are overlapped between the two datasets. The number of annotated relations in these abstracts differs significantly and includes conflicting instances. The presence of conflicting annotations raises concerns regarding the reliability of these datasets; thus, the determination of trustworthiness is challenging, especially with limited resources. Labeling plays a crucial role in machine learning pipelines, as it involves assigning labels to data points to train models effectively. However, human labeling is generally subject to errors and inconsistencies (Plank, 2022), and label aggregation cannot capture the actual complexity of the world (Basile et al., 2021). Using only high-agreement instances for model training and testing can cause overfitting and data redundancy (Jamison and Gurevych, 2015). Therefore, different annotated opinions should be retained and “variation” should be considered over “disagreement”, given that disagreement annotations imply that two (or more) views involved are not all accurate (Plank, 2022). Label variation occurs in ScientificIE when different annotators assign different labels to the same entity or relationship. This variation can stem from various factors, including differences in domain knowledge or interpretations of annotation guidelines, in addition to the subjective understanding of the underlying data. In response to the challenge of label variations arising from overlapping datasets, we developed a novel approach based on multi-task learning. By jointly training the proposed model on multiple perspectives, overlapping and conflicting annotations can be effectively handled. We released soft labels (a probability distribution generated by multi-level agreements) as an auxiliary" 2312.15752v1,"Dark matter production accompanied by gravitational wave signals during cosmological phase transitions Shuocheng Xu, 1, * Ruiyu Zhou, 2, 3, † Wei Cheng , 2, 3, ‡ and Xuewen Liu 1, § 1 Department of Physics, Yantai University, Yantai 264005, China School of Science, Chongqing University of Posts and Telecommunications, Chongqing 400065, China 3 Department of Physics and Chongqing Key Laboratory for Strongly Coupled Physics, Chongqing University, Chongqing 401331, China 2 We investigate the temperature-dependent production of feebly interacting massive dark matter particle (FIMP DM) within a Z 2 model, incorporating two Z 2 -odd scalar fields. In specific parameter regions, three distinct mechanisms individually dominate the production of the FIMP DM. These mechanisms include the semiproduction process, commonly known as the “exponential growth” process, the production from pair annihilations of the bath particles, and the three-body decay process. It is crucial to consider the thermal history during the evolution of FIMPs, as it involves multiple phase transitions occurring prior to the freeze-in of dark matter. Consequently, the scalar masses experience thermal variations, leading to a distinctive evolutionary trajectory for FIMPs when compared to scenarios without accounting for the thermal effects. Notably, the unique pattern of FIMP evolution is accompanied by the production of gravitational waves, presenting promising opportunities for detection using forthcoming interferometers. I. INTRODUCTION Extensive evidence [1–5] overwhelmingly supports the existence of dark matter (DM) as the dominant matter component of the Universe. However, despite decades of dedicated experimental efforts, the elusive nature of DM remains unresolved. Deciphering the fundamental properties of DM stands as one of the most pressing and fundamental challenges in contemporary particle physics. The Weakly Interacting Massive Particle (WIMP) has emerged as a leading candidate in addressing the DM problem, attracting extensive investigation [6–9]. However, the parameter space of WIMP DM has faced substantial constraints imposed by direct detection experiments [10–15], necessitating exploration of alternative DM production mechanisms. Among these mechanisms, the freeze-in mechanism has garnered significant interest as a viable alternative[16–30]. The freeze-in mechanism, in contrast to the wellestablished freeze-out mechanism, gives rise to Feebly Interacting Massive Particle (FIMP) DM. FIMPs possess a small coupling to the visible sector, making them challenging targets for direct detection experiments and constraints. Note that the requirement of a small coupling for FIMP DM finds a natural explanation within clockwork models, providing a compelling theoretical framework for their production [31– 36]. Among the most extensively studied production processes are the 1 → 2 decays of thermal bath particles into FIMPs and the 2 → 2 pair annihilation processes [23], which have been thoroughly reviewed in Ref. [23]. Recently, a novel production mechanism based on freeze-in through semiproduction has been proposed [37]. In this mechanism, DM particles are produced from the thermal bath via the transformation of heat bath particles, namely the inverse semiannihilation process. For a small initial abundance of DM, * xushuocheng@s.ytu.edu.cn † zhoury@cqupt.edu.cn ‡ chengwei@cqupt.edu.cn § xuewenliu@ytu.edu.cn this leads to an exponential growth in the DM number density. Several studies have been conducted to explore this topic [38–41]. However, it is crucial to consider the influence of finite temperature effects on the evolution of FIMP abundance. The thermal loop corrections contribute to the modification of particle masses, implying that the kinematics of DM production becomes temperature-dependent. Consequently, certain production channels may be accessible during specific cosmological epochs but kinematically closed during others. Another effect is the temperature dependence of the effective scalar potential, leading to variations not only in scalar masses but also in their vacuum expectation values (VEVs) in the early Universe. Of particular interest is the scenario where the scalar potential exhibits multiple disjoint minima and undergoes phase transitions between them, known as multi-step cosmological phase transitions. The impact of thermal effects in the early Universe on FIMP abundance has been previously examined in studies such as [42–47]. In this work, we investigate the temperature-dependent production of scalar FIMP DM within a new physics model featuring Z 2 symmetry. The model consists of two Z 2 -odd scalar fields, Φ and S, with interaction terms λ 1 ΦS 3 and λ 2 Φ 3 S. We assign the role of FIMP DM to the field S, while Φ acts as the portal between the Standard Model (SM) sector and the dark sector. Additionally, Φ could also serve as a WIMP-like particle, evolving as a thermal relic. However, the abundance of Φ at present is negligible, leaving FIMP DM as the sole DM candidate in our scenario. In this model, three different mechanisms or processes can dominate the production of FIMPs. These mechanisms include the semi-production process, denoted as ΦS → SS, the production from pair annihilations of the bath particles (ΦΦ → SS and ΦΦ → ΦS), and the three-body decay process (Φ → SSS). To ensure a comprehensive analysis, we study each mechanism individually in specific parameter regions where they dominate the production. Furthermore, we take into account the thermal history for the evolution of FIMPs, considering multiple phase transitions that occur prior to the freeze-in of DM. Incorporating the Φ" 2312.15765v1,"Astronomy & Astrophysics manuscript no. bf132 December 27, 2023 ©ESO 2023 Letter to the Editor Milliarcsecond-scale radio structure of the most distant BL Lac object candidate at redshift 6.57 S. Frey 1, 2, 3 , Y. Zhang 4, 5 , K. Perger 1, 2 , T. An 4, 5 , K. É. Gabányi 6, 7, 1, 2 , L. I. Gurvits 8, 9 , C.-Y. Hwang 10 , E. Koptelova 10 , Z. Paragi 8 , and J. Fogasy 1, 2 1 Konkoly Observatory, HUN-REN Research Centre for Astronomy and Earth Sciences, Konkoly Thege Miklós út 15-17, H-1121 Budapest, Hungary e-mail: frey.sandor@csfk.org 2 CSFK, MTA Centre of Excellence, Konkoly Thege Miklós út 15-17, H-1121 Budapest, Hungary 3 Institute of Physics and Astronomy, ELTE Eötvös Loránd University, Pázmány Péter sétány 1/A, H-1117 Budapest, Hungary 4 Shanghai Astronomical Observatory, Chinese Academy of Sciences, 80 Nandan Road, Shanghai 200030, P.R. China 5 Key Laboratory of Radio Astronomy and Technology, Chinese Academy of Sciences, A20 Datun Road, Chaoyang District, Beijing 100101, P.R. China 6 Department of Astronomy, Institute of Physics and Astronomy, ELTE Eötvös Loránd University, Pázmány Péter sétány 1/A, H-1117 Budapest, Hungary 7 HUN-REN–ELTE Extragalactic Astrophysics Research Group, Eötvös Loránd University, Pázmány Péter sétány 1/A, H-1117 Budapest, Hungary 8 Joint Institute for VLBI ERIC, Oude Hoogeveensedijk 4, 7991 PD Dwingeloo, The Netherlands 9 Faculty of Aerospace Engineering, Delft University of Technology, Kluyverweg 1, 2629 HS Delft, The Netherlands 10 Graduate Institute of Astronomy, National Central University, Taoyuan City, 32001, Taiwan Received 14 November 2023 / Accepted 25 December 2023 ABSTRACT Context. The existence of accreting supermassive black holes up to billions of solar masses at early cosmological epochs (in the context of this work, redshifts z & 6) requires very fast growth rates which is challenging to explain. The presence of a relativistic jet can be a direct indication of activity and accretion status in active galactic nuclei (AGN), constraining the radiative properties of these extreme objects. However, known jetted AGN beyond z ∼ 6 are still very rare. Aims. The radio-emitting AGN J2331+1129 has recently been claimed as a candidate BL Lac object at redshift z = 6.57, based on its synchrotron-dominated emission spectrum and the lack of ultraviolet/optical emission lines. It is a promising candidate for the highest-redshift blazar known to date. The aim of the observations described here was to support or refute the blazar classification of this peculiar source. Methods. We performed high-resolution radio interferometric imaging observations of J2331+1129 using the Very Long Baseline Array at 1.6 and 4.9 GHz in 2022 Feb. Results. The images revealed a compact but slightly resolved, flat-spectrum core feature at both frequencies, indicating that the total radio emission is produced by a compact jet and originates from within a central 10-pc scale region. While these are consistent with the radio properties of a BL Lac object, the inferred brightness temperatures are at least an order of magnitude lower than expected from a Doppler-boosted radio jet, leaving the high-redshift BL Lac identification still an open question. Key words. radio continuum: galaxies – galaxies: high redshift – BL Lacertae objects: individual: J2331+1129 – techniques: interferometric 1. Introduction The most powerful active galactic nuclei (AGN) can be observed from vast distances, at redshifts beyond z = 10 (Goulding et al. 2023; Bogdán et al. 2023), corresponding to about 3.5% of the present age of the Universe. These objects are powered by material accretion onto the central supermassive black holes (SMBHs) residing in their host galaxies. The existence of black holes reaching the mass of billions of solar masses at z ∼ 6 − 7 poses challenges for models describing the formation and early growth of SMBHs (e.g. Volonteri et al. 2021). Recent discoveries of AGN at extremely high redshifts (z ≈ 10) favour models with massive (∼ 10 4 −10 5 M ⊙ ) black hole seeds such as resulting from direct collapse of gravitationally unstable gas clouds (e.g. Lodato & Natarajan 2006), merger of/accretion onto primordial black holes (e.g. Cappelluti et al. 2022), or spherically symmetric accretion into the combined potential of a stellar-mass seed black hole at the centre of a dark matter halo (Sharma & Sharma 2023). According to the updated catalogue 1 of Perger et al. (2017), the number of currently known z > 6 quasars with measured spectroscopic redshift is nearly 300. From these, only 15 sources have been individually detected in radio bands, although many of the remaining objects may have some level of weak AGN- related radio emission (Perger et al. 2019, 2024). It is expected that radio-emitting AGN will be found up to z ≈ 15 in the com- 1 https://cdsarc.cds.unistra.fr/viz-bin/cat/J/other/FrASS/4.9, accessed on 2023 Nov 14 Article number, page 1 of 5" 2312.15769v1,"ℓ p -Norm Constrained One-Class Classifier Combination Sepehr Nourmohammadi a , Shervin Rahimzadeh Arashloo a,∗ a Department of Computer Engineering, Bilkent University, Ankara, Turkey Abstract Classifier fusion is established as an effective methodology for boosting perfor- mance in different settings and one-class classification is no exception. In this study, we address the one-class classifier fusion problem by modelling the spar- sity/uniformity of the ensemble. To this end, we formulate a convex objective function to learn the weights in a linear ensemble model and impose a variable ℓ p≥1 -norm constraint on the weight vector. The vector-norm constraint enables the model to adapt to the intrinsic uniformity/sparsity of the ensemble in the space of base learners and acts as a (soft) classifier selection mechanism by shaping the relative magnitudes of fusion weights. Drawing on the Frank-Wolfe algorithm, we then present an effective approach to solve the formulated convex constrained optimisation problem efficiently. We evaluate the proposed one-class classifier combination approach on mul- tiple data sets from diverse application domains and illustrate its merits in comparison to the existing approaches. Keywords: Classifier combination, one-class classification, sparsity modelling, ℓ p -norm constraint, convex optimisation. ∗ Corresponding author Email address: s.rahimzadeh@cs.bilkent.edu.tr (Shervin Rahimzadeh Arashloo) Preprint submitted to Elsevier December 27, 2023" 2312.15771v1,"Computational Science Laboratory Report CSL-TR-23-7 December 27, 2023 Adwait Verulkar, Corina Sandu, Adrian Sandu, and Daniel Dopico “Simultaneous Optimal System and Controller Design for Multibody Systems with Joint Friction using Direct Sensitivities” Computational Science Laboratory “Compute the Future!” Department of Computer Science Virginia Tech Blacksburg, VA 24060 Phone: (540) 231-2193 Fax: (540) 231-6075 Email: sandu@cs.vt.edu Web: https://csl.cs.vt.edu ." 2312.15778v1,"Age-of-Information in UAV-assisted Networks: a Decentralized Multi-Agent Optimization Mouhamed Naby Ndiaye, El Houcine Bergou, and Hajar El Hammouti College of Computing, Mohammed VI Polytechnic University (UM6P), Benguerir, Morocco, emails: {naby.ndiaye,elhoucine.bergou,hajar.elhammouti}@um6p.ma Abstract—Unmanned aerial vehicles (UAVs) are a highly promising technology with diverse applications in wireless networks. One of their primary uses is the collection of time-sensitive data from Internet of Things (IoT) devices. In UAV-assisted networks, the Age-of-Information (AoI) serves as a fundamental metric for quantifying data timeliness and freshness. In this work, we are interested in a generalized AoI formulation, where each packet’s age is weighted based on its generation time. Our objective is to find the optimal UAVs’ trajectories and the subsets of selected devices such that the weighted AoI is minimized. To address this challenge, we formulate the problem as a Mixed-Integer Nonlinear Programming (MINLP), incorporating time and quality of service constraints. To efficiently tackle this complex problem and minimize communication overhead among UAVs, we propose a distributed approach. This approach enables drones to make independent decisions based on locally acquired data. Specifically, we reformulate our problem such that our objective function is easily decomposed into individual rewards. The reformulated problem is solved using a distributed implementation of Multi- Agent Reinforcement Learning (MARL). Our empirical results show that the proposed decentralized approach achieves results that are nearly equivalent to a centralized implementation with a notable reduction in communication overhead. Index Terms—Actor-Critic, Age-of-Information, MARL, Policy Gradient, PPO, UAV-assisted Network. I. I NTRODUCTION Unmanned aerial vehicles (UAVs), also known as drones, are used in wireless communications for a variety of applications such as collecting data and providing on-demand connectivity. However, their deployment in a multi-agent environment poses several challenges such as resource allocation, trajectory design, and cooperation between drones [1], [2]. In this paper, we focus on the use of UAVs to periodically collect time-sensitive data from IoT devices and transmit it to a server for analysis and decision-making. To measure the freshness of the collected data, we are interested in the concept of Age-of-Information (AoI) [3], [4] which quantifies the time elapsed since the last data update was collected. Our main objective is to minimize the weighted AoI of the network over a period of time. Since UAVs operate in a common environment, we need to carefully design their behaviors and interactions to achieve the common goal of minimizing the weighted AoI. A. Related Work Optimizing a common objective in multi-UAV networks is a challenging task for two main reasons. First, it requires finely tuned UAVs actions while respecting resource and energy constraints. Second, it entails the complex coordination between UAVs which should involve a minimum communication overhead. To address these challenges, Multi-Agent Reinforcement Learning (MARL), an extension of Reinforcement Learning (RL) to the multi-agent setting, has been proposed [5]–[8]. In [6], authors study the problem of dynamic resource allocation in multi-UAV networks. The studied problem is formulated as a stochastic game. To solve the optimization problem, the authors propose an RL-based approach where all agents share a common structure based on Q-learning. Similarly, in [7], the authors study the deployment of a clustered multi-drone system to provide computational task offloading to IoT devices. They formulate their problem with the goal of minimizing the longterm computational cost in terms of delay and energy. Then, they propose a centralized method based on multi-agent deep reinforcement learning to minimize the overall computational cost of the network. In [8], the authors propose a cooperative multi-agent algorithm with an actor-critic architecture to solve the problem of latency. The proposed critic architecture is shared between the agents. In the previously cited works, MARL is implemented using a Centralized Training and Decentralized Execution (CTDE) strategy. In CTDE, the training and execution phases of the multi-agent system are handled differently. First, a centralized entity uses a global knowledge of the system to learn a coordinated policy for agents. Second, after the training, each agent operates independently and makes decisions based on its local observations. While CTDE achieves promising results, it requires the exchange of a large amount of information with the central entity, which may not be feasible in scenarios with limited communication bandwidth and latency. CTDE also does not scale well and becomes less efficient as the number of agents in the system increases. On the other hand, a handful of works applying Decentralized Training and Decentralized Execution (DTDE) to MARL can be found [9]–[11]. In fact, in DTDE, both the training and execution phases are conducted in a decentralized manner." 2312.15781v1,"A Computational Note on the Graphical Ridge in High-dimension A. Bekker a,b , A. Kheyri a and M. Arashi c a Department of Statistics, Faculty of Natural and Agricultural Sciences, University of Pretoria, Pretoria, South Africa b Centre of Excellence in Mathematical and Statistical Sciences, Johannesburg, South Africa c Department of Statistics, Faculty of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad, Iran ARTICLE HISTORY Compiled December 27, 2023 ABSTRACT This article explores the estimation of precision matrices in high-dimensional Gaussian graphical models. We address the challenge of improving the accuracy of maximum likelihood-based precision estimation through penalization. Specifically, we consider an elastic net penalty, which incorporates both L 1 and Frobenius norm penalties while accounting for the target matrix during estimation. To enhance precision matrix estimation, we propose a novel two-step estimator that combines the strengths of ridge and graphical lasso estimators. Through this approach, we aim to improve overall estimation performance. Our empirical analysis demonstrates the superior efficiency of our proposed method compared to alternative approaches. We validate the effectiveness of our proposal through numerical experiments and application on three real datasets. These examples illustrate the practical applicability and usefulness of our proposed estimator. KEYWORDS Graphical model; Graphical lasso estimation; High-dimensional Gaussian graphical models; Penalization; Precision matrix estimation; Ridge estimation 1. Introduction In recent years, there has been a substantial amount of research dedicated to investigating the estimation of the covariance matrix and its inverse, commonly known as the precision matrix. The motivation behind these studies arises from the critique that commonly employed likelihood-based approaches yield inaccurate estimates for the covariance and precision matrices, particularly in scenarios where the number of variables exceeds the available data points. One commonly employed approach is incorporating an L 1 penalty into the log-likelihood function. Nearly concurrently, [20], [3], [8] all investigated the estimation of the precision matrix, represented by a graphical lasso. This method has attracted a lot of interest and turned into an active topic of study due to the sparse solution ([7]; [5]; [18]; [12]; [6]; [2]). While sparsity in precision matrix estimation is often desirable, there are situations where precise representations of the high-dimensional precision matrix are fundamentally advantageous. Moreover, it is important to note that the true precision matrix CONTACT A. Bekker. Email: andriette.bekker@up.ac.za" 2312.15787v1,"ORTHOGONAL AND SYMPLECTIC PARABOLIC CONNECTIONS AND STACK OF ROOTS SUJOY CHAKRABORTY 1 AND SOURADEEP MAJUMDER 2 A BSTRACT . Let D be an effective divisor on a smooth projective variety X over an algebraically closed field k of characteristic 0. We show that there is a one-to-one correspondence between the class of orthogonal (respectively, symplectic) parabolic vector bundles on X with parabolic structure along D and having rational weights and the class of orthogonal (respectively, symplectic) vector bundles on certain root stacks associated to this data. Using this, we describe the orthogonal (respectively, symplectic) vector bundles on the root stack as reductions of the structure group to orthogonal (respectively, symplectic) groups. When D is a divisor with strict normal crossings, we prove a one-to-one correspondence between the class of orthogonal (respectively, symplectic) parabolic connections on X with rational weights, and the class of orthogonal (respectively, symplectic) logarithmic connections on certain fiber product of root stacks with poles along a divisor with strict normal crossings. 1. I NTRODUCTION Parabolic vector bundles were introduced by Mehta and Seshadri [MehSes80] on a compact Riemann surface X together with a set D of distinct marked points. They generalized the celebrated Narasimhan-Seshadri theorem in the case of Riemann surfaces with punctures. Later, Simpson in [Sim90] reformulated and extended the definition of parabolic bundles to the case of schemes X of higher dimension with a normal crossings divisor D. When the weights are all rational, and therefore can be assumed to be in 1 r Z for some integer r, it amounts to a locally free sheaf E of finite rank, together with a filtration E = E 0 ⊃ E 1 ⊃ E 2 ⊃ · · · ⊃ E r − 1 ⊃ E 1 = E (− D ) r r r Parabolic bundles, parabolic connections and their moduli spaces have since been an active area of research, and have found themselves used in a number of important applications. More recently, parabolic connections have made appearance in the work of Donagi and Pantev on Geometric Langlands conjecture using Simpson’s non-abelian Hodge theory [DonPan19]. When the weights are rational, it is known that parabolic bundles can be interpreted equivalently as equivariant bundles on a suitable ramified Galois cover [Bis97], and later, a more intrinsic interpretation was found using vector bundles on certain algebraic stacks associated to ( X, D ) , namely the stack of roots [Bor07]. More precisely, there is a Fourier-like correspondence 2020 Mathematics Subject Classification. 14D23, 14F05, 14H60, 53B15, 53C05, 14A21. Key words and phrases. Parabolic bundle; Root stack; Connection. Address 1 : Department of Mathematics, Indian Institute of Science Education and Research Tirupati, Andhra Pradesh - 517507, India. Email address 1 : sujoy.cmi@gmail.com. Address 2 : Department of Mathematics, Indian Institute of Science Education and Research Tirupati, Andhra Pradesh - 517507, India. Email address 2 : souradeep@iisertirupati.ac.in. 1" 2312.15805v1,"Astrocyte Regulated Neuromorphic CPG Control of Legged Robotic Locomotion Zhuangyu Han, Abhronil Sengupta School of Electrical Engineering and Computer Science Penn State University University Park, PA 16802 zfh5141@psu.edu, sengupta@psu.edu Abstract next-generation brain-inspired engineered learning systems (see report based on 6th US/NIH BRAIN Initiative Investigators Meeting (Monaco, Rajan, and Hwang 2021)). In particular, our work focuses on spinal central pattern generators (CPGs), which are neural circuits that generate spontaneous rhythmic patterns and serves as a model “brain-like” system to design engineered learning platforms, specifically robotic locomotion controllers. Multiple parallel works have pointed toward the critical role of astrocytes in spinal CPGs. Recent literature has reported that astrocytes in the spinal cord can influence the activity of the spinal motor network. Specifically, the excitation of spinal cord astrocytes causes a decline in fictive locomotion frequency (Acton and Miles 2017). Neuroscientists have further illustrated that excited astrocytes suppress the rhythmic locomotion activity by releasing ATP, which is hydrolyzed into adenosine (ADO) immediately. Adenosine works as an antagonist of the excitatory neurotransmitter dopamine (DA) in the motor neurons (Acton, Broadhead, and Miles 2018). Also, researchers have observed that, in larval zebrafish, the futile swimming effort can activate radial astrocytes, which suppresses continuous unsuccessful attempts (Mu et al. 2019). Such results are consistent with the claim that astrocytes play a homeostatic role in the neural system (Verkhratsky and Nedergaard 2018). Driven by such insights, we investigate the homeostatic regulation role of astrocytes in neuromorphic Spiking Neural Network (SNN) based CPG circuits for gait learning in quadruped robots. Neuromorphic robotic control has been recently gaining attention due to the promise of enabling low-power edge robotics in resource constrained environments (Rostro-Gonzalez et al. 2015; Polykretis, Tang, and Michmizos 2020; Gutierrez-Galan et al. 2020). However, the works remain preliminary with application to simple robotic platforms primarily due to overtly simplistic computational modelling of the biological system. This work forges stronger connections with neuroscience computational models of CPG and astrocyte regulated synaptic plasticity to develop an algorithmic learning framework for gait emergence in legged robotic locomotion. The key distinguishing factors of our work against prior proposals are: (i) Neuroscience Inspired CPG Formulation: Based on the bio-inspiration premise that CPG formulations need to have stronger neuroscience correlation in order to harness Neuromorphic computing systems, where information is transmitted through action potentials in a bio-plausible fashion, is gaining increasing interest due to its promise of lowpower event-driven computing. Application of neuromorphic computing in robotic locomotion research have largely focused on Central Pattern Generators (CPGs) for bionics robotic control algorithms - inspired from neural circuits governing the collaboration of the limb muscles in animal movement. Implementation of artificial CPGs on neuromorphic hardware platforms can potentially enable adaptive and energy-efficient edge robotics applications in resource constrained environments. However, underlying rewiring mechanisms in CPG for gait emergence process is not well understood. This work addresses the missing gap in literature pertaining to CPG plasticity and underscores the critical homeostatic functionality of astrocytes - a cellular component in the brain that is believed to play a major role in multiple brain functions. This paper introduces an astrocyte regulated Spiking Neural Network (SNN)-based CPG for learning locomotion gait through Reward-Modulated STDP (Izhikevich 2007) for quadruped robots, where the astrocytes help build inhibitory connections among the artificial motor neurons in different limbs. The SNN-based CPG is simulated on a multiobject physics simulation platform resulting in the emergence of a trotting gait while running the robot on flat ground. 23.3× computational power savings is observed in comparison to a state-of-the-art reinforcement learning based robot control algorithm. Such a neuroscience-algorithm co-design approach can potentially enable a quantum leap in the functionality of neuromorphic systems incorporating glial cell functionality. Introduction Current brain-inspired engineered systems have primarily focused on the emulation of bio-plausible computational models of neurons and synapses. Incorporation of other cellular units from the brain is lacking. Over the past few years, a growing body of evidence has demonstrated that glial cells, and in particular astrocytes, play an important role in the maintenance and modulation of neuronal dynamics facilitating brain function (Allam et al. 2012). This work is inspired by recent theories suggesting that rich temporal dynamics such as sychrony form the dynamical basis of learning and memory and are expected to play a key role in enabling a dynamical view of intelligence for the design of 1" 2312.15817v1,"Contrastive Learning-Based Framework for Sim-to-Real Mapping of Lidar Point Clouds in Autonomous Driving Systems Hamed Haghighi 1 , Mehrdad Dianati 2 , Kurt Debattista 1 and Valentina Donzella 1 Abstract— Perception sensor models are essential elements of automotive simulation environments; they also serve as powerful tools for creating synthetic datasets to train deep learningbased perception models. Developing realistic perception sensor models poses a significant challenge due to the large gap between simulated sensor data and real-world sensor outputs, known as the sim-to-real gap. To address this problem, learningbased models have emerged as promising solutions in recent years, with unparalleled potential to map low-fidelity simulated sensor data into highly realistic outputs. Motivated by this potential, this paper focuses on sim-to-real mapping of Lidar point clouds, a widely used perception sensor in automated driving systems. We introduce a novel Contrastive-Learning-based Sim-to-Real mapping framework, namely CLS2R, inspired by the recent advancements in image-to-image translation techniques. The proposed CLS2R framework employs a lossless representation of Lidar point clouds, considering all essential Lidar attributes such as depth, reflectance, and raydrop. We extensively evaluate the proposed framework, comparing it with the state-of-the-art image-to-image translation methods using a diverse range of metrics to assess realness, faithfulness, and the impact on the performance of a downstream task. Our results show that CLS2R demonstrates superior performance across nearly all metrics. Source code is available at https: //github.com/hamedhaghighi/CLS2R.git. Index Terms— Learning-based Lidar model, sim-to-real mapping, contrastive learning, automated driving systems. I. I NTRODUCTION Virtual verification and validation of Automated Driving Systems (ADS) is becoming an increasingly important part of their safety assurance frameworks primarily due to the safety concerns and high costs of extensive real-world testing [1]. Successful virtual verification and validation of ADS requires realistic simulation models including perception sensor models. In addition, perception sensor models are powerful tools for generating datasets that can be used to train deep learning-based perception models [2]. Motivated by these important needs, this paper aims to develop a realistic Lidar model, a key perception sensor in ADS [3]. The use of sensor models and the synthetic datasets they generate introduces the non-trivial technical challenge of closing the so-called sim-to-real gap [4]. This gap arises from inaccuracies in modelling 3D assets and perception sensors, This research is supported in part by the University of Warwick’s Centre for Doctoral Training in Future Mobility Technologies and in part by the Hi-Drive Project through the European Union’s Horizon 2020 Research and Innovation Program under Grant Agreement No 101006664. 1 H. Haghighi, K. Debattista, and V. Donzella are with WMG, University of Warwick, Coventry, U.K. (Corresponding author: Hamed.Haghighi@warwick.ac.uk) 2 M. Dianati is with the School of Electronics, Electrical Engineering and Computer Science at Queen’s University of Belfast and WMG at the University of Warwick. resulting in a mismatch between the fidelity of simulated and real sensor data. Such discrepancies can undermine the reliability of the simulation for safety assurance and synthetic dataset generation for training of perception models. The complexity of developing high-fidelity sensor models has led to the growing popularity of learning-based models to bridge the sim-to-real gap [5], [6]. In the context of Lidar models, most existing learning-based approaches aim to design deep neural networks for learning complex Lidar data attributes. These models acquire knowledge from real-world data, and this knowledge is then transferred to simulation environments. For instance, Vacek et al. [7] attempted to learn Lidar reflectance from the real recorded KITTI [8], and then, they deployed their model within the CARLA [9] simulation environment. Despite exhibiting promising results, these approaches often focus only on specific Lidar attributes, such as reflectance and raydrop, and rely on conventional simulation techniques for the other aspects. This has led to another set of methods [10] in the literature that attempt to establish a direct mapping between simulation and real, commonly known as sim-to-real domain mapping methods. In the context of the Lidar data, existing sim-toreal mapping approaches mainly use vanilla CycleGAN [11] to map the lossy Birds-Eye-View (BEV) representation of the point clouds. These approaches are primarily leveraged for training downstream perception models. However, the effectiveness of such approaches from the perspective of realness and faithfulness has not been fully analysed in the literature. Inspired by the success of contrastive learning in unpaired image-to-image translation methods [12], we propose a novel framework for sim-to-real mapping of Lidar point clouds. We term this method Contrastive-Learning-based Sim-to- Real mapping (CLS2R). The proposed CLS2R uses a lossless representation of Lidar point clouds and undergoes a comprehensive evaluation using a diverse set of metrics extending beyond the scope of current research in the field. The CLS2R framework is the first of its type to model all essential Lidar data attributes, including depth, reflectance and raydrop based on the corresponding simulated data. Inspired by the noise rendering in Convolutional Neural Networks (CNNs) [13], we disentangle the synthesis of raydrop from the synthesis of depth-reflectance image, employing a reparametrisation trick [14] to fuse them effectively. CLS2R also incorporates auxiliary images, e.g. point-wise semantic labels, using a unique strategy to improve the overall quality of the simulated Lidar point clouds. To evaluate the performance of the proposed CLS2R" 2312.15825v1,"Comparative Analysis of Radiomic Features and Gene Expression Profiles in Histopathology Data Using Graph Neural Networks Luis Carlos Rivera Monroy 1,2 , Leonhard Rist 1 , Martin Eberhardt 2 , Christian Ostalecki 2 , Andreas Bauer 2 , Julio Vera 2 , Katharina Breininger 3 , and Andreas Maier 1 , 1 Pattern Recognition Lab, Friedrich-Alexander-Universität Erlangen-Nürnberg, Erlangen, Germany 2 Department of Dermatology, Universitätsklinikum Erlangen, Erlangen, Germany 3 Department Artificial Intelligence in Biomedical Engineering, FAU Erlangen-Nürnberg, Erlangen, Germany luis.rivera@fau.de Abstract. This study leverages graph neural networks to integrate MELC data with Radiomic-extracted features for melanoma classification, focusing on cellwise analysis. It assesses the effectiveness of gene expression profiles and Radiomic features, revealing that Radiomic features, particularly when combined with UMAP for dimensionality reduction, significantly enhance classification performance. Notably, using Radiomics contributes to increased diagnostic accuracy and computational efficiency, as it allows for the extraction of critical data from fewer stains, thereby reducing operational costs. This methodology marks an advancement in computational dermatology for melanoma cell classification, setting the stage for future research and potential developments. 1 Introduction In post-genomic research, a primary objective is elucidating the relationship between molecular networks and their corresponding cells or tissues. These networks, crucial for specific cellular functions, depend on proteins being precisely positioned, temporally synchronized, and in the correct concentration for effective interactions [0]. Understanding and constructing protein networks by measuring and describing local interactions is vital for deeper understanding of diseases. A significant advancement in this field has been the development of imaging technologies, such as fluoroscopy, which marked a breakthrough by enabling the affinity analysis of multiple proteins. However, the capacity of these technologies to represent the complexity of cellular networks is limited [0]. Addressing this, methods like Multi-Epitope-Ligand Cartography (MELC) have enhanced the depth of tissue characterization through iterative staining, enabling more comprehensive analysis [0]. MELC represents an improvement over traditional imaging techniques by providing detailed tissue characterization at a cellular level. When combined with machine learning, MELC enables detailed cell-wise classification based on gene expression profiles, offering invaluable insights for medical research, including treatment effects and prognosis evolution [0]. 1" 2312.15845v1,"Optimal Decentralized Composite Optimization for Strongly Convex Functions Haishan Ye ∗ Xiangyu Chang † December 27, 2023 Abstract This paper concentrates on decentralized composite optimization for strongly convex functions. Decentralized optimization, renowned for its robustness to network variations and the absence of a central server communication bottleneck, has garnered considerable interest in signal processing, control, and optimization communities. Although numerous algorithms have been proposed for smooth and strongly convex objective functions in recent years, the development of an optimal algorithm that includes a non-smooth regularization term remains an unresolved challenge in decentralized optimization. This paper bridges the divide between smooth decentralized optimization and decentralized composite optimization, introducing the first algorithm capable of achieving optimal computational and communication complexities. Moreover, our experimental results substantiate the efficacy and efficiency of our algorithm in both computation and communication aspects. 1 Introduction In contemporary settings, datasets of considerable size are typically distributed across multiple storage systems. Centralizing these extensive datasets proves to be impractical, primarily due to constraints in communication bandwidth and concerns regarding data privacy (Lian et al., 2017; Song et al., 2023). Addressing these bottlenecks in numerous practical applications, the concept of distributed optimization has surfaced as a viable approach, particularly within the realms of largescale machine learning, signal processing, control, and optimization (Sayed et al., 2014; Shi et al., 2015a; Alghunaim et al., 2019; Li & Lin, 2020). This paper considers the composite optimization problem formulated as follows: m F (x) = f (x) + g(x), with f (x) = 1 X f i (x), m (1) i=1 where each f i (x) is L-smooth and convex, and the regularization term g(x) is µ-strongly convex but may be non-differentiable with 0 < µ ≤ L. The elastic-norm serves as a typical example ∗ Center for Intelligent Decision-Making and Machine Learning, School of Management, Xi’an Jiaotong University; email: yehaishan@xjtu.edu.cn. † Center for Intelligent Decision-Making and Machine Learning, School of Management, Xi’an Jiaotong University; email: xiangyuchang@xjtu.edu.cn. 1" 2312.15883v1,"Think and Retrieval: A Hypothesis Knowledge Graph Enhanced Medical Large Language Models Xinke Jiang * , Ruizhe Zhang * , Yongxin Xu ∗ Rihong Qiu, Yue Fang, Zhiyuan Wang, Jinyi Tang, Hongxin Ding Xu Chu † , Junfeng Zhao † , Yasha Wang † Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education; School of Computer Science, Peking University Beijing, China ABSTRACT We explore how the rise of Large Language Models (LLMs) significantly impacts task performance in the field of Natural Language Processing. We focus on two strategies, Retrieval-Augmented Generation (RAG) and Fine-Tuning (FT), and propose the Hypothesis Knowledge Graph Enhanced (HyKGE) framework, leveraging a knowledge graph to enhance medical LLMs. By integrating LLMs and knowledge graphs, HyKGE demonstrates superior performance in addressing accuracy and interpretability challenges, presenting potential applications in the medical domain. Our evaluations using real-world datasets highlight HyKGE’s superiority in providing accurate knowledge with precise confidence, particularly in complex and difficult scenarios. The code will be available until published. CCS CONCEPTS • Computing methodologies → NLP. KEYWORDS NLP ACM Reference Format: Xinke Jiang * , Ruizhe Zhang * , Yongxin Xu, Rihong Qiu, Yue Fang, Zhiyuan Wang, Jinyi Tang, Hongxin Ding, and Xu Chu † , Junfeng Zhao † , Yasha Wang. 2023. Think and Retrieval: A Hypothesis Knowledge Graph Enhanced Medical Large Language Models. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn 1 INTRODUCTION Large Language Models (LLMs), such as ChatGPT [30] and GPT- 4 [31], have achieved remarkable progress. By undergoing pretraining on massive text corpora and aligning fine-tuning to follow ∗ Xinke Jiang, Ruize Zhang, and Yongxin Xu contributed equally to this research. {xinkejiang, nostradamus, xuyx} @stu.pku.edu.cn † Corresponding authors. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn human instructions, they have recently demonstrated exceptional performance in a range of downstream tasks. Despite their advancements, they still face significant challenges, including the difficulty in avoiding factual inaccuracies (i.e., hallucinations) [5, 14, 15], outdated knowledge [11], and a lack of expertise in handling specific domains or highly specialized queries [16]. This undermines their reliability in areas where accountability and trustworthiness are crucial, such as in law, medicine, and science [14]. Retrieval-Augmented Generation (RAG), which enhances content generation by retrieving external information, reduces factual errors in knowledge-intensive tasks with the help of external knowledge and is seen as a promising solution to address these challenges. [1, 2, 13]. Among the numerous external information sources, knowledge graphs, as a structured data source refined and extracted through advanced information extraction algorithms, can provide higher quality context. They are considered by many research works to improve the accuracy and reliability of answers provided by LLMs. On the one hand, some works are based on the Retrieve-Read framework, which initially obtain knowledge through dense vector retrieval according to user queries [29, 32, 43]. However, they suffer from issues such as unclear expression and lack of semantic information in the user’s original query. This misalignment between the semantic spaces of user queries and highquality structured knowledge leads to the retrieval of knowledge that is of insufficient quality and may contain redundant information and noise. On the other hand, some works enable LLM to acquire planning and reflecting abilities in interacting with knowledge graphs through multi-round step-by-step requests [2, 23, 34, 36, 44]. However, they are constrained by the expensive time overhead of multiple interactions with LLM and the cumulative errors in the distributed reasoning process. In summary, how to align user input with high-quality structured knowledge while reducing interactions with LLMs, and filtering out noise in retrieved information remains an unresolved issue. To cope with these challenges, we put forward the Hypothesis Knowledge Graph Enhanced (HyKGE) framework, A novel method based on hypothetical document [9] output to explore, locate, and prune search directions for accurate and reliable LLM responses. Specifically, in the pre-retrieval phase, our key idea is that the zeroshot capability and rich knowledge of LLMs can compensate for the incompleteness of user queries, facilitating alignment with highquality external knowledge. For example, when facing the question ’How are proteins synthesized?’, if retrieval is based solely on the key entity ’protein’, a large amount of noise will be introduced due" 2312.15886v1,"Factorial Moments of the Geometric Distribution of Order k S. R. Mane a a Convergent Computing Inc., P. O. Box 561, Shoreham, NY 11786, USA Abstract We derive a simple expression for the r th factorial moment µ (r) of the geometric distribution of order k with success parameter p ∈ (0, 1) (and q = 1 − p) in terms of its probability mass function f k (n). Specifically, µ (r) = r!f k ((r + 1)k + r)/((qp k ) r+1 ). Keywords: Success runs, moments, factorial moments, recurrences, geometric distribution, discrete distribution 2020 MSC: 60E05, 39B05, 11B37, 05-08 Email address: srmane001@gmail.com (S. R. Mane) Preprint submitted to (internal report CC23-13) December 27, 2023" 2312.15908v1,"Decentralized Monte Carlo Tree Search for Partially Observable Multi-agent Pathfinding Alexey Skrynnik 1,2 , Anton Andreychuk 1 , Konstantin Yakovlev 2,1 , Aleksandr Panov 1,2 1 2 AIRI, Moscow, Russia Federal Research Center for Computer Science and Control of Russian Academy of Sciences, Moscow, Russia skrynnikalexey@gmail.com, andreychuk@airi.net, yakovlev@isa.ru, panov@airi.net Abstract The Multi-Agent Pathfinding (MAPF) problem involves finding a set of conflict-free paths for a group of agents confined to a graph. In typical MAPF scenarios, the graph and the agents’ starting and ending vertices are known beforehand, allowing the use of centralized planning algorithms. However, in this study, we focus on the decentralized MAPF setting, where the agents may observe the other agents only locally and are restricted in communications with each other. Specifically, we investigate the lifelong variant of MAPF, where new goals are continually assigned to the agents upon completion of previous ones. Drawing inspiration from the successful AlphaZero approach, we propose a decentralized multi-agent Monte Carlo Tree Search (MCTS) method for MAPF tasks. Our approach utilizes the agent’s observations to recreate the intrinsic Markov decision process, which is then used for planning with a tailored for multi-agent tasks version of neural MCTS. The experimental results show that our approach outperforms state-of-theart learnable MAPF solvers. The source code is available at https://github.com/AIRI-Institute/mats-lp. Introduction Multi-agent pathfinding (MAPF) is a non-trivial problem inspired by numerous practical applications like automated warehouses, video games, intelligent transport systems, etc. A large body of works (Ma et al. 2019; Sharon et al. 2015; Wagner and Choset 2011) study this problem in a centralized setting, i.e., it is assumed that a central control unit exists that i) has a knowledge of the full state of the environment (locations of the agents, their goals, positions of the static obstacles, etc.) at any time moment; ii) is in charge of providing conflict-free solutions to MAPF queries. Indeed, various flavors of MAPF problems are studied within this setting, e.g., Classical MAPF (Stern et al. 2019) when each agent is assigned a unique goal, Colored MAPF (Ma and Koenig 2016) when the agents are split into teams and agents of one team are interchangeable, Anonymous MAPF (Hönig et al. 2018), when any agent can pursue any goal, etc. One MAPF variant, that we study in this work, is the Lifelong MAPF (LMAPF). In this setting, the agents must constantly pursue goals (provided externally), i.e., when an agent reaches its goal, it is immediately assigned another This is a pre-print version of the paper accepted to AAAI 2024. one. This setting is motivated by the real-world delivery applications when a group of robots has to constantly deliver some items dispersed in the shared environment, e.g., items of goods in the warehouse, documents in the office building, medicine in the hospital, etc. One of the ways to solve LMAPF is to adapt existing MAPF solvers to the lifelong setting. One of such recent methods, RHCR (Li et al. 2021), involves centralized replanning every k time-steps. Indeed, when k is small and the number of agents is large, the performance of such an approach degrades significantly as it may take too much time for a solver to construct a joint collision-free plan. Boundedhorizon planning can mitigate this issue to a certain extent; indeed, RHCR utilizes this technique. However, this is still limited. An appealing orthogonal approach is to solve LMAPF in a distributed fashion, i.e., model it as a decentralized sequential decision-making process when every agent individually decides what action to take at each time step. Most of the state-of-the-art decentralized (L)MAPF solvers are the learnable ones (Sartoretti et al. 2019; Damani et al. 2021; Ma, Luo, and Ma 2021; Li et al. 2022). However, the performance of these solvers may rely heavily on the dataset of problem instances used at the learning (training) stage. Their performance often drops significantly in setups that are unlike the latter ones. This is a general problem known in machine learning as low generalization. To mitigate this issue, hybrid approaches were proposed that typically include a (search-based) global planner and a (local) learnable policy that is tailored to follow the global plan while resolving the potential inter-agent conflicts (Wang et al. 2020; Liu et al. 2020). Such approaches also have limitations because, under challenging cases, it is required to move significantly away from the local sub-goal for the agents to disperse in bottlenecks. Learning-based methods may demonstrate low efficiency in this kind of task. Thus, another way of combining the learning-based and search-based approaches is desirable. This work follows a hybrid search-and-learning approach to create a decentralized MAPF solver. However, our methodology is different from the ones described above. On the one hand, we rely on the (lightweight) learnable policy that can drive an agent toward a goal. On the other hand, to improve the agent’s ability to cooperate, we utilize Monte-" 2312.15917v1,"Normalized solutions for nonlinear Schrödinger equation involving potential and Sobolev critical exponent Zhen-Feng Jin 1 , Weimin Zhang 2,∗ School of Mathematics and Computer Science, Shanxi Normal University, Taiyuan, 030031, P.R. China 2 School of Mathematical Sciences, Key Laboratory of Mathematics and Engineering Applications (Ministry of Education) & Shanghai Key Laboratory of PMMP, East China Normal University, Shanghai, 200241, P.R. China 1 Abstract In this paper, we consider the existence of positive solutions with prescribed L 2 -norm for the following nonlinear Schrödinger equation involving potential and Sobolev critical exponent ( 4 −∆u + V (x)u = λu + µ|u| p−2 u + |u| N −2 u in R N , kuk 2 = a > 0, 2N where N ≥ 3, µ > 0, p ∈ [2 + N 4 , N−2 ) and V ∈ C 1 (R N ). Under different assumptions on V , we derive two different Pohozaev identities. Based on these two cases, we respectively obtain the existence of positive solution. As far as we are aware, we did not find any works on normalized solutions with Sobolev critical growth and potential V 6≡ 0. Our results extend some results of Wei and Wu [J. Funct. Anal. 283(2022)] to the potential case. Keywords: Normalized solutions, Potential, Mass supercritical and Sobolev critical growth. 1 Introduction This paper is concerned with the existence of positive solutions with prescribed L 2 -norm for the following nonlinear Schrödinger equation ( ∗ −∆u + V (x)u = λu + µ|u| p−2 u + |u| 2 −2 u in R N , kuk 2 = a > 0, (1.1) where N ≥ 3, µ > 0, p ∈ [2 + N 4 , 2 ∗ ) with 2 ∗ := N 2N −2 , and kuk 22 = Z u 2 dx. R N The parameter λ ∈ R arises as a Lagrange multiplier with respect to the mass constraint kuk 2 = a. Here, V : R N → R is a potential function. Problem (1.1) comes from the study of standing waves for the nonlinear Schrödinger equation iw t − ∆w + V (x)w = f (w) in R N × (0, ∞), (1.2) w(x, t) = e −iλt u(x), (x, t) ∈ R N × (0, ∞), (1.3) where w has the form ∗ Corresponding author. AMS Subject Classification: 35Q55, 35J60, 35J20. E-mail addresses: jinzhenfeng@sxnu.edu.cn (Z.-F. Jin), zhangweimin2021@gmail.com (W. Zhang). 1" 2312.15918v1,"Under review as a conference paper at ICLR 2024 S UPERVISED K NOWLEDGE M AKES L ARGE L ANGUAGE M ODELS B ETTER I N - CONTEXT L EARNERS Linyi Yang 1,2∗ , Shuibai Zhang 1∗ , Zhuohao Yu 3∗ , Guangsheng Bao 1 , Yidong Wang 3 , Jindong Wang 4 , Ruochen Xu 4 , Wei Ye 3 , Xing Xie 4 , Weizhu Chen 4 , Yue Zhang 1,2† 1 School of Engineering, Westlake University, 2 Westlake Institute for Advanced Study 3 Peking University, 4 Microsoft A BSTRACT Large Language Models (LLMs) exhibit emerging in-context learning abilities through prompt engineering. The recent progress in large-scale generative models has further expanded their use in real-world language applications. However, the critical challenge of improving the generalizability and factuality of LLMs in natural language understanding and question answering remains under-explored. While previous in-context learning research has focused on enhancing models to adhere to users’ specific instructions and quality expectations, and to avoid undesired outputs, little to no work has explored the use of task-Specific finetuned Language Models (SLMs) to improve LLMs’ in-context learning during the inference stage. Our primary contribution is the establishment of a simple yet effective framework that enhances the reliability of LLMs as it: 1) generalizes out-of-distribution data, 2) elucidates how LLMs benefit from discriminative models, and 3) minimizes hallucinations in generative tasks. Using our proposed plug-in method, enhanced versions of Llama 2 and ChatGPT surpass their original versions regarding generalizability and factuality. We offer a comprehensive suite of resources, including 16 curated datasets, prompts, model checkpoints, and LLM outputs across 9 distinct tasks. Our empirical analysis sheds light on the advantages of incorporating discriminative models into LLMs and highlights the potential of our methodology in fostering more reliable LLMs. 1 I NTRODUCTION Trained on extensive volumes of data with numerous parameters, large language models (LLMs) have garnered significant performance across diverse tasks. Their in-context learning (ICL) ability positions them as foundational models to adeptly address various downstream tasks, ranging from natural language understanding (Chowdhery et al., 2022; OpenAI, 2023a;b) to reasoning (Wei et al., 2022; O’Brien & Lewis, 2023), and planning (Shen et al., 2023). Despite their robust performance, LLMs come with their own set of challenges; they demand substantial resources for training and deployment, demonstrate slow inference times, and are susceptible to hallucination (Li et al., 2023a). Conversely, supervised task-specific language models (SLMs) 1 offer cost-efficiency in both training and inference, despite losing general multi-task capacities. Owing to their smaller scale and reduced training cost, SLMs can swiftly adapt to distinct tasks, learning task-specific knowledge (Devlin et al., 2018). As new and tailored tasks constantly emerge in real applications, they can pose out-of-distribution (OOD) challenges to LLMs. It has been shown even with ICL, LLMs generally underperform SLMs in such natural language understanding tasks, with an increased tendency for hallucination when completing classification tasks (Sun et al., 2023b). Most of the existing research predominantly segregates LLMs and SLMs as independent learning paradigms (Zhao et al., 2023), overlooking their potential interconnection. Given the distinct advan- ∗ † 1 Equal Contribution. Correspondence to: zhangyue@westlake.edu.cn SLMs refers to cost-efficient, task-specific, pre-trained discriminative language models in this work. 1" 2312.15933v1,"On the trace formulas and completeness property of root vectors systems for 2 × 2 Dirac type operators Anton A. Lunyov Facebook, Inc. 1 Hacker Way, Menlo Park, California, 94025 United States of America Mark M. Malamud Peoples Friendship University of Russia (RUDN University) 6 Miklukho-Maklaya St., Moscow, 117198 Russian Federation Abstract The paper is concerned with the completeness property of the system of root vectors of a boundary value problem for the following 2 × 2 Dirac type equation Ly = −iB −1 y ′ + Q(x)y = λy, B = diag(b 1 , b 2 ), b 1 < 0 < b 2 , y = col(y 1 , y 2 ), and x ∈ [0, 1], Q ∈ W 1 n [0, 1] ⊗ C 2×2 , subject to general non-regular two-point boundary conditions Cy(0) + Dy(1) = 0. If b 2 = −b 1 = 1 this equation is equivalent to the one dimensional Dirac equation. We establish asymptotic expansion of the characteristic determinant of this boundary value problem. This expansion directly yields new completeness result for the system of root vectors of such boundary value problem with non-regular and even degenerate boundary conditions. We also present several explicit completeness results in terms of the values Q (j) (0) and Q (j) (1). In the case of degenerate boundary conditions and analytic Q(·), the criterion of completeness property is established. Keywords: Systems of ordinary differential equations, Boundary value problem, Characteristic determinant Asymptotic expansion, Completeness property 2000 MSC: 47E05, 34L40, 34L10 Contents 1 Introduction 2 2 Preliminaries 6 3 Asymptotic expansion of solutions to the Dirac type system 9 4 Asymptotic expansion of the characteristic determinant 18 5 General completeness results for non-regular BVP 22 6 Properties of the functions σ j ± (x) 25 7 Explicit refined completeness results for non-regular BVP 28 References 37 Email addresses: A.A.Lunyov@gmail.com (Anton A. Lunyov), malamud3m@gmail.com (Mark M. Malamud)" 2312.15939v1,"Discovery of acousto-drag photovoltaic effect Jiaming Gu 1# , Yicheng Mou 1# , Jianwen Ma 1# , Haonan Chen 1# , Chuanxin Zhang 2 , Yuxiang Wang 1 , Jiayu Wang 1 , Hangwen Guo 1,3,4 , Wu Shi 1,3 , Xiang Yuan 5,6 , Xue Jiang 2 , Dean Ta 2 , Jian Shen 1,3,4,7 , Cheng Zhang 1,3* 1 State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing, Fudan University, Shanghai 200433, China 2 Center for Biomedical Engineering, School of Information Science and Technology, Fudan University, Shanghai 200433, China 3 Zhangjiang Fudan International Innovation Center, Fudan University, Shanghai 201210, China 4 Shanghai Qi Zhi Institute, Shanghai 200030, China 5 State Key Laboratory of Precision Spectroscopy, East China Normal University, Shanghai 200241, China 6 School of Physics and Electronic Science, East China Normal University, Shanghai 200241, China 7 Collaborative Innovation Center of Advanced Microstructures, Nanjing, China # These authors contributed equally to this work Correspondence and requests for materials should be addressed to C. Z. (E-mail: zhangcheng@fudan.edu.cn) * Abstract As a key ingredient in energy harvesting and photodetection, light-to-electricity conversion requires efficient separation of photoexcited electron-hole pairs before recombination. Traditional junction-based mechanisms mainly use build-in electric fields to achieve pair separation and generate photovoltaic effect, which fail to collect photoexcited pairs away from local barrier region. The ability to harvest photovoltaic effect in a homogeneous material upon uniform illumination is appealing, but has only been realized in very few cases such as non-centrosymmetric systems through bulk photovoltaic effect. Here we realize a new type of photovoltaic effect, termed as acousto-drag photovoltaic effect, by travelling surface acoustic waves (t-SAW) in a conventional layered semiconductor MoSe 2 . Instead of immediately driving the electron-hole pairs to opposite directions after generation, t-SAW induces periodic modulation to electronic bands and drags the photoexcited pairs toward the same travelling direction. The photocurrent can then be extracted by a local barrier, e.g. the metal-semiconductor contact as we used here. By spatially separating the electron-hole generation and extraction processes, the acousto-drag mechanism strongly suppresses charge recombination and yields large nonlocal photoresponse outside the barrier region. We show that when t-SAW is applied, the photoresponse can be enhanced by over two orders of magnitude with exceptionally high external quantum efficiency above 60%. The discovery of acousto-drag photovoltaic effect establishes a new approach towards efficient light-to-electricity conversion without the restriction of crystal symmetry. 1 / 16" 2312.15955v1,"Enhancing Redundancy-based Automated Program Repair by Fine-grained Pattern Mining Jiajun Jiang Zijie Zhao Zhirui Ye College of Intelligence and Computing, Tianjin University Tianjin, China jiangjiajun@tju.edu.cn College of Intelligence and Computing, Tianjin University Tianjin, China veweew@tju.edu.cn College of Intelligence and Computing, Tianjin University Tianjin, China yzrleave@tju.edu.cn Bo Wang Hongyu Zhang Junjie Chen Beijing Jiaotong University Beijing, China wangbo_cs@bjtu.edu.cn Chongqing University Chongqing, China hyzhang@cqu.edu.cn College of Intelligence and Computing, Tianjin University Tianjin, China junjiechen@tju.edu.cn ABSTRACT Redundancy-based automated program repair (APR), which generates patches by referencing existing source code, has gained much attention since they are effective in repairing real-world bugs with good interpretability. However, since existing approaches either demand the existence of multi-line similar code or randomly reference existing code, they can only repair a small number of bugs with many incorrect patches, hindering their wide application in practice. In this work, we aim to improve the effectiveness of redundancybased APR by exploring more effective source code reuse methods for improving the number of correct patches and reducing incorrect patches. Specifically, we have proposed a new repair technique named Repatt, which incorporates a two-level pattern mining process for guiding effective patch generation (i.e., token and expression levels). We have conducted an extensive experiment on the widely-used Defects4J benchmark and compared Repatt with eight state-of-the-art APR approaches. The results show that our approach complements existing approaches by repairing 15 unique bugs compared with the latest deep learning-based methods and 19 unique bugs compared with traditional repair methods when providing the perfect fault localization. In addition, when the perfect fault localization is unknown in real practice, Repatt significantly outperforms the baseline approaches by achieving much higher patch precision, i.e., 83.8%. Moreover, we further proposed an effective patch ranking strategy for combining the strength of Repatt and the baseline methods. The result shows that it repairs 124 bugs when only considering the Top-1 patches and improves the bestperforming repair method by repairing 39 more bugs. The results demonstrate the effectiveness of our approach for practical use. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference 2023, December 2023, © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Jiajun Jiang, Zijie Zhao, Zhirui Ye, Bo Wang, Hongyu Zhang, and Junjie Chen. 2018. Enhancing Redundancy-based Automated Program Repair by Fine-grained Pattern Mining. In Proceedings of (Conference 2023). ACM, New York, NY, USA, 12 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Automated program repair (APR) techniques have the potential to significantly reduce the debugging overhead of human developers and thus have been widely studied in the last decades. To date, a large number of APR approaches have been proposed and developed [3, 17, 30, 33, 39, 49, 53, 54, 58, 61, 62]. A typical APR approach takes a faulty program and a set of test cases, where at least one triggers the bug in the program, as inputs, and produces one or more (if possible) plausible patches that can make all the test cases pass. The repair process can be typically viewed as a search problem, where the search space is all possible programs. Therefore, the core challenge for APR techniques is how to effectively and efficiently locate the desired patches within limited computing resources and time budget. To facilitate this process, existing techniques have employed multiple data sources, e.g., similar code [17, 58], historical patches [25, 26], repair templates [24, 30, 46], etc., and leveraged diverse search algorithms, e.g., random search [41], genetic programming [27, 53], and advanced deep learning [18, 20, 65, 68], aiming to effectively refine the search space and thus improve the repair ability and efficiency. Among existing APR techniques, redundancy-based [8, 10, 55, 63] techniques have attracted much attention and have gained big success. These techniques are on the basis of the plastic surgery hypothesis that “changes to a codebase contain snippets that already exist in the codebase at the time of the change, and these snippets can be efficiently found and exploited [4]”. Therefore, redundancy-based APR approaches generate patches by searching and referencing existing code. For example, GenProg [27, 53], the pioneer of modern APR techniques, generates patches by directly reusing existing code under the guidance of genetic programming algorithms. Although the recent advance of large-scale pre-trained models has shown the promise to repair more bugs [18, 65, 68], they still suffer from the interpretability issue due to the complexity and the" 2312.15964v1,"Semantic Guidance Tuning for Text-To-Image Diffusion Models Hyun Kang Yonsei University Dohae Lee Yonsei University Myungjin Shin Yonsei University kdkh1125@yonsei.ac.kr dlehgo1414@yonsei.ac.kr mjsh25@yonsei.ac.kr In-Kwon Lee Yonsei University iklee@yonsei.ac.kr Figure 1. ConceptDiffusion improves the text-to-image alignment by modulating the guidance of diffusion models towards any concept from which the model diverges. Our method follows text prompt faithfully compared to Stable Diffusion [35], which tends to neglect certain subject or incorrectly binds attributes. All images are generated using the same random seeds. Abstract from one or more of these concepts. Based on this observation, we devise a technique to steer the guidance direction towards any concept from which the model diverges. Extensive experimentation validates that our method improves the semantic alignment of images generated by diffusion models in response to prompts. Recent advancements in Text-to-Image (T2I) diffusion models have demonstrated impressive success in generating high-quality images with zero-shot generalization capabilities. Yet, current models struggle to closely adhere to prompt semantics, often misrepresenting or overlooking specific attributes. To address this, we propose a simple, training-free approach that modulates the guidance direction of diffusion models during inference. We first decompose the prompt semantics into a set of concepts, and monitor the guidance trajectory in relation to each concept. Our key observation is that deviations in model’s adherence to prompt semantics are highly correlated with divergence of the guidance 1. Introduction Text-to-Image (T2I) diffusion models [2, 8, 33–36] have taken significant strides recently in producing high-quality images from free-form text prompts with increasing diversity and visual fidelity. However, text-to-image synthesis 1" 2312.15965v1,"Optimistic and Pessimistic Actor in RL:Decoupling Exploration and Utilization Jingpu Yang 1 , Qirui Zhao 1 , Helin Wang 1 , Yuxiao Huang 1 , Zirui Song 2 , Miao Fang 1,3 * 1 Northeastern University, Shenyang, China 2 University of Technology Sydney, Sydney, Australia 3 Olimei Company, Guangzhou, China Abstract—Deep neural network(DNN) generalization is limited by the over-reliance of current offline reinforcement learning techniques on conservative processing of existing datasets. This method frequently results in algorithms that settle for suboptimal solutions that only adjust to a certain dataset. Similarly, in online reinforcement learning, the previously imposed punitive pessimism also deprives the model of its exploratory potential. Our research proposes a novel framework, Optimistic and Pessimistic Actor Reinforcement Learning (OPARL). OPARL employs a unique dual-actor approach: an optimistic actor dedicated to exploration and a pessimistic actor focused on utilization, thereby effectively differentiating between exploration and utilization strategies. This unique combination in reinforcement learning methods fosters a more balanced and efficient approach. It enables the optimization of policies that focus on actions yielding high rewards through pessimistic utilization strategies, while also ensuring extensive state coverage via optimistic exploration. Experiments and theoretical study demonstrates OPARL improves agents’ capacities for application and exploration. In the most tasks of DMControl benchmark and Mujoco environment, OPARL performed better than state-of-the-art methods. Our code has released on https://github.com/yydsok/OPARL Index Terms—Decoupling, DMControl Benchmark, Dual Actor Method, Mujoco Environment, Ensemble Q I. I NTRODUCTION In recent years, Reinforcement Learning (RL) has begun to show significant empirical success [1]–[6], and DNNs have played an important role in experiments through value function approximation. Deep RL has achieved considerable success in various fields such as robotics [7], recommendation systems [8], and strategy games [9].However, there are some problems in the generalization of DNN in RL.Previous approaches introduced conservative ideas to alleviate these problems,such as Behavior cloning [10].And Offline RL aims to overcome this problem by using only existing data to learn strategies without further interaction with the environment. It aims to figure out the optimal strategy from existing static datasets, but if the coverage of the datasets is insufficient,the conservative constraints make further exploration difficult,ordinary RL algorithms are severely affected by extrapolation errors and overestimate the Q value of out-of-distribution (OOD) state action pairs [11]. Ensure that the system surrounding learners does not receive honest evaluations of this value. Consequently, many methods for addressing OOD situations involve imposing behavioral constraints on existing algorithms, * Corresponding author (fangmiao@neuq.edu.cn) Fig. 1: Performance comparison guiding the learning process towards a more conservative approach [10], or to penalize the Q value of OOD stateaction pairs to force the Q value to be more pessimistic [12]. Online reinforcement learning often focuses on the challenge of exploring and deciding what kind of data to collect. In areas with high data collection costs, such as robotics [13], healthcare [14], and operational research [15], the ability to reuse data from previous tasks is particularly important for RL. However, previous online learning works [6], [16]have not fully utilized the generalization ability of DNNs, frequently resulting in suboptimal solutions that are overly reliant on the specific characteristics of the training dataset. losing the exploration ability of the model. resulting in weak generalization ability of the model. This tendency has led to a diminution in the model’s exploratory ability, consequently weakening its overall generalization performance,We visualize it in 2. Therefore, previous works take care of a general form of the optimism-under-uncertainty principle, which means overestimation of expected rewards could trigger exploration of states and actions that would not be explored. To trigger exploration of states and actions that would not otherwise have been explored by appealing to the general form of the" 2312.15977v1,"Perspective on nanoscale magnetic sensors using giant anomalous Hall effect in topological magnetic materials for read head application in magnetic recording Tomoya Nakatani, * Prabhanjan D. Kulkarni, ** Hirofumi Suto, Keisuke Masuda, Hitoshi Iwasaki, and Yuya Sakuraba Research Center for Magnetic and Spintronic Materials, National Institute for Materials Science, 1-2-1 Sengen, Tsukuba, Ibaraki, 305-0047, Japan * Corresponding author. Email: nakatani.tomoya@nims.go.jp ** Present address: SEMITEC Corporation, Chiba, Japan Abstract Recent advances in the study of materials with topological electronic band structures have revealed magnetic materials exhibiting giant anomalous Hall effects (AHE). The giant AHE has not only attracted the research interest in its mechanism but also opened up the possibility of practical application in magnetic sensors. In this article, we describe simulation-based investigations of AHE magnetic sensors for the applications to read head sensors (readers) of hard disk drives. With the shrinking of magnetic recording patterns, the reader technology, which currently uses multilayer-based tunnel magnetoresistance (TMR) devices, is associated with fundamental challenges, such as insufficient spatial resolution and signal-to-noise ratio (SNR) in sensors with dimensions below 20 nm. The structure of an AHE-based device 1" 2312.15994v1,"Practical Bias Mitigation through Proxy Sensitive Attribute Label Generation Bhushan Chaudhari, Anubha Pandey, Deepak Bhatt, Darshika Tiwari AI Garage, Mastercard Gurgaon, India bhushan.chaudhari@mastercard.com, anubha.pandey@mastercard.com, deepak.bhatt@mastercard.com, darshika.tiwari@mastercard.com Abstract Addressing bias in the trained machine learning system often requires access to sensitive attributes. In practice, these attributes are not available either due to legal and policy regulations or data unavailability for a given demographic. Existing bias mitigation algorithms are limited in their applicability to real-world scenarios as they require access to sensitive attributes to achieve fairness. In this research work, we aim to address this bottleneck through our proposed unsupervised proxy-sensitive attribute label generation technique. Towards this end, we propose a two-stage approach of unsupervised embedding generation followed by clustering to obtain proxy-sensitive labels. The efficacy of our work relies on the assumption that bias propagates through non-sensitive attributes that are correlated to the sensitive attributes and, when mapped to the high dimensional latent space, produces clusters of different demographic groups that exist in the data. Experimental results demonstrate that bias mitigation using existing algorithms such as Fair Mixup and Adversarial Debiasing yields comparable results on derived proxy labels when compared against using true sensitive attributes. Introduction Machine Learning has attained high success rates in practically every field, including healthcare, finance, and education, based on the accuracy and efficiency of the model’s outcome (Dastile, Çelik, and Potsane 2020; Bakator and Radosav 2018). However, these models are biased and exhibit a propensity to favor one demographic group over another in various applications, including credit and loan approval, criminal justice, and resume-based candidate shortlisting (Mehrabi et al. 2021; Gianfrancesco et al. 2018; Yapo and Weiss 2018). The idea of fairness has received a lot of attention recently to combat the discrimination from the outcome of ML models (Dwork et al. 2012; Beutel et al. 2017; Hardt, Price, and Srebro 2016). The existing bias mitigation techniques (Feldman et al. 2015; Sattigeri et al. 2019; Zafar et al. 2017) can be classified into three categories: pre-processing (Feldman et al. 2015; Kamiran and Calders 2011), post-processing (Hardt, Price, and Srebro 2016; Pleiss et al. 2017) and in-processing (Zafar et al. 2017; Dwork et al. 2012). While pre-processing Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. bias mitigation techniques attempt to transform the input before feeding it to the model for training, post-processing strategies filter out the output through certain transformations. In order to produce fair output, in-processing strategies strive to learn bias-invariant models by imposing certain constraints during training. Nevertheless, most stateof-the-art algorithms require information about sensitive attributes to produce an unbiased model. However, in practice, these sensitive attributes are inaccessible due to difficulties in data collection, privacy, and legal constraints imposed by the government, like General Data Protection Regulation(GDPR) introduced by the European Union in May 2018 and Equal Credit Opportunity Act (Grari, Lamprier, and Detyniecki 2022; Lahoti et al. 2020). Fairness is challenging to achieve in the absence of sensitive attributes due to a lack of supervision. While sensitive attributes are inaccessible in the real-world setting, it has been found that some non-sensitive attributes have strong correlations with the sensitive features, which leads to bias propagating through AI models(Angwin et al. 2016; Coston et al. 2019). For instance, Hispanic and black populations have a higher proportion of younger people, resulting in the correlation between age and race (Vogel and Porter 2016). Similarly, zip codes can be correlated with race. Hence, the bias gets embedded in the non-sensitive attributes that are used in the model training. Based on this hypothesis, a few initial efforts have been made to mitigate bias in the absence of protected attributes (Grari, Lamprier, and Detyniecki 2022; Lahoti et al. 2020; Yan, Kao, and Ferrara 2020; Zhao et al. 2022). The most recent approach (Zhao et al. 2022) identifies related features that are correlated with the sensitive attributes and would further minimize the correlation between the related features and the model’s prediction to learn a fair classifier with respect to the sensitive attribute. However, identification of related features require domain knowledge and access to sensitive attributes to determine the correlation. This research aims to provide proxy labels for sensitive attributes to make the present bias mitigation approaches suitable for real-world applications where access to protected attributes during model training is constrained. Ideally the likelihood of a positive outcome should be the same regardless of person’s protected group. However in real life this does not hold true. The group which has more likelihood of" 2312.16005v1,"A Graph-Theoretic Approach to Ring Analysis: Dominant Metric Dimensions in Zero-Divisor Graphs Nasir Ali a , Hafiz Muhammad Afzal Siddiqui a, Muhammad Imran Qureshi b a Department of Mathematics, COMSATS University Islamabad, Lahore Campus, Pakistan. b Department of Mathematics, COMSATS University Islamabad, Vehari Campus, Pakistan. Email address: Corresponding Author : nasirzawar@gmail.com (Nasir Ali), hmasiddiqui@gmail.com (Hafiz Muhammad Afzal Siddiqui), imranqureshi18@gmail.com (Muhammad Imran Qureshi), ORCID ID: https://orcid.org/0000-0003-4116-9673 (Nasir Ali), Abstract: This article investigates the concept of dominant metric dimensions in zero divisor graphs (ZD-graphs) associated with rings. Consider a finite commutative ring with unity, denoted as 𝑅, where nonzero elements 𝑥 and 𝑦 are identified as zero divisors if their product results in zero (𝑥 . 𝑦 = 0). The set of zero divisors in ring 𝑅 is referred to as 𝐿(𝑅). To analyze various algebraic properties of 𝑅, a graph known as the zero-divisor graph is constructed using 𝐿(𝑅). This manuscript establishes specific general bounds for the dominant metric dimension (Ddim) concerning the ZD-graph of 𝑅. To achieve this objective, we examine the zero divisor graphs for specific rings, such as the ring of Gaussian integers modulo 𝑚, denoted as 𝑍 𝑚 [𝑖], the ring of integers modulo 𝑛, denoted as ℤ 𝑛 , and some quotient polynomial rings. Additionally, we present a general result outlining bounds for the dominant metric dimension expressed in terms of the maximum degree, girth, clique number, and diameter of the associated ZD-graphs. Finally, we provide insights into commutative rings that share identical metric dimensions and dominant metric dimensions. This exploration contributes to a deeper understanding of the structural characteristics of ZD-graphs and their implications for the algebraic properties of commutative rings. Keywords: algebraic structures, zero divisor graphs, multiset dimensions, metric dimension Mathematics Subject Classification: 05Cxx, 13A70, 05C12 1. Introduction Beck [1] proposed the connection between graph theory and algebra by introducing a ZD-graph of a commutative ring 𝑅 . His focus was on node coloring in a graph, specifically exploring how ring elements correspond to these nodes. It's worth noting that in this context, a zero" 2312.16012v1,"Detection-based Intermediate Supervision for Visual Question Answering Yuhang Liu * 1,2,4 , Daowan Peng * 1,2 , Wei Wei †1,2 , Yuanyuan Fu 2,3 , Wenfeng Xie 2,3 , Dangyang Chen 2,3 1 CCIIP Lab, School of Computer Science and Technology, Huazhong University of Science and Technology 2 Joint Laboratory of HUST and Pingan Property & Casualty Research (HPL) 3 Ping An Property & Casualty Insurance Company of China, Ltd. 4 ByteDance Inc. liuyuhang.ysy@bytedance.com, {pengdw, weiw}@hust.edu.cn, fuyuanyuan83@gmail.com, {xiewenfeng801, chendangyang273}@pingan.com.cn Abstract Recently, neural module networks (NMNs) have yielded ongoing success in answering compositional visual questions, especially those involving multi-hop visual and logical reasoning. NMNs decompose the complex question into several sub-tasks using instance-modules from the reasoning paths of that question and then exploit intermediate supervisions to guide answer prediction, thereby improving inference interpretability. However, their performance may be hindered due to sketchy modeling of intermediate supervisions. For instance, (1) a prior assumption that each instance-module refers to only one grounded object yet overlooks other potentially associated grounded objects, impeding full cross-modal alignment learning; (2) IoU-based intermediate supervisions may introduce noise signals as the bounding box overlap issue might guide the model’s focus towards irrelevant objects. To address these issues, a novel method, Detection-based Intermediate Supervision (DIS), is proposed, which adopts a generative detection framework to facilitate multiple grounding supervisions via sequence generation. As such, DIS offers more comprehensive and accurate intermediate supervisions, thereby boosting answer prediction performance. Furthermore, by considering intermediate results, DIS enhances the consistency in answering compositional questions and their sub-questions. Extensive experiments demonstrate the superiority of our proposed DIS, showcasing both improved accuracy and state-of-the-art reasoning consistency compared to prior approaches. Introduction Compositional visual question answering (VQA) (Hudson and Manning 2019b; Chen et al. 2021; Jing et al. 2022b) has been an emerging research topic in multimodal domain, and received increasing attention from both computer vision and the language processing communities. Specifically, given input images and questions, it is required to generate answers for the questions according the content of images. Generally, compositional questions involve multiple visual entities or concepts (i.e., objects, attributes, and relations), and the models demand a rich set of abilities (semantic understanding, object detections, visual/logical reasoning) to get * These authors contributed equally. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. the right answer. One of the challenges in compositional visual question answering lies in modeling the reasoning process. From this perspective, VQA models can be divided into two categories, i.e., holistic and modular. Holistic models (Hu et al. 2019; Yu et al. 2019; Yang et al. 2020) generate answers for all types of questions through a unified multimodal fusion model, and the reasoning process is implicitly performed during the encoding and fusion stages. Despite the effectiveness, holistic models cannot reflect the intermediate reasoning process. On the contrary, modular model, i.e., neural module network (NMN) (Andreas et al. 2016; Hu et al. 2018; Hudson and Manning 2018; Chen et al. 2021), has been a mainstream approach due to its explicit reasoning procedure and interpretable characteristics. Specifically, NMN parses questions into predefined reasoning modules and composes these modules into an executive program, thus deconstructing complex questions into several easy-tosolve problems. During the process of multi-hop visual/logical reasoning and answering generation, the intermediate status and results can be explicitly reflected from each module. Moreover, in order to restrict the reasoning process of NMN models, extra intermediate supervisions (Chen et al. 2021; Zhao et al. 2021) are proposed to improve the answer prediction performance, which restricts models to focus on pivotal objects via Intersection over Union (IoU) constraint between predicted bounding boxes and ground truth ones. Despite the significant improvement in the accuracy metric, there are several shortcomings in the IoU-based intermediate supervisions of previous methods. For example, MMN (Chen et al. 2021) directly exploits the ground-truth scene graph paths corresponding to questions for intermediate result generation, which ignores other potentially correct intermediate objects and hinders the model to fully learn cross-modal alignment and reasoning process. As Figure 1 (a) shows, MMN adopts the leftmost pillow to supervise the first step result (i.e., Select(pillow)), while our proposed DIS method takes into account all possible correct results. Such comprehensive supervisions alleviate the missing-inthe-middle problem, thus facilitating the model to generate correct answers. Besides, previous IoU-based intermediate supervisions are possible to introduce noise signals due to the bounding-box overlap problem, which induces the model to focus on irrelevant objects. This is exemplified in Figure 1 (b). In the first reasoning step, the model is required to focus" 2312.16015v1,"A Comprehensive Survey of Evaluation Techniques for Recommendation Systems Aryan Jadon 1[0000−0002−2991−9913] and Avinash Patil 2 Juniper Networks, Sunnyvale CA, USA {aryanj,patila}@juniper.net Abstract. The effectiveness of recommendation systems is pivotal to user engagement and satisfaction in online platforms. As these recommendation systems increasingly influence user choices, their evaluation transcends mere technical performance and becomes central to business success. This paper addresses the multifaceted nature of recommendation system evaluation by introducing a comprehensive suite of metrics, each tailored to capture a distinct aspect of system performance. We discuss similarity metrics that quantify the precision of content-based and collaborative filtering mechanisms, along with candidate generation metrics which measure how well the system identifies a broad yet pertinent range of items. Following this, we delve into predictive metrics that assess the accuracy of forecasted preferences, ranking metrics that evaluate the order in which recommendations are presented, and business metrics that align system performance with economic objectives. Our approach emphasizes the contextual application of these metrics and their interdependencies. In this paper, we identify the strengths and limitations of current evaluation practices and highlight the nuanced trade-offs that emerge when optimizing recommendation systems across different metrics. The paper concludes by proposing a framework for selecting and interpreting these metrics to not only improve system performance but also to advance business goals. This work is to aid researchers and practitioners in critically assessing recommendation systems and fosters the development of more nuanced, effective, and economically viable personalization strategies. Our code is available at GitHub. Keywords: Business Metrics, Candidate Generation Metrics, Recommendation Systems, Predictive Metrics, Ranking Metrics, 1 Introduction Recommendation systems have become an integral component of the digital landscape, influencing the way we discover products, content, and even social connections. From e-commerce to online streaming, these systems underpin user experience by personalizing content and suggesting items that align with individual preferences. The proliferation of such systems has catalyzed a need for robust" 2312.16036v1,"Ensemble Learning to Assess Dynamics of Affective Experience Ratings and Physiological Change Felix Dollack 1 , Kiyoshi Kiyokawa 1 , Huakun Liu 1 , Monica Perusquia-Hernandez 1 , Chirag Raman 2 , Hideaki Uchiyama 1 , Xin Wei 1 1 Nara Institute of Science and Technology 2 Delft University of Technology {felix.d, kiyo, liu.huakun.li0, m.perusquia, hideaki.uchiyama, wei.xin.wy0}@is.naist.jp, c.a.raman@tudelft.nl Abstract—The congruence between affective experiences and physiological changes has been a debated topic for centuries. Recent technological advances in measurement and data analysis provide hope to solve this epic challenge. Open science and open data practices, together with data analysis challenges open to the academic community, are also promising tools for solving this problem. In this entry to the Emotion Physiology and Experience Collaboration (EPiC) challenge, we propose a data analysis solution that combines theoretical assumptions with data-driven methodologies. We used feature engineering and ensemble selection. Each predictor was trained on subsets of the training data that would maximize the information available for training. Late fusion was used with an averaging step. We chose to average considering a “wisdom of crowds” strategy. This strategy yielded an overall RMSE of 1.19 in the test set. Future work should carefully explore if our assumptions are correct and the potential of weighted fusion. Index Terms—affective computing, continuous ratings, biosignal processing, machine learning, data analysis challenge I. I NTRODUCTION Understanding human emotion is instrumental for applications in mental healthcare, education, and communication [6]. These applications aim to automatically assess and generate affective cues by relying on an assumed relationship between affective experience and physiological changes. However, the debate on the precedence of body changes or subjective experience started in the previous century and remains current [7]. Recent research has discussed whether demand characteristics affect bias in our understanding of the relationship between facial expression and affective experience [9, 2]; and explored the relationship between dynamic Autonomic Nervous System responses and affective experiences [12, 22]. Physiological sensing technologies have been popular in studying the physiological changes correlating with affective experiences [5, 13]. Each physiological measurement type gives a different piece of information regarding the functioning of the sympathetic and parasympathetic nervous systems [1], leading to a popular multidimensional dataset collection. Traditional data analysis techniques require extensive knowledge about physiology characteristics, signal processing, and domain knowledge in affective sciences. This domain knowledge gave birth to hand-crafted feature engineering that improves data interpretability and reduces the number of comparisons All authors contributed equally to this work. to be made when analyzing the data. Recent advances in Machine Learning (ML) and data-driven analyses have brought a new perspective. Purely data-driven analyses with end-to-end automated processing have become popular [16]. In end-to-end approaches, a machine learning network learns an intermediate representation of the input, thereby reducing manual work, and potentially enhancing the results [15]. However, the evidence does not always support this claim. A previous study showed that convolutional and recurrent neural networks yielded better results than other state-of-the-art methods [15]. Another study used a deep-learning approach to estimate momentary emotional states from multi-modal physiological data; and reported a higher correlation than traditional methods. Still, their mean absolute error (MAE) was higher (a lower MAE is better) [14]. Finally, another study found that end-to-end processes are suitable for predicting stress states with abrupt changes, but not as good when assessing subtle affective states like enjoyment [10]. Hence, end-to-end learning only provides a marginal improvement over feature engineering for physiological signal-based affect recognition. This is different from camera-based recognition, where performance is radically improved. One possible explanation is the limited amount of physiological data publicly available. Therefore, public data sets and multi-laboratory collaborations are necessary to assess the effectiveness of different training methods and cross-validation strategies. The EPiC challenge aims to overcome the limitations in data availability and motivates researchers to work on the affect-embodiment coherence problem. Our team used theorydriven analysis and data engineering techniques to address the EPiC challenge. We opted for feature engineering and ensemble learning for our final submission. Also, we report an exploratory analysis validating our assumptions for the challenge submission. II. R ELATED W ORK ML has been used to model emotion recognition mechanisms from data following the public release of benchmark databases. The basic procedure of classical ML-based methods consists of four steps: physiological signal collection while eliciting participants’ emotions, feature extraction from the signals, training a classification model with the features, and emotion recognition based on the trained model [16]. Research" 2312.16043v1,"PREPRINT , VOL. X, NO. X, DECEMBER 27, 2023 1 An extended asymmetric sigmoid with Perceptron(SIGTRON) for imbalanced linear classification Hyenkyun Woo Abstract This article presents a new polynomial parameterized sigmoid called SIGTRON, which is an extended asymmetric sigmoid with Perceptron, and its companion convex model called SIGTRON-imbalanced classification (SIC) model that employs a virtual SIGTRON-induced convex loss function. In contrast to the conventional π-weighted costsensitive learning model, the SIC model does not have an external π-weight on the loss function but has internal parameters in the virtual SIGTRON-induced loss function. As a consequence, when the given training dataset is close to the well-balanced condition, we show that the proposed SIC model is more adaptive to variations of the dataset, such as the inconsistency of the scale-class-imbalance ratio between the training and test datasets. This adaptation is achieved by creating a skewed hyperplane equation. Additionally, we present a quasi-Newton optimization(L- BFGS) framework for the virtual convex loss by developing an interval-based bisection line search. Empirically, we have observed that the proposed approach outperforms π-weighted convex focal loss and balanced classifier LIBLINEAR(logistic regression, SVM, and L2SVM) in terms of test classification accuracy with 51 two-class and 67 multi-class datasets. In binary classification problems, where the scale-class-imbalance ratio of the training dataset is not significant but the inconsistency exists, a group of SIC models with the best test accuracy for each dataset (TOP1) outperforms LIBSVM(C-SVC with RBF kernel), a well-known kernel-based classifier. Index Terms Extended exponential function, extended asymmetric sigmoid function, SIGTRON, Perceptron, logistic regression, large margin classification, imbalanced classification, class-imbalance ratio, scale-class-imbalance ratio, line search, Armijo condition, Wolfe condition, quasi-Newton, L-BFGS I. I NTRODUCTION Learning a hyperplane from the given training dataset D = {(x l , y l ) ∈ R s × {−1, +1} | l = 1, 2, · · · , d} is the most fundamental process while we characterize the inherent clustered structure of the test dataset. The main hindrance of the process is that the dataset is imbalanced [1], [2], [3] and inconsistent [4]. An example of an imbalanced dataset is when the number of positive instances in dataset D , denoted by | N + | , is not equal to the number of negative instances in dataset D , denoted by | N − | . Here, N + = { l | y l = +1 } and N − = D \ N + . To address the class-imbalance issues, one can apply under-sampling or over-sampling techniques while preserving the cluster structure of dataset D [5]. In addition to the class imbalance problem, there is another imbalance problem, known as scale imbalance between the positive class of D , {x i | i ∈ N + } and the negative class of D , {x j | j ∈ N − } [3]. Considering scale and class imbalance simultaneously, we generalize the class-imbalance ratio N + | to the scale-class-imbalance ratio r c = | | N − | s ∥x cp ∥ 2 + 1 r sc = r c , (1) ∥x cn ∥ 2 + 1 P P where x cp = | N 1 + | i∈N + x i is the centroid of the positive class of D and x cn = | N 1 − | j∈N − x j is the centroid of the negative class of D . When r sc = 1 and ∥x cp − x cn ∥ > a where a is a positive constant, we say that D is well-balanced with respect to r sc . See [3], [5] for more details on imbalancedness appearing in classification. It is worth noting that we can improve the scale imbalance through various normalization methods [6], [7]. In our experiments, we use the well-organized datasets in [8]. They are normalized in each feature dimension with H. Woo is with Logitron X, Daejeon 34890, Republic of Korea, e-mail:hyenkyun@gmail.com." 2312.16062v1,"AutoTask: Executing Arbitrary Voice Commands by Exploring and Learning from Mobile GUI LIHANG PAN ∗ and BOWEN WANG ∗ , Department of Computer Science and Technology, Tsinghua University, China CHUN YU † , Department of Computer Science and Technology, Tsinghua University, China YUXUAN CHEN, Department of Computer Science and Technology, Tsinghua University, China XIANGYU ZHANG, Department of Computer Science and Technology, Tsinghua University, China YUANCHUN SHI, Department of Computer Science and Technology, Tsinghua University, China Fig. 1. To execute the command ""import contacts from contacts.vcf"" in the Contacts application (version 4.8.17), AutoTask first clicks the ""Add"" button, transitioning from Page 1 to Page 2. AutoTask finds that it can only manually add a contact on Page 2; hence, it reverts to Page 1 and clicks another button labeled ""Fix & Manager"". It then completes the import process through subsequent steps (4 & 5). After finishing the task, AutoTask synthesizes knowledge from its experiences, improving its ability for future commands. Voice command interfaces (VCIs) have gained increasing importance, enabling hands-free and eyes-free interaction with digital devices. However, the inherent complexity in constructing effective voice interfaces has limited the VCIs’ functionalities to only a small fraction of GUI applications and tasks. This paper presents AutoTask, a VCI capable of automating any task in any mobile application without configuration or modification from developers or end users. The primary challenge for AutoTask is the lack of knowledge, as it needs to accomplish unknown tasks (e.g., user commands) within an unknown environment (e.g., GUI). To address this challenge, AutoTask employs two strategies: (1) trial and error: AutoTask explores the GUI, attempts potential operation sequences, and recovers from errors through backtracking; (2) learning from the environment: AutoTask accumulates experiences during exploration and summarizes correct knowledge from these experiences. We implemented AutoTask on Android devices and conducted an evaluation study, which proved the feasibility of AutoTask. CCS Concepts: • Human-centered computing → Natural language interfaces; User interface programming. ∗ Equal contribution † Corresponding author. 1" 2312.16078v1,"Targeted materials discovery using Bayesian algorithm execution Sathya R. Chitturi, 1, 2, a) Akash Ramdas, 1, 2 Yue Wu, 1 Brian Rohr, 1 Stefano Ermon, 3 Jennifer Dionne, 2 Felipe H. da Jornada, 1, 2 Mike Dunne, 1 Christopher Tassone, 1, b) Willie Neiswanger, 4, 3, b) and Daniel Ratner 1, b) 1) SLAC National Accelerator Laboratory, Menlo Park, CA 94025 Department of Materials Science and Engineering, Stanford University, Stanford, CA 94305 3) Computer Science Department, Stanford University, Stanford, CA 94305 4) Department of Computer Science, University of Southern California, Los Angeles, CA 90089 2) Abstract. Rapid discovery and synthesis of new materials requires intelligent data acquisition strategies to navigate large design spaces. A popular strategy is Bayesian optimization, which aims to find candidates that maximize material properties; however, materials design often requires finding specific subsets of the design space which meet more complex or specialized goals. We present a framework that captures experimental goals through straightforward user-defined filtering algorithms. These algorithms are automatically translated into one of three intelligent, parameter-free, sequential data acquisition strategies (SwitchBAX, InfoBAX, and MeanBAX). Our framework is tailored for typical discrete search spaces involving multiple measured physical properties and short time-horizon decision making. We evaluate this approach on datasets for TiO 2 nanoparticle synthesis and magnetic materials characterization, and show that our methods are significantly more efficient than state-of-the-art approaches. Keywords: Autonomous Experimentation, Design of Experiments, Machine Learning, Materials Science, Materials Discovery, Bayesian Optimization INTRODUCTION Modern materials discovery involves searching large regions of multi-dimensional processing or synthesis conditions to find candidate materials that achieve specific desired properties. For example, the lithium-ion batteries that have enabled both the personal electronics and clean mobility revolutions started out using simple LiCoO 2 as the cathode active material, but this has given way to numerous formulations of the form Li(Ni 1/3+x Co 1/3-2x Mn 1/3+x )O 2 where each metal contributes to various aspects of stability and electrochemistry [1]. Another example is in the development of high temperature superconducting materials where the trade-off between different quantum phenomena (e.g., charge density waves and the superconducting state) needs to be addressed via iterative synthesis and characterization of tailored materials [2]. Often, the rate of discovery is naturally limited by the speed at which experiments can be performed; this is particularly true for materials applications involving low levels of automation, complex multi-step synthesis protocols, and slow/expensive characterization modalities. For these important situations, developing algorithms which can quickly identify desirable conditions under limited experimental budgets is critical to furthering materials discovery [3, 4]. a) Email: chitturi@stanford.edu b) These authors co-supervised the work" 2312.16096v1,"The nature of low-temperature spin-freezing in frustrated Kitaev magnets U. Jena 1 and P. Khuntia 1, 2, ∗ 1 Department of Physics, Indian Institute of Technology Madras, Chennai, 600036, India 2 Quantum Centre of Excellence for Diamond and Emergent Materials, Indian Institute of Technology Madras, Chennai, 600036, India (Dated: December 27, 2023) The subtle interplay between competing degrees of freedom, anisotropy and spin correlations in frustrated Kitaev quantum materials offers an ideal platform to host myriads of non-trivial quantum states with exotic fractional excitations. The signature of spin freezing behavior of these spin-orbit driven frustrated magnets is characterized by a bifurcation of zero-field-cooled and field-cooled magnetic susceptibility at low temperature much below the characteristic interaction energy scale. The magnetic specific heat exhibits a T 2 dependence below the freezing temperature. The fieldindependent behavior of magnetic specific heat below the freezing temperature implies the presence of exotic low-energy excitations. The aging and memory effect experiments in the Kitaev magnets suggest the non-hierarchical free energy distribution, which differs from the hierarchical organization of conventional spin-freezing. Furthermore, nuclear magnetic resonance spin-lattice relaxation rate follows a power law behavior below the spin-freezing temperature suggesting the persistence of unconventional spin excitation spectra. Herein, we demonstrate that the observed low-temperature spin-freezing phenomena in a few representative Kitaev quantum materials can be effectively explained by the Halperin and Saslow (HS) hydrodynamic modes relevant for non-trivial spin glass materials. The linearly dispersive HS modes are hypothesized to account for instigating non-abelian defect propagation, thereby inducing a spin jam state in the low-temperature regime in frustrated Kitaev magnets. Our investigation reveals that HS modes capture the essence of unconventional spin-freezing ascribed to topological origin in two dimensional (2D) Kitaev magnets decorated on a honeycomb lattice and its 3D analog hyperhoneycomb that offers a viable ground to extend this framework to a large class of frustrated quantum materials. I. Introduction In correlated quantum materials, a synergistic interplay between competing degrees of freedom, and anisotropy conspire with frustration induced quantum fluctuations, offer a viable basis to realize a plethora of exotic quantum states with low-energy fractional excitations promising to address some of the enduring themes in quantum condensed matter [1–4]. The non-trivial ground states of frustrated quantum magnets at T → 0, characterized by smooth energy landscapes, can preclude the localization in condensed matter [5]. Quenched disorder such as atomic vacancies or randomness in exchange interactions in frustrated quantum magnets plays a vital role in deforming smooth energy landscapes into rugged energy landscapes, thereby leading to localization and the emergence of glassiness characterized by slow spin dynamics [6, 7]. The emergence of glassiness in the lowtemperature limit of some disorder-free frustrated Mott insulators is attributed to topological origin [9]. Landau theory of symmetry breaking is quite successful in describing the conventional phase transitions associated with local order parameters. However, Landau theory is inadequate in capturing the central essence of quantum phases which are driven by non-thermal control parameters and electron correlations in driving novel phases such as quantum spin liquids, high-temperature super- ∗ pkhuntia@iitm.ac.in conductivity, and the fractional Hall effect. The concept of topological order [1, 10] was introduced to elucidate the phase transition of such unconventional quantum states under the mathematical formulation of topology. Topologically ordered states are robust against perturbations and are characterized by topological degeneracy, fractional excitations, emergent gauge fields, non-local entanglement, and finite topological entropy at zero temperature that have far-reaching implications in advancing our understanding in fundamental physics and nextgeneration technologies [11–14]. A quantum spin liquid state (QSL) is a highly entangled state of quantum matter without a symmetry breaking phase transition down to absolute zero temperature and is characterized by fractional excitation and non-local spin correlations [3, 4, 15, 16]. QSL was proposed for S = 1/2 decorating on a Heisenberg triangular lattice [15]; however, the triangular lattice with nearestneighbor isotropic Heisenberg exchange interaction host magnetically ordered state [17, 18]. Later, it was demonstrated that the next-nearest neighbor exchange interaction [19–21], magnetic anisotropy [22–24], and higherorder interactions [25, 26] can stabilize QSL in frustrated magnets. In this context, the spin-orbit driven frustrated honeycomb magnets with bond-dependent highly anisotropic interaction between J eff = 1/2 degrees of freedom (see Fig. 1a-b) provide a natural habitat to host the celebrated Kitaev QSL state characterized by a spectrum of deconfined fractional excitations such as Majorana fermions [2]. In addition, external perturbations that break time-reversal symmetry-breaking stabi-" 2312.16106v1,"Clique Analysis and Bypassing in Continuous-Time Conflict-Based Search Thayne T. Walker Nathan R. Sturtevant Ariel Felner University of Denver, Lockheed Martin Corporation Denver, USA thayne.walker@du.edu Department of Computing Science, Alberta Machine Intelligence Institute (Amii), University of Alberta Edmonton, Canada nathanst@ualberta.ca Ben Gurion University Be’er-Sheva, Israel felner@bgu.ac.il ABSTRACT While the study of unit-cost Multi-Agent Pathfinding (MAPF) problems has been popular, many real-world problems require continuous time and costs due to various movement models. In this context, this paper studies symmetry-breaking enhancements for Continuous- Time Conflict-Based Search (CCBS), a solver for continuous-time MAPF. Resolving conflict symmetries in MAPF can require an exponential amount of work. We adapt known enhancements from unit-cost domains for CCBS: bypassing, which resolves cost symmetries and biclique constraints which resolve spatial conflict symmetries. We formulate a novel combination of biclique constraints with disjoint splitting for spatial conflict symmetries. Finally, we show empirically that these enhancements yield a statistically significant performance improvement versus previous state of the art, solving problems for up to 10% or 20% more agents in the same amount of time on dense graphs. 1 INTRODUCTION The objective of multi-agent pathfinding (MAPF) is to find paths for multiple agents such that each agent reaches its goal without conflicting with other agents. Agents paths are conflicting if at any time their shapes overlap. MAPF has applications in warehouses [22], package delivery [9], games [6, 28], firefighting [25], search and rescue [26] and intersection management [11, 30]. A significant amount of prior work has focused on “classic” MAPF with a state space represented by a grid or planar graph with unit-cost edges [29]. Therefore, in classic MAPF, all actions take one time step and agents always occupy exactly one vertex in a time step. These limitations simplify the problem, but cannot be applied to domains which may exhibit variable size agents and continuous-time, variable-duration motion and wait actions. We seek optimal solutions to the continuous-time MAPF problem (MAPF R ) [1, 33], denoted MAPF R for real-valued action durations and costs on general graphs (e.g., planar, non-panar, unit-cost and non-unit cost graphs). Continuous-Time Conflict-Based Search (CCBS) [3] is a solver for MAPF R . CCBS re-formulates the Conflict-Based Search (CBS) algorithm [27] to allow variable-duration wait actions and constraints which account for continuous-time execution. CCBS was shown to be effective on a several settings that are inspired by real-world applications. Additional enhancements, such as heuristics [17], disjoint splitting (DS) [18] and conflict prioritization [8] were added to CCBS [2]. These enhancements improve the runtime of CCBS. In contrast to other prior optimal continuous-time approaches [33–35] which assume only fixed-duration wait actions, CCBS plans optimal, arbitrary duration wait times. CCBS represents a significant advancement for MAPF R . However, conflict symmetries continue to pose a problem for this algorithm. A conflict symmetry [20] occurs when two or more agents are situated such that one or both agents must increase their path cost to avoid conflict. For optimal algorithms like CCBS, this means that many lower-cost alternate paths must be explored before proving that the cost increase is necessary. Conflict symmetries can cause an exponential amount of work to resolve [20]. In this paper, we address conflict symmetries by adapting and building new symmetrybreaking enhancements for CCBS: • We adapt the bypass (BP) enhancement [7], originally formulated for CBS, to be used with CCBS. • We adapt Biclique constraints (BC) [34], originally formulated for CBS, to be used with CCBS. • We combine disjoint splitting (DS) [18] as formulated for CCBS [2] with (BC): disjoint bicliques (DB) • We newly re-formulate BC for k-partite cliques and combine with DS: disjoint k-partite cliques (DK) This paper is organized as follows: We first provide a definition of the MAPF R problem. Next, we describe the CCBS algorithm and related work. This is followed by a description of the new symmetry breaking enhancements. Finally, we present a comprehensive ablation study on all of the enhancements. 2 PROBLEM DEFINITION MAPF was originally defined for a “classic"" setting [29] where the movements of agents are coordinated on a grid, which is a 4- neighbor planar graph. Edges have a unit cost/unit time duration and agents occupy a point in space. Thus, two agents can only have conflicts when on the same vertex at the same time, or traversing the same edge in opposite directions. MAPF R [1, 33], an extension of MAPF for real-valued action durations, uses a weighted graph 𝐺=(𝑉 , 𝐸) which may be non-planar. Every vertex 𝑣 ∈𝑉 is associated with coordinates in a metric space and every edge 𝑒∈𝐸 is associated with a positive real-valued edge weight 𝑤 (𝑒)∈R + . For the purposes of this paper, weights represent the times it takes to traverse edges. However, time duration and cost can be treated separately. There are 𝑘 agents, 𝐴={1, .., 𝑘 }. Each agent has a start and a goal vertex 𝑉 𝑠 ={𝑠𝑡𝑎𝑟𝑡 1 , .., 𝑠𝑡𝑎𝑟𝑡 𝑘 }⊆𝑉 and 𝑉 𝑔 ={𝑔𝑜𝑎𝑙 1 , .., 𝑔𝑜𝑎𝑙 𝑘 }⊆𝑉 such that 𝑠𝑡𝑎𝑟𝑡 𝑖 ≠𝑠𝑡𝑎𝑟𝑡 𝑗 and 𝑔𝑜𝑎𝑙 𝑖 ≠𝑔𝑜𝑎𝑙 𝑗 for all 𝑖≠𝑗. A solution to a MAPF R instance is Π={𝜋 1 , .., 𝜋 𝑘 }, a set of singleagent paths which are sequences of states. A state 𝑠=(𝑣, 𝑡) is a pair composed of a vertex 𝑣 ∈𝑉 and a time 𝑡 ∈R + . A path for agent 𝑖 is a sequence of 𝑑+1 states 𝜋 𝑖 =[𝑠 𝑖 0 , .., 𝑠 𝑖 𝑑 ], where 𝑠 𝑖 0 =(𝑠𝑡𝑎𝑟𝑡 𝑖 , 0) and" 2312.16131v1,"Exact modulated hadronic tubes and layers at finite volume in a cloud of π and ω mesons Gonzalo Barriga, 1, 2, ∗ Matı́as Torres, 3, † and Aldo Vera 4, 5, ‡ 1 Centro de Estudios Cientı́ficos (CECS), Casilla 1469, Valdivia, Chile Departamento de Fı́sica, Universidad de Concepción, Casilla 160-C, Concepción, Chile 3 Dipartimento di Fisica “E. Pancini”, Università di Napoli Federico II - INFN sezione di Napoli, Complesso Universitario di Monte S. Angelo Edificio 6, via Cintia, 80126 Napoli 4 Instituto de Ciencias Exactas y Naturales,Universidad Arturo Prat, Playa Brava 3256, 1111346, Iquique, Chile 5 Facultad de Ciencias, Universidad Arturo Prat, Avenida Arturo Prat Chacón 2120, 1110939, Iquique, Chile 2 We construct topological soliton solutions describing baryonic tubes and layers with modulation in the SU (2) non-linear sigma model coupled with ω-mesons in 3 + 1 dimensions. Using appropriate Asäntze for the pionic matter field and the ω-mesons vector potential, the complete set of seven coupled partial differential equations can be solved analytically. These solutions represent modulated tubes and layers at finite volume with arbitrary baryon number, where the modulation of the solitons in one direction is determined by one of the three degrees of freedom of the pionic field, satisfying the equation of a two-dimensional free massless chiral scalar field. As expected, the inclusion of the ω-mesons to the Non-linear sigma model allows to reduce the repulsion energy between baryons, which leads to a flattening of the tubes and layers in one direction, forming a kind of “nuclear linguine phase”. Also, we show that this construction can be carried out even when higher order terms in the large N c expansion are included -in particular the Skyrme term- without spoiling the integrability of the field equations. ∗ Electronic address: gbarriga@cecs.cl † Electronic address: matiatorres@udec.cl ‡ Electronic address: aldoveraseron@gmail.com" 2312.16137v1,"A Hamiltonian for 1:1 Rotational Secondary Resonances, and Application to Small Satellites of Saturn and Jupiter N. Callegari Jr. ∗ Instituto de Geociências e Ciências Exatas, Unesp - Univ Estadual Paulista, Departamento de Estatı́stica, Matemática Aplicada e Computação. Av. 24-A, Rio Claro/SP/Brazil, CEP 13506-900. Abstract In this work, we study the dynamics of rotation of the small satellites Methone and Aegaeon and revisit previous works on the rotation of Prometheus, Metis, and Amalthea. In all cases, the surfaces of section computed with the standard spin-orbit model reveal that the synchronous regime shares another large domain in the rotation phase space. We reproduce and apply the hamiltonian theory given in Wisdom (2004) to analytically characterize the detected structure as being a secondary resonance where the period of oscillations around the synchronism is similar to the orbital period. Being that the current rotational states of this sort of satellite should be synchronous (Thomas and Helfenstein 2020), our results can be taken into account in evolutionary studies of their rotation. Keywords: Aegaeon; Amalthea; Metis; Methone; Prometheus; Saturnian and Jupiter small satellites; Spin-Orbit resonance. 1. Introduction Consider the rotation of a rigid and homogeneous satellite orbiting a punctual planet in the case the satellite rotates around a single axis corresponding to its largest moment of inertia. The mutual perturbations between the bodies belonging to multiple systems or due to the non-sphericity of the secondary are neglected in this work, such that the motion of the system is governed by the laws of the two-body problem (Goldreich and Peale 1966). A hamiltonian for the sort of problem is given by: p 2 ϵ 2 n 2 C a H(θ, p, t) = − 2C 4 r(t) "" ∗ # 3 cos 2[θ − f (t)], (1) Corresponding author Email address: nelson.callegari@unesp.br (N. Callegari Jr.) Preprint submitted to Elsevier December 27, 2023" 2312.16148v1,"Related papers at https://media-bias-research.org/publications/ Preprint of the paper: Spinde, T. & Hinterreiter, S. & Haak, F. & Ruas, T. & Giese, H. & Meuschke, N. & Gipp, B., ""The Media Bias Taxonomy: A Systematic Literature Review on the Forms and Automated Detection of Media Bias"", in ACM Comput. Surv. [in Review], DOI: TODO. Click to download: BibTeX The Media Bias Taxonomy: A Systematic Literature Review on the Forms and Automated Detection of Media Bias TIMO SPINDE, University of Göttingen, Germany SMI HINTERREITER ∗ , University of Würzburg, Germany FABIAN HAAK ∗ , TH Köln - University of Applied Sciences, Germany TERRY RUAS, University of Göttingen, Germany HELGE GIESE, Charité – Universitätsmedizin Berlin, Germany NORMAN MEUSCHKE, University of Göttingen, Germany BELA GIPP, University of Göttingen, Germany The way the media presents events can significantly affect public perception, which in turn can alter people’s beliefs and views. Media bias describes a one-sided or polarizing perspective on a topic. This article summarizes the research on computational methods to detect media bias by systematically reviewing 3140 research papers published between 2019 and 2022. To structure our review and support a mutual understanding of bias across research domains, we introduce the Media Bias Taxonomy, which provides a coherent overview of the current state of research on media bias from different perspectives. We show that media bias detection is a highly active research field, in which transformer-based classification approaches have led to significant improvements in recent years. These improvements include higher classification accuracy and the ability to detect more fine-granular types of bias. However, we have identified a lack of interdisciplinarity in existing projects, and a need for more awareness of the various types of media bias to support methodologically thorough performance evaluations of media bias detection systems. Concluding from our analysis, we see the integration of recent machine learning advancements with reliable and diverse bias assessment strategies from other research areas as the most promising area for future research contributions in the field. CCS Concepts: • General and reference → Surveys and overviews; • Information systems → Retrieval tasks and goals. Additional Key Words and Phrases: media bias, gender bias, racial bias, hate speech, text retrieval, news slant ACM Reference Format: Timo Spinde, Smi Hinterreiter, Fabian Haak, Terry Ruas, Helge Giese, Norman Meuschke, and Bela Gipp. 2023. The Media Bias Taxon- omy: A Systematic Literature Review on the Forms and Automated Detection of Media Bias. ACM Comput. Surv. 1, 1 (December 2023), 40 pages. https://doi.org/10.1145/1122445.1122456 ∗ Both authors contributed equally to this research. Authors’ addresses: Timo Spinde, University of Göttingen, Germany, Göttingen, Timo.Spinde@uni-konstanz.de; Smi Hinterreiter, University of Würzburg, Würzburg, Germany; Fabian Haak, TH Köln - University of Applied Sciences, Köln, Germany, fabian.haak@th-koeln.de; Terry Ruas, University of Göttingen, Germany, Göttingen, ruas@uni-goettingen.de; Helge Giese, Charité – Universitätsmedizin Berlin, Berlin, Germany, helge.giese@uni-konstanz.de; Norman Meuschke, University of Göttingen, Germany, Göttingen, Meuschke@uni-goettingen.de; Bela Gipp, University of Göttingen, Germany, Göttingen, gipp@uni-goettingen.de. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM" 2312.16183v1,"LightGCN: Evaluated and Enhanced Milena Kapralova 1 Luca Pantea 1 Andrei Blahovici 1 1 University of Amsterdam {milena.kapralova, luca.pantea, andrei.blahovici}@student.uva.nl ABSTRACT: This paper analyses LightGCN [3] in the context of graph recommendation algorithms. Despite the initial design of Graph Convolutional Networks for graph classification, the non-linear operations are not always essential. LightGCN enables linear propagation of embeddings, enhancing performance. We reproduce the original findings, assess LightGCN’s robustness on diverse datasets and metrics, and explore Graph Diffusion as an augmentation of signal propagation in LightGCN 1 . 1 Introduction The Graph Convolution Network (GCN) has emerged as a powerful method in graph collaborative filtering recommendations. However, GCNs include many non-linear operations essential for collaborative filtering tasks. He et al. [3] proposed LightGCN, a model that removes non-linear activation functions and linear transformations from the Neural Graph Collaborative Filtering (NGCF) [5] architecture, linearly propagating user and item embeddings on the user-item bipartite graph. He et al. [3] empirically validated the new architectural choice by comparing it with NGCF and running an extensive ablation study over the model’s hyperparameter space. This work has both reproducibility and extension goals. We verify that simpler GCNs achieve top performance through smoother embeddings. We further test LightGCN on five datasets, considering diversity and fairness, and enhance results using Graph Diffusion. 2 Background The LightGCN model is based on the NGCF architecture, with the non-linear activation functions and linear projections removed. Thus, the aggregation function in the graph convolutions of LightGCN is: X X 1 1 (k) (k+1) p p p p e (k+1) = e i e i = e (k) (1) u u |N u | |N i | |N i | |N u | i∈N u u∈N i (k) (k) where e u and e i are embedding of user u at layer k and the embedding of item i at layer k, respectively. LightGCN aggregates user and item embeddings from neighboursa at each layer, with only input embeddings being trainable. The final embeddings combine all layers’ outputs. Predictions are based on the largest inner product between user and item embeddings: K K X X (k) (2) e u = α k e (k) e = α k e i ŷ ui = e ⊤ i u u e i k=0 k=0 1 . where α k is the weight associated with the k-th layer embeddings. In He et al. [3], ∀k : α k = K+1 3 Method Approximate Personalised Propagation of Neural Predictions (APPNP) is a GCN variant and an instance of graph diffusion convolution inspired by Personalised Page Rank (PPR). It derives from topic-sensitive PageRank approximated with power iteration [2], propagating the final embeddings:   ˆ (k) , Z (K) = s αZ (0) + (1 − α) ÃZ ˆ (K−1) Z (0) = E (K) , Z (k+1) = αZ (0) + (1 − α) ÃZ (3) The final embedding matrix E (K) serves as the starting vector and teleport set with K denoting power iteration steps. This method maintains graph sparsity without needing extra training parameters and prevents oversmoothing due to its teleport design. The teleport probability, α, adjusts the neighbourhood size. While Gasteiger et al. [2] found optimal alphas between [.05, .2], our grid search on the CiteULike dataset identified the best α as .1. For other datasets, we begin with this alpha, adjusting slightly to optimize test set performance. 1 Anonymised code repository: https://anonymous.4open.science/r/LightGCN-1B84/README.md 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2312.16185v1,"Chaos Linear and nonlinear causality in financial markets Haochun Ma, 1, 2 Davide Prosperino, 1, 2 Alexander Haluszczynski, 2 and Christoph Räth 3 1) Ludwig-Maximilians-Universität, Department of Physics, Schellingstraße 4, 80799 Munich, Germany 2) Allianz Global Investors, risklab, Seidlstraße 24, 80335, Munich, Germany 3) Deutsches Zentrum für Luft- und Raumfahrt (DLR), Institut für KI Sicherheit, Wilhelm-Runge-Straße 10, 89081 Ulm, Germany (*Electronic mail: christoph.raeth@dlr.de) Identifying and quantifying co-dependence between financial instruments is a key challenge for researchers and practitioners in the financial industry. Linear measures such as the Pearson correlation are still widely used today, although their limited explanatory power is well known. In this paper we present a much more general framework for assessing co-dependencies by identifying and interpreting linear and nonlinear causalities in the complex system of financial markets. To do so, we use two different causal inference methods, transfer entropy and convergent cross-mapping, and employ Fourier transform surrogates to separate their linear and nonlinear contributions. We find that stock indices in Germany and the U.S. exhibit a significant degree of nonlinear causality and that correlation, while a very good proxy for linear causality, disregards nonlinear effects and hence underestimates causality itself. The presented framework enables the measurement of nonlinear causality, the correlation-causality fallacy, and motivates how causality can be used for inferring market signals, pair trading, and risk management of portfolios. Our results suggest that linear and nonlinear causality can be used as early warning indicators of abnormal market behavior, allowing for better trading strategies and risk management. Within the complex system of financial markets, understanding the intricate ties between assets is crucial. Although the Pearson correlation has been a standard measure for these relationships, its linear approach might not fully represent the entire spectrum of causality. This study employs sophisticated causal inference algorithms and methods to differentiate between linear and nonlinear causal contributions. By examining major stock indices from Germany and the U.S., we uncover profound and possibly nonlinear linkages. More than presenting a new approach, this research indicates a significant shift in our perception and quantification of financial market behaviors. Such insights hold promise for refining market predictions, optimizing trading strategies, and improving portfolio risk management. I. INTRODUCTION The field of econophysics is garnering heightened attention in the physics domain, offering a novel lens to conventional financial methodologies 1 . This emerging perspective draws from statistical physics tools, spanning signal processing, agent-based market frameworks, and random matrix theory 2 . Understanding the co-dependence of financial assets is paramount across various finance sectors, especially when quantifying portfolio-associated risks 3 . This development has seen industry practitioners keenly monitor the evolution of codependence metrics. Predominantly, mutual dependencies of financial instruments are characterized via the Pearson correlation of their return time series. However, there is increasing research underscoring the nonlinear characteristics of these series 4 . Notably, Mantegna and Stanley 5 showed the power law scaling dynamics of financial indices’ probability distributions, while Ghashghaie et al. 6 pinpointed turbulent cas- cades in foreign exchange markets. Such insights challenge the adequacy of linear dependency metrics. Addressing this, Haluszczynski et al. 7 segregated linear from nonlinear mutual information contributions using Fourier transform surrogates, aiming to quantify nonlinear correlations among financial assets. The authors demonstrated that the integration of nonlinear correlations into portfolio construction led to an increase in investment performance. A pressing query is the continued reliance on the Pearson correlation 8 as a causality proxy, given the intricate nature of causality measurement within dynamic systems. Granger’s initial study in the 1960s 9 addressed the difference between causality and correlation, leading to the development of more advanced causal inference tools. This ranged from information-theoretic tools 10 to state-space reconstruction models 11 . While causal inference has mainly focused on determining causality 12 , the study of its linear versus nonlinear characteristics has not been performed in detail. Beginning work has been performed by Paluš and Vejmelka 13 and Hlinka et al. 14 , who focused on mutual information to detect nonlinear dynamics in time series and evaluated nonlinearity contributions in climate connectivity. In this paper, we analyze causality in financial markets by separating linear and nonlinear contributions to causality using Fourier transform surrogates. To do so, we use two different causal inference techniques and apply them to historical stock data of the German DAX and the U.S. Dow-Jones index. We also identify causality-based statistical properties of financial data and motivate how linear and nonlinear causality can be separated and measured. We find that while correlation is a good proxy for linear causality, nonlinear effects are disregarded and thus, significant amount of nonlinear causality is neglected. This is potentially dangerous when practitioners evaluate the risk of a portfolio only using correlation. Therefore, we propose a simple integration of causality measures into market signal inference, pair trading, and portfolio construction routines and show that they yield superior results." 2312.16189v1,"Journal of Machine Learning Research 23 (2023) 1-10 Submitted 12/23; Published None OpenRL: A Unified Reinforcement Learning Framework Shiyu Huang 1,† huangsy1314@163.com Wentse Chen 2 wentsec@andrew.cmu.edu Yiwen Sun 3 ywsun22@m.fudan.edu.cn Fuqing Bie 4 biefuqing@bupt.edu.cn Wei-Wei Tu 1,† tuweiwei@4paradigm.com 4Paradigm Inc., Beijing, China 2 Robotics Institute, Carnegie Mellon University, Pittsburgh, USA 3 School of Data Science, Fudan University, Shanghai, China 4 Beijing University of Posts and Telecommunications, Beijing, China † corresponding authors 1 Editor: Abstract We present OpenRL, an advanced reinforcement learning (RL) framework designed to accommodate a diverse array of tasks, from single-agent challenges to complex multi-agent systems. OpenRL’s robust support for self-play training empowers agents to develop advanced strategies in competitive settings. Notably, OpenRL integrates Natural Language Processing (NLP) with RL, enabling researchers to address a combination of RL training and language-centric tasks effectively. Leveraging PyTorch’s robust capabilities, OpenRL exemplifies modularity and a user-centric approach. It offers a universal interface that simplifies the user experience for beginners while maintaining the flexibility experts require for innovation and algorithm development. This equilibrium enhances the framework’s practicality, adaptability, and scalability, establishing a new standard in RL research. To delve into OpenRL’s features, we invite researchers and enthusiasts to explore our GitHub repository at https://github.com/OpenRL-Lab/openrl and access our comprehensive documentation at https://openrl-docs.readthedocs.io. Keywords: Reinforcement Learning, Multi-agent Learning, Self-play, Natural Language Processing, PyTorch 1 Introduction Reinforcement learning (RL) has undergone significant expansion in recent years (Arulkumaran et al., 2017). This rapidly evolving field has diversified its applications, ranging from single-agent problems (Bellemare et al., 2013; Lillicrap et al., 2015) to the complexities of multi-agent scenarios (Yu et al., 2022; Lin et al., 2023), from mastering self-play (Berner et al., 2019) to the subtleties of offline RL (Fu et al., 2020; Qin et al., 2022). These advancements in RL now empower robots to navigate challenging terrains (Polydoros and Nalpantidis, 2017; Margolis and Agrawal, 2023; Cheng et al., 2023), enhance large language models in understanding and generating human-like text (Ziegler et al., 2019; Stiennon et al., 2020; Ouyang et al., 2022), and aid industrial tasks through RL-driven optimization ©2023 Shiyu Huang, Wenze Chen, Yiwen Sun, Fuqing Bie and Wei-Wei Tu. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/v23/21-0000.html." 2312.16213v1,"Deciding the Feasibility and Minimizing the Height of Tangles ∗ Oksana Firman 1 Philipp Kindermann 2 Boris Klemz 1 Alexander Wolff 1 Johannes Zink 1 Alexander Ravsky 3 1 Universität Würzburg, Würzburg, Germany 2 Universität Trier, Trier, Germany 3 Pidstryhach Institute for Applied Problems of Mechanics and Mathematics, National Academy of Sciences of Ukraine, Lviv, Ukraine Abstract. We study the following combinatorial problem. Given a set of n ymonotone wires, a tangle determines the order of the wires on a number of horizontal layers such that the orders of the wires on any two consecutive layers differ only in swaps of neighboring wires. Given a multiset L of swaps (that is, unordered pairs of wires) and an initial order of the wires, a tangle realizes L if each pair of wires changes its order exactly as many times as specified by L. List-Feasibility is the problem of finding a tangle that realizes a given list L if such a tangle exists. Tangle- Height Minimization is the problem of finding a tangle that realizes a given list and additionally uses the minimum number of layers. List-Feasibility (and therefore Tangle-Height Minimization) is NP-hard [Yamanaka et al., CCCG 2018]. We prove that List-Feasibility remains NP-hard if every pair of wires swaps only a constant number of times. On the positive side, we present an algorithm for Tangle- Height Minimization that computes an optimal tangle for n wires and a given list L 2 of swaps in O((2|L|/n 2 + 1) n /2 · φ n · n) time, where φ ≈ 1.618 is the golden ratio and |L| is the total number of swaps in L. From this algorithm, we derive a simpler and faster version to solve List-Feasibility. We also use the algorithm to show that List-Feasibility is in NP and fixed-parameter tractable with respect to the number of wires. For simple lists, where every swap occurs at most once, we show how to solve Tangle-Height Minimization in O(n!φ n ) time. 1 Introduction This paper concerns the visualization of chaotic attractors, which occur in (chaotic) dynamic systems. Such systems are considered in physics, celestial mechanics, electronics, fractals theory, chemistry, biology, genetics, and population dynamics; see, for instance, [6], [17], and [10, p. 191]. Birman and Williams [5] were the first to mention tangles as a way to describe the topological structure of chaotic attractors. They investigated how the orbits of attractors are knotted. Later Mindlin et al. [13] characterized attractors using integer matrices that contain numbers of swaps between the orbits. ∗ Preliminary versions of this work have appeared in Proc. 27th Int. Symp. Graph Drawing & Network Vis. (GD 2019) [8] and Proc. 49th Int. Conf. Current Trends Theory & Practice Comput. Sci. (SOFSEM 2023) [7] E-mail addresses: oksana.firman@uni-wuerzburg.de (Oksana Firman) kindermann@uni-trier.de (Philipp Kindermann) boris.klemz@uni-wuerzburg.de (Boris Klemz) alexander.ravsky@uni-wuerzburg.de (Alexander Ravsky) johannes.zink@uni-wuerzburg.de (Johannes Zink)" 2312.16217v1,"ManipLLM: Embodied Multimodal Large Language Model for Object-Centric Robotic Manipulation Xiaoqi Li * , Mingxu Zhang, Yiran Geng, Haoran Geng, Yuxing Long, Yan Shen, Renrui Zhang, Jiaming Liu, Hao Dong † School of Computer Science, Peking University Abstract Robot manipulation relies on accurately predicting contact points and end-effector directions to ensure successful operation. However, learning-based robot manipulation, trained on a limited category within a simulator, often struggles to achieve generalizability, especially when confronted with extensive categories. Therefore, we introduce an innovative approach for robot manipulation that leverages the robust reasoning capabilities of Multimodal Large Language Models (MLLMs) to enhance the stability and generalization of manipulation. By fine-tuning the injected adapters, we preserve the inherent common sense and reasoning ability of the MLLMs while equipping them with the ability for manipulation. The fundamental insight lies in the introduced fine-tuning paradigm, encompassing object category understanding, affordance prior reasoning, and object-centric pose prediction to stimulate the reasoning ability of MLLM in manipulation. During inference, our approach utilizes an RGB image and text prompt to predict the end effector’s pose in chain of thoughts. After the initial contact is established, an active impedance adaptation policy is introduced to plan the upcoming waypoints in a closed-loop manner. Moreover, in real world, we design a test-time adaptation (TTA) strategy for manipulation to enable the model better adapt to the current real-world scene configuration. Experiments in simulator and real-world show the promising performance of ManipLLM. More details and demonstrations can be found at https://sites.google.com/view/manipllm. 1. Introduction As robot manipulation requires robots to interact with diverse objects, the robustness and explainability of lowlevel action prediction become essential for manipulating reliability. While certain approaches [9, 11–13, 22, 23] * clorisli@stu.pku.edu.cn † Corresponding author: hao.dong@pku.edu.cn Input ‘Specify the contact point and gripper direction of manipulating the object’ ManipLLM ‘The contact point is (x,y,z), the gripper up direction is (x u ,y u ,z u ), the gripper forward direction is (x f ,y f ,z f )’ Figure 1. The prediction of ManipLLM. Given the text prompt, RGB image, and depth map inputs, we obtain 3D contact point (x, y, z). Here, x and y represent the pixel coordinates in the image predicted by ManipLLM, while z corresponds to the depth obtained from the depth camera. Additionally, ManipLLM predicts the gripper’s up direction (x u , y u , z u ) and forward direction (x f , y f , z f ), forming the end-effector SO(3) rotation. demonstrate impressive performance, they often sacrifice interpretability by treating low-level manipulation prediction as a black-box prediction problem and lack the inherent common-sense reasoning abilities inherent in humans, limiting their capacity to manipulate wide-spread categories of objects. Existing advancements in Multimodal Large Language Models (MLLMs)[1, 19, 22, 38] highlight their proficiency in common sense reasoning and remarkable generalization in vision tasks [2, 8]. However, training Multi-Label Language Models (MLLMs) directly to learn robotic low-level action trajectories (i.e. end-effector trajectories) [4, 40]" 2312.16221v1,"TEMP3D: Temporally Continuous 3D Human Pose Estimation Under Occlusions Rohit Lal 1,∗ Yash Garg 1,∗ Arindam Dutta 1,∗ Calvin-Khang Ta 1 Dripta S. Raychaudhuri 2 M. Salman Asif 1 Amit K. Roy-Chowdhury 1 1 2 University of California, Riverside AWS AI Labs {rlal011, ygarg002, adutt020, cta003, drayc001, sasif, amitrc}@ucr.edu Figure 1. Current single image-based 3D pose estimation methods fail to consistently produce clean, accurate human body pose predictions in cases of heavy occlusion. This discrepancy arises from a lack of temporal contextual information, as illustrated in the third videoframe of the figure. In this frame, the pose produced by the single image-based method [3] is temporally inconsistent with the previous poses. Indeed, when the image contains heavy human body occlusion which render the person almost entirely invisible, such as in the fourth and fifth frames, the single image based method fails to predict any pose at all. However, the incorporation of temporal continuity enables the refinement of noisy, inconsistent poses as well as accurate pose predictions on frames where single image based methods fail to perform. Abstract Existing 3D human pose estimation methods perform remarkably well in both monocular and multi-view settings. However, their efficacy diminishes significantly in the presence of heavy occlusions, which limits their practical utility. For video sequences, temporal continuity can help infer accurate poses, especially in heavily occluded frames. In this paper, we aim to leverage this potential of temporal continuity through human motion priors, coupled with large-scale pre-training on 3D poses and self-supervised learning, to enhance 3D pose estimation in a given video sequence. This leads to a temporally continuous 3D pose estimate on unlabelled in-the-wild videos, which may contain occlusions, while exclusively relying on pre-trained 3D pose models. We propose an unsupervised method named TEMP3D that aligns a motion prior model on a given inthe-wild video using existing SOTA single image-based 3D pose estimation methods to give temporally continuous out- put under occlusions. To evaluate our method, we test it on the Occluded Human3.6M dataset, our custom-built dataset which contains significantly large (up to 100%) human body occlusions incorporated into the Human3.6M dataset. We achieve SOTA results on Occluded Human3.6M and the Oc- Motion dataset while maintaining competitive performance on non-occluded data. https://sites.google. com/ucr.edu/temp3d 1. Introduction Accurate 3D pose estimation [49] is an important problem in computer vision with a variety of real-world applications, including but not limited to action recognition [20], virtual and augmented reality [1], and gait recognition [51]. Single image-based 3D pose estimation methods [34, 37] have shown impressive performance gains in inferring the three-dimensional pose of the subject by only leveraging the information contained in a single image" 2312.16233v1,"Chatbot is Not All You Need: Information-rich Prompting for More Realistic Responses Seokhoon Jeong 1 , Assentay Makhmud 2 , 1 Ulsan National Institute of Science and Technology 2 Suleyman Demirel University {shjd0246, almacho}@unist.ac.kr Abstract Recent Large Language Models (LLMs) have shown remarkable capabilities in mimicking fictional characters or real humans in conversational settings. However, the realism and consistency of these responses can be further enhanced by providing richer information of the agent being mimicked. In this paper, we propose a novel approach to generate more realistic and consistent responses from LLMs, leveraging five senses, attributes, emotional states, relationship with the interlocutor, and memories. By incorporating these factors, we aim to increase the LLM’s capacity for generating natural and realistic reactions in conversational exchanges. Through our research, we expect to contribute to the development of LLMs that demonstrate improved capabilities in mimicking fictional characters. We release a new benchmark dataset and all our codes, prompts, and sample results on our Github 1 . 1 Introduction Large laguage models based on transformer architecture [Vaswani et al., 2017] have demonstrated impressive performance in a wide range of tasks [Brown et al., 2020; Devlin et al., 2018; Radford et al., 2019]. More recent LLMs that leverage both supervised fine-tuning and reinforcement learning from human feedback [Ouyang et al., 2022] have shown their decent capabilities even in open-domain conversational tasks including human-like interactions [Liu et al., 2023]. However, due to the significant computational resources required for training such models, prompt tuning has emerged as a crucial aspect of optimizing LLM performance. Recent research has explored various techniques to generate more realistic responses through effective prompt engineering, such as prompting a relevant pseudo dialogue [Han et al., 2022] or providing detailed information of the scene, relations, and attributes [Chen et al., 2022]. Despite these advances, several major challenges remain unaddressed, including: (1) LLMs mimicking fictional characters often exhibit either too little or too harsh fluctuations in their responses. (2) 1 https://github.com/srafsasm/InfoRichBot The innate context limit of LLMs poses a challenge for maintaining a consistent conversational memory. (3) A scarcity of conversational datasets containing helpful information to inform prompt construction. To address these challenges, we present a multi-pronged approach aimed at enhancing the efficacy of prompts for LLMs: 1. Information-rich Prompting We initialize and continuously update the prompts so that it provides multi-aspect information on the character. 2. Within-prompt Self Memory Management To mitigate the limitation of context length, we make the language model to summarize the history log and maintain it in the prompt. 3. Benchmark Dataset To overcome the scarcity of useful datasets for evaluation, we augment Cornell Movie- Dialog Corpus 2 via GPT-3.5 Turbo, a model known for its strong capabilities comparable to those of fine-tuned LLMs [Zhong et al., 2023]. In this paper, we detail the methodology and results of our proposed techniques, demonstrating their potential to address the challenges currently faced in LLM prompt engineering. 2 Related Work 2.1 Realistic Dialogue Generation Although recent LLMs have demonstrated decent performance in terms of general conversation, it is still challenging to generate a realistic response, mimicking a fictional character or a real human. There has been an attempt to reflect the attributes or personalities assigned to the chatbot [Li et al., 2020a], or even those of the interlocutor [Fernau et al., 2022; Liu et al., 2020; Chen et al., 2022]. Some others tried to bring external knowledge in addition to persona information [Lim et al., 2023], while another leveraged pseudo dialogue of the mimicked character [Han et al., 2022]. Such trials have demonstrated partial successes leading to more emotional or realistic conversation. 2 https://www.cs.cornell.edu/ ∼ cristian/Cornell Movie-Dialogs Corpus.html" 2312.16247v1,"Toward Accurate and Temporally Consistent Video Restoration from Raw Data Shi Guo 1 Jianqi Ma 1,2 Xi Yang 1,2 Zhengqiang Zhang 1,2 Lei Zhang 1,2 1 The Hong Kong Polytechnic University; 2 OPPO Research Institute {shiguo.guo, jianqi.ma, xxxxi.yang, zhengqiang.zhang}@connect.polyu.hk, cslzhang@comp.polyu.edu.hk Abstract sequentially. As a result, the denoising artifacts can be magnified in the demosaicking process, or the demosaicking errors can complicate the denoising process. Denoising and demosaicking are two fundamental steps in reconstructing a clean full-color video from raw data, while performing video denoising and demosaicking jointly, namely VJDD, could lead to better video restoration performance than performing them separately. In addition to restoration accuracy, another key challenge to VJDD lies in the temporal consistency of consecutive frames. This issue exacerbates when perceptual regularization terms are introduced to enhance video perceptual quality. To address these challenges, we present a new VJDD framework by consistent and accurate latent space propagation, which leverages the estimation of previous frames as prior knowledge to ensure consistent recovery of the current frame. A data temporal consistency (DTC) loss and a relational perception consistency (RPC) loss are accordingly designed. Compared with the commonly used flow-based losses, the proposed losses can circumvent the error accumulation problem caused by inaccurate flow estimation and effectively handle intensity changes in videos, improving much the temporal consistency of output videos while preserving texture details. Extensive experiments demonstrate the leading VJDD performance of our method in term of restoration accuracy, perceptual quality and temporal consistency. Codes and dataset are available at https://github.com/ GuoShi28/VJDD. Considering the correlations between the two tasks, jointly performing denoising and demosaicking (JDD) [9, 16, 19–22, 32, 36] has garnered considerable research attention. Gharbi et al. [16] explored a learning-based scheme for JDD, leading to superior results to traditional nonlearning based JDD techniques [8, 21]. Guo et al. [19] demonstrated that the joint execution of denoising and demosaicking can yield better restoration results than performing these two tasks separately. Meanwhile, more advanced networks have been proposed for JDD, e.g., twostage networks [45], auto-encoder architectures [22], iterative structures [32], two-stage alignment framework [20]. However, these JDD methods are primarily designed for single images (denoted by SJDD) [9, 16, 21, 22, 32, 36] or burst images (denoted by BJDD) [19, 20], neglecting the scenarios of video restoration from raw data. With the increasing demand for high-quality videos, it is imperative to develop new video restoration algorithms in raw domain. In this paper, we aim to address this challenging issue and present an effective framework of joint denoising and demosaicking from video raw data (denoted by VJDD). Compared to SJDD and BJDD, where the restoration accuracy is the key demand, VJDD has another key requirement, i.e., the temporal consistency among consecutive frames. This is because even each frame of the video can be well restored, there can be many structural and textural differences between adjacent frames, resulting in the unpleasant flickering artifacts when play the frames as a video. In addition, to mitigate the over-smoothing problem and enhance the perceptual quality of videos, many video restorations methods [5, 10, 27, 52, 53, 57] introduce the perceptual loss [29] and adversarial loss [17] in the training process, which may generate more perceptually realistic details in each frame but exacerbate the temporal inconsistency between frames. To achieve temporal consistency, previous video processing algorithms, such as video colorization [33, 34], video style transfer [33, 50] and video 1. Introduction In consumer grade imaging devices, denoising and demosaicking are two critical steps to reconstruct high-quality RGB images/videos from the sensor RAW data. Color demosaicking aims to reproduce the missing color components from the color-filter array (CFA) data captured by a single-chip CCD/CMOS sensor, while denoising aims to remove the noise caused by random photon arrival and readout circuitry. Many previous methods for demosaicking [12, 28, 37, 55, 56] and denoising [18, 30, 35, 39, 44, 60, 61] in camera image signal processing (ISP) treat these two tasks 1" 2312.16304v1,"Hubble Tension and Cosmological Imprints of U (1) X Gauge Symmetry: U (1) B 3 −3L i as a case study Dilip Kumar Ghosh, 1, ∗ Purusottam Ghosh, 1, † Sk Jeesun, 1, ‡ and Rahul Srivastava 2, § 1 School of Physical Sciences, Indian Association for Cultivation of Science, 2A & 2B Raja S C Mullick Road, Kolkata 700032, India 2 Department of Physics, Indian Institute of Science Education and Research - Bhopal Bhopal Bypass Road, Bhauri, Bhopal, India Abstract The current upper limit on N eff at the time of CMB by Planck 2018 can place stringent constraints in the parameter space of BSM paradigms where their additional interactions may affect neutrino decoupling. Motivated by this fact in this paper we explore the consequences of light gauge boson (Z ′ ) emerging from local U (1) X symmetry in N eff at the time of CMB. First, we analyze the generic U (1) X models with arbitrary charge assignments for the SM fermions and show that, in the context of N eff the generic U (1) X gauged models can be broadly classified into two categories, depending on the charge assignments of first generation leptons. We then perform a detailed analysis with two specific U (1) X models: U (1) B 3 −3L e and U (1) B 3 −3L µ and explore the contribution in N eff due to the presence of Z ′ realized in those models. For comparison, we also showcase the constraints from low energy experiments like: Borexino, Xenon 1T, neutrino trident, etc. We show that in a specific parameter space, particularly in the low mass region of Z ′ , the bound from N eff (Planck 2018) is more stringent than the experimental constraints. Additionally, a part of the regions of the same parameter space may also relax the H 0 tension. ∗ Electronic address: dilipghoshjal@gmail.com Electronic address: pghoshiitg@gmail.com ‡ Electronic address: skjeesun48@gmail.com § Electronic address: rahul@iiserb.ac.in † 1" 2312.16307v1,"Incentive-Aware Synthetic Control: Accurate Counterfactual Estimation via Incentivized Exploration Daniel Ngo ∗1 , Keegan Harris ∗2 , Anish Agarwal 3 , Vasilis Syrgkanis 4 , and Zhiwei Steven Wu 2 1 University of Minnesota Carnegie Mellon University 3 Columbia University 4 Stanford University ngo00054@umn.edu, {keeganh, zstevenwu}@cmu.edu, aa5194@columbia.edu, vsyrgk@stanford.edu 2 Abstract We consider the classic panel data setting in which one observes measurements of units over time, under different interventions. Our focus is on the canonical family of synthetic control methods (SCMs) which, after a pre-intervention time period when all units are under control, estimate counterfactual outcomes for test units in the post-intervention time period under control by using data from donor units who have remained under control for the entire post-intervention period. In order for the counterfactual estimate produced by synthetic control for a test unit to be accurate, there must be sufficient overlap between the outcomes of the donor units and the outcomes of the test unit. As a result, a canonical assumption in the literature on SCMs is that the outcomes for the test units lie within either the convex hull or the linear span of the outcomes for the donor units. However despite their ubiquity, such overlap assumptions may not always hold, as is the case when e.g. units select their own interventions and different subpopulations of units prefer different interventions a priori. We shed light on this typically overlooked assumption, and we address this issue by incentivizing units with different preferences to take interventions they would not normally consider. Specifically, we provide a SCM for incentivizing exploration in panel data settings which provides incentive-compatible intervention recommendations to units by leveraging tools from information design and online learning. Using our algorithm, we show how to obtain valid counterfactual estimates using SCMs without the need for an explicit overlap assumption on the unit outcomes. ∗ Denotes equal contribution." 2312.16309v1,"ARTÍCULOS Círculo de Lingüística Aplicada a la Comunicación ISSN: 1576-4737 https://dx.doi.org/10.5209/clac.73849 Contribución de la semántica combinatoria al desarrollo de herramientas digitales multilingües María José Domínguez Vázquez 1 Recibido: 24 de enero de 2021/Aceptado: 28 de febrero de 2022 Resumen. El presente trabajo describe cómo la semántica combinatoria ha contribuido al diseño de tres prototipos de generación automática de esquemas argumentales del nombre en español, francés y alemán – Xera, Combinatoria y CombiContext. Asimismo, da cuenta de la importancia del conocimiento sobre la interfaz sintáctico-semántica argumental en una situación de producción en lenguas extranjeras. Tras un apartado descriptivo sobre el diseño, tipología y niveles informativos de los recursos, sigue una exposición sobre el papel fundamental del significado combinatorio –relacional y categorial– en su desarrollo. El estudio detalla diferentes filtros semánticos aplicados en la selección, organización y expansión del caudal léxico, siendo estos piezas clave para la generación de frases nominales mono y biargumentales gramaticalmente correctas y semánticamente aceptables. Palabras clave: significado combinatorio; Generación automática de la lengua; roles semánticos; rasgos ontológicos; esquemas argumentales [en] Contribution of the Combinatorial Semantics to the development of multilingual digital tools Abstract. This paper describes how the field of Combinatorial Semantics has contributed to the design of three prototypes for the automatic generation of argument patterns in nominal phrases in Spanish, French and German – Xera, Combinatoria and CombiContext. It also shows the importance of knowing about the argument syntactic-semantic interface in a production situation in the context of foreign languages. After a descriptive section on the design, typologie and information levels of the resources, there follows an explanation of the central role of the combinatorial meaning – roles and ontological features. The study deals with different semantic filters applied in the selection, organization and expansion of the lexicon, being these key pieces for the generation of grammatically correct and semantically acceptable mono- and biargumental nominal phrases. Keywords: combinatory meaning; Automatic Language Generation; semantic roles; ontological features; argument patterns Cómo citar: Domínguez Vázquez, M. J. (2022). Contribución de la semántica combinatoria al desarrollo de herramientas digitales multilingües. Círculo de Lingüística Aplicada a la Comunicación 90, 171-188. Índice. 1. Introducción. 2. Datos generales e interfaz de consulta de los generadores. 2.1. Punto de partida. 2.2. Descripción general y metodología. 2.3. Aplicación web de consulta. 3. Los generadores automáticos en el panorama lexicográfico: tipología. 4. De la interfaz sintáctico-semántica a la generación automática. 4.1. El esquema argumental como punto de partida. 4.2. El significado combinatorio. 4.3. Los roles semánticos. 4.3.1. Los roles semánticos como desambiguadores de significado. 4.3.2. Los roles semánticos como instancias grupales. 4.3.3. A modo de resumen. 4.4. Rasgos ontológicos como componentes del significado combinatorio: prototipos léxicos y clases semánticas. 5. Conclusión y perspectivas de futuro. Agradecimientos. Referencias. 1. Introducción En la era de la inteligencia artificial y de la comunicación digital, el desarrollo de innovadores recursos lingüísticos y lexicográficos de calidad implica potenciar la integración y retroalimentación de datos, así como la automatización de técnicas y procedimientos de extracción, procesamiento y generación del lenguaje natural. En esta línea, un análisis de las publicaciones recogidas en OBELEXmeta –recurso que compila literatura científica en el campo de la lexicografía electrónica– permite constatar que desde los años 80 se establece una mayor interacción entre las áreas de la lexicografía y del procesamiento del lenguaje natural (PLN) y generación (GLN). De hecho, hace unas décadas no contaríamos con estudios como Lexicography and Natural Language Processing (Horák y Rambousek, 2018), Lexicography between NLP and Linguistics: Aspects of Theory and Practice (Trap-Jensen, 2018) o Natural Language Processing and Automatic Knowledge Extraction for Lexicography (Krek, 2019). 1 Universidade de Santiago de Compostela–Instituto da Lingua Galega. Correo electrónico: majo.dominguez@usc.es ORCID: https://orcid.org/0000- 0002-6060-9577 CLAC 90 2022: 171-188 171" 2312.16311v1,"http://lexikos.journals.ac.za; https://doi.org/10.5788/31-1-1623 Zur Darstellung eines mehrstufigen Prototypbegriffs in der multilingualen automatischen Sprachgenerierung: vom Korpus über word embeddings bis hin zum automatischen Wörterbuch María José Domínguez Vázquez, Universidade de Santiago de Compostela — ILG, Spain (majo.dominguez@usc.es) Zusammenfassung: Das multilinguale Wörterbuch zur Substantivvalenz Portlex gilt als Ausgangpunkt für die Entstehung der automatischen Sprachgeneratoren Xera und Combinatoria, deren Entwicklung und Handhabung hier präsentiert wird. Beide Prototypen dienen zur automatischen Generierung von Nominalphrasen mit ihren mono- und biargumentalen Valenzstellen, die u.a. als Wörterbuchbeispiele oder als integrierte Bestandteile künftiger autonomer E-Learning- Tools eine Anwendung finden könnten. Als Modelle für neuartige automatische Valenzwörterbücher mit Benutzerinteraktion fassen wir die Sprachgeneratoren in ihrem heutigen Zustand auf. Bei dem spezifischen methodologischen Verfahren zur Entwicklung der Sprachgeneratoren stellt sich die syntaktisch-semantische Beschreibung der vom Valenzträger eröffneten Leerstellen aus syntagmatischer und paradigmatischer Sicht als Schwerpunkt heraus. Zusammen mit Faktoren wie der Repräsentativität, der grammatischen Korrektheit, der semantischen Kohärenz, der Frequenz und der Vielfältigkeit der lexikalischen Kandidaten sowie der semantischen Klassen und der Argumentstrukturen, die feste Bestandteile beider Ressourcen sind, sticht ein mehrschichtiger Prototypsbegriff hervor. Die kombinierte Anwendung dieses Prototypbegriffs sowie von word embeddings zeigt zusammen mit Techniken aus dem Gebiet der maschinellen Verarbeitung und Generation natürlicher Sprache (NLP und NLG) einen neuen Weg zur künftigen Entwicklung von automatisch generierten plurilingualen Valenzwörterbüchern. Insgesamt stellt der Beitrag die Sprachgeneratoren sowohl aus der Perspektive ihrer Entwicklung als auch aus Nutzersicht dar. Der Fokuss wird auf die Rolle des Prototypbegriffs bei der Entwicklung der Ressourcen gelegt. Schlüsselwörter: NLG : NATURAL LANGUAGE GENERATION , AUTOMATISCHES WÖR - TERBUCH , INTERAKTIVES WÖRTERBUCH , SPRACHGENERATOREN , KORPUSLEXIKOGRA - PHIE , ONTOLOGIE , PROTOTYP , LEXIKALISCHER PROTOTYP , SEMANTISCHE PROTO - TYPISCHE KLASSEN Abstract: Towards the Description of a Multi-sided Prototype Concept in Multilingual Automatic Language Generation: From Corpus via Word Lexikos 31 (AFRILEX-reeks/series 31: 2021): 1-31" 2312.16313v1,"Unraveling the Key Components of OOD Generalization via Diversification Harold Benoit ∗,1,2 Liangze Jiang ∗,1 Andrei Atanov ∗,1 Mattia Rigotti 2 1 Oğuzhan Fatih Kar 1 Amir Zamir 1 Swiss Federal Institute of Technology (EPFL) 2 IBM Research Abstract Real-world datasets may contain multiple features that explain the training data equally well, i.e., learning any of them would lead to correct predictions on the training data. However, many of them can be spurious, i.e., lose their predictive power under a distribution shift and fail to generalize to out-of-distribution (OOD) data. Recently developed “diversification” methods (Lee et al., 2023; Pagliardini et al., 2023) approach this problem by finding multiple diverse hypotheses that rely on different features. This paper aims to study this class of methods and identify the key components contributing to their OOD generalization abilities. We show that (1) diversification methods are highly sensitive to the distribution of the unlabeled data used for diversification and can underperform significantly when away from a method-specific sweet spot. (2) Diversification alone is insufficient for OOD generalization. The choice of the used learning algorithm, e.g., the model’s architecture and pretraining, is crucial, and using the second-best choice leads to an up to 20% absolute drop in accuracy. (3) The optimal choice of learning algorithm depends on the unlabeled data, and vice versa. (4) Finally, we show that the above pitfalls cannot be alleviated by increasing the number of diverse hypotheses, allegedly the major feature of diversification methods. These findings provide a clearer understanding of the critical design factors influencing the OOD generalization of diversification methods. They can guide practitioners in how to use the existing methods best and guide researchers in developing new, better ones. 1 Introduction Achieving out-of-distribution (OOD) generalization is a crucial milestone for the real-world deployment of machine learning models. A core obstacle in this direction is the presence of spurious features, i.e., features that are predictive of the true label on the training data distribution but fail under a distribution shift. They may appear due to, for example, a bias in the data acquisition process (Oakden-Rayner et al., 2020)) or an environmental cue closely related to the true predictive feature (Beery et al., 2018). The presence of a spurious correlation between spurious features and true underlying labels implies that there are multiple hypotheses (i.e., labeling functions) that all describe training data equally well, i.e., have a low training error, but only some generalize to the OOD test data. Previous works (Atanov et al., 2022; Battaglia et al., 2018; Shah et al., 2020) have shown that in the presence of multiple predictive features, standard empirical risk minimization (Vapnik, 1991) (ERM) using neural networks trained with stochastic gradient descent (SGD) converges to a hypothesis that is most aligned with ∗ Equal contribution. Corresponding author: harold.benoit@alumni.epfl.ch" 2312.16315v1,"Recursos lexicográficos electrónicos multilingües y plurilingües: definición y clasificación tipológico-descriptiva María José Domínguez Vázquez Universidade de Santiago de Compostela majo.dominguez@usc.es Resumen: este estudio propone una clasificación de recursos lexicográficos electrónicos multilingües y plurilingües. Por una parte, la aplicación de criterios cuantitativos y cualitativos permitirá llevar a cabo una clasificación tipológica de herramientas lexicográficas, como diccionarios frente a plataformas y portales. Por otra parte, se aborda la distinción de recursos multilingües y plurilingües en términos de mayor o menor prototipicidad. Junto con la descripción de los diferentes recursos, el artículo presenta parámetros y propuestas tipológicas para la definición y delimitación de tipos de recursos electrónicos, en especial el diccionario multilingüe y los portales, y dibuja de manera más nítida el objeto de estudio de la lexicografía multilingüe y la plurilingüe. O, al menos, lo cuestiona. Palabras clave: lexicografía electrónica multilingüe, lexicografía electrónica plurilingüe, diccionario multilingüe, portal lexicográfico. Revista Internacional de Lenguas Extranjeras, n.º 10, 2019, 49–74 | DOI: 10.17345/rile10.49-74 ISSN: 2014-8100 - http://revistes.urv.cat/index.php/rile 49" 2312.16318v1,"1 Quantum Secure Protocols for Multiparty Computations Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stănică Abstract—Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face the threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and analysis of an informationtheoretic secure oblivious linear evaluation (OLE), namely qOLE in the quantum domain, and show that our qOLE is safe from external attacks. In addition, our scheme satisfies all the security requirements of a secure OLE. We further utilize qOLE as a building block to construct a quantum-safe multiparty private set intersection (MPSI) protocol. Index Terms—quantum computing, multiparty computation, private set intersection, oblivious linear evaluation I. I NTRODUCTION Secure multiparty computation (MPC) is crucial in safeguarding sensitive data. It allows two or more parties to jointly do the calculations on their private data without revealing anything but the output. Thus, MPC guarantees security features like privacy and confidentiality. The oblivious evaluation of a function is one of the most important primitives in cryptographic designs. In the work of Rabin [1], the idea of oblivious transfer (OT) was introduced. OT considers the setting where there are two parties: sender and receiver. The sender has two bits s 0 and s 1 , and the receiver can only learn one of the bits s b depending on his choice of bit b. Later, it was shown in [2] that OT can be used for oblivious evaluation of any cryptographic function. Over the past three decades, considerable advancements have been made in the design of generic OT-based MPC protocols. However, it is worth noting that specific types of functions can be evaluated more efficiently using direct constructions, bypassing the need for MPC. Considering this view, Naor et al. [3] designed the oblivious polynomial evaluation (OPE). It is a useful primitive which solves the problem of obliviously evaluating a polynomial P on an input α. To be more precise, OPE is a two-party protocol between two distrustful parties, where one party (say Bob) holds a private polynomial P (x), and another Tapaswini Mohanty is with the Department of Mathematics, National Institute of Technology, Jamshedpur 831 014, India (e-mail: mtapaswini37@gmail.com). Vikas Srivastava is with the Department of Mathematics, National Institute of Technology, Jamshedpur 831 014, India (e-mail: vikas.math123@gmail.com). Sumit Kumar Debnath is with the Department of Mathematics, National Institute of Technology, Jamshedpur 831 014, India (e-mail: sd.iitkgp@gmail.com, sdebnath.math@nitjsr.ac.in). Pantelimon Stănică is with the Department of Applied Mathematics, Naval Postgraduate School, Monterey, CA 93943, USA; (email: pstanica@nps.edu). party (say Alice) has a private input α. The goal of a secure OPE protocol is that Alice obtains P (α) and nothing else while Bob learns nothing. Oblivious linear evaluation (OLE) (which is just a special case of OPE) has been studied as an important primitive in secure MPC schemes for garbled arithmetic circuits [4], [5]. Instead of obliviously evaluating a polynomial P , we restrict ourselves to a linear function f (x) = ax + b in OLE. As noted in [6], OLE can also be used as an important building block in the design of Private Set Intersection (PSI) and its variants. We aim to work on this line of research in the quantum domain. PSI is an efficient and secure MPC protocol that facilitates clients to compute the intersection of private sets, ensuring that the confidential information of one party is not known to the others. Multiparty PSI (MPSI) is a naturally generalized version of the PSI protocol employed to find common elements in multiple sets without exposing and leaking information about the data except for the intersection. There exist many OLE and MPSI protocols [7]–[14] but, as known, their security relies on some number theoretic hardness assumptions [15]–[17] such as integer factorization problem and discrete logarithm problem. Because of Shor’s algorithm [18], these schemes face a huge security threat, and once big enough quantum computers are available, these existing state-of-the-art designs will become obsolete. It has led cryptographers worldwide to find alternative ways to construct MPC protocols such as OLE and MPSI. One line of research involves developing protocols based on mathematical problems resistant to quantum attacks, forming what we call post-quantum cryptography (PQC) [19]–[21]. However, PQC does not provide long-term security. Quantum cryptography (QC) offers a logical solution to nullify the future threat. It is because QC provides long-term protection and safety from the threat of quantum attacks. Therefore, it is need of hour to make use of QC for the construction of secure MPC protocols. Related works: Several quantum two-party private set intersection (PSI) protocols have been developed over the last decade. In 2016, Shi et al. [22] introduced a quantum protocol for calculating the intersection of private sets. However, their design had a vulnerability that allowed the server to manipulate the intersection results unilaterally. To address this issue, Cheng et al. [23] involved a passive third party in protocol [22] to ensure fairness. Shi et al. [24] later designed a protocol for the oblivious set member decision problem, which could be applied to private set intersection and union. In 2018, Maitra et al. [25] proposed a two-party computation for set intersections involving rational players. Recently, Debnath et al. [26], [27] developed quantum two-party PSI proto-" 2312.16321v1,"Polarization evolution equation for the exchange-strictionally formed II-type multiferroic materials Pavel A. Andreev ∗ Department of General Physics, Faculty of physics, Lomonosov Moscow State University, Moscow, Russian Federation, 119991. Mariya Iv. Trukhanova † Faculty of physics, Lomonosov Moscow State University, Moscow, Russian Federation, 119991. and Russian Academy of Sciences, Nuclear Safety Institute (IBRAE), B. Tulskaya 52, Moscow, Russian Federation, 115191. (Dated: December 29, 2023) The multiferroics are the materials, where single cell of a magnetically order crystal forms an electric dipole moment. We derive equation for the evolution of the macroscopic density of the electric dipole moment (polarization of the system). The derivation is made within the ”quantum hydrodynamic” method, which allows to derive equations for the evolution of the macroscopic functions of the quantum systems starting with the microscopic description. In this work we do not consider the microscopic level of individual electrons and ions, but we start our analysis from the combination of ions in cells of the crystal. We present an effective Hamiltonian for the evolution of such intermediate scale objects. We also apply the equation for the electric dipole moment of the single cell, which is recontracted in the corresponding operator. Using this operator and the wave function of combination of ions in the cell, we define the macroscopic density of the electric dipole moment. Finally, we apply the nonstationary Schrodinger equation with the chosen Hamiltonian in order to derive equation evolution of the polarization. The derivation is made for the dipole formed by the exchange-striction mechanism in the II-type multiferroic materials. The interaction caused term in the polarization evolution equation is found to be proportional to the fourth space derivative of mixed product (triple scalar product) of three spin density vectors. Conditions are discussed for the regime, where interaction appears in a smaller order on the space derivatives. Keywords: I. INTRODUCTION Ferromagnetic materials and ferroelectric (segnetoelectric) materials are examples of materials with expressive magnetic or electric properties. The magneto-electric effect is an example of cooperation of these properties in the single sample. Redistribution of ions in the crystal cell including ions with the large magnetic moments leads to the formation of the electric dipole moment of the cell. So, the sample shows the ferroelectric properties. There are the I-type multiferroic materials, where the existence of the ferroelectric formation is independent of the ferromagnetic order. In the II-type multiferroic materials, the electric dipole moment is formed in relation to the magnetic properties of the material. There are three mechanisms of the formation of the electric dipole moment in the II-type multiferroics. The first mechanism is the exchange-striction mechanism arising from the Coulomb exchange interaction modeled using the Heisenberg Hamiltonian (which is also called the symmetric spin exchange interaction). The second mechanism is related to the spin-current model. It arises from the antisymmetric spin exchange interaction or inverse ∗ Electronic address: andreevpa@physics.msu.ru † Electronic address: trukhanova@physics.msu.ru Dzylaoshinskii-Moriya model [1]. Basically, it is related to the exchange part of the spin-orbit interaction. Let us remind that the spin-orbit interaction is a relativistic effects, which manifests itself in the weakly-relativistic regime. From physical point of view, it is the action of the electric field on the moving magnetic moment [2]. The third mechanism is the spin dependent p–d hybridization appearing due to the relativistic spin-–orbit coupling. Each mechanism leads to specific form of the electric dipole moment in relation to the spins/magnetic moments of the ions. In this work we focus on the first mechanism of dipole moment formation. We assume that the dipole moment of the cell is given. So, we do not derive its form, but we use its form for the definition of the macroscopic polarization. Our analysis shows that the polarization evolution equation is rather complex. Therefore, it is essential to consider different interactions separately, in order to understand their role in the evolution of the multiferroics. In this paper we focus on the role of the Coulomb exchange interaction (we use the Heisenberg Hamiltonian). Definitely, it plays essential role in the evolution of the chosen kind of multiferroics since the electric dipole moment of the cell is formed by this interaction. The Coulomb exchange interaction can contribute in the evolution of polarization of other types of the multiferroics, but it would required independent consideration of the polarization evolution equation. Multiferroics are the magnetically ordered materials." 2312.16342v1,"DRAFT VERSION December 29, 2023 Entanglement dynamics of accelerated atoms interacting with the Electromagnetic Field M. S. Soares 1 , N. F. Svaiter 2 Centro Brasileiro de Pesquisas Fı́sicas Rua Xavier Sigaud, 150 - Urca, Rio de Janeiro - RJ, 22290-180, Brazil G. Menezes 3 4 Instituto de Fı́sica Teórica, Universidade Estadual Paulista Rua Dr. Bento Teobaldo Ferraz, 271 - Bloco II, 01140-070 São Paulo, SP, Brazil Abstract We study the effects of acceleration in entanglement dynamics using the theory of open quantum systems. In this scenario we consider two atoms moving along different hyperbolic trajectories with different proper times. The generalized master equation is used for a pair of dipoles interacting with the electromagnetic field. We observe that the proper acceleration plays an essential role in the entanglement harvesting and sudden death phenomenom and we study how the polarization of the atoms affects this results. 1 Introduction Entanglement remains one of the most perplexing and captivating property of quantum mechanics. One popular definition is that it occurs when the Hilbert space of a closed system cannot be described as a tensor product of pure states of subsystems [1]. This long range correlation has opened up new frontiers for many research areas such as quantum information, quantum computation and quantum optics [2]. In this work, we discuss entanglement dynamics of uniformly accelerated atoms using the formalism constructed to deal with open quantum systems. We intend to merge some protocols of quantum optics/information with the insights from the Unruh-Davies effect [3–5]. In Minkowski spacetime inertial observers perform the canonical quantization with an unique Poincaré invariant Minkowski vacuum |0, Mi. In a generic curved spacetime this usual quantization with an unique vacuum cannot be implemented. This problem also appears for observers in Minkowski spacetime that do not travel in inertial worldlines [6]. In 1973, Fulling discussed the quantization of a massive scalar field performed by an observer in an uniformly accelerated reference frame [7]. Using the fact that the worldlines of uniformly accelerated observers are integral curves of a timelike Killing vectors field, the canonical quantization can also be implemented in this situation. The vacuum state of such a construction is the Rindler vacuum |0, Ri. Instead of discussing non-unitarily equivalent quantization using the Bogoliubov 1 E-mail address: matheus.soares@cbpf.br E-mail address: nfuxsvai@cbpf.br 3 E-mail address: gabrielmenezes@ufrrj.br 4 On leave of absence from Departamento de Fı́sica, Universidade Federal Rural do Rio de Janeiro. 2 1" 2312.16361v1,"Shih, JL. et al. (Eds.) (2023). Proceedings of the 31 st International Conference on Computers in Education. Asia-Pacific Society for Computers in Education DLOT: An open-source application to assist human observers Ashwin T S a* , Danish Shafi SHAIKH a , & Ramkumar RAJENDRAN a a Indian Institute of Technology, Bombay *ashwindixit9@gmail.com Abstract: Adaptive intelligent educational systems are gaining popularity, offering personalized learning experiences to students based on their individual needs and styles. One crucial feature of such systems is real-time personalized feedback. However, identifying real-time learning processes impacting student performance remains challenging due to data volume constraints. Current research often relies on labor-intensive human observation, which is time-consuming and not scalable. To efficiently collect real-time data, an observation tool is essential. Qualitative/Mixed Method research explores participant experiences in education, social science, and healthcare, utilizing methods like focus groups and observations. However, these methods can be labor-intensive, particularly in maintaining observation time intervals. Existing tools lack comprehensive support for education-focused focus groups and observations. To address these issues, this paper introduces the Data Logging and Organizational Tool (DLOT), a flexible tool designed for qualitative studies with human observers. DLOT offers customizable time intervals, cross-platform compatibility, and data saving and sharing options. The tool empowers observers to log timestamped data and is available on GitHub. The DLOT was validated through two studies. The first study predicted students' affective states using real-time annotations collected via DLOT, observing 30 students in each class. The second study created multimodal datasets in a computer-enabled learning environment, observing 38 students individually. A successful usability test was conducted, offering a potential solution to challenges in real-time learning process identification and labor-intensive qualitative research observation. Keywords: Human Observation, Annotation Tool, Application, Data Logging, Computer Assisted Direct Observation, Minimal Attention User Interfaces 1. Introduction Adaptive intelligent educational systems are becoming increasingly popular, particularly in distance learning and online education. These systems are designed to provide personalized learning experiences to students, catering to their individual learning needs and styles. One of the key features of such systems is the provision of personalized feedback to students based on their learning processes. To be effective, this feedback needs to be provided in realtime as the student interacts with the learning environment (Mousavinasab et al., 2021, Ashwin & Guddeti, 2020, Taub et al. 2021). Identifying the various learning processes that contribute to a student's real-time performance is a challenging task. These processes include self-regulated learning, cognitive engagement, metacognition, affective states, behavioral and interactional dynamics with peers, collaborative learning, uncertainty, feedback seeking, empathy, and group dynamics. To train machine learning models to detect these processes in real-time, a large amount of annotated data is necessary to identify, classify, or predict these constructs (Sinatra, Heddy, & Lombardi, 2015, Praharaj et al. 2021, Ashwin & Guddeti, 2019, Munshi et al. 2018). Current research in this area involves human observation, where video recordings are analyzed after the study has concluded. However, this method is time-consuming, laborintensive, and not scalable. Automated machine learning models also face challenges in realtime identification of these constructs due to insufficient data (Wu et al. 2022, TS & Guddeti, 2020). Hence, there is a need for a reliable observation tool that can collect data quickly and efficiently in real-time. Such a tool could revolutionize the field of adaptive intelligent" 2312.16362v1,"Shih, JL. et al. (Eds.) (2023). Proceedings of the 31 st International Conference on Computers in Education. Asia-Pacific Society for Computers in Education Keeping Teams in the Game: Predicting Dropouts in Online Problem-Based Learning Competition Aditya PANWAR a* , Ashwin TS a , Ramkumar RAJENDRAN a & Kavi ARYA a IDP in Educational Technology, Indian Institute of Technology Bombay, INDIA adityapanwar@iitb.ac.in a Abstract: Online learning and MOOCs have become increasingly popular in recent years, and the trend will continue, given the technology boom. There is a dire need to observe learners' behavior in these online courses, similar to what instructors do in a face-to-face classroom. Learners’ strategies and activities become crucial to understanding their behavior. One major challenge in online courses is predicting and preventing dropout behavior. While several studies have tried to perform such analysis, there is still a shortage of studies that employ different data streams to understand and predict the drop rates. Moreover, studies rarely use a fully online team-based collaborative environment as their context. Thus, the current study employs an online longitudinal problem-based learning (PBL) collaborative robotics competition as the testbed. Through methodological triangulation, the study aims to predict dropout behavior via the contributions of Discourse discussion forum ‘activities’ of participating teams, along with a self-reported Online Learning Strategies Questionnaire (OSLQ). The study also uses Qualitative interviews to enhance the ground truth and results. The OSLQ data is collected from more than 4000 participants. Furthermore, the study seeks to establish the reliability of OSLQ to advance research within online environments. Various Machine Learning algorithms are applied to analyze the data. The findings demonstrate the reliability of OSLQ with our substantial sample size and reveal promising results for predicting the dropout rate in online competition. Overall, the study contributes to online learning by addressing the need to understand and predict dropout behavior in online courses. The study’s methodological triangulation, involving qualitative interviews, provides insights into such contexts' unique dynamics and challenges by utilizing a fully online team-based collaborative environment. Keywords: Predictive Models, Machine Learning, Discussion Forum Interaction, Self-Regulated Learning, PBL, Collaboration, Robotics 1. Introduction & Related Literature There has been a tremendous increase in online courses worldwide for Undergraduate students in engineering and all other fields. COVID-19 has further triggered MOOC enrolment numbers to an exponential level (Baudo & Mezzera, 2021). However, the most prominent drawback of online courses is their high attrition rate; the completion rate usually falls between 2-10% (Maxwell et al., 2018). The success and learning in online courses may be directly attributed to student performance, which can be further attributed to several key factors like content interaction, student satisfaction (Zimmerman, 2012), engagement & activity with course material (Soffer & Cohen, 2019), and motivation (Loizzo, Ertmer, Watson, & Watson, 2017), to list a few. Many such factors can be observed or assessed in a traditional classroom with limited participants. The instructor can guide, adapt and help the ‘failing’ students towards success. All these factors become even more critical when dealing with the online setting where the significant learner interactions are via the resources/content and maybe a discussion or query forum. This necessitates exploring the reasons for dropouts to alleviate this issue and provide an opportunity to inform the instructors to adapt the curriculum/task design, motivate, provide feedback, and devise other ways to keep" 2312.16373v1,"Limiting behavior of bilinear forms for the resolvent of sample covariance matrices under elliptical distribution with applications Yanqing Yin 1 and Wang Zhou 2 1 School of Mathematics and Statistics, Chongqing University, e-mail: yinyq@cqu.edu.cn 2 Department of Statistics and Data Science, National University of Singapore , e-mail: wangzhou@nus.edu.sg Abstract: In this paper, we introduce a joint central limit theorem (CLT) for specific bilinear forms, encompassing the resolvent of the sample covariance matrix under an elliptical distribution. Through an exhaustive exploration of our theoretical findings, we unveil a phase transition in the limiting parameters that relies on the moments of the random radius in our derived CLT. Subsequently, we employ the established CLT to address two statistical challenges under elliptical distribution. The first task involves deriving the CLT for eigenvector statistics of the sample covariance matrix. The second task aims to ascertain the limiting properties of the spiked sample eigenvalues under a general spiked model. As a byproduct, we discover that the eigenmatrix of the sample covariance matrix under a light-tailed elliptical distribution satisfies the necessary conditions for asymptotic Haar, thereby extending the Haar conjecture to broader distributions. MSC2020 subject classifications: Primary 62H15, 62B20; secondary 62D10. Keywords and phrases: high dimension covariance matrix; central limit theorem; Haar conjecture; elliptical distribution; spiked model. 1. Introduction and motivation The covariance matrix assumes a central role in multivariate statistical analysis, and numerous statistical inferences hinge on the spectral properties of the population covariance matrix (PCM). In high-dimensional scenarios, the sample covariance matrix (SCM) ceases to be a reliable estimator for the PCM in a spectral sense. Nevertheless, considerable efforts have been devoted to exploring the relationship between them. This investigation is crucial as it aids in making statistical inferences based on the observed data.Starting from the pioneering work of Wishart [22], which examined the properties of the eigenspace of Wishart matrices, researchers have devoted significant efforts to enhancing the generality of data models to better align with real-world applications. In the past decades, the most extensively investigated data model is undoubtedly the independent component structure (ICS). We refer the readers to Bai and Silverstein [5], Bao et al. [6], Bloemendal et al. [8], Knowles and Yin [16] and references therein. This model, serving as a natural extension of the multivariate Gaussian, assumes that a high-dimensional random population is a linear transformation of a random vector with independent and identically distributed (i.i.d.) entries. However, it has been recognized that this model excludes some significant distribution families, such as the elliptical family. We define a random vector y to follow an elliptically correlated structure (ECS) if and only if it has a stochastic representation given by: y = ρΓu + µ. Here, the matrix Γ ∈ R p×p and vector µ ∈ R p are non-random, with rank(Γ) = p. The scalar variable ρ ≥ 0 represents the radius of y, and u ∈ R p is the random direction. The random direction u is independent of ρ and uniformly distributed on the unit sphere S p−1 in R p , denoted by u ∼ U (S p−1 ) in the subsequent discussion. This data model naturally extends the concept of multivariate normal distributions, offering a distinct orientation compared to the independent component structure (ICS) model. It adeptly captures the dependence structure among multiple variables, providing a versatile 1" 2312.16377v1,"Heavy-Traffic Optimal Size- and State-Aware Dispatching RUNHAN XIE, University of California, Berkeley, USA ISAAC GROSOF, Carnegie Mellon University, USA and Georgia Institute of Technology, USA ZIV SCULLY, Cornell University, USA Dispatching systems, where arriving jobs are immediately assigned to one of multiple queues, are ubiquitous in computer systems and service systems. A natural and practically relevant model is one in which each queue serves jobs in FCFS (First-Come First-Served) order. We consider the case where the dispatcher is size-aware, meaning it learns the size (i.e. service time) of each job as it arrives; and state-aware, meaning it always knows the amount of work (i.e. total remaining service time) at each queue. While size- and state-aware dispatching to FCFS queues has been extensively studied, little is known about optimal dispatching for the objective of minimizing mean delay. A major obstacle is that no nontrivial lower bound on mean delay is known, even in heavy traffic (i.e. the limit as load approaches capacity). This makes it difficult to prove that any given policy is optimal, or even heavy-traffic optimal. In this work, we propose the first size- and state-aware dispatching policy that provably minimizes mean delay in heavy traffic. Our policy, called CARD (Controlled Asymmetry Reduces Delay), keeps all but one of the queues short, then routes as few jobs as possible to the one long queue. We prove an upper bound on CARD’s mean delay, and we prove the first nontrivial lower bound on the mean delay of any size- and state-aware dispatching policy. Both results apply to any number of servers. Our bounds match in heavy traffic, implying CARD’s heavy-traffic optimality. In particular, CARD’s heavy-traffic performance improves upon that of LWL (Least Work Left), SITA (Size Interval Task Assignment), and other policies from the literature whose heavy-traffic performance is known. 1 INTRODUCTION Dispatching, or load balancing, is at the heart of many computer systems, service systems, transportation systems, and systems in other domains. In such systems, jobs arrive over time, and each job must be irrevocably sent to one of multiple queues as soon as it arrives. It is common for each queue to be served in First-Come First-Served (FCFS) order Motivated by the ubiquity of dispatching, we study a classical problem in dispatching theory: 1 How should one dispatch to FCFS queues to minimize the jobs’ mean response time? We specifically consider size- and state-aware dispatching. This means that the dispatcher learns a job’s size, or service time, when the job arrives; and the dispatcher always knows how much work, or total remaining service time, there is at each queue. We make typical stochastic assumptions about the job arrival process, working with M/G arrivals (see Section 2). Despite the extensive literature on dispatching in queueing theory (see Section 1.2), optimal size- and state-aware dispatching is an open problem, as highlighted by Hyytiä et al. [21]. The problem is a Markov decision process, so it can in principle be approximately solved numerically [25]. But the numerical approach has two drawbacks. First, the curse of dimensionality makes computation impractical for large numbers of queues. Second, being able to numerically solve any specific instance (meaning a given number of queues, job size distribution, and load) does not readily provide insight that applies to all instances. 1 A job’s response time (a.k.a. sojourn time, latency, delay) is the amount of time between its arrival and its completion. Authors’ addresses: Runhan Xie, runhan_xie@berkeley.edu, University of California, Berkeley, Department of Industrial Engineering and Operations Research, Berkeley, CA, USA; Isaac Grosof, igrosof@cs.cmu.edu, igrosof3@gatech.edu, Carnegie Mellon University, Computer Science Department, Pittsburgh, PA, USA and Georgia Institute of Technology, School of Industrial and Systems Engineering, Atlanta, GA, USA; Ziv Scully, zivscully@cornell.edu, Cornell University, School of Operations Research and Information Engineering, Ithaca, NY, USA." 2312.16387v1,"A comprehensive study on the accuracy and generalization of deep learning-generated chemical ODE integrators Han Li a,b,1 , Ruixin Yang a,b,1 , Yangchen Xu a , Min Zhang a,b , Runze Mao a,b , Zhi X. Chen a,b,∗ a State Key Laboratory of Turbulence and Complex Systems, Aeronautics and Astronautics, College of Engineering, Peking University, Beijing, 100871, China b AI for Science Institute (AISI), Beijing, 100080, China Abstract The application of deep neural networks (DNNs) holds considerable promise as a substitute for the direct integration of chemical source terms in combustion simulations. However, challenges persist in ensuring high precision and generalisation across various different fuels and flow conditions. In this study, we propose and validate a consistent DNN approach for chemistry integration in a range of fuels and premixed flame configurations. This approach generates thermochemical base state from a set of low-dimensional laminar flames, followed by an effective perturbation strategy to enhance the coverage of the composition space for higher generalisation ability. A constraint criterion based on heat release rate is then employed to remove the nonphysical perturbed states for improved accuracy. Without specific tuning, three DNNs are consistently trained for three representative fuels, i.e., hydrogen, ethylene and Jet-A. Comprehensive validations are conducted using 1-D laminar flames and two typical turbulent premixed flames. The DNN model predictions on various physical characteristics, including laminar and turbulent flame speeds, dynamic flame structures influenced by turbulence-chemistry interactions, and conditional scalar profiles, all exhibit good agreement with the results obtained from direct integration. This demonstrates the exceptional accuracy and generalisation ability of the proposed DNN approach. Furthermore, when the DNN is used in the simulation, a significant speed-up for the chemistry integration is achieved, approximately 50 for the ethylene/air flame and 90 for the Jet-A/air flame. Keywords: Machine learning; Chemistry integration; Turbulent combustion modelling; Deep Neutral Network *Corresponding author. E-mail address: chenzhi@pku.edu.cn (Zhi X. Chen). 1" 2312.16396v1,"Supersymmetric deformation of the CP 1 model and its conformal limits Dmitri Bykov ∗1,2 and Anton Pribytok †1,3 1 Steklov Mathematical Institute of Russian Academy of Sciences, Gubkina str. 8, 119991 Moscow, Russia 2 Institute for Theoretical and Mathematical Physics, Lomonosov Moscow State University, 119991 Moscow, Russia 3 Dipartimento di Fisica e Astronomia Galileo Galilei, Università di Padova, Via Marzolo 8, 35131, Padova, Italy Abstract We prove that the supersymmetric deformed CP 1 sigma model (the generalization of the Fateev-Onofri-Zamolodchikov model) admits an equivalent description as a gener- alized Gross-Neveu model. This formalism is useful for the study of renormalization properties and particularly for calculation of the one- and two-loop β-function. We show that in the UV the superdeformed model flows to the super-Thirring CFT, for which we also develop a superspace approach. It is then demonstrated that the super- Thirring model is equivalent to a sigma model with the cylinder R ˆ S 1 target space by an explicit computation of the correlation functions on both sides. Apart from that, we observe that the original model has another interesting conformal limit, given by the supercigar model, which as well could be described in the Gross-Neveu approach. ∗ † bykov@mi-ras.ru, dmitri.v.bykov@gmail.com antons.pribitoks@pd.infn.it, a.pribytok@gmail.com 1" 2312.16414v1,"B ELLMAN O PTIMAL S TEP - SIZE S TRAIGHTENING OF F LOW -M ATCHING M ODELS Bao Nguyen VinUniversity, bao.nn2@vinuni.edu.vn Binh Nguyen National University of Singapore, binhnt@nus.edu.sg Viet Anh Nguyen Chinese University of Hong Kong, nguyen@se.cuhk.edu.hk A BSTRACT Flow matching is a powerful framework for generating high-quality samples in various applications, especially image synthesis. However, the intensive computational demands of these models, especially during the fine-tuning process and sampling processes, pose significant challenges for low-resource scenarios. This paper introduces Bellman Optimal Step-size Straightening (BOSS) technique for distilling flow-matching generative models: it aims specifically for a few-step efficient image sampling while adhering to a computational budget constraint. First, this technique involves a dynamic programming algorithm that optimizes the step sizes of the pretrained network. Then, it refines the velocity network to match the optimal step sizes, aiming to straighten the generation paths. Extensive experimental evaluations across image generation tasks demonstrate the efficacy of BOSS in terms of both resource utilization and image quality. Our results reveal that BOSS achieves substantial gains in efficiency while maintaining competitive sample quality, effectively bridging the gap between low-resource constraints and the demanding requirements of flow-matching generative models. Our paper also fortifies the responsible development of artificial intelligence, offering a more sustainable generative model that reduces computational costs and environmental footprints. Our code can be found at https://anonymous.4open.science/r/DRL-8E88. 1 I NTRODUCTION There are impressive advancements in deep generative models in recent years, which constitute an appealing set of approaches capable of approximating data distributions and generating high-quality samples, as showcased in influential works such as Ramesh et al. (2022); Saharia et al. (2022); Rombach et al. (2022). They are primarily driven by a category of time-dependent generative models that utilize a predefined probability path, denoted as {π t } t∈[0,1] . This probability path constitutes a process that interpolates between the initial noise distribution π 0 and the target data distribution π 1 . The training for these models can be broadly characterized as a regression task involving a neural network function v θ which maps any input data x at time t ∈ [0, 1) to a vector-valued velocity quantity v θ (x, t) by minimizing the expected loss between v θ (x, t) and a target ideal velocity v t (x): L(θ) := E t∈[0,1], X t ∼π t [ℓ(v θ (X t , t), v t (X t ))]. The velocity network v θ plays a crucial role in the generation of samples from the interpolation process through the relationship: Z 1 X 1 = X 0 + v θ (X t , t)dt, 0 which is the solution of the ODE dX t = v θ (x t , t)dt with the boundary condition X t=0 = X 0 . A noteworthy class of algorithms that fits within this framework includes denoising diffusion models (Ho et al., 2020; Song et al., 2020a;b) and the more recent flow-matching/rectified-flow models (Liu et al., 2022b; Lipman et al., 2022; Albergo & Vanden-Eijnden, 2022; Neklyudov et al., 2023). These 1" 2312.16421v1,"Blow-up solutions concentrated along minimal submanifolds for asymptotically critical Lane-Emden systems on Riemannian manifolds Wenjing Chen ∗† and Zexi Wang School of Mathematics and Statistics, Southwest University, Chongqing, 400715, P.R. China Abstract Let (M, g) and (K, κ) be two Riemannian manifolds of dimensions N and m, respectively. Let ω ∈ C 2 (M), ω > 0. The warped product M × ω K is the (N + m)-dimensional product manifold M × K furnished with metric g + ω 2 κ. We are concerned with the following elliptic system    −∆ g+ω 2 κ u + h(x)u = v p−αε , in (M × ω K, g + ω 2 κ),   (0.1) −∆ g+ω 2 κ v + h(x)v = u q−βε , in (M × ω K, g + ω 2 κ),     u, v > 0, in (M × ω K, g + ω 2 κ), where ∆ g+ω 2 κ = div g+ω 2 κ ∇ is the Laplace-Beltrami operator on M × ω K, h(x) is a C 1 -function on M × ω K, ε > 0 is a small parameter, α, β > 0 are real numbers, ε is a positive parameter, 1 1 + q+1 = N N −2 . For any given integer k ≥ 2, using the (p, q) ∈ (1, +∞) × (1, +∞) satisfies p+1 Lyapunov-Schmidt reduction, we prove that problem (0.1) has a k-peaks solution concentrated along a m-dimensional minimal submanifold of (M × ω K) k . Keywords: Blow-up solutions; Concentrated along minimal submanifold; Lane-Emden system; Riemannian manifolds. 2020 Mathematics Subject Classification: 58J05, 35J47, 35B33. 1 Introduction Let (M, g) be a n-dimensional smooth compact Riemannian manifold without boundary, where g denotes the metric tensor. We consider the following elliptic system    −∆ g u + h(x)u = v p , in (M, g),   (1.1) −∆ g v + h(x)v = u q , in (M, g),     u, v > 0, in (M, g), where ∆ g = div g ∇ is the Laplace-Beltrami operator on M, h(x) is a C 1 -function on M, p, q > 1. ∗ † Corresponding author. E-mail address: wjchen@swu.edu.cn (W. Chen), zxwangmath@163.com (Z. Wang). 1" 2312.16436v1,"2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA) Gemini: Mapping and Architecture Co-exploration for Large-scale DNN Chiplet Accelerators Jingwei Cai † , Zuotong Wu ‡§ , Sen Peng ‡§ , Yuchen Wei † , Zhanhong Tan † , Guiming Shi † , Mingyu Gao †¶∗ and Kaisheng Ma †∗ Tsinghua University † , Xi’an Jiaotong University ‡ , IIISCT § , Shanghai AI Laboratory ¶ Corresponding Author ∗ {caijw21,gaomy,kaisheng}@tsinghua.edu.cn Abstract—Chiplet technology enables the integration of an increasing number of transistors on a single accelerator with higher yield in the post-Moore era, addressing the immense computational demands arising from rapid AI advancements. However, it also introduces more expensive packaging costs and costly Die-to-Die (D2D) interfaces, which require more area, consume higher power, and offer lower bandwidth than onchip interconnects. Maximizing the benefits and minimizing the drawbacks of chiplet technology is crucial for developing largescale DNN chiplet accelerators, which poses challenges to both architecture and mapping. Despite its importance in the post- Moore era, methods to address these challenges remain scarce. To bridge the gap, we first propose a layer-centric encoding method to encode Layer-Pipeline (LP) spatial mapping for largescale DNN inference accelerators and depict the optimization space of it. Based on it, we analyze the unexplored optimization opportunities within this space, which play a more crucial role in chiplet scenarios. Based on the encoding method and a highly configurable and universal hardware template, we propose an architecture and mapping co-exploration framework, Gemini, to explore the design and mapping space of large-scale DNN chiplet accelerators while taking monetary cost (MC), performance, and energy efficiency into account. Compared to the state-of-the-art (SOTA) Simba architecture with SOTA Tangram LP Mapping, Gemini’s co-optimized architecture and mapping achieve, on average, 1.98× performance improvement and 1.41× energy efficiency improvement simultaneously across various DNNs and batch sizes, with only a 14.3% increase in monetary cost. Moreover, we leverage Gemini to uncover intriguing insights into the methods for utilizing chiplet technology in architecture design and mapping DNN workloads under chiplet scenarios. The Gemini framework is open-sourced at https://github.com/SET- Scheduling-Project/GEMINI-HPCA2024. I. I NTRODUCTION As Deep Neural Networks (DNNs) tackle increasingly complex problems, their size and complexity grow rapidly, resulting in increased computing and storage demands [9], [10], [51], [56], [63]. While applying more advanced technology and enlarging single chip sizes have led to the development of many large-scale monolithic accelerators with tens of billions of transistors [23], [24], [28], [55], the end of Moore’s Law [35] and limited photomask size pose significant challenges to further transistor integration. Chiplet technology, using advanced packaging to combine small functional dies, offers a promising solution to overcome these limitations and enable continuous transistor integration. Chiplet-based DNN inference accelerators, such as Simba with 36 dies [46], have emerged. However, this technology introduces new challenges for architectural design and DNN mapping for large-scale chiplet accelerators, which are outlined below: For architecture design, the main challenge is determining the optimal chiplet granularity. While chiplet technology improves area limits and yield, it introduces higher packaging expenses and D2D interconnection costs. D2D interconnections are more energy and area-intensive, but provide lower bandwidth than on-chip lines. All the above adverse effects are collectively referred to as Chiplet Costs. Consequently, A trade-off arises between using more smaller chiplets for better yield and fewer larger chiplets for lower Chiplet Costs. Balancing this trade-off remains an unsolved challenge. For DNN mapping, the main challenges stem from the larger scale enabled by chiplet technology, and the costly D2D links. For the first challenge, maintaining high utilization and energy efficiency becomes increasingly difficult with the growing scale of accelerators. LP mapping, in which multiple layers are spatially mapped onto the accelerator, is widely employed by large-scale accelerators in both academia [15], [45], [46], [57] and industry [21], [52], [55] to relieve the challenge. The core of LP mapping is spatial mapping (SPM), which determines which part of which layer is allocated to which core, and significantly impacts the performance and energy efficiency of large-scale accelerators. Despite the importance of LP SPM, most current strategies are still heuristic [15], [21], [46], [55], [57]. The problems and optimization space of LP SPM have not been clearly defined, exhaustively explored, or fully understood. This limitation constrains the ability to fully leverage optimization opportunities in LP mapping, which becomes increasingly important as the scale of accelerators and the structural complexity of DNNs increase. The second challenge lies in that D2D links tend to consume more energy and provide lower bandwidth than on-chip lines. Therefore, devising spatial mapping strategies that can automatically reduce D2D communications is vital for enhancing chiplet accelerator performance and efficiency, and fully harnessing the benefits provided by chiplet technology. However, there is a noticeable absence of such approaches in the existing literature. The above analysis reveals that the employment of chiplet technology introduces intricate trade-offs and challenges." 2312.16448v1,"Randomized Signature Methods in Optimal Portfolio Selection Erdinç Akyildirim a,b , Matteo Gambara a , Josef Teichmann a , Syang Zhou a a b Department of Mathematics, ETH, Zurich, Switzerland Department of Banking and Finance, University of Zurich, Zurich, Switzerland Abstract We present convincing empirical results on the application of Randomized Signature Methods for non-linear, non-parametric drift estimation for a multi-variate financial market. Even though drift estimation is notoriously ill defined due to small signal to noise ratio, one can still try to learn optimal non-linear maps from data to future returns for the purposes of portfolio optimization. Randomized Signatures, in constrast to classical signatures, allow for high dimensional market dimension and provide features on the same scale. We do not contribute to the theory of Randomized Signatures here, but rather present our empirical findings on portfolio selection in real world settings including real market data and transaction costs. Keywords: Machine Learning, Randomized Signature, Drift estimation, Returns forecast, Portfolio Optimization, Path-dependent Signal JEL: C21, C22, G11, G14, G17 1. Introduction Optimal portfolio construction is one of the most fundamental problems in quantitative finance. It refers to selecting and allocating assets to achieve a balance between risk and return. An optimal portfolio aligns with an investor’s specific objectives, risk tolerance, and time horizon. In that sense, optimal implies achieving the best trade-off between expected return and risk based on the fact that different investors will have different optimal portfolios depending on their unique goals and risk tolerances. Notice that a priori neither the precise optimization problem nor the underlying model for the evolution of the market are known to the investor. The former needs a quantification of risk tolerance, time horizon, the latter needs an estimation of model parameters. There are several fundamental methods for constructing an optimal portfolio. Modern Portfolio Theory (MPT) which is developed by Harry Markowitz in his seminal work Email addresses: erdinc.akyildirim@bf.uzh.ch (Erdinç Akyildirim), matteo.gambara@gmail.com (Matteo Gambara), josef.teichmann@math.ethz.ch (Josef Teichmann), syang.zhou@math.ethz.ch (Syang Zhou)" 2312.16454v1,"APS/123-QED A Lindbladian From Feynman-Vernon Jose A. Magpantay Quezon City, Philippines ∗ (Dated: December 29, 2023) The effective dynamics of a system interacting with a bath or environment is presented in two ways, (1) the (LGKS) replacement of the von Neuman equation for the density matrix and (2) the Feynman-Vernon path integral derivation, by integrating out the bath degrees of freedom, to arrive at the propagator of the system’s density matrix. In this paper I connect the two methods by deriving a Lindbladian in a mechanical example, a point particle interacting with a bath of harmonic oscillators, previously considered by Feynman and Vernon (FV) and expounded on later by Caldeira and Leggett (CL). But the (FV)/(CL) results only in non-Markov effect, memory terms from the bath interaction. To derive a Lindbladian, I changed the interaction term they considered to take into account the point particle interacting with the bath harmonic oscillators to something more realistic. From the resulting path-integral expression of the system’s propagator for the density matrix, the Lindbladian and the non-Markov term are read for this simple problem. I also point out the causes of these terms, the Markov Lindbladian from the very local interaction of the point particle with the classical solutions of the harmonic oscillator and the non-Markov term from the global interaction of the point particle with the fluctuations of the classical solutions. PACS numbers: Valid PACS appear here 1. There are two ways to deal with the quantum statistics of open systems, the first and derived earlier using path-integral techniques is the Feynman-Vernon (FV) theory [1] and the second derived more than a decade later is what became known as the Lindblad equation [2], which was also independently derived at about the same time by Gorini, Kossakowski and Sudarshan (GKS) [3], from hereon will be referred to as the (LGKS) approach. The (LGKS) approach derives the replacement of the von Neuman equation for the density operator/matrix (see any statistical mechanics book, for example [4]), under the general conditions of Hermiticity, Markov process and complete positivity. The Feynman-Vernon starts from the system-bath interaction and derive, using the path-integral method, the system’s density matrix at any time t by integrating out the environment/bath degrees of freedom. However, still at this time there has been no paper that relates (LGKS) from (FV). The link is crucial for it will provide how the terms that appear in the (LGKS), the Hamiltonian and the Lindblad operator, are given in terms of the system-bath dynamics. But in a certain sense, the link does not seem to be warranted for the simple reason that (FV), being a sum over histories approach would naturally be dominated by memory effects, thus non-Markov, while the (LGKS) is limited by the Markov process condition, along with two other conditions. Regardless of the above ideas, it is interesting to find out if the Lindblad equation can be derived from the Feynman- Vernon path-integral approach to quantum statistical mechanics. Maybe even in doing the sum over histories of the bath, there may be non memory effects that can be isolated. But most likely it depends on the interaction between the bath and the system. The (FV)/(CL) point particle interacting with a bath of harmonic oscillators clearly show the dominance of memory effects, the only path-integral result for this problem is what I called the Lindblad Plus [6], the Plus represents the memory effect terms. 2. I begin by summarizing known ideas about von Neuman type equations in statistical mechanics. First, for a closed system, described by a Hamiltonian H(x, p), the von Neuman equation for the density operator ρ is given by, see for example [4] ∂ρ = [H, ρ] . ∂t (1) i i ρ(t) = exp (− Ht)ρ(0) exp (+ Ht), ~ ~ (2) i~ The solution to equation (1) ∗ Electronic address: jose.magpantay11@gmail.com" 2312.16496v1,"Rational Economic Behaviours in the Bitcoin Lightning Network Andrea Carotti Cosimo Sguanci Anastasios Sidiropoulos acarot2@uic.edu University of Illinois at Chicago Chicago, Illinois, USA cosimo.sguanci@mail.polimi.it Politecnico di Milano Milan, Italy sidiropo@uic.edu University of Illinois at Chicago Chicago, Illinois, USA Abstract—The Bitcoin Lightning Network (LN) is designed to improve the scalability of blockchain systems by using off-chain payment paths to settle transactions in a faster, cheaper, and more private manner. This work aims to empirically study LN’s fee revenue for network participants. Under realistic assumptions on payment amounts, routing algorithms and traffic distribution, we analyze the economic returns of the network’s largest routing nodes which currently hold the network together, and assess whether the centralizing tendency is incentive-compatible from an economic viewpoint. Moreover, since recent literature has proved that participation is economically irrational for the majority of large nodes, we evaluate the long-term impact on the network topology when participants start behaving rationally. Index Terms—Payment Channel Networks, Lightning Network, Layer 2, Routing Fees, Centralization, Rationality I. I NTRODUCTION Payment channel networks, such as the Lightning Network (LN) [1], are designed to enhance the scalability, speed and privacy of blockchain transactions by shifting the bulk of transactions off the main blockchain. In this setup, nodes open bilateral payment channels by depositing funds into a shared multi-signature address, allowing them to conduct off-chain transactions without interacting with the blockchain. These channels link together to form a network, enabling payments to be routed through intermediary nodes that can earn a fee in return for their service. As a consequence, there is an incentive for nodes to lock up funds to provide the payment routing infrastructure. The LN currently exhibits a high degree of centralization, with a few nodes holding most of the network liquidity in their channels. Considering the high unreliability of LN payments, to improve the payment success rate, routing algorithms in client implementations incorporated node capacity and node availability to compute the path from sender to receiver [2]. As a consequence, the question arises whether these large hubs have a disproportionate advantage in terms of fee revenue [3] to maintain their status of central nodes or if they should split favoring decentralization. In this work we explore whether there is empirical proof of such centrality convenience, and if this behaviour is affected by changing the distribution assumption on payments and by changing the routing algorithm. Therefore, we propose strategy candidates from the perspectives of routing nodes to improve their current fee revenue, following rationality in the choice of channels and fees. We study the global long-term impact of rational behaviour on the average fee in LN under the assumption of a dynamic framework, which we model as a repeated game. In our model, at each iteration the network graph is updated, allowing nodes to change their strategies. We consider different sets of strategic behaviour for the nodes: changing their fees, chancing their peers by re-allocating capital, and a combination of both. When nodes do not change their peers, but only channel fees, our research predicts a long-term growth in mean LN fees, confirming the thesis that at the current state of the network channels are underpriced. Conversely, when peer modification is possible for nodes, the average transaction fee converges to lower values than the current ones. The main contributions of our work can be summarized as follows: • We study the earnings for high-capacity nodes and assess their revenue advantage as a function of the routing algorithm. • We illustrate simple strategies for nodes to increase fee revenue from routing by replicating other nodes. • We analyze how network topology and fees change when nodes dynamically adapt their fees and channels. The next sections are structured as follows. Section II provides a detailed description of the model and the notation necessary for our research. In Section III we empirically analyze fee revenue for a subset of the nodes in the network and we evaluate the “rich-gets-richer” aspect of the LN [4]. In Section IV we analyze selfish strategies for increased revenue for larger nodes when they replicate nodes currently adopting a better strategy. Finally, in section V we analyze the dynamic evolution of the network when nodes adapt to the new network state in order to maximize their profit. Section VI gives an overview of related work, and Section VII concludes the paper. II. P RELIMINARIES From a snapshot taken with the LND client implementation on January 19, 2023, the LN consisted of more than 14000 nodes, and around 70900 payment channels with a combined capacity of more than 5179 BTC. From the perspective of network topology, it has been observed that it follows a powerlaw degree distribution [5], [6]. Specifically, the fraction of nodes P (k) having a degree k is described as P (k) ∼ k −α with α typically ranging between 2 and 3 [7], [8]." 2312.16497v1,"IEEE TRANSACTIONS ON JOURNAL NAME, MANUSCRIPT ID 1 Mobility and Cost Aware Inference Accelerating Algorithm for Edge Intelligence Xin Yuan, Ning Li, Kang Wei, Wenchao Xu, Quan Chen, Hao Chen, Song Guo, Fellow, IEEE Abstract—The edge intelligence (EI) has been widely applied recently. Spliting the model between device, edge server, and cloud can improve the performance of EI greatly. The model segmentation without user mobility has been investigated deeply by previous works. However, in most use cases of EI, the end devices are mobile. Only a few works have been carried out on this aspect. These works still have many issues, such as ignoring the energy consumption of mobile device, inappropriate network assumption, and low effectiveness on adapting user mobility, etc. Therefore, for addressing the disadvantages of model segmentation and resource allocation in previous works, we propose mobility and cost aware model segmentation and resource allocation algorithm for accelerating the inference at edge (MCSA). Specifically, in the scenario without user mobility, the loop iteration gradient descent (Li-GD) algorithm is provided. When the mobile user has a large model inference task needs to be calculated, it will take the energy consumption of mobile user, the communication and computing resource renting cost, and the inference delay into account to find the optimal model segmentation and resource allocation strategy. In the scenario with user mobility, the mobility aware Li-GD (MLi-GD) algorithm is proposed to calculate the optimal strategy. Then, the properties of the proposed algorithms are investigated, including convergence, complexity, and approximation ratio. The experimental results demonstrate the effectiveness of the proposed algorithms. Index Terms—Edge Intelligence; Model Segmentation; Inference Accelerating; Mobility —————————— u —————————— 1 I NTRODUCTION The artificial intelligence has been widely used and changed our life greatly, such as metaverse [1-2], automatic driving [2-4], image generation [5], etc. However, since the AI model is always large for achieving high accuracy, the computing resource that needed for these models are huge. Therefore, it is inappropriate to deploy these AI models on the mobile devices, such as mobile phones and vehicles, in which the computing resource is quite limited. For addressing this issue, one possible solution is to divide the large AI model into different parts and offload the resource-intensive model to edge server for reducing resource requirement and latency [6-8]. The model segmentation between end devices, edge server and cloud without user mobility has been investigated deeply by previous works, such as [9-16]. These works find the optimal model segmentation point and early-exist point to minimize inference delay and the allocated resource while maintain high inference accuracy by reforcement learning [9], convex optimization [10-13], heuristic algorithm [14-16], etc. Based on these approaches, many large AI models have been deployed on resource limited end devices successfully to provide high quality intelligent services, like AR/VR, automatic drive, image identification, etc. However, in most scenarios of edge computing and edge intelligence, the end devices are mobile, such as vehicular edge computing [17]. Once the mobile users move out of the coverage of edge server that they belong to, then how to guarantee the qualiy of service (delay, accuracy, energy consumption, etc.) for these users is challenging. Therefore, how to adaptive the model segmentation and resource allocation to user mobility becomes attractive to the researchers. To the best of our knowledge, until now only the works in [18], [19] and [20] have taken the user mobility into account to improve the performance of model inference. However, they have disadvantages as follows. First, for the mobile users, once they move into the coverage of a new edge server, due to the heterogeneity of edge servers, the mobile users have multiple alternative strategies, such as transmitting inference task back to the original edge server, migrating the partial model that offload to the original edge server to the new one, or recomputing the model seg- ———————————————— mentation strategy, etc. Then how to find the most optimal • F.A. Author is with the National Institute of Standards and Technology, Boulder, CO 80305. E-mail: author@ boulder.nist.gov. strategy from these alternative choices is important to the • S.B. Author Jr. is with the Department of Physics, Colorado State Univer- inference performance. Unfortunately, the works in [18] sity, Fort Collins, CO 80523. E-mail: author@colostate.edu. and [19] focus on frame scheduling for minimizing service • T.C. Author is with the Electrical Engineering Department, University of Colorado, Boulder, CO 80309. On leave from the National Research Insti- interrupt time during handover, the works in [20] focus on tute for Metals, Tsukuba, Japan E-mail: author@nrim.go.jp. the tradeoff between model segmentation and connection reliability in VEC. Second, for the mobile devices, one ***Please provide a complete mailing address for each author, as this is the address the 10 complimentary reprints of your paper will of the most important factors to consider is the energy consumption, because the energy consumption relates to the be sent lifetime of devices. In most mobility scenarios, the lifetime Please note that all acknowledgments should be placed at the end of the paper, beof mobile devices is more important than inference delay fore the bibliography (note that corresponding authorship is not noted in affiliation box, but in acknowledgment section). xxxx-xxxx/0x/$xx.00 © 200x IEEE Published by the IEEE Computer Society" 2312.16506v1,"ACTA ASTRONOMICA Vol. 73 (2023) pp. 1–6 AM CVn – System Parameters and Gravitational Waves J. S m a k N. Copernicus Astronomical Center, Polish Academy of Sciences, Bartycka 18, 00-716 Warsaw, Poland e-mail: jis@camk.edu.pl Received ABSTRACT System parameters are re-determined: M 1 = 0.86 ± 0.18M⊙ , M 2 = 0.103 ± 0.022M⊙ , A = 1.508 ± 0.100 × 10 10 cm, and i = 69 ± 3 ◦ . The secondary component is a semi-degenerate helium star loosing mass at a rate Ṁ = 4.93 ± 1.65 × 10 −9 M ⊙ /yr . The accretion disk is sufficiently hot to avoid thermal instability. The orbital light curve recovered from observations made in 1962 shows minimum shifted to phase φ = 0.50 , corresponding to O − C = 0.0060 d. Together with mimima observed in 1992- 99 this implies that the orbital period is increasing at a rate dP/dt ≈ 8.5 × 10 −13 consistent with predictions involving the emission of gravitational waves. Key words: binaries: cataclysmic variables, stars: individual: AM CVn, gravitational waves 1. Introduction AM CVn (earlier known as HZ 29; Humason and Zwicky 1947) is a prototype of the ultra short period, helium cataclysmic variables (Nelemans 2005, Solheim 2010, Kotko et al. 2012). Its light variations were discovered in 1962 (Smak 1967). Their period of only P ≈ 18 minutes was originally interpreted as the orbital period and Paczyński (1967), in his pioneering paper on graviational waves and the evolution of close binaries, predicted that ""this system could be most easily used to check the existence of gravitational radiation"". Regretfully, the light variations of AM CVn turned out to be quite complicated. So complicated that it took many decades and several, extensive photometric and spectroscopic studies (Patterson et al. 1993, Harvey et al. 1998, Skillman et al. 1999, Nelemans et al. 2001a, Roelofs et al. 2006 and references therein) before they were fully interpreted. Thanks to those investigations the light variations of AM CVn are now known to be a superposition of the three components: the superhumps with P SH = 1051.2s, the negative superhumps with P nSH = 1011.4s (both of them with variable amplitude), and variations" 2312.16513v1,"It Is Time To Steer: A Scalable Framework for Analysis-driven Attack Graph Generation Alessandro Palma Marco Angelini palma@diag.uniroma1.it Sapienza University of Rome angelini@diag.uniroma1.it. Link Campus University, Rome, Italy Sapienza University of Rome, Rome, Italy analyses are named attack path analyses as they involve features of the attack paths [10]. Abstract—In modern computer networks where sophisticated cyber attacks occur daily, a timely cyber risk assessment becomes paramount. Attack Graph (AG) represents the bestsuited solution to model and analyze multi-step attacks on computer networks, although they suffer from poor scalability due to their combinatorial complexity. This paper introduces an analysis-driven framework for AG generation. It enables real-time attack path analysis before the completion of the AG generation with a quantifiable statistical significance. We further accelerate the AG generation by steering it with the analysis query and supporting a novel workflow in which the analyst can query the system anytime. To show the capabilities of the proposed framework, we perform an extensive quantitative validation and we present a realistic case study on networks of unprecedented size. It demonstrates the advantages of our approach in terms of scalability and fitting to common attack path analyses. Although AGs are very expressive attack models for attack path analysis, the first problem they show is the poorly scalable computation of the attack paths, even for networks of moderate size as AGs may grow exponentially in the size of network hosts and vulnerabilities [9]. Currently, providing scalable approaches for attack path analysis is still an open problem, and this hinders the possibility of promptly providing security strategies to harden the network. Different works addressed the problem of scalability of AG generation [11], [12], [13] and attack path analysis [14], [15], [16]. A second emerging problem is that they postulate a classic analysis workflow in which the generation process step comes first and the analysis comes next, aggravating the poor scalability of the generation process as it slows down or completely stops the analysis phase in realistic scenarios. A final problem concerns the alignment between the current network situation and the related AG model: while the classic workflow permits the attack path analysis on the complete set of attack steps, it also implies that any change in the network needs a re-computation of the whole attack paths set to reflect such changes, exacerbating the scalability problem. These problems make it challenging to use AGs for today’s dynamic and large-scale networks. Index Terms—Attack Graph, Attack Path Analysis, Progressive Computation, Statistical Significance, Computational Steering. 1. Introduction In today’s digital world, where attackers are evolving smarter and the number of different vulnerabilities is growing, cyber-attacks are becoming more complex to mitigate and with a higher impact on organizations’ infrastructure [1]. In this scenario, it is crucial for any organization to promptly assess the potential cyber risks their networks are exposed to. This involves identifying the vulnerabilities in the network’s systems and quantifying the risk of their potential exploitation, which generally refers to the impact of one or more exploits and their likelihood to happen [2], [3], [4]. Given the growing complexity of attacks, as multistep attacks [5] (i.e., sequential exploits of different vulnerabilities among network hosts), it is essential to model the threats in a network. Among the possible threat models [6], [7], Attack Graph (AG) [8], [9] is a graph-based representation of the potential attack paths in a network, used to analyze its cyber risk. For example, an analyst may be interested in determining the most critical hosts based on the number of paths traversing them. These kinds of To overcome them and provide affordable analysis, we contribute a novel workflow for AG generation and attack path analysis. It leverages the concept of statistical significance [17] to express the degree of trustfulness of a partial AG, where not all the attack steps are computed. According to the foundational aspects of progressive data analysis [18], [19], it progressively supports attack path analysis during the AG generation, allowing preventive analyses with quantitative quality-controlled statistically significant results. To improve the accuracy of analysis performed on partial AGs, we design a steering approach which automatically accelerates the AG generation based on the requested attack path analysis. Given a path analysis query from an analyst, it models the queried attack path features, extracts from them the features of each single attack step, and uses them to prioritize the generation of attack paths that answer the analysis query. We evaluate the speed-up of this process 1" 2312.16514v1,"Global gyrokinetic simulation of magnetic island induced ion temperature gradient turbulence in toroidal plasma Jingchun Li 1, 2* , J. Bao 3 , Z. Lin 4 , J. Q. Dong 5 , Yong Liu 1 , Y. R. Qu 2 College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen, 518060, China 2 Department of Earth and Space Sciences, Southern University of Science and Technology, Shenzhen, Guangdong 518055, China 3 Beijing National Laboratory for Condensed Matter Physics and Laboratory of Soft Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China 4 University of California, Irvine, CA 92697, United States of America 5 Southwestern Institute of Physics, PO Box 432, Chengdu 610041, China Email: jingchunli@pku.edu.cn 1 Abstract The characteristics of ion temperature gradient (ITG) turbulence in the presence of a magnetic island are numerically investigated using a gyrokinetic model. We observe that in the absence of the usual ITG drive gradient, a solitary magnetic island alone can drive ITG instability. The magnetic island not only drives high-n modes of ITG instability but also induces low-n modes of vortex flow. Moreover, as the magnetic island width increases, the width of the vortex flow also increases. This implies that wider islands may more easily induce vortex flows. The study further indicates that the saturated amplitude and transport level of MI-induced ITG turbulence vary with different magnetic island widths. In general, larger magnetic islands enhance both particle and heat transport. When the magnetic island is of the order of 21 times the ion gyroradius (21ρ i ), the turbulence-driven transport level can reach the same level in cases where ITG is driven by pressure gradients. 1. INTRODUCTION Magnetic islands are ubiquitous structures generated during the magnetic field reconnection process in magnetized fusion plasmas. In this universal phenomenon," 2312.16523v1,"Mapping bibliographic metadata collections: the case of OpenCitations Meta and OpenAlex Elia Rizzetto 1 , Silvio Peroni 1 1 Research Centre for Open Scholarly Metadata, Department of Classical Philology and Italian Studies, University of Bologna, Bologna, Italy Abstract This study describes the methodology and analyses the results of the process of mapping entities between two large open bibliographic metadata collections, OpenCitations Meta and OpenAlex. The primary objective of this mapping is to integrate OpenAlex internal identifiers into the existing metadata of bibliographic resources in OpenCitations Meta, thereby interlinking and aligning these collections. Furthermore, analysing the output of the mapping provides a unique perspective on the consistency and accuracy of bibliographic metadata, offering a valuable tool for identifying potential inconsistencies in the processed data. Keywords 1 Bibliographic collection, entity mapping, OpenCitations, OpenAlex 1. Introduction Open bibliographic metadata collections play a pivotal role in enabling reproducible studies in the fields of bibliometrics, scientometrics and science of science and permit transparent procedures in the context of research assessment exercises, thus enabling the implementation of norms and guidelines that intend to reform the research assessment around the world, such as the Coalition for Advancing Research Assessment (CoARA 2 ). As the volume and diversity of scholarly publications continue to expand, the need for comprehensive and interoperable bibliographic databases becomes increasingly pronounced. This study delves into the process of mapping entities between two important open bibliographic metadata collections, OpenCitations Meta [1] and OpenAlex [2]. These mapping processes are a critical step towards enabling researchers, institutions, and platforms to access and utilise information seamlessly across diverse collections. In our work, the primary objective of this mapping is to integrate OpenAlex internal identifiers into the existing metadata of bibliographic resources (BRs) in OpenCitations Meta, thereby interlinking and aligning these collections. This paper presents the results of the mapping and provides details on the methodology adopted to accomplish this task. By shedding light on the complexities inherent in aligning bibliographic metadata collections, we aim to contribute valuable insights into the challenges and opportunities associated with such endeavours. Furthermore, the study investigates the mapping process's implications to assess the quality of the involved datasets. Analysing the output of the mapping provides a unique perspective on the consistency and accuracy of bibliographic metadata, offering a valuable tool for identifying potential inconsistencies in the processed data. The importance of such considerations lies in their capacity to enhance data quality, fortify interoperability, and foster a more cohesive scholarly metadata landscape. The rest of the paper is structured as follows. In Section “Material and methods”, we introduce the processed data and the mapping methodology. Then, in Section “Results”, we present the result of the 1 20 th IRCDL (The conference on Information and Research science Connecting to Digital and Library Science, February 22–23, 2024, Bressanone, Italy EMAIL: elia.rizzetto@studio.unibo.it (E. Rizzetto); silvio.peroni@unibo.it (S. Peroni) ORCID: 0009-0003-7161-9310 (E. Rizzetto); 0000-0003-0530-4305 (S. Peroni) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). 2 https://coara.eu/" 2312.16529v1,"Using Enriched Category Theory to Construct the Nearest Neighbour Classification Algorithm Matthew Pugh mp8g16@soton.ac.uk School of Electronics and Computer Science University of Southampton University Road, SO17 1BJ Jo Grundy j.grundy@soton.ac.uk School of Electronics and Computer Science University of Southampton University Road, SO17 1BJ Corina Cirstea cc2@ecs.soton.ac.uk School of Electronics and Computer Science University of Southampton University Road, SO17 1BJ Nick Harris nrh@ecs.soton.ac.uk School of Electronics and Computer Science University of Southampton University Road, SO17 1BJ Abstract Exploring whether Enriched Category Theory could provide the foundation of an alternative approach to Machine Learning. This paper is the first to construct and motivate a Machine Learning algorithm solely with Enriched Category Theory. In order to supplement evidence that Category Theory can be used to motivate robust and explainable algorithms, it is shown that a series of reasonable assumptions about a dataset lead to the construction of the Nearest Neighbours Algorithm. In particular, as an extension of the original dataset using profunctors in the category of Lawvere metric spaces. This leads to a definition of an Enriched Nearest Neighbours Algorithm, which consequently also produces an enriched form of the Voronoi diagram. This paper is intended to be accessible without any knowledge of Category Theory. Keywords: Category Theory, Enriched Category Theory, Lawvere Metric Space, Classification, Nearest Neighbours, Foundations 1. introduction As Machine Learning (ML) becomes more popular, the use of black box approaches is beginning to hinder the progression of the field. During engineering and development, the better ones understanding of a model the easier it is to improve its performance, diagnose faults, and provide guarantees for its behaviour. Unfortunately, necessary to the development of many algorithms, there are design decisions which are motivated by intuition or trial and error. Potentially, part of the difficulty in understanding these algorithms comes from a lack of clarity in how they are interacting with the data they are provided. How does the encoding of input data effect the information that an algorithm actually understands. To ©2023 Matthew Pugh, Jo Grundy, Corina Cirstea, and Nick Harris. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/." 2312.16556v1,"Fractional-statistics-induced entanglement from Andreev-like tunneling Gu Zhang 1 , Pierre Glidic 2 , Frédéric Pierre 2 , Igor Gornyi 3 , Yuval Gefen 4 1 Beijing Academy of Quantum Information Sciences, Beijing 100193, China. 2 Université Paris-Saclay, CNRS, Centre de Nanosciences et de Nanotechnologies, 91120 Palaiseau, France. 3 Institute for Quantum Materials and Technologies and Institut für Theorie der Kondensierten Materie, Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany. 4 Department of Condensed Matter Physics, Weizmann Institute of Science, Rehovot 761001, Israel. Contributing authors: frederic.pierre@c2n.upsaclay.fr; igor.gornyi@kit.edu; yuval.gefen@weizmann.ac.il; Abstract The role of anyonic statistics stands as a cornerstone in the landscape of topological quantum techniques. While recent years have brought forth encouraging and persuasive strides in detecting anyons, a significant facet remains unexplored, especially in view of connecting anyonic physics to quantum information platforms—whether and how entanglement can be generated by anyonic braiding. Here, we demonstrate that even if the two anyonic subsystems are connected only by electron tunneling, anyonic entanglement, manifesting fractional statistics, is generated. Specifically, we address this question for fractional quantum Hall edges bridged by a quantum point contact that allows only transmission of fermions (so-called Andreev-like tunneling), invoking the physics of two-beam collisions in an anyonic Hong-Ou-Mandel collider We define an entanglement pointer—a current-noise-based function tailored to quantify entanglement and show that it reflects the role of quasiparticle statistics. A striking feature of our statistics-induced-entanglement pointer is its relative resilience to entanglement stemming from electrostatic interactions between the two anyonic subsystems. Keywords: Anyonic statistics, Andreev-like tunneling, entanglement 1" 2312.16603v1,"Tošić et al. RESEARCH Beyond the Surface: Advanced Wash Trading Detection in Decentralized NFT Markets Aleksandar Tošić 1,2* , Niki Hrovatin 1,2 and Jernej Vičič 1 * Correspondence: aleksandar.tosic@upr.si 1 The Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaška 8, Koper, Slovenia 2 InnoRenew CoE, Livad 6a, Izola, Slovenia Full list of author information is available at the end of the article Abstract Wash trading in decentralized markets remains a significant concern magnified by the pseudonymous and public nature of blockchains. In this paper we introduce an innovative methodology designed to detect wash trading activities beyond surface-level transactions. Our approach integrates NFT ownership traces with the Ethereum Transaction Network, encompassing the complete historical record of all Ethereum account normal transactions. By analyzing both networks, our method offers a notable advancement over techniques proposed by existing research. We analyzed the wash trading activity of 7 notable NFT collections. Our results show that wash trading in unregulated NFT markets is an underestimated concern and is much more widespread both in terms of frequency as well as volume. Excluding the Meebits collection, which emerged as an outlier, we found that wash trading constituted up to 25% of the total trading volume. Specifically, for the Meebits collection, a staggering 93% of its total trade volume was attributed to wash trading. Keywords: NFT; Washtrading; Network Analysis; Blockchain 1 Introduction Non-fungible tokens, commonly referred to as NFTs, have ushered in a fresh paradigm within the realm of financial assets. At their core, NFTs signify digital manifestations of ownership rights, securely recorded through unalterable contracts linked to unique addresses or hashes on a blockchain. Although this underlying principle holds broad applicability, spanning domains like supply chains, real estate, and music, NFTs have predominantly captivated the financial landscape when employed to confer digital ownership over visual content (images) or videos. To facilitate trading of NFTs, decentralized markets were created using a set of smart contracts. These contracts govern the exchange of ownership between two parties (wallets) for a certain price. Likewise, the transfer of ownership can occur without a trade as well. The fast growth of these marketplaces has led many to question the legitimacy of market activities given the questionable fundamentals of the underlying assets the NFTs represent. These concerns are strengthened with examples of single NFTs being traded for an unrealized profit of over 3 million USD. [1], which is a result of wash trading. Wash trading refers to the deceptive practice of artificially inflating trading activity by conducting trades between parties that are controlled or colluded by the same entity. In this scheme, the buyer and seller appear to be separate entities engaging" 2312.16609v1,"EXPLOITING HIDDEN STRUCTURES IN NON-CONVEX GAMES FOR CONVERGENCE TO NASH EQUILIBRIUM IOSIF SAKOS ∗ , EMMANOUIL V. VLATAKIS-GKARAGKOUNIS § , PANAYOTIS MERTIKOPOULOS ♯ , AND GEORGIOS PILIOURAS ∗ Abstract. A wide array of modern machine learning applications – from adversarial models to multi-agent reinforcement learning – can be formulated as non-cooperative games whose Nash equilibria represent the system’s desired operational states. Despite having a highly non-convex loss landscape, many cases of interest possess a latent convex structure that could potentially be leveraged to yield convergence to an equilibrium. Driven by this observation, our paper proposes a flexible first-order method that successfully exploits such “hidden structures” and achieves convergence under minimal assumptions for the transformation connecting the players’ control variables to the game’s latent, convex-structured layer. The proposed method – which we call preconditioned hidden gradient descent (PHGD) – hinges on a judiciously chosen gradient preconditioning scheme related to natural gradient methods. Importantly, we make no separability assumptions for the game’s hidden structure, and we provide explicit convergence rate guarantees for both deterministic and stochastic environments. 1. Introduction Many powerful AI architectures are based on the idea of combining conceptually straightforward settings coming from game theory with the expressive power of neural nets. Some prominent examples of this type include generative adversarial networks (GANs) [14], robust reinforcement learning [37], adversarial training [26], multi-agent reinforcement learning in games [36, 40, 42], and even multi-player games that include free-form natural-language communication [4]. Intuitively, in all these cases, the game-theoretic abstraction serves to provide a palpable, easy-to-understand target, i.e., an equilibrium solution with strong axiomatic justification. However, from a complexity-theoretic standpoint, such targets are excessively ambitious, requiring huge amounts of data to express and compute, even approximately. Because of this, the agents’ policies must be encoded via a universal function approximator (such as a neural net) and training this architecture boils down to iteratively updating these parameters until the process – hopefully! – converges to the target equilibrium. Unfortunately, despite the ubiquitousness of these settings, the design of algorithms with provable convergence guarantees is still relatively lacking. This deficit is not surprising if one considers that even the – comparatively much simpler – problem of equilibrium learning in finite games is hindered by numerous computational hardness [9, 10] as well as dynamic impossibility results [15, 16, 19, 24, 30, 31]. In this regard, our best hope for designing ∗ Singapore University of Technology and Design § UC Berkeley ♯ Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG, 38000 Grenoble, France. E-mail addresses: iosif_sakos@mymail.sutd.edu.sg, emvlatakis@cs.columbia.edu, panayotis.mertikopoulos@imag.fr, georgios@sutd.edu.sg. 2020 Mathematics Subject Classification. Primary 91A10, 91A26; secondary 68Q32. Key words and phrases. Non-convex games; hidden games; stochastic algorithms; Nash equilibrium. 1" 2312.16629v1,"Autonomous Docking Method via Non-linear Model Predictive Control Roni Permana Saputra Midriem Mirdanies Research Center for Smart Mechatronics National Research and Innovation Agency Bandung, Indonesia Email: roni.permana.saputra@brin.go.id ORCID: https://orcid.org/0000-0001-6989-8830 Research Center for Smart Mechatronics National Research and Innovation Agency Bandung, Indonesia Email: midriem.mirdanies@brin.go.id Eko Joni Pristianto Dayat Kurniawan Research Center for Telecommunication National Research and Innovation Agency Bandung, Indonesia Email: eko.joni.pristianto@brin.go.id Research Center for Telecommunication National Research and Innovation Agency Bandung, Indonesia Email: dayat.kurniawan@brin.go.id Abstract—This paper presents a proposed method of autonomous control for docking tasks of a single-seat personal mobility vehicle. We proposed a non-linear model predictive control (NMPC) based visual servoing to achieves the desired autonomous docking task. The proposed method is implemented on a four-wheel electric wheelchair platform, with two independent rear driving wheels and two front castor wheels. The NMPC-based visual servoing technique leverages the information extracted from a visual sensor as a real-time feedback for the NMPC to control the motion of the vehicle achieving the desired autonomous docking task. To evaluate the performance of the proposed controller method, a number of experiments both in simulation and in the actual setting. The controller performance is then evaluated based on the controller design requirement. The simulation results on autonomous docking experiments show that the proposed controller has been successfully achieve the desired controller design requirement to generate realtime trajectory for the vehicle performing autonomous docking tasks in several different scenarios. Index Terms—model predictive control, autonomous vehicle, autonomous docking, visual servoing, personal mobility vehicle I. I NTRODUCTION The use of environmentally friendly modes of transportation, especially vehicles with power electric-based drives are currently starting to be actively encouraged. One type of electric vehicle that gaining popularity is the personal mobility vehicles (PMVs). This vehicle type consists of one or more wheels which driven by electric motor that travels around 2 m/s—very close to normal human walking speed. This vehicle is commonly used as a mode of transportation for short-distance trips in urban environments or in a specific and limited area. This type of vehicle provides various advantages from an environmental standpoint to socio-economic benefits. Over the past few decades, technological advancements in control, sensing, and artificial intelligence, particularly those applied to transportation, have encouraged the development of autonomous vehicle technology. The effect of this tech- Fig. 1. A single passenger personal mobility vehicle platform—with two independent rear driving wheels and two front castor wheels—equipped with an onboard camera sensor for visual servoing feedback. nology is expected to benefits us through the improvement of transportation safety, increasing driving efficiency and transportation convenience, reducing congestion, and other various benefits. One of the important features required for an autonomous vehicle is the capability of the vehicle to navigate and dock itself autonomously to a charging dock station. The vehicles can be recharged by planning and arranging effectively to maximize its working efficiency. This paper adresses the autonomous docking problem for an autonomous personal mobility vehicle. We proposed a nonlinear model predictive control (NMPC) based visual servoing to achieves the desired autonomous docking task. The NMPC-" 2312.16644v1,"EXACT ASYMPTOTIC ORDER FOR GENERALISED ADAPTIVE APPROXIMATIONS MARC KESSEBÖHMER ID AND ALJOSCHA NIEMANN Abstract. In this note, we present an abstract approach to study asymptotic orders for adaptive approximations with respect to a monotone set function J defined on dyadic cubes. We determine the exact upper order in terms of the critical value of the corresponding J-partition function, and we are able to provide upper and lower bounds in term of fractal-geometric quantities. With properly chosen J, our new approach has applications in many different areas of mathematics, including the spectral theory of Kreı̆n–Feller operators, quantization dimensions of compactly supported probability measures, and the exact asymptotic order p for Kolmogorov, Gel’fand and linear widths for Sobolev embeddings into L µ -spaces. 1. Introduction and statement of main results The study of adaptive approximation algorithms goes back to the seminal work of Birman and Solomjak in the 1970s [BS67; BS74], which was motivated by the study of asymptotics for spectral problems, and was subsequently refined by Borzov 1971 [Bor71] for singular measures, and then by DeVore and Yu [DeV87; DY90] for certain boundary cases not treated by Birman, Solomjak or Borzov. Generally speaking, we deal with asymptotics of counting problems derived from set functions defined on dyadic subcubes of the unit cube. Recently, this problem has attracted renewed attention in the context of • piecewise polynomial approximation in [HKY00; DKS20], • spectral asymptotics in [RS21; RT22; KN22d; KN22c; KN22b], • quantization of probability measures in [KNZ23], and • Kolmogorov, Gel’fand, and linear widths in [KN22a; KW23]. Our new approach improves some of the classic results (see e.g. Section 3.2, where we compare our results with work of Birman and Solomjak from the 1970s) and is fundamental for all the results by the authors mentioned above. In this note we also allow a generalisation with respect to the range of set functions considered, as this proves to be very useful for applications to spectral asymptotics. However, the most important case studied concerns set functions defined on all dyadic cubes; we will refer to this case as the classical case. 1.1. The basic setting. This paper is concerned with the study of the asymptotic behaviour Q of an adaptive approximation algorithm in the following setting. Let Q = di=1 J i be the unit cube in dimension d ∈ N where the J i ’s are (half-open, open, or closed) unit intervals. Let Q D n denote a dyadic partition of Q by cubes of the form Q B di=1 I i with (half-open, open, or closed) intervals I i with endpoints in the dyadic grid of size 2 −n , i. e. (k − 1) 2 −n , k2 −n for some k ∈ Z. Note that by our assumption on the intervals I i , chosen individually for each Q, these cubes are not necessarily congruent, in that we allow certain faces of Q not to belong to Q. However, we require that for each n ∈ N the partition D n+1 is a refinement of D n , this Institute for Dynamical Systems, Faculty 3 – Mathematics and Computer Science, University of Bremen, Bibliothekstr. 5, 28359 Bremen, Germany E-mail addresses: mhk@uni-bremen.de, niemann1@uni-bremen.de. 2000 Mathematics Subject Classification. primary: 68W25, 41A25 secondary: 28A80, 65D15. Key words and phrases. adaptive approximation algorithm, approximation theory, L q -spectrum, partition functions, Minkowski dimension, (coarse) multifractal formalism. This research was supported by the DFG grant Ke 1440/3-1. 1 ." 2312.16658v1,"The Energy Response of LaBr 3 (Ce), LaBr 3 (Ce,Sr) and NaI(Tl) Crystals for GECAM ∗ Pei-Yi Feng, 1, 2, † Xi-Lei Sun, 3, ‡ Zheng-Hua An, 1, § Yong Deng, 4 Cheng-Er Wang, 5 Huang Jiang, 3 Jun-Jie Li, 4 Da-Li Zhang, 1 Xin-Qiao Li, 1 Shao-Lin Xiong, 1 Chao Zheng, 1, 2 Ke Gong, 1 Sheng Yang, 1 Xiao-Jing Liu, 1 Min Gao, 1 Xiang-Yang Wen, 1 Ya-Qing liu, 1 Yan-Bing Xu, 1 Xiao-Yun Zhao, 1 Jia-Cong Liu, 1, 2 Fan Zhang, 1 and Hong Lu 1, ¶ 1 Key Laboratory of Particle Astrophysics, Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China 2 University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing 100049, China 3 State Key Laboratory of Particle Detection and Electronics, Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China 4 School of Nuclear Science and Technology, University of South China, Hengyang Hunan 421001, China 5 National Engineering Research Center for Rare Earth, Grirem Advanced Materials Co., Ltd. and General Research Institute for Nonferrous Metals, Beijing 100088, China The GECAM series of satellites utilize LaBr 3 (Ce), LaBr 3 (Ce,Sr), and NaI(Tl) crystals as sensitive materials for gamma-ray detectors (GRDs). To investigate the non-linearity in the detection of low-energy gamma rays and address errors in the E-C relationship calibration, comprehensive tests and comparative studies of the non-linearity of these three crystals were conducted using Compton electrons, radioactive sources, and monoenergetic X-rays. The non-linearity test results for Compton electrons and X-rays displayed substantial differences, with all three crystals showing higher non-linearity for X/γ-rays than for Compton electrons. Despite LaBr 3 (Ce) and LaBr 3 (Ce,Sr) crystals having higher absolute light yields, they exhibited a noticeable non-linear decrease in light yield, especially at energies below 400 keV. The NaI(Tl) crystal demonstrated ""excess"" light output in the 6–200 keV range, reaching a maximum ""excess"" of 9.2% at 30 keV in X-ray testing and up to 15.5% at 14 keV during Compton electron testing, indicating a significant advantage in the detection of lowenergy gamma rays. Furthermore, this paper explores the underlying causes of the observed non-linearity in these crystals. This study not only elucidates the detector responses of GECAM, but also marks the inaugural comprehensive investigation into the non-linearity of domestically produced lanthanum bromide and sodium iodide crystals. Keywords: LaBr 3 (Ce) detector, LaBr 3 (Ce,Sr) detector, NaI(Tl) detector, GECAM, Energy Response, Light Yield Nonlinearity I. INTRODUCTION Recent years have witnessed groundbreaking advancements in various branches of astrophysics, such as gravitational waves, fast radio bursts, and cosmic rays, paving the way for a new ""multi-messenger, multi-wavelength"" era in astronomy[1–5]. These discoveries emphasize the importance of efficient detection methods for further understanding of high-energy astronomical phenomena. Transient gammaray sources, including gamma ray bursts and magnetar flares, ∗ Supported by the National Key Research and Development Program (Grant Nos. 2022YFB3503600 and 2021YFA0718500) and the Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA15360102), and National Natural Science Foundation of China (Grant Nos. 12273042 and 12075258) † Corresponding author, Pei-Yi Feng, Particle and Astrophysics Center, Institute of High Energy Physics, No. 19 (B), Yuquan Road, Laoshan Street, Shijingshan District, Beijing, China, 19151915020, fengpeiyi@ihep.ac.cn. ‡ Corresponding author, Xi-Lei Sun, Experimental Physics Center, Institute of High Energy Physics, No. 19 (B), Yuquan Road, Laoshan Street, Shijingshan District, Beijing, China, 13671137148, sunxl@ihep.ac.cn. § Corresponding author, Zheng-Hua An, Particle and Astrophysics Center, Institute of High Energy Physics, No. 19 (B), Yuquan Road, Laoshan Street, Shijingshan District, Beijing, China, 13661351124, anzh@ihep.ac.cn. ¶ Corresponding author, Hong Lu, Particle and Astrophysics Center, Institute of High Energy Physics, No. 19 (B), Yuquan Road, Laoshan Street, Shijingshan District, Beijing, China, 13681034963, luh@ihep.ac.cn. play a vital role in shaping the landscape of astronomical research[6–11]. The Gravitational wave burst high-energy Electromagnetic Counterpart All-sky Monitor (GECAM) series, comprising satellites GECAM-A/B, GECAM-C and GECAM-D, was developed to monitor various high-energy electromagnetic events such as gamma-ray bursts and magnetar flares[12– 16]. These satellites employ gamma-ray detectors (GRDs) that utilize different scintillating crystals such as LaBr 3 (Ce) and LaBr 3 (Ce,Sr) for GECAM-A/B, and a combination of LaBr 3 (Ce), LaBr 3 (Ce,Sr), and NaI(Tl) for GECAM-C to validate new detector technologies. The fourth satellite, GECAM-D, uses NaI(Tl) crystals, and is scheduled to be launched in early 2024. The main characteristics of the GRDs are listed in Table 1. GRDs serve as the primary detectors in the GECAM payload, and GECAM-A/B utilize an innovative solution employing LaBr 3 crystals coupled with silicon photomultiplier (SiPM) readout technology (Fig. 1)[14, 15, 17, 18]. LaBr 3 crystals are advanced inorganic scintillators known for their high light output, excellent energy and timing resolutions, good energy linearity, and short light decay time. The SiPM, which replaces the conventional photomultiplier tube (PMT), offers advantages such as a simple and compact structure, ease of miniaturization, and efficient readout capability. For GECAM-C (Fig. 2), the GRDs employ both NaI(Tl) and LaBr 3 crystals, which are coupled to SiPM readout arrays[16, 19]. The NaI(Tl) crystal is a high-performance," 2312.16659v1,"1 A Large Language Model-based Computational Approach to Improve Identity-Related Write-Ups Alex Doboli Department of Electrical and Computer Engineering Stony Brook University, Stony Brook, NY alex.doboli@stonybrook.edu Abstract—Creating written products is essential to modern life, including writings about one’s identity and personal experiences. However, writing is often a difficult activity that requires extensive effort to frame the central ideas, the pursued approach to communicate the central ideas, e.g., using analogies, metaphors, or other possible means, the needed presentation structure, and the actual verbal expression. Large Language Models, a recently emerged approach in Machine Learning, can offer a significant help in reducing the effort and improving the quality of written products. This paper proposes a new computational approach to explore prompts that given as inputs to a Large Language Models can generate cues to improve the considered written products. Two case studies on improving write-ups, one based on an analogy and one on a metaphor, are also presented in the paper. I. I NTRODUCTION Document preparation is one of the most important activities in human life, as it impacts every facet, like solution documenting, application description, situation narration, prediction formulation, opinion statement, social networking, and many more. Moreover, writing about one’s identity is critical too, as it expresses one’s personal characteristics, including upbringing, experiences, preferences and priorities, and goals and objectives [Scenters-Zapico(2014)]. Hence, the writing process should not only articulate well the main message, e.g., its central idea, involving any identity-related issues that the author intends to communicate, but also do it persuasively. The variables that determine the quality of persuasive writing include “coherence, cohesion, syntactic features, and persuasive appeals” [Connor and Lauer(1985)], pp. 314. For example, Connor and Lauer mention a system of twenty-three appeals grouped into three categories: rational appeals, credibility appeals, and affective appeals [Connor and Lauer(1985)]. The appeals included in the three categories are as follows: “rational appeals are descriptive examples, narrative examples, classifications, comparisons, contrasts, degree, and authority; credibility appeals are firsthand experience, writer’s respect for audience’s interest and point of view, writer-audience shared interests and points of view, and writer’s good character and or judgement; and affective appeals are emotion in audience’s situation, audience’s empathy, audience’s values, vivid picture, charged language, cause/effect, model, stage in process, means/end, consequences, ideal or principle, and information (facts, statistics)” [Connor and Lauer(1985)], pp. 314. Persuasively writing to reflect one’s identity is difficult. From a cognitive point of view, it requires framing the intended messages while combining its idea with the author’s own experiences, situations and perspectives as well as extensive self-analysis and self-inspection. The goal is to identify the central idea to be communicated and the vehicle for its communication, like the narrative solutions. For example, relying on popular analogies and metaphors, like characters and stories in Greek mythology, has been a popular approach to tackle this difficulty, as they arguably offer a frame already known and accepted by the targeted audience. However, the writing activity remains challenging even in such cases, as the author still must figure out the best way of combining the central idea of the intended writing with such vehicles, the structuring of the writing, and its actual presentation. It is often the case that multiple rewriting as required, often with substantial modifications, in order to optimize the three enumerated elements. Devising new ways, possibly supported by computational tools, are needed not only to effectively manage the writing process, like the required time and effort, but also to improve the message, its correctness, and expected understanding by the audience. Large Language Models (LLMs) have recently emerged as a very promising approach to tackle situations expressed in natural language (NL), in a broad variety of domains including education, programming, medicine, and so on [Thirunavukarasu et al.(2023)]. LLMs arguably describe the solution space formed by the ideas expressed by humans in writing. LLMs are broad collections of concepts (e.g., words) linked together based on their co-occurrences in huge sets of electronic documents. Exploring this solution space has been achieved through sequences of prompts, which express certain requirements in NL. LLM inquiries through prompts produce responses, also in NL. However, generating effective sequences of prompts to address an author’s intentions about the messages to be communicated remains difficult. While the area of prompt engineering has started to address the related challenges, the responses produced by LLMs tend to be produced in a certain structure, like using enumerations, mainly focus on a few well-known hence possibly repetitive examples, which can reduce the creativity of a writing, and have limited ability in combining separate ideas (e.g., beyond only mixing separate sentences about the combined ideas), as needed when attempting to intertwine one’s identity-related aspects with the narrative story. This paper presents a computational approach to improve the message and presentation quality of written products, e.g.," 2312.16665v1,"A small morphism giving Abelian repetition threshold less than 2 James D. Currie & Narad Rampersad Department of Mathematics & Statistics The University of Winnipeg j.currie@uwinnipeg.ca, n.rampersad@uwinnipeg.ca December 29, 2023 Abstract It is known that there are infinite words over finite alphabets with Abelian repetition threshold arbitrarily close to 1; however, the construction previously used involves huge alphabets. In this note we give a short cyclic morphism (length 13) over an 8-letter alphabet yielding an Abelian repetition threshold less than 1.8. 1 Introduction A central topic in combinatorics on words is the construction of infinite words avoiding repetitions. For 1 < k < 2, a k-power is a word z k = xyx, where z = xy, and |xyx|/|xy| = k. For an integer n > 1, the repetitive threshold RT(n) is defined to be the infimum of r such that there exists an infinite sequence over the n letter alphabet not containing any k-power with k > r. In 1972, Dejean [6] conjectured that  n =3  7/4, 7/5, n =4 RT(n) =  n/(n − 1), n 6 = 3, 4 This conjecture was verified in 2009 by the authors, and simultaneously by Michaël Rao [5, 8]. For 1 < k < 2, an Abelian k-power is a word x 1 yx 2 , where x 1 is an anagram of x 2 , and |x 1 yx 2 |/|x 1 y| = k. Since 2003, one of the authors [2, 4] has pointed out the desirability of formulating and proving the correct Abelian version of Dejean’s conjecture; that is, giving the value of the Abelian threshold ART(n), where ‘k-power’ in the definition of RT(n) is replaced by ‘Abelian k-power’. Since Abelian squares – words x 1 x 2 where x 1 is an anagram of x 2 – are unavoidable on 3 or fewer letters, one seeks ART(n) where n ≥ 4. In recent years, 1" 2312.16672v1,"Even grade generic skew-symmetric matrix polynomials with bounded rank Fernando De Terán a , Andrii Dmytryshyn b , Froilán M. Dopico a a Departamento de Matemáticas, Universidad Carlos III de Madrid, Avenida de la Universidad 30, 28911, Leganés, Spain. b School of Science and Technology, Örebro University, 701 82, Örebro, Sweden. Abstract We show that the set of m × m complex skew-symmetric matrix polynomials of even grade d, i.e., of degree at most d, and (normal) rank at most 2r is the closure of the single set of matrix polynomials with certain, explicitly described, complete eigenstructure. This complete eigenstructure corresponds to the most generic m × m complex skew-symmetric matrix polynomials of even grade d and rank at most 2r. The analogous problem for the case of skew-symmetric matrix polynomials of odd grade is solved in [24]. Keywords: complete eigenstructure, genericity, matrix polynomials, skew-symmetry, normal rank, orbits, pencils 2000 MSC: 15A18, 15A21 1. Introduction During the recent years, the problem of determining the generic eigenstructures for sets of matrix pencils and matrix polynomials has been a subject of research interest, in particular, for the sets of matrix pencils and matrix polynomials with fixed grade and bounded rank. The description of such sets as a union of closures of certain “generic sets” of pencils and matrix polynomials is given in terms of their eigenstructures for general matrix pencils [13] and polynomials [23], as well as for matrix pencils that are skew-symmetric [24], symmetric [9], T -palindromic and T -alternating [8], and Hermitian [11]. Moreover, in the case of odd grade the generic sets are also derived for skew-symmetric [24] and symmetric [10] matrix polynomials. Email addresses: fteran@math.uc3m.es (Fernando De Terán), andrii.dmytryshyn@oru.se (Andrii Dmytryshyn), dopico@math.uc3m.es (Froilán M. Dopico) Preprint submitted to Elsevier" 2312.16697v1,"Multi-channel Sensor Network Construction, Data Fusion and Challenges for Smart Home He Zhang Robin Ananda Xinyi Fu ∗ hpz5211@psu.edu The Future Laboratory, Tsinghua University Beijing, P.R.C. Pennsylvania State University University Park, Pennsylvania, USA ylb18@mails.tsinghua.edu.cn Academy of Arts & Design, Tsinghua University Beijing, P.R.C. fuxy@mail.tsinghua.edu.cn The Future Laboratory, Tsinghua University Beijing, P.R.C. Zhe Sun Xiaoyu Wang Keqi Chen sunz15@tsinghua.org.cn Academy of Arts & Design, Tsinghua University Beijing, P.R.C. 1800017830@pku.edu.cn Yuanpei College, Peking University Beijing, P.R.C keqi001@e.ntu.edu.sg Nanyang Technological University Singapore John M. Carroll jmc56@psu.edu Pennsylvania State University University Park, Pennsylvania, USA ABSTRACT CCS CONCEPTS Both sensor networks and data fusion are essential foundations for developing the smart home Internet of Things (IoT) and related fields. We proposed a multi-channel sensor network construction method involving hardware, acquisition, and synchronization in the smart home environment and a smart home data fusion method (SHDFM) for multi-modal data (position, gait, voice, pose, facial expression, temperature, and humidity) generated in the smart home environment to address the configuration of a multi-channel sensor network, improve the quality and efficiency of various human activities and environmental data collection, and reduce the difficulty of multi-modal data fusion in the smart home. SHDFM contains 5 levels, with inputs and outputs as criteria to provide recommendations for multi-modal data fusion strategies in the smart home. We built a real experimental environment using the proposed method in this paper. To validate our method, we created a real experimental environment — a physical setup in a home-like scenario where the multi-channel sensor network and data fusion techniques were deployed and evaluated. The acceptance and testing results show that the proposed construction and data fusion methods can be applied to the examples with high robustness, replicability, and scalability. Besides, we discuss how smart homes with multi-channel sensor networks can support digital twins. • Human-centered computing → HCI design and evaluation methods; Empirical studies in HCI; • Information systems → Information systems applications; • Hardware → Communication hardware, interfaces and storage; Sensor devices and platforms. ∗ Corresponding author Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). CHCHI 2023, November 13–16, 2023, Denpasar, Bali, Indonesia © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1645-4/23/11. https://doi.org/10.1145/3629606.3629638 KEYWORDS smart home, internet of things, data fusion, sensor network, system ACM Reference Format: He Zhang, Robin Ananda, Xinyi Fu, Zhe Sun, Xiaoyu Wang, Keqi Chen, and John M. Carroll. 2023. Multi-channel Sensor Network Construction, Data Fusion and Challenges for Smart Home. In Chinese CHI 2023 (CHCHI 2023), November 13–16, 2023, Denpasar, Bali, Indonesia. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3629606.3629638 1 INTRODUCTION With the improvement of sensor technology, the development of artificial intelligence, the popularization of high-speed Internet, and the application of the concept of smart home Internet of Things, the concept of the smart home is being accepted by more and more people. At the same time, with the popularity of consumergrade smart home products and the increase in human society’s demand, the smart home market has a certain scale and is growing rapidly. Statista states that the global smart home market could reach $182.45 billion by 2025 [27]. According to the scenario-based needs of users, a smart home mainly involves several key areas such as device control and linkage [48], scene atmosphere [10], entertainment and leisure [22], intelligent security [44], energy management [2], intelligent applications [25], and design for specific people or needs [19, 37, 39]. On the one hand, there is a growing demand for smarter and more efficient smart homes and related" 2312.16707v1,"Modeling Systemic Risk: A Time-Varying Nonparametric Causal Inference Framework Jalal Etesami a , Ali Habibnia b , Negar Kiyavash c a School of Computation, Information and Technology, Technical University of Munich, Germany b Department of Economics, Virginia Tech, USA c College of Management of Technology, Ecole Polytechnique Fédérale de Lausanne, Switzerland Abstract We propose a nonparametric and time-varying directed information graph (TV- DIG) framework to estimate the evolving causal structure in time series networks, thereby addressing the limitations of traditional econometric models in capturing high-dimensional, nonlinear, and time-varying interconnections among series. This framework employs an information-theoretic measure rooted in a generalized version of Granger-causality, which is applicable to both linear and nonlinear dynamics. Our framework offers advancements in measuring systemic risk and establishes meaningful connections with established econometric models, including vector autoregression and switching models. We evaluate the efficacy of our proposed model through simulation experiments and empirical analysis, reporting promising results in recovering simulated time-varying networks with nonlinear and multivariate structures. We apply this framework to identify and monitor the evolution of interconnectedness and systemic risk among major assets and industrial sectors within the financial network. We focus on cryptocurrencies’ potential systemic risks to financial stability, including spillover effects on other sectors during crises like the COVID-19 pandemic and the Federal Reserve’s 2020 emergency response. Our findings reveals significant, previously underrecognized pre-2020 influences of cryptocurrencies on certain financial sectors, highlighting their potential systemic risks and offering a systematic approach in tracking evolving cross-sector interactions within financial networks. Keywords: Time-Varying Networks; Directed Information; Graphical Models; Network Inference; Systemic risk; Cryptocurrency Risks JEL classification: C14; C15; C32; C58; G01; G20 ⋆ Email addresses: j.etesami@tum.de (Jalal Etesami), habibnia@vt.edu (Ali Habibnia), negar.kiyavash@epfl.ch (Negar Kiyavash)" 2312.16719v1,"Advances in the Theory of Control Barrier Functions: Addressing Practical Challenges in Safe Control Synthesis for Autonomous and Robotic Systems Kunal Garg a , James Usevitch b , Joseph Breeden c , Mitchell Black d , Devansh Agrawal c , Hardik Parwana e , Dimitra Panagou f,∗ a Department of Aeronautics and Astronautics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, 02139, MA, USA b Department of Electrical and Computer Engineering, Brigham Young University, 450 Engineering Building, Provo, 84602, UT, USA c Department of Aerospace Engineering, University of Michigan, Ann Arbor, 1320 Beal Avenue, Ann Arbor, 48109, MI, USA d Toyota North America Research and Development, 1555 Woodridge Ave, Ann Arbor, 48105, MI, USA e Department of Robotics, University of Michigan, Ann Arbor, 2505 Hayward St., Ann Arbor, 48109, MI, USA f Department of Robotics and Department of Aerospace Engineering, University of Michigan, Ann Arbor, 2505 Hayward St., Ann Arbor, 48109, MI, USA Abstract This tutorial paper presents recent work of the authors that extends the theory of Control Barrier Functions (CBFs) to address practical challenges in the synthesis of safe controllers for autonomous systems and robots. We present novel CBFs and methods that handle safety constraints (i) with time and input constraints under disturbances, (ii) with high-relative degree under disturbances and input constraints, and (iii) that are affected by adversarial inputs and sampled-data effects. We then present novel CBFs and adaptation methods that prevent loss of validity of the CBF, as well as methods to tune the parameters of the CBF online to reduce conservatism in the system response. We also address the pointwise-only optimal character of CBF- induced control inputs by introducing a CBF formulation that accounts for future trajectories, as well as implementation challenges such as how to pre- ∗ Corresponding author Email address: dpanagou@umich.edu (Dimitra Panagou) Preprint submitted to Annual Reviews on Control December 29, 2023" 2312.16726v1,"1 FairCompass: Operationalising Fairness in Machine Learning Jessica Liu, Huaming Chen Member, IEEE, Jun Shen Senior Member, IEEE, and Kim-Kwang Raymond Choo Abstract—As artificial intelligence (AI) increasingly becomes an integral part of our societal and individual activities, there is a growing imperative to develop responsible AI solutions. Despite a diverse assortment of machine learning fairness solutions is proposed in the literature, there is reportedly a lack of practical implementation of these tools in real-world applications. Industry experts have participated in thorough discussions on the challenges associated with operationalising fairness in the development of machine learning-empowered solutions, in which a shift toward human-centred approaches is promptly advocated to mitigate the limitations of existing techniques. In this work, we propose a human-in-the-loop approach for fairness auditing, presenting a mixed visual analytical system (hereafter referred to as ‘FairCompass’), which integrates both subgroup discovery technique and the decision tree-based schema for end users. Moreover, we innovatively integrate an Exploration, Guidance and Informed Analysis loop, to facilitate the use of the Knowledge Generation Model for Visual Analytics in FairCompass. We evaluate the effectiveness of FairCompass for fairness auditing in a real-world scenario, and the findings demonstrate the system’s potential for real-world deployability. We anticipate this work will address the current gaps in research for fairness and facilitate the operationalisation of fairness in machine learning systems. Impact Statement—To address the drawbacks of existing fairness solutions and assist in operationalising fairness, we propose a new approach to fairness tool that combines technical, nontechnical and visual analytics solutions to fairness. We demonstrate this novel approach by benchmarking with FairVis and Fairness Compass. The problem space of this paper assumes the scope of the tools, which is to assist in fairness auditing for machine learning classifiers. Ultimately, we anticipate this work as a first step towards operationalising fairness, in the direction of establishing formal fairness processes within teams, organisations, and institutions, by better meeting the needs of practitioners who are tasked with the responsibility of fairness. Index Terms—AI Fairness, Human-in-the-loop, Visual analytics I. I NTRODUCTION T HE use of artificial intelligence in decision making has become increasingly popular across a range of industries such as healthcare, commerce, marketing, education and many more [1]. As AI takes on the automation of crucial decisionmaking processes traditionally overseen by humans, we observe the increasing prevalence of unfair outcomes attributed to AI systems. It is coupled with an increasing focus on fairness research and a growing call for responsible AI. Many case Jessica Liu and Huaming Chen are with the School of Electrical and Computer Engineering, University of Sydney, Australia. (Corresponding author e-mail: huaming.chen@sydney.edu.au). Jun Shen is with the University of Wollongong, Australia. (e-mail: jshen@uow.edu.au). Kim-Kwang Raymond Choo is with The University of Texas at San Antonio, San Antonio, TX 78249, USA. (e-mail: raymond.choo@fulbrightmail.org). studies of unfair machine learning models underscore the fact that the biases within the machine learning life cycle, can adversely affect the individuals, with an overwhelming number of people belonging to marginalised groups [2], [3]. Existing fairness research in the field of machine learning is primarily focused on addressing the challenge of minimising algorithmic bias [3], which has led to an abundance of technical solutions to combat algorithmic bias [4], [5]. However, a growing concern revolves around the inadequate implementation of these solutions in practical settings. It highlights a disconnect between the progress in fairness detailed in literature and the practical adoption by practitioners or organisations [6], [7], [8]. One main concern of current fairness solutions is the overemphasis on the algorithmic and statistical approach to fairness, such as the statistical definitions of fairness and bias detection algorithms [3]. It is widely recognised that fairness in machine learning is a socio-technical problem, and a humancentred approach to model understanding, diagnosing, and steering is needed to incorporate human values. This allows practitioners to pick up on information or patterns that may otherwise be neglected by computers [9]. Furthermore, fairness practices have yet to be widely adopted by institutions and organisations as standard procedure, and the responsibility of fairness is often left to the practitioners as extra work that is high effort and low reward [6]. Operationalising fairness in real-world problems require more nuanced and complex solutions that take into consideration the actors at each stage, refering to as human-in-the-loop machine learning. In [10], the incorporation of fairness in machine learning with visual analytics is explored with the outcome of FairVis, an interactive system designed to audit the fairness and facilitate the discovery of biases. A main focus in FairVis is to identify the intersectional bias. More recently, the Fairness Compass is developed to formalise the decision process with a decision tree and specify the fairness objective for the application context [11]. The decision tree serves as a guideline to narrow down the solution space, providing extensible capability to prioritise the most appropriate fairness metrics, and consequently being able to select the most suitable bias mitigation measures. Other existing works, such as Aequitas [5], AI Fairness 360 [4], Google’s What-If Tool [12], also present promising results in the venue of novel approaches to fairness research as they aim to address problems commonly encountered by practitioners according to fairness related literature. However, they have either overemphasis on technical solutions or difficulties in operationlising fairness for practitioners. To address the drawbacks of existing fairness solutions and assist in operationalising fairness, we propose ‘FairCompass’" 2312.16732v1,"CdTe and HgTe doped with V, Cr, and Mn – prospects for the quantum anomalous Hall effect Giuseppe Cuono ID , 1 Carmine Autieri ID , 1, ∗ and Tomasz Dietl ID 1 1 International Research Centre MagTop, Institute of Physics, Polish Academy of Sciences, Aleja Lotników 32/46, PL-02668 Warsaw, Poland (Dated: December 29, 2023) Using first principle calculations we examine properties of (Cd,V)Te, (Cd,Cr)Te, (Hg,V)Te, and (Hg,Cr)Te relevant to the quantum anomalous Hall effect (QAHE), such as the position of V- and Cr-derived energy levels and the exchange interactions between magnetic ions. We consider CdTe and HgTe, containing 12.5% of cation-substitutional V or Cr ions in comparison to the well-known case of (Cd,Mn)Te and (Hg,Mn)Te, and examine their suitability for fabrication of ferromagnetic barriers or ferromagnetic topological quantum wells, respectively. To account for the strong correlation of transition metal d electrons we employ hybrid functionals with different mixing parameters a HSE focusing on a HSE = 0.32, which better reproduces the experimental band gaps in HgTe and Hg 0.875 Mn 0.125 Te. We find that Cr, like Mn, acts as an isoelectronic dopant but V can be an in-gap donor in CdTe and a resonant donor in HgTe, similar to the case of Fe in HgSe. From the magnetic point of view, Cr-doping results in a ferromagnetic phase within the general gradient approximation (GGA) but interactions become antiferromagnetic within hybrid functionals. However, (Hg,V)Te is a ferromagnet within both exchange-correlation functionals in a stark contrast to (Hg,Mn)Te for which robust antiferromagnetic coupling is found theoretically and experimentally. Furthermore, we establish that the Jahn-Teller effect is relevant only in the case of Cr-doping. Considering lower defect concentrations in HgTe-based quantum wells compared to (Bi,Sb) 3 Te 2 layers, our results imply that HgTe quantum wells or (Cd,Hg)Te barriers containing either V or Cr show advantages over (Bi,Sb,Cr,V) 3 Te 2 -based QAHE systems but whether (i) ferromagnetic coupling will dominate in the Cr case and (ii) V will not introduce too many electrons to the quantum well is to be checked experimentally. I. INTRODUCTION The theoretical prediction [1] and the experimental discovery of the quantum anomalous Hall effect (QAHE) in dilute ferromagnetic semiconductor (Bi,Sb,Cr) 2 Te 3 [2] and other systems [3] have triggered research on the prospects of dissipationless and spin-polarized carrier channels for energy-efficient and decoherence-free electronic and spintronic classical and quantum devices [4, 5]. Simultaneously, the application potential of the QAHE for resistance [6–8] and current [9] standards operating in the absence of an external magnetic field has been demonstrated. It has, however, become clear that relatively large native defect concentrations in (Bi,Sb) 2 Te 3 and related systems, typically above 10 19 cm −3 , and the associated in-gap impurity-band charge transport, limit the standards’ operation to below 100 mK and 1 µA [6– 10]. Particularly relevant for the present work is the observation of the QAHE in (Bi,Sb) 2 Te 3 layers sandwiched between ferromagnetic (Zn,Cr)Te barriers [11]. It is, therefore, interesting to consider the metrology prospects of HgTe and related systems, in which the native defect concentration is at the 10 16 cm −3 level [12, 13]. It was found that at the quantum well (QW) thickness corresponding to the topological phase transition, the quantum Hall (QH) plateau R xy = −h/e 2 appears in weak magnetic fields and persists in a broad magnetic ∗ autieri@magtop.ifpan.edu.pl range of the magnetic fields [14, 15], the observation relevant to the QHE metrology [15]. The effect is particularly spectacular in the case of (Cd,Hg)Te/(Hg,Mn)Te QW, where the broad plateau begins at 50 mT [16]. Those surprising observations were explained by an energetic overlap of the acceptor impurity band with the hole portion of the QW Dirac cone [12, 13]. The Coulomb gap, charge ordering, and the formation of bound magnetic polarons (in the Mn-doped samples) are the essential ingredients of the model [12, 13]. In the case of the studied samples [16], QHE dominates over a possible QAHE [17], as the QAHE requires also the presence of a magnetic field – ferromagnetic coupling between Mn spins in II- VI compounds appears only if the hole density exceeds 10 20 cm −3 [18, 19], whereas intrinsic Mn-Mn interactions are antiferromagnetic [20]. In the present and companion paper [21], we address the question of which cation-substitutional transitionmetal (TM) impurities in barriers or QWs could lead to the QAHE in HgTe-based systems. The conditions to be considered experimentally and theoretically include: 1. Sufficiently high – in a couple of percent range – solubility limits of particular dopants at the cationsubstitutional positions and without aggregation. Importantly, the equilibrium limits can often be overcome by appropriate growth protocols [22] and, for instance, incorporation of Cr to ZnTe by lowtemperature molecular beam epitaxy appears successful [11]." 2312.16736v1,"Traversable Wormholes induced by Stress Energy Conservation: combining Casimir Energy with a scalar field Remo Garattini ∗ Università degli Studi di Bergamo, Dipartimento di Ingegneria e Scienze Applicate, Viale Marconi 5, 24044 Dalmine (Bergamo) Italy and I.N.F.N.- sezione di Milano, Milan, Italy. Athanasios G. Tzikas † Università degli Studi di Bergamo, Dipartimento di Ingegneria e Scienze Applicate, Viale Marconi 5, 24044 Dalmine (Bergamo) Italy. We investigate possible manifolds characterizing traversable wormholes in the presence of a scalar field, which is minimally coupled to gravity and has both kinetic and potential energy. The feature of traversability requires the violation of the null energy condition, which, in turn, signals the existence of exotic matter with negative energy density. For this reason, we impose a hypothetical Casimir apparatus with plates positioned at a distance either parametrically fixed or radially varying. The main feature of all the derived solutions is the conservation of the Stress Energy Tensor. Such a conservation though requires the introduction of an auxiliary field, which we interpret as a gravitational response of the Traversable Wormhole to the original source. Interestingly, the only case that seems to avoid the necessity for such an auxiliary field, is the one involving a scalar field with a potential, in combination with a Casimir device with fixed plates. I. INTRODUCTION What happens if a Casimir wormhole[1] is powered by a source of positive energy density? A partial attempt to answer this question has been addressed in [2], where an electric field generated by a point charge has been superposed to the original Casimir source. However, an electric field has a Stress Energy Tensor (SET) of the following form EM T µν = Q 2 2 2 (4π) ε 0 r 4 diag(1, −1, 1, 1) (1) obeying the following equation of state ρ = −p r . (2) As a consequence, the Null Energy Condition (NEC) is violated: ρ (r) + p r (r) = ρ C (r) + p r,C (r) + ρ E (r) + p r,E (r) = − 4~cπ 2 < 0 720r 4 (3) where ρ C (r) = − ~cπ 2 , 720r 4 p r,C (r) = − 3~cπ 2 , 720r 4 ρ E (r) = Q 2 2 (4π) 2 ε 0 r 4 , p r,E (r) = − Q 2 2 (4π) 2 ε 0 r 4 . (4) In other words, the introduction of an electric field does not change the violation of the NEC by means of the Casimir source. Nevertheless, if one tries to extend this analysis to a scalar field replacing the electric field, the answer may not be trivial. It is well known that a scalar field of opposite polarity can be a source of Traversable Wormholes (TW) even without an additional Casimir source. Such an opposite polarity is better known as a phantom field. The result is a very well known TW also dubbed as Ellis-Bronniknov (EB) TW [3, 4]. Its line element is given by   (5) ds 2 = −dt 2 + dl 2 + l 2 + r 0 2 dθ 2 + sin 2 θ dφ 2 ∗ Electronic address: remo.garattini@unibg.it † Electronic address: athanasios.tzikas@unibg.it" 2312.16737v1,"HMP: Hand Motion Priors for Pose and Shape Estimation from Video Enes Duran 1, 2 1 Muhammed Kocabas 1, 3 † Zicong Fan 1, 3 2 Michael J. Black 1 3 MPI for Intelligent Systems, Tübingen, Germany University of Tübingen, Germany ETH Zürich, Switzerland * Vasileios Choutas 1, Corresponding author: enes.duran@tue.mpg.de VIDEO INPUT SOTA METHOD HMP (OURS) Figure 1. Given challenging hand interaction videos (top), a recent state-of-the-art hand pose estimation approach [64] (middle), fails to produce accurate 3D hand poses. To address this, we exploit a large-scale motion-capture dataset AMASS [37] to train a motion prior and use latent optimization to recover hand pose from videos. Our model HMP (bottom) is robust to occlusion and produce temporally stable results, outperforming previous work on standard benchmarks. Abstract Understanding how humans interact with the world necessitates accurate 3D hand pose estimation, a task complicated by the hand’s high degree of articulation, frequent occlusions, self-occlusions, and rapid motions. While most existing methods rely on single-image inputs, videos have useful cues to address aforementioned issues. However, existing video-based 3D hand datasets are insufficient for training feedforward models to generalize to in-the-wild scenarios. On the other hand, we have access to large human motion capture datasets which also include hand motions, e.g. AMASS. Therefore, we develop a generative motion prior specific for hands, trained on the AMASS dataset which features diverse and high-quality hand motions. This motion prior is then employed for video-based 3D hand motion estimation following a latent optimization approach. Our integration of a robust motion prior significantly enhances performance, especially in occluded scenarios. It produces stable, temporally consistent results that surpass conventional single-frame methods. We demonstrate our method’s efficacy via qualitative and quantitative evaluations on the HO3D and DexYCB datasets, with special emphasis on an occlusion-focused subset of HO3D. Code is available at https://hmp.is.tue.mpg.de 1. Introduction Hands often serve as our primary mean for manipulating objects and engaging with our surrounding environments. Therefore, accurately reconstructing the 3D poses and shapes of hands from RGB images plays a crucial † Work done at MPI, now at Google" 2312.16753v1,"+ − The e + e − → Λ + c Λ̄ c cross sections and the Λ c electromagnetic form factors within the extended vector meson dominance model Cheng Chen, 1, 2, ∗ Bing Yan, 1, 3, † and Ju-Jun Xie 1, 2, 4, ‡ 2 1 Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, China School of Nuclear Sciences and Technology, University of Chinese Academy of Sciences, Beijing 101408, China 3 College of Mathematics and Physics, Chengdu University of Technology, Chengdu 610059, China 4 Southern Center for Nuclear-Science Theory (SCNT), Institute of Modern Physics, Chinese Academy of Sciences, Huizhou 516000, Guangdong Province, China − Within the extended vector meson dominance model, we investigate the e + e − → Λ + c Λ̄ c reaction and the + electromagnetic form factors of the charmed baryon Λ c . The model parameters are determined by fitting them − + to the cross sections of the process e + e − → Λ + c Λ̄ c and the magnetic form factor |G M | of Λ c . By considering four charmoniumlike states, called ψ(4500), ψ(4660), ψ(4790), and ψ(4900), we can well describe the current − data on the e + e − → Λ + c Λ̄ c reaction from the reaction threshold up to 4.96 GeV. In addition to the total cross sections and |G M |, the ratio |G E /G M | and the effective form factor |G eff | for Λ + c are also calculated, and found that these calculations are consistent with the experimental data. Within the fitted model parameters, we have also estimated the charge radius of the charmed Λ + c baryon. I. INTRODUCTION The information about the electromagnetic structure of hadrons is reflected in the electromagnetic form factors (EMFFs) [1–3]. In the single photon exchange approximation, according to the four-momentum squared q 2 of the photon, the physical region is categorized into the spacelike region (q 2 < 0) and timelike region (q 2 > 0). Experimentally, the spacelike region corresponds to the scattering channel e − B → e − B (B stands for a baryon), and the timelike region to the annihilation channel e + e − → B B̄ ( B̄ stands for an antibaryon). In the spacelike region, the EMFFs are associated with the charge and magnetic moment distribution of the hadrons at small momentum transfers, but they are hardly measured for the unstable hadrons, such as Λ and Σ with a strange quark, Ξ with two strange quarks, and the Λ + c with a charm quark. Therefore, the process e + e − → B B̄ is the main channel to measure the EMFFs in the timelike region for the hyperons [4–7]. For the e + e − → B B̄ reaction, the effective form factor |G eff | can be extracted from the Born cross section, which represents the dependence of effective coupling strength of the photon-baryon interaction vertex γB B̄, and |G eff | is a function of the four-momentum squared q 2 of the virtual photon. The vector meson dominance (VMD) model is a very successful tool for studying the nucleon electromagnetic form factors, in both the spacelike and timelike regions [8–10]. In the VMD model, the virtual photon coupling to baryons is through the intermediate vector mesons, as shown in Fig. 1, where V stands the vector mesons that have significant cou- ∗ Electronic address: chencheng@impcas.ac.cn † Electronic address: yanbing@impcas.ac.cn ‡ Electronic address: xiejujun@impcas.ac.cn plings to the final states B B̄. On the theoretical side, within the VMD model, the EMFFs of hyperons were investigated, such as Σ [11, 12], Ξ [12], and Λ [13, 14]. 𝑒 − 𝐵 𝛾 ∗ 𝑒 + 𝑉 𝐵 ¯ FIG. 1: The Feynman diagram of e + e − → B B̄ in the VMD model. In the charm sector, the Λ + c as the lightest single-charm baryon is interested in both theoretical and experimental studies. The Belle Collaboration firstly measured total crosss sec- − tions of the process of e + e − → Λ + c Λ̄ c , and a new charmoniumlike state, denoted as the Y (4630) was discovered [15]. After that, in 2018, the BESIII Collaboration published the − precise results near the Λ + c Λ̄ c threshold at four center of mass energies, and the threshold enhancement of the total cross section was found [16]. These measurements have at- − tracted some theoretical studies. In Refs. [17, 18], the Λ + c Λ̄ c final state interactions (FSI) were considered in the investi- − gation of the e + e − → Λ + c Λ̄ c reaction. In addition to the X(4660), the threshold enhancement was well explained by a − virtual pole generated by Λ + c Λ̄ c attractive FSI [18]. More- + over, the EMFFs of Λ c were investigated by virtue of the VMD model in Ref. [19], where these charmonium states ψ(1S), ψ(2S), ψ(3770), ψ(4040), ψ(4160), and ψ(4415) were included in the model. Note that all these above charmonium states considered in Ref. [19] are below the mass − threshold of Λ + c Λ̄ c [20]. Hence, these nonmonotonic struc-" 2312.16775v1,"Proceedings of Machine Learning Research vol vvv:1–26, 2024 Error bounds, PL condition, and quadratic growth for weakly convex functions, and linear convergences of proximal point methods Feng-Yi Liao FLIAO @ UCSD . EDU Department of Electrical and Computer Engineering, University of California San Diego Lijun Ding LDING 47@ WISC . EDU Wisconsin Institute for Discovery, University of Wisconsin–Madison, Madison Yang Zheng ZHENGY @ UCSD . EDU Department of Electrical and Computer Engineering, University of California San Diego Abstract Many machine learning problems lack strong convexity properties. Fortunately, recent studies have revealed that first-order algorithms also enjoy linear convergences under various weaker regularity conditions. While the relationship among different conditions for convex and smooth functions is well understood, it is not the case for the nonsmooth setting. In this paper, we go beyond convexity and smoothness, and clarify the connections among common regularity conditions (including strong convexity, restricted secant inequality, subdifferential error bound, Polyak-Łojasiewic inequality, and quadratic growth) in the class of weakly convex functions. In addition, we present a simple and modular proof for the linear convergence of the proximal point method (PPM) for convex (possibly nonsmooth) optimization using these regularity conditions. The linear convergence also holds when the subproblems of PPM are solved inexactly with a proper control of inexactness. Keywords: Error bound, Polyak-Łojasiewic inequality, quadratic growth, proximal point method. 1. Introduction Machine learning has shown impressive performance on a wide range of applications. Behind these successes, (sub)gradient-based methods and their variants are the workhorse algorithms. Many studies have investigated the theoretical foundations of these first-order iterative algorithms. For smooth and/or convex cases, (sub)gradient methods are most well-understood (Nesterov, 2018). It is well-known that the basic gradient descent algorithm achieves linear convergence for minimizing smooth and strongly convex functions. However, strong convexity is a very strong assumption, and many fundamental models in machine learning lack this good property (Agarwal et al., 2010). Alternative regularity conditions that are weaker than strong convexity have been revealed in the past. For example, gradient descent also converges linearly under Polyak-Lojasiewic inequality or Restricted secant inequality (Polyak, 1963; Zhang and Yin, 2013; Karimi et al., 2016; Guille- Escuret et al., 2022). These two conditions can even hold for nonconvex functions. The classical bundle method converges linearly under quadratic growth for smooth convex functions (Dı́az and Grimmer, 2023). This linear convergence result has recently been extended for general semidefinite optimization (a very broad class of conic programs) in Ding and Grimmer (2023); Liao et al. (2023). While smooth and convex (but not strongly convex) problems cover a variety of applications, modern machine learning practice routinely deals with problems lacking both qualities (e.g., training nonsmooth and nonconvex deep networks). Recent studies have further identified one amenable problem classes: weakly convex (Davis and Drusvyatskiy, 2019). The class of problems includes all convex functions, L-smooth functions, certain compositions of convex functions with smooth functions, and many cost functions in modern machine learning (Drusvyatskiy and Davis, 2020; Atenas © 2024 F.-Y. Liao, L. Ding & Y. Zheng." 2312.16783v1,"Meshfree method for solving the elliptic Monge-Ampère equation with Dirichlet boundary ⋆ Zhiyong Liu, Qiuyan Xu ∗ School of Mathematics and Statistics, Ningxia University, Yinchuan, China, 750021 Abstract We prove the convergence of meshfree method for solving the elliptic Monge-Ampère equation with Dirichlet boundary on the bounded domain. L 2 error is obtained based on the kernel-based trial spaces generated by the compactly supported radial basis functions. We obtain the convergence result when the testing discretization is finer than the trial discretization. The convergence rate depend on the regularity of the solution, the smoothness of the computing domain, and the approximation of scaled kernel-based spaces. The presented convergence theory covers a wide range of kernel-based trial spaces including stationary approximation and non-stationary approximation. An extension to non-Dirichlet boundary condition is in a forthcoming paper. Keywords: Monge-Ampère equation; Meshfree method; Radial basis functions; Convergence rate 1. Introduction We consider the meshfree method for numerically solving the Monge-Ampère equation with Dirichlet boundary condition: det(D 2 u(x)) = f (x), in Ω ⊂ R d , (1.1) u(x) = g(x), on ∂Ω, (1.2) here Ω is a strictly convex polygonal domain with a smooth boundary ∂Ω, f is a strictly positive function, and det(D 2 u) is the determinant of the Hessian matrix D 2 u. This equation is usually augmented by the convexity constraint of u, which implies that the equation is elliptic. The numerical solution of Monge-Ampère equation is an very active topic of research. Many researchers developed kinds of numerical methods and analyzed their convergence, such as the finite difference methods [1, 2], finite element methods [3, 4], and spline methods [5]. In order to design a certain type of numerical method which can avoid the tedious mesh generation and the domain integration and can be capable of dealing with any irregular distribution of nodes, some meshfree methods based radial basis functions have been researched, which is started from 2013 in the paper [6]. And from then on, a series of meshfree methods have been proposed for solving the elliptic Monge-Ampère equation [7–10]. Unfortunately, the convergence theory of meshfree method has not been proven yet. The present paper will prove the convergence of meshfree method for the Monge- Ampère equation. To simplify the proof, we only consider the case of taking d = 2: F u := det(D 2 u(x, y)) = f (x, y), in Ω ⊂ R 2 , (1.3) u(x, y) = g(x, y), on ∂Ω. (1.4) We will rely the Böhmer/Schaback’s nonlinear discretization theory [11, 12] and the ideas of the latest paper [13], which discussed the convergence of unsymmetric radial basis functions method for second order quasilinear elliptic equations. ⋆ The research is supported by the Natural Science Foundations of China (No.12061057,12202219), and the Natural Science Foundations of Ningxia Province (No.2023AAC05001,2023AAC03003). ∗ Corresponding author. Email address: qiuyanxu@nxu.edu.cn (Qiuyan Xu ∗ )" 2312.16788v1,"M ITIGATING D EGREE B IASES IN M ESSAGE P ASSING M ECHANISM BY U TILIZING C OMMUNITY S TRUCTURES Van Thuy Hoang and O-Joun Lee † Department of Artificial Intelligence, The Catholic University of Korea Bucheon-si, Gyeonggi-do 14662, Republic of Korea {hoangvanthuy90,ojlee}@catholic.ac.kr A BSTRACT This study utilizes community structures to address node degree biases in message-passing (MP) via learnable graph augmentations and novel graph transformers. Recent augmentation-based methods showed that MP neural networks often perform poorly on low-degree nodes, leading to degree biases due to a lack of messages reaching low-degree nodes. Despite their success, most methods use heuristic or uniform random augmentations, which are non-differentiable and may not always generate valuable edges for learning representations. In this paper, we propose Community-aware Graph Transformers, namely CGT, to learn degree-unbiased representations based on learnable augmentations and graph transformers by extracting within community structures. We first design a learnable graph augmentation to generate more within-community edges connecting low-degree nodes through edge perturbation. Second, we propose an improved self-attention to learn underlying proximity and the roles of nodes within the community. Third, we propose a self-supervised learning task that could learn the representations to preserve the global graph structure and regularize the graph augmentations. Extensive experiments on various benchmark datasets showed CGT outperforms state-of-the-art baselines and significantly improves the node degree biases. The source code is available at https://github.com/NSLab-CUK/Community-aware-Graph-Transformer. Keywords Degree Unbiases · Learnable Graph Augmentation · Graph Transformer · Graph Clustering · Graph Representation Learning 1 Introduction The message-passing (MP) mechanism has been widely used in Graph Neural Networks (GNNs) and achieved great success in numerous domains [1]. GNNs learn representations for each target node through recursively receiving and aggregating the messages from its neighbors. Thus, these GNNs primarily rely on the message information exchanged between pairs of nodes to update representations. One of the main problems in MP GNNs is that existing methods perform poorly on low-degree nodes, leading to degree bias in graph learning [3, 4]. The degree bias originates from low-degree nodes having only a few neighbors, while high-degree nodes have too many neighbors in most real-world graphs. Furthermore, due to the power law distribution, most nodes in the graph have low degrees, while there are a few high-degree nodes. This issue can negatively affect the MP GNNs’ ability to learn low- and high-degree nodes. First, low-degree nodes only receive a few messages from neighborhoods, which could be biased or even under-represented in graph learning [5]. Second, high-degree nodes receive excessive information, which may lead to inherent limitations of GNNs, such as over-smoothing and over-squashing problems [6]. However, most recent GNNs overlook degree biases, which could cause unfairness and poor performance in graph learning. To illustrate the problem, consider four low-degree nodes (1, 2, 3, and 4) in Figure 1(a). These nodes with few neighbors receive less information from the neighborhood compared with high-degree nodes (blue nodes). As shown in Figure 1(b), the current graph transformer model, GT [2], performs poorly on low-degree nodes on Cora, Photo, and Computers datasets. † Correspondence: ojlee@catholic.ac.kr; Tel.: +82-2-2164-5516" 2312.16816v1,"HCIZ INTEGRAL FORMULA AS UNITARITY OF A CANONICAL MAP BETWEEN REPRODUCING KERNEL SPACES MARTIN MIGLIOLI Abstract. In this article we prove that the Harish-Chandra-Itzykson-Zuber (HCIZ) integral is equivalent to the unitarity of a canonical map between invariant subspaces of Segal-Bargmann spaces. As a consequence, we provide alternative proofs of the HCIZ integral and other results. Keywords. HCIZ integral, Segal Bargmann space, reproducing kernel, unitary map, Schur functions. (Martin Miglioli) Instituto Argentino de Matemática-CONICET. Saavedra 15, Piso 3, (1083) Buenos Aires, Argentina E-mail address: martin.miglioli@gmail.com. Date: December 29, 2023. The author was supported by IAM-CONICET, grants PIP 2010-0757 (CONICET) and PICT 2010-2478 (ANPCyT). 1" 2312.16845v1,"Evaluating the Performance of Large Language Models for Spanish Language in Undergraduate Admissions Exams Sabino Miranda 1 , Obdulia Pichardo-Lagunas 2 , Bella Martı́nez-Seis 2 , and Pierre Baldi 3 1 IEEE member, Mexico City, Mexico UPIITA-IPN, Mexico City, Mexico 3 University of California, Irvine, CA, USA smiranda@ieee.org, {opichardola, bcmartinez}@ipn.mx, pfbaldi@ics.uci.edu 2 Abstract This study evaluates the performance of large language models, specifically GPT-3.5 and BARD (supported by Gemini Pro model), in undergraduate admissions exams proposed by the National Polytechnic Institute in Mexico. The exams cover Engineering/Mathematical and Physical Sciences, Biological and Medical Sciences, and Social and Administrative Sciences. Both models demonstrated proficiency, exceeding the minimum acceptance scores for respective academic programs to up to 75% for some academic programs. GPT-3.5 outperformed BARD in Mathematics and Physics, while BARD performed better in History and questions related to factual information. Overall, GPT-3.5 marginally surpassed BARD with scores of 60.94% and 60.42%, respectively. Keywords: sions Exams. 1 Large Language Models, ChatGPT, BARD, Undergraduate Admis- Introduction In recent years, the landscape of education has been significantly influenced by the remarkable advancements in generative artificial intelligence and large language models (LLMs). These innovations have paved the way for many educational technology solutions, aiming to streamline the often cumbersome and time-consuming tasks associated with generating and analyzing textual content. These models, exemplified by Generative Pre-trained Transformer (GPT) [16], harness deep learning, reinforcement learning, and self-attention mechanisms to process and generate human-like text based 1" 2312.16854v1,"TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts Hui Gao Hongyu Kuang ∗ Wesley K. G. Assunção State Key Lab of Novel Software Technology, Nanjing University Nanjing, China ghalexcs@gmail.com State Key Lab of Novel Software Technology, Nanjing University Nanjing, China khy@nju.edu.cn CSC, North Carolina State University Raleigh, USA wguezas@ncsu.edu Christoph Mayr-Dorn Guoping Rong He Zhang ISSE, Johannes Kepler University Linz, Austria christoph.mayrdorn@jku.at State Key Lab of Novel Software Technology, Nanjing University Nanjing, China ronggp@nju.edu.cn State Key Lab of Novel Software Technology, Nanjing University Nanjing, China hezhang@nju.edu.cn Xiaoxing Ma Alexander Egyed State Key Lab of Novel Software Technology, Nanjing University Nanjing, China xxm@nju.edu.cn ISSE, Johannes Kepler University Linz, Austria alexander.egyed@jku.at ABSTRACT Traceability allows stakeholders to extract and comprehend the trace links among software artifacts introduced across the software life cycle, to provide significant support for software engineering tasks. Despite its proven benefits, software traceability is challenging to recover and maintain manually. Hence, plenty of approaches for automated traceability have been proposed. Most rely on textual similarities among software artifacts, such as those based on Information Retrieval (IR). However, artifacts in different abstraction levels usually have different textual descriptions, which can greatly hinder the performance of IR-based approaches (e.g., a requirement in natural language may have a small textual similarity to a Java class). In this work, we leverage the consensual biterms and transitive relationships (i.e., inner- and outer-transitive links) based on intermediate artifacts to improve IR-based traceability recovery. We first extract and filter biterms from all source, intermediate, and target artifacts. We then use the consensual biterms from the intermediate artifacts to enrich the texts of both source and target artifacts, and finally deduce outer and inner-transitive links to adjust text similarities between source and target artifacts. We conducted a comprehensive empirical evaluation based on five systems widely used in other literature to show that our approach can outperform four state-of-the-art approaches in Average Precision ∗ Corresponding author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 979-8-4007-0217-4/24/04. . . $15.00 https://doi.org/3597503.3639164 over 15% and Mean Average Precision over 10% on average, and how its performance is affected by different conditions of source, intermediate, and target artifacts. CCS CONCEPTS • Software and its engineering → Traceability; Requirements analysis; • Information systems → Information retrieval. KEYWORDS Software Traceability, Information Retrieval, Transitive Links ACM Reference Format: Hui Gao, Hongyu Kuang, Wesley K. G. Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang, Xiaoxing Ma, and Alexander Egyed. 2024. TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 13 pages. https://doi.org/3597503.3639164 1 INTRODUCTION & MOTIVATION Multiple software artifacts in different levels of abstraction are introduced during the development process, including (1) high-level requirements, use cases, and specifications; and (2) low-level artifacts such as source code and tests [29, 35]. Accordingly, software traceability is defined as “the ability to interrelate any uniquely identifiable software engineering artifact to any other, maintain required links over time, and use the resulting network to answer questions of both the software product and its development process” [1]. It allows stakeholders to comprehend the system functionalities behind introduced software artifacts. Recent work has shown that traceability is paramount in the context of collaborative development, helping developers to keep all artifacts synchronized and consistent across a myriad of tools and domains [62]. When correctly recovered and maintained, these trace links can not only" 2312.16874v1,"1 Reconfigurable Intelligent Surfaces for 6G: Emerging Hardware Architectures, Applications, and Open Challenges Ertugrul Basar, Fellow, IEEE, George C. Alexandropoulos, Senior Member, IEEE, Yuanwei Liu, Fellow, IEEE, Qingqing Wu, Senior Member, IEEE, Shi Jin, Fellow, IEEE, Chau Yuen, Fellow, IEEE, Octavia A. Dobre, Fellow, IEEE, and Robert Schober, Fellow, IEEE (Invited Paper) Abstract—Reconfigurable intelligent surfaces (RISs) are rapidly gaining prominence in the realm of fifth generation (5G)-Advanced, and predominantly, sixth generation (6G) mobile networks, offering a revolutionary approach to optimizing wireless communications. This article delves into the intricate world of the RIS technology, exploring its diverse hardware architectures and the resulting versatile operating modes. These include RISs with signal reception and processing units, sensors, amplification units, transmissive capability, multiple stacked components, and dynamic metasurface antennas. Furthermore, we shed light on emerging RIS applications, such as index and reflection modulation, non-coherent modulation, next generation multiple access, integrated sensing and communications (ISAC), energy harvesting, as well as aerial and vehicular networks. These exciting applications are set to transform the way we will wirelessly connect in the upcoming era of 6G. Finally, we review recent experimental RIS setups and present various open problems of the overviewed RIS hardware architectures and their applications. From enhancing network coverage to enabling new communication paradigms, RIS-empowered connectivity is poised to play a pivotal role in shaping the future of wireless networking. This article unveils the underlying principles and potential impacts of RISs, focusing on cutting-edge developments of this physical-layer smart connectivity technology. Index Terms—Reconfigurable intelligent surfaces, 6G, hardware architectures, RIS operation modes, RIS applications. E. Basar is with the Communications Research and Innovation Laboratory (CoreLab), Department of Electrical and Electronics Engineering, Koç University, Sariyer 34450, Istanbul, Turkey (e-mail: ebasar@ku.edu.tr). G. Alexandropoulos is with the Department of Informatics and Telecommunications, National and Kapodistrian University of Athens Greece (e-mail: alexandg@di.uoa.gr). Y. Liu is with the School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK (email: yuanwei.liu@qmul.ac.uk). Q. Wu is with the Department of Electronic Engineering, Shanghai Jiao Tong University, 200240, China (email: qingqingwu@sjtu.edu.cn). S. Jin is with the National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China (e-mail: jinshi@seu.edu.cn). C. Yuen is with the School of Electrical and Electronics Engineering, Nanyang Technological University, 50 Nanyang Ave, Singapore 639798 (email: chau.yuen@ntu.edu.sg). O. A. Dobre is with Department of Electrical and Computer Engineering, Memorial University, 240 Prince Philip Dr., St. John’s, NL A1B 3X5 Canada (e-mail: odobre@mun.ca). R. Schober is with the Institute for Digital Communications, FriedrichAlexander University of Erlangen-Nuremberg, Erlangen 91058, Germany (email: robert.schober@fau.de). I. I NTRODUCTION IRELESS connectivity empowered by reconfigurable intelligent surfaces (RISs) has emerged as a groundbreaking technology in the ever-evolving landscape of sixth generation (6G) mobile networks [1], [2]. In a world where seamless and efficient wireless communications is increasingly essential, RISs offer a compelling solution by deliberately manipulating the radio propagation environment. This article provides an in-depth exploration of the recent developments in this emerging technology, delving into its multifaceted dimensions, from its diverse architectural considerations to its different operating modes. As fifth generation (5G)-Advanced is being standardized and 6G networks loom on the horizon, the relevance and significance of RISs are becoming increasingly apparent. One of the central aspects we examine, in this article, is the hardware structure of an RIS, overviewing the latest advances in the technology’s core hardware components. These metasurfaces contain many tiny unit elements that can be controlled to manipulate their impinging electromagnetic (EM) waves. The intricate interplay of these elements opens up a world of possibilities for customizing wireless communications. In this context, understanding the underlying RIS hardware components is crucial to realizing the potential of the technology in 6G networks. Notably, we provide detailed coverage of emerging RIS architectures, including RISs with signal reception and processing units, sensors, amplification units, transmissive capability, multiple stacked components (i.e., 3D RIS-based structures), and dynamic metasurface antennas. In addition to the RIS hardware architectures, the article illuminates the various operating modes resulting from them. These modes enable RISs to serve diverse purposes, from improving network coverage in challenging environments to supporting entirely new communications and sensing paradigms. By allowing real-time adaptability, the RIS technology empowers network operators to optimize the wireless environments where their systems operate dynamically [3]. This adaptability is crucial in addressing the ever-increasing demands of 6G networks. At this point, we shift our focus into emerging reflection, index, and non-coherent modulation schemes empowered by RISs, along with other emerging RIS applications, such as next generation multiple access (NGMA), W" 2312.16895v1,"RLPlanner: Reinforcement Learning based Floorplanning for Chiplets with Fast Thermal Analysis Yuanyuan Duan 1 , Xingchen Liu 1 , Zhiping Yu 2 , Hanming Wu 1 , Leilai Shao 3∗ , Xiaolei Zhu 1∗ 1 School of Micro-Nano Electronics, Zhejiang University, Hangzhou, China 2 School of Integrated Circuits, Tsinghua University, Beijing, China 3 School of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai, China Abstract—Chiplet-based systems have gained significant attention in recent years due to their low cost and competitive performance. As the complexity and compactness of a chipletbased system increase, careful consideration must be given to microbump assignments, interconnect delays, and thermal limitations during the floorplanning stage. This paper introduces RLPlanner, an efficient early-stage floorplanning tool for chipletbased systems with a novel fast thermal evaluation method. RLPlanner employs advanced reinforcement learning to jointly minimize total wirelength and temperature. To alleviate the timeconsuming thermal calculations, RLPlanner incorporates the developed fast thermal evaluation method to expedite the iterations and optimizations. Comprehensive experiments demonstrate that our proposed fast thermal evaluation method achieves a mean absolute error (MAE) of ±0.25 K and delivers over 120x speedup compared to the open-source thermal solver HotSpot. When integrated with our fast thermal evaluation method, RLPlanner achieves an average improvement of 20.28% in minimizing the target objective (a combination of wirelength and temperature), within a similar running time, compared to the classic simulated annealing method with HotSpot. Index Terms—reinforcement learning, fast thermal evaluation, chiplet floorplanning I. I NTRODUCTION To address the increasing cost of large Systems-on-Chip (SoCs) on advanced technology nodes, chiplet-based design or 2.5D integration has emerged as a solution. However, as the complexity and compactness of chiplet-based systems increase, it becomes critical to address issues such as microbump assignments, interconnect delays, and thermomechanical stress during the initial floorplanning stage. Traditional physical floorplanning of monolithic chips primarily focuses on reducing total wirelength and minimizing area [1], which results in compact floorplans that may lead to potential thermal-induced failures. Recent floorplanning works have started considering the thermal aspect in chipletbased systems [2], [3]. They employ simple greedy strategies or simulated annealing (SA) to handle chiplet system floorplanning, lacking the flexibility and transferability required for complex 2.5D integrations. Moreover, these optimization methods are constrained by time-consuming thermal evaluations, which hinder fast and efficient exploration of thermalaware floorplanning. Some attempts have been made to use convolutional neural networks (CNN) or graph convolutional This work was supported by Pre-research project of ministry foundation (Grant No.31513010501).(* Corresponding Authors: Leilai Shao (leilaishao@sjtu.edu.cn) and Xiaolei Zhu (xl zhu@zju.edu.cn)) Fig. 1. Overview of RLPlanner: The implementation of chiplet floorplanning using reinforcement learning. networks (GCN) to build surrogate models for accelerated thermal evaluations [4], [5]. However, these models often rely on empirical parameters, such as tile and window sizes, requiring domain knowledge for determination, or show limited speed-ups (<3x), making them impractical for real designs. In this work, we present RLPlanner, a floorplanning tool based on reinforcement learning (RL) for early-stage chipletbased systems. RLPlanner utilizes advanced RL techniques and incorporates a novel fast thermal evaluation method to optimize both the maximum operating temperature and total wirelength of the chiplet system. II. M ETHODOLOGY A. Overall Architecture of RLPlanner As shown in Fig. 1, the overall architecture of RLPlanner consists of three main parts: the floorplanning environment for chiplets, the RL-based agent, and a thermal-aware reward calculator. The environment updates the action mask M t and state s t based on previously placed chiplets at each time step t. The agent generates the probability matrix of actions π θ (a t |s t ) and the expected reward V (s t ) by the policy and value networks, correspondingly. Before sampling the action a t that places chiplets sequentially, the probability of infeasible actions will set to be ’0’ based on M t . Once all chiplets have been placed, the reward calculator will first perform microbump assignments to minimize the total wirelength by allocating pin locations for each inter-chiplet connection, and then conduct the thermal evaluation. B. Reinforcement Learning and Agent Architecture In our agent architecture, the policy network and the value network share the same feature encoding CNN layers and two" 2312.16902v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Joint Learning for Scattered Point Cloud Understanding with Hierarchical Self-Distillation Kaiyue Zhou, Ming Dong, Member, IEEE, Peiyuan Zhi, Shengjin Wang, Senior Member, IEEE Abstract—Numerous point-cloud understanding techniques focus on whole entities and have succeeded in obtaining satisfactory results and limited sparsity tolerance. However, these methods are generally sensitive to incomplete point clouds that are scanned with flaws or large gaps. To address this issue, in this paper, we propose an end-to-end architecture that compensates for and identifies partial point clouds on the fly. First, we propose a cascaded solution that integrates both the upstream and downstream networks simultaneously, allowing the task-oriented downstream to identify the points generated by the completionoriented upstream. These two streams complement each other, resulting in improved performance for both completion and downstream-dependent tasks. Second, to explicitly understand the predicted points’ pattern, we introduce hierarchical selfdistillation (HSD), which can be applied to arbitrary hierarchybased point cloud methods. HSD ensures that the deepest classifier with a larger perceptual field and longer code length provides additional regularization to intermediate ones rather than simply aggregating the multi-scale features, and therefore maximizing the mutual information between a teacher and students. We show the advantage of the self-distillation process in the hyperspaces based on the information bottleneck principle. On the classification task, our proposed method performs competitively on the synthetic dataset and achieves superior results on the challenging real-world benchmark when compared to the stateof-the-art models. Additional experiments also demonstrate the superior performance and generality of our framework on the part segmentation task. Index Terms—Joint Learning, hierarchical self-distillation, scattered point cloud understanding, information bottleneck. I. I NTRODUCTION Point cloud completion and understanding are essential in quite a number of 3D computer vision tasks, including autonomous driving, augmented reality, industrial manufacturing, and robotic maneuver. Especially, in interactive scenarios such as robotic grasp, an ill-scanned object or scene leads to difficulty on accurate interactions for two reasons. First, planes and objects need to be reconstructed from sensor-produced point clouds for collision detection and grasp pose selection. Second, the interaction manner and force are dependant upon the cognition of objects that is subject to the irregularity and sparseness of point clouds. In recent years, numerous studies [1]–[3] were proposed to leverage point cloud directly This work was supported by the National Key Research and Development Program of China in the 14th Five-Year (Nos. 2021YFF0602103 and 2021YFF0602102). Kaiyue Zhou, Peiyuan Zhi, and Shengjin Wang are with the Department of Electronic Engineering, Tsinghua University, Beijing 100084, China (email: kyzhou@wayne.edu; zhipy20@mails.tsinghua.edu.cn; wgsgj@tsinghua.edu.cn). Ming Dong is with the Department of Computer Science, Wayne State University, Detroit, MI 48202, USA (email: mdong@wayne.edu). Piano S 3 Piano? diff S 2 S 1 S 1 S 2 Bed Local feature (a) MSG of PointNet++ S 3 MI diff MI Our HSD (b) Fig. 1: (a) An exemplar demonstration, in which an incomplete point cloud can be erroneously identified as a distinct object. (b) The comparison between multi-scale grouping (MSG) of PointNet++ and PointNet++ with our HSD framework. The mutual information (MI) is maximized between scales S 3 and S 1 /S 2 such that the differences among those perceptual fields are learned by self-distillation (denoted by the knowledge flow paths 99K). for understanding. While the globally- and locally- extracted features increase the tolerance of irregularity and sparseness, they are hindered from processing point clouds with a large amount of missing parts or overly sparse surfaces due to fast scanning, occlusion, view point, or sensor resolution. As a result, [4], [5] were proposed specifically concentrating on sparse point clouds to tackle this problem. However, these methods utilizing either sophisticated voxelization procedure or multi-view photometric information do not generalize well due to limited memory or the need of additional supervisory signal. An intuitive plan is to first compensate the incomplete parts, and then to sequentially apply a recognition algorithm on the completed point clouds. Nevertheless, models trained separately may suffer from lower robustness caused by the inconsistency in point distributions. Without explicitly learning the overall shape, as illustrated in Fig. 1(a), the network may allocate excessive attention to irrelevant points or outliers caused by irregular local shapes, leading to degraded performance. The masked autoencoder (MAE) was initially developed to pre-train encoders by learning the correspondence between masked sections and original input data such as texts, images, or point clouds. This facilitated finetuning processes for natural language processing (NLP) [6] and computer vision [7]–[9] tasks. Albeit MAE is primarily regarded as a pre-training model for improving classification performance, its reconstruction capacity is advantageous in scenarios where observations are incomplete. Additionally," 2312.16914v1,"arXiv Version (arxiv.org) ROI-Aware Multiscale Cross-Attention Vision Transformer for Pest Image Identification 1 Ga-Eun Kim and *,1 Chang-Hwan Son 1 Department of Software Science & Engineering, Kunsan National University 558 Daehak-ro, Gunsan-si 54150, Republic of Korea * Corresponding Author Phone Number: 82-63-469-8915; Fax Number: 82-63-469-7432 E-MAIL: changhwan76.son@gmail.com; cson@kunsan.ac.kr Abstract The pests captured with imaging devices may be relatively small in size compared to the entire images, and complex backgrounds have colors and textures similar to those of the pests, which hinders accurate feature extraction and makes pest identification challenging. The key to pest identification is to create a model capable of detecting regions of interest (ROIs) and transforming them into better ones for attention and discriminative learning. To address these problems, we will study how to generate and update the ROIs via multiscale cross- attention fusion as well as how to be highly robust to complex backgrounds and scale problems. Therefore, we propose a novel ROI-aware multiscale cross-attention vision transformer (ROI-ViT). The proposed ROI-ViT is designed using dual branches, called Pest and ROI branches, which take different types of maps as input: Pest images and ROI maps. To render such ROI maps, ROI generators are built using soft segmentation and a class activation map and then integrated into the ROI-ViT backbone. Additionally, in the dual branch, complementary 1" 2312.16924v1,"Springer Nature 2021 L A TEX template The metal-poor atmosphere of a Neptune/Sub-Neptune planet’s progenitor Saugata Barat 1* , Jean-Michel Désert 1 , Allona Vazan 2 , Robin Baeyens 1 , Michael R. Line 3 , Jonathan J. Fortney 4 , Trevor J. David 5 , John H. Livingston 6,7,8 , Bob Jacobs 1 , Vatsal Panwar 1,9,12 , Hinna Shivkumar 1 , Kamen O. Todorov 1 , Lorenzo Pino 10 , Georgia Mraz 1 and Erik A. Petigura 1 Anton Pannekoek Institute, University of Amsterdam, Amsterdam, 1098XH, Netherlands. 2 Astrophysics Reseach Center (ARCO), The Open University of Israel, Ra’anana, 43107, Israel. 3 School of Earth and Space Exploration, Arizona State University, Tempe, AZ 85287, USA. University of California, Santa Cruz, CA 95064, USA. 5 Center for Computational Astrophysics, Flatiron Institute, New York, NY 10010, USA. 6 Astrobiology Center, 2-21-1 Osawa, Mitaka, Tokyo 181-8588, Japan. 7 National Astronomical Observatory of Japan,2-21-1 Osawa, Mitaka, Tokyo 181-8588, Japan. 8 Department of Astronomy, Graduate University for Advanced Studies (SOKENDAI), Tokyo, 2-21-1 Osawa, Mitaka, Japan. 9 Department of Physics, University of Warwick, Coventry CV4 7AL, UK. 10 INAF - Osservatorio Astrofisico di Arcetri, Largo E. Fermi 5, Firenze, 50125, Italy. 11 Department of Physics & Astronomy, University of California Los Angeles, Los Angeles, CA, 90095, USA. 12 Centre for Exoplanets and Habitability, University of Warwick, Coventry CV4 7AL, UK. 4 Department of Astronomy & Astrophysics, 1" 2312.16958v1,"A survey on set-theoretical solutions to the pentagon equation Marzia MAZZOTTA Dipartimento di Matematica e Fisica “Ennio De Giorgi”, Università del Salento, Via Provinciale Lecce-Arnesano, 73100 Lecce (Italy) Abstract This survey aims to collect the main results of the theory of the set-theoretical solutions to the pentagon equation obtained up to now in the literature. In particular, we present some classes of these solutions and raise some questions. Keywords: pentagon equation, set-theoretical solution 2020 MSC: 16T25, 81R50 Introduction The pentagon equation classically originates from the field of Mathematical Physics. It appears in various forms in different contexts, such as in the representation theory of quantum groups as the Biedenharn–Elliott identity for 6j-symbols [4], in quantum conformal field theory as the identity for the fusion matrices [28], in quasi-Hopf algebras as the consistency equation for the association [12]. Still, it appears in other areas of mathematics, also with different terminologies (see, for instance, [1, 2, 17, 15, 18, 25, 31]). Supposed anyone wants to deepen contexts in which the pentagon equation appears, we refer to the papers on polygon equations [11, 27] with the references therein. Given a vector space V over a field F , a linear map S ∶ V ⊗ V → V ⊗ V is said to be a solution of the pentagon equation if it holds S 12 S 13 S 23 = S 23 S 12 , where S 12 = S ⊗id V , S 23 = id V ⊗ S, S 13 = (id V ⊗ Σ) S 12 (id V ⊗ Σ), with Σ the flip operator on V ⊗ V , i.e., Σ(u ⊗ v) = v ⊗ u, for all u, v ∈ V . Maillet [21] showed that solutions of the pentagon equation lead to solutions of the tetrahedron equation [34], a multidimensional generalization of the well-known quantum Yang-Baxter equation [3, 32]. Indeed, as one can note, the pentagon equation is the quantum Yang-Baxter equation with the middle term missing on the right-hand side. Furthermore, Militaru showed that bijective solutions on finite vector spaces are in one-to-one correspondence with finite Hopf algebras, Email address: marzia.mazzotta@unisalento.it (Marzia MAZZOTTA) December 29, 2023" 2312.16969v1,"Towards Bloodless Potassium Measurement from ECG using Neuro-Fuzzy Systems Zeynab Samandari 1 , Seyyedeh Fatemeh Molaeezadeh 2 * 1 MSc Student, Department of Electrical and Computer Engineering, Jundi-Shapur University of Technology, Dezful, Iran. (https://orcid.org/0000-0003-1680-3636) 2 Assistant Professor, Department of Electrical and Computer Engineering, Jundi-Shapur University of Technology, Dezful, Iran. (https://orcid.org/0000-0003-0921-6310) * Corresponding author: Phone: (+98) 061-42418500-2346 Fax: (+98) 061-42418555 Email: fmolaee@jsu.ac.ir Abstract Potassium disorders are generally asymptomatic, potentially lethal, and common in patients with renal or cardiac disease. The morphology of the electrocardiogram (ECG) signal is very sensitive to the changes in potassium ions, so ECG has a high potential for detecting dyskalemias before laboratory results. In this regard, this paper introduces a new system for ECG-based potassium measurement. The proposed system consists of three main steps. First, cohort selection & data labeling were carried out by using a 5- minute interval between ECGs and potassium measurements and defining three labels: hypokalemia, normal, and hyperkalemia. After that, feature extraction & selection were performed. The extracted features are RR interval, PR interval, QRS duration, QT interval, QTc interval, P axis, QRS axis, T axis, and ACCI. Kruskal-Wallis technique was also used to assess the importance of the features and to select discriminative ones. Finally, an ANFIS model based on FCM clustering (FCM-ANFIS) was designed based on the selected features. The used database is ECG-ViEW II. Results showed that T axis compared with other features has a significant relationship with potassium levels (P<0.01, r=0.62). The absolute error of FCM-ANFIS is 0.4±0.3 mM, its mean absolute percentage error (MAPE) is 9.99%, and its r-squared value is 0.74. Its classification accuracy is 85.71%. In detecting hypokalemia and hyperkalemia, the sensitivities are 60% and 80%, respectively, and the specificities are 100% and 97.3%, respectively. This research has shed light on the design of noninvasive instruments to measure potassium concentration and to detect dyskalemias, thereby reducing cardiac events. Keywords: ANFIS, Dyskalemias Detection, ECG, FCM clustering, Noninvasive Measurement, T wave axis." 2312.16984v1,"cite this paper as Herbert De Gersem, Thomas Weiland, ”Reformulation and generalisation of the air-gap element”, ICS Newsletter, Vol. 12, No. 1, ISSN 1026-0854, 1 March 2005, pp. 2–8, ArXiV. Technical article Technical article Reformulation and Generalisation of the Air-Gap Element Reformulation and Generalisation of the Air-Gap Element Abstract — The air-gap macro element is reformulated Abstract — The air-gap macro element is reformulated such that such that rotation, rotor or stator skewing and rotor rotation, rotor or stator skewing and rotor eccentricity can be incoreccentricity porated can be easily. incorporated easily. The air-gap The air-gap element is evaluated using Fast el- Fourier ement is evaluated using Fast Fourier Transforms Transforms which in combination with the Conjugate which Gradient alin combination with the Conjugate Gradient algorithm gorithm leads to highly efficient and memory inexpensive iterative solution scheme. The air-gap element features beneficial leads to highly efficient and improved memory inexpensive iterapproximation and is competitive to moving-band ative solution scheme. properties The improved air-gap element and sliding-surface technique. features beneficial approximation properties and is competitive to moving-band and I. sliding-surface I NTRODUCTION technique. ρ rt d ecc γ ecc r st Figure 1: Eccentric geometry. Introduction Figure 1: Eccentric geometry. In 1982, I. Abdel Razek et al. proposed the air-gap macro element to couple stator and rotor finite element (FE) models taking reduced to an interface condition applied at the common inter- In 1982, Abdel Razek motion et al. into proposed the In air-gap macro their relative account [1]. this paper, it is shown face Γ = Γ and weighted by harmonic functions [2]. The st to the rt stator whereas the moving cartesian and element to couple stator and rotor finite element (FE) mod- ro- attached that the air-gap element is not only convenient for modelling air-gap part Ω ag of the computational coordinate systems (x ′ , y ′ ) domain and (ρ, does φ) not are necessarconsidered tation, but also for modelling and eccentricity. els taking their relative motion into skew account [1]. In Despite this the polar ily coincide with the physical air gap, i.e., parts of the air gap advantages, the air-gap air-gap element did not standard at the rotor. The relation between both coordinate systems paper, it is clear shown that the element is become not only may be comprised in Ω st and Ω rt . in electrical machine simulation. numerican be A expressed by formulation based on the magnetic vecconvenient for modelling rotation, but This also has for a practical, modelling magnetoquasistatic cal reason: the air-gap element introduces a cumbersome, dense tor potential A is discretised at the 2D cross-sections Ω and st skew and eccentricity. Despite the clear advantages, the ȷθ ȷ(φ+ω m t) ȷγ ecc block in the sparse FE system of equations. With the rising pop- Ω by linear re = ρe finite + d (FEs) . a system (1) ecc e yielding triangular elements rt air-gap element did not become standard in electrical maularity of iterative solvers as e.g. the Conjugate Gradient algo- of equations of the form chine simulation. This has element a practical, reason: rithm, the air-gap approach numerical was abandoned in favour of The computational domain Ω = Ω st ∪Ω ag ∪Ω rt consists of moving-band and sliding-surface techniques dense which both guaranthe stator part Ω st , M the d rotor part Ω and the air gap part the air-gap element introduces a cumbersome, block u + Ku + g = rt f (2) matrices. dt between the stator and rotor in the sparse tee FE sparse system of equations. With the rising pop- Ω ag (Fig. 2). The interfaces In this solvers paper, we rehabilitate the air-gap element apparts air gap are M denoted by mass Γ st matrix = Ω st re- ∩ Ω ag for and each the FE model part. part In (2), denotes the ularity of iterative as want e.g. to the Conjugate Gradient proach by showing its advantages over other techniques and by lated to the conductivity, K is the curl-curl stiffness matrix inand Γ rt = Ω rt ∩Ω ag . The radii of both interfaces are denoted algorithm, the air-gap element approach was abandoned in alleviating its numerical drawbacks. corporating the reluctivity, f is the discretisation of the applied favour of moving-band and sliding-surface techniques which by r st and ρ rt respectively. When the air gap part is empty current density and u contains the degrees of freedom for the Ω ag = ∅, the air-gap element is reduced to an interface both guarantee sparse matrices. II. FE M ACHINE M ODEL z-component of the magnetic vector potential. The contribution In this paper, we want to rehabilitate the air-gap element condition applied at the  common interface Γ st = Γ rt and For convenience, we only consider 2D FE models of cylindriweighted by harmonic functions The air-gap part approach by showing its advantages over other techniques g i = − H θ (θ)N [8]. (3) Ω ag i (θ) dΓ cal machines. The generalisation of all discussed techniques to Γ of the computational domain does not necessarily coincide and by alleviating its numerical drawbacks. 3D machine models is straightforward. Moreover, the benefits of to the the magnetic field strength H θ tangential with represent the physical air gap, i.e., parts of the air gap intermay be the presented are Model even more pronounced for 3D mod- II. FE techniques Machine face Γ weighted by the Ω FE shape functions N i . The two discomprised in Ω and . st rt els. We assume the stator to be fixed and the rotor to be rotating connected FE domains Ω st and Ω rt give raise to two decoupled at the mechanical velocity ω m (t). The center line of rotation A magnetoquasistatic formulation based on the magnetic For convenience, we only consider 2D FE models of cylin- FE systems of equations of the form (2) which are here disis not necessarily at the center of the stator (Fig. 1). Both cenvector potential A is discretised at the 2D cross-sections Ω st tinguished by subscripts · st and · rt . When Ω ag = ∅ and both drical machines. The generalisation discussed by techter lines differ in the considered of 2D all cross-section the vector and FE Ω rt model by linear triangular finite (FEs) interyielding parts have a matching mesh elements at the common niques to 3D (d ecc machine is ) straightforward. Morecos γ ecc , models d ecc sin γ ecc where d ecc and γ ecc denote the mag- a system of equations of the form face, the surface currents at the common boundary vanish, i.e., over, the benefits of the the presented techniques are even nitude and angle of the eccentricity, respectively. Both static g st + g rt = 0 and the standard FE system of equations can be d FE systems and eliminating the set and dynamic eccentricities considered. more pronounced for 3D models. are We assume Hence, the d stator ecc and γ ecc obtained by combining u + Ku + g = f (2) M both may depend on time. is common to take the skewing of the stato be fixed and the rotor to It be rotating at the mechanidt of the interface. The time discretisation of unknowns at one side tor or the rotor into account, also when simulating 2D models. cal velocity ω m (t). The center line of rotation is not nec- for each of (2) can carried part. out by any scheme. FE be model In time (2), integration M denotes the mass ma- Here, we assume that the rotor is skewed by an angle γ skew . The The degrees of freedom for the z-component of the magessarily at the center of the stator (Fig. 1). Both center trix related to the conductivity, K is the curl-curl stiffness standstill cartesian and polar coordinate systems (x, y) and (r, θ) netic vector potential allocated at Γ st and Γ rt are collected in lines differ in are the considered 2D whereas cross-section the vecattached to the stator the moving by cartesian and polar matrix incorporating is the discretisation and reluctivity, are selected f from the vectors u st the vectors ũ st and ũ rt the  where  tor (d ecc cos γ coordinate , d sin γ ) d and γ denote ϕ) are considered at the rotor. ecc ecc systems ecc (x , y ) and (ρ, ecc ecc of the applied current density and u contains the degrees and u rt by the rectangular selection matrices Q st and Q rt , i.e., The and relation systems can respecbe expressed the magnitude the between angle both of coordinate the eccentricity, u st the and ũ z-component = Q u . ũ st = Q st for of freedom of the magnetic vector port rt rt tively. Both by static and dynamic eccentricities are considtential. The contribution θ (ϕ+ω m t) γ ecc III. S TATOR = ρe + d time. ecc e Z -R OTOR C OUPLING ered. Hence, d ecc and γ ecc re may depend on It . is com- (1) mon to take the skewing of the stator ac- of the g i approaches = − H for consists When classifying stator-rotor coupling accord- (3) The computational domain Ω = or Ω the θ (θ)N i (θ) dΓ st ∪Ω rotor ag ∪Ω rt into Γ Ω rt and the air gap Ω ag (Fig. 2). ing to the nature of the geometrical stator part Ω st , the rotor decomposition of the macount, also when simulating 2D part models. Here, we part assume The is interfaces stator and rotor parts and the air gap chine model, one can distinguish between H sliding-surface and represent the magnetic field strength that the rotor skewed between by an the angle γ skew . The standstill θ tangential to the = Ω st ∩ Ω (x, Ω rt θ) ∩ are Ω ag . The interface are denoted by Γ st systems air-gap Γ interface models. ag and rt = (r, weighted by the FE shape functions N i . The two cartesian and part polar coordinate y) Γ and radii of both interfaces are denoted by r st and ρ rt respectively. When the air gap part is empty Ω ag = ∅, the air-gap element is 1 In sliding-surface techniques, the movement of the rotor is modelled at a common interface Γ somewhere in the air gap." 2312.16989v1,"Nanophotonics 2023; XXX Research Article Changming Huang, Ce Shang*, Yaroslav V. Kartashov, and Fangwei Ye* Vortex solitons in topological disclination lattices Abstract: The existence of thresholdless vortex solitons trapped at the core of disclination lattices that realize higher-order topological insulators is reported. The study demonstrates the interplay between nonlinearity and higher-order topology in these systems, as the vortex state in the disclination lattice bifurcates from its linear topological counterpart, while the position of its propagation constant within the bandgap and localization can be controlled by its power. It is shown that vortex solitons are characterized by strong field confinement at the disclination core due to their topological nature, leading to enhanced stability. Simultaneously, the global discrete rotational symmetry of the disclination lattice imposes restrictions on the maximal possible topological charge of such vortex solitons. The results illustrate the strong stabilizing action that topologically nontrivial structures may exert on excited soliton states, opening new prospects for soliton-related applications. Keywords: Vortex solitons; Topological disclination lattices; Stability; Propagation dynamics 1 Introduction Vortex solitons are localized, self-trapped states with nonzero orbital angular momentum. They were encountered in various physical systems such as nonlinear optical materials, Bose-Einstein condensates, polariton condensates, and plasmas [1–9]. Since phase singular- Changming Huang, Department of Physics, Changzhi University, Changzhi, Shanxi 046011, China. https://orcid.org/0000-0002- 3520-4922 *Corresponding author: Ce Shang, King Abdullah University of Science and Technology (KAUST), Physical Science and Engineering Division (PSE), Thuwal 23955-6900, Saudi Arabia. E- mail: shang.ce@kaust.edu.sa. https://orcid.org/0000-0003-2207- 7036 Yaroslav V. Kartashov, Institute of Spectroscopy, Russian Academy of Sciences, 108840, Troitsk, Moscow, Russia. https: //orcid.org/0000-0001-8692-982X *Corresponding author: Fangwei Ye, School of Physics and Astronomy, Shanghai Jiao Tong University, Shanghai 200240, China. E-mail: fangweiye@sjtu.edu.cn. https://orcid.org/0000- 0003-2263-9000 ity in vortex is a topologically stable object persisting even in the presence of perturbations, such states have important applications in tweezers [10], vortex microlasers [11], and information encoding [12, 13]. Vortex solitons are ideal for optical logic gates in all-optical computing and communication [14]. At the same time, being higher-order excited nonlinear states, they are prone to various dynamical instabilities. Different approaches have been proposed to stabilize them (see reviews [2, 3]) that include the utilization of competing or nonlocal nonlinearities, rapid parameter variations, spin-orbit coupling, and various optical potentials including periodic lattices [15–19]. Remarkably, when such potentials possess discrete rotational symmetry, they impose restrictions on the available charges of supported vortex solitons [20–22]. While it is predicted that semi-vortex solitons can emerge in the bulk of topological lattices in the continuum limit [23, 24] and non-vortical solitons sustained by continuous Jackiw- Rossi-like distortion [25] were reported, strongly localized vortex solitons in potentials belonging to the class of topological insulators have not been studied to our knowledge. The remarkable property of topological insulators is the existence of localized states at their edges or corners, which are protected by the system’s topology. These states have energies that fall within the forbidden topological gaps. The theory of quantized polarization [26, 27] connecting the topological properties of bulk bands in such structures with the appearance of edge states has recently been extended from dipole to multipole moments, showcasing the development from first-order topological insulators [28, 29] to higher-order ones [30–37]. The bulk-boundary correspondence in these systems may be characterized by a co-dimension ranging from one to higher. Furthermore, topological systems exhibit a rich variety of nonlinear phenomena that acquire unique features due to their topological nature. These phenomena include the formation of topological solitons [38–51], lasing in topological states [52–55], enhanced generation of higher harmonics [56], nonlinear Thouless pumps [57– 61], among others. Despite the exciting opportunities" 2312.17004v1,"C ONTINUAL L EARNING IN M EDICAL I MAGING A NALYSIS : A C OMPREHENSIVE R EVIEW OF R ECENT A DVANCEMENTS AND F UTURE P ROSPECTS Pratibha Kumari 1 , Joohi Chauhan 2,3 , Afshin Bozorgpour 1 , Reza Azad 4 , and Dorit Merhof * 1,5 1 Faculty of Informatics and Data Science, University of Regensburg, Regensburg 93053, Germany 2 Motilal Nehru National Institute of Technology Allahabad, Uttar Pradesh 211004, India 3 University of California, Davis, CA 95616, USA 4 Faculty of Electrical Engineering and Information Technology, RWTH Aachen University, Aachen 52062, Germany 5 Fraunhofer Institute for Digital Medicine MEVIS, Bremen 28359, Germany A BSTRACT Medical imaging analysis has witnessed remarkable advancements even surpassing human-level performance in recent years, driven by the rapid development of advanced deep-learning algorithms. However, when the inference dataset slightly differs from what the model has seen during one-time training, the model performance is greatly compromised. The situation requires restarting the training process using both the old and the new data which is computationally costly, does not align with the human learning process, and imposes storage constraints and privacy concerns. Alternatively, continual learning has emerged as a crucial approach for developing unified and sustainable deep models to deal with new classes, tasks, and the drifting nature of data in non-stationary environments for various application areas. Continual learning techniques enable models to adapt and accumulate knowledge over time, which is essential for maintaining performance on evolving datasets and novel tasks. Owing to its popularity and promising performance, it is an active and emerging research topic in the medical field and hence demands a survey and taxonomy to clarify the current research landscape of continual learning in medical imaging analysis. This systematic review paper provides a comprehensive overview of the state-of-the-art in continual learning techniques applied to medical imaging analysis. We present an extensive survey of existing research, covering topics including catastrophic forgetting, data drifts, stability, and plasticity requirements. Further, an indepth discussion of key components of a continual learning framework such as continual learning scenarios, techniques, evaluation schemes, and metrics is provided. Continual learning techniques encompass various categories, including rehearsal, regularization, architectural, and hybrid strategies. We assess the popularity and applicability of continual learning categories in various medical subfields like radiology and histopathology. Our exploration considers unique challenges in the medical domain, including costly data annotation, temporal drift, and the crucial need for benchmarking datasets to ensure consistent model evaluation. The paper also addresses current challenges and looks ahead to potential future research directions. Keywords Continual Learning · Drift · Domain Shift · Concept Drift · Medical Image Analysis · Histopathology · Radiology 1 Introduction In the evolving field of medical imaging analysis, the dynamic nature of healthcare data poses a critical challenge for the generalizability of the machine learning/deep learning models to new data/domains. The data-driven approaches have challenges due to the limited availability and accessibility of sufficiently large and diverse medical data for training. Additionally, the source variability, scanner manufacturer, imaging protocol, and diverse population groups make the ∗ Corresponding author: Dorit Merhof. e-mail: dorit.merhof@ur.de" 2312.17007v1,"On the rate of convergence of an over-parametrized Transformer classifier learned by gradient descent ∗ Michael Kohler 1 and Adam Krzyżak 2,† 1 Fachbereich Mathematik, Technische Universität Darmstadt, Schlossgartenstr. 7, 64289 Darmstadt, Germany, email: kohler@mathematik.tu-darmstadt.de 2 Department of Computer Science and Software Engineering, Concordia University, 1455 De Maisonneuve Blvd. West, Montreal, Quebec, Canada H3G 1M8, email: krzyzak@cs.concordia.ca December 3, 2023 Abstract Classification from independent and identically distributed random variables is considered. Classifiers based on over-parametrized transformer encoders are defined where all the weights are learned by gradient descent. Under suitable conditions on the a posteriori probability an upper bound on the rate of convergence of the difference of the misclassification probability of the estimate and the optimal misclassification probability is derived. AMS classification: Primary 62G08; secondary 62G20. Key words and phrases: Gradient descent, over-parametrization, pattern recognition, rate of convergence, Transformer networks. 1 Introduction 1.1 Scope of this article One of the most recent and fascinating breakthroughs in artificial intelligence is Chat- GPT, a chatbot which can simulate human conversation. ChatGPT is an instance of GPT4, which is a language model based on generative predictive transformers. So if one wants to study from a theoretical point of view, how powerful such artificial intelligence can be, one approach is to consider transformer networks and to study which problems one can solve with these networks theoretically. Here it is not only important what kind of models these network can approximate, or how they can generalize their knowledge learned by choosing the best possible approximation to a concrete data set, but also how well optimization of such transformer network based on concrete data set works. In this article we consider all these three different aspects simultaneously and show a theoretical ∗ † Running title: Over-parametrized transformers Corresponding author. Tel: +1-514-848-2424 ext. 3007, Fax:+1-514-848-2830 1" 2312.17013v1,"Perspectives of Global and Hong Kong’s Media on China’s Belt and Road Initiative LE CONG KHOO 1 and ANWITAMAN DATTA 2 1 School of Computer Science and Engineering, Nanyang Technological University, Singapore 2 School of Computer Science and Engineering, Nanyang Technological University, Singapore Corresponding author: ANWITAMAN DATTA 2 Email address: ANWITAMAN@NTU.EDU.SG ABSTRACT This study delves into the media analysis of China’s ambitious Belt and Road Initiative (BRI), which, in a polarized world, and furthermore, owing to the very polarizing nature of the initiative itself, has received both strong criticisms and conversely positive coverage in media from across the world. In that context, Hong Kong’s dynamic media environment, with a particular focus on its drastically changing press freedom before and after the implementation of the National Security Law is of further interest. Leveraging data science techniques, this study employs Global Database of Events, Language, and Tone (GDELT) to comprehensively collect and analyse (English) news articles on the BRI. Through sentiment analysis, we uncover patterns in media coverage over different periods from several countries across the globe, and delve further to investigate the the media situation in the Hong Kong region. This work thus provides valuable insights into how the Belt and Road Initiative has been portrayed in the media and its evolving reception on the global stage, with a specific emphasis on the unique media landscape of Hong Kong. In an era characterised by increasing globalisation and inter-connectivity, but also competition for influence, animosity and trade-wars, understanding the perceptions and coverage of such significant international projects is crucial. This work stands as an interdisciplinary endeavour merging geopolitical science and data science to uncover the intricate dynamics of media coverage in general, and with an added emphasis on Hong Kong. INTRODUCTION Motivation In this study, we foremost explore the evolving media coverage of the Belt and Road Initiative (BRI) on a global scale. The BRI, a global infrastructure development strategy launched by China in 2013 (McBride et al., 2023), has garnered increasing media attention as it fosters economic connectivity and cooperation between China and other nations. The media plays a pivotal role in shaping public perceptions, making it vital to comprehend how their coverage of the BRI varies over geography and evolved over time (McCombs, 2013). Besides the global landscape, given the drastic recent changes in Hong Kong, it stands out as a crucial area for examination. Specifically, the region has witnessed a noticeable decline in press freedom (RSF, 2023a), notably in the year 2022 (Thomala, 2023), prompting us to delve deeper into Hong Kong news articles. The enactment of the National Security Law (NSL) (National People’s Congress, 2020) in 2020 further added complexity to the media landscape in Hong Kong, making it an essential lens through which to analyse the evolving narrative surrounding the BRI. Hong Kong, renowned as a global financial hub and a key gateway to China (Hong Kong Monetary Authority, 2023), plays a pivotal role in the success of the BRI. The initiative holds significant importance" 2312.17042v1,"High-order Finite-Volume Central Targeted ENO Family Scheme for Compressible Flows in Unstructured Meshes ⋆,⋆⋆ Qihang Ma a , Feng Feng b , Kai Leong Chong a,c , Jianzhao Wu a,c , Zhiming Lu a,c , Quan Zhou a and Bofu Wang a a Shanghai Key Laboratory of Mechanics in Energy Engineering, Shanghai Institute of Applied Mathematics and Mechanics, School of Mechanics and Engineering Science, Shanghai University, Shanghai University, Shanghai 200072, China b China Academy of Aerospace Science and Innovation, Beijing 100176, China c Shanghai Institute of Aircraft Mechanics and Control, Zhangwu Road, Shanghai 200092, China ARTICLE INFO ABSTRACT Keywords: CTENO CWENO Unstructured Mesh High-order Accuracy Compressible Flow Due to its innovative weighting method, the high-order target ENO (TENO) system has shown tremendous potential for complicated flow prediction. For unstructured meshes, we have developed non-oscillatory central target ENO family schemes in this study. In comparison with standard WENO schemes, the compact directional stencils significantly enhance the possibility that one of them will be in smooth area. The scheme is inherently limited in size in order to simplify the directional stencils in implementation. Following an effective scale separation method, we employ the ENO-like stencil selection technique, which selects candidate reconstructions from large central stencils in smooth areas to enforce the ENO property and from small directional stencils at discontinuities to restore high-order accuracy. With the validation of a number of test cases, a detailed comparison of CWENO, TENO, CTENO and CTENOZ schemes was carried out to assess their performance based on accuracy, robustness, parallel scalability and run time. Our findings demonstrate high-order precision, lower numerical dissipation, and superior sharp shock-capturing performance of proposed CTENO and CTENOZ schemes. 1. Introdution In computational fluid dynamics, high-order accuracy techniques are an essential area of study. It is necessary for the solution to resolve smooth flows with high order precision while keeping the solution non-oscillatory in the presence of discontinuities. High order and low dissipation characteristics are crucial for resolving small-scale flow patterns in complicated flow simulations. These conditions provide challenges for the development of current algorithms for computation. Several methods have been put out for this target, such as artificial viscosity schemes[1], total variation diminishing (TVD) schemes[2], essentially non-oscillatory (ENO) schemes[3] and weighted essentially non-oscillatory (WENO) schemes[4]. WENO schemes, considered as most efficient high-order numerical methods for shock-capturing, were initially proposed in finite-volume format by Liu et al. [4] and subsequently expanded to finite-difference format by Jiang and Shu et al.[5]. These schemes were derived from ENO proposed by Harten et al.[3] and surpass ENO by incorporating all candidate stencils using indicators of smoothness. This guarantees restoration of globally achieving optimal high-order accuracy in smooth areas asymptotically. Subsequently, WENO scheme near critical points was improved by redefining the nonlinear weights, leading to low dissipation such as WENO-M[6] and WENO-Z[7]. However, this practical use of WENO family schemes in accurately predicting complex flows has shown that they introduce excessive dissipation when used for under-resolved simulations, such as turbulence [8]. To enhance the low dissipation characteristic of WENO schemes, several approaches have been explored. These include increasing the non-smooth weights of stencil points [9], limiting nonlinear adjustments in smooth areas [10], optimizing spectral characteristics of linear scheme background [11], and new nonlinear weights for improving accuracy and resolution[12]. For more comprehensive examination of WENO and their respective details, readers are advised to refer [13]. Fu et al.[14, 15] recently explored a group of schemes, known as targeted ENO (TENO). Utilizing ENO-like stencil selection methods, TENO possess low dissipation while still preserving the ability to capture sharp shocks. A notable feature of TENO schemes is their capability to maintain the exact linear scheme for intermediate wavenumbers, without compromising their ability to capture strong discontinuities. TENO schemes on structured meshes have found ∗ bofuwang@shu.edu.cn qzhou@shu.edu.cn Qihang Ma et al.: Preprint submitted to Elsevier Page 1 of 26" 2312.17043v1,"Collatz-Weyl Generators: High Quality and High Throughput Parameterized Pseudorandom Number Generators Tomasz R. Dziala 1 Abstract We introduce the Collatz-Weyl Generators, a family of uniform pseudorandom number generators (PRNGs) which are based on generalized Collatz mappings, derived from the Collatz conjecture and Weyl sequences. The high-quality statistical properties of our generators is demonstrated by the fact that they pass stringent randomness tests used by the research and standardization community. The proposed Collatz-Weyl Generators have a number of important properties, including solid mathematical foundations, enablement of high throughput and low latency implementation, small code and/or ASIC size, enablement of producing multiple independent streams and potential of support of cryptographic applications. Keywords: pseudorandom number generator, PRNG, parallel computing, Collatz conjecture, backtracking resistance 1. INTRODUCTION It is well known that no arithmetical method is available to automatically generate random numbers. The pseudorandom number generator (PRNG) is a deterministic algorithm that generates numbers that approximate to the properties of random numbers. Designing a good pseudorandom number generator is always a bit of an art, not strict mathematics. As von Neumann said, “we are dealing with mere ‘cooking recipes’ for making digits; they can probably not be justified, but should merely be judged by their results” [1]. Despite that fact, there are several mathematical features of a pseudorandom number generator that directly relate to the confidence we can have in it. The fundamental mathematical characteristics of a high-quality and reliable PRNG are a well defined period and the uniformity of the outputs generated by it. However, many applications require independent stream generation through the choice of a particular parameter or a jump ahead in the given sequence (cycle-splitting). In the era of microprocessor chips with multiple CPU cores that can simultaneously execute multiple threads, the scalability of the PRNG is an increasingly important feature as it renders it suitable for the generation of parallel pseudorandom numbers. In this paper, the author proposes a scheme to create highquality PRNGs. The proposed scheme is based on functions with strong mixing properties, called the generalized Collatz functions (GCFs). To eliminate the problem of short cycles we cmobine them with Weyl sequences. We focus on simplified GCFs to maximize efficiency in implementations of this scheme. However, we think that more complex GCFs are also suitable for the generation of pseudorandom numbers, especially in cryptography, owing to a wide parameter space and the Email address: CollatzGenerators@gmail.com (Tomasz R. Dziala) Preprint submitted to Elsevier non-invertibility 1 of such mappings as this may result in a resistance to backtracking in specific schemes [2]. Furthermore, past research has shown that such functions can be associated with factorization as well as the discrete logarithm problem, where this makes them suitable for cryptographic applications [3]. We leave this issue open for future research. 2. COLLATZ-WEYL GENERATORS Collatz-Weyl Generators (CWGs) are chaotic generators that are combined with Weyl sequences to eliminate the risk of short cycles. They have a large period, a uniform distribution, and the ability to generate multiple independent streams by changing their internal parameters (Weyl increment). CWGs owe their exceptional quality to the arithmetical dynamics of noninvertible, generalized, Collatz mappings based on the wellknown Collatz conjecture. There is no jump function, but each odd number of the Weyl increment initiates a new unique period, which enables quick initialization of independent streams. 2.1. Generalized Collatz Sequences Generalized Collatz sequences have been considered by several researchers. Conway [4] and, subsequently, Kurtz and Simon [5] considered the following generalizations (generalized Collatz functions): Definition 1. A function g is called a Collatz function if there is an integer m together with non-negative rational numbers 1 Note that when we use the term “non-invertibility,” we refer only to graph structures of the state space of the generator. For instance, there may be several paths to reverse the state of such a generator. We do not refer to non-invertibility in the cryptographic sense at any point in this paper. However, we suggest that the non-cryptographic non-invertibility of some of the presented schemes may remain consistent with non-invertibility in the cryptographic sense. We leave this issue as a hypothesis, and do not analyze it in this paper. December 29, 2023" 2312.17051v1,"FILP-3D: Enhancing 3D Few-shot Class-incremental Learning with Pre-trained Vision-Language Models Wan Xu 1 Tianyu Huang 1 Tianyu Qu 1 Guanglei Yang 1 Yiwen Guo 2 Wangmeng Zuo 1 1 Harbin Institute of Technology 2 Independent Researcher leaderone2002@gmail.com, tyhuang0428@gmail.com, 7203610429@stu.hit.edu.cn yangguanglei@hit.edu.cn, guoyiwen89@gmail.com, wmzuo@hit.edu.cn Abstract rally introduces new classes into the 3D domain. However, these emerging categories often comprise a limited number of instances, posing a challenge for existing 3D recognition models. Consequently, 3D few-shot class-incremental learning (FSCIL) has become increasingly important in practical applications. Previous work in 2D few-shot and zero-shot tasks [20, 47] has shown that Pre-Training Models (PTMs) excel in incremental learning scenarios, often outperforming non- PTM-based approaches. This superior performance is largely attributed to the prior knowledge that PTMs acquire [6, 10, 21], which enhances generalization in downstream tasks. Motivated by these successes, we aim to leverage PTMs to imbue our model with shape-related prior knowledge. However, the limited scale of available 3D data hampers the effectiveness of existing 3D PTMs in downstream tasks. To address this, recent studies [11, 40, 43] have successfully aligned 3D representations with Vision- Language (V-L) PTM knowledge. Building on this, we map point cloud data into a cross-modal space, utilizing vision and language pre-training to improve performance in 3D FSCIL tasks. Specifically, we generate multi-view depth maps from point clouds and employ template text prompts for classification, such as “an image of a {class name}”. While the integration of Vision-Language (V-L) Pre- Training Models (PTMs) into FSCIL tasks has yielded improvements over previous methods, two key challenges remain to limit performance. First, V-L PTMs are designed to capture detailed visual features such as color and texture. However, point cloud data, being a collection of discrete points, lacks the information to represent these intricate visual details. This discrepancy can lead to inaccurate feature extraction, adversely affecting performance. Second, the use of V-L PTMs amplifies the issue of noise sensitivity, particularly in real-world scanned data. Consequently, classification performance suffers significantly if noise disrupts the rendering of depth maps and object contours. To tackle the aforementioned challenges, we introduce Few-shot class Incremental Learning tasks with Pre- Few-shot class-incremental learning (FSCIL) aims to mitigate the catastrophic forgetting issue when a model is incrementally trained on limited data. While the Contrastive Vision-Language Pre-Training (CLIP) model has been effective in addressing 2D few/zero-shot learning tasks, its direct application to 3D FSCIL faces limitations. These limitations arise from feature space misalignment and significant noise in real-world scanned 3D data. To address these challenges, we introduce two novel components: the Redundant Feature Eliminator (RFE) and the Spatial Noise Compensator (SNC). RFE aligns the feature spaces of input point clouds and their embeddings by performing a unique dimensionality reduction on the feature space of pre-trained models (PTMs), effectively eliminating redundant information without compromising semantic integrity. On the other hand, SNC is a graph-based 3D model designed to capture robust geometric information within point clouds, thereby augmenting the knowledge lost due to projection, particularly when processing real-world scanned data. Considering the imbalance in existing 3D datasets, we also propose new evaluation metrics that offer a more nuanced assessment of a 3D FSCIL model. Traditional accuracy metrics are proved to be biased; thus, our metrics focus on the model’s proficiency in learning new classes while maintaining the balance between old and new classes. Experimental results on both established 3D FSCIL benchmarks and our dataset demonstrate that our approach significantly outperforms existing state-of-the-art methods. Code is available at Code is available at https: //github.com/HIT-leaderone/FLIP-3D 1. Introduction The proliferation of 3D content in recent years has been marked by both synthetic creations [2, 5] and real-world reconstruction [24, 29, 35]. This expansion in data scale natu- 1" 2312.17077v1,"Projected Langevin Monte Carlo algorithms in non-convex and super-linear setting Chenxu Pang 1 , Xiaojie Wang 1 and Yue Wu 2 1 School of Mathematics and Statistics, HNP-LAMA, Central South University, Changsha, Hunan, P. R. China 2 Department of Mathematics and Statistics, University of Strathclyde, Glasgow G1 1XH, UK December 29, 2023 Abstract It is of significant interest in many applications to sample from a high-dimensional target distribution π with the density π(dx) ∝ e −U (x) (dx), based on the temporal discretization of the Langevin stochastic differential equations (SDEs). In this paper, we propose an explicit projected Langevin Monte Carlo (PLMC) algorithm with non-convex potential U and super-linear gradient of U and investigate the non-asymptotic analysis of its sampling error in total variation distance. Equipped with time-independent regularity estimates for the corresponding Kolmogorov equation, we derive the non-asymptotic bounds on the total variation distance between the target distribution of the Langevin SDEs and the law induced by the PLMC scheme with order O(h| ln h|). Moreover, for a given precision ǫ, the smallest number of iterations of the classical Langevin Monte Carlo (LMC) scheme with the non-convex potential U and the globally Lipshitz gradient of U can be guaranteed by order  3/2 O d ǫ ·ln( dǫ )·ln( 1 ǫ ) . Numerical experiments are provided to confirm the theoretical findings. AMS subject classification: 60H35, 65C05, 65C30. Key Words: Langevin Monte Carlo sampling, total variation distance, non-convex potential, projected scheme, Kolmogorov equations. 1 Introduction Sampling from a high-dimensional (d ≫ 1) target distribution π plays a crucial role in various fields such as Bayesian inference, statistical physics, machine learning and computational biology and has been a subject of recent intensive research efforts. For example, evaluating the expectation of some functional φ with respect to π: Z π(φ) := φ(x)π(dx), (1.1) R d This work was supported by Natural Science Foundation of China (12071488, 12371417, 11971488) and Natural Science Foundation of Hunan Province for Distinguished Young Scholars (2020JJ2040). E-mail address: c.x.pang@csu.edu.cn, x.j.wang7@csu.edu.cn, yue.wu@strath.ac.uk ∗ 1" 2312.17099v1,"Axion Dark Matter and additional BSM aspects in an extended 2HDM setup Giorgio Arcadi 1, 2, ∗ and Sarif Khan 3, † 1 Dipartimento di Scienze Matematiche e Informatiche, Scienze Fisiche e Scienze della Terra, Universita degli Studi di Messina, Via Ferdinando Stagno d’Alcontres 31, I-98166 Messina, Italy 2 INFN Sezione di Catania, Via Santa Sofia 64, I-95123 Catania, Italy. 3 Institute for Theoretical Physics, Georg-August University Göttingen, Friedrich-Hund-Platz 1, Göttingen, D-37077 Germany Abstract We illustrate and discuss the phenomenology of a model featuring a two-Higgs doublet sector aug- mented by two SU (2) singlet scalars. The gauge symmetry group is extended as well with a U (1) B i −L i component whose spontaneous breaking leads to the gauge boson which has an important effect in the muon (g-2). A global PQ symmetry is introduced upon its breaking we have the axion particle which is also DM in our work. In particular, we have focussed on Type-X and Type-II 2HDM models and found out that (g-2) can not be explained only by the scalar sector for Type-II 2HDM mainly due to stringent constraint from b → sγ resulted in M H ± > 800 GeV. For Type-II 2HDM, we can have axion coupling with the gluons which generates the axion potential and possible explanation for the strong CP problem. The proposed model accommodates neutrino masses via the Type-I see-saw mechanism with an upper bound on the right-handed neutrino mass 1 GeV (1 TeV) for Type-II (Type-X) 2HDM due to the presence of Planck scale suppressed operators. Moreover, we also have additional scalars which affect the oblique parameters and hence the W-boson mass which leads us to explain the W-boson mass observed at CDF-II detector. The most stringent constraints on the masses and quartic couplings come from the perturbativity and potential bound from below conditions which leads to fine-tuning among the parameters in part of the parameter space. Finally, we discuss the possible detection prospects of the axion DM and the additional gauge boson. ∗ † Electronic address: giorgio.arcadi@unime.it Electronic address: sarif.khan@uni-goettingen.de 1" 2312.17109v1,"MIVC: Multiple Instance Visual Component for Visual-Language Models Wenyi Wu Amazon 424 5th Ave, New York, NY Qi Li Amazon 410 Terry Ave N, Seattle, WA wenyiwu@amazon.com qlimz@amazon.com Wenliang Zhong The University of Texas at Arlington 500 UTA Boulevard, Arlington, TX Junzhou Huang The University of Texas at Arlington 500 UTA Boulevard, Arlington, TX wxz9204@mavs.uta.edu jzhuang@uta.edu Abstract Vision-language models have been widely explored across a wide range of tasks and achieve satisfactory performance. However, it’s under-explored how to consolidate entity understanding through a varying number of images and to align it with the pre-trained language models for generative tasks. In this paper, we propose MIVC, a general multiple instance visual component to bridge the gap between various image inputs with off-the-shelf visionlanguage models by aggregating visual representations in a permutation-invariant fashion through a neural network. We show that MIVC could be plugged into the visuallanguage models to improve the model performance consistently on visual question answering, classification and captioning tasks on a public available e-commerce dataset with multiple images per product. Furthermore, we show that the component provides insight into the contribution of each image to the downstream tasks. 1. Introduction In recent years, numerous efforts [11, 38] have been made to integrate images and text with multimodal models that typically utilizes distinct encoders for different modalities of data (e.g., CNNs as visual encoders and RNNs as text encoders). These encoders are subsequently fused in a shared embedding space. More recently, with the evolution of Transformer architectures, several studies [18,20,39] have sought to unify vision and text using text and vision Transformers. These methods commonly combine information from images and text tokens, enabling collaborative attention mechanisms within the Transformer for enhanced information fusion. Despite the remarkable achievements of these methods in various multimodal tasks such as Visual Question Answering (VQA) [2] and Image Captioning [29, 36], there is an evident limitation. They often assume that input images and text are paired, meaning one image corresponds to one piece of text. However, in practical scenarios, this assumption can be challenged, as not all tasks involve a oneto-one relationship between image and text. For instance, when presented with two images, we may seek a textual description highlighting their differences. In this context, there exists a one-to-two relationship between text and images. Furthermore, multiple images may correspond to a single piece of text, especially when describing a complex object. For example, in e-commerce platform, each product is displayed with different background, from different angles or focusing on local details to provide enriched information. These images are correlated and essentially representing the same entity and therefore, it’s crucial to learn a consolidated entity representation consolidating all images that could be aligned with the pre-trained language models for general generative tasks. Given that state-of-the-art (SOTA) multimodal models [8, 18] are primarily pre-trained on the one-image-one-text paradigm, directly inputting multiple images with one piece of text is unfeasible. Consequently, existing approaches typically address this issue through two methods: (1) when processing image inputs, they concatenate multiple images into a single ”concentrated” image, or (2) they employ multiple images’ embeddings obtained via encoders as input, although this often requires fine-tuning to adapt the model to multiple visual embeddings. However, these methods are simplistic in their approach to fusing information from multiple images. How to more effectively integrate one-tomany or many-to-many of image-text data remains an open question. In this paper, we tackle the challenge regarding how" 2312.17126v1,"C-R-T Fractionalization, Fermions, and Mod 8 Periodicity Zheyan Wan, 1, ∗ Juven Wang, 2, † Shing-Tung Yau, 3, 1, ‡ and Yi-Zhuang You 4, § 1 Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing 101408, China 2 Center of Mathematical Sciences and Applications, Harvard University, MA 02138, USA 3 Yau Mathematical Sciences Center, Tsinghua University, Beijing 100084, China 4 Department of Physics, University of California San Diego, CA 92093, USA Charge conjugation (C), mirror reflection (R), time reversal (T), and fermion parity (−1) F are basic discrete spacetime and internal symmetries of the Dirac fermions. In this article, we determine R T the group, called the C-R-T fractionalization, which is a group extension of Z C 2 × Z 2 × Z 2 by the fermion parity Z F , and its extension class in all spacetime dimensions d, for a single-particle fermion 2 theory. For Dirac fermions, with the canonical CRT symmetry Z CRT , the C-R-T fractionalization 2 has two possibilities that only depend on spacetime dimensions d modulo 8, which are order-16 nonabelian groups, including the famous Pauli group. For Majorana fermions, we determine the R- T fractionalization in all spacetime dimensions d = 0, 1, 2, 3, 4 mod 8, which is an order-8 abelian or nonabelian group. For Weyl fermions, we determine the C or T fractionalization in all even spacetime dimensions d, which is an order-4 abelian group. For Majorana-Weyl fermions, we only have an order-2 Z F 2 group. We discuss how the Dirac and Majorana mass terms break the symmetries C, R, or T. We study the domain wall dimensional reduction of the fermions and their C-R-T fractionalization: from d-dim Dirac to (d − 1)-dim Dirac or Weyl; and from d-dim Majorana to (d − 1)-dim Majorana or Majorana-Weyl. CONTENTS I. Introduction and summary 2 II. Clifford algebras and representations A. Clifford algebras B. The groups Pin and Spin C. Representations D. C, R, and T as bundle maps 3 4 4 5 7 III. Dirac fermions 9 IV. Majorana, Weyl, and Majorana-Weyl fermions 18 V. Mass term 23 VI. Domain wall dimensional reduction 24 VII. Conclusion 30 VIII. Acknowledgments 33 A. Chiral representation in any d (Weyl representation in even d) 34 B. Majorana representation 34 C. Charge-like and isospin-like U(1) symmetries 36 References ∗ wanzheyan@bimsa.cn † jw@cmsa.fas.harvard.edu; http://sns.ias.edu/˜juven/ ‡ styau@tsinghua.edu.cn § yzyou@physics.ucsd.edu 38" 2312.17127v1,"Probabilistic Programming Interfaces for Random Graphs: Markov Categories, Graphons, and Nominal Sets NATE ACKERMAN, Harvard University, USA CAMERON E. FREER, Massachusetts Institute of Technology, USA YOUNESSE KADDAR, University of Oxford, UK JACEK KARWOWSKI, University of Oxford, UK SEAN MOSS, University of Birmingham, UK DANIEL ROY, University of Toronto, Canada SAM STATON, University of Oxford, UK HONGSEOK YANG, KAIST, South Korea We study semantic models of probabilistic programming languages over graphs, and establish a connection to graphons from graph theory and combinatorics. We show that every well-behaved equational theory for our graph probabilistic programming language corresponds to a graphon, and conversely, every graphon arises in this way. We provide three constructions for showing that every graphon arises from an equational theory. The first is an abstract construction, using Markov categories and monoidal indeterminates. The second and third are more concrete. The second is in terms of traditional measure theoretic probability, which covers ‘black-and-white’ graphons. The third is in terms of probability monads on the nominal sets of Gabbay and Pitts. Specifically, we use a variation of nominal sets induced by the theory of graphs, which covers Erdős-Rényi graphons. In this way, we build new models of graph probabilistic programming from graphons. CCS Concepts: • Theory of computation → Semantics and reasoning; Probabilistic computation. Additional Key Words and Phrases: probability monads, exchangeable processes, graphons, nominal sets, Markov categories, probabilistic programming 1 INTRODUCTION This paper is about the semantic structures underlying probabilistic programming with random graphs. Random graphs have applications in statistical modelling across biology, chemistry, epidemiology, and so on, as well as theoretical interest in graph theory and combinatorics (e.g. [Bornholdt and Schuster 2002]). Probabilistic programming, i.e. programming for statistical modelling [van de Meent et al. 2018], is useful for building the statistical models for the applications. Moreover, as we show (Theorem 23 and Corollary 26), the semantic aspects of programming languages for random graphs correspond to graphons [Lovász 2012], a core structure in graph theory and combinatorics. To set the scene more precisely, we recall the setting of probabilistic programming with realvalued distributions, and contrast it with the setting with graphs. Many probabilistic programming languages provide a type of real numbers (real) and distributions such as the normal distribution normal : real ∗ real → real (1) together with arithmetic operations such as (+) : real ∗ real → real. (2) Authors’ addresses: Nate Ackerman, Harvard University, USA, nate@aleph0.net; Cameron E. Freer, Massachusetts Institute of Technology, USA, freer@mit.edu; Younesse Kaddar, University of Oxford, UK, younesse.kaddar@chch.ox.ac.uk; Jacek Karwowski, University of Oxford, UK, jacek.karwowski@cs.ox.ac.uk; Sean Moss, University of Birmingham, UK, s.k.moss@ bham.ac.uk; Daniel Roy, University of Toronto, Canada, daniel.roy@utoronto.ca; Sam Staton, University of Oxford, UK, sam.staton@cs.ox.ac.uk; Hongseok Yang, KAIST, School of Computing, South Korea, hongseok00@gmail.com." 2312.17134v1,"IL NUOVO CIMENTO Vol. ?, N. ? ? Cosmic-Ray-modified and driven instabilities A. Marcowith( 1 )( ∗ ) ( 1 ) Laboratoire Univers et Particules de Montpellier, Université de Montpellier/CNRS, place E. Bataillon, cc072, 34095 Montpellier, France Summary. — These lectures address the effects of Cosmic Rays over macroinstabilities which develop in the interstellar medium and the microinstabilities the particles are able to trigger themselves. The lectures are centered on the derivation of linear growth rates but also discuss some numerical simulations addressing the issue of magnetic field saturation. A particular emphasis is made on the streaming instability, an instability driven by anisotropic cosmic-ray distributions. 1. – Introduction Cosmic Rays (CRs), i.e. charged energetic particles beyond thermal equilibrium are an important component of the interstellar medium (ISM) aside thermal gas (or plasma), magnetic fields, dust and radiation to which they roughly share a same amount of energy density E CR ∼ 1 eV/cm 3 [1]. CRs have an energy spectrum scaling as E −2.7 above a few GeV per nucleons (or a few GeV as CRs are mostly composed of protons). As the rest mass energy of a proton is m p c 2 ≃ 0.938 GeV, the energy density is carried by mildly relativistic particles. If CRs contribute a lot to ISM energy density or pressure they are negligible in terms of particle density, typically n CR ∼ 10 −10 cm −3 . The above numbers are mean values in the ISM, however close or in CR sources (like supernova remnants) CR energy density can be enhanced by one to three orders of magnitude and can hence become largely dominant. This underlines the space and also time (because CR sources have a finite lifetime) intermittent injection of CRs in the ISM. This fact makes CRs sources peculiar places where CR are more inclined to provide feed back over the local ISM notably through a class of driven instabilities [2]. CRs mostly because of their large pressure are also able to provide some feed back over instabilities that exist independently as we will discuss below. ( ∗ ) Alexandre.Marcowith@umontpellier.fr © Società Italiana di Fisica 1" 2312.17141v1,"Probabilistic Programming with Exact Conditions DARIO STEIN, Radboud University Nijmegen, The Netherlands SAM STATON, University of Oxford, United Kingdom We spell out the paradigm of exact conditioning as an intuitive and powerful way of conditioning on observations in probabilistic programs. This is contrasted with likelihood-based scoring known from languages such as Stan. We study exact conditioning in the cases of discrete and Gaussian probability, presenting prototypical languages for each case and giving semantics to them. We make use of categorical probability (namely Markov and CD categories) to give a general account of exact conditioning which avoids limits and measure theory, instead focusing on restructuring dataflow and program equations. The correspondence between such categories and a class of programming languages is made precise by defining the internal language of a CD category. CCS Concepts: • Theory of computation → Denotational semantics; Categorical semantics; Probabilistic computation. 1 INTRODUCTION Probabilistic programming is a programming paradigm that uses code to formulate generative statistical models and perform inference on them [19, 50]. Techniques from programming language theory can be used to understand modelling assumptions such as conditional independence, as well as enable optimizations that improve the efficiency of various inference algorithms (e.g. [45]). We’ll also elaborate on this application in Section 1.1. There are two different styles of conditioning on data in a probabilistic program: scoring and exact conditioning. Scoring features constructs to re-weight the current execution trace of the probabilistic program with a given likelihood. By contrast, exact conditioning focuses on a primitive operation 𝐸 1 =:= 𝐸 2 which signifies that expressions 𝐸 1 and 𝐸 2 shall be conditioned to be exactly equal. A prototypical exact conditioning program looks as follows, where we infer some underlying value x from a noisy measurement y (see also Section 1.1): x = normal ( 𝜇 =50, 𝜎 =10) # p r i o r y = normal ( 𝜇 =x, 𝜎 =5) # n o i s y measurement y =:= 40 # make e x a c t o b s e r v a t i o n Variants of exact conditioning are available in different frameworks: In Hakaru [42], certain exact conditioning queries can be addressed using symbolic disintegration, but (=:=) is not a first-class construct in Hakaru. Infer.NET [33] does allow exact conditioning on variables and employs an approximate inference algorithm to solve the resulting queries (e.g. [23]). The intended formal meaning of exact conditioning is however far from obvious when continuous distributions such as Gaussians are involved (in our example, the observation y == 40 has probability zero). The goal of this article is to rigorously spell out the exact conditioning paradigm, give semantics to it and analyze its properties. We note that, even in this simple example, the use of exact conditioning is intuitive and allows the programmer to cleanly decouple the generative model from the data observation stage. As the example makes clear, exact conditioning lends itself to logical reasoning about programs. For example, after conditioning 𝑠 =:= 𝑡, the expressions 𝑠 and 𝑡 are known to be equal and can be interchanged. As we will show, exact conditioning also enjoys good formal properties which allow us to simplify programs compositionally. Among the desired properties are the following: Program lines can be reordered as long as Authors’ addresses: Dario Stein, dario.stein@ru.nl, Radboud University Nijmegen, Erasmusplein 1, Nijmegen, The Netherlands; Sam Staton, University of Oxford, Parks Road, OX1 3QD, Oxford, United Kingdom, sam.staton@cs.ox.ac.uk." 2312.17146v1,"Hamiltonians, groups, graphs and ansätze Abhinav Anand 1, 2, ∗ and Kenneth R. Brown 1, 2, 3, 4, † 1 2 Duke Quantum Center, Duke University, Durham, NC 27701, USA. Department of Electrical and Computer Engineering, Duke University, Durham, NC 27708, USA. 3 Department of Physics, Duke University, Durham, NC 27708, USA. 4 Department of Chemistry, Duke University, Durham, NC 27708, USA. (Dated: December 29, 2023) One promising application of near-term quantum devices is to prepare trial wavefunctions using short circuits for solving different problems via variational algorithms. For this purpose, we introduce a new circuit design that combines graph-based diagonalization circuits with arbitrary single-qubit rotation gates to get Hamiltonian-based graph states ansätze (H-GSA). We test the accuracy of the proposed ansatz in estimating ground state energies of various molecules of size up to 12- qubits. Additionally, we compare the gate count and parameter number complexity of the proposed ansatz against previously proposed schemes and find an order magnitude reduction in gate count complexity with slight increase in the number of parameters. Our work represents a significant step towards constructing compact quantum circuits with good trainability and convergence properties and applications in solving chemistry and physics problems. I. INTRODUCTION As we continue to make progress towards building large quantum computers, we simultaneously need to keep looking for classically intractable problems that can be solved using these devices. A class of problems [1–4] that is amenable to currently available noisy device is using them to prepare trial wavefunctions for solving different chemistry and physics problems variationally. While various proposals [5–12] for preparing such states have been put forward in the last few years, there remain many outstanding challenges [13–19] that need to be addressed. A common challenge is constructing shallow quantum circuits with good trainability and convergence properties [13–15]. Recent advances in understanding of design [20–24] and trainability [13–15] of different circuits have led to some proposals for constructing such circuits. One direction is finding better optimization strategies [25–28] which can overcome some of the shortcoming of the circuit design. Another direction is to find new design principles to overcome this challenge. These include using adaptive techniques [9–12, 29], symmetrybreaking ansätze [30, 31], and using Clifford or near- Clifford unitaries [32–34], among others [35]. In this paper, we focus on the latter and introduce a new class of quantum circuits that we term “Hamiltonian-based graph states ansatz"" (H-GSA). The proposed ansatz uses graph-based diagonalization circuits to incorporate problem related information and symmetry breaking arbitrary single qubit rotation layer for faster convergence. This leads to an order of magni- tude reduction in the gate count of the proposed ansatz while maintaining the good convergence properties of the Hamiltonian variational ansatz. We present detailed numerical analysis of our ansatz for estimating ground state energies of different molecules of size up to 12 qubits and find that with a single layer of the ansatz we can get within desired accuracy for many configurations of the molecules considered in this study. This suggests that our work can be useful in many applications where one requires shallow quantum circuits with good trainability properties, especially when the current devices have limited coherence times. The remaining sections of this paper are organized as follows: We present some preliminary information and the proposed method in sec. II. The results from different numerical simulations are presented in sec. III, and finally, we provide some concluding remarks in sec. IV. II. In this section, we review some background information and present the details of how to construct a Hamiltonian-based graph states ansatz (H-GSA). A. † E-mail:ken.brown@duke.edu Hamiltonians In the second-quantized formalism, the electronic Hamiltonian is expressed as X X Ĥ = h pq â † p â p + h pqrs â † p â † q â r â s , (1) pq ∗ E-mail:abhinav.anand@duke.edu METHODOLOGY pq where, p, q, r, s are spin-orbital indices, â † and â are creation and annihilation operators, respectively, and the coefficients h pq and h pqrs are one- and two-electron" 2312.17154v1,"UdeM-GPP-TH-23-300 Thin-Wall Monopoles in a False Vacuum M. B. Paranjape 1∗ and Yash Saxena 2† 1 Groupe de physique des particules, Département de physique, Centre de recherche mathématiques and Institut Courtois, Université de Montréal, C.P. 6128, Succ. Centre-ville, Montréal, Québec, CANADA, H3C 3J7 and 2 Department of Physics and Astrophysics, University of Delhi, Delhi, India 110007 We study numerically the existence in a false vacuum, of magnetic monopoles which are “thinwalled”, i.e., which correspond to a spherical region of radius R that is essentially trivial surrounded by a wall of thickness ∆ ≪ R, hence the name thin wall, and finally an exterior region that essentially corresponds to a pure Abelian magnetic monopole. Such monopoles were dubbed false monopoles and can occur in non-abelian gauge theories where the symmetry-broken vacuum is actually the false vacuum. This idea was first proposed in [1], however, their proof of the existence of false monopoles was incorrect. Here we fill this lacuna and demonstrate numerically the existence of thin-wall false monopoles. The decay via quantum tunnelling of the false monopoles could be of importance to cosmological scenarios which entertain epochs in which the universe is trapped in a symmetry broken false vacuum. PACS numbers: 12.60.Jv,11.27.+d I. INTRODUCTION Magnetic monopoles correspond to soliton solutions of non-abelian gauge field theories with scalar matter fields, where a simply connected simple gauge group symmetry is spontaneously broken to a smaller gauge symmetry where the gauge group has a U (1) factor. The topological possibility of the existence of monopoles requires that the homotopy group Π 2 (G/H) be non-trivial [2]. It is well understood that, Π 2 (G/H) = Π 1 (H) = Z, and the integer characterizing the configuration is the monopole charge. However, it can be that the symmetry breaking is temporary, that the symmetry breaking vacuum is a false vacuum that will eventually decay to the true vacuum. Such a scenario adds new dynamical aspects to the monopole solution. The universe can be trapped in this false vacuum phase for an interminably long period. Indeed, cosmological solutions coming from string theory [3] in fact propose that the present universe is in a false vacuum, that in principle has a very, very long lifetime (hence the justification that it has survived for 13 billion years, the age of the universe). However, topological solitons occurring in the false vacuum will promote the decay of the false vacuum, as we have shown in a series of papers [1, 4–9]. In this paper, we concentrate on the case of magnetic monopoles in a false vacuum. In [1] it was analyzed how thin wall monopoles could arise in the gauge field/Higgs field dynamics. However, the analysis presented there relied on the proposition that the gauge field dynamics would essentially follow the Higgs field dynamics, which was not rigorously established, and seems not to be the case. In this paper, we analyze numerically the magnetic monopole solutions that exist in a false vacuum. The main difference is that the core of the monopole is in the true vacuum, and hence provides an outward pressure causing the monopole to be thin-walled. Classically the monopole is stable, however, it can tunnel quantum mechanically [10] to a classically unstable state, essentially where the radius of the core is large enough so that the core will expand uncontrollably, converting false vacuum in the exterior to the true vacuum in the interior. This tunnelling amplitude was computed in [1] the computation which relied only on the requirement that the monopole be thin-walled. The analysis in [1] assumed that the dynamics of the gauge field simply followed the dynamics of the Higgs field. This does not seem to be correct, and hence the proof of the existence of thin-walled monopoles given there is not accurate. In this paper, we perform the required numerical analysis to confirm the existence of thin-walled monopoles for an appropriate choice of the scalar field potential. II. FALSE MAGNETIC MONOPOLES AND THEIR TUNNELLING DECAY The monopole is constructed with a variation of the standard ’tHooft-Polyakov monopole where the field con- ⃗ i , i = 1, 2, 3 and the tent consists of a triplet scalar ( ϕ) ⃗ corresponding gauge field A µ of local SO(3) gauge invariance. The potential for the scalar field, as treated in [1], ⃗ was a 6th order potential, writing h = | ϕ| V (ϕ) = λh 2 (h 2 − a 2 ) 2 + γ 2 h 2 − ϵ. ∗ Electronic address: paranj@lps.umontreal.ca † Electronic address: 1980234@pg.du.ac.in (1) The potential has the form given in Fig.(1), and comprises of a true vacuum at h = 0 and a false vacuum of" 2312.17175v1,"Cause-effect relationship between model parameters and damping performance of hydraulic shock absorbers Lukas Schickhofer a,∗ , Chris G. Antonopoulos b a KTM Research & Development, Mattighofen, Austria b School of Mathematics, Statistics and Actuarial Science (SMSAS), University of Essex, Wivenhoe Park, United Kingdom Abstract Despite long-term research and development of modern shock absorbers, the effect of variations of several crucial material and model parameters still remains dubious. The goal of this work is therefore a study of the changes of shock absorber dynamics with respect to typical parameter ranges in a realistic model. We study the impact of shim properties, as well as geometric features such as discharge coefficients and bleed orifice cross section. We derive cause-effect relationships by nonlinear parameter fitting of the differential equations of the model and show digressive and progressive quadratic damping curves for shim number and thickness, sharp exponential curves for discharge coefficients, and leakage width, as well as a linear decrease of damping properties with bleed orifice area. Temperature increase affecting material properties, such as density and viscosity of the mineral oil, is found to have a mostly linear relationship with damping and pressure losses. Our results are not only significant for the general understanding of shock absorber dynamics, but also serve as a guidance for the development of specific models by following the proposed methodology. Keywords: Suspension, Hydraulic dampers, Dynamical system, Sensitivity analysis 2010 MSC: 00-01, 99-00 1. Introduction The development and tuning of shock absorbers leads them to effectively absorb displacements and excitations due to road irregularities. This is particularly important for motorcycles and bikes, where the contact area with the ground is small and wheel grip must not be compromised even in the most extreme situations (e.g. large tilting angles, sharp corners, sudden change in road properties). Hydraulic shock absorbers play a crucial role in the suspension of cars, trains, and even airplanes (Boggs et al., 2010; Wang et al., 2017). As a result, several types of shock absorbers are applied to a wide range of vehicles, which complicates efforts to find a universal analytical model for their behaviour and to reach general conclusions regarding their sensitivity to parameter and model changes. The most common type of shock absorber in use today is the monotube damper, where a piston carrying stacks of metal plates (i.e. shims) separates two chambers filled with oil, which are adjacent to a nitrogen compartment to absorb large volumetric changes. Further developments of this basic setup are e.g. the piggyback damper, or the dual-tube damper (Dixon, 2008). Due to their complex and intricate setup that involves several multi-component valves and chambers filled with viscous fluid, hydraulic shock absorbers have always been difficult to develop and adjust to the specific requirements of road vehicles. This is the main reason why a large-scale analysis of the dynamical behaviour of shock absorbers within parameter spaces across multiple dimensions and excitation frequencies is important. ∗ Corresponding author: Email address: lukas.schickhofer13@alumni.imperial.ac.uk (Lukas Schickhofer)" 2312.17179v1,"Going Green in RAN Slicing Hnin Pann Phyu ∗ , Razvan Stanica † , Diala Naboulsi ‡ , and Gwenael Poitau § ∗ Département de Génie Logiciel et TI, École de Technologie Supérieure (ÉTS), Montreal, Canada, hnin.pann-phyu.1@ens.etsmtl † Univ Lyon, INSA Lyon, Inria, CITI, Villeurbanne, France, razvan.stanica@insa-lyon.fr ‡ Département de Génie Logiciel et TI, École de Technologie Supérieure (ÉTS), Montreal, Canada, diala.naboulsi@etsmtl.ca § Dell Technologies, Ottawa, Canada, gwenael.poitau@dell.com Abstract—Network slicing is essential for transforming future telecommunication networks into versatile service platforms, but it also presents challenges for sustainable network operations. While meeting the requirements of network slices incurs additional energy consumption compared to non-sliced networks, operators strive to offer diverse 5G and beyond services while maintaining energy efficiency. In this study, we address the issue of slice activation/deactivation to reduce energy consumption while maintaining the user quality of service (QoS). We employ Deep Contextual Multi-Armed Bandit and Thompson Sampling Contextual Multi-Armed Bandit agents to make activation/deactivation decisions for individual clusters. Evaluations are performed using the NetMob23 dataset, which captures the spatio-temporal consumption of various mobile services in France. Our simulation results demonstrate that our proposed solutions provide significant reductions in network energy consumption while ensuring the QoS remains at a similar level compared to a scenario where all slice instances are active. I. I NTRODUCTION The telecommunication industry accounts for approximately 2% of total global carbon emissions [1]. Energy consumption will continue increasing in beyond 5G and 6G networks, where computationally intensive services will be largely deployed. In these future architectures, network slicing allows for the splitting of a physical network into multiple virtual networks, enabling mobile networks to cater to a diverse range of network services [2]. Satisfying the requirements of different network slices, which includes ensuring performance isolation, comes at the cost of increased energy consumption. Meanwhile, we observe that the highest amount of energy is consumed in the radio access network (RAN), accounting approximately for 70% of the overall network energy utilization [3]. In this respect, several research works consider base station sleep schemes to further optimize the energy consumption in 5G networks [4], [5]. Applying these techniques directly in multi-services network slicing environments is more challenging, due to distinct temporal traffic patterns exhibited by different slice instances. Completely shutting down or putting the entire base station into sleep mode could significantly impact the quality of service (QoS) for users in particular slice instances. Moreover, several research works ([6], [7], [8], [9]) consider optimizing the allocation of network slice resources (i.e. radio, CPU, transmission bandwidth and power) with respect to different network domains. However, none of these studies specifically addresses the handling of underutilized slice instances and the ability to deactivate them based on certain conditions. This motivates us to propose a new approach: dynamically activating and deactivating slice instances based on their traffic patterns to enhance base station energy efficiency. However, deactivating certain slices to save energy might degrade the user QoS, while activating all slices at all times to maximize QoS results in significantly higher energy consumption. Therefore, the energy minimization objective shall be coupled with a QoS maximization objective [10]. To manage the trade-off between the two objectives, we hereby introduce an EcoSlice, which is a slice instance using bare minimum resources and network functions. By that, it incurs lower energy consumption than typical slice instances. We consider the EcoSlice is up and running 24/7 to provide a bare-minimum service. In some conditions, e.g., low traffic demand, operators may switch the users of other slices to this specific EcoSlice, without a significant QoS impact. All in all, in this work, we investigate the slice activation/deactivation problem with the aim of reducing the overall energy consumption while respecting as much as possible the QoS. II. M ETHODOLOGY A. System Model In a time-slotted system, we define τ as the slice activation/deactivation interval (SADI), during which slices remain continuously active or inactive. (De)activation decisions are made at the end of each τ , for the subsequent τ + 1. Moreover, our system model is composed of: i) Set of slice instances. This set comprises various virtual slices (e.g. eMBB, URLLC, mMTC, and EcoSlice) associated to base stations. Each slice instance is characterized by a specific Quality of Service Class Identifier (QCI) and its corresponding energy consumption. ii) Set of users: This set represents the users associated with the slice instances deployed at base stations. Each user is defined by their required delay and traffic load demand. iii) Set of base stations: This set includes all the base stations. Each base station has a set of possible slice activation/deactivation configurations. We then define the overall energy consumption of a base station, which is composed of the energy consumption resulting from its associated slice instances (i.e. dynamic energy consumption) and a static energy consumption level. As mentioned, our objective is coupled with ensuring the user QoS. Hence, the user satisfaction is determined based on whether a user’s delay requirement is satisfied or not. Finally, we use β as a trade-off parameter between energy consumption and QoS: a larger β gives more weight to the QoS. B. Proposed Solution We propose two decentralized approaches: Deep Contextual Multi- Armed Bandit (DCMAB) and Thompson Sampling Contextual Multi- Armed Bandit (Thompson-C). The system architecture of our solutions is depicted in Figure 1. DCMAB and Thompson-C agents operate at the level of individual base stations. Each agent is presented with various configuration options of a base station, each associated with a reward. The agent’s task is to select the most appropriate configuration at each time step (τ ) to achieve the overall objective. We model the problem of slice activation/deactivation as a contextual multi-armed bandit (MAB) problem. State: The state space of an agent includes the overall energy consumption and average QoS of the base station. • Action: An action of an agent is to choose which slice instances are active or not, and navigate users to and from an EcoSlice based on the state of their requested slice instance. •" 2312.17196v1,"The emergence of Einstein gravity from topological supergravity in 3 + 1D Tianyao Fang 1 and Zheng-Cheng Gu 1, ∗ 1 Department of Physics, The Chinese University of Hong Kong, Shatin, New Territories, Hong Kong, China The topological aspects of Einstein gravity suggest that topological invariance could be a more profound principle in understanding quantum gravity. In this work, we explore a topological supergravity action that initially describes a universe without Riemann curvature, which seems trivial. However, we made a surprising discovery by introducing a small deformation parameter λ, which can be regarded as an AdS generalization of supersymmetry (SUSY). We find that the deformed topological quantum field theory (TQFT) becomes unstable at low energy, resulting in the emergence of a classical metric, whose dynamics are controlled by the Einstein equation. Our findings suggest that a quantum theory of gravity could be governed by a UV fixed point of a SUSY TQFT, and classical spacetime ceases to exist beyond the Planck scale. Introduction — Recent developments on topological aspects of the early universe at extremely high energy scales have opened up the possibility of describing quantum gravity using topological theory[1–4]. This approach is characterized by being background independent and devoid of local degrees of freedom. One of the advantages of topological theory is its inherent ability to address puzzles related to homogeneity, isotropy, and scale invariance[1]. On the other hand, recent research suggests that the emergence of Einstein-Cartan action at low energy can also be attributed to the principle of topological invariants, which naturally excludes all higher-order terms, rather than the commonly known principle of general covariance. Moreover, a topological fixed point at UV scale also naturally resolves the long standing renormalizability problem for quantum gravity. Historically, the topological nature of quantum gravity becomes manifest in the 2 + 1D case, where the absence of local degrees of freedom plays a crucial role. Extensive efforts have been dedicated to the exact solution of 2+1D quantum gravity, including the development of Virasoro topological quantum field theory (TQFT)[5, 6]. In 3+1D, topological gravity was initially proposed by Witten, describing a self-dual Weyl action[4]. However, due to the BRST symmetry, the Einstein action cannot be generated. Inspired by Witten[7], Chamseddine developed a topological gravity theory in 2n+1 dimensions using the Chern-Simons form[8–11]. In recent years, the replacement of the Chern-Simons form with transgression forms as a generalization has been extensively studied[12–19], promoting the quasi-invariant action to gauge invariant. In the past decade, there has been significant progress in the study of topological phases of quantum matter, leading to a systematic understanding of TQFT in 3+1D. Specifically, it has been proposed that twisted BF theory is closely related to Einstein gravity. However, there remains a lack of controlled methods for deriving Einstein gravity from a TQFT fixed point. In this paper, we aim to generalize the 3+1D topological gravity theory by incorporating SUSY. We begin by considering the ∗ zcgu@phy.cuhk.edu.hk simplest case of N = 1 topological supergravity theory in 3 + 1D, without a cosmological constant term. We find that such a theory describes a trivial universe with zero Riemann curvature, which seems trivial. Surprisingly, by introducing a deformation parameter, denoted as λ, which can be viewed as an analogue of the Antide Sitter (AdS) generalization of SUSY transformations, we discover that such a super TQFT becomes unstable, leading to the emergence of classical spacetime and the Einstein-Cartan action at low energy! Our results indicate that classical spacetime ceases to exist beyond the Planck scale. Topological supergravity — As a warm up, we consider the following topological invariant SUSY action: Z Z 1 1 bcd a S Top = − c ∧ Dψ ε abcd e ∧ ψγ ∧ Dψ + 12 2 Z Z 1 e a ∧ (T a − j a ) + 1 B ab ∧ R ab . B + (1) 2 2 where e a , ω ab and ψ are 1-form fields, known as vierbein, spin connection and gravitino. j a = 4 1 ψγ a ∧ ψ is the gravitino current. The torsion and (super) curvatures read: R ab = dω ab + ω ac ∧ ω cb , T a ≡ De a = de a + ω ab ∧ e b , 1 Dψ = dψ + γ ab ω ab ∧ ψ. (2) 4 The definition of charge conjugation fields ψ and c can be fund in Supplementary Material. The 2-form fields e a , B ab and c (which is a real Grassmann field) play the B role of Lagrangian multiplier to compensate for the variation of the SUSY transformation from the first term in Eq.(5). It is easy to check that the above action S Top is invariant under the following SUSY transformation: 1 e a = 1 ε abcd ǫγ bcd Dψ, δe a = − ψγ a ǫ, δ B 2 6 1 1 1 e a δB ab = − cγ ab ǫ + ε abcd e c ∧ ǫγ d ψ, δc = B a γ ǫ. 4 2 2 (3) δψ = Dǫ, See Supplementary Material for more details. Variation e a , B ab with respect to the Lagrangian multiplier fields B" 2312.17227v1,"Gradient-based Planning with World Models Jyothir S V 1∗ Siddhartha Jalagam 1∗ Yann LeCun 1, 2 1 New York University 2 Meta AI {jyothir, scj9994, us441}@nyu.edu yann@cs.nyu.edu Vlad Sobal 1, 2 Abstract The enduring challenge in the field of artificial intelligence has been the control of systems to achieve desired behaviours. While for systems governed by straightforward dynamics equations, methods like Linear Quadratic Regulation (LQR) have historically proven highly effective, most real-world tasks, which require a general problem-solver, demand world models with dynamics that cannot be easily described by simple equations. Consequently, these models must be learned from data using neural networks. Most model predictive control (MPC) algorithms designed for visual world models have traditionally explored gradient-free population-based optimization methods, such as Cross Entropy and Model Predictive Path Integral (MPPI) for planning. However, we present an exploration of a gradient-based alternative that fully leverages the differentiability of the world model. In our study, we conduct a comparative analysis between our method and other MPC-based alternatives, as well as policy-based algorithms. In a sample-efficient setting, our method achieves on par or superior performance compared to the alternative approaches in most tasks. Additionally, we introduce a hybrid model that combines policy networks and gradient-based MPC, which outperforms pure policy based methods thereby holding promise for Gradient-based planning with world models in complex real-world tasks. 1 Introduction Until recently, model-free reinforcement learning (RL) algorithms [24][28] have been the predominant choice for visual control tasks, particularly in simple environments like Atari games. However, these model-free algorithms are notorious for their sample inefficiency and lack of generality. If the tasks change, the policy needs to be trained again. They are constrained by their inability to transfer knowledge gained from training in one environment to another. Consequently, they must undergo retraining for even minor deviations from the original task. Real-world applications where the agent needs to solve a multitude of different tasks in the environment, such as robotics, demand a more general approach. To address this limitation, multiple types of methods have been proposed. In this work, we focus on model-based planning methods. These model-based approaches encompass three key components: a learned dynamics model that predicts state transitions, a learned reward or value model analogous to the cost function in Linear Quadratic Regulation (LQR) [6], which encapsulates state desirability information, and a planner that harnesses the world model and reward model to achieve desired states. While previous research in planning using Model Predictive Control (MPC) [25] has primarily focused on gradient-free methods like cross-entropy[27, 9], these methods are computationally expensive and do not utilize the differentiability of the learned world model. ∗ Equal Contribution. Preprint. Under review." 2312.17257v1,"Evolving Large Language Model Assistant with Long-Term Conditional Memory Ruifeng Yuan, Shichao Sun, Zili Wang, Ziqiang Cao, Wenjie Li The Hong Kong Polytechnic University The Hong Kong Polytechnic University INF Technology (Shanghai) co., Ltd. Institute of Artificial Intelligence, Soochow University, China The Hong Kong Polytechnic University Abstract With the rapid development of large language models, AI assistants like ChatGPT have widely entered people’s works and lives. In this paper, we present an evolving large language model assistant that utilizes verbal long-term memory. It focuses on preserving the knowledge and experience from the history dialogue between the user and AI assistant, which can be applied to future dialogue for generating a better response. The model generates a set of records for each finished dialogue and stores them in the memory. In later usage, given a new user input, the model uses it to retrieve its related memory to improve the quality of the response. To find the best form of memory, we explore different ways of constructing the memory and propose a new memorizing mechanism called conditional memory to solve the problems in previous methods. We also investigate the retrieval and usage of memory in the generation process. The assistant uses GPT-4 as the backbone and we evaluate it on three constructed test datasets focusing on different abilities required by an AI assistant with long-term memory. Day 1 Capitalize the words: hello world Hello World I mean capitalize each letter HELLO WORLD ....... Day n Capitalize the words: thank you Thank You Day n Capitalize the words: thank you THANK YOU Introduction The large Language Model (LLM) has developed rapidly recently. A LLM assistant based on dialogue system such as ChatGPT has been used by millions of people and receives great interest from the public. These systems can chit-chat with the human user and provide assistance by answering questions or executing instructions. Unfortunately, one main problem for the current AI assistant is that the information in one dialogue only last for one dialogue session. When a user starts a new session, the AI assistant is reset to its initial state and it will not preserve any information from previous dialogue sessions. This prevents the AI assistant from acquiring knowledge and experience from the long-term dialogue, to improve the quality of its responses, like humans do. As shown in the example in Figure 1, when the user asks the assistant to help him to capitalize some words, the assistant chooses to capitalize the first letter of each word, which is not what the user expected. Then the user provides more detailed feedback to avoid ambiguity and get the answer he wants. If the assistant is a human, he can learn that “capitalize” refers to capitalizing each letter Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: An example about the evolving LLM assistant. for this user and can give the right response in the later dialogue, while a LLM assistant fails to achieve this. Therefore, our aim is to explore how to endow the LLM assistant with such an essential capability that allows it to learn knowledge and experience from previous dialogues and apply them to later ones. In this work, we propose to adopt a memory-based framework as a wrapper outside the LLM assistant to address this challenge. The evolving LLM assistant mainly consists of three parts: an existing LLM assistant, a memory, and a prompt-based wrapper conducting interactions between the assistant and the memory. As shown in Figure 2, the wrapper utilizes the ongoing dialogue and LLM assistant itself to construct memory records and store them in the memory. Every time the assistant generates a response, we use a retrieval model to retrieve a series of memory records related to the user input from the memory and combine the information and the user input to generate a better response. Using a memory-based framework has a few advan-" 2312.17259v1,"Empowering Working Memory for Large Language Model Agents Jing Guo, Nan Li*, Jianchuan Qi, Hang Yang, Ruiqiao Li, Yuzhen Feng, Si Zhang, Ming Xu Tsinghua University *li-nan@tsinghua.edu.cn Abstract Large language models (LLMs) have achieved impressive linguistic capabilities. However, a key limitation persists in their lack of human-like memory faculties. LLMs exhibit constrained memory retention across sequential interactions, hindering complex reasoning. This paper explores the potential of applying cognitive psychology's working memory frameworks, to enhance LLM architecture. The limitations of traditional LLM memory designs are analyzed, including their isolation of distinct dialog episodes and lack of persistent memory links. To address this, an innovative model is proposed incorporating a centralized Working Memory Hub and Episodic Buffer access to retain memories across episodes. This architecture aims to provide greater continuity for nuanced contextual reasoning during intricate tasks and collaborative scenarios. While promising, further research is required into optimizing episodic memory encoding, storage, prioritization, retrieval, and security. Overall, this paper provides a strategic blueprint for developing LLM agents with more sophisticated, humanlike memory capabilities, highlighting memory mechanisms as a vital frontier in artificial general intelligence. 1. Introduction The development of large language models (LLMs) has marked a significant advancement in the field of artificial intelligence (AI), particularly in the realms of language understanding, generation, and reasoning. These models, exemplified by OpenAI's ChatGPT, are characterized by their extensive architectures and massive parameter sets, having been trained on vast corpora of text (Brown et al., 2020; Rillig et al., 2023). Despite their impressive linguistic capabilities, a critical challenge that persists is the effective management of memory to achieve more human-like intelligence. Cognitive psychology offers foundational frameworks, such as Baddeley's multicomponent working memory model, which have been instrumental in understanding human memory (Baddeley, 2003). However, the application of these frameworks to AI architectures is not straightforward, and there are inherent limitations to how these human-centric concepts can be translated into artificial systems(Cornago et al., 2023). Standard LLM agent designs lack robust episodic memory and continuity across distinct interactions. LLM agents typically have a constrained memory capacity, limited by the number of tokens they 1" 2312.17263v1,"TACIT: A Target-Agnostic Feature Disentanglement Framework for Cross-Domain Text Classification Rui Song, 1 Fausto Giunchiglia, 1, 2, 3 Yingji Li, 3 Mingjie Tian, 1 Hao Xu * 1, 3, 4 2 1 School of Artificial Intelligence, Jilin University, Changchun 130012, China Department of Information Engineering and Computer Science, University of Trento, Via Sommarive 938123, Trento, Italy 3 College of Computer Science and Technology, Jilin University, Changchun 130012, China 4 Chongqing Research Institute, Jilin University, Chongqing 401123, China {songrui20, yingji21, mjtian19}@mails.jlu.edu.cn, fausto@disi.unitn.it, xuhao@jlu.edu.cn Abstract Cross-domain text classification aims to transfer models from label-rich source domains to label-poor target domains, giving it a wide range of practical applications. Many approaches promote cross-domain generalization by capturing domaininvariant features. However, these methods rely on unlabeled samples provided by the target domains, which renders the model ineffective when the target domain is agnostic. Furthermore, the models are easily disturbed by shortcut learning in the source domain, which also hinders the improvement of domain generalization ability. To solve the aforementioned issues, this paper proposes TACIT, a target domain agnostic feature disentanglement framework which adaptively decouples robust and unrobust features by Variational Auto- Encoders. Additionally, to encourage the separation of unrobust features from robust features, we design a feature distillation task that compels unrobust features to approximate the output of the teacher. The teacher model is trained with a few easy samples that are easy to carry potential unknown shortcuts. Experimental results verify that our framework achieves comparable results to state-of-the-art baselines while utilizing only source domain data. Introduction In recent years, natural language processing (NLP) models based on deep networks have made significant progress and have even surpassed human-level performance. But these methods often rely on manually labeled data, and the inconsistency between the distribution of labeled training domains and the unlabeled target domains poses a challenge for deploying these methods in practical applications (Ben-David, Rabinovitz, and Reichart 2020). To address this challenge, Unsupervised Domain Adaptation (UDA) has emerged as a solution. UDA aims to generalize a model trained on labeled data from source domains to perform well on a target domain without labeled data. By employing UDA, models can overcome their dependency on labeled data from the target domain, which has attracted considerable attention from researchers. In UDA, cross-domain text classification is a basic but challenging task because of the differences in text expressions among the source and target domains. To enhance * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. the performance of cross-domain text classification, numerous researches have focused on improving the generalization ability by extracting domain invariant features, including pivot-based methods (Ziser and Reichart 2018; Peng et al. 2018; Ben-David, Rabinovitz, and Reichart 2020), task-specific knowledge-based methods (Zhou et al. 2020), domain adversarial training methods (Wu and Shi 2022), and class-aware methods (Ye et al. 2020; Luo et al. 2022). Besides, there are approaches that use language models to perform self-supervised tasks to capture task-agnostic features in the target domain (Karouzos, Paraskevopoulos, and Potamianos 2021). These methods take full advantage of the commonality between the source and target domains to encourage model generalization. However, these approaches still face two main challenges. First, capturing domain-invariant features tend to depend heavily on the target domain, which makes the model ineffective when the target domain is agnostic. Besides, the training of the generalized model requires consideration of additional target domain samples, which adds training and deployment costs. Second, the models are susceptible to shortcut learning 1 in the source domain, which also hinders the improvement of domain generalization ability (Geirhos et al. 2020; Feng et al. 2023). To overcome the above challenges, we propose a Target- Agnostic framework for Cross-domain text classIficaTion (TACIT). It is inspired by the work of feature disentanglement (Huang et al. 2021) as well as Variational Auto- Encoder (VAE) for text generation (Bao et al. 2019). The aim of TACIT is to separate robust and unrobust features from the potential latent feature space of the source domain, and use robust features to promote cross-domain generalization performance. Moreover, we design a feature distillation task to encourage further separation of the unrobust features from the robust features. The teacher model in the distillation task learns from easy samples in the training set 1 Shorcuts are defined as simple decision rules that can not be applied to more challenging scenarios, such as cross-domain generalization. Shortcut learning occurs when the model relies excessively on superficial correlations in the source domain, disregarding domain-specific features crucial for accurate classification in the target domain. Therefore, mitigating shorcuts can improve crossdomain generalization (Moon et al. 2021). In our study, shortcuts are not predefined, but included in easy samples." 2312.17264v1,"ESGReveal: An LLM-based approach for extracting structured data from ESG reports Yi Zou 𝑎,1 , Mengying Shi 𝑏,1 , Zhongjie Chen 𝑎 , Zhu Deng 𝑎 , ZongXiong Lei 𝑎 , Zihan Zeng 𝑐 , Shiming Yang 𝑐 , HongXiang Tong 𝑎 , Lei Xiao 𝑎 and Wenwen Zhou 𝑎∗ a Alibaba Cloud, Hangzhou, China b Department of Earth System Science, Tsinghua University, Beijing, China c Department of Environmental Science and engineering, Sun Yat-Sen University, Guangzhou, China 1 These authors contribute equally. ARTICLE INFO ABSTRACT Keywords: ESG Data Extraction Large Language Models ChatGPT ESGReveal is a method introduced in this paper for the systematic extraction and analysis of Environmental, Social, and Governance data from corporate reports, designed to address the pressing need for consistent and accurate retrieval of ESG information. Using Large Language Models (LLM) combined with Retrieval Augmented Generation (RAG) techniques, ESGReveal includes an ESG metadata module for criteria queries, a report preprocessing module for building databases, and an LLM agent module for data extraction. The framework’s effectiveness was evaluated using ESG reports issued by companies across 12 industries listed on the Hong Kong Stock Exchange in 2022. A carefully selected representative sample of 166 companies, based on industry distribution and market capitalization, provided a comprehensive assessment of ESGReveal’s capabilities. The application of ESGReveal yielded significant findings on the current state of ESG reporting, with GPT- 4 achieving accuracy rates of 76.9% in data extraction and 83.7% in disclosure analysis, outperforming baseline models. These results suggest the framework’s utility in improving the accuracy of ESG data analysis. Additionally, our analysis identified the need for more robust ESG practices, with environmental data disclosure at 69.5% and social data at 57.2%, indicating room for increased corporate transparency. Recognizing the current limitations of ESGReveal, including its inability to interpret pictorial data which is a feature planned for future enhancement, the study also suggests additional research to improve and compare the differential analytical performance of various LLMs. In conclusion, ESGReveal marks a step forward in ESG data processing, providing stakeholders a tool to better assess and enhance corporate sustainability practices. Its development shows promise in advancing the transparency of corporate reporting and contributing to the wider objectives of sustainable development. 1. Introduction disclosure metrics (Abhayawansa and Tyagi, 2021; Schiemann and Tietmeyer, 2022). Research indicates that there is currently no publicly available ESG disclosure database covering detailed metrics, which limits the depth of analysis and regulation of corporate ESG performance to some extent (Clarkson et al., 2019). In response to these impediments, this study introduced an approach, designated as ESGReveal, based on the integration of advanced Large Language Models (LLM) and Retrieval Augmented Generation (RAG) techniques. The ESGReveal is comprised of a tripartite architecture: ESG metadata module, report preprocessing module, and LLM agent module. Furthermore, an analytical exploration utilizing ESG reports from preeminent corporations across sectors listed on the Hong Kong Stock Exchange in year 2022 was conducted. The main contributions of this research include: ∙ Designing and executing ESGReveal for systematic extraction of crucial numerical and textual data from corporate ESG reports. ∙ Assessing the performance of different large language models in ESG information retrieval, setting a baseline for further ESG data processing and analytical studies. Since the United Nations Global Compact initiated the concept of Environmental, Social, and Governance (ESG) in 2004, corporations have utilized ESG reporting to show their initiatives and commitment within these domains (Tsang et al., 2023). Across the globe, myriad ESG reporting frameworks, notably the Global Reporting Initiative (GRI) and the Sustainability Accounting Standards Board (SASB), have gained widespread acceptance. Additionally, numerous stock exchanges have enacted ESG disclosure directives to guide corporate reporting practices. ESG disclosure quantifies corporate transparency and is crucial for assessing performance in ESG aspects, providing a basis for decision-making for investors and other stakeholders (Bui et al., 2020). While investors and analysts can access ESG reports through stock exchanges and corporate websites, the vast number and varied formats of these reports pose significant integration challenges for consolidating disclosure data at the corporate or industry level (Doe, 2021). Third-party ratings such as those from MSCI, Sustainalytics, and Bloomberg help understand corporate non-financial performance but lack the necessary transparency and detailed ∗ Corresponding author. E-mail addresses: zhoubo.zww@alibaba-inc.com (W.Z. 𝑎 ) ORCID (s): Page 1 of 17" 2312.17265v1,"µ-Net: ConvNext-Based U-Nets for Cosmic Muon Tomography Lim Li Xin Jed * 1 Qiu Ziming * 1 Abstract the interiors of objects. By leveraging the fact that muons are highly penetrating particles, muon tomography offers a non-invasive and non-destructive means of investigating the internal composition of dense materials. Through tracking and analysis of muon trajectories and energies, this enables the accurate reconstruction of internal structures and features. Consequently, muon tomography has emerged as a tool with wide-ranging applications in fields such as geophysics (Tioukov et al., 2019), civil engineering (Saracino et al., 2018), and archaeology (Borselli et al., 2022; Procureur et al., 2023a). Muon scattering tomography utilises muons, typically originating from cosmic rays to image the interiors of dense objects. However, due to the low flux of cosmic ray muons at sea-level and the highly complex interactions that muons display when travelling through matter, existing reconstruction algorithms often suffer from low resolution and high noise. In this work, we develop a novel two-stage deep learning algorithm, µ-Net, consisting of an MLP to predict the muon trajectory and a ConvNeXt-based U-Net to convert the scattering points into voxels. µ-Net achieves a state-of-the-art performance of 17.14 PSNR at the dosage of 1024 muons, outperforming traditional reconstruction algorithms such as the point of closest approach algorithm and maximum likelihood and expectation maximisation algorithm. Furthermore, we find that our method is robust to various corruptions such as inaccuracies in the muon momentum or a limited detector resolution. We also generate and publicly release the first large-scale dataset that maps muon detections to voxels. We hope that our research will spark further investigations into the potential of deep learning to revolutionise this field. Due to cosmic rays entering the Earth’s atmosphere, there is no need for a specialised muon source unlike other types of tomography. However, there are many other challenges in this task. First, the flux of cosmic muons at sea-level is very low (Beringer et al., 2012). In order to produce a decent reconstruction, data has to be collected for a long period of time. Furthermore, unlike other types of tomography such as x-ray computed tomography, muons will scatter off atomic nuclei. This makes the forward operator highly nonlinear. In contrast, in computed tomography, x-rays only attenuate and hence, the forward operator is the linear radon transform. In addition, due to limitations of current day muon detectors, the momentum of muons which significantly affects the muon scattering angle is not known. At best, we will have an estimate of the momentum p̂ with a significant amount of uncertainty. Several methods have been developed to tackle this problem. The first algorithm developed was the Point of Closest Approach (PoCA) algorithm (Schultz, 2003) which assumes that the muons only scatter once at the point of closest approach of its inward and outward trajectory. The Maximum Likelihood and Expectation Maximisation (MLEM) algorithm (Schultz et al., 2007) improves on PoCA and iteratively optimises the reconstruction to maximise the likelihood of producing a given scattering outcome. Other algorithms have also been developed such as maximum a posterori (MAP) (Wang et al., 2009), most likely path (Schulte et al., 2008; Yi et al., 2014; Chatzidakis et al., 2018), scattering density estimation (SDE) (Jonkmans et al., 2013) and angle statistics reconstruction (ASR) (Stapleton et al., 2014). Other methods have also been 1. Introduction Muon tomography is an imaging technique that utilises muons, typically originating from cosmic rays, to image Our model code is at https://github.com/ jedlimlx/Muon-Tomography-AI and our data generation code is at https://github.com/jedlimlx/ Muons-Data-Generation. Our dataset can be found at https://www.kaggle.com/datasets/ tomandjerry2005/muons-scattering-dataset. * Equal contribution 1 Graduate of NUS High School of Mathematics and Science, Singapore. Correspondence to: Lim Li Xin Jed , Qiu Ziming . Preprint. 1" 2312.17282v1,"Nonlinear energy harvesting system with multiple stability Yanwei Han a,* , Zijian Zhang b a School of Civil Engineering and Architecture, Henan University and Science and Technology, Luoyang 47100, China; b College of Astronautics, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China * Corresponding author. E-mail address: yanweihan@haust.edu.cn Abstract: The nonlinear energy harvesting systems of the forced vibration with an electronmechanical coupling are widely used to capture ambient vibration energy and convert mechanical energy into electrical energy. However, the nonlinear response mechanism of the friction induced vibration (FIV) energy harvesting system with multiple stability and stick-slip motion is still unclear. In the current paper, a novel nonlinear energy harvesting model with multiple stability of single-, double- and triple-well potential is proposed based on V-shaped structure spring and the belt conveying system. The dynamic equations for the energy harvesting system with multiple stability and self-excited friction are established by using Euler-Lagrangian equations. Secondly, the nonlinear restoring force, friction force, and potential energy surfaces for static characteristics of the energy harvesting system are obtained to show the nonlinear varying stiffness, multiple equilibrium points, discontinuous behaviors and multiple well response. Then, the equilibrium surface of bifurcation sets of the autonomous system is given to show the third-order quasi zero stiffness (QZS3), fifth-order quasi zero stiffness (QZS5), double well (DW) and triple well (TW). The co-dimension bifurcation sets of the self-excited vibration system are analyzed and the corresponding phase portraits for the coexistent of multiple limit cycles are obtained. Furthermore, the analytical formula of amplitude frequency response of the approximated system are obtained by the complex harmonic method. The response amplitudes of charge, current, voltage and power of the forced electron-mechanical coupled vibration system for QZS3, QZS5, DW and TW are analyzed by using the numerically solution. Finally, a prototype of FIV energy harvesting system is manufactured and the experimental system is setup. The experimental work of static restoring force, damping force and electrical output are well agreeable with the numerical results, which testified the proposed FIV energy harvesting model. Key Words: Nonlinear energy harvesting; friction induced vibration (FIV); equilibrium bifurcation and stability; quasi zero stiffness (QZS); multiple stability; power output 1. Introduction During the last decade, the renewable and green energy of hydro, biomass, solar, wind, geothermal, tidal, sea waves, mechanical vibration and human movement have been received extensive attention due to the exhaustion of fossil energy and serious environmental pollution [1]. Recently vibration energy harvesting technology, a new green energy method to obtain electrical energy from an ambient vibration source environment and replace the traditional battery and wired power, have been widely used in self-powered devices such as, actuators, wireless sensor, mobile electronic platform, wearable devices, headphones, bluetooth, medical implant, healthy monitoring and tire pressure monitoring [2-4]. Therefore, lots of scholars developed energy harvesting devices that harness and convert mechanical vibration energy into electrical energy by various approaches, such as the electromagnetic, electrostatic, piezoelectric, magnetostrictive and triboelectric methods [5-7]. Presently, the nonlinear design methods of the friction induced vibration, multiple stability, multiple degree-of-freedom system and stochastic excitation are widely used to design the energy harvesting system. Nonlinear friction-induced vibrations, can usually cause severe damage and serious problems in machinery industry, are investigated by researchers in mathematical method, computational calculations and experimental testing. Warminski give the stability regions of the dry friction chatter for self-excited cutting model with two degree-of-freedom system and by using the multiple time scale time method and numerical 1" 2312.17298v1,"Empirical fits to inclusive electron-carbon scattering data obtained by deep-learning methods Beata E. Kowal, ∗ Krzysztof M. Graczyk, † Artur M. Ankowski, Rwik Dharmapal Banerjee, Hemant Prasad, and Jan T. Sobczyk Institute of Theoretical Physics, University of Wroc law, plac Maxa Borna 9, 50-204, Wroc law, Poland (Dated: January 1, 2024) Employing the neural network framework, we obtain empirical fits to the electron-scattering cross section for carbon over a broad kinematic region, extending from the quasielastic peak, through resonance excitation, to the onset of deep-inelastic scattering. We consider two different methods of obtaining such model-independent parametrizations and the corresponding uncertainties: based on the NNPDF approach [J. High Energy Phys. 2002, 062], and on the Monte Carlo dropout. In our analysis, the χ 2 function defines the loss function, including point-to-point uncertainties and considering the systematic normalization uncertainties for each independent set of measurements. Our statistical approaches lead to fits of comparable quality and similar uncertainties of the order of 7% and 12% for the first and the second approaches, respectively. To test these models, we compare their predictions to a test dataset, excluded from the training process, a dataset lying beyond the covered kinematic region, and theoretical predictions obtained within the spectral function approach. The predictions of both models agree with experimental measurements and the theoretical predictions. However, the first statistical approach shows better interpolation and extrapolation abilities than the one based on the dropout algorithm. I. INTRODUCTION The stringent precision requirements of the long-baseline neutrino-oscillation program create an urgent need to significantly improve the accuracy of available estimates of the cross sections for neutrino interactions with atomic nuclei [1, 2]. The complexity of this problem stems from multiple factors: the process of scattering involves multicomponent vector and axial currents, different interaction mechanisms can produce the same final states, experimental data with the desired precision are only available for nuclear cross sections, and flux-averaging greatly diminishes differences between different interaction channels. A widely recognized way to address those difficulties is to leverage the similarities of electron and neutrino interactions [3]. In electron scattering, only electromagnetic currents contribute, cross sections are higher by several orders of magnitude, beams are monoenergetic and adjustable, and precise data can be collected not only for complex nuclei, but also for deuterium and hydrogen. These advantages allow nuclear effects to be studied in detail using electron-scattering data. Provided that the cross sections for neutrinos and electrons are calculated consistently and are sufficiently constrained by precise electron data, the only significant source of uncertainties in the neutrino predictions would be related to the axial contributions, to be determined from the near-detector measurements. In parallel to the efforts of developing models of nuclear response, it would be useful to explore novel tech- ∗ beata.kowal@uwr.edu.pl † krzysztof.graczyk@uwr.edu.pl niques for obtaining model-independent estimates of nuclear cross sections. Neural networks (NNs) are ideally equipped to provide such predictions. Indeed, NNs are known for their excellent adaptive abilities [4], which enabled obtaining unbiased parametrizations of nuclear cross sections [5], parton distribution functions [6, 7], vector [8–11] and axial [12] nucleon form factors, deeply virtual Compton form factors [13], and nuclear charge radii [14]. In this article, we explore methods of obtaining such parametrizations of electron-scattering cross sections, independent of nuclear model assumptions, and pay special attention to estimating their uncertainties. For an analysis of this type, the abundance of available experimental data is critical. We consider the carbon target, for which experimental cross sections have been collected in various laboratories worldwide over the last five decades and span the broadest kinematic region [15]. These features are of paramount importance to maximize the predictive abilities of the resulting NN models in the broad kinematic region of relevance for neutrino-oscillation experiments. Using NNs to parametrize electron-scattering data, we obtain both the best fits and an estimate of the associated uncertainties. In this analysis, we consider two different methods. In the first one, we adopt the approach developed by the Neural Network Parton Distribution (NNPDF) group [6]. The experimental data are used to generate clone datasets. For each clone, a NN fit is obtained. The model’s prediction is obtained by averaging all the fits, and the square root of the variance gives its uncertainty. In the second approach, we employ the Monte Carlo (MC) dropout technique [16], in which NN units are temporarily removed at random to prevent overfitting. This" 2312.17316v1,"Renormalisation of IR divergences and holography in de Sitter Adam Bzowski, a Paul McFadden b and Kostas Skenderis. c a Institute of Physics, University of Silesia, 75 Pu lku Piechoty 1, 41-500 Chorzów, Poland School of Mathematics, Statistics & Physics, Newcastle University, Newcastle NE1 7RU, U.K. c STAG Research Center & Mathematical Sciences, University of Southampton, Highfield, Southampton SO17 1BJ, U.K. b E-mail: adam.bzowski@us.edu.pl, paul.l.mcfadden@newcastle.ac.uk, k.skenderis@soton.ac.uk Abstract: We formulate a renormalisation procedure for IR divergences of tree-level in-in late-time de Sitter (dS) correlators. These divergences are due to the infinite volume of spacetime and are analogous to the divergences that appear in AdS dealt with by holographic renormalisation. Regulating the theory using dimensional regularisation, we show that one can remove all infinities by adding local counterterms at the future boundary of dS in the Schwinger-Keldysh path integral. The counterterms amount to renormalising the late-time bulk field. We frame the discussion in terms of bulk scalar fields in dS d+1 , using the computation of tree-level correlators involving massless and conformal scalars for illustration. The relation to AdS via analytic continuation is discussed, and we show that different versions of the analytic continuation appearing in the literature are equivalent to each other. In AdS, one needs to add counterterms that are related to conformal anomalies, and also to renormalise the source part of the bulk field. The analytic continuation to dS projects out the traditional AdS counterterms, and links the renormalisation of the sources to the renormalisation of the late-time bulk field. We use these results to establish holographic formulae that relate tree-level dS d+1 in-in correlators to CFT correlators at up to four points, and we provide two proofs: one using the connection between the dS wavefunction and the partition function of the dual CFT, and a second by direct evaluation of the in-in correlators using the Schwinger-Keldysh formalism. The renormalisation of the bulk IR divergences is mapped by these formulae to UV renormalisation of the dual CFT via local counterterms, providing structural support for a possible duality. We also recast the regulated holographic formulae in terms of the AdS amplitudes of shadow fields, but show that this relation breaks down when renormalisation is required." 2312.17329v1,"PINN surrogate of Li-ion battery models for parameter inference. Part I: Implementation and multi-fidelity hierarchies for the single-particle model Malik Hassanaly a,∗ , Peter J. Weddle b , Ryan N. King a , Subhayan De d , Alireza Doostan c , Corey R. Randall b , Eric J. Dufek e , Andrew M. Colclasure b , Kandler Smith b a Computational Science Center, National Renewable Energy Laboratory (NREL), Golden, CO 80401 b Energy Conversion and Storage Systems Center, National Renewable Energy Laboratory, Golden, CO 80401 c Aerospace Mechanics Research Center, University of Colorado, Boulder, CO 80303 d Mechanical Engineering Department, Northern Arizona University, Flagstaff, AZ 86011 e Energy Storage and Electric Transportation Department, Idaho National Laboratory (INL), Idaho Falls, ID 83415 Abstract To plan and optimize energy storage demands that account for Li-ion battery aging dynamics, techniques need to be developed to diagnose battery internal states accurately and rapidly. This study seeks to reduce the computational resources needed to determine a battery’s internal states by replacing physics-based Li-ion battery models – such as the single-particle model (SPM) and the pseudo-2D (P2D) model – with a physics-informed neural network (PINN) surrogate. The surrogate model makes high-throughput techniques, such as Bayesian calibration, tractable to determine battery internal parameters from voltage responses. This manuscript is the first of a two-part series that introduces PINN surrogates of Li-ion battery models for parameter inference (i.e., state-of-health diagnostics). In this first part, a method is presented for constructing a PINN surrogate of the SPM. A multi-fidelity hierarchical training, where several neural nets are trained with multiple physics-loss fidelities is shown to significantly improve the surrogate accuracy when only training on the governing equation residuals. The implementation is made available in a companion repository (https://github.com/NREL/pinnstripes). The techniques used to develop a PINN surrogate of the SPM are extended in Part II for the PINN surrogate for the P2D battery model, and explore the Bayesian calibration capabilities of both surrogates. Keywords: Physics-informed neural network (PINN), Multi-fidelity machine learning, Li-ion battery modeling, Single-particle model 1. Introduction Electrochemical storage technology is an important part of the decarbonization transition. Integrating electrochemical storage solutions into the power grid is expected to improve strategic deployment, stabilize the grid, and peak-shift energy supply/demand [1]. Additionally, electrochemical storage solutions are used in vehicles (e.g., Li-ion batteries) to enable cleaner alternatives to fossil fuels. Li-ion batteries are a particularly successful electrochemical storage device in grid and consumer applications, including electric vehicles [2, 3, 4, 5, 6]. A key challenge in Li-ion battery technology is retaining high-energy density and ∗ Corresponding author. Tel: (303) 275-4739. Email address: malik.hassanaly@nrel.gov (Malik Hassanaly) high-power capability, while simultaneously improving cycle-life and calendar-life. However, Li-ion battery lifetime and aging dynamics vary significantly with chemistry, operating conditions, cycling demands, electrode design, and operational history, which makes optimal handling, design, and maintenance difficult [7, 8, 9]. To determine the optimal Li-ion battery usage for maximizing the lifetime, rapid assessment and forecasting of battery state-of-health are required. In the battery research community, many researchers use machine learning approaches to assess remaining life and diagnose battery age-states [9, 7, 10, 11, 12, 13]. However, these machine-learning approaches typically rely on testing a significant number of cells to obtain enough data to accurately project cycling/calendaring fade [9, 11], or require slow (on the order of 20–40 h) reference performance tests (RPTs) to diagnose a battery’s" 2312.17336v1,"PINN surrogate of Li-ion battery models for parameter inference. Part II: Regularization and application of the pseudo-2D model Malik Hassanaly a,∗ , Peter J. Weddle b , Ryan N. King a , Subhayan De d , Alireza Doostan c , Corey R. Randall b , Eric J. Dufek e , Andrew M. Colclasure b , Kandler Smith b a Computational Science Center, National Renewable Energy Laboratory (NREL), Golden, CO 80401 b Energy Conversion and Storage Systems Center, National Renewable Energy Laboratory, Golden, CO 80401 c Aerospace Mechanics Research Center, University of Colorado, Boulder, CO 80303 d Mechanical Engineering Department, Northern Arizona University, Flagstaff, AZ 86011 e Energy Storage and Electric Transportation Department, Idaho National Laboratory (INL), Idaho Falls, ID 83415 Abstract Bayesian parameter inference is useful to improve Li-ion battery diagnostics and can help formulate battery aging models. However, it is computationally intensive and cannot be easily repeated for multiple cycles, multiple operating conditions, or multiple replicate cells. To reduce the computational cost of Bayesian calibration, numerical solvers for physics-based models can be replaced with faster surrogates. A physics-informed neural network (PINN) is developed as a surrogate for the pseudo-2D (P2D) battery model calibration. For the P2D surrogate, additional training regularization was needed as compared to the PINN single-particle model (SPM) developed in Part I. Both the PINN SPM and P2D surrogate models are exercised for parameter inference and compared to data obtained from a direct numerical solution of the governing equations. A parameter inference study highlights the ability to use these PINNs to calibrate scaling parameters for the cathode Li diffusion and the anode exchange current density. By realizing computational speed-ups of ≈2250x for the P2D model, as compared to using standard integrating methods, the PINN surrogates enable rapid state-of-health diagnostics. In the low-data availability scenario, the testing error was estimated to ≈2mV for the SPM surrogate and ≈10mV for the P2D surrogate which could be mitigated with additional data. Keywords: Physics-informed neural network (PINN), Multi-fidelity machine learning, Li-ion battery modeling, Bayesian calibration, Pseudo-2D model 1. Introduction As batteries are pivotal to today’s economy, developing tools that accurately diagnose and forecast battery state-of-health is essential [1] to appropriately manage Li-ion batteries degradation [2]. In the present work, the battery’s internal parameters are determined from the voltage response during a discharge cycle, through Bayesian calibration. Bayesian calibration for parameter inference is computationally expensive because the underlying physics model that maps the internal parameters to the observed voltage response must be run many times [3]. Here, a physics-informed neural network ∗ Corresponding author. Tel: (303) 275-4739. Email address: malik.hassanaly@nrel.gov (Malik Hassanaly) (PINN) is trained to replace the more computationally expensive pseudo-2D (P2D) battery model. In Part I, a framework is discussed to develop a PINN for the single-particle model (SPM). A companion repository (https://github.com/NREL/pinnstripes) is provided. Here, the framework is extended to capture the P2D model physics. The P2D model is a standard physics-based model in the Li-ion battery community that captures heterogeneous electrode utilization during high-rate cycling [4–8]. Using surrogates of higher fidelity models is critical to mitigate modeling error and better capture the effect of additional aging properties. After training, a P2D PINN surrogate model is deployed to accelerate Bayesian calibration and identify the internal battery parameters using a discharge (2 C) voltage response. Similar to Part I, an emphasis is placed on the training procedure that can successfully train the neural" 2312.17353v1,"1 Towards Auto-Modeling of Formal Verification for NextG Protocols: A Multimodal cross- and self-attention Large Language Model Approach Jingda Yang ∗ Ying Wang ∗ ∗ Stevens Institute of Technology, Hoboken, NJ Email: ∗ { jyang76, ywang6 } @stevens.edu Abstract—This paper introduces Auto-modeling of Formal Verification with Real-world Prompting for 5G and NextG protocols (AVRE), a novel system designed for the formal verification of Next Generation (NextG) communication protocols, addressing the increasing complexity and scalability challenges in network protocol design and verification. Utilizing Large Language Models (LLMs), AVRE transforms protocol descriptions into dependency graphs and formal models, efficiently resolving ambiguities and capturing design intent. The system integrates a transformer model with LLMs to autonomously establish quantifiable dependency relationships through cross- and selfattention mechanisms. Enhanced by iterative feedback from the HyFuzz experimental platform, AVRE significantly advances the accuracy and relevance of formal verification in complex communication protocols, offering a groundbreaking approach to validating sophisticated communication systems. We compare CAL’s performance with state-of-the-art LLM-based models and traditional time sequence models, demonstrating its superiority in accuracy and robustness, achieving an accuracy of 95.94% and an AUC of 0.98. This NLP-based approach enables, for the first time, the creation of exploits directly from design documents, making remarkable progress in scalable system verification and validation. Index Terms—Formal verification, cross-attention, attention, natural language protocol, formal flow graph self- I. I NTRODUCTION The third generation partnership project (3GPP) published its Release 17 (Rel-17) specifications at the end of the first quarter of 2022 [1]. Since then, parallel and subsequent releases have been rolled out to enhance and address new and unfulfilled requirements from previous releases. It ensures ongoing innovation and improvement in mobile communication technologies, aligning with the evolving needs and advancements in the field. 3GPP protocols consist of a multitude of technical specifications and documents that cover various aspects of mobile communication networks, including radio access, core network, and service capabilities. 3GPP protocols, encompassing a wide array of technical specifications, are extensive, with documents like the Radio Resource Control (RRC) in Release 17 spanning over a thousand pages [2]. The extensive nature of these documents, coupled with their distributed security protocols, renders manual verification and testing both time-intensive and susceptible to error. This complexity escalates in future network generations, exacerbating the risk of zero-day vulnerabilities. Furthermore, the incorporation of O-RAN and network function virtualization introduces additional layers of complexity and potential attack vectors through cloud APIs into 5G and future G infrastructure [3]. These advancements offer enhanced functionality but expose operators to novel security challenges, especially in the relatively uncharted territory of cloud security. This complexity, compounded by the involvement of various entities in development, heightens the risk of security breaches, particularly through misconfigured containers and exposed APIs. Thus, in 5G and future G systems and networks, logical attacks exploiting protocol logic errors represent a significant vulnerability category. These attacks are challenging to detect due to the scale and complexity of the network systems. Formal verification encompasses a broad range of techniques used to prove or disprove the correctness of algorithms, protocols, systems, or software with respect to certain formal specifications. It also involves mathematical analysis to ensure that a system behaves as intended. Utilizing the Dolev- Yao (DY) formal attack model [4], [5], one of the widely adopted methodologies, formal verification has demonstrated its effectiveness in identifying flaws in infrastructure and communication protocols. However, this approach is limited to abstract specifications, and, as of now, the full automation of protocol verification and validation of their implementations remains beyond the reach of current technologies [6], [7]. With the recent advancements in Large Language Models (LLMs), an intriguing question emerges: Can LLMs contribute to accelerating the design and verification of large-scale protocols, and can they be effectively integrated with system validation processes that involve existing implementations? To answer this question, two crucial conditions must be addressed: clarifying ambiguities and capturing design intentions. The first condition involves resolving the conflict between the ambiguity inherent in natural language processing and the need for explicitness in formal verification modeling. Resolving this conflict is essential to demonstrate the potential to provide measurable and verifiable trustworthiness. The second condition requires differentiating intentional relationships or dependencies from unintentional ones identified by LLMs in targeting protocol designs. The differentiation is crucial in transforming the design-intended relationships into mathematical and logical expressions in formal verification. In the past several months, both academic and industry" 2312.17358v1,"An Introduction to Adaptive Software Security Mehran Alidoost Nia alidoostnia@ut.ac.ir School of Electrical and Computer Engineering, University of Tehran Tehran, Tehran, Iran Abstract This paper presents the adaptive software security model, an innovative approach integrating the MAPE-K loop and the Software Development Life Cycle (SDLC). It proactively embeds security policies throughout development, reducing vulnerabilities from different levels of software engineering. Three primary contributions—MAPE-K integration, SDLC embedding, and analytical insights—converge to create a comprehensive approach for strengthening software systems against security threats. This research represents a paradigm shift, adapting security measures with agile software development and ensuring continuous improvement in the face of evolving threats. The model emerges as a robust solution, addressing the crucial need for adaptive software security strategies in modern software development. We analytically discuss the advantages of the proposed model. Keywords: Adaptive Security, Software Security, Software Development Life Cycle, Self-Adaptive Systems. ACM Reference Format: Mehran Alidoost Nia. 2024. An Introduction to Adaptive Software Security. In Proceedings of The Local Meeting for Open Challenges in Autonomous Systems. ACM, New York, NY, USA, 10 pages. https: //doi.org/10.1145/nnnnnnn.nnnnnnn 1 Introduction Functional and non-functional requirements are both crucial to the successful operation of software systems. Functional requirements refer to the specific features that a software system is intended to perform, while non-functional requirements relate to how the system’s functionalities are evaluated. While it is relatively straightforward to ensure that these requirements are met during the design phase using formal methods or rigorous static analysis techniques, ensuring compliance at runtime is more complex, as changes are expected. To meet these requirements at runtime, it is necessary to capture changes and respond appropriately to each shift. This adaptivity is essential to ensure that the system’s requirements are met and that it continues to function optimally according to those requirements. The Local Meeting for Open Challenges in Autonomous Systems, November 2023, Tehran, Iran © 2024 Open for redistribution. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn In software development, it is important to consider nonfunctional requirements such as reliability, usability, security, safety, and performance. These requirements do not relate to the functionality of the system but rather to its non-functional aspects. The software development life-cycle (SDLC) provides a framework for the development and deployment of software [1], as shown in Figure 1. Security requirements are crucial to ensure the production of secure software. Software security requirements include availability, confidentiality, and integrity of the software system. These requirements specifically address potential security risks and vulnerabilities and are important to consider in the overall software requirements. Depending on the situations and application requirements, these security requirements may be subject to change at runtime. When it comes to adaptive software development, the software must have runtime strategies to handle situations where a few configurations or user-related assumptions change. For example, the communication protocol may change suddenly, and the defense strategies should be adapted to the system’s new situation. Under all circumstances, the security requirements of the system must be fulfilled [4]. This is the reason behind any adaptation tactics we perform at runtime. The goal of incorporating security requirements into the software development process is to design, implement, and maintain a system that can resist and mitigate various security threats. The SDLC process must be changed to cover security-related requirements at runtime [2]. In the software development process, by the runtime, we mean the environment which the software works within that after deployment. Consider a web server that tolerates many sensitive requests from users. The server’s security must be guaranteed even if parts of the requests are malicious. When the server is under attack, the system must adaptively detect the new situation and plan for possible changes in its strategies at runtime. The goal is to preserve all three security requirements of the users and their data. In such situations, the system may restrict the users’ IP addresses to where malicious requests belong. Another adaptation security action could be restricting the number of requests issued from a unique user. All these adaptation actions are performed to ensure security requirements at runtime when changes come to violate those requirements. We intend to extend the adaptive software security underlying to self-adaptive software systems where reaction(s) to" 2312.17363v1,"Running head: MISSING DATA ANALYTICAL METHODS A Comparison of Full Information Maximum Likelihood and Machine Learning Missing Data Analytical Methods in Growth Curve Modeling Dandan Tang and Xin Tong Department of Psychology, University of Virginia Author Note This research was supported by a 4-VA grant from the Commonwealth of Virginia. Correspondence concerning this article should be addressed to Dandan Tang, Department of Psychology, University of Virginia. Email: gux8df@virginia.edu. 1" 2312.17376v1,"Proceedings of Machine Learning Research vol vvv:1–22, 2024 Wasserstein Distributionally Robust Regret-Optimal Control in the Infinite-Horizon Taylan Kargin ∗ Joudi Hajar ∗ Vikrant Malik ∗ Babak Hassibi TKARGIN @ CALTECH . EDU JHAJAR @ CALTECH . EDU VMALIK @ CALTECH . EDU HASSIBI @ CALTECH . EDU ∗ Equal contribution Department of Electrical Engineering, Caltech, Pasadena, CA 91125 Abstract We investigate the Distributionally Robust Regret-Optimal (DR-RO) control of discrete-time linear dynamical systems with quadratic cost over an infinite horizon. Regret is the difference in cost obtained by a causal controller and a clairvoyant controller with access to future disturbances. We focus on the infinite-horizon framework, which results in stability guarantees. In this DR setting, the probability distribution of the disturbances resides within a Wasserstein-2 ambiguity set centered at a specified nominal distribution. Our objective is to identify a control policy that minimizes the worst-case expected regret over an infinite horizon, considering all potential disturbance distributions within the ambiguity set. In contrast to prior works, which assume time-independent disturbances, we relax this constraint to allow for time-correlated disturbances, thus actual distributional robustness. While we show that the resulting optimal controller is non-rational and lacks a finite-dimensional state-space realization, we demonstrate that it can still be uniquely characterized by a finite dimensional parameter. Exploiting this fact, we introduce an efficient numerical method to compute the controller in the frequency domain using fixed-point iterations. This method circumvents the computational bottleneck associated with the finite-horizon problem, where the semi-definite programming (SDP) solution dimension scales with the time horizon. Numerical experiments demonstrate the effectiveness and performance of our framework. Keywords: Distributionally Robust Control, Regret-Optimal Control, Wasserstein distance, Infinite- Horizon Control. 1. Introduction Ensuring reliable and effective operation in the face of uncertainty is a fundamental challenge in decision-making and control. Control systems are inherently subject to diverse uncertainties, including exogenous disturbances, measurement inaccuracies, modeling discrepancies, and temporal variations in the underlying dynamics (van der Grinten, 1968; Doyle, 1985). Disregarding these uncertainties during controller design can lead to significant performance degradation and even unsafe and unintended behavior (Samuelson and Yang, 2017). Traditionally, stochastic and robust control frameworks have addressed this issue primarily through the lens of exogenous disturbances (Kalman, 1960; Zames, 1981; Doyle et al., 1988). Stochastic control, exemplified by Linear–quadratic–Gaussian (LQG), or H 2 , control, aims to minimize the expected cost, assuming disturbances are generated randomly from a known probability distribution (Hassibi et al., 1999). However, in practice, the true distribution is often estimated from sampled data, rendering this approach vulnerable to inaccurate models. Robust control, on the other hand, seeks to minimize the worst-case cost across a set of potential disturbance realizations, like those with bounded energy or power (H ∞ control) (Zhou et al., 1996). While this guarantees robustness against adversarial disturbances, it can be overly conservative, discarding potentially valuable statistical information. To address this issue, two recent approaches have emerged. © 2024 T. Kargin, J. Hajar, V. Malik & B. Hassibi." 2312.17383v1,"Hotspot Prediction of Severe Traffic Accidents in the Federal District of Brazil Vinicius Lima Vetria Byrd Computer Graphics Technology/Criminalistics Institute Purdue University/Federal District Civil Police West Lafayette, IN, USA/Brasilia, DF, Brazil Email: vlima@purdue.edu Computer Graphics Technology Purdue University West Lafayette, IN, USA Email: vbyrd@purdue.edu Abstract—Traffic accidents are one of the biggest challenges in a society where commuting is so important. What triggers an accident can be dependent on several subjective parameters and varies within each region, city, or country. In the same way, it is important to understand those parameters in order to provide a knowledge basis to support decisions regarding future cases prevention. The literature presents several works where machine learning algorithms are used for prediction of accidents or severity of accidents, in which city-level datasets were used as evaluation studies. This work attempts to add to the diversity of research, by focusing mainly on concentration of accidents and how machine learning can be used to predict hotspots. This approach demonstrated to be a useful technique for authorities to understand nuances of accident concentration behavior. For the first time, data from the Federal District of Brazil collected from forensic traffic accident analysts were used and combined with data from local weather conditions to predict hotspots of collisions. Out of the five algorithms we considered, two had good performance: Multi-layer Perceptron and Random Forest, with the latter being the best one at 98% accuracy. As a result, we identify that weather parameters are not as important as the accident location, demonstrating that local intervention is important to reduce the number of accidents. Police. In Brazil, every accident with injuries requires a forensic team to collect evidence and analyze the scene, providing a forensic report to police investigators and justice authorities [5, p. 9]. Since 2019, the forensic team has been collecting data in a digital format, creating an archive of accident data and information. In practice, accidents that resulted in minor injuries or the ones that could not be isolated by the police (for safety reasons, or to relieve traffic congestion, for instance) are not examined on-site, but instead, they have the vehicles removed for analysis at a police station. Here, we define severe accidents as the ones where at least one person was taken to the hospital or died. The motivation for this research came from a previous visualization tool that identified three hotspots and analyzed their causes based on forensic reports [6]. This work demonstrated the importance of studying crash concentrations and their causes. Forensic analysts typically focus on individual cases, but this paper aligns with the concept of ""Forensic Intelligence"" by exploring the broader law enforcement knowledge that can be gained from analyzing the rich database collected from many accidents [7]. Therefore, we demonstrate the opportunity forensic analysts have to provide intelligent data by studying the general behavior of accidents, abstracting hidden patterns, and consequently creating supportive knowledge to prevent new cases. A prediction analysis was conducted based on the data collected on-site in conjunction with weather parameters in the Federal District of Brazil, where the capital of the country sits. ML algorithms such as Random Forest and Multi-layer Perceptron, demonstrated to have good performance to predict the number of accidents in different regions, therefore, identifying hotspots of accidents. Furthermore, a feature importance analysis based on the evaluated parameters was conducted and described. The remainder of this paper is structured as follows. Section II provides an overview of similar and related work. Section III summarizes the primary objectives of our research, outlining the research questions we aim to address. In Section IV, we present the dataset used for this study and detail the preprocessing steps undertaken to ensure its suitability for our objectives. Section V explains the methodology employed in this project, while Section VI provides a comprehensive discussion of the main findings. Additionally, in Section VI, we acknowledge the limitations of this work and outline our plans for future research. Finally, the article concludes with Section VII, where we present our conclusions, followed by an acknowledgement section. Keywords-traffic accident; machine learning; forensic sciences; accident reconstruction; hotspots. I. I NTRODUCTION Traffic accidents are a pervasive problem in modern cities worldwide. In response, the World Health Organization (WHO) has created an ambitious agenda to reduce accidents by 2030 [1]. In Brazil, traffic accidents are a major public health concern, with the government spending significant amounts of money on addressing their consequences [2]. However, instead of reacting to accidents after they happen, prevention is key. Machine Learning (ML) [3] is a rapidly advancing technology that can predict outcomes based on features and provide valuable insights into their causes. These methods can be useful tools for accident analysis and align with the concepts of Safe Smart Cities [4]. The increasing number of traffic accidents creates an opportunity to study them and get a better perspective on their causes. The knowledge derived from the reason behind traffic accidents can help authorities make better decisions regarding public policies or infrastructure to prevent future cases. This paper focuses on data collected by crash reconstructionists from the Brazilian Federal District Civil" 2312.17389v1,"Fractional non-homogeneous counting process Nick Laskin ∗ TopQuark Inc. Toronto, ON, M6P 2P2 Canada Abstract A new fractional non-homogeneous counting process has been introduced and developed using the Kilbas and Saigo three-parameter generalization of the Mittag-Leffler function. The probability distribution function of this process reproduces for certain set of the fractality parameters the famous Poisson and fractional Poisson probability distributions as well as the probability distribution function of a counting process displaying stretched exponential interarrival times distribution. Applications of the developed fractional non-homogeneous counting process cover fractional compound process, the generalization of combinatorial polynomials and numbers, statistics of the fractional non-homogeneous counting process and a new representation of the Kilbas and Saigo function. PACS numbers: 05.10.Gg; 05.45.Df; 42.50.-p. Keywords: Fractional non-homogeneous counting process, fractional Poisson process, generating functions, combinatorial polynomials and numbers, Mittag-Leffler function, Kilbas and Saigo function 1 Introduction Recently, a discrete probability distribution function ∗ E-mail address: nlaskin@rocketmail.com 1" 2312.17414v1,"Space-Time Hypervolume Meshing Part 1: Point Insertion, Geometric Predicates, and Bistellar Flips Jude T. Anderson ∗ , David M. Williams Department of Mechanical Engineering, The Pennsylvania State University, University Park, Pennsylvania 16802 Laboratories for Computational Physics and Fluid Dynamics, Naval Research Laboratory, Washington, DC 20375 Abstract Part 1 of this paper provides a comprehensive guide to generating unconstrained, simplicial, four-dimensional (4D), hypervolume meshes. While a general procedure for constructing unconstrained n-dimensional Delaunay meshes is wellknown, many of the explicit implementation details are missing from the relevant literature for cases in which n ≥ 4. This issue is especially critical for the case in which n = 4, as the resulting meshes have important space-time applications. As a result, the purpose of this paper is to provide explicit descriptions of the key components in a 4D mesh-generation algorithm: namely, the pointinsertion process, geometric predicates, element quality metrics, and bistellar flips. This paper represents a natural continuation of the work which was pioneered by Anderson et al. in “Surface and hypersurface meshing techniques for space-time finite element methods”, Computer-Aided Design, 2023. In this previous paper, hypersurface meshes were generated using a novel, trajectorytracking procedure. In the current paper, we are interested in generating coarse, 4D hypervolume meshes (boundary meshes) which are formed by sequentially inserting points from an existing hypersurface mesh. In the latter portion of this paper, we present numerical experiments which demonstrate the viability of this approach for a simple, convex domain. Although, our main focus is on the generation of hypervolume boundary meshes, the techniques described in this paper are broadly applicable to a much wider range of 4D meshing methods. We note that the more complex topics of constrained hypervolume meshing, and boundary recovery for non-convex domains will be covered in Part 2 of the paper. Keywords: Hypervolume meshing, Point insertion, Geometric predicates, Bistellar flips, Space time, Four dimensions ∗ Corresponding author Email address: jta29@psu.edu (Jude T. Anderson ) 1 Distribution Statement A: Approved for public release. Distribution is unlimited. Preprint submitted to Computer-Aided Design January 1, 2024" 2312.17434v1,"A finite element framework for fluid-structure interaction of turbulent cavitating flows with flexible structures Nihar B. Darbhamulla a , Rajeev K. Jaiman a,∗ a Department of Mechanical Engineering, The University of British Columbia, Vancouver, BC V6T 1Z4 Abstract We present a finite element framework for the numerical prediction of cavitating turbulent flows interacting with flexible structures. The vapor-fluid phases are captured through a homogeneous mixture model, with a scalar transport equation governing the spatio-temporal evolution of cavitation dynamics. High-density gradients in the two-phase cavitating flow motivate the use of a positivity-preserving Petrov-Galerkin stabilization method in the variational framework. A mass transfer source term introduces local compressibility effects arising as a consequence of phase change. The turbulent fluid flow is modeled through a dynamic subgrid-scale method for large eddy simulations. The flexible structure is represented by a set of eigenmodes, obtained through the modal analysis of the linear elasticity equations. A partitioned iterative approach is adopted to couple the structural dynamics and cavitating fluid flow, where the deforming flow domain is described by an arbitrary Lagrangian-Eulerian frame of reference. Through the numerical validation study, we establish the fidelity of the proposed framework by comparing it against experimental and numerical studies for both rigid and flexible hydrofoils in cavitating flows. Under unstable partial cavitating conditions, we identify specific vortical structures leading to cloud cavity collapse. We further explore features of cavitating flow past a rigid body such as re-entrant jet and turbulence-cavity interactions during cloud cavity collapse. Based on the validation study conducted over a flexible NACA66 rectangular hydrofoil, we elucidate the role of cavity and vortex shedding in governing the structural dynamics. Subsequently, we identify a broad spectrum frequency band whose central peak does not correlate to the frequency content of the cavitation dynamics or the natural frequencies of the structure, indicating the induction of unsteady flow patterns around the hydrofoil. Finally, we discuss the coupled fluid-structure dynamics during a cavitation cycle and the underlying mechanism associated with the promotion and mitigation of cavitation. Keywords: Fluid-structure interaction, Cavitation, Stabilized finite element, Partitioned iterative, Large eddy simulation, Flexible hydrofoil 1. Introduction Cavitation is a prominent phenomenon in natural and industrial systems involving the liquid phase. In the context of marine applications, the performance of hydrodynamic devices such as propellers, rudders, stabilizers, and fins is largely governed by the extent of cavitation in their operating regimes. Furthermore, cavitation is a major source of noise in the ocean environment, with unsteady vibrations affecting the performance of marine structures, and influencing marine life in surrounding regions. Along with noise, the collapse of cavities is associated with shock waves, whose impact on hydrodynamic devices can lead to material erosion and structural damage [15, 53]. To mitigate the effects of cavitation on hydrodynamic structures, it is essential to understand the mechanisms driving the coupled dynamics of cavitating flows interacting with structural response. The phenomenon of cavitation involves the phase transition of liquid into vapor. Often, the flowing liquid is not a pure substance and contains impurities in the form of suspended solid particles, entrained gas bubbles, or regions of interaction with solid surfaces. The locations of these features are identified ∗ Corresponding author Email addresses: nihar.darbhamulla@mail.ubc.ca (Nihar B. Darbhamulla), rjaiman@mech.ubc.ca (Rajeev K. Jaiman) Preprint submitted to Computers & Fluids January 1, 2024" 2312.17468v1,"Towards Mitigating Dimensional Collapse of Representations in Collaborative Filtering Huiyuan Chen Vivian Lai Hongye Jin hchen@visa.com Visa Research Palo Alto, USA viv.lai@visa.com Visa Research Palo Alto, USA jhy0410@tamu.edu Texas A&M Unversity College Station, USA Zhimeng Jiang Mahashweta Das Xia Hu zhimengj@tamu.edu Texas A&M Unversity College Station, USA mahdas@visa.com Visa Research Palo Alto, USA xia.hu@rice.edu Rice University Houston, USA ABSTRACT Contrastive Learning (CL) has shown promising performance in collaborative filtering. The key idea is to generate augmentationinvariant embeddings by maximizing the Mutual Information between different augmented views of the same instance. However, we empirically observe that existing CL models suffer from the dimensional collapse issue, where user/item embeddings only span a low-dimension subspace of the entire feature space. This suppresses other dimensional information and weakens the distinguishability of embeddings. Here we propose a non-contrastive learning objective, named nCL, which explicitly mitigates dimensional collapse of representations in collaborative filtering. Our nCL aims to achieve geometric properties of Alignment and Compactness on the embedding space. In particular, the alignment tries to push together representations of positive-related user-item pairs, while compactness tends to find the optimal coding length of user/item embeddings, subject to a given distortion. More importantly, our nCL does not require data augmentation nor negative sampling during training, making it scalable to large datasets. Experimental results demonstrate the superiority of our nCL. CCS CONCEPTS • Information systems → Recommender systems. KEYWORDS Collaborative Filtering, Dimensional Collapse, Contrastive Learning ACM Reference Format: Huiyuan Chen, Vivian Lai, Hongye Jin, Zhimeng Jiang, Mahashweta Das, and Xia Hu. 2024. Towards Mitigating Dimensional Collapse of Representations in Collaborative Filtering. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4–8, 2024, Merida, Mexico. ACM, New York, NY, USA, 10 pages. https: //doi.org/10.1145/3616855.3635832 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WSDM ’24, March 4–8, 2024, Merida, Mexico © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0371-3/24/03. . . $15.00 https://doi.org/10.1145/3616855.3635832 Complete Collapse Dimensional Collapse No Collapse Figure 1: Different collapsing patterns (complete collapse, dimensional collapse, and no collapse) for three item groups. 1 INTRODUCTION Collaborative Filtering is a prominent technique [16, 29], which considers the users’ historical contexts (e.g., purchases and clicks) and assumes that users who share similar preferences tend to make similar decisions. Collaborative filtering algorithms have evolved over the years, from simple Factorization Machines [19] to deep neural networks, such as Neural Matrix Factorization [16] and Graph Neural Networks [6, 15, 30, 45]. While collaborative models have achieved enormous success in industries, they are often bottlenecked by limited annotated labels, which highly sacrifices the performance for long-tail or cold-start items [8, 21, 24, 42, 54]. Recently, Contrastive Learning (CL) has emerged as a promising paradigm for learning representations without costly labels [9, 11, 37]. Contrastive methods operate on the assumption that the learned representations should be invariant to certain input transformations, rather than relying on task-specific supervision. Several studies have sought to harness the idea of CL in recommendation [26, 42, 48, 52]. For example, SGL [42] generates node embeddings by maximizing the Mutual Information among different augmented views of the same node. On the other hand, SimGCL [48] enhances recommendation accuracy and training efficiency by introducing uniform noises to the latent embedding space to create contrastive views. The simplicity and effectiveness of CL offer a promising paradigm for addressing the cold-start issue [42] and reducing exposure bias in recommender systems [52]. However, one of the major challenges in contrastive learning is the neural collapse problem [14, 17, 37]. Figure 1 illustrates different collapse phenomena in the low-dimensional space when given three groups of items: 1) Complete collapse, where the feature embeddings of all items tend to collapse to a trivial representation;" 2312.17473v1,"FerKD: Surgical Label Adaptation for Efficient Distillation Zhiqiang Shen Mohamed bin Zayed University of AI Zhiqiang.Shen@mbzuai.ac.ae Abstract We present FerKD, a novel efficient knowledge distillation framework that incorporates partial soft-hard label adaptation coupled with a region-calibration mechanism. Our approach stems from the observation and intuition that standard data augmentations, such as RandomResized- Crop, tend to transform inputs into diverse conditions: easy positives, hard positives, or hard negatives. In traditional distillation frameworks, these transformed samples are utilized equally through their predictive probabilities derived from pretrained teacher models. However, merely relying on prediction values from a pretrained teacher, a common practice in prior studies, neglects the reliability of these soft label predictions. To address this, we propose a new scheme that calibrates the less-confident regions to be the context using softened hard groundtruth labels. Our approach involves the processes of hard regions mining + calibration. We demonstrate empirically that this method can dramatically improve the convergence speed and final accuracy. Additionally, we find that a consistent mixing strategy can stabilize the distributions of soft supervision, taking advantage of the soft labels. As a result, we introduce a stabilized SelfMix augmentation that weakens the variation of the mixed images and corresponding soft labels through mixing similar regions within the same image. FerKD is an intuitive and well-designed learning system that eliminates several heuristics and hyperparameters in former FKD solution [37]. More importantly, it achieves remarkable improvement on ImageNet-1K and downstream tasks. For instance, FerKD achieves 81.2% on ImageNet-1K with ResNet-50, outperforming FKD and FunMatch by remarkable margins. Leveraging better pre-trained weights and larger architectures, our finetuned ViT-G14 even achieves 89.9%. Our code is available at https://github. com/szq0214/FKD/tree/main/FerKD. 1. Introduction Knowledge Distillation (KD) [13] has achieved impressive results in various visual domains, including image clas- ! > #. % Input Center points of RandomResizedCrop ! < #. '( Figure 1: Illustration of motivation for FerKD. The left figure depicts the original input, and the middle figure shows the center points of bounding boxes generated using RandomResizedCrop. The radius of each circle corresponds to the area of the bounding box. It can be observed that the center points of the bounding boxes are concentrated in the center of the image, and their area increases as they approach the center. The right figure displays several top and bottom confident bounding boxes and their corresponding predictive probabilities from a pre-trained teacher or teachers ensemble. The proposed hard region calibration strategy is established based on these predictions. sification [52, 36, 5, 37], object detection [6, 46, 11, 8, 53] and semantic segmentation [22, 15, 16]. However, KD methods are often computationally expensive and inefficient due to the additional computational burden imposed by the teacher models. The primary advantage of KD that motivates its usage is its ability to generate precise soft labels that convey more informative details about the input examples. It differs from other label softening techniques, such as label smoothing [43], Mixup [58], and CutMix [56], mainly in two aspects: (1) KD generates soft labels dynamically in each iteration, which is more informative than fixed smoothing patterns used in label smoothing; (2) Mixup and CutMix techniques essentially combine hard labels with coefficients, while KD produces soft labels that are highly correlated with the input sample. This allows KD’s soft labels to become more accurate when different data augmentations, such as RandomResizedCrop, flipping and rotation, color jittering, etc., are applied. In general, mixing-based label softening methods cannot monitor such changes in input content, but KD can address them effortlessly." 2312.17492v1,"HEAP: Unsupervised Object Discovery and Localization with Contrastive Grouping Xin Zhang 1 , Jinheng Xie 1 , Yuan Yuan 2 , Michael Bi Mi 2 , Robby T. Tan 1 1 National University of Singapore 2 Huawei International Pte Ltd {x.zhang, jinheng}@u.nus.edu, yuanyuan10@huawei.com, michaelbimi@yahoo.com, robby.tan@nus.edu.sg Abstract Unsupervised object discovery and localization aims to detect or segment objects in an image without any supervision. Recent efforts have demonstrated a notable potential to identify salient foreground objects by utilizing self-supervised transformer features. However, their scopes only build upon patchlevel features within an image, neglecting region/image-level and cross-image relationships at a broader scale. Moreover, these methods cannot differentiate various semantics from multiple instances. To address these problems, we introduce Hierarchical mErging framework via contrAstive grouPing (HEAP). Specifically, a novel lightweight head with crossattention mechanism is designed to adaptively group intraimage patches into semantically coherent regions based on correlation among self-supervised features. Further, to ensure the distinguishability among various regions, we introduce a region-level contrastive clustering loss to pull closer similar regions across images. Also, an image-level contrastive loss is present to push foreground and background representations apart, with which foreground objects and background are accordingly discovered. HEAP facilitates efficient hierarchical image decomposition, which contributes to more accurate object discovery while also enabling differentiation among objects of various classes. Extensive experimental results on semantic segmentation retrieval, unsupervised object discovery, and saliency detection tasks demonstrate that HEAP achieves state-of-the-art performance. (b) Patch-Level Region-Level Image-Level Spectral Clustering / Seed Expansion Previous methods (a) Encoder Patch Embeddings (c) Patch-Level Region-Level Adaptive Grouping Foreground Ours Patch-Level Affinities Image-Level Background Region-Level Pulling Image-Level Pushing Figure 1: (a)-(b): Existing methods, such as FOUND (SimÃl’oni et al. 2023) and TokenCut (Wang et al. 2022b), consider patch-level similarities for each image separately. (a)-(c): HEAP jointly explores hierarchical supervisions (i.e., patch/region/image-level) across images, enabling more acurate object discovery and discrimination among objects of various classes. Note that colors only represent different objects, not specific classes. Introduction Unsupervised object discovery and localization aims to detect or segment salient objects in images without any human supervision (Vo, Pérez, and Ponce 2020). It is a fundamental problem since it provides a valuable source of weak supervision beneficial for various downstream tasks (Zhang and Chen 2023), such as object detection (Shin, Albanie, and Xie 2022; Xie et al. 2021b) and semantic segmentation (Xie et al. 2022b; Li et al. 2023; Xie et al. 2022a), etc. Due to the absence of prior knowledge regarding visual characteristics or expected class membership, localizing possible objects within a scene presents significant challenges. Early efforts (Zitnick and Dollár 2014; Uijlings et al. 2013; Vo et al. 2019, 2021) attempted to extract excessive candidate region proposals from the entire image set, which Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. are computationally prohibitive to scale to large datasets. More recent works (Melas-Kyriazi et al. 2022; Wang et al. 2022b) turn to leveraging self-supervised models such as DINO (Caron et al. 2021), which show great potential for object segmentation. (Melas-Kyriazi et al. 2022; Wang et al. 2022b) construct a similarity graph for each image separately and exploit spectral clustering to localize objects. (Shin, Albanie, and Xie 2022; Wang et al. 2022a, 2023) further utilize the identified objects as pseudo masks to train a detection/segmentation model. (Siméoni et al. 2021; SimÃl’oni et al. 2023) first identify foreground/background seeds from the self-attention map and then expand to cover the whole object. While yielding promising outcomes, existing methods treat the problem as binary patch-wise classification, ignoring semantic relationships between objects." 2312.17501v1,"Theory of gravity with nonminimal matter-nonmetricity coupling and the de-Sitter swampland conjectures Sanjay Mandal 1, ∗ and Kazuharu Bamba 2, † 1 Faculty of Mathematics and Computer Science, Transilvania University, Iuliu Maniu Str. 50, 500091 Brasov, Romania. 2 Faculty of Symbiotic Systems Science, Fukushima University, Fukushima 960-1296, Japan. (Dated: January 1, 2024) In this study, we investigate swampland conjectures within the setup of matter and non-metricity nonminimal coupling theories of gravity. We examine how the inflationary solution produced by a single scalar field can be resolved with the swampland criteria in string theory regarding the formation of de Sitter solutions. The new important findings are that the inflationary scenario in our study differs from the one in general relativity because of the presence of a nonminimal coupling term, and that difference gives the correction to general relativity. In addition, we observe that the slow-roll conditions and the swampland conjectures are incompatible with each other for a single scalar field within the framework of nonminimally coupled alternative gravity theories. We predict that these results will hold for a wide range of inflationary scenarios in the context of nonminimal coupling gravitational theories. Keywords: Swampland conjectures; Inflation; Nonminimal coupled theory of gravity; de-Sitter solution. I. INTRODUCTION The ΛCDM model, the prevailing framework in cosmology, effectively captures and explains contemporary cosmological and astrophysical observations. It relies on two key components that extend beyond the standard model of particle physics: dark matter and dark energy. Dark matter is postulated as a particle within theories surpassing the standard model, while dark energy remains a puzzle lacking a fully satisfactory solution. The cosmological constant emerges as the most straightforward candidate for dark energy, and observational data align with its predictions. According to this model, the distant future of the Universe involves an asymptotic transition to de Sitter spacetime, characterized by a constant expansion rate. Despite ongoing efforts to reconcile particle physics and general relativity, there is still no definitive explanation within current theories for the origin of the cosmological constant, such as residual vacuum energy density. Recent discussions question the feasibility of realizing de Sitter spacetime in string theory, as highlighted in references [1–3], with [4] offering a comprehensive review and [5] sounding a note of caution regarding the swampland conjectures. The swampland conjectures are a series regarding the circumstances that must be satisfied in order to accept local gauge symmetries and at least one Planck mass ∗ sanjaymandal960@gmail.com † bamba@sss.fukushima-u.ac.jp particle in order to account for gravity’s weakness. Superluminal propagation must additionally avoid highorder elements in the effective action (for a discussion, see Ref. [4]). To the best of our knowledge, no assumptions are involved in the Strong Equivalence Principle in this scenario, and assuming that General Relativity theory remains an inevitable gravitational theory. As a result, it is natural to investigate if the swampland conjectures hold true for alternative gravity theories that allow for single-field inflation. This applies to nonminimal matter and curvature coupling gravitational theories of gravity [6, 7], which might provide inflationary solutions. String gravitational theories are more complicated than general relativity. But, the effective string theory models demonstrate extra terms in the form of coupling between high-order curvature terms and derivatives of the dilaton field; those extra terms represent the adjustments to general relativity [8–12]. However, alternative gravity theories are proposed to search for possible avenues for exploring astrophysical and cosmological scenarios, for example, the flattening of the rotation curves of galaxies and the accelerated expansion of the Universe, instead of resorting to dark matter and dark energy, independent of string and quantum gravity considerations. Modified theories of gravity not only successfully address the late-time cosmologies but are also able to discuss the early-time scenario of the universe. For instance, one can see the references herein for the detail studies in modified theories of gravity [13–29]. Further, the ΛCDM model predicts" 2312.17515v1,"Cooperation on the Fly: Exploring Language Agents for Ad Hoc Teamwork in the Avalon Game Zijing Shi 1 , Meng Fang 2 , Shunfeng Zheng 1 , Shilong Deng 2 , Ling Chen 1 , Yali Du 3 1 AAII, University of Technology Sydney, Australia {zijing.shi, shunfeng.zheng}@student.uts.edu.au, ling.chen@uts.edu.au 2 University of Liverpool, United Kingdom {Meng.Fang, shilong.deng}@liverpool.ac.uk 3 King’s College London, United Kingdom yali.du@kcl.ac.uk Abstract Multi-agent collaboration with Large Language Models (LLMs) demonstrates proficiency in basic tasks, yet its efficiency in more complex scenarios remains unexplored. In gaming environments, these agents often face situations without established coordination protocols, requiring them to make intelligent inferences about teammates from limited data. This problem motivates the area of ad hoc teamwork, in which an agent may potentially cooperate with a variety of teammates to achieve a shared goal. Our study focuses on the ad hoc teamwork problem where the agent operates in an environment driven by natural language. Our findings reveal the potential of LLM agents in team collaboration, highlighting issues related to hallucinations in communication. To address this issue, we develop CodeAct, a general agent that equips LLM with enhanced memory and code-driven reasoning, enabling the repurposing of partial information for rapid adaptation to new teammates. 1 Introduction Large Language Models (LLMs) have exhibited impressive abilities in reasoning and generalization, showing their potential in building autonomous agents and driving many advancements (Kojima et al., 2022; Xi et al., 2023). Recent research involving multiple LLM agents working together has shown success in task execution (Wang et al., 2023c; Wu et al., 2023; Dong et al., 2023). However, these studies often employ explicit coordination protocols for fully cooperative tasks, assuming full information of the teammate and the task. While some research has explored simulating LLM agents in more open-ended settings, these agents remain limited by pre-established strategies and behaviors (Park et al., 2023). In dynamic environments, maintaining consistent coordination protocols among agents is a challenge. Such contexts demand an agent capable of swift adaptation and on-the-fly cooperation. Without pre-established team strategies, an agent, often referred to as the learner, must observe its teammates’ behaviors and adapt effectively to achieve their shared goals. This challenge is known as the Ad Hoc Teamwork (AHT) problem (Stone et al., 2010; Macke et al., 2021). A significant challenge for the learner is to infer the role of their teammates. Traditional methods rely on pre-programmed rules or data-driven algorithms trained on historical data (Mirsky et al., 2022). In contrast, LLM agents can directly communicate with their teammates in natural language. However, the communication dynamics within the environment may exhibit conflicting and competitive elements. Moreover, due to the inherent traits of LLMs, teammates may provide inaccurate or misleading information. In this study, we explore the AHT abilities of LLM agents, utilizing the multi-agent game The Resistance: Avalon to simulate AHT environments. We introduce the AvalonPlay benchmark, which challenges agents with hidden roles to participate in strategic gameplay across multiple rounds. In each round, a learner is tasked with selecting teammates without prior strategies and full information. Our research integrates LLM agents into AvalonPlay to evaluate their performance in AHT. Rather than developing coordination protocols for the entire team, we prioritize designing agents adept at cooperating in environments without such explicit protocols. A communication channel is designed within the AvalonPlay benchmark to enhance collaboration. We observe that LLM agents may sometimes produce hallucinations and forget early information. To address this, we introduce CodeAct, a general agent leveraging the advanced reasoning capabilities of LLMs, focusing on reasoning about various potential teammate types. We begin with a memory retrieval system that collects information and utilize the knowledge gained from these interactions." 2312.17522v1,"Overview of the PromptCBLUE Shared Task in CHIP2023 Wei Zhu 1 , Xiaoling Wang 1 ⋆ , Mosha Chen 2 , and Buzhou Tang 3 East China Normal University, Shanghai, China Holoflow Digital Technology, Hangzhou, China 3 Harbin Institute of Technology, Shenzhen, China 1 2 Abstract. This paper presents an overview of the PromptCBLUE shared task 4 held in the CHIP-2023 Conference. This shared task reformualtes the CBLUE benchmark, and provide a good testbed for Chinese opendomain or medical-domain large language models (LLMs) in general medical natural language processing. Two different tracks are held: (a) prompt tuning track, investigating the multitask prompt tuning of LLMs, (b) probing the in-context learning capabilities of open-sourced LLMs. Many teams from both the industry and academia participated in the shared tasks, and the top teams achieved amazing test results. This paper describes the tasks, the datasets, evaluation metrics, and the top systems for both tasks. Finally, the paper summarizes the techniques and results of the evaluation of the various approaches explored by the participating teams. Keywords: PromptCBLUE · Large language models · Medical natural language processing · parameter efficient fine-tuning · in-context learning. 1 Introduction In 2023, the launch of large language models like ChatGPT, gpt-4, Claude, Bard have taken the world by surprise. People are amazed by their general capabilities: (a) universal NLP task solver [38]. (b) powerful chatting capabilities. (c) following human instructions [35,3]. (d) reasoning and planning capabilities [48]. Recent works have shown that these powerful LLMs have expert level knowledge in the medical domain [43]. Although these models are powerful, they are proprietary, and can not be deployed locally, preventing many applications that have serious privacy concerns [52]. Recently, more and more powerful open-sourced LLMs are being released [30], making it more and more convenient for developers to train or fine-tune a local LLM for application developments. In order to evaluate the multitask capabilities of the recent open-sourced Chinese LLMs in medical NLP tasks, we re-build the CBLUE benchmark [56] into PromptCBLUE [75], a large-scale multi-task prompt tuning benchmark dataset ⋆ 4 Corresponding author. Email: xlwang@cs.ecnu.edu.cn. http://cips-chip.org.cn/2023/eval1" 2312.17524v1,"Performance of Distributed File Systems on Cloud Computing Environment: An Evaluation for Small-File Problem Thanh Duong Quoc Luu Hung Nguyen Faculty of Economics and Management John von Neumann Institute John von Neumann Institute Thai Binh Duong University Vietnam National University at HCMC Vietnam National University at HCMC E-mail: hung.nb@tbd.edu.vn E-mail: quoc.luu2015@qcf.jvn.edu.vn E-mail: thanh.duong@jvn.edu.vn Abstract—Various performance characteristics of distributed file systems have been well studied. However, the performance efficiency of distributed file systems on small-file problems with complex machine learning algorithms scenarios is not well addressed. In addition, demands for unified storage of big data processing and high-performance computing have been crucial. Hence, developing a solution combining high-performance computing and big data with shared storage is very important. This paper focuses on the performance efficiency of distributed file systems with small-file datasets. We propose an architecture combining both high-performance computing and big data with shared storage and perform a series of experiments to investigate the performance of these distributed file systems. The result of the experiments confirms the applicability of the proposed architecture in terms of complex machine learning algorithms. Keywords—Hadoop, HDFS, distributed file system, Lustre, Spark I. I NTRODUCTION From creating big models in machine learning to answering big questions in data processing, big data has been widely adopted and growing as a promising technology for enterprises to develop and improve their businesses efficiently. In research disciplines, along with high-performance computing, big data also plays a critical role in data processing [1], [2], [3]. However, high-performance computing mainly uses parallel distributed file systems for I/O and very limited local storage, whereas big data processing relies on Hadoop distributed file system (HDFS) and local storage [4]. In addition to storage issues, the output of scientific applications is often very large and would take a long time to transfer to external big data processing clusters (i.e. Hadoop system). Furthermore, the principle “write-once, read-many” of HDFS design does not meet high-performance computing requirements [5]. Thus, it requires an approach to provide a unified storage solution. Hadoop distributed file system (HDFS) is an open-source distributed storage platform that implements a data processing framework called MapReduce on top of it. Many companies (e.g., AOL, Yahoo!, Facebook) use HDFS to manage and store petabyte or exabyte-scale enterprise data on clusters due to its reliability and scalability [4], [6]. A fundamental philosophy of Hadoop system design is that “moving computation is cheaper than moving data” to leverage local storage (direct attached 978-1-5090-4134-3/16/$31.00 © 2016 IEEE storage - DAS) and reduce network transfer [7]. In other words, it means that Hadoop achieves more efficiency locally executing computations on nodes storing the data involved rather than moving it to other compute nodes across the network [8]. Hadoop can run on various hardware, especially commodity hardware. For instance, instead of using RAID to achieve fault tolerance, Hadoop replicates data across machines in a large cluster [7]. In addition to Hadoop system, Spark is a data processing framework running on top of HDFS and YARN to leverage data locality like MapReduce of Hadoop system [9]. As an alternative to MapReduce framework, Spark has been widely adopted for big data processing due to its speed, easiness, and complement to MapReduce framework limitations [10]. Moreover, beyond HDFS, Spark can also interface with a wide variety of distributed file systems (e.g., MapR File System, Cassandra, OpenStack Swift, Amazon S3, Chukwa, and Lustre) and local file system [11], [12], [9]. Lustre is a massively global and parallel distributed file system for high-performance computing [13]. It is among the most commonly deployed on supercomputing clusters [14]. Lustre provides POSIX-compliant with more than a terabyte per second (TB/s) of aggregate I/O throughput [15]. With InfiniBand, it will be able to directly transfer data from virtual memory on one node to virtual memory on another node for improvement of throughput and CPU usage [16]. However, for data-intensive jobs with large datasets, researchers argue that network transfers should be a potential bottleneck on non- HDFS systems [11], [17], [18]. In contrast, Ananthanarayanan et al. suggest that data locality becomes irrelevant when networking technology is improving faster than the disk speeds [19]. Furthermore, Xuan et al. suggest that the design of highperformance computing architecture provides high storage capacity with low-cost data fault tolerance [5]. Since there are many challenges of high-performance computing and big data processing combination, it is useful to re-examine Spark with both data-intensive and computeintensive under HDFS and non-HDFS. Furthermore, the smallfile problem is an important criterion for examining the efficiency of distributed file systems because the storage of numerous small files reduces the efficiency of clusters. As a result, the paper aims to study the applicability of a unified architecture combining high-performance computing and big data processing. In this paper, we expect that the performance of both Lustre and HDFS file systems will be able to achieve" 2312.17555v1,"Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security Florian Kammüller Middlesex University London, UK f.kammueller@mdx.ac.uk Abstract—In this paper we present an efficient approach to implementing model checking in the Higher Order Logic (HOL) of Isabelle. This is a non-trivial task since model checking is restricted to finite state sets. By restricting our scope to considering security attacks, we achieve an efficient executable specification of a model checking algorithm for attack trees. We provide the existing background, the necessary theory and illustrate its application. Theory and application are fully formalized in Isabelle thus providing an executable model checking algorithm. I. I NTRODUCTION Model checking is an automated verification technique for checking properties on a system model. It is a natural requirement for verification in system engineering as are testing, simulation and proof. Referring to testing, model checking can be seen as a complete test of all possible system execution paths. Clearly model checking is a complex task, in fact, it is exponential in the size of the state space. Consequently, model checking can only work for finite state sets, otherwise it does not terminate. Even for finite but rather complex state sets, it becomes quickly infeasible. Therefore, finding suitable abstractions of systems is an essential first step when applying model checking as a verification method. Higher Order Logic (HOL) based verification, like specification and proof in Isabelle, has no such limits. In fact, infinity can be expressed there as a concept and can be reasoned with and about. “Reasoning with” means using a mathematical concept, for example infinity, in specification and proof while “reasoning about” means that the concept is the subject of specification and proof, for example, we prove relations between different forms of infinity. The expressiveness of Isabelle/HOL allows combining meta-logical reasoning with reasoning in object-logics. On the other side, the verification in Isabelle/HOL is thus undecidable. Therefore, proving in Isabelle/HOL is an interactive process. For example, model checking itself may be specified (we say “embedded”) in Higher Order Logic, [10]. Then the process of model checking can be modeled and its mechanisms be derived from first principles and, within this embedding, application of model checking to application examples can be performed in Isabelle using its proof support system. However, model checking actual application examples is not automated when using this embedded model checking. Clearly, this is a highly complex proof task and needs interaction to an extent that may make realistic application examples infeasible. However, the advantages of a highly reliable process of model checking and its provably correct application may make such efforts desirable for highly safety, security or privacy critical applications. In particular, in human centric applications including complex infrastructures and policies, as for safety, security and privacy critical applications [12], [11], often the application domain poses challenges that also require expressive logics in order to express multi-layered and multi-faceted aspects of the real world [18]. For example, human disposition, like in Insider threats for airplane security policies [25], or protocols including probabilities for quantum cryptography, e.g., [17]. In order to address the challenge of Higher Order Logic model checking, we have extended the existing model checking theory [13], [14] provided for the Isabelle Insider and Infrastructure framework (IIIf) with an efficient algorithm for model checking of attack trees. Despite the theoretical impossibility of model checking HOL specifications, we provide within Isabelle a framework that allows automated (and provably correct) extraction of model checking procedures. This contribution is reported on in this paper. Necessary background is added (Section II). The formalization of the model checking algorithm is described in Section III and illustrated on an application example (Section IV). All Isabelle sources are available online. II. B ACKGROUND AND R ELATED W ORK This section provides an overview of the current extension of the Isabelle Infrastructure framework in relation to previous works and how it integrates the Refinement-Risk cycle (Section II-A). It also summarizes the formalization of the existing theories for Kripke structures and the temporal logic CTL (Section II-B), as well as the attack tree formalization and Correctness and Completeness theorems (Section II-C). A. Isabelle Infrastructure Framework Isabelle is a generic Higher Order Logic (HOL) proof assistant. Its generic aspect allows the embedding of socalled object-logics as new theories on top of HOL. There are sophisticated proof tactics available to support reasoning: simplification, first-order resolution, and special macros to support arithmetic amongst others. Object-logics are added to Isabelle using constant and type definitions forming a socalled conservative extension. That is, no inconsistency can be introduced: new types are defined as subsets of existing types; properties are proved using a one-to-one relationship" 2312.17559v1,"Shadow of a collapsing star in a regular spacetime Daniel Nunez 1, ∗ and Juan Carlos Degollado 1, † 1 Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México, Apartado Postal 48-3, 62251, Cuernavaca, Morelos, México We describe the dynamical formation of the shadow of a collapsing star in a Hayward spacetime in terms of an observer far away from the center and a free falling observer. By solving the time-like and light-like radial geodesics we determine the angular size of the shadow as a function of time. We found that the formation of the shadow is a finite process for both observers and its size is affected by the Hayward spacetime parameters. We consider several scenarios, from the Schwarzschild limit to an extreme Hayward black hole. PACS numbers: 04.50.-h, 04.50.Kd, 95.30.Sf I. INTRODUCTION A black hole traps all incident light without emitting any, leading to the expectation that an observer would perceive a dark region in the sky where the black hole is located. Nevertheless, owing to the significant bending of light caused by the black hole’s gravitational field, the dimensions and appearance of this region posses a particular imprint of the black hole whose properties may be inferred from the observation of the shadow. The Event Horizon Telescope (EHT) Collaboration successfully generated an image depicting the shadow of the black hole located at the core of the M87 galaxy in 2019 [1, 2]. Following significant improvements in technology, the image of the black hole situated at the center of our own galaxy [3–5] was presented (See [6] for more details). Inspired by these observations a constant interest in exploring various aspects of black hole shadows were renewed. The formation of the shadow over time and how its apparent angular size from a collapsing star was first investigated by Schneider and Perlick [7]. They modeled a non-transparent collapsing ball of dust in a spherically symmetric spacetime. In this scenario the time-dependent behavior of the star’s surface is the one described by the Oppenheimer-Snyder spacetime while the space-time outside the ball is Schwarzschild metric [8]. Given these considerations, Schneider and Perlick established that the shadow forms within a finite time, implying that an observer situated at any fixed position beyond the Schwarzschild radius would eventually perceive a circular shadow with an angular size described by Synge [9]. For a collapsing ball of dust with the outside described by the Schwarzschild metric, the angular radius of the shadow is primarly determined by its mass. Nonetheless, for another metrics the shadow size also may depend on the parameters that characterize the spacetime. It is therefore relevant to compute the angular size for other spacetimes and see how different from the ordinary ones are. In this work, we take a step in this direction and calculate the dependence on time of the angular size of the shadow of a collapsing star in a spacetime with no singularities. Following the approach of Schneider and Perlick to compute the angular size of a collapsing star, in this work we consider a model of collapse for which the exterior region is the Hayward spacetime. The Hayward metric was introduced as a model that aims to address the problem of singularities in black hole formation [10]. In contrast to the singularity that is predicted at the center of a black hole in many standard solutions of general relativity, the Hayward spacetime has been used to describe the gravitational collapse of matter, which forms a black hole-like structure with a regular core. This means that the spacetime remains well-behaved at the center, avoiding the singularities associated with classical black holes [11]. Several works have been focused on the properties of the Hayward black hole. For instance, the quasinormal modes [12–14] gravitational lensing [15–19], geodesic motion [20, 21] or accretion [22]. See also [23, 24] and references herein for other astrophysical scenarios. To model the collapse, we assume that the star is formed by a dust-like fluid and collapses in free fall so that each point on the surface of the star follows a radial time geodesic. In order to give a description of the formation of the shadow we consider two of observers one located far away from the collapse and other who falls freely towards the center of the star. The organization of the paper is as follows: In section II we describe some properties of the regular Hayward spacetime and provide the equations for null and timelike geodesics. We also introduce the tetrad attached to a static observer and other tetrad to the radial infalling observer. In section III we present the formation of the shadow in the course of the collapse and in section IV we give some final remarks. ∗ Electronic address: danielnunez@ciencias.unam.mx † Electronic address: jcdegollado@icf.unam.mx" 2312.17563v1,"Energy transfer in the collision of two scalar wave packets in spherical symmetry Li-Jie Xin, 1 Jun-Qi Guo, 2, ∗ and Cheng-Gang Shao 1, † 1 MOE Key Laboratory of Fundamental Physical Quantities Measurement, Hubei Key Laboratory of Gravitation and Quantum Physics, PGMF, and School of Physics, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 2 School of Physics and Technology, University of Jinan, Jinan 250022, Shandong, China (Dated: 1st January 2024) We study the collisions of two scalar wave packets in the asymptotically flat spacetime and asymptotically anti-de Sitter spacetime in spherical symmetry. An energy transfer formula is obtained, y = Cm i m o /r, where y is the transferred energy in the collisions of the two wave packets, m i and m o are the Misner-Sharp energies for the ingoing and outgoing wave packets, respectively, r is the areal radius and collision place, and C = 1.873 and C = 1.875 for the asymptotically flat spacetime and asymptotically anti-de Sitter spacetime circumstances, respectively. The formula is universal, independent of the initial profiles of the scalar fields. I. INTRODUCTION Gravitational collapse, closely related to the formation of stars, galaxies and large-scale structures, has been an important subject in gravitation and cosmology. During the collapse, the collision of matter fields and energy transfer processes usually occur, significantly affecting the eventual outcomes of collapse. The dust fluid is a dominant matter field in the Universe. Nakao et al. investigated the collision of two spherical thin shells of dust fluid in the asymptotically flat spacetime, and derived an expression for the energy transfer and change in the 3-momentum [1]. Ida and Nakao extended these results to spherically symmetric spacetime with charge and cosmological constant [2]. Cardoso and Rocha studied the dynamics of two thin shells of perfect fluid confined in a spherical box [3] and asymptotically anti-de Sitter (AdS) spacetime [4], where critical behaviors and chaotic phenomena were displayed. Dafermos and Holzegel conjectured the instability of the AdS spacetime [5, 6]. This conjecture was verified by Bizon and Rostworowski via numerical simulations [7]. By simulating the evolution of a spherical massless scalar field in the asymptotically AdS spacetime, Bizon and Rostworowski observed that the initial parameter could be classified according to the number of round trips in space. When the initial parameter is large enough, the scalar field collapses directly to form a black hole. A scalar field with an arbitrarily small initial amplitude oscillates enough round trips and eventually collapses to form a black hole. They attributed this nonlinear instability to the diffusion of energy from low to high frequencies, resulting in an energy concentration in spacetime. Maliborski obtained similar results for the collapse of a massless scalar field confined in a timelike worldtube with a perfectly reflecting wall [8]. It was demonstrated that energy tends to gather during the wave packet move- ∗ Electronic address: guojq@ujn.edu.cn † Electronic address: cgshao@hust.edu.cn ment in restricted systems in Refs. [7–15]. Cai et al. investigated the gravitational collapse of a massless scalar field and discovered a new power-law behavior for the time of gapped collapse. They studied the cirtical phenomenon near the threshold of black hole formation, in order to better understand the difference between the results in restricted asymptotically flat spacetime and asymptotically AdS spacetime. Moschidis mathematically proved the instability of the AdS spacetime using the Einstein-massless Vlasov system [16, 17]. Moschidis dropped some Vlasov particles into the AdS spacetime, which created concentric waves of matter in spacetime. Among the many concentric waves, the first two waves contain the most matter and energy, so it is sufficient to focus on them. The first wave will expand outward, hit the boundary, and bounce back toward the center. So does the second wave. When the first wave bounces off the boundary and begins to contract toward the origin, it will hit the second wave, which is still expanding. After the first wave arrives at the origin, it will expand again, and cross the second wave that is still contracting. Moschidis showed that the expanding wave always transfers energy to the contracting one, with the transferred energy near the origin being greater than near the outer boundary. Consequently, the second wave obtains more and more energy from the first one. Eventually, a black hole forms. For a review on the instability of the AdS spacetime, see Ref. [18]. In this paper, we simulate the collisions between two scalar wave packets in the asymptotically flat spacetime and asymptotically AdS spacetime, and obtain universal energy transfer formulas. The paper is organized as follows. In Sec. II, we describe the methodology on simulating collisions of two scalar wave packets in the asymptotically flat spacetime and asymptotically AdS spacetime. In Secs. III and IV, we report the energy transfer formulas for the collisions in the two spacetimes, respectively. The results are summarized in Sec. V. Throughout the paper, we set 4πG = c = 1." 2312.17575v1,"CAD-compatible structural shape optimization with a movable Bézier tetrahedral mesh Jorge López c , Cosmin Anitescu c , Timon Rabczuk a,b,∗ a Division of Computational Mechanics, Ton Duc Thang University, Ho Chi Minh City, Viet Nam b Faculty of Civil Engineering, Ton Duc Thang University, Ho Chi Minh City, Viet Nam c Institute of Structural Mechanics, Bauhaus-Universität Weimar, Marienstr. 15, D-99423 Weimar, Germany Abstract This paper presents the development of a complete CAD-compatible framework for structural shape optimization in 3D. The boundaries of the domain are described using NURBS while the interior is discretized with Bézier tetrahedra. The tetrahedral mesh is obtained from the mesh generator software Gmsh. A methodology to reconstruct the NURBS surfaces from the triangular faces of the boundary mesh is presented. The description of the boundary is used for the computation of the analytical sensitivities with respect to the control points employed in surface design. Further, the mesh is updated at each iteration of the structural optimization process by a pseudo-elastic moving mesh method. In this procedure, the existing mesh is deformed to match the updated surface and therefore reduces the need for remeshing. Numerical examples are presented to test the performance of the proposed method. The use of the movable mesh technique results in a considerable decrease in the computational effort for the numerical examples. Keywords: Shape optimization, Bézier tetrahedra, Isogeometric analysis, Moving mesh, IGES 1. Introduction Modeling and analysis have typically been distinguished as two different yet complementary phases for the engineering practice. However, for the analysis using the conventional numerical methods, a discrete mesh is essential for the geometries that have been modeled using Computer-Aided Design (CAD). Various methods exist in the literature [44, 5] to discretize the geometry and the solution fields. In this regard, Isogeometric Analysis (IGA) [10] emerged as an alternative to Finite Element Method (FEM), proposing the merging of the analysis and design domains. In this framework, the same basis functions which are employed in CAD to describe the geometry are also used for the approximation of the solution fields at the analysis stage. In the context of shape optimization, IGA provides the opportunity to represent complex geometries with few design variables [37, 27, 21, 24, 25, 41]. This is in contrast to the node- ∗ Corresponding author Email address: timon.rabczuk@tdtu.edu.vn (Timon Rabczuk) Preprint submitted to Elsevier" 2312.17576v1,"Flowing emulsions in microfluidic channels with directional surface roughness: from numerical simulations to experiments Francesca Pelusi, 1, ∗ Daniele Filippi, 2 Ladislav Derzsi, 3 Matteo Pierno, 2 and Mauro Sbragaglia 4 1 Istituto per le Applicazioni del Calcolo, CNR - Via dei Taurini 19, 00185 Rome, Italy 2 Department of Physics and Astronomy di Fisica ‘G. Galilei’, University of Padova, Via F. Marzolo 8, 35131 Padova, Italy 3 Institute of Physical Chemistry Polish Academy of Sciences, Kasprzaka 44/52, Warsaw, 01-224 Poland 4 Department of Physics & INFN, Tor Vergata University of Rome, Via della Ricerca Scientifica 1, 00133 Rome, Italy (Dated: January 1, 2024) The flow of emulsions in confined microfluidic channels is affected by the surface roughness. Directional effects induced by wall roughness have recently been reported when the flow direction of emulsions within these channels is reversibly inverted [D. Filippi et al., Adv. Mater. Technol. 8, 2201748 (2023)]. This evidence suggests that the activation of the emulsion flow may be associated with different rheological responses corresponding to different flow directions. In this work, we study in detail a 2D model that accounts for directional effects. Specifically, we perform 2D lattice Boltzmann numerical simulations of the flow of model emulsions in a confined microfluidic channel with one flat wall and the other patterned by right-angle triangular-shaped posts. For the opposite flow directions along the channel, we observe different flows, which are rooted in a different rheological response of the emulsion in the region close to the rough wall. Further, we develop an operative protocol based on mechanical arguments to reconstruct the stress profile inside the channel starting from velocity data. With this protocol, the evidence of a different rheological response associated with opposite flow directions can also be unveiled in available experimental data with other realizations of directional roughness. I. INTRODUCTION Contrary to homogeneous fluids, complex structured fluids composed of soft domains, such as droplets in emulsions [1], bubbles in foams [2] or blobs in gels [3], possess a non-linear rheological response to an applied stress. This non-linear response results in a fluidization scenario that profoundly differs from that of a Newtonian fluid, comprising heterogeneous flow structures [4–6], shearthinning behaviours [7, 8] and also the emergence of yield stress rheology for the more concentrated systems [9]. Furthermore, spatial cooperativity effects, arising from the presence of finite-sized soft domains, have been observed influencing the overall system fluidization [10– 13]. This scenario has prompted several investigations in recent years, encompassing fundamental interests at the interface between physics, chemistry, and engineering [9, 14, 15]. Beyond this fundamental importance, these materials also show a wide variety of applications, from pharmaceutics [16] to oil recovery [17], from cosmetics [18] to food industry [19]. The presence of interactions with the boundary conditions brings further complexities. This is the case – for example – of emulsions or foams flowing in microfluidic channels with rough walls. Indeed, surface roughness can promote droplet/bubble rearrangements close to the rough walls and alter local fluidization. These concepts were evidenced in experiments on concentrated emulsions [20–22] and later confirmed and further investigated in a variety of studies, ∗ f.pelusi@iac.cnr.it both experimental and numerical [23–26]. Roughnessinduced fluidization hinges on a specific relation between the wall stress and the local shear rate close to the wall, as pointed out in [20, 21]. A net difference in the slip velocity - wall stress relation close to rough and smooth surfaces was also evidenced in [27], where flow-curves for rough and flat surfaces exhibit a difference for small stresses, with the flow-curve for flat surfaces setting below the flow-curve for rough surfaces. A similar behavior has been observed close to flat surfaces when the wettability of the wall changes and the adhesion properties of the droplets/particles at the wall are altered [26, 28]. In this context, the impact of the directional features of the wall texture geometry has not yet received enough attention. Recently, the role played by a directional roughness has been reported for the flow of concentrated emulsions within confined microfluidic channels featuring a wall textured by herringbone-shaped [29]. By directional roughness, we mean a realization of the surface texture so that the geometry is different with respect to the flow direction. Considerable effects of the directional roughness on the flow properties may be coupled with the rheology of the flowing materials due to the presence of a dispersed phase. To shed light on this interplay, a detailed characterization of the rheological response of emulsions close to the rough wall is needed. In experiments, this analysis is hindered by the lack of information on the local stress field inside the microfluidic channel, which is not directly measurable in the presence of asymmetric boundary conditions, since only velocity profiles are accessible [23, 30]. In this work, we aim to address these open issues by performing numerical simulations to investigate the relation" 2312.17579v1,"D ISTRIBUTION - BASED L OW - RANK E MBEDDING ∗ Bardia Yousefi A BSTRACT The early detection of breast abnormalities is a matter of critical significance. Notably, infrared thermography has emerged as a valuable tool in breast cancer screening and clinical breast examination (CBE). Measuring heterogeneous thermal patterns is the key to incorporating computational dynamic thermography, which can be achieved by matrix factorization techniques. These approaches focus on extracting the predominant thermal patterns from the entire thermal sequence. Yet, the task of singling out the dominant image that effectively represents the prevailing temporal changes remains a challenging pursuit within the field of computational thermography. In this context, we propose applying James-Stein for eigenvector (JSE) and Weibull embedding approaches, as two novel strategies in response to this challenge. The primary objective is to create a low-dimensional (LD) representation of the thermal data stream. This LD approximation serves as the foundation for extracting thermomics and training a classification model with optimized hyperparameters, for early breast cancer detection. Furthermore, we conduct a comparative analysis of various embedding adjuncts to matrix factorization methods. The results of the proposed method indicate an enhancement in the projection of the predominant basis vector, yielding classification accuracy of 81.7% (±5.2%) using Weibull embedding, which outperformed other embedding approaches we proposed previously. In comparison analysis, Sparse PCT and Deep SemiNMF showed the highest accuracies having 80.9% and 78.6%, respectively. These findings suggest that JSE and Weibull embedding techniques substantially help preserve crucial thermal patterns as a biomarker leading to improved CBE and enabling the very early detection of breast cancer. Keywords Early diagnosis of breast cancer · JSE estimator · Weibull embedding · thermomics · matrix factorization · high dimensional data analysis. 1 Introduction Thermography is an effective method for early breast cancer detection, addressing the second leading cause of cancer death in women [1]. This study suggests two novel methods, James-Stein for eigenvector (JSE) in thermography and the Weibull embedding, for thermography as clinical breast examination (CBE) tools and pre-screening technique before mammography, providing information on potential abnormalities in patients [2, 3]. Thermographic imaging operates on the principle of intensified angiogenesis (blood vessel formation) and vasodilation due to lesions detectable by an infrared camera. Endocrine-induced changes in the thermal profile signify altered vascularization, facilitating oxygen and nutrient delivery to lesion sites [3, 4]. Employing an infrared camera enables the dynamic capture of these changes, enhancing the ability to detect abnormalities by measuring thermal heterogeneities. Multiple studies have confirmed the importance of thermography in identifying hypervascularity related to non-palpable breast cancer [4]. This technique shows promise as a biomarker for early breast cancer detection, complementing CBE and preceding mammography. However, the major hurdle in using infrared technology for breast cancer detection lies in capturing irregularities and translating raw infrared sequences into thermal patterns. To overcome this, low-rank matrix approximation methods have been widely employed, where the primary basis is selected or to extract the leading basis that represents the entire thermal stream. Several computational thermographic techniques have been employed to aim this objective and used for dynamic thermography, techniques such as PCA- principal component analysis (PCA) [5, 6], non-negative matrix ∗ This is the authors’ version. B. Yousefi is with the University of Maryland College Park. BSE 4115, 9636 Gudelsky Drive, Rockville, MD 20850, Tel: 240-665-6529, e-mail: byousefi@umd.edu" 2312.17583v1,"Enhancing the Performance of DeepReach on High-Dimensional Systems through Optimizing Activation Functions Qian Wang * Tianhao Wu * University of Southern California Los Angeles, USA pwang649@usc.edu University of Southern California Los Angeles, USA wutianha@usc.edu Abstract—With the continuous advancement in autonomous systems, it becomes crucial to provide robust safety guarantees for safety-critical systems. Hamilton-Jacobi Reachability Analysis is a formal verification method that guarantees performance and safety for dynamical systems and is widely applicable to various tasks and challenges. Traditionally, reachability problems are solved by using grid-based methods, whose computational and memory cost scales exponentially with the dimensionality of the system. To overcome this challenge, DeepReach, a deep learning-based approach that approximately solves highdimensional reachability problems, is proposed and has shown lots of promise. In this paper, we aim to improve the performance of DeepReach on high-dimensional systems by exploring different choices of activation functions. We first run experiments on a 3D system as a proof of concept. Then we demonstrate the effectiveness of our approach on a 9D multi-vehicle collision problem. Index Terms—reachability, DeepReach, activation function I. I NTRODUCTION AND M OTIVATION With the continuous advancement in autonomous systems, it’s becoming more and more significant to ensure safe operations of these systems. Providing robust safety guarantees for autonomous systems still faces lots of challenges due to various reasons such as inherent uncertainties in the systems and their operating environments. Recently, one popular approach that aims to address this problem is Hamilton-Jacobi (HJ) Reachability analysis, which has been widely applied in robotics to compute the Backward Reachable Tube (BRT) of a dynamical system. To illustrate the concept of BRT, consider a simplified model where two vehicles are heading toward each other on a narrow path. In this example, BRT is the set of all states of the two vehicles that a collision becomes inevitable, despite of the best possible efforts of both drivers to avoid the collision. A more precise mathematical formulation of this problem will be given in a later section. HJ Reachability analysis offers a mathematical framework to compute the BRT of a dynamical system by converting the reachability problem into an optimal control problem. It can handle general nonlinear dynamics and non-deterministic uncertainty in the system under state constraints and control * These authors contributed equally to this work. bounds. Many related toolboxes have been developed to solve HJ reachability: DeepReach (Python), HelperOC (Matlab), BEACLS (C++), etc. However, the computation of BRT becomes highly intractable when dealing with high-dimensional systems when using grid-based methods because of the curse of dimensionality. This drawback limits their applicability to most practical robotic systems that can’t be modeled in low dimensions. DeepReach is a deep learning-based method that approximates the value function through a deep neural network (DNN) [1]. One huge advantage of DeepReach is the computation required for obtaining the value function doesn’t scale exponentially with the dimension of the system as for grid-based methods. Instead, it only scales with the underlying complexity of the value function, which makes it a promising tool to approach high-dimensional reachability problems. Currently, DeepReach deploys a sine activation function in the DNN based on recent research results that show periodic, sinusoidal activation functions can well represent signal’s derivatives [2]. Therefore, sine better models the gradient of the value function and leads to a more accurate approximation. While this approach works very well on low-dimensional systems, it remains a challenge to accurately approximate the value function for high-dimensional systems. The main tradeoff is between the difficulty of the optimization problem to solve and the quality of the gradient during the training of the DNN. Sine activation function captures better gradients, but at the same time, makes the optimization process much harder. On the contrary, ReLU results in a much easier optimization process, but a worse representation of the gradients because its first derivative is piece-wise constant. In this paper, we propose using a combination of Sine and ReLU activation functions in the DNN to better approximate the value function for higher dimensional systems. We first run sanity checks on low-dimensional systems to make sure that by incorporating ReLU activation, we can still obtain a generally sound BRT with respect to the analytical solution [3], though a larger MSE is expected when compared with the state of the art model that only uses Sine activation. Then we experiment with a 9-dimensional multi-vehicle collision" 2312.17584v1,"Interpretable and Explainable Machine Learning Methods for Predictive Process Monitoring: A Systematic Literature Review Nijat Mehdiyev 1,2* , Maxim Majlatow 1,2 and Peter Fettke 1,2 1 German Research Center for Artificial Intelligence (DFKI), Campus D 3.2, Saarbrücken, 66123, Saarland, Germany. 2 Saarland University, Campus D 3.2, Saarbrücken, 66123, Saarland, Germany. *Corresponding author(s). E-mail(s): nijat.mehdiyev@dfki.de; Contributing authors: maxim.majlatow@dfki.de; peter.fettke@dfki.de; Abstract This paper presents a systematic literature review (SLR) on the explainability and interpretability of machine learning (ML) models within the context of predictive process mining, using the PRISMA framework. Given the rapid advancement of artificial intelligence (AI) and ML systems, understanding the ”black-box” nature of these technologies has become increasingly critical. Focusing specifically on the domain of process mining, this paper delves into the challenges of interpreting ML models trained with complex business process data. We differentiate between intrinsically interpretable models and those that require post-hoc explanation techniques, providing a comprehensive overview of the current methodologies and their applications across various application domains. Through a rigorous bibliographic analysis, this research offers a detailed synthesis of the state of explainability and interpretability in predictive process mining, identifying key trends, challenges, and future directions. Our findings aim to equip researchers and practitioners with a deeper understanding of how to develop and implement more trustworthy, transparent, and effective intelligent systems for predictive process analytics. 1" 2312.17587v1,"A Tool for the Procedural Generation of Shaders using Interactive Evolutionary Algorithms Elio Sasso, Daniele Loiacono, Pier Luca Lanzi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) - Politecnico di Milano, Milan, Italy Abstract—We present a tool for exploring the design space of shaders using an interactive evolutionary algorithm integrated with the Unity editor, a well-known commercial tool for video game development. Our framework leverages the underlying graph-based representation of recent shader editors and interactive evolution to allow designers to explore several visual options starting from an existing shader. Our framework encodes the graph representation of a current shader as a chromosome used to seed the evolution of a shader population. It applies graphbased recombination and mutation with a set of heuristics to create feasible shaders. The framework is an extension of the Unity editor; thus, designers with little knowledge of evolutionary computation (and shader programming) can interact with the underlying evolutionary engine using the same visual interface used for working on game scenes. Index Terms—Interactive Genetic Algorithms, Shaders, Design Space Exploration I. I NTRODUCTION Technical artists are highly specialized professionals with an in-depth knowledge of the graphic pipeline, advanced programming skills, and artistic sensibility; such professionals are known as shader artists. Small development teams usually do not have sufficient resources to hire such specialized profiles, and shader artist positions are often outsourced. Several visual tools have been developed to bridge the gap between artists and shader programming, such as Shader Forge [1] Amplify Shader Editor [2], Unity’s Shader Graph [3], and Unreal Engine Material Editor [4]. These tools provide artists with abstraction over the underlying render pipeline and replace the complex C/C++ syntax with visual editors. In this paper, we present a tool for exploring the design space of shaders that combines an established visual tool for shader programming, Unity’s Shader Graph, and an interactive evolutionary algorithm into an extension of the Unity editor. 1 The tool starts from an existing shader in a Unity project, represented in the Unity Shader Graph format; it encodes it as a chromosome used to seed an initial population of shaders. Artists can explore the current shader population and evaluate individuals to provide qualitative feedback for the generation of the next population; graph-based mutation and recombination are integrated with heuristics to guide the generation of feasible (valid) shaders. Since our tool is an Contact authors: Elio Sasso (elio.sasso@mail.polimi.it); Daniele Loiacono (daniele.loiacono@polimi.it; 0000-0003-4579-2606), Pier Luca Lanzi (pierluca.lanzi@polimi.it; 0000-0002-1933-7717). 1 http://www.unity.com extension of the Unity editor, the evolutionary process is transparent to the users, who can simply browse a list of suggested shaders, submit their qualitative evaluation in terms of thumbs up, thumbs down, and save the shaders they prefer. II. S HADER P ROGRAMMING AND V ISUAL E DITORS In recent years, there has been a significant effort to integrate shader visual editors into popular video game development frameworks. Shader Weaver [5] is a third-party extension for Unity, which implements a visual editor for shaders for 2D rendering. Shader Forge [1] was a visual shader editor also available as an extension of the Unity editor (supported until 2018), that provided a real-time preview of the edited shaders. It implemented helper nodes that would add complex shader features such as screen-space refraction and the possibility of user-defined per-light custom function, enabling more technical users to implement their custom lighting processes. The tool mainly focused on simplifying the shader creation process and streamlining more complex shader functions such as edge detection, vertex animation, and transparency effects. Once the user completed the shader creation, the tool would generate an HSLS file, which Unity could parse as a custom shader. Amplify Shader Editor (ASE) is another visual editor for shaders available as an extension for Unity that is still supported and updated. It supports the latest render pipelines and provides greater control over shader functionalities [2]. Like Shader Forge, it also uses a graphbased representation of shaders. It offers more features when it comes to shader editing than Shader Forge and the visual editor for shaders currently integrated into Unity. III. R ELATED W ORK Few works have applied evolutionary computation to the generation of shader code [6]–[10]. All these works focus the search on a single specific single aspect of the shader (in contrast our framework consider the entire pipeline) and are based on GLSL, whereas our framework uses the abstract graphbased representation used by the most advanced shader editors [1], [2], [5]. Most of them use tree structures to represent shaders (our framework also uses a tree-based representation). Ebner et al. [6] applied genetic programming to evolve vertex and pixel shaders via user interaction. Shaders are encoded as linear sequences of commands which are translated into a high level computer graphics (CG) language. Similarly to what we do in our system, individuals are applied to" 2312.17594v1,"Utilizing the Janus MoSSe surface polarization property in CMOSFET design Utilizing the Janus MoSSe surface polarization property in complementary metal–oxide–semiconductor field effect transistor design Yun-Pin Chiu, Hsin-Wen Huang, and Yuh-Renn Wu Graduate Institute of Photonics and Optoelectronics and Department of Electrical Engineering, National Taiwan University, Taipei 10617, Taiwan (*Author to whom correspondence should be addressed: yrwu@ntu.edu.tw) (Dated: 1 January 2024) Janus transition metal dichalcogenides (JTMDs) have attracted much attention because of their outstanding electronic and optical properties. The additional out-of-plane dipole in JTMDs can form n- and p-like Ohmic contacts, and this may be used in device applications such as pin diodes and photovoltaic cells. In this study, we exploit this property to design n- and p-type metal–oxide–semiconductor field effect transistors (MOSFETs). First, we use density-functional theory calculations to study the inherent dipole field strength in the trilayer JTMD MoSSe. The intrinsic dipole of MoSSe causes band bending at both the metal/MoSSe and MoSSe/metal interfaces, resulting in electron and hole accumulation to form n- and p-type Ohmic contact regions. We incorporate this property into a 2D finite-element-based Poisson–drift–diffusion solver to perform simulations, on the basis of which we design complementary MOSFETs. Our results demonstrate that JTMDs can be used to make n- and p-MOSFETs in the same layer without the need for any extra doping. I. INTRODUCTION In the field of two-dimensional (2D) semiconducting materials, research on transition metal dichalcogenides (TMDs) has been flourishing in recent years owing to their remarkable properties, such as relatively high carrier mobilities, 1–3 suitable bandgap energies, 4,5 and an atomic thickness that is modifiable. 6–8 These properties make 2D TMDs suitable for various device applications 9,13,27? ? , especially for replacing traditional channel materials and overcoming the barrier of short-channel effects in smaller field effect transistors (FETs). 9? ,10 These TMD-based channel FETs have been studied for over a decade, and FETs have been successfully fabricated with TMD materials. For example, MoS 2 and WS 2 are two commonly selected materials for n-type channels, and α -MoTe 2 and WSe 2 are both good candidates for p-type channels. 3,11–14 It is well known that the contact characteristics of a FET device will strongly affect its I–V characteristics and performance. For low contact resistance, Ohmic contacts are usually required at the semiconductor–metal interface to enhance the electrical performance of FETs while maintaining a linear I–V curve. 15–17 Unfortunately, Schottky barriers (SBs) are usually formed for most TMD/metal contacts. 16–20 For an FET with SB contacts, carriers must overcome the energy barrier to transport from metal into the TMD channel region, impairing the device function by lowering the injection efficiency. 21 A typical technique used to reduce contact resistance in modern semiconductor technology is substitutional doping. 22 However, there are better ways to apply such a doping method to 2D materials, since their characteristics will be heavily altered after doping. Additionally, the absence of dangling bonds on the surface of a 2D material makes solid interface connections with metal challenging, resulting in larger contact resistance. 16 Hence, most of the effort required when engineering TMD/metal contacts is associated with finding a suitable metal to adjust the work function. For n-FETs, a ma- terial with a smaller work function is needed, whereas a metal with a high work function is often selected for p-FETs. Several studies have shown that TMD/metal heterostructures such as MoS 2 /Cu, WS 2 /Cu, and WSe 2 /Ti could provide n-type SB contacts, 18,19 and p-type SB contacts can be formed with a few combinations such as WSe 2 /Pd and WSe 2 /Au. 18,23 However, only a specific TMD/metal combination is acceptable for Ohmic contact formation, making TMD-based FET contact design more challenging. 24 To combine n- and p-type FETs into a complementary metal–oxide–semiconductor FET (CMOSFET) device, horizontally combing two different TMD channels to form a CMOSFET is a common approach. 13,25–27 With regard to fabrication, however, this CMOSFET design with two different materials has the disadvantage that the two materials need to be transferred onto a single substrate, with the risk of introducing defects or contamination. 28 Furthermore, two contact metals need to be considered separately, resulting in higher processing complexity and a more time-consuming fabrication procedure. Recently, ambipolar TMDs such as MoTe 2 29 and ReSe 2 30 have been proposed to compose a single-channel material CMOSFET, which reduces the difficulty of device fabrication. The use of a novel type of materials, namely, Janus transition metal dichalcogenides (JTMDs), MXY, where M = transition metal and X, Y = S, Se, or Te, with X 6 = Y, is another possible way to fabricate a CMOSFET using a single material. In recent years, several JTMDs have been successfully synthesized via different techniques. Monolayer MoSSe, for instance, was synthesized utilizing chemical vapor deposition combined with plasma stripping 31 or a selective epitaxy atomic replacement process, 32 while Lin et al. 33 prepared Janus WSSe by pulsed laser deposition. Previous theoretical studies of these JTMDs have provided unmistakable proof that their phonon spectra are stable and devoid of imaginary frequencies, verifying their fabrication stability. 34,35 Compared with TMDs, JTMDs have two different chalcogen-atom layers, which create an asymmetric sandwich configuration that" 2312.17637v1,"A New Explanation of the Mechanism of Hadley Circulation Wei Huang 1 1 Independent Researcher Correspondence Email: huangwei5934@gmail.com, wei.huang@colorado.edu ORCID: https://orcid.org/0000-0002-1594-8529" 2312.17641v1,"1 MoD2T:Model-Data-Driven Motion-Static Object Tracking Method Yang Feng, Liao Pan, Wu Di, Liu Bo, Zhang Xingle Abstract—The domain of Multi-Object Tracking (MOT) is of paramount significance within the realm of video analysis. However, both traditional methodologies and deep learning-based approaches within this domain exhibit inherent limitations. Deep learning methods driven exclusively by data exhibit challenges in accurately discerning the motion states of objects, while traditional methods relying on comprehensive mathematical models may suffer from suboptimal tracking precision. To address these challenges, we introduce the Model-Data-Driven Motion- Static Object Tracking Method (MoD2T). We propose a novel architecture that adeptly amalgamates traditional mathematical modeling with deep learning-based MOT frameworks, thereby effectively mitigating the limitations associated with sole reliance on established methodologies or advanced deep learning techniques. MoD2T’s fusion of mathematical modeling and deep learning augments the precision of object motion determination, consequently enhancing tracking accuracy. Our empirical experiments robustly substantiate MoD2T’s efficacy across a diverse array of scenarios, including UAV aerial surveillance and street-level tracking. To assess MoD2T’s proficiency in discerning object motion states, we introduce MVF1 metric. This novel performance metric is designed to measure the accuracy of motion state classification, providing a comprehensive evaluation of MoD2T’s performance. Meticulous experiments substantiate the rationale behind MVF1’s formulation. To provide a comprehensive assessment of MoD2T’s performance, we meticulously annotate diverse datasets and subject MoD2T to rigorous testing. The achieved MVF1 scores, which measure the accuracy of motion state classification, are particularly noteworthy in scenarios marked by minimal or mild camera motion, with values of 0.774 on the KITTI dataset, 0.521 on MOT17, and 0.827 on UAVDT. Index Terms—Multi-object tracking, Motion detection, Fusion I. I NTRODUCTION M ULTI-OBJECT TRACKING (MOT) stands as a pivotal cornerstone in the realm of video analysis, capturing the dedicated attention of scholars and researchers alike. The inception of MOT was bound by the limitations inherent in detection techniques, prompting initial pursuits that encompassed methodologies like image differencing, Kalman filtering, and the Hungarian algorithm, laying the foundational bedrock of tracking frameworks [1]. Progressing forward, the evolution witnessed the emergence of motion detection techniques, inclusive of the application of frame differencing. These methods, underpinned by statistical models exploiting pixel or feature-based statistical properties, provided the groundwork Yang Feng, Liao Pan , Wu Di, Liu Bo, and Zhang Xingle are with Key Laboratory of Information Fusion, School of Automation, Northwestern Polytechnical University,Xi’an,China. (emile: yangfeng@nwpu.edu.cn,liaopan@mail.nwpu.edu.cn,wu di821@mail. nwpu.edu.cn, 503790475@qq.com, 2072458850@qq.com for models detecting anomalies or changes. Furthermore, statistical model-centric strategies materialized, exemplified by Gaussian mixture models [2] and adaptive background modeling [3]. It remains conspicuous that traditional non-deep learning methods, fixated solely on tracking moving objects, often yield suboptimal outcomes across diverse scenarios. This shortcoming, attributed to the intricate nature of image complexities, inevitably curtails the precision of these conventional methodologies. In the ever-evolving landscape of computer vision, a profound transformation has unfolded, primarily steered by the pervasive embrace of deep learning. This transformative wave finds its embodiment in two prominent methodologies: [4]–[6] and joint-detection-association [7]–[10]. Tracking-bydetection intricately harnesses the power of deep learning models for precise object detection, seamlessly integrating them with sophisticated techniques like Kalman filtering to pave the way for seamless object tracking. On the flip side, joint-detection-association unfolds as an end-to-end integrated tracking network. The deep learning paradigm brings a tapestry of advantages to the forefront in the realm of MOT. It endows the system with unparalleled capabilities for feature learning and representation, allowing for a nuanced understanding of the semantic intricacies of tracked objects. Deep learning’s forte lies in its adeptness at modeling context effectively, enabling a holistic comprehension of the interplay between tracked objects and their surroundings [11]. The scalability of deep learning models in handling vast amounts of data adds another layer of strength, a crucial facet given the large-scale nature of MOT tasks. Furthermore, the principle of transfer learning accelerates the adaptation of models from one task to another, a vital asset in the everevolving MOT landscape. Adaptability emerges as a hallmark of deep learning, particularly in navigating the complexities of dynamic scenes marked by occlusions and intricate motion patterns. This innovative era has not only witnessed the ascendancy of tracking-by-detection but has also translated into remarkable successes across a diverse spectrum of applications [12]–[14]. However, these neural network-based methods heavily rely on object appearance features during implementation. Consequently, they often track all objects within an image, deviating from traditional methods that specifically target moving objects. Environments such as vehicle monitoring, battlefield operations, and autonomous driving typically require a focus on moving objects. In these scenarios, there is a need for information regarding the motion of objects relative to the ground, a challenge current methods struggle to address. Furthermore, as" 2312.17652v1,"Spin-orbit torques and magnetization switching in Gd/Fe multilayers generated by current injection in NiCu alloys Federica Nasr, 1 Federico Binda, 1 Charles-Henri Lambert, 1 Giacomo Sala, 1 Paul Noël, 1 and Pietro Gambardella 1 Department of Materials, ETH Zurich, CH-8093 Zurich, Switzerland (*Authors to whom correspondence should be addressed: federica.nasr@mat.ethz.ch, pietro.gambardella@mat.ethz.ch) (Dated: 29 December 2023) Light transition metals have recently emerged as a sustainable material class for efficient spin-charge interconversion. We report measurements of current-induced spin-orbit torques generated by Ni 1−x Cu x alloys in perpendicularlymagnetized ferrimagnetic Gd/Fe multilayers. We show that the spin-orbit torque efficiency of Ni 1−x Cu x increases with the Ni/Cu atomic ratio, reaching values comparable to those of Pt for Ni 55 Cu 45 . Furthermore, we demonstrate magnetization switching of a 20-nm-thick Gd/Fe multilayer with a threshold current that decreases with increasing Ni concentration, similar to the spin-orbit torque efficiency. Our findings show that Ni 1−x Cu x −based magnetic heterostructures allow for efficient control of the magnetization by electric currents. Materials that allow for converting charge currents into spin currents are used to generate spin-orbit torques (SOTs) in different classes of magnetic systems and devices. 1 SOTs enable the energy-efficient manipulation of the magnetization in ferromagnets, 2–4 ferrimagnets, 5–8 and antiferromagnets, 9–11 with applications in magnetic random access memories, 12 racetrack memories, 13 logic devices, 14 and spin-torque nanooscillators. 15,16 SOTs have been extensively studied in heavy metal/ferromagnet bilayers, 1–3,17–21 where the charge-to-spin conversion originates from the interplay of bulk and interfacial spin-orbit coupling, as exemplified by the spin Hall 22 and Rashba-Edelstein effects. 23 The two figures of merit describing the charge-to-spin conversion efficiency are the spin Hall angle and the spin Hall conductivity. The former is defined as the ratio of the transverse spin current generated in the spin injector to the applied charge current, whereas the latter is the ratio of the spin current to the external electric field driving the charge current. 1,24 A large spin Hall angle (≥ 0.1) is usually observed in the 5d transition metals, such as Ta, W, and Pt, owing to their strong atomic spin-orbit coupling. 22 Whether light metals can also show large charge-to-spin conversion is a question of both fundamental and practical impact on developing new and lowcost spin injector materials. In this context, 3d transition metals and their alloys have recently attracted interest because they present appreciable spin Hall angles despite their weak spin-orbit coupling. 25–31 The interest in light metals has further surged following the theoretical prediction of a large orbital Hall conductivity in the nonmagnetic 3d elements, 32,33 which can lead to the generation of strong SOTs in adjacent ferromagnetic layers. 34–37 For transition metals, besides the spin-orbit coupling, the d-orbital occupation plays an important role in determining the magnitude and sign of the spin Hall angle. 22,32 Ni is particularly interesting in this respect because it has the same valency and a similar band structure as Pt. The calculated spin Hall conductivity of Ni is ∼ 1.2 × 10 5 Ω −1 m −1 , about half of Pt, whereas the orbital Hall conductivities of Ni and Pt are very similar. 33 Extrinsic spin scattering effects due to alloying of different metallic elements can further enhance the charge-spin interconversion efficiency, 38–41 as shown, e.g., for Cu 1−x Bi x and Au 1−x Pt x . 42,43 In light of these observations, experimental work has focused on Ni x Cu 1−x alloys, in which the introduction of Cu reduces the Curie temperature relative to pure Ni, making the alloy paramagnetic at room temperature for x ≤ 70%. 44,45 Despite the alloying, the band structure of Ni x Cu 1−x remains similar to that of paramagnetic Ni, suggesting a significant intrinsic spin Hall effect regardless of chemical disorder. 46 Recent experiments have reported large effective spin Hall angles comparable to 5d metals in Permalloy/Ni 60 Cu 40 , CoFeB/Cu/Ni x Cu 1−x , and YIG/Ni 80 Cu 20 bilayers. 46–48 Additionally, spin-to-charge conversion in CoFeB/Ni 70 Cu 30 was shown to induce THz emission upon fs laser irradiation with intensity up to half that of CoFeB/Pt. 49 These studies show that Ni x Cu 1−x alloys constitute an interesting material system for spin-charge interconversion and the realization of spin current detectors. Here, we investigate Ni x Cu 1−x alloys as spin injectors for generating SOTs in perpendicularly magnetized Ni x Cu 1−x /Ti/[Gd/Fe] 30 heterostructures. We select three different compositions (x = 40, 50, 55%) for which Ni x Cu 1−x is paramagnetic at room temperature and report composition-dependent SOT efficiencies, reaching values of up to 0.06 for x = 55%, which corresponds to a spin Hall conductivity of (1.04 ± 0.07) × 10 5 Ω −1 m −1 without taking into account corrections due to spin memory loss and interface transparency. In addition, we demonstrate the efficient magnetization switching capability of these systems, including a fourth alloy’s composition x = 70% at the ferromagnetic phase transition. Our results show that Ni x Cu 1−x alloys are efficient spin current generators that can be used to achieve electrical control of the magnetization in spintronic devices. We fabricated three different sets of samples, all grown on SiO 2 substrates by magnetron sputtering: (i) the full heterostructures Ni x Cu 1−x (6 nm)/Ti(1 nm)/FiM/Si 3 N 4 (x = 40, 50, 55, 70%), referred to as Nix, where FiM stands for the ferrimagnetic multilayer [Gd(0.4 nm)/Fe(0.27 nm)] 30 , (ii) the reference layers Ni x Cu 1−x (6 nm)/Si 3 N 4 , referred to as Nix − r, and (iii) the single FiM layer Ti(1 nm)/FiM/Si 3 N 4 . The Ni x Cu 1−x layers are amorphous, as revealed by X-ray diffraction. The Ni x Cu 1−x layers in Ni40, Ni50, and Ni55" 2312.17666v1,"User Strategization and Trustworthy Algorithms Sarah H. Cen, Andrew Ilyas, and Aleksander M adry ˛ MIT {shcen,ailyas,madry}@mit.edu Abstract Many human-facing algorithms—including those that power recommender systems or hiring decision tools—are trained on data provided by their users. The developers of these algorithms commonly adopt the assumption that the data generating process is exogenous: that is, how a user reacts to a given prompt (e.g., a recommendation or hiring suggestion) depends on the prompt and not on the algorithm that generated it. For example, the assumption that a person’s behavior follows a ground-truth distribution is an exogeneity assumption. In practice, when algorithms interact with humans, this assumption rarely holds because users can be strategic. Recent studies document, for example, TikTok users changing their scrolling behavior after learning that TikTok uses it to curate their feed, and Uber drivers changing how they accept and cancel rides in response to changes in Uber’s algorithm. Our work studies the implications of this strategic behavior by modeling the interactions between a user and their data-driven platform as a repeated, two-player game. We first find that user strategization can actually help platforms in the short term. We then show that it corrupts platforms’ data and ultimately hurts their ability to make counterfactual decisions. We connect this phenomenon to user trust, and show that designing trustworthy algorithms can go hand in hand with accurate estimation. Finally, we provide a formalization of trustworthiness that inspires potential interventions. 1 Introduction In the age of personalization, data-driven platforms have become increasingly reliant on data provided by their users. Platforms like Facebook, Amazon, and Uber tailor their services to each user based on the user’s interaction history. Even data-driven tools in medicine and hiring utilize previous interactions in order to fine-tune and improve their results. Traditionally, platforms make a key assumption when processing user data, namely that the data is generated exogenously, i.e., how a user behaves depends on the user but not on the platform’s algorithm. When a user’s behavior is exogenous, an action—say, skipping a video on YouTube—is a reflection of the user’s preference for that video and not of YouTube’s algorithm: the user would skip the video regardless of the algorithm that generated it. YouTube can therefore attribute the skip to the user’s content preferences and recommend future content accordingly. In practice, however, users are not blind to how their platforms operate. In fact, many users adapt their behavior—or strategize—based on their perception of how the platform works. For instance, a Facebook user might not click on a post not because they find it uninteresting, but because they believe the algorithm will over-recommend similar content in the future if they do click. Or an Uber driver may cancel low-paying rides that they would normally accept because they have learned that Uber’s algorithm does not penalize them for excessive cancelations [Mar20]. In fact, 1" 2312.17669v1,"Spin-orbit coupling tuned crossover of gaped and gapless topological phases in the chalcopyrite HgSnX 2 (X=N/P): An ab-initio investigation Surasree Sadhukhan ∗ and Sudipta Kanungo † School of Physical Sciences, Indian Institute of Technology Goa, Goa-403401, India (Dated: January 1, 2024) The coupling between electron orbital momentum and spin momentum, known as spin-orbit coupling (SOC), is a fundamental origin of a multitude of fascinating physical phenomena, especially it holds paramount significance in the realm of topological materials. In our work, we have predicted the topological phase in Hg-based chalcopyrite compounds using the first principles density functional theory. The initial focus was on HgSnN 2 , revealing it to be a nonmagnetic Weyl semimetal, while HgSnP 2 displayed characteristics of a strong topological insulator. What makes our work truly unique is that despite both compounds having the same SOC strength, arises from Hg, they exhibit distinct topological phases due to the distinct hybridization effect of the Hg-5d and X-p bands. This finding can address a significant factor, i.e., the effect of the band hybridization in deriving distinct topological phases, keeping the symmetry aspect intact. Our results indicate that due to the presence of band hybridization between the dominant X-np orbitals n=2 and 3 for X=N and P respectively and a minor contribution from Hg-5d, we can tune the topological phase by manipulating SOC strength, which equivalently achievable by chemical substitutions. This investigation stands as a remarkable illustration of the unique roles that hybridization plays in sculpting the topological properties of these compounds while simultaneously preserving their underlying symmetries. I. INTRODUCTION The coupling between spin and orbital angular momentum in the relativistic framework, known as spinorbit coupling (SOC), is closely intertwined with the emergence of novel phases in quantum materials[1– 4]. This fascinating domain of SOC has broadened to encompass a plethora of phenomenon like Kitaev spin liquid systems[5–7], unconventional magnetism in heavy elements[8], superconductivity[9, 10], Rashba splitting[11–13], chiral magnetic interaction[14–17], spinorbit torque (SOT)[18–26], spin Hall effect[27, 28], spinorbit qubits[29], topological phases of matter[30–41] and many more. The importance of SOC in relation to topological phases is thoroughly recognized and meticulously documented, especially the incorporation of SOC introduces a band gap and leads to band inversion[42–46] and even SOC notably plays a significant role in instigating the breakage of band degeneracy[41]. The strength of SOC is an atomic property that is directly proportional to the fourth power of atomic number; nonetheless, some possible approaches, such as doping Pb 1−x Sn x Se[48] and designing heterostructures[49, 50], have been highly appreciated to engineer the effects of SOC and utilize in topological-based spintronics devices[3, 51]. Furthermore, both the magnitude and sign of the SOC strength can be manipulated as experimentally demonstrated in thallium nitride (TlN)[47]. However, the precise and definitive connection between topological phases and SOC at a material-specific level remains a subject yet to be fully explored. Especially in the context of inter- ∗ Corresponding author : surasree183212004@iitgoa.ac.in, surasree.sadhukhan@gmail.com † sudipta@iitgoa.ac.in metallic compounds, the hybridization between bands originating from distinct chemical elements can effectively account for the influence of SOC. In this scenario, the identification of the topological phase is not exclusively dictated by the particular element demonstrating high SOC. Instead, the compelling impact of hybridization with other elements, even those with lower SOC strength, comes into play, influencing the determination of the topological signatures. To understand the direct impact of SOC in driving the topological phases, we have selected two sister compounds, HgSnN 2 and HgSnP 2 , having the same crystalline symmetry, valence electrons, and heavy element (Hg), which accounts for the dominance of SOC strength. The rationale behind such a choice of compounds is to ensure everything that determines the topology of the materials is the same except for the choice of the anion(N/P). Here it is crucial for meaningful comparisons in our investigation. Moreover, the study of SOC effects in topological phases of Hg-based heavy elements has found promising platforms in several cases, including HgTe quantum well, which has similarity with chalcopyrite[52], MTl 4 Te 3 (M = Cd, Hg)[53], Jacutingaite-family [M 2 NX 3 (M = Ni, Pt, and Pd; N = Zn, Cd, and Hg; and X = S, Se, and Te)][54], two dimensional M 3 C 2 (M = Zn, Cd, and Hg)[55], Hg-based materials HgS, HgSe, and HgTe[56] etc., from both theoretical and experimental standpoints. Additionally, they provide insights that can aid in predicting potential Hg-based topological materials in our case. Moreover, it is also crucial to consider the experimental feasibility of compounds for a sensible choice of quantum material. The sibling compounds based on N and P in the chalcopyrite class have already been synthesized successfully, including ZnSiP 2 [57], ZnGeP 2 [58, 59], ZnSnP 2 [60], CdSiP 2 [61, 62], CdGeP 2 [63], CdSnP 2 [64, 65], MgSiP 2 [66], ZnSnN 2 [67], II-Sn-N 2 (II= Ca, Mg," 2312.17676v1,"Robust Inference in Panel Data Models: Some Effects of Heteroskedasticity and Leveraged Data in Small Samples Annalivia Polselli ∗ January 1, 2024 Abstract With the violation of the assumption of homoskedasticity, least squares estimators of the variance become inefficient and statistical inference conducted with invalid standard errors leads to misleading rejection rates. Despite a vast cross-sectional literature on the downward bias of robust standard errors, the problem is not extensively covered in the panel data framework. We investigate the consequences of the simultaneous presence of small sample size, heteroskedasticity and data points that exhibit extreme values in the covariates (‘good leverage points’) on the statistical inference. Focusing on one-way linear panel data models, we examine asymptotic and finite sample properties of a battery of heteroskedasticity-consistent estimators using Monte Carlo simulations. We also propose a hybrid estimator of the variance-covariance matrix. Results show that conventional standard errors are always dominated by more conservative estimators of the variance, especially in small samples. In addition, all types of HC standard errors have excellent performances in terms of size and power tests under homoskedasticity. JEL codes: C13, C15, C23. Keywords: cluster-robust standard errors, jackknife methods, test size, power of test. 1 Introduction When the assumption of homoskedasticity is violated and the disturbances show non-constant variance (within the cross-sectional timention, or time dimension, or both), least squares (LS) estimators are no longer efficient. Consequently, standard errors based on the incorrect assumption of homoskedastic disturbances lead to misleading statistical inferences. A common practice is to account for heteroskedasticity with robust standard errors when estimating the model. The Eicker- Huber-White (EHW) estimator (Eicker, 1967; Huber et al., 1967; White, 1980) has become the norm to account for any degree of heteroskedasticity in the cross-sectional environment. Its counterpart for the panel data is the Arellano’s (1987) formula. The presence of data points that exhibit extreme values in the covariates – i.e., good leverage points – makes the EHW estimator systematically downward biased leading to liberal statistical inferences (Long and Ervin, 2000; Godfrey, 2006; Hayes and Cai, 2007; MacKinnon, 2013; Şimşek and Orhan, 2016). The bias is severe when the cross-sectional sample size is sufficiently small (e.g., with less than 250 units in the sample), and persists even in large samples (MacKinnon and White, 1985; Chesher and Jewitt, 1987; Silva, 2001; ∗ Institute of Analytics and Data Science (IADS) and Centre for Micro-Social Change (MiSoc), University of Essex. Email: annalivia.polselli@essex.ac.uk. This is a preliminary revised version of the first chapter of my doctoral thesis, available at https://repository.essex.ac.uk/34481/. This project was supported by the South East Network for Social Sciences (SeNSS) as part of the Doctoral Training Partnership (award ES/P00072X/1/2128216). 1" 2312.17679v1,"Data Augmentation for Supervised Graph Outlier Detection with Latent Diffusion Models Kay Liu 1 , Hengrui Zhang 1 , Ziqing Hu 2∗ , Fangxin Wang 1 , Philip S. Yu 1 1 University of Illinois Chicago, Chicago, United States 2 Amazon, Chicago, United States {zliu234, hzhan55, fwang51, psyu}@uic.edu, ziqinghu@amazon.com Abstract—Graph outlier detection is a prominent task of research and application in the realm of graph neural networks. It identifies the outlier nodes that exhibit deviation from the majority in the graph. One of the fundamental challenges confronting supervised graph outlier detection algorithms is the prevalent issue of class imbalance, where the scarcity of outlier instances compared to normal instances often results in suboptimal performance. Conventional methods mitigate the imbalance by reweighting instances in the estimation of the loss function, assigning higher weights to outliers and lower weights to inliers. Nonetheless, these strategies are prone to overfitting and underfitting, respectively. Recently, generative models, especially diffusion models, have demonstrated their efficacy in synthesizing high-fidelity images. Despite their extraordinary generation quality, their potential in data augmentation for supervised graph outlier detection remains largely underexplored. To bridge this gap, we introduce GODM, a novel data augmentation for mitigating class imbalance in supervised Graph Outlier detection with latent Diffusion Models. Specifically, our proposed method consists of three key components: (1) Variantioanl Encoder maps the heterogeneous information inherent within the graph data into a unified latent space. (2) Graph Generator synthesizes graph data that are statistically similar to real outliers from latent space, and (3) Latent Diffusion Model learns the latent space distribution of real organic data by iterative denoising. Extensive experiments conducted on multiple datasets substantiate the effectiveness and efficiency of GODM. The case study further demonstrated the generation quality of our synthetic data. To foster accessibility and reproducibility, we encapsulate GODM into a plug-and-play package and release it at the Python Package Index (PyPI): https://pypi.org/project/godm/. Index Terms—Graph Outlier Detection, Data Augmentation, Diffusion Models, Class Imbalance, Anomaly Detection I. I NTRODUCTION Graphs are foundational data structures that capture complex relationships among diverse entities. Recently, graph data mining has showcased effectiveness and flexibility across various tasks, including community classification among academic citation networks [1], recommender systems in social networks [2], knowledge graph completion [3], and so on and forth. Within this broad spectrum of applications, graph outlier detection has emerged as a popular and important area of research and practice [4]–[6]. Graph outlier detection focuses on detecting outliers within graph-structured data that significantly deviate from standard patterns, which has proven valuable in domains such as financial fraud detection in bank ∗ Work done during Ziqing Hu’s PhD at the University of Notre Dame Synthetic Data Data Augmentation Graph Oultier Detector Original Graph Real Data real inlier real outlier synthetic outlier Fig. 1. An toy example of data augmentation for class imbalance in graph outlier detection. Synthetic outliers help balance the class distribution in the training data, thereby improving the performance of graph outlier detection. systems [7], fake news detection on social media [8], spam detection on review platform [9], and anti-money laundering in transaction networks [10]. However, despite the advancements in graph outlier detection techniques, similar to supervised outlier detection on other data modalities, graph outlier detection suffers a fundamental challenge known as class imbalance, where the number of positive instances (outliers) is significantly lower than the number of negative instances (inliers). For example, the ratio of positive to negative is only 1:85 in the DGraph dataset [7], reflecting the real-world extreme ratio in financial fraud detection scenario. This class imbalance problem poses challenges in the training of outlier detectors and often results in suboptimal performance. Specifically, as the negative instances dominate the training data, the loss function can be biased towards the majority of the negative class and, hence, exhibit poor generalization capability in identifying true outliers. In the worst case, a detector could classify every instance as negative, displaying seemingly low loss value and high accuracy score, yet basically lacking any knowledge. Common practices mitigate this imbalance by upsampling or downsampling [11]. Upsampling augments the minority positive class by simply replicating outliers, whereas downsampling reduces the size of the majority negative class by randomly dropping normal instances. However, while beneficial in certain contexts, these methods often introduce their own challenges, such as the risk of overfitting outliers in the case of upsampling or the loss of valuable training data through downsampling. Another common approach to alleviate" 2312.17681v1,"FlowVid: Taming Imperfect Optical Flows for Consistent Video-to-Video Synthesis Input Input Stylization Input Stylization Object Swap Prompt: a Greek statue wearing headphones Prompt: a Chinese ink painting of a panda eating bamboo Prompt: a koala eating bamboo Local Edits Object Swap Prompt: a woman wearing headphones, in flat 2d anime Local Edits Feng Liang * 1 , Bichen Wu † 2 , Jialiang Wang 2 , Licheng Yu 2 , Kunpeng Li 2 , Yinan Zhao 2 , Ishan Misra 2 , Jia-Bin Huang 2 , Peizhao Zhang 2 , Peter Vajda 2 , Diana Marculescu 1 1 The University of Texas at Austin, 2 Meta GenAI {jeffliang,dianam}@utexas.edu, {wbc,stzpz,vajdap}@meta.com https://jeff-liangf.github.io/projects/flowvid Prompt: a woman with black hair wearing headphones Prompt: a panda with a pig nose eating bamboo Figure 1. We present FlowVid to synthesize a consistent video given an input video and a target prompt. Our model supports multiple applications: (1) global stylization, such as converting the video to 2D anime (2) object swap, such as turning the panda into a koala bear (3) local edit, such as adding a pig nose to a panda. Abstract frame with any prevalent I2I models and then propagating edits to successive frames. Our V2V model, FlowVid, demonstrates remarkable properties: (1) Flexibility: FlowVid works seamlessly with existing I2I models, facilitating various modifications, including stylization, object swaps, and local edits. (2) Efficiency: Generation of a 4-second video with 30 FPS and 512×512 resolution takes only 1.5 minutes, which is 3.1×, 7.2×, and 10.5× faster than CoDeF, Rerender, and TokenFlow, respectively. (3) High-quality: In user studies, our FlowVid is preferred 45.7% of the time, outperforming CoDeF (3.5%), Rerender (10.2%), and TokenFlow (40.4%). Diffusion models have transformed the image-to-image (I2I) synthesis and are now permeating into videos. However, the advancement of video-to-video (V2V) synthesis has been hampered by the challenge of maintaining temporal consistency across video frames. This paper proposes a consistent V2V synthesis framework by jointly leveraging spatial conditions and temporal optical flow clues within the source video. Contrary to prior methods that strictly adhere to optical flow, our approach harnesses its benefits while handling the imperfection in flow estimation. We encode the optical flow via warping from the first frame and serve it as a supplementary reference in the diffusion model. This enables our model for video synthesis by editing the first 1. Introduction Text-guided Video-to-video (V2V) synthesis, which aims to modify the input video according to given text prompts, has * Work partially done during an internship at Meta GenAI. † Corresponding author. 1" 2312.17697v1,"Article The dead cone effect in heavy quark jets observed in momentum space and its QCD explanation Stefan Kluth 1, ∗ , Wolfgang Ochs 1 and Redamy Perez Ramos 2 1 2 * † Citation: Kluth, S.; Ochs, W.; Perez Ramos, R. The dead cone effect in heavy quark jets observed in momentum space and its QCD explanation. Universe 2023, 1, 0. https://doi.org/ Max-Planck-Institut für Physik, Boltzmannstr. 8, 85748 Garching, Germany DRII-IPSA, Bis, 63 Boulevard de Brandebourg, 94200 Ivry-sur-Seine, France; LPTHE, UMR 7589, Sorbonne Université et CNRS, 4 place Jussieu, 75252 Paris Cedex 05, France Correspondence (speaker): skluth@mpp.mpg.de MPI für Physik preprint number: MPP-2023-293 Abstract: The production of a heavy quark is accompanied by gluon bremsstrahlung with angular and momentum spectra predicted by perturbative Quantum Chromo Dynamics (QCD). The radiation off heavy quarks is predicted to be suppressed for large momentum particles, as a consequence of the angular “dead cone effect”. In this paper, we studied this effect using data from Z boson decays to c- or b-quarks in e + e − annihilation. The momentum spectra for charged particles are reconstructed in the momentum fraction variable x or ξ = ln ( 1/x ) by removing the decays of the heavy hadrons. We find an increasing suppression of particles with rising x down to a fraction of ≲ 1/10 for particles with x ≳ 0.2 in b-quark and x ≳ 0.4 in c-quark jets in comparison to light quark momentum spectra. The sensitivity to the dead cone effect in the present momentum analysis is larger than in the recently presented angular analysis. The suppression for c- and b-quark fragmentation is in good quantitative agreement with the expectations based on perturbative QCD within the Modified Leading Logarithmic Approximation (MLLA) in the central kinematic region. The data also support a two parameter description in the MLLA of these phenomena (“Limiting Spectrum”). The sensitivity of these measurements to the heavy quark mass is investigated. Keywords: QCD; heavy quarks; LPHD 1. Introduction We summarise here the work published in [1]. The dead cone effect is a prediction of QCD, the theory of strong interactions within the Standard Model of particle physics. It originates from the radiation pattern off a heavy quark as obtained in perturbation theory [2, 3]. For an energetic heavy quark Q of mass M Q and energy E Q such that E Q /M Q ≫ 1, the gluon emission probability for small emission angle Θ and low energy ω can be written as Received: dσ Q → Q + g ≃ Revised: Accepted: Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). α S Θ 2 dΘ 2 dω C F 2 , π ( Θ + Θ 20 ) 2 ω (1) with angular cut-off Θ 0 = M Q /E Q , α S is the strong coupling constant and C F = 4/3 is the QCD colour factor. Therefore, for smaller emission angles Θ < Θ 0 , gluon radiation is suppressed and vanishes in a cone (called “dead cone”) around the flight direction of the heavy quark Q. For large emission angles Θ ≫ Θ 0 , the gluon radiation pattern becomes identical to that of a light quark jets. Since for gluon radiation small emission angles and large momenta are correlated large momentum radiation is expected to be suppressed as well. An observation of the dead cone effect has been reported by the ALICE collaboration [4]. The angular spectra of subjets √ within charm-tagged jets and inclusive jets were studied in proton-proton collisions at s = 13 TeV at the Large Hadron Collider (LHC). A relative suppression of small angle subjet emission is observed in the heavy quark jet in Universe 2023, 1, 0. https://doi.org/10.3390/universe1010000 https://www.mdpi.com/journal/universe" 2312.17703v1,"Evidence for π-shifted Cooper quartets in PbTe nanowire three-terminal Josephson junctions Mohit Gupta, 1 Vipin Khade, 1 Colin Riggert, 1 Lior Shani 1 , Gavin Menning, 1 Pim Lueb, 2 Jason Jung, 2 Régis Mélin, 3 Erik P. A. M. Bakkers, 2 and Vlad S. Pribiag 1∗ 1 School of Physics and Astronomy, University of Minnesota, Minneapolis, Minnesota 55455, USA 2 Department of Applied Physics, Eindhoven University of Technology, Eindhoven, The Netherlands 3 Université Grenoble-Alpes, CNRS, Grenoble INP, Institut NEEL, Grenoble, France ∗ To whom correspondence should be addressed; E-mail: vpribiag@umn.edu. Abstract Josephson junctions are typically characterized by a single phase difference across two supercon- ductors. This conventional two-terminal Josephson junction can be generalized to a multi-terminal device where the Josephson energy contains terms that result from entanglement of multiple in- dependent phase variables. It was recently proposed that such multi-terminal couplings should result in a π-shifted quartet supercurrent. We show for the first time experimental signature of this π-shifted supercurrent, by using a three-terminal Josephson junction based on selective-area- grown PbTe nanowires. We further observe conductance steps at zero magnetic field co-existent with supercurrent in both two- and three-terminal devices, indicating ballistic superconductivity in the few quantum modes regime. Superconducting transport in the few-modes regime is a neces- sary condition for realizing topologically protected bound states such as Majorana zero modes in one-dimensional nanowires and Weyl nodes in multi-terminal Josephson junctions. 1" 2312.17708v1,"6 The Six Ways to Build Trust and Reduce Privacy Concern in a Central Bank Digital Currency (CBDC) Alex Zarifis and Xusen Cheng 6.1 Introduction Central Bank Digital Currencies (CBDCs) have been implemented by only a handful of countries, but they are being explored by many more (Kosse & Mattei, 2022). CBDCs are digital currencies issued and backed by a central bank. Consumer trust can encourage or discoura ge the adoption of this currency, which is also a payment system and a technology. This research attempts to understand consumer trust in CBDCs so that the development and adoption stages are more effective and satisfying for all the stakeholders. A. Zarifis ( * ) School of Business, University of Nicosia, Nicosia, Cyprus Cambridge Centre for Alternative Finance, University of Cambridge, Cambridge, UK e-mail: zarifis.a@unic.ac.cy X. Cheng School of Information, Renmin University of China, Beijing, China e-mail: xusen.cheng@ruc.edu.cn © The Author(s) 2024 A. Zarifis et al. (eds.), Business Digital Transformation, https://doi.org/10.1007/978-3-031-33665-2_6 115" 2312.17737v1,"ANISOTROPIC QUASILINEAR ELLIPTIC SYSTEMS WITH HOMOGENEOUS CRITICAL NONLINEARITIES MATHEW GLUCK Southern Illinois University School of Mathematical and Statistical Sciences Abstract. In this work we consider a system of quasilinear elliptic equations driven by an anisotropic p-Laplacian. The lower-order nonlinearities are in potential form and exhibit critical Sobolev growth. We exhibit conditions on the coefficients of the differential operator, the domain of the unknown function, and the lower-order nonlinearities under which nontrivial solutions are guaranteed to exist and conditions on these objects under which a nontrivial solution does not exist. 1. Introduction In 1983 Brezis and Nirenberg [BN83] determined conditions on λ ∈ R and the bounded domain Ω ⊂ R n (n ≥ 3) for which the problem  4    −∆u = λu + |u| n−2 u in Ω (1.1)    u = 0 on ∂Ω admits a positive solution and conditions on these objects under which problem (1.1) does not admit a positive solution. They established the following theorem. In the statement of the theorem, λ 1 = λ 1 (−∆) is the first eigenvalue of the Dirichlet Laplacian. Theorem A. Let n ≥ 3 and let Ω ⊂ R n be a bounded open set. (a) If n = 3 then there are constants λ ∗ (Ω) ≤ λ ∗ (Ω) satisfying 0 < λ ∗ ≤ λ ∗ < λ 1 such that problem (1.1) admits a positive solution if λ ∈ (λ ∗ , λ 1 ) and problem (1.1) does not admit a positive solution if λ ∈ (0, λ ∗ ]. (b) If n ≥ 4 then problem (1.1) admits a positive solution if and only if λ ∈ (0, λ 1 ). The subtleties under which problem (1.1) is solvable, at least in the case that one in interested in positive solutions, are apparent in the statement of Theorem A. These subtleties make problem (1.1) a natural candidate for further investigations and generalizations and there is a substantial body of E-mail address: mathew.gluck@siu.edu. Date: January 1, 2024." 2312.17748v1,"K-PERM: Personalized Response Generation Using Dynamic Knowledge Retrieval and Persona-Adaptive Queries Kanak Raj Kaushik Roy Birla Institute of Technology Artificial Intelligence Institute Mesra, India University of South Carolina imh10032.19@bitmesra.ac.in Columbia, SC, USA kaushikr@email.sc.edu Abstract Personalizing conversational agents can enhance the quality of conversations and increase user engagement. However, they often lack external knowledge to appropriately tend to a user’s persona. This is particularly crucial for practical applications like mental health support, nutrition planning, culturally sensitive conversations, or reducing toxic behavior in conversational agents. To enhance the relevance and comprehensiveness of personalized responses, we propose using a two-step approach that involves (1) selectively integrating user personas and (2) contextualizing the response with supplementing information from a background knowledge source. We develop K- PERM (Knowledge-guided PErsonalization with Reward Modulation), a dynamic conversational agent that combines these elements. K- PERM achieves state-of-the-art performance on the popular FoCus dataset, containing realworld personalized conversations concerning global landmarks. We show that using responses from K-PERM can improve performance in state-of-the-art LLMs (GPT 3.5) by 10.5%, highlighting the impact of K-PERM for personalizing chatbots. 1 Introduction Recent trends in Large Language Models (LLMs) have demonstrated remarkable abilities in conversational AI (Jo et al., 2023)(Shin et al., 2023). However, personalization is a potential area for LLMs that requires improvement (Zhang et al., 2023). Personalization in conversational AI can go beyond chit-chat conversations and aid in user engagement by understanding their personas better and providing accurate responses (Bender et al., 2021)(Joshi et al., 2017). Prior research on personalization has primarily focused on casual conversations, emphasizing details such as a user’s preferences. The lack of external knowledge hinders a model’s ability to adapt to Manas Gaur University of Maryland Baltimore County manas@umbc.edu different personas (Deshpande et al., 2023). Therefore, recent shifts in chatbot personalization utilize both persona information and knowledge (Qian et al., 2021) (Liu et al., 2023). However, identifying a suitable context aligned with user preferences during a conversation remains a significant challenge for current LLMs. While using various prompting methods may allow a user to steer LLMs toward desired behavior, they only work at an utterance level. This may not be feasible for longer conversations, as the context often shifts (Shuster et al., 2021). Therefore, we require the chatbot to learn how to retrieve appropriate content based on a user’s query and assess whether a response requires contextualization (retrieval of meta-information) and personalization (selecting appropriate persona, if necessary). To address this issue, we propose using Knowledge-guided PErsonalization of response generation with Reward Modulation (K-PERM). K-PERM uses dynamic knowledge retrieval along with personalization to improve a machine’s adaptive capabilities to different personas and contexts. Our Personalized Response Generation task involves two major components: 1. Understanding Conversation Context: We use Dense Passage Retrieval (DPR) (Karpukhin et al., 2020) to select the most pertinent information from a larger text corpus containing real-world information. 2. Incorporating Appropriate Personas: We introduce a selector module capable of choosing a persona that aligns with the user query. We model persona selection as a multiplechoice question-answering task, which includes an option to opt for “no-persona” in generic cases. To the best of our knowledge, our study is the first to dynamically and flexibly incorporate knowledge, persona, and conversation history into a learn-"